Tuesday, July 31, 2012
A New Hack FRO Auctions in EBAY
SQLI Helper Tutorial - A Must Read Article
You can download the SQLi Helper from Here.
It should look this this:
Now the First Step is to give the Target site like http://targethost.com/expoit.php?id=1 (Note: This is not the real site). After you give the target site click on the Inject button.
And then click on the Get Database Button.
Now the following Information will be available about the Host:
Now to take the attack forward choose a Database from the Database Name column and click on the Get Table button.
Now we Have the names of the Tables. Now we need to know the Columns of the Tables which contain sensitive information. For that we will choose the Table admininfo to get columns.
To get Columns select the Table and click on the Get Column Button.
Now we have the Names of the Columns shown below:
Now select the one which seems important and click on the Dump Now Button.
And then a New Windows will open that will Dump the Data that is in those Columns. Like Show Below:
After we have got this Sensitive Information, we can use online MD5 cracker to crack the Password Hash and access the Website with Administrative Privilege.
3 Ways To Choose A WPA Key That’s Difficult To Hack
1. Avoid Dictionary Words
Most Wi-Fi hackers get in with a brute force attack. A brute force attack tries random commonly used words and phrases together over and over until it finds the password. If you use simple dictionary words to secure your Wi-Fi than it isn’t a Question of if a hacker can get in but rather when.
2. Use Random Capitalization
Since most things are case sensitive getting into the habit of a capitalization pattern goes a long way to creating an unhackable network key. For example, On AnD oFf capitalization is one way to almost guarantee they wont be able to gain access without permission.
3. Double Up Numbers
Using numbers and letters is another great basic tip but a truly random string of numbers is hard to remember but using something like a birthday leaves you vulnerable to anyone who knows personal info about you. One happy medium is to double or triple up numbers. For example, if your birthday is 12/10/1980 than instead of using 12101980 as part of the password use 1212101019801980 it will be far harder to guess and super easy to remember.
How to hack a computer with Nmap and Metasploit
10 Best Yahoo! Messenger Tricks and Hacks
Yahoo! Messenger is an instant messaging program which is compatible with all Windows versions. While instant messaging is the focus of Yahoo! Messenger, there are several special tricks that can enhance the user experience.
1. Find invisible
Want to find out someone who’s hiding from you? You can easily do so by going to Yahoo! Invisible Checker. All you need to do is type in the Yahoo! ID and the particular users status will be revealed.
2. Invisible nickname on
Just go to edit profile and in the nick name type a (space character) on it just press Alt 0160 ( or ALT+255 ) and save it.
Now go to any Yahoo!
3. Run Multiple Instances of Yahoo! Messenger on same system
Some of you might be having more than one Yahoo! ID would like to log in simultaneously. Here is an easy way to do it without installing any sort of software. You just have to edit the registry and voila there you go. Follow the instructions below:
- Download the following -multiyahoo.reg and save it to your hard disk.
- Double click on it.
- The above dialog will popup, click ‘Yes’
- Start the yahoo messenger login with your first ID. Then again start another yahoo messenger by clicking on the messenger icon and log in with your second ID.This tweak works with all versions of Yahoo Messengers.
4. Removing Ads from your Yahoo! Messenger
If you are using Yahoo! Messenger 8.0, then you can disable ads by following the below steps:
- First close the Yahoo! Messenger.
- Save this .bat file and execute it. (Note: You won’t be able to enter the chat rooms if you use this patch.)
The above fix doesn’t work for Yahoo! Messenger 9 Beta. Here’s a way to disable the ads in Yahoo! Messenger 9:
- Make sure the Yahoo! Messenger isn’t running, if it is then just close it.
- Now
backup the following file C:\ProgramFiles \Yahoo!\Messenger\Yahoo!Messenger.exe (create a new copy) - Download HxD hex editor.
- Open C:\Program Files\Yahoo!\Messenger\Yahoo!Messenger.exe in the hex editor
- Now go to the offset 295928 (in HxD: Search/GoTo)
- Look at the right column and replace y from “y.m.s.g.r.a.d.s” with p
- Save the file and close HxD.
If nothing works try launching this file.
5. Yahoo! Smiley Codes
You can make use of all smileys including hidden ones in your messenger by using YEmotePLUS plugin.
6. Creating Custom Profiles for Chat
You can create custom profiles with different name,
7. Change the Yahoo! Messenger Title Bar
You can change the text that appears at the very top of the Yahoo! messenger window by editing the ymsgr.ini file.
1. Go to Program Files\Yahoo!\ and open ymsgr.ini.
2. Then at the end, type this:
[APP TITLE]
caption=YOUR TEXT
3. Change YOUR TEXT to whatever you want it to say. Then save the file and close messenger. When you restart messenger you will see your new message.
