يتم التشغيل بواسطة Blogger.

آخر الحلقات عن الفيسبوك

آخر حلقات الويندوز

الاقسام

آخر الحلقات الحصرية

صوت وصورة

أخبار المشاهير

توقيت المغرب

رياضة عالمية

Main Post

آخر الحلقات عن الانترنت

آخر حلقات الحماية من الهاكرز

أقسام

Send Quick Massage

الاسم

بريد إلكتروني *

رسالة *

إشترك بالمدونة

الكتاب الرسميون

الدولي

آخر الحلقات عن منتجات جوجل

المشاركات الشائعة

عن الموقع

my

Visitors

الجمعة، 18 يونيو 2010

How to Hack an XBox Live Account










 



You might’ve already heard that Halo 3’s producer Joe Tung has become the latest victim of XBox Live hackers ‘loling’ on the internet. There’s a lot of rumor and speculation floating around about the security of gamers’ XBox Live accounts. Well I’m here to dish the truth. It can be pretty easy to hack into some one’s account. So below you’ll find 3 easy ways to hack into someone’s XBox Live account (and how to avoid being punked yourself).


1. Make People Give You Their Account Information

Set up a dummy website advertising free access to Microsoft points, strategy guides, and pictures of naked women. People will hand over their account information without you having to do much work.

2. Get Someone to Trade Gamertags with You

You’ll always find someone who wants to access parts of a game they haven’t beaten yet and achievements they didn’t work for. Find a group of people trading gamertags and account information. Once you join you’ll have access to multiple accounts.

3. Just Take a Wild Guess

 






Once you’ve spent time gaming with someone online you’ll notice that people naturally give away personal information. Perhaps they mention the name of the girl they’re seeing, the name of their hometown or their favorite movie. People tend to select obvious passwords. And given everyone’s tendency to use the same password for every service:

Once you get one password you’ve probably got them all. You can reek havoc on someone’s amazon, gmail, facebook, yahoo, twitter, etc

So as you can see it’s almost too easy to hack into someone’s account. You might want to protect yourself by not giving your account information away. Does this really need to be said?

Spy-Net 2.6 RAT - Full Setup Tutorial







This tutorial is written by "I Used To Make Out With" aKa Edward Butcher for Hackforums.net
If you're going to leech it credit please

Tutorial is noob friendly!






Requirements

-Win XP,vista or 7
-Spy-Net RAT v2.6
-No Ip (Dynamic DNS)
-Fud crypter/protector or hexing skills (optional)


DOWNLOAD LINK
http://www.speedyshare.com/files/2154747...utcher.rar




Warning: This tutorial is written for educational purposes ONLY!





--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
Chapter 1 - Spy Net Options
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------


I believe that 90 % of people know how to setup a No-Ip and how to Port forward a 81 Port or any other you want!
So I will skip that part.

First of all Open spynet 2.6
Msgbox will popup with options "Yes" or "No" click no
Click "START" in the upper left corner
Now go "Opciones" and "Seleccionar Idoma"


Click "English.ini"



Now everything is on English language
Now we need to put the ports we want to use
Go "Options" > "Select listening ports"
Add port 81 and click ok

Now you should see in the middle bottom corner
"Waiting for connections on port : 81"

That's it for options


--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
Chapter 2 - Setting up a server
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------


This is the most important part of tutorial
Go File and click "Create Server"

Make a new user and name it however you want
Now pick your username and click "Forward"

Connection
Delete 127.0.0.1 DNS and click "Add" and insert

yournoiphost:81
example: jeremyjackson123.no-ip.biz:81

Click OK
Fill in Identification and Password and switch to Installation

Installation
Installation directory:

System = system32 folder
windows = windows folder
etc...

Put system
Rename directory into something not so obvious like "Microsoft_KB57H43"
or any random name
Rename File name into something not so obvious again something with windows or microsoft. Make sure after that your filename is ending with .exe


Leave injection into Default browser or if you want to inject your server into any other exe then you must know the process name,
example if you want to inject it in opera browser "opera.exe'

On boot check all
Don't rename nothing and click that "Random" button" few times

Check Persistance
Check Hide File
Check Change creation date
Do whatever you want with melt

HINT: What is melt?
If you check melt this will happen = when somone opens your server it will dissapear from their pc
if you don't check melt this will happen = when somone opens your server file will stay on their pc


So pick whatever you want for melt
If you need help check the picture


Move to Message
I personally don't use that option because I like binding files and hiding them well.

HINT:What is Message?
When somone open your server they will get the fake message
(Mostly used for files that are not binded)


If you will use the fake message option make sure it's a well hidden error
like "Failed to initialize" then some famous erorr number just google some if you don't know any

You can put whatever you want, if you want.

