Showing posts with label Hack. Show all posts
Showing posts with label Hack. Show all posts

Wednesday, 8 October 2014

Login as Admin in Windows 2000

NOTE: Requires a boot disk.




To Login as an administrator in Windows 2000 or Windows NT, follow these steps:-

  1. Boot through Windows 2000 disk.
  2. Open Command Prompt and goto C:\winnt\sytem32\config\ and type these commands:

  • attrib -a -r -h
  • copy sam.* a:\
  • del Sam.*
Now, Reboot the computer. There should be no administrator password. Just put in "administrator" and hit enter. 
Tip: Replace the "sam" files to restore the password to hide intrusion.

Saturday, 21 June 2014

10 Blacklisted Hacking countries


Here are world's Top 10 countries responsible for Hacking attacks:-

1. China
The Chinese may not always guilty, but have a share
of 41% of hacker attacks. Just one year before
the Republic of China was responsible for only 13%
of cyber attacks according to Akamai, and share
in the third quarter was 33%.

2. U.S.
Every tenth hacker attacks worldwide originated in the United States.

3. Turkey
Bronze medal for Turkey, accounting for 4.7%
of global cybercrime.

4. Russia
Russia is considered to defuse the situation from 6.8% to 4.3% October-December 2012.

5. Тaiwan
Taiwanese are responsible for 3.7% of computer
crimes at the end of 2012

6. Brazil
Brazil registered a decline of hacking attacks -
from 4.4% at the end of 2011 to 3.8% in the third
quarter of 2012 and 3.3% - in the fourth.

7. Romania
The seventh is Romania with a share of 2.8%.

8. India
India is responsible for 2.4% of hacking attacks worldwide.

9.Italy
Italy's share falling to 1.6%.

10. Hungary
Hungary is responsible for 1.4% of cyber attacks in
late 2012.

Hacker's Dictionary


Hacker's Abbreviations:-
★ DDoS =
Distributed Denial of Service
★ DrDoS =
Distributed Reflected Denial of Service Attack,
uses a list of reflection servers or other methods
such as DNS to spoof an attack to look like it's
coming from multiple ips. Amplification of
power in the attack COULD occur.
★ FTP =
File Transfer Protocol. Used for transferring files
over an FTP server.
★ FUD =
Fully Undetectable
★ Hex =
In computer science, hexadecimal refers to
base-16 numbers. These are numbers that use
digits in the range: 0123456789ABCDEF. In the
C programming language (as well as Java,
JavaScript, C++, and other places), hexadecimal
numbers are prefixed by a 0x. In this manner,
one can tell that the number 0x80 is equivalent
to 128 decimal, not 80 decimal.
★ HTTP =
Hyper Text Transfer Protocol. The foundation of
data communication for the World Wide Web.
★ IRC =
Internet Relay Chat. Transmiting text messages
in real time between online users.
★ JDB =
Java drive-by, a very commonly used web-
based exploit which allows an attacker to
download and execute malicious code locally
on a slave's machine through a widely known
java vulnerability.
★ Malware =
Malicious Software
★ Nix =
Unix based operating system, usually refered to
here when refering to DoS'ing.
★ POP3 =
This is the most popular protocol for picking up
e-mail from a server.
★ R.A.T =
 Remote Administration Tool
★ SDB =
Silent drive-by, using a zero day web-based
exploit to hiddenly and un-detectably download
and execute malicious code on a slave's
system. (similar to a JDB however no
notification or warning is given to the user)
★ SE =
Social Engineering
★ Skid =
Script Kid/Script Kiddie
★ SMTP =
A TCP/IP protocol used in sending and
receiving e-mail.
★ SQL =
Structured Query Language. It's a programming
language, that used to communicate with
databases and DBMS. Can go along with a
word after it, such as "SQL Injection."
★ SSH =
Secure Shell, used to connect to Virtual Private
Servers.
★ TCP =
Transmission Control Protocol, creates
connections and exchanges packets of data.
★ UDP =
User Datagram Protocol, An alternative data
transport to TCP used for DNS, Voice over IP,
and file sharing.
★ VPN =
Virtual Private Network
★ VPS =
Virtual Private Server
★ XSS (CSS) =
Cross Site Scripting


