Saturday, July 30, 2011

Top 5 Best Black Hat Hackers

Kevin Mitnick is a very intelligent hacker of his own style called Social Engineering. He used this technique at the age of 12 to bypass the punchcard system used in the Los Angeles bus station. He hacked the first computer network at the age of 16 and copied the valuable software of Digital Equipment Corporation for which he is sentenced for 12 months followed by supervise release. Mitnick used his social engineering technique to hack computer networks, email, coping most valuable software's etc.., which made him a most wanted cyber criminal in the history of USA. After getting caught by US government he changed attitude and now he is a best computer security consultant.

He is the founder of buffer overflow attacks and the first computer worm in internet which is named Morris Worm, not only that but he is also a co-founder od ViaWeb(Now it is called as Yahoo! Store) which is the first web-based application which lets users to create their own online store with very little effort and less expertise. According to Morris the worm created by him is intended to gauge the size of internet, but when it comes to real the worm has the capable to find the vulnerability's of the targeted systems and which in turn gives access to hackers by exploiting the security hole.
The creation of this worm made him the first person to be prosecuted and convicted in US under the Computer Fraud and Abuse Act and sentenced for 3years of prohibition, 400hours of community service, $10,050 fine and his supervision costs.
After this he has achieved many things like being a cofounder of ViaWeb which was sold to yahoo for $48million, Receiving a Ph.D in Applied science by Harvard, being a professor in MIT(Massachusetts Institute of Technology) and so on which made him special in this world.
Loyd Blankenship(a.k.a +++The Mentor+++)
Loyd Blankenship is well know as The Mentor and written as +++The Mentor+++, In 1970s he is a well-known hacker and writer and is also very very famous for his The Hackers Manifesto and was published in the underground hacker ezine Phrack and you can read it from here. Loyd gave a reading of The Hacker Manifesto and offered additional insight at H2K2. (Source: Wikipedia - http://en.wikipedia.org/wiki/Loyd_Blankenship)
Jonathan James(a.k.a c0mrade)
Jonathan was the first juvenile to be sent to sentence at the age of 16. Jonathan is well known for his high rated intrusions including gaining access to DTRA(Defence Threat Reduction Agencies) servers and installing a backdoor which in-turn gave him access to sensitive email and passwords of their employees and 10 other military systems.
The other major intrusion is breaking in to NASA servers and stealing the software(Actually it is a source code) worth of $1.7 Million, This intrusion forced NASA to shutdown their systems for 4 weeks to find and fix the problem. The software that was steeled by J.J is used to support the physical environment in International Space Station.
J.J was died in May 18, 2008 by committing a suicide.
Kevin Poulsen(a.k.a Dark Dante)
Kevin Poulsen is also the most wanted and the best hacker once is US, Kevin is well known for his take over of all the telephone lines of Los Angeles Radio Station(KIIS-FM) by which he would be the guaranteed 102nd caller for which he will win the prize of a Porsche 944 S2. Later that when FBI started perusing him he went underground. When he was underground, the famous NBC featured a show called Unsolved Mysteries, at that time their 1-800 telephone lines are mysteriously crashed…. Later that incident Kevin was arrested for his actions and was sentenced for 51 months in prison and ordered to pay $56,000.

Friday, July 22, 2011

Hidden Programs In Windows XP !



Is it strange to hear , but true that some good programs are hidden in Windows XP !!!

Programs :

1. Private Character Editor :

Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit

2. Dr. Watson :

This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32

3. Media Player 5.1 :

Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32

4. iExpress :

Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress

Disable Turn Off Option ..and ALT+F4 option


REGEDIT->HKEY_CURRENT_USER->SOFTWARE->MICROSOFT->
WINDOWS->POLICIES->EXPLORER
THEN GO TO RIGHT SIDE AND BY RIGHT CLICK OF UR MOUSE CREATE NEW DWORD VALUE WITH NAME NoClose and after creating click on it and give Value Data 1.
 And Reboot your pc ..now your Turn Off option is disabled ..to Enable it again ..go to that directory by regedit ..and simply delete that created NoClose and Log Off Your User and Log in again ..your Turn off Again Working.

Deleting Recyclebin From The Desktop...


HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows/CurrentVersion\Explore \Desktop\ NameSpace\ LOOK FOR THE KEY"645FF040-5081-101B-9F0800AA002F954E

 AND DELETE" this hack is for completely deleting the reclyebin ON THE OTHER HAND YOU SHOULD USE BELOW HACK:- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows/SehellNoRoam\MUICache AND CHANGE THE VALUE OF @C:\WINDOWS\system32\SHELL32.DLL,8964 TO WHATEVER YOU WANT.


Create Your Own Logon Message
1 Click start
click run
type regedit,
then click ok!

2 In The registry editor, drill down to the following key:
hklm\software\Microsoft\Window​s NT\Current version\Winlogon.

3 Right click LegalNoticeCaption,
click modify,
Type: THIS IS NEXT TRICK,and then click ok!

4 Right click legalNoticeText,
click modify, and then Close your message!

5 Restart Your Computer.

6 The message will appear every time you logon!
dhrumil shah

Wednesday, July 20, 2011

Ophcrack XP PASSWOLD HACKING

Ophcrack is a free open source (GPL licensed) program that cracks Windows passwords by using LM hashes through rainbow tables. The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. On most computers, ophcrack can crack most passwords within a few minutes.

Rainbow tables for LM hashes of alphanumeric passwords are provided for free by the developers. By default, ophcrack is bundled with tables that allows it to crack passwords no longer than 14 characters using only alphanumeric characters. Available for freely for download are two Windows XP tables, one small and one fast, and one Windows Vista table.

Objectif Sécurity has even larger tables for purchase, intended for professional use.Larger rainbow tables contain LM hashes of passwords with all printable characters, including symbols and spaces, and are available for purchase.

Ophcrack is also available as Live CD distributions which automate the retrieval, decryption, and cracking of passwords from a Windows system. One Live CD distribution is available for Windows XP and lower, as well as another for Windows Vista and Windows 7.The Live CD distributions of ophcrack are built with SliTaz GNU/Linux.

Starting with version 2.3, Ophcrack also cracks NTLM hashes. This is necessary if the generation of the LM hash is disabled (this is default for Windows Vista), or if the password is longer than 14 characters (in which case the LM hash is not stored).

Sunday, July 17, 2011

Method 1:
If you have an administrator account (Not Guest)
then the XP users’ passwords can be reset using command prompt.
Go to the task-bar and click on the Start button, then click on run and in the place given on dialog box type “command”, press enter.
Now In the Command prompt type “net user”
the screen will display the list of users available on machine
suppose there are three administrator users with the name of admin1, admin2 and admin3