Move on to Keylogger
Check activate keylogger
Delete backspace (it's really irritating but helpful so pick what you want i never read any logs or use keyloggers)

Send logs by FTP
Could be useful for some people, i don't use it but i'll explain how to setup it
You need FTP
A good one is drivehq google and register
Send to: http://ftp.drivehq.com
Directory:/Logs (make sure you create a folder called Logs on your ftp)
FTP User: your drivehq username
FTP Password: your drivehq password
Send each: 30 minute is just fine

Make sure to test this if you're going to use it

Move on to Anti Options
Check all and move on "Create Server"

This is the last one

Check icon if you want
Check UPX
Check P2P (Peer to peer) like Limewire,Bearshare,Mp3 Rocket etc..
rename it into something with porn or cracks or games
Hot_Porn_2009.exe#callofduty6.exe#

HINT:Make sure to leave # behind .exe! else it wont work


Check USB (infecting everything that plugs in USB of infected pc)
Check Google Chrome Passwords and click ok when prompted for http://www.server.com/sqlite3.dll
Uncheck Bind files better use some private binder or something else
Uncheck Rootkit (experienced users can check)

Need help check the picture below



Click "Create Server" and you're done!

22 Awesome Themes for Ubuntu Linux

Ubuntu Theme Murrina Triomphe
Istarted using Ubuntu 4 months back, and since then I’ve been looking for ways to customize and tweak it to make Ubuntu more productive and look good. During my search, I came across many cool themes from various sources I’d like to share with you all.



These themes are all available for free download from Gnome Art. Do try them out and let me know if you like them. If you have more cool Ubuntu themes, let me know below in the comments. one more post 60 ubuntu themes, checkout this also
I love eye candy!


Hardy Theme 2.0

Ubuntu Theme Hardy
Download

Bamboo Zen

Ubuntu Theme Bamboo Zen
Download

Lux Theme

Ubuntu Theme Lux
Download

Burnt Orange Ice

Ubuntu Theme Burnt Orange Ice
Download

Creamy

Ubuntu Theme Creamy
Download

Glow

Ubuntu Theme Glow
Download

Moomex

Ubuntu Theme Moomex
Download

Roy (Windows Royale)

Ubuntu Theme Roy
Download

Clearlooks Metallico

Ubuntu Theme Clearlooks Metalico
Download

Aqua Dreams

Ubuntu Theme Aqua Dreams
Download

Linux Mint

Ubuntu Theme Linux Mint
Download

Real Minimal

Ubuntu Theme Real Minimal
Download

Root Green

Ubuntu Theme Root Green
Download

Light Coffee

Ubuntu Theme Light Coffee
Download

Slickness Black

Ubuntu Theme Slickness Black
Download

Murrina Aero

Ubuntu Theme Murrina Aero
Download

Tigris

Ubuntu Theme Tigris
Download

Sofice

Ubuntu Theme Sofice
Download

Blue Joy

Ubuntu Theme Blue Joy
Download

Gaia Nova

Ubuntu Theme Gaia Nova
Download

Elegant Brit

Ubuntu Theme Elegant Brit
Download

Darker Ice Murrina

Ubuntu Theme Darker Ice Murrina
Download

الخميس، 17 يونيو 2010

IE6 aurora Metasploit

how to hack a pc with metasploit using the IE26 aurora attack thanx for jalal azdine for submitethis video :)

http://www.youtube.com/watch?v=CSHijXLWk0g

Sharp Ip Getter v2 - Crkd




Here is Sharp Ip Getter v2.0 Cracked by SpiderZ

bcoz Sharp Challenge with me.but he don't know about SpiderZ Power
and next time we don't accept challenge from this Noob person Sharp

Sharp Price:20$
SCTeaM Price: 0$ very cheap LOLZZ

shouts fly to SpiderZ

الأربعاء، 16 يونيو 2010

Backdoor


Just choose an icon. put the server and click make
Download

mr electroman
 

Fearz Crypter 2.2.0

Cracked by oxiD :P
This version haa: Anti-Kaspersky, Anti-Sandbox(s) (ProcessEntry, IDT base address) and anti-Soft-ICE

* All APi's Encrypted
* All Strings and integers Encrypted
* RC4 Encryption
* Ntdll Compress unit
* Anti Vmware
* Anti SandBox(s)
* Anti Debug(s)
* Anti DebuggerPresent
* Supports EOF Data (Overlay).
* Added EOF Support for first file

by mr electroman

ophcrack video tutorial

uploaded By mr electroman
http://www.youtube.com/watch?v=bdOfBkqswDI

Ophcrack - Cracker Windows Passwords

Voilà j'ai fait un tutorial assez convainquant qui pourrait en intéresser plus d'un !
En effet qui n'a jamais voulu récupérer tous les mots de passe administrateur en toute simplicité et avec une facilité et un anonymat déconcertant !

Enjoy it !

Ne marche pas avec Windows Vista !


---------------------------------------------
Tu n'es pas administrateur de ton ordinateur parce que Papa et Maman ne veulent pas ? Eux ont un compte administrateur, tu trouves pas ça juste mais tu peux rien faire parce que tu n'as pas leur mot de passe. C'est une situation courante mais heureusement un outil incroyable est arrivé: Ophcrack !Ophcrack retrouve n'importe quel mot de passe d'une session Windows de moins de 14 caractères, en quelques secondes si vous avez la plus grosse Rainbow Table (1) !


