Search This Blog

Wednesday 26 September 2012

Windows Xp Genuine Forever 100%

The Ultimate Guide To Batch Scripting From Basic To Advanced (Windows Programming Language). PART 2

The Ultimate Guide To Batch Scripting From Basic To Advanced (Windows Programming Language). PART 3

The Ultimate Guide To Batch Scripting From Basic To Advanced (Windows Programming Language).PART 4

Increase (Accelerate) uTorrent , BitTorrent Download Speed Using uTorrent ,BitTorrent Turbo Accelerator.

Hack Firewalls and Networks

           Hack Firewalls and Networks - How to hack into Remote Computers



Sniffing and spoofing are security threats that target the lower layers of the networking infrastructure supporting applications that use the Internet. Users do not interact directly with these lower layers and are typically completelyunaware that they exist. Without a deliber-ate consideration of these threats, it is impossible to build effective security into the higher levels.

Sniffing is a passive security attack in which a machine separate from the intended destination reads data on a network. The term ?sniffing? comes from the notion of ?sniffing the ether? in an Ethernet network and is a bad pun on the two meanings of the word ?ether.? Passive security attacks are those that do not alter the normal flow of data on a communication link or inject data into the link.



Just Download The PDF file and Enjoy it.


              Click Here To Download

Download Unlimited From Rapidshare without premium account.

Download Unlimited From Rapidshare without premium account.




Today I will tell two 100% working and tested ways to download unlimited from rapidshare without premium account.

So read on..


First of all Things That we Need:


1. Any web browser (chrome or Mozilla etc..) 


2. Download accelerator ( I prefer Internet Download Manager IDM )


I have Explored two Sites which generates the premium links for rapidshare and have resume facility. 


You can use them to download unlimited from rapidshare.




                                                                 SITE 1




                                                                 SITE 2




METHOD TO DOWNLOAD FROM SITE 1:



Visit site1 (click on the link above). 


Signup for free and then sign in your account.
Copy your Rapidshare link and place it there and download at high speed with resume facility.




METHOD FOR SITE2 :


Paste your Rapidshare Download link there and hit download.

How to decrypt passwords

   

How to decrypt passwords


If you're going through this tutorial is because you don't know how to decrypt passwords to download keylogger, rats, etc.


Okay my intentions of doing this tutorial are for noobs that doesn’t know how to decrypt passwords and they keep posting how I can decrypt the password.



First there are many ways that the people crypt password, examples:


U-ASCII Encode, 
T-ASCII Encode, 
F-ASCII Encode, 
AER-256 Encrypt, 
ARMON-64 Encrypt, 
ATOM-128 Encrypt, 
BASE-64 Encrypt, 
ESAB-46 Encrypt, 
EZIP-64 Encrypt, 
FERON-74 Encrypt, 
GILA7 Encrypt, 
HAZZ-15 Encrypt, 
MEGAN-35 Encrypt, 
OKTO3 Encrypt, 
TIGO-3FX Encrypt, 
TRIPO-5 Encrypt, 
ZARA-128 Encrypt, 
ZONG22 Encrypt.


All these types of encryptions are found HERE.





Now let's say the password is:

S0Q5WGZoS3FUbWhmS3kwZw==


And he says encrypted method [TRIPO-5 -> ATOM-128 -> BASE-64].


You need to copy the password as exactly as it is, if you miss a letter or number it won't be the same password.


Start decrypting it from backwards since it was encrypted this way [TRIPO-5 -> ATOM-128 -> BASE-64] you need to decrypt it this way [BASE-64->ATOM-128->TRIPO-5]. 


If he says decryption method is [TRIPO-5 -> ATOM-128 -> BASE-64] you just decrypt it like it says.





When people say in their encryption method HEX you need to decrypt it with HEX TO ASCII an example:


The password is: 
NTQgNzUgNzQgNmYgNzIgNjkgNjEgNmM=


Encryption method was [HEX -> BASE-64] you need to decrypt it this way [BASE-64 -> HEX TO ASCII ].


HEX TO ASCII decrypting method can be found HERE




There are other ways of encryptions such as Backwards also called Reverser/(ed), this is found HERE, lets say another example:



The password is:

BbaMCzGFsRA4


Encryption method was [BACKWARDS -> FERON-74] you need to decrypt it this way [FERON-74 -> BACKWARDS ]


I've seen people that have also tried to confuse people by adding to the encryption method NORMAL TEXT, in this case you don't need to do anything an example:


The password is: 

BbaMCzGFsRA4



Encryption method was [NORMAL TEXT -> BACKWARDS -> FERON-74] you need to decrypt it this way [FERON-74 -> BACKWARDS] only, they add NORMAL TEXT to confuse noobs but really you just skip that way. 


A lot of people are asking what to do for binary look here:
For binary you just decrypt it Binary to ACSII and for Hex you decrypt it Hex to ASCII too, in example:



Code:
30 31 30 31 30 31 30 30 20 30 31 31 31 30 31 30 31 20 30 31 31 31 30 31 30 30 20 30 31 31 30 31 31 31 31 20 30 31 31 31 30 30 31 30 20 30 31 31 30 31 30 30 31 20 30 31 31 30 30 30 30 31 20 30 31 31 30 31 31 30 30


Encryped method:[ Binary -> Hex ]


To decrypt copy the code and GO HERE you select first the option Hex to ACSII then you copy the result, and then select the option Binary to ASCII

Computer (I.T) Acronyms

 

Computer (I.T) Acronyms

ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended


--- B ---
BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector


--- C ---
CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft�/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)


--- D ---


DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory


--- E ---
ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation


--- F ---
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus


--- G ---
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz


--- H ---
HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan


--- I ---
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization


--- J ---
JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America


- K ---
Kbps - Kilobits Per Second
KBps - KiloBytes per second


--- L ---
LG - LG Electronics
LAN - Local Are Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode


--- M ---
MAC - Media Access Control
MB � MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International


--- N ---
NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card


--- O ---
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer


--- P ---
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit


--- R ---
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute


--- S ---
SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface


--- T ---
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name


--- U ---
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair


--- V ---
VCD - Video CD
VPN - Virtual Private Network


--- W ---
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get


--- X ---
XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology

Saturday 22 September 2012

HACK WEBSITE ADMIN USING SQL INJECTION



HACK WEBSITE ADMIN USING SQL INJECTION


First open http://www.google.com 
write in the google search bar "Admin.asp and then press the search tab.
now a number of website opened with admin log page. 
now click on target website means click on the website you want to hack. Then a page with username and password has been opened 
e.g: welcome to adminxxxx

username=admin.
now the part password if is made on sql then the password is: 1'or'1'=1 
actually it is sql injection which breaks the server firefall. 

here are the list of common sql injections below:

'1'=1

'0"=0


"a"="a"


('x=x"


1=1--


0=0#


') or a"='a


hi" or 1'=1"


****note*** this tricks is for educational purpose ******


:- PANKAJ TIWARI

How To Hack Passwords From Remote Computer With Ardamax Key Logger

How To Hack Passwords From Remote Computer With Ardamax Key Logger


Now i share a hack tutorial it is copied from a website named HackersZone { Hacking & Security }. I try to explain its working to all people. special thanks to HackersZone .

PART-: 1

At first turn off your anti virus.



Download ARDAMAX 2.8 : Click here
Download this file and unzip it. Click install button

Then After Installing your task bar shows a new icon like notepad, now right-hand click it and click ‘Enter registration key.



In The Registration box Enter This :-

REGISTRATION NAME : Nemesis 
REGISTRATION KEY : YKPJVSDPITIUTRL
Once done click ‘Ok’ and you should get a pop-up saying ‘Registration key accepted. Thanks for registering


PART-: 2
Creating the Keylogger Engine: 



Now we are going to make the Key logger Engine (The thing you give to your victim). Click ‘Remote Installation…’, now, click ‘next’ until you get to Appearances.



Now that your at Appearences, click ‘Additional components’ and Select’Log Viewer’ .
Now you should be at ‘Invisibility’, make sure all the boxes are Selected, then click ‘Next’.





Now you should be at ‘Security’, now, click ‘Enable’ and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click ‘Next’.

Now you should be at ‘Web Update’, just click ‘Next’ when your here.

Ok, you should now be at ‘Options’, this all depends on you, if you want your Keylogger to be a secret on your computer so your family know you ain’t been up to anything naughty, then tick ‘Start in hidden mode’ and click ‘Next’
(Remember, if in future you want to make a new Keylogger Engine, then press: CTRL + SHIFT + ALT + H at the same time.

Ok, now you should be at ‘Control’, click the box that says ‘Send logs every’, now make it so it sends logs every 10 minutes, then where it says Delivery, un-tick ‘Email’ and tick ‘FTP’, leave the ‘Include’ bit as it is, now un-tick the box where it says ‘Send only if log size exceeds’, once thats done.



Now you should be at ‘FTP’, create a free account, Click here


Then make sure your at ‘Online Storage’, then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone), 

Now on your FTP on Ardamax Keylogger, where it says ‘FTP Host:’, put this: http://ftp.drivehq.com

Now where it says ‘Remote Folder:’, put this: Logs
Now where it says ‘Userame:’ and ‘Password:’, put your DriveHQ username and password, then it should look something like this.
Once done, do NOT change your DriveHQ password or rename/delete the folder called ‘Logs’, if you do, the logs will not come through.
You should now be at ‘Control’, make sure all the boxes are ‘ticked’ then click ‘Next’.
Where it says ‘Screen Shots’, adjust them as you like, but I recommend every 2 hours and full screen, once done click ‘Next’.
Now you should be at ‘Destination’, now you have to choose where you put your Keylogger Engine, where it says ‘Keylogger egine path:’, click ‘browse’ and choose where you want to put your Keylogger Engine.
Now un-tick ‘Open the folder containing the keylogger engine’ (this should stop you from logging yourself) and then choose the Icon you want for the keylogger engine, choose one and then click ‘Next’ then ‘Finish’.

PART:- 3
Binding the Key-logger Engine with another file:



Download Easy Binder : Click here


PLEASE NOTE THAT YOU WILL NEED THE .NET FRAMEWORK v2.0 IN ORDER TO RUN THE BINDER.


Open it and then click the little green ‘+’ image in the bottom left corner, then it should browse your files. 

Go to wherever you put the Keylogger Engine and then click the file called ‘Install’.
Do the same again but don’t add the Keylogger Engine (Install), add a picture or something.






You need to get a .ico image, this is easy, just Click here and upload the Image you want to be converted to .ico
once its done, click ‘download’.
On the Binder, click ‘Settings’ and then where it says ‘Select An Icon’, click the ‘…’ image and then browse your files, where it says ‘Files of type’, scroll down and select ‘All Files [*.*]‘, then select your .icoimage which you just made like so:
Now on the Easy Binder, where it says ‘Set Output File’, click the ‘…’ button and then put it where you want your binded files to be saved, put the name you want on the file and then click ‘Save’.
Go to ‘File’s’ on the Binder and then click ‘Bind File’s’. Now this new file you’ve just made is the keylogger and a image in one, if your doing this with Ardamax 2.8 then when your victim opens the file, a harmless image comes up and they’re PC also gets infected with Ardamax Keylogger.


Now spred and enjoy your logs!

:- PANKAJ TIWARI