8. Online Status Changer and Manager
HyperIM is currently the best status changer & manager for Yahoo! messenger available at present.
9. Access Yahoo! Messenger Chat archives while offline
You can access your Yahoo! chat logs using Yahoo! Message Archive Decoder. It reads Yahoo! Messenger archive files (.dat files) and presents them in a format that you can read. It decodes the message archive without logging in (offline mode and no
10. Retrieve Yahoo! Messenger Display pictures
Y! Display Pic will retrieve Yahoo! users even if they are offline or invisible.
How To Find Hidden Web Pages - URL Cracking
URL cracking is a useful technique that anyone can apply but is often overlooked by web surfers content to trust the information they see on the page in front of them. URL cracking is a technique in which a searcher pre-empts, alters and guesses URL's that are likely to appear within a site in order to turn up hidden or ostensibly inaccessible pages.
As an example of how this technique can work let's assume you have reached the front page of a site that covers a topic you are interested in but all the page says is:
"Welcome to John's Computer Site.
This site is under construction, please check back soon".
Not very helpful and there are no links on the page.
The 'under construction' part serves as a clue. It means that it is likely that John has already prepared some pages for his site. Maybe he's uploaded them already but hasn't put any links on the front page yet.
With a little URL
Here's how:
Let's say John's Computer Site front page has the (fictional) URL:
http://www.somewhere.com/on/jsmith/index.html
What if we replaced the index.html part of the URL with another page name, maybe computers.html or pc.html, etc. you can continue doing this until you find something, get bored or are satisfied that there is nothing there. This is not an exact science but can turn up some tasty treats given the right circumstances.
One of the best
http://www.somewhere.com/on/jsmith/gallery05.html
It is a relatively safe bet that there are at least 4 other 'gallery' pages (gallery01.html, gallery02.html, gallery03.html and gallery04.html) and possibly more.
URL Cracking, although not well recognised or used can be a useful weapon in the searcher's arsenal and you may just stumble on that hidden gem using this technique. On the down side it can be time consuming and frustrating, the best plan of action is to use URL cracking after other your primary
Monday, July 30, 2012
How To Send a Self Deleting SMS
Basically this technique is called SAFE-TEXT. It's a technique where a message destroys itself after being read. If you want to call it the Data-centric Suicide Message, that's fine too. This is a website that allows you to send such type of sms for free of cost after registering on it. But it has limitation that you can send only 10 SMS a day.
So here's the thing. With Wikileaks on one side and British libel law on the other, there's room for a tool that lets you say what needs to be said, but without it falling into the wrong hands in the process.
What it does is allow you to send an expletive-laden opinion of your boss to a co-worker, or an it's-in-the-public's-interest-to-know-this leak to your friend on the Guardian (or Wired), without it having a chance to be read by said boss, or unsaid MP.
Note: This trick should only work for British mobile network operators.
Here’s how to use it:
1. To register and activate, text WIRED to 83118 (charged at your standard network rate). You’ll be able to send up to 10 messages daily.
2. If you’re the sender, the message will show your name and number.
Write your libel-ridden hate speech and hit send.
3.The receiver will then be sent a text telling them they have been sent a Wired Safe Text with a link to the mobile internet site that hosts your message.
4. When they click through they will activate Safe Text. They will only have a few seconds to read the text (so don’t make it too long) before it self-destructs.
Free Premium Accounts for 13 Download Sites - Download Music, Movies, Games, Software and Much More
Best Download Sites - Get full version
In this article i will share a list of usernames and passwords of the premium accounts for Best download sites. All of the accounts are working 100%.
Here is the list:
1. www.butterflydownloadnetwork.com (Download Movies, Music, PC Games, Shows)
Username : cinemanetwork20
Password : butterfly20
2. www.downloadprofessional.com (Software, Movies, Music, TV Shows,
Username : lo886Ees
Password : zAgt88er
3. www.divxcrawler.com (Direct Download Movies, Software and Music Videos)
Username : divx273
Password : 8342729
4. www.sharingzone.net (Games, Software, Movies, TV shows, Music and more)
Username : LODMQYHX
Password : 375021402
Receipt : 4T5W89RD
5. www.watchdirect.tv (Reality TV Shows, Comedy, Old Television Shows,
Username : cinemanetwork20
Password : butterfly20
6. www.unlimitedgamedownloads.com (Download all the latest Games, PSP Softwares...)
Username : ga20me
Password : ke01feb
7. www.fullreleasez.com (Full version games, software, movies, music, tv shows...)