(exemple de refus de mot de passe, essaye encore XD)

Ce qu'il vous faut:

  • 1 CD vierge
  • Un logiciel de gravure (1*).
  • Environ 1H30 de téléchargement du programme [450Mo], 10 min de gravure du CD, et entre 5 à 30min de décryptage en fonction de votre machine.
Pas à pas je vais vous guider en tant qu'utilisateur lambda n'y connaissant rien à la bureautique. La première étape consiste à télécharger Ophcrack. On va télécharger une version "LiveCD". C'est quoi ce truc vous me direz ? Et bien en fait, une fois le programme téléchargé on va le graver sur un CD, qui lui-même se chargera au début du démarrage de l'ordinateur, tout simplement. Mais ne vous inquiétez pas encore de ça
Page de téléchargement Ophcrack Live CD
[ADSL 512K environ 1H30 pour télécharger les 450Mo]

C'est téléchargé ? Vous obtenez maintenant un fichier nommé "ophcrack-livecd-1.1.3.iso" on va maintenant le graver.
[Je fais juste une petite parenthèse, mais l'extension ISO signifie que c'est une "image CD" de même que d'autres normes comme CCD, NRG, BIN, IMG...]

Pour le graver ouvrez votre logiciel de gravure [moi Nero vous un autre peut-être, donc j'expliquerais pour Nero]. Dans l'écran principal de Nero Burning Room cliquer sur Ouvrir.


Naviguer dans l'explorateur puis sélectionner "ophcrack-livecd-1.2.2.iso" puis Ouvrir.



Il ne reste plus qu'à lancer la gravure et patienter.

La gravure est finie, on laisse le CD dans le lecteur et on redémarre l'ordinateur.

Là, si tout va bien le CD est détecté et avant le chargement de Windows il se charge. Vous voyez pleins de lignes en DOS qui s'affichent de partout ? C'est normal ! Patientez quelques minutes, une version bootable* de Linux se charge qui va nous permettre de scanner les fichiers SAM de Windows où sont cryptés les passswords.


Vous arrivé à un bureau, assez sobre, une fenêtre est normalement affichée avec les différents noms des Comptes Utilisateur. Il vous suffit de cliquer sur "Scan" pour que le scan commence. Un message d'erreur apparait comme quoi les tables ne sont pas chargées ? Cliquez sur Load et cherchez un dossier appelé Ophcrack, puis le sous dossier appelé 10000. Cliquez sur "Open" puis cliquez sur scan à nouveau. Voilà le scan qui débute, vous pouvez allez boire un café en attendant. L'opération peut durer de quelques secondes à une trentaine de minutes. Le mot de passe s'affiche en face de l'identifiant de la session. Notez-le bien [on a pas fait tout ça pour rien O_o !].

Puis faites un clic droit sur le bureau et choisissez d'éteindre l'ordinateur (c'est en anglais donc "Logout").

Votre PC s'éteint, retirez le CD et testé tout de suite si c'est le bon mot de passe !
*bootable signifie qu'une installation sur le disque dur n'est pas nécessaire, linux dans notre cas est chargé à partir du CD, aucun fichier n'est en théorie copié sur votre disque dur. Certains le sont mais sont effacés quand vous éteignez l'ordinateur.

Documentation :

- Site officiel (anglais) : http://ophcrack.sourceforge.net
- Brève documentation (français) : http://www.secuobs.com/news/21042006-ophcrack.shtml
- Documentation poussée (français) : http://www.objectif-securite.ch/os_labs_l.php
- Tables Set(1) (anglais) : http://www.objectif-securite.ch/ophcrack

(1): les Rainbow Table et Tables Set sont des Tables précalculées qui vont être utilisées pour décrypter les mots de passe. Certaines très imposantes en taille et complètes au niveau des caractères (!"#$% &'()*+,-./:;&<=>?@[\]^_`{|}~) sont payantes mais généralement si le mot de passe n'est composé que de lettres et chiffres la plus petite SSTIC04-10k (388MB) pré intégrée dans le LiveCD suffit largement [256Mo RAM minimum]. Si vous voulez la version plus complète SSTIC04-5k (720MB) il vous faudra 512Mo RAM et l'intégrer dans l'ISO du LiveCD à la place de celle existante grâce à un outil comme WinIso

(1*) : Il va falloir graver votre CD. Si vous n'avez pas de logiciel de gravure il en existe des gratuits et des payants. Dans la lignée des gratuits, en français et extrêmement performant je vous propose DeepBurner téléchargeable ici qui gère le format ISO dont on va avoir besoin.
Tu
La différence entre un brute force classique et ce système à Rainbow Table est le fait que toutes les combinaisons ont déjà été calculées et enregistrées dans ces tables (par des supercalculateurs je précise).
Le programme n'essaye pas les mots de passe 1 par 1 mais plutôt les chaînes précacalculées.