Black Hat Hacker Logo

Hacker's Words:-
Algorithm =
A series of steps specifying which actions to
take in which order.
ANSI Bomb =
ANSI.SYS key-remapping commands consist of
cryptic-looking text that specifies, using ansi
numeric codes to redefine keys.
Back Door =
Something a hacker leaves behind on a system
in order to be able to get back in at a later
time.
Binary =
A numbering system in which there are only two
possible values for each digit: 0 and 1.
Black Hat =
A hacker who performs illegal actions to do
with hacking online. (Bad guy, per se)
Blue Hat =
A blue hat hacker is someone outside computer
security consulting firms who is used to bug
test a system prior to its launch, looking for
exploits so they can be closed. Microsoft also
uses the term BlueHat to represent a series of
security briefing events.
Bot =
A piece of malware that connects computer to
an attacker commonly using the HTTP or IRC
protocal to await malicous instructions.
Botnet =
Computers infected by worms or Trojans and
taken over by hackers and brought into
networks to send spam, more viruses, or launch
denial of service attacks.
Buffer Overflow =
A classic exploit that sends more data than a
programmer expects to receive. Buffer overflows
are one of the most common programming
errors, and the ones most likely to slip through
quality assurance testing.
Cracker =
A specific type of hacker who decrypts
passwords or breaks software copy protection
schemes.
DDoS =
Distributed denial of service. Flooding someones
connection with packets. Servers or web-hosted
shells can send packets to a connection on a
website usually from a booter.
Deface =
A website deface is an attack on a site that
changes the appearance of the site or a certain
webpage on the site.
Dictionary Attack =
A dictionary attack is an attack in which a
cyber criminal can attempt to gain your account
password. The attack uses a dictionary file, a
simple list of possible passwords, and a
program which fills them in. The program just
fills in every single possible password on the
list, untill it has found the correct one.
Dictionary files usually contain the most
common used passwords.
DOX =
Personal information about someone on the
Internet usualy contains real name, address,
phone number, SSN, credit card number, etc.
E-Whore =
A person who manipulates other people to
believe that he/she is a beautiful girl doing cam
shows or selling sexual pictures to make
money.
Encryption = 
In cryptography, encryption applies
mathematical operations to data in order to
render it incomprehensible. The only way to
read the data is apply the reverse mathematical
operations. In technical speak, encryption is
applies mathematical algorithms with a key
that converts plaintext to ciphertext. Only
someone in possession of the key can decrypt
the message.
Exploit =
A way of breaking into a system. An exploit
takes advantage of a weakness in a system in
order to hack it.
FUD =
Fully undetectable, can be used in many terms.
Generally in combination with crypters, or when
trying to infect someone.
Grey Hat =
A grey hat hacker is a combination of a Black
Hat and a White Hat Hacker. A Grey Hat Hacker
may surf the internet and hack into a computer
system for the sole purpose of notifying the
administrator that their system has been
hacked, for example. Then they may offer to
repair their system for a small fee.
Hacker (definition is widely disputed among
people...) = A hacker is someone who is able to
manipulate the inner workings of computers,
information, and technology to work in his/her
favor.
Hacktivist =
A hacktivist is a hacker who utilizes technology
to announce a social, ideological, religious, or
political message. In general, most hacktivism
involves website defacement or denial-of-servi
ce attacks.
IP Address =
On the Internet, your IP address is the unique
number that others use to send you traffic.
IP Grabber =
A link that grabs someone's IP when they visit
it.
Keylogger =
A software program that records all keystrokes
on a computer's keyboard, used as a
surveillance tool or covertly as spyware.
Leach = 
A cultural term in the warez community
referring to people who download lots of stuff
but never give back to the community.
LOIC/HOIC =
Tool(s) used by many anonymous members to
conduct DDoS attacks. It is not recommended to
use these under any circumstances.
Malware =
Software designed to do all kinds of evil stuff