Username : Af872HskL
Password : XjsdH28N
8. www.fulldownloads.us (Everything you need)
Username : Af872HskL
Password : XjsdH28N
9. www.pirateaccess.com (Applications, Games, Movies, MP3s, TV, eBooks, Security/Hacking,
Username : yourfrienddalat@gmail.com
Password : CHh5LKPI
Username : xxx_heel_xxx@yahoo.com
Password : MJY0BUY
Username : i_l0ve_u_786@yahoo.com
Password : rYvLgPrt
Username : mubashar_siddique@yahoo.com
Password : F9Gzgwb5
10. www.alphaload.com (Signing up with iLoad comes with a great service, fair prices and an awesome software, which are offered for free for all customers)
Username : AL3429352
Password : ykbcKTNS
Username : AL3429355
Password : RCHAbhKM
Username : AL3429350
Password : gMZNFcyS
Username : AL3429351
Password : cTAkWAxc
Username : AL3429352
Password : ykbcKTNS
11. www.gamedownloadnow.com (Unlimited Game Downloads)
Username : ga20me
Password : ke01feb
12. www.unlimiteddownloadcenter.com (Download Music, Movies & Games)
Username : cu20me
Password : ke01feb
13. www.tvadvanced.com (Online TV, Movies, Music, Games...)
Username : mv03dl
Password : frmvdl
Trojan Virus attacks: An analysis
What is a
A virus that looks like a harmless and useful program but actually contains a code that can destroy data or install adware or spyware on your computer. Trojan viruses can be embedded in email attachments, programs that have been downloaded, or even through operating system vulnerabilities on your computer.
A recent tactic that hackers are using is to put the virus in pictures. Never download anything you do not recognize. Unlike the regular computer viruses Trojans do not replicate.
What does a Trojan virus do to your computer?
Trojan viruses can do much damage to your computer or worse, hackers can read the files and personal information from your computer and steal your identity. They can also add unwanted spyware and ad ware, deliver unsolicited pop-ups and advertising, all without your consent.
So how can get rid of them?
Most if not all antivirus programs will detect and remove Trojans, viruses and other unwanted programs from your computer automatically. For e-mail attachments, you may have to scan them individually. There are programs you can download that will do it automatically. There is plenty of anti-virus software free and paid out there that can look at. Payment programs usually have more features that can be used as a registry cleaner.
Whatever your choice may be, make sure you have installed the latest version, periodically perform system
One of the most evil and insidious things ever invented was the Trojan virus. What person with dementia thought of this is beyond comprehension. Trojan virus infiltrates your entire computer system and affects its ability to quickly browse the Internet and in the worst cases can cause the entire system to crash, permanently delete data stored on your hard drive.
There are some steps you can take to the removal of Trojan viruses, to save all your data and installed software. If you take your computer to a repair
The problem with this method is that it is expensive, time consuming, and you can never recover the installed applications. Unless you have the original application software installation discs and registration number to go with it, you have to
You can also simply download a virus cleaner and run it. That will solve more problems and run the Trojan virus removal desired. If your computer crashes or can not
Sunday, July 29, 2012
Send Free Unlimited SMS to Any Country
Crack Activator Microsoft Office 2010 Plus
Microsoft Visio Professional 2010 32-Bit/64-Bit (Version Retail And VL)
Microsoft Project Professional 2010 32-Bit/64-Bit (Version Retail And VL)
Activation-Feautures:
Fully Automated Activation Process.
Automatic Notification Appears If UAC In
Server 2008 Off.At The Same Time After Clicking Yes Will Turn Off And Restart
Activation Duration Is 180 Days.Then Run It Again And It Works Without Problems.
Usage:
- Turn Off UAC,And Firewall.
- First Run The Activator With Admin Rights And Than Activate It.
Appearance Dialog Box Asking You Are You Sure That Your Running With Admin Rights.
Than Click Yes Confirm It With Yes,If You Do Not Disable The UAC Dialog Will Appear
Asking You Click Yes At The Same Time Automatically Than Restart The Computer.
After You Restart The Computer To Return The Activation Conduct As Step 2
You Can Not Read This Section If The Machine Is Switched Off UAC)
Activation Process Will Run Automatically But You Should Note The Steps
It Will Bow Out Information On Active Readers Immediately See If The Line
Is What Is License Licensed Status Means OK Also Other Letters Is Not.
If Your Computer Has Installed The Third Set Of Microsoft Office Professional Plus 2010,
Microsoft Visio 2010 Professional,Microsoft Project 2010 Professional,
Then Please Note That Three Lines Of License Status Fraud See Which
Were Activated And Which Is Not Activated.
Note:
This Step Should Only Do If You Are Using Windows 64-Bit And If You Have
Office 2010 Retail 64-Bit Installed On Your System.For The Rest You Have To Do This Step.