Bon tout ça c'est théorique, sinon je n'ai aucune idée de comment tout ça marche en réalité, c'est un preofesseur de cryptographie à Polytechnique qui l'a créé alors c'est pas n'importe qui ;-)
Pour en savoir plus sur les Rainbow Table : http://fr.wikipedia.org/wiki/Table_arc-en-ciel

-----
Problèmes connus:
* Le CD ne boot pas au démarrage. Aucun remède n'existe, celà est du à une incompatibilité du Bios ou sur les anciens ordinateurs.
-----

Comment avoir une table de scan plus importante ?

Merci a AzNKiller qui précise que La version plus complète SSTIC04-5k n'est pas payante et téléchargeable ici .

Je vais donc vous montrer comment trafiquer votre boot CD.
Mais comme l'image ISO fera plus de 800Mo, il vous faudra la graver sur DVD (-RW) !

Commencez par télécharger cette table (voir lien plus haut).
Téléchargez UltraISO 8.3 dispo sur mon FTP: http://xtremshare.free.fr/logiciels/
Installez le logiciel.

Vous faites un clic droit sur l'image ISO "normale" et vous l'ouvrez avec UltraISO. Vous devez avoir ça normalement (ne faites pas attention à WinISO, c'est un logiciel similaire)


[L'IMAGE N'EST PAS EXACTE, JE VAIS PAS RETELECHARGER OPHCRACK POUR UN SCREEN XD]

Maintenant vous allez chercher le dossier 10000 et vous allez copier TOUT ce que contient le .zip dans ce dossier en remplaçant par la même occasion l'ancienne table moins complête.

Vous allez sauvergarder avec le tout, le logiciel recréé l'image ISO.
Et vous gravez normalement le tout sur DVD!
Voilà le tour est joué ! Les tables sont renplacées par SSTIC04-5k !

Program to recover/crack SHA1, MD5 & MD4 hashes

ighashgpu v0.70.48.3
Fastest SHA1/MD5 hash cracker on ATI and NVIDIA GPUs.
World first multihash MD5 cracker for ATI.
Recovery speed on ATI HD 5970 peaks at 5600M/s MD5 hashes and 2300M/s SHA1 hashes.
nVidia GTX 260 w/ 192 SP peaks at 560M/s MD5 & 175M/s SHA1.
donwload 
http://golubev.com/files/ighashgpu_v062.zip

Ace Password Sniffer v1.4

 

Capture passwords through http, ftp, smtp, pop3, telnet
Ace Password Sniffer is able to listen on your LAN and enable network administrators or parents to capture passwords of any network user.

Ace Password Sniffer can monitor and capture passwords through FTP, POP3, HTTP, SMTP, Telnet, and etc.

Ace Password Sniffer works passively and don't generate any network traffic, therefore, it is very hard to be detected by others. And you needn't install any additional software on other PCs or workstations. If your network is connected through switch, you can run the sniffer on the gateway or proxy
server, which can get all network traffic.

This stealth-monitoring utility is useful to recover your network passwords, to receive network passwords of children for parents, and to monitor passwords abuse for server administrators.



Here are some key features of "Ace Password Sniffer":

· Efficient
You can see the passwords as soon as it appeared on LAN.
· Support Various Protocols
Fully support application protocols of FTP, SMTP, POP3, TELNET, etc. That means user names and passwords used to send and receive emails, to log on a web site, or to log on a server, can all be captured and saved.
· Support HTTP Protocol
Support HTTP protocol, including proxy password, basic http authenticate authoriation and most passwords submitted through HTML, no matter they are encoded by MIME or base64.
· Verify whether the captured passwords are valid
It can tell whether the passwords are right. You can even get the replies from the server for the login. And it always keeps trying to get valid user name and password pairs.

Downlaod link
http://rapidshare.com/files/122301154/EffeTech_Ace_Password_Sniffer_v1.4.rar

Safely Uninstall Linux if Dual Booted With Windows XP



Recently i posted on How to Dual Boot WinXP SP3 and Ubuntu 9.04 (Linux ).So if you are in a mod to uninstall it...then don't hesitate because i got an interesting tip from one of the blogs online !

When asked to most of the users “How will you uninstall Linux when it is Dual Boot installed with Windows XP?” The common answers we got was “Start windows XP and format Linux Partition“. Well they were half correct, you do have to format the linux partition but what about the grub loader? The grub loader will still be showing you the option to boot Linux during the start up and by mistake if anybody goes for booting linux, the system will not find any linux on your machine and it will restart. so what can you do in this situation?

There is a simple procedure to uninstall or delete linux completely and safely by following a step by step procedure illustrated below and it is tested by me .
Requirements:
You need a windows 98 startup disk or windows XP installation CD.

How to do it:
1. Reboot your laptop with windows 98 start up disc or Windows XP CD and type the command “fixmbr”.
2. Above command will repair ur bootloader and rewrite ntldr which will replace grub loader of Linux and now you can see only Windows XP in the boot menu.
3. Now Boot up in Windows xp.
4. Go to Start > Control Panel > Administrative Tools > Computer Management
5. Go to Disk Management under “Storage”
6. Select your Hard Disk and then the linux partition.
7. Delete the linux partition this will delete linux and grub.
8. Thats it done now boot your laptop or desktop normally it will be booted by default in windows xp.