then the password of any user can be changed by logging into the account of any one administrator
for example if we want to change the password of admin1
then we can change it from the following command
net user admin1 password
similarly for other desired users
The general syntax is for changing password is
net user
Limitations: The above method will only work if you are logged in as the administrator user.
Method 2:
Windows Recovery option,
Boot from the Windows XP CD and press enter when you are prompted to Install Windows copy, on the next screen there is a repair existing Windows version. This method is also known as windows recovery method,
The repair option will take as much time as the installation would have taken because the Windows file-system is replaced including the SAM file where the password is stored.
C:WindowsSystem32configsam
whereas the users’ setting remain untouched.
Thus the users’ password is reset to NULL value.
#In repair mode you have another hole to modify the password.It is easier.The steps are as following.
Boot from xp bootable.After license agreement is done(pressing f8) select the target window for repair.
After file copy completed machine will restart.And repair process will start.You will see ‘installing devices’ 39 minutes left etc. at bottom left of your screen.
Now press Shift+f10.A console(command window) will open.
type nusrmgr.cpl and hit enter.This will let you to enter in the user account setting.Now change the password.You will not be asked for old password. Just type the new password there.
Continue the repair process.It is strongly recommended that you continue the repair until it is completed.
You are done, the password is replaced.The password strength does not matter in this case.
Method 3:
Boot your computer from a live Linux CD or DVD which has an NTFS/HPFS file-system support.
Then Mount the drive which has Windows copy installed on it. Copy the sam file on the location
C:WindowsSystem32configsam
Which will be mentioned as /media/disk-1/Windows/System32/config/sam
It is a common misconception that sam file can be viewed through normal text editor, sam file isnt a normal text file.
Gnome, KDE or vim text Editors won’t display the content of this file
Open the file using Emacs Editor (available in nearly all the distributions of Live Linux). It will be hard to find the the password hashes, so go for the user-names which are not encrypted, just after the user-names passwords’ hashes can be found out, copy the code between “%” sign and on the the Google search for the rainbow tables, They will provide the decrypted value which have already been brute-forced earlier. This is isn’t a sure shot method, as the rainbow project is still under development. The password can be set to NULL by deleting the content, but this might result in the corruption of the sam file, and recovery is the only option left after it.
Limitations: This Method can corrupt your SAM file, which may lead to a repair of Windows XP, and you can risk your personal data with that.
Method 4:
OPHcrack method.
This is a sure shot password recovery method based upon bruteforcing.
This Live CD is based upon the slax LiveCD v.5.1.7. It has been customized to include ophcrack 2.3.3 and the SSTIC04-10k tables set. It is able to crack 99.9%% of alphanumeric passwords. Since the tables have to be loaded into memory, cracking time varies with the amount of available RAM. The minimum amount of RAM required is 256MB (because the LiveCD uses a lot of it). The recommended amount is 512MB. Ophcrack will auto-detect the amout of free memory and adapts its behaviour to be able to preload all the tables it can.
A shell script launched at the beginning of the X session(Session for managing your desktop) does the job of finding the Windows partition and starting appropriate programs to extract and crack password hashes. It will look for all partitions that contains hashes. If more than one are found, you will have to choose between them.
If your partition is not detected, make sure your the partition containing the hashes you want to crack is mounted and the use ophcrack ‘Load from encrypted SAM’ function to recover your Windows hashes. Then click ‘Launch’ and the cracking process will start.
Download the ISO image of OPH crack Live Linux CD from sourceforge mirrors.
Another small application which resets the users’ password is available at

How to Trace Any IP Address

In my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.
Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located

2. Region

3. City

4. Latitude/Longitude

5. Zip Code

6. Time Zone

7. Name of the ISP

8. Internet Speed

9. Weather Station

10. Area Code and

11. Domain name associated with the IP address.

A sample snapshot of the results from ip2location.com is given below
You can also visually trace route any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.

How to Use Windows 7 Without Activation

Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.
1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter
slmgr -rearm

3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.
4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform

5. In right-side pane, change value of SkipRearm to 1.
6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.
120 days using “slmgr -rearm” command before registry edit+

240 days using “slmgr -rearm” command after registry edit

= 360 Days

Saturday, July 16, 2011

FREE SMS SITES


http://www.160by2.com
http://www.mycantos.com
http://www.gosms.com
http://www.phones.com
http://www.devinosms.com/
http://gsms.se/
http://www.themobiweb.com/en/sms.html
http://my.phonegnome.com/
http://sms4u.biz/signup.php
http://simsor.com/register
http://www.mobik.com/mobik/client/
http://www.smsdiscount.com/en/index.html
http://4usms.net/
http://www.sendsmsnow.com/
http://www.unisms.uni.cc/
http:// www.atrochatro.com/
http://zyb.com/
http://www.mobyko.com/
http://www.smstxtbox.com/ web/
http://www.junglesms.com/
http://50sms.com/
http://www.ecosms.ch/
http://www.free– sms.com/index.go
http://www.pimpmysms.com/
http://www.islamweb.net/
http://www.gsmvault.com/
http://smscity.com/
http://www.sms2india.org/
http:// www.freesms.web.tr.tc/
http://www.d1g.com/
http://thesmszone.com/
http://zyb.com/
http://www.vazu.com/
http://www.sms.ac/
http://www.agentsms.com/
http://www.mobizone.com/
http://www.yellowpages.com.eg /
http://www.shortmessage.com/
http://www.worldxs.net/sms.html
http://www.hot.it/sms
http://www.smspress.com/
http://www.freesms.com/
http://www.textmefree.com/
http:// www.rosms.home.ro/
http://www.nice-prizes.de/
http://www.uni.de/
http://www.quicksms.de/
http://www.cbfsms.com/ http://www.sms.de/
http://www.cbfsms.com/
http://www.sms.de/
http://www.send.sms.to/free.asp
http://www.genie.co.uk/
http://www.world-free.com/free-sms
http://www.free-sms-com/
www.jump.to/freesms
http:// www.awalsms.com/
http://www.uaesms.com/
www.jinny.com.lb/sms
www.cellular.co.za/
send_sms2.htm
http:// www.mobizone.com/
http://www.smspop.com/
http://www.nemra1.com/
http://www.boswtol.com/
http://free-sms-
message.com/index.htm http://adleel.com/sms.htm
http://www.itsalat.com/
http://www.quios.com/
http://www.freesms.net/