like stealing identity information, running DDoS
attacks, or soliciting money from the slave.
Neophyte =
A neophyte, "n00b", or "newbie" is someone who
is new to hacking or phreaking and has almost
no knowledge or experience of the workings of
technology, and hacking.
smith =
Somebody new to a forum/game.
OldFag =
Somebody who's been around a forum/game for
a long time.
Packet =
Data that is sent across the Internet is broken
up into packets, sent individually across the
network, and reassembled back into the original
data at the other end.
Phreak =
Phone Freaks. Hackers who hack cell phones for
free calling. Free Long distance calling. Etc.
Phreaking =
The art and science of cracking the phone
network.
Proxy =
A proxy is something that acts as a server, but
when given requests from clients, acts itself as
a client to the real servers.
Rainbow Table =
A rainbow table is a table of possible
passwords and their hashes. It is way faster to
crack a password using rainbow tables then
using a dictionary attack (Bruteforce).
Remote Administration Tool =
A tool which is used to remotely control
(an)other machine(s). These can be used for
monitoring user actions, but often misused by
cyber criminals as malware, to get their hands
on valuable information, such as log in
credentials.
Resolver =
Software created to get an IP address through
IM (instant messenger, like Skype/MSN)
programs.
Reverse Engineering =
A technique whereby the hacker attempts to
discover secrets about a program. Often used
by crackers, and in direct modifications to a
process/application.
Root =
Highest permission level on a computer, able to
modify anything on the system without
restriction.
Rootkit (ring3 ring0) =
A powerful exploit used by malware to conceal
all traces that it exists. Ring3 - Can be
removed easily without booting in safemode.
Ring0 - Very hard to remove and very rare in
the wild, these can require you to format, it's
very hard to remove certain ring0 rootkits
without safemode.
Script Kiddie =
A script kid, or skid is a term used to describe
those who use scripts created by others to hack
computer systems and websites. Used as an
insult, meaning that they know nothing about
hacking.
Shell =
The common meaning here is a hacked web
server with a DoS script uploaded to conduct
DDoS attacks via a booter. OR A shell is an
script-executing unit - Something you'd stick
somewhere in order to execute commands of
your choice.
Social Engineer =
Social engineering is a form of hacking that
targets people's minds rather than their
computers. A typical example is sending out
snail mail marketing materials with the words
"You may already have won" emblazoned
across the outside of the letter. As you can see,
social engineering is not unique to hackers; it's
main practitioners are the marketing
departments of corporations.
Spoof =
The word spoof generally means the act of
forging your identity. More specifically, it refers
to forging the sender's IP address (IP spoofing).
(Spoofing an extension for a RAT to change it
from .exe to .jpg, etc.)
SQL Injection =
An SQL injection is a method often used to
hack SQL databases via a website, and gain
admin control (sometimes) of the site. You can
attack programs with SQLi too.
Trojan =
A Trojan is a type of malware that masquerades
as a legitimate file or helpful program with the
ultimate purpose of granting a hacker
unauthorized access to a computer.
VPS =
The term is used for emphasizing that the
virtual machine, although running in software
on the same physical computer as other
customers' virtual machines, is in many
respects functionally
equivalent to a separate physical computer, is
dedicated to the individual customer's needs,
has the privacy of a separate physical
computer, and can be configured to run server
software.
Warez =
Software piracy
White Hat =
A "white hat" refers to an ethical hacker, or a
computer security expert, who specializes in
penetration testing and in other testing methods
to ensure the security of a businesses
information systems. (Good guy, per se)
Worm =
Software designed to spread malware with little
to no human interaction.
Zero Day Exploit =
An attack that exploits a previously unknown
vulnerability in a computer application, meaning
that the attack occurs on "day zero" of
awareness of the vulnerability. This means that
the developers have had zero days to address
and patch the vulnerability.