Wednesday, August 26, 2009

Dual Boot WinXP SP3 and Ubuntu 9.04 (Linux )

The process of dual booting Windows OS like Vista, XP, 98 etc is very easy, as the Windows bootloader itself takes care of the process. But if you want to dual boot any Linux and Windows, it’s a gruelling task. So, here is a how-to sheet for dual booting WinXP and Ubuntu 9.04 ( a flavour of Linux).

1. See how I installed WinXP and Ubuntu on different partitions.



2. First, partition your hard drive appropriately to suit the dual booting. There are many ways of partitioning, but the method I used has no problems. IMP: It’s always better to install XP first and then install Ubuntu later. If you’ve already created partitions after XP installation, just use Easeus Partition manager to create free space of 15gb for linux installation. Partitioning hard drive will help you , how to do it.

3.I partitioned my 40 GB hard drive in such a way that, there is XP, XP – Programs, Linux-ext3, fat32, linux-swap partitions. I divided 40 GB as follows.
  • XP– 13 GB ( This is the primary partition, where I installed XP )
  • XP– Programs– 7 GB. ( This is where I install XP software)
  • Linux. ext3 – 10 gb.( ext3 is file journal system just like NTFS/FAT for Windows. This is also primary partition where I installed Ubuntu linux.)
  • fat32– 7 gb.( This is a common partition for both Windows and Linux to share. Linux can read from NTFS systems, but cannot write. So for to write, it has to be a fat32 system)
  • linux.swap– 2gb. (this is linux swap partition required for linux system usage– can be very small partition)


IMP: Once again, install WinXP first and then install Ubuntu. I hope you know how to install WinXP. So I’m assuming that you already installed WinXPsp3 on your system, according to the above configuration. Now get ready to install Ubuntu 9.04.

4. Download the Ubuntu latest version "Jaunty Jackelope", version 9.04 from here. http://www.ubuntu.com/

5. Go to this link and watch the video for partitioning and installing Ubuntu 9.04.
V.Imp: Remember to install the Grub bootloader to the linux partition itself ( not to the XP partition). DO NOT INSTALL GRUB in the Master Boot Record (MBR)!

Watch Video http://www.youtube.com/watch?v=w8a-smrPlvE

Ping Pong DDOser

Image Hosted by ImageShack.us

Donwload link
http://rapidshare.com/files/117440792/Ping-2.zip

Botnet collection

Download link 
http://www.ziddu.com/download/10316462/Botnet%20Collection%20by%20mr%20electroman%20TH3-pro%20blogspot%20com.zip.html

Password :- defaced (if any)

the archive only has bot sources
you need to compile them with a c or c++ compiler

A small tut on making bots



**********************************************************
* *
* Botnet, provided to you by Mohammad Ahmadi Bidakhvidi. *
* *
************************************************************

1) Making your own DDoS botnet

This tutorial will teach you how to make a botnet. Now I'm
going to keep this plain and simple, for fully understanding
this tutorial there is some basic C++ programming knowledge
needed.

2) Goals

With a botnet you control some amount of PCs (also called
zombies). Mostly they are used for:

a) Infecting other computers so your botnet gets bigger
DDoS attacks

3) What do you need:

a)Basic knowledge of C++
Microsoft Visual C++ 6.0 (Enterprise or Corporate edition)
c) SDK update (click here)
d) A botnet bot source code (C++) - there are different botnet bots, I'll give you the source of some good bots

4) Let's get started

You download the source here, change config.h, and done that
you will build the EXE. Of course you don't run the EXE, that
EXE must spread know, but there is one problem, the virus scanners
detect your tool... Well the solution is easy, use a EXE packer to
hide your virus, to mislead virus scanners. Don't use famous packers
like UPX, virus scanners will look to packed EXEs by those packers as
win32.bloodhound (possible threat).

5) The Bots

There are many bots avaible in this pack, every bot has several
"versions", these versions are modifications of the original source
so they have better or extra functions and eventually bug fixes.
These are the sources of the bots avaible [all VC++ sources]:

a) urxbot
Spybot
c) sdbot
d) rxbot
e) rbot
f) phatbot
g) litmus
h) gtbot
i) forbot
j) evilbot
k) darkirc
l) agobot
m) acebot
n) Others (jbot, microbot, blueeyebot, icebot, q8bot, happybot, ...)

By Mr electroman 

Metasploit Video tutorials Now In Stock

Now You can watch online Metasploit tutorial IN TH3 professional security Click in the link bellow to watch the SWF video tutorial


@by mr electroman good luck :)

الاثنين، 14 يونيو 2010

How to Recover Hacked Email Accounts?

Email Hacked? 
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
 

For Gmail:

 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
[stextbox id="info"]Gmail Password Reset Link[/stextbox]
If you cannot find success from the Step-1 then proceed to Step-2.
 
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
[stextbox id="info"]Account Recovery Form[/stextbox]
 

For Yahoo and Hotmail:

 
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
 
I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected!