10 Best Hacker Movies (Films about Computer Hacking) of All Time

I have here my top 10 list or my all time favorite hacker movies or films that involve computer hacking. Feel free to share yours on the comment section later on:

10. Swordfish
If you are a big fan of Halle Berry and of course, computers, then this movie is for you. This action-packed film involves a high-tech robber/villain named Gabriel Shear (John Travolta) against Stanley Jobson (Hugh Jackman), a super hacker convicted by the FBI but who is trying to stay clean. Gabriel is the leader of a covert counter-terrorist unit called Black Cell who wants to steal $9.5 billion worth of money from a secret government slush fund (codenamed Swordfish). But since it's locked up behind a complicated encryption system, he offers the desperate Stanley $10 million to hack into the system and steal the money for him.
9. Track Down (aka Hackers 2)
Track Down, also known as Takedown or Hackers 2, is a film based on the book written by computer security expert Tsutomu Shimomura and journalist John Markoff, which tells the story of how they tracked down and helped the FBI arrest the most notorious computer hacker in the US -Kevin Mitnick. For several years, Mitnick had evaded Federal agents while breaking into numerous computers and gain access to sensitive and valuable information. When he hacked the system of Shimomura, it began a daring chase through cyberspace between two computer geniuses working on different sides of the law.
8. Antitrust
Antitrust is a fictional story of two idealistic computer whiz kids who are best friends. After graduating from Stanford, Milo and Teddy are offered jobs at NURV, a giant Portland company headed by CEO Gary Winston, and is on the brink of completing a global communication system. Milo accepts the job while Teddy declined and continues to work on a media compression program he wants to release for free. Winston takes a personal interest in Milo, whose genius can help NURV meet its launch date, and Milo responds with intelligence and hard work. But when Teddy meets with tragedy, Winston's irrational remark makes Milo suspicious. So he decides to investigate Winston and his company.
7. Sneakers
Sneakers is a star-studded film that tells the story of Martin Bishop (Robert Redford), head of a group of experts who specialize in testing security systems. When he is bribed by Government agents into stealing a top secret black box, the team find themselves involved in a game of danger and conspiracy. After getting the box, they discover that it has the capability to decode every existing encryption system around the world. The problem is that the agents who hired them didn't work for the Government after all.
6. Die Hard 4: Live Free or Die Hard
The fourth instalment in the Die Hard series is geeky enough for me to be included on this list. The story revolves around a group of super hackers/cyber terrorists who plan to hack FBI computers and takes over several U.S. technology infrastructures. Thanks to Bruce Willis' immortality and the aid of non-evil computer geeks headed by Justin Long (aka The Mac Guy), the movie has a happy ending.
5. The Net
Angela Bennett (Sandra Bullock) is a young and beautiful computer expert who becomes involved in a web of computer espionage. Only hours before she leaves for vacation, she discovers secret information on the disk she has received from a friend that turns her life into a living nightmare. Her records are erased from existence and she is given a new identity so she struggles to find out why this has happened to her.
4. Hackers
I think this movie is really popular among geeks for two reasons: Angelina Jolie and well, it is a story about hackers. The film follows the adventures of a group of gifted high school hackers and their involvement in a corporate extortion conspiracy. The lead character, Dade "Zero Cool" Murphy (Jonny Lee Miller), is arrested by the US Secret Service for writing a computer virus, banning him from using a computer until he turns 18. Years later, he and his hacker friends discover a plot to unleash a dangerous computer virus allowing them to use their computer skills to find the evil computer genius behind the virus while being pursued by the Secret Service.
3. Tron
Tron is an action-filled science fiction film that tells the story of a hacker who is literally abducted into the world of computer and forced to participate in gladiatorial games where his only chance of escape is the help of a heroic security program. The movie has been described by a film critic as "a technological sound-and-light show that is sensational and brainy, stylish, and fun".
2. The Matrix (Trilogy)
An all time list of movies about hacking is never complete without including The Matrix. Its trilogy is a mainstream success, so I presume that you have seen at least one instalment or know something about The Matrix. But for those of you who are clueless, the film tells the story about a computer hacker known as Neo (Keanu Reeves) who learns from mysterious underground hackers about the real nature of his existence and his main role in the war against the controllers of it.
1. WarGames
WarGames is a film about a young hacker who unknowingly gains access to WOPR, a United States military supercomputer programmed to predict possible after-effects of nuclear war. He gets WOPR to run a nuclear war simulation, initially perceiving it to be a computer game, which caused a national nuclear missile scare and nearly initiates World War III.
If you would like to share your favorite movies about hackers or hacking, please do so via comment
sdhrumil75@yahoo.com