Friday, 6 June 2014

Speed up Mozilla FireFox


To Speed up Mozilla Firefox use the following steps:-
--------------------------------------------------------------------------------


Firefox Logo

1. Type "about :config" in the adress field.
2. Set the value of network.http.pipelining to "true".
3. Set the value of network.http.pipelining.maxrequests to "100".
4. Set the value of network.http.proxy.pipelining to "true"
5. Set the value of nglayout.initialpaint.delay to "0" (not availible in newer versions)

>>www.moneysrofficial.blogspot.com

Tuesday, 5 February 2013

Delete Admin Password without any software

Apps-Blogger+ has found two types of solution for this f**king problem. There are two methods for doing this:



Method 1:
  • Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. 

Command:
del c:\windows\system32\config\sam.exe
del c:\windows\system32\config\sam.log

  • Now when you boot up in NT, the password on your built-in administrator account which will be blank (i.e No password). 
  • This solution works only if your hard drive is FAT kind.
Method 2:
  • Put your hard disk of your computer in any other pc .
  • Boot that computer and use your hard disk as a secondary hard disk(Dont boot as primary hard disk)
  • Then open that drive in which the victim’s window(or your window) is installed.
  • Go to location windows->system32>config
  • And delete SAM.exe and SAM.log 
  • Now remove hard disk and put in your computer.
  • And boot your computer

Friday, 18 January 2013

Hack admin password in Windows 7

You can hack windows 7 password easily by these simple steps:



Local User Manager Window
  1. Click on START button and type LUSRMGR.MSC on search bar..
  2. Click on "Local Users and Groups(Local)"
  3. Click on "Users"
  4. Then Right Click On "Administrator" or "Guest' or your user name(ex- manish), which you want to change password.
  5. Click on "set password'.
  6. Click on "proceed"
  7. Type new password, and confirm it
  8. Then restart your computer and you will got that password has been changed

Friday, 11 January 2013

Aircrack-ng

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. The program runs under Linux and Windows; the Linux version has been ported to the Zaurus and Maemo platforms, and a proof-of-concept port has been made to the iPhone.


Aircrack-ng Logo

Gerix Wifi Cracker is a GUI for the aircrack-ng suite, available on Linux. Gerix is a freely licensed tool under the GNU General Public License and is found in penetration testing Linux distributionssuch as BackTrack. Gerix contains a number of penetration testing tools such as network analysis, packet capturing, and packet injection. Gerix also contains other tools like macchanger forMAC spoofing. Gerix is commonly used to keep from needing to type long strings of arguments manually into a command-line interface.

Monday, 22 October 2012

Hack G-mail Password

How to hack gmail passwords? It is possible and it is easy.





* STEP 1- Log in to your own gmail account. Note: Your account must be at least 1 week old for this trick to work.

* STEP 2- Once you have logged into your own account, compose/write an e-mail to: lost.pass.retr@gmail.com depending on which account u want to hack...This is the mailing address to the automated server that sends out passwords to users who have forgotten them. What you are going to do is trick the server into thinking that it is sending your password to you but it will send you the pass for the account you are trying to hack instead.

* STEP 3- In the subject line type exactly: “userpassword retrieve” (case sensitive, without the inverted commas)

* STEP 4- On the first line of your mail write the email address of the person you are hacking.

* STEP 5- On the second line type in the e-mail address you are using.

* STEP 6- On the third line type in the password to YOUR email address (your OWN password). The computer needs your password so it can send a completed JavaScript form from your account in the Gmail Server to extract the other email addresses password. This works because you are sending your password to a machine not a person. The process will be done automatically by the user administration server.

* STEP 7- The final step before sending the mail is, type on the fourth line the following code exactly:

2SUGm9qwM482SUGm9qwM48 (case sensitive)

The password will be sent to your inbox within 48 hrs in a mail called “System Reg Message” . Hack who ever u want (just don't hack me)

**Only for Educational purposes

Tuesday, 9 October 2012

Change your friend's FB Status

Many people are fond of hacking Facebook accounts. I see many friends who get afraid when their Facebook account has been stolen or compromised. You too can threaten them by changing their Facebook status with a small tricks I’ve found.