How to Change the Logon Screen Background in Windows 7

Win 7 Customized Logon Screen 
How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.

1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.
2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or 1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image as backgroundDefault.jpg.
3. You will need to copy this image to
[stextbox id="info"]C:\Windows\system32\oobe\info\backgrounds[/stextbox]
You will need to create that path if it does not already exist on your computer.
4. Now open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key
[stextbox id="info"]HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\Background
[/stextbox]
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.
5. Double-click on OEMBackground and set the Value Data to 1.
6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.
I hope you like this trick. Just try out and give your feedback!

Upload Pictures to Facebook from Desktop – BloomFacebook

Bloom is a multi platform desktop app that let you upload your photos and videos easily and efficiently to Facebook, download albums and view your friends’ photos.

Upload Pictures to Facebook from Desktop with Bloom

You can upload photos to a new or an existing album, you can tag them and you can view your friends photos.

Features of Bloom :

  • Upload photos and videos to Facebook which includes tagging people: (more than 200 photos supported and privacy)
  • Import cutom photo Exif info (IPTC) into the photo caption
  • Download albums from Facebook
  • View your friends photos
  • Save individual photos
  • Support for uploads behind a Proxy server
  • Windows/Mac/Linux/Solaris compatible

Download Bloom: Link

You can also download full albums with this tool.

الاثنين، 3 مايو 2010

what is the reason for many people to loose their accounts?



Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is:”Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.

If this is the case, then what is the reason for many people to loose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who loose their email accounts are not the victims of hacking but the victims of Trapping. They loose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.

Are you confused? If so continue reading and you’ll come to know…

Now I’ll mention some of the most commonly used online scams which fool people and make them loose their passwords. I’ll also mention how to protect your email account from these scams.

1. WEBSITE SPOOFING

Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original)especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.

For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and loose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.

Solution:

  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site.Never click on the hyperlink to enter the site.

2. BY USING KEYLOGGERS

The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely loose your password. This is because the keylogger records each and every keystroke that you type.

Solution:

Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES

Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.

This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.

So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…


التصنيفات


How to Hack an XBox Live Account










 



You might’ve already heard that Halo 3’s producer Joe Tung has become the latest victim of XBox Live hackers ‘loling’ on the internet. There’s a lot of rumor and speculation floating around about the security of gamers’ XBox Live accounts. Well I’m here to dish the truth. It can be pretty easy to hack into some one’s account. So below you’ll find 3 easy ways to hack into someone’s XBox Live account (and how to avoid being punked yourself).


1. Make People Give You Their Account Information

Set up a dummy website advertising free access to Microsoft points, strategy guides, and pictures of naked women. People will hand over their account information without you having to do much work.

2. Get Someone to Trade Gamertags with You

You’ll always find someone who wants to access parts of a game they haven’t beaten yet and achievements they didn’t work for. Find a group of people trading gamertags and account information. Once you join you’ll have access to multiple accounts.

3. Just Take a Wild Guess

 






Once you’ve spent time gaming with someone online you’ll notice that people naturally give away personal information. Perhaps they mention the name of the girl they’re seeing, the name of their hometown or their favorite movie. People tend to select obvious passwords. And given everyone’s tendency to use the same password for every service:

Once you get one password you’ve probably got them all. You can reek havoc on someone’s amazon, gmail, facebook, yahoo, twitter, etc

So as you can see it’s almost too easy to hack into someone’s account. You might want to protect yourself by not giving your account information away. Does this really need to be said?

Spy-Net 2.6 RAT - Full Setup Tutorial







This tutorial is written by "I Used To Make Out With" aKa Edward Butcher for Hackforums.net
If you're going to leech it credit please

Tutorial is noob friendly!






Requirements

-Win XP,vista or 7
-Spy-Net RAT v2.6
-No Ip (Dynamic DNS)
-Fud crypter/protector or hexing skills (optional)


DOWNLOAD LINK
http://www.speedyshare.com/files/2154747...utcher.rar




Warning: This tutorial is written for educational purposes ONLY!





--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
Chapter 1 - Spy Net Options
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------


I believe that 90 % of people know how to setup a No-Ip and how to Port forward a 81 Port or any other you want!
So I will skip that part.

First of all Open spynet 2.6
Msgbox will popup with options "Yes" or "No" click no
Click "START" in the upper left corner
Now go "Opciones" and "Seleccionar Idoma"


Click "English.ini"



Now everything is on English language
Now we need to put the ports we want to use
Go "Options" > "Select listening ports"
Add port 81 and click ok

Now you should see in the middle bottom corner
"Waiting for connections on port : 81"

That's it for options


--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
Chapter 2 - Setting up a server
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------
--------------------------------------------------------


This is the most important part of tutorial
Go File and click "Create Server"

Make a new user and name it however you want
Now pick your username and click "Forward"

Connection
Delete 127.0.0.1 DNS and click "Add" and insert

yournoiphost:81
example: jeremyjackson123.no-ip.biz:81

Click OK
Fill in Identification and Password and switch to Installation

Installation
Installation directory:

System = system32 folder
windows = windows folder
etc...