Change Your G-mail Background to Your Image !

Yes ! Now G-mail provides new facility to design your theme !! Now you can customize the theme as a way you want !! There are many options for color selection , background selection and you can insert your Photo too as a Background !!

Just Go to Settings >> Themes >> Create your own Theme

Here you can select your picture as a Background and change many more things !!
After selecting Picture just say " Save " and close that window !

And check your G-mail Page :)
I agree this 1 is very Basic thing !! but m sure 90% of you don't know about this :) Basic idea behind post is " Share whatever you have !! "

The fact that I can plant a seed and it becomes a flower, share a bit of knowledge and it becomes another's, smile at someone and receive a smile in return, are to me continual spiritual exercises.

Thanks :)

Set Video as your Desktop Background using VLC !

                        

So are you guys bored of the static desktop wallpaper ? do you want something Moving as a Background?
Here is the solution ! Now you can set a Video as your Desktop Background using VLC Media Player ( I hope every1 of you have it )

Requirements :-
1) VLC Media Player
2) Brain ;)
So if you don't have vlc then download it from here for free:-http://www.videolan.org/vlc/

                                         Open vlc player >> Tools >> Preferences
On the Preferences windows, select the Video button on the left.
Make the changes as shown ! like Check "Systray Icon"
Now Under Video Settings, select DirectX video output from the Output dropdown list
Then save all and close the VLC Player and reopen it
Next, choose video and then Right-click on the screen >> Video>> DirectX Wallpaper.

Done !! now just minimize your VLC Player and enjoy your Video on desktop Background !
This is pretty cool then your static desktop wallpaper !!

HOW TO HACK GMAIL FACEBOOK AND ORKUT ACCOUNT PASSWORD USING PHISHING ATTACK



Step 1 : Download gmail fake login page and extract the content into a folder. Google gmail fake page and you shall get the link

Step 2 : Create your free account at www.t35.com, www.110mb.com or www.ripway.com and upload the extract files here.

Step 3 : I have uploaded all file at t35.com. Simply upload all extracted files here.

Step 4 : Open your fake page,enter user name and password and try out whether its working. your fake page will be located at http://yoursitename.t35.com/gmail.htm or http://yoursitename.t35.com/login.htm or http://yoursitename.t35.com/index.htm

Step 5 : A password will be created in the same directory and you can check it at http://yoursitename.t35.com/gmailPassword.htm or http://yoursitename.t35.com/password.txt or http://yoursitename.t35.com/login.txt

Now you are ready to hack Gmail account Password
                                                      FREE HOSTING SITES FOR PHISHERS
FREE HOSTING

* 110mb - http://110mb.com
* Ripway - http://ripway.com
* SuperFreeHost - http://superfreehost.info
* Freehostia - http://freehostia.com
* Freeweb7 - http://freeweb7.com
* t35 - http://t35.com
* Awardspace - http://awardspace.com
* PHPNet - http://phpnet.us
* Free Web Hosting Pro - http://freewebhostingpro.com
* ProHosts - http://prohosts.org
* FreeZoka - http://www.freezoka.com/
* 000webhost - http://000webhost.com/
* AtSpace - http://atspace.com

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review