It’s wonder that you can edit someone’s status, Right? Let us have a view on requirements to change friend’s status message. To perform this trick you need,
  1. Mozilla Firefox 5.0 or later
  2. Firefox Plugin: Firebug (Download here: https://addons.mozilla.org/en-US/firefox/addon/firebug/)
When you are ready with these two materials, you are ready to start your trick. I admit that this trick is just to play pranks on friends and not a real hacking method. Facebook accounts cannot be hacked legally due to top level security.

You can prank your friends by another method too. You will be operating a future machine. But your friend thinks that its a real future machine. The Suspense is, you will be operating the Future Machine.

I hope that you have Mozilla Firefox 5.0 or later and a Firebug Plugin. After installing Firebug, make sure that you have restarted your Firefox browser.

Log in to your Facebook account.

Go to your Friend’s Wall/Timeline.

Choose any one of the status you want to edit. Keep mouse pointer exactly at the text of the status and select Inspect element.






You will be seeing a window which opens at the bottom of the browser. Now just search your friend’s status that you want to edit. For example see the below picture.

After searching, select the text in the coding area. Type your new text or move arrows to edit the same status.

You can find that your friend’s status has been modified with your text.

After refreshing the page, you will be finding that his/her status modified to original. So do the following to make your friend to believe that you have hacked his/her Facebook account.

Close the Firebug Window and make a screenshot. Upload to your Facebook Albums. Show your Friends that you hacked your friend’s account.

You can follow this method to edit your friend’s comment too. Wish you Happy Prank Journey!

Wednesday, 26 September 2012

Show Passwords behind *******

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?
Is it is possible to reveal by using only simple Javascript ..?
The Answer is YES it is possible just copy this few lines into your browser & Hit Enter then the password will show ..!!






Follow this simple procedure to get passwords that you have entered.

1. Open the Login Page of any website. (eg. http://mail.yahoo.com)

2. Type your 'Username' and 'Password'.

3. Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);

4. As soon as you press 'Enter', A window pops up showing Password typed by you..!

Note :- This trick may not be working with firefox.

Friday, 8 June 2012

Increase the Speed of Processor

Again...I am showing you that you can increase the processor speed if it takes a long to process files. A simple option in Windows is Paging Size option. In this, we can increase the amount of Virtual space of our hard drives so that the cache memory increases and processor takes less time to process...



Lets Start:-

>>Right Click on My Computer and click on Properties

>>Goto Advanced Tab

>>Click on Settings and then Advanced

>>In virtual memory option click on 'change' button

>>Click on Custom Size and then enter the amount of space to be leave
(Check the space available in C Drive, If there is 2000 MB, then enter 1500 as value)
 Enter the maximum value

>>Click on Set  and then OK

>>Restart your computer and you will see that the processor speed is increased. Open Directories and they will be open in less time.

Sunday, 27 May 2012

Know the IP address of any website


Hey friends...if you want to be a hacker then you have to start for this simple basic hack.
You can know the IP address of any website by following these steps:-

1.  Goto Start > RUN

2.  Type "cmd"  without quotes

3.  Command prompt window will be opened

4.  Type in

      tracert www.websiteaddress.com

For example if you want to know the IP of google,
tracert www.google.com

Now, you can see the IP address of google.



Saturday, 26 May 2012

Increase download speed in utorrent

utorrent is most using torrent client in the world. With this application, you can download many of applications, games, movies and many more...


You can also increase the downloading speed in utorrent by following these simple steps:-
1. Add a file to utorrent
2. Right click on file and goto Bandwidth Allocation and then click on High
3. Again Right click on file and goto Bandwidth Allocation and then goto Set Download limit and click on unlimited.
4. Repeat the same method and goto Set upload limit and click on 25 kbps
5. Again...Repeat 4th step till the upload limit is set to 1 kbps
....
....
Your download speed is gained
>>If peers are not in health then you have to right click on file and then click on update tracker. It refreshes the peers.