Put system
Rename directory into something not so obvious like "Microsoft_KB57H43"
or any random name
Rename File name into something not so obvious again something with windows or microsoft. Make sure after that your filename is ending with .exe


Leave injection into Default browser or if you want to inject your server into any other exe then you must know the process name,
example if you want to inject it in opera browser "opera.exe'

On boot check all
Don't rename nothing and click that "Random" button" few times

Check Persistance
Check Hide File
Check Change creation date
Do whatever you want with melt

HINT: What is melt?
If you check melt this will happen = when somone opens your server it will dissapear from their pc
if you don't check melt this will happen = when somone opens your server file will stay on their pc


So pick whatever you want for melt
If you need help check the picture


Move to Message
I personally don't use that option because I like binding files and hiding them well.

HINT:What is Message?
When somone open your server they will get the fake message
(Mostly used for files that are not binded)


If you will use the fake message option make sure it's a well hidden error
like "Failed to initialize" then some famous erorr number just google some if you don't know any

You can put whatever you want, if you want.

Move on to Keylogger
Check activate keylogger
Delete backspace (it's really irritating but helpful so pick what you want i never read any logs or use keyloggers)

Send logs by FTP
Could be useful for some people, i don't use it but i'll explain how to setup it
You need FTP
A good one is drivehq google and register
Send to: http://ftp.drivehq.com
Directory:/Logs (make sure you create a folder called Logs on your ftp)
FTP User: your drivehq username
FTP Password: your drivehq password
Send each: 30 minute is just fine

Make sure to test this if you're going to use it

Move on to Anti Options
Check all and move on "Create Server"

This is the last one

Check icon if you want
Check UPX
Check P2P (Peer to peer) like Limewire,Bearshare,Mp3 Rocket etc..
rename it into something with porn or cracks or games
Hot_Porn_2009.exe#callofduty6.exe#

HINT:Make sure to leave # behind .exe! else it wont work


Check USB (infecting everything that plugs in USB of infected pc)
Check Google Chrome Passwords and click ok when prompted for http://www.server.com/sqlite3.dll
Uncheck Bind files better use some private binder or something else
Uncheck Rootkit (experienced users can check)

Need help check the picture below



Click "Create Server" and you're done!

22 Awesome Themes for Ubuntu Linux

Ubuntu Theme Murrina Triomphe
Istarted using Ubuntu 4 months back, and since then I’ve been looking for ways to customize and tweak it to make Ubuntu more productive and look good. During my search, I came across many cool themes from various sources I’d like to share with you all.



These themes are all available for free download from Gnome Art. Do try them out and let me know if you like them. If you have more cool Ubuntu themes, let me know below in the comments. one more post 60 ubuntu themes, checkout this also
I love eye candy!


Hardy Theme 2.0

Ubuntu Theme Hardy
Download

Bamboo Zen

Ubuntu Theme Bamboo Zen
Download

Lux Theme

Ubuntu Theme Lux
Download

Burnt Orange Ice

Ubuntu Theme Burnt Orange Ice
Download

Creamy

Ubuntu Theme Creamy
Download

Glow

Ubuntu Theme Glow
Download

Moomex

Ubuntu Theme Moomex
Download

Roy (Windows Royale)

Ubuntu Theme Roy
Download

Clearlooks Metallico

Ubuntu Theme Clearlooks Metalico
Download

Aqua Dreams

Ubuntu Theme Aqua Dreams
Download

Linux Mint

Ubuntu Theme Linux Mint
Download

Real Minimal

Ubuntu Theme Real Minimal
Download

Root Green

Ubuntu Theme Root Green
Download

Light Coffee

Ubuntu Theme Light Coffee
Download

Slickness Black

Ubuntu Theme Slickness Black
Download

Murrina Aero

Ubuntu Theme Murrina Aero
Download

Tigris

Ubuntu Theme Tigris
Download

Sofice

Ubuntu Theme Sofice
Download

Blue Joy

Ubuntu Theme Blue Joy
Download

Gaia Nova

Ubuntu Theme Gaia Nova
Download

Elegant Brit

Ubuntu Theme Elegant Brit
Download

Darker Ice Murrina

Ubuntu Theme Darker Ice Murrina
Download

IE6 aurora Metasploit

how to hack a pc with metasploit using the IE26 aurora attack thanx for jalal azdine for submitethis video :)

http://www.youtube.com/watch?v=CSHijXLWk0g

Sharp Ip Getter v2 - Crkd




Here is Sharp Ip Getter v2.0 Cracked by SpiderZ

bcoz Sharp Challenge with me.but he don't know about SpiderZ Power
and next time we don't accept challenge from this Noob person Sharp

Sharp Price:20$
SCTeaM Price: 0$ very cheap LOLZZ

shouts fly to SpiderZ

Backdoor


Just choose an icon. put the server and click make
Download

mr electroman
 

Fearz Crypter 2.2.0

Cracked by oxiD :P
This version haa: Anti-Kaspersky, Anti-Sandbox(s) (ProcessEntry, IDT base address) and anti-Soft-ICE

* All APi's Encrypted
* All Strings and integers Encrypted
* RC4 Encryption
* Ntdll Compress unit
* Anti Vmware
* Anti SandBox(s)
* Anti Debug(s)
* Anti DebuggerPresent
* Supports EOF Data (Overlay).
* Added EOF Support for first file

by mr electroman

ophcrack video tutorial

uploaded By mr electroman
http://www.youtube.com/watch?v=bdOfBkqswDI

Ophcrack - Cracker Windows Passwords

Voilà j'ai fait un tutorial assez convainquant qui pourrait en intéresser plus d'un !
En effet qui n'a jamais voulu récupérer tous les mots de passe administrateur en toute simplicité et avec une facilité et un anonymat déconcertant !