After Completion Of All Activated (License Licensed Status In Most States),
Then You Proceed To Load The Registry Files In The File
Name Is (fix64bit.reg) Than Open The Software Up And Check The Status Of Activation.
(Direct Download)
Free Download Microsoft's Office 15
Microsoft Excel 2007 : 10 techniques
- Written by professionals working actively in the I.T. industry, this short e-book on ms excel reveals 10 techniques which pros use
everyday . - This short e-book on ms excel is written in an easy to read
style with real examples for you to practice along. - You are bound to lift your confidence in under 25 pages of reading. Request your copy to begin learning ms excel toady.
- Click here to request your FREE copy
Get Microsoft chat support to contact Microsoft Office
- Go to Microsoft Office’s Contact Us website and choose the option that best
suits your purpose or requirement for contacting Microsoft office. Clicking the Support for Microsoft Office Products link would be likely the best option for you. - Click on the program or
suite that you have doubts with. - Also run a search through the “Hot topics” listed on the next page. This might contain the popular issues that are frequently encountered by users and might help resolving your issue.
- On the upper right corner, click on the question mark icon to contact a support professional.
- You will have to answer some simple questions that appear on the next pages to help you with your issue. Click “Next”.
- You can select any one of three options for contacting Microsoft Office: via email, telephone or online. You can get the details about each of these options in the same page. Click the links to send requests via email or online or use the telephone number listed there to place a call. Microsoft chat support team reminds you that you might be charged for calling these numbers.
Microsoft Office Hacks
I have stumbled onto a couple potential security issue in Microsoft
Following tradition I'll use Hacker and Victim as the two parties involved.Hacker will be the adversary.
1) Document collaboration spyware.
Attack Basics: Hacker sends Victim a Word document for revisions. After Victim edits, saves, and mails it back to Hacker the file will also include contents of another file(s) from Victim's computer that Hacker has specified a priori. To achieve this, Hacker embeds the INCLUDETEXT field into the document. The field results in inclusion of a specified file into the current document. Of course, Hacker must be careful include it in such a way that it does not become apparent to Victim. Hacker can do all the usual things like hidden text, small white font, etc. Alternatively (and in my opinion cleaner, she can embed the INCLUDETEXT field within a dummy IF field that always returns an empty string. In this case, the only way Victim can notice the included file is if he goes browsing through field codes.
Countermeasures: The only thing you can do now is decide how paranoid you want to be. If you must edit and send out a Word file with unknown origins, you may want to manually go through the fields. It would be nice to be able to force user confirmation (via a dialog box) for all includes. Alternatively one could write a
2) Oblivious signing
Attack Basics: Hacker and Victim wants to sign a contract saying that Hacker will pay Victim $100. Hacker types it up as a Word document and both digitally sign it. In a few days Victim comes to Hacker to collect his
money. To his
Proof of concept: Inserting the following field structure at the tail of the document will cause "Hello" to be displayed if the filename is "a.doc" and "Bye" otherwise.
{ IF { FILENAME * MERGEFORMAT { DATE } } = "a.doc" "Hello" "Bye" * MERGEFORMAT }
Update : this flaw has been fixed in office 2003 onwards but still works in office 2000 and even sometimes in 2002/03
We can consistently crash Word 2000 using the following method:
1) Open up any text/document editor such as notepad or wordpad
2) type a single word (must be a known word, no punctuation).
3) highlight the whole word and CTRL+C
4) launch word 2000
5) CTRL+V
6) press HOME to take you to the start of the line
7) type I
8) hit the space bar
This consistenly crashes Word 2000 with the following error message:
DDE Server Window: WINWORD.EXE - Application Error The instruction at "0x3076a63e" referenced memory at "0x00000000". The memory could not be "read".
Vulnerability:
remove office passwords
Vulnerable:
MS Word (Win2K/XP)
Example 1
1) Open MS Word with a new/blank page
2) Now select "Insert" >> "File" >> browse for your password protected doc & select "Insert" & "Insert" password protected doc into your new/blank doc
3) Now select "Tools" & Whey hey, voila, there's no longer an "Unprotect document" ... password vanished ...
Example 2
1) open your password protected doc in MS Word i.e. you can't edit protected fields (apparently)
2) Save as a Rich Text Format (RTF) & keep this RTF file open in MS Word (YES, keep open)
3) Whilst your new RTF file is open in MS Word, go "File open" & find your newly saved RTF file & open (YES, you DO need to do 'tis even though you already have it open)
4) If prompted to revert say YES, if not prompted stay calm. Now in your MS Word menu go & "Unprotect document", amazingly, voila, you don't get prompted for a password
Change password if ya like & or save in whatever format if ya like ...
Saturday, July 28, 2012
Track changes in Microsoft Word 2010