Enjoy it !

Ne marche pas avec Windows Vista !


---------------------------------------------
Tu n'es pas administrateur de ton ordinateur parce que Papa et Maman ne veulent pas ? Eux ont un compte administrateur, tu trouves pas ça juste mais tu peux rien faire parce que tu n'as pas leur mot de passe. C'est une situation courante mais heureusement un outil incroyable est arrivé: Ophcrack !Ophcrack retrouve n'importe quel mot de passe d'une session Windows de moins de 14 caractères, en quelques secondes si vous avez la plus grosse Rainbow Table (1) !


(exemple de refus de mot de passe, essaye encore XD)

Ce qu'il vous faut:

  • 1 CD vierge
  • Un logiciel de gravure (1*).
  • Environ 1H30 de téléchargement du programme [450Mo], 10 min de gravure du CD, et entre 5 à 30min de décryptage en fonction de votre machine.
Pas à pas je vais vous guider en tant qu'utilisateur lambda n'y connaissant rien à la bureautique. La première étape consiste à télécharger Ophcrack. On va télécharger une version "LiveCD". C'est quoi ce truc vous me direz ? Et bien en fait, une fois le programme téléchargé on va le graver sur un CD, qui lui-même se chargera au début du démarrage de l'ordinateur, tout simplement. Mais ne vous inquiétez pas encore de ça
Page de téléchargement Ophcrack Live CD
[ADSL 512K environ 1H30 pour télécharger les 450Mo]

C'est téléchargé ? Vous obtenez maintenant un fichier nommé "ophcrack-livecd-1.1.3.iso" on va maintenant le graver.
[Je fais juste une petite parenthèse, mais l'extension ISO signifie que c'est une "image CD" de même que d'autres normes comme CCD, NRG, BIN, IMG...]

Pour le graver ouvrez votre logiciel de gravure [moi Nero vous un autre peut-être, donc j'expliquerais pour Nero]. Dans l'écran principal de Nero Burning Room cliquer sur Ouvrir.


Naviguer dans l'explorateur puis sélectionner "ophcrack-livecd-1.2.2.iso" puis Ouvrir.



Il ne reste plus qu'à lancer la gravure et patienter.

La gravure est finie, on laisse le CD dans le lecteur et on redémarre l'ordinateur.

Là, si tout va bien le CD est détecté et avant le chargement de Windows il se charge. Vous voyez pleins de lignes en DOS qui s'affichent de partout ? C'est normal ! Patientez quelques minutes, une version bootable* de Linux se charge qui va nous permettre de scanner les fichiers SAM de Windows où sont cryptés les passswords.


Vous arrivé à un bureau, assez sobre, une fenêtre est normalement affichée avec les différents noms des Comptes Utilisateur. Il vous suffit de cliquer sur "Scan" pour que le scan commence. Un message d'erreur apparait comme quoi les tables ne sont pas chargées ? Cliquez sur Load et cherchez un dossier appelé Ophcrack, puis le sous dossier appelé 10000. Cliquez sur "Open" puis cliquez sur scan à nouveau. Voilà le scan qui débute, vous pouvez allez boire un café en attendant. L'opération peut durer de quelques secondes à une trentaine de minutes. Le mot de passe s'affiche en face de l'identifiant de la session. Notez-le bien [on a pas fait tout ça pour rien O_o !].

Puis faites un clic droit sur le bureau et choisissez d'éteindre l'ordinateur (c'est en anglais donc "Logout").

Votre PC s'éteint, retirez le CD et testé tout de suite si c'est le bon mot de passe !
*bootable signifie qu'une installation sur le disque dur n'est pas nécessaire, linux dans notre cas est chargé à partir du CD, aucun fichier n'est en théorie copié sur votre disque dur. Certains le sont mais sont effacés quand vous éteignez l'ordinateur.

Documentation :

- Site officiel (anglais) : http://ophcrack.sourceforge.net
- Brève documentation (français) : http://www.secuobs.com/news/21042006-ophcrack.shtml
- Documentation poussée (français) : http://www.objectif-securite.ch/os_labs_l.php
- Tables Set(1) (anglais) : http://www.objectif-securite.ch/ophcrack

(1): les Rainbow Table et Tables Set sont des Tables précalculées qui vont être utilisées pour décrypter les mots de passe. Certaines très imposantes en taille et complètes au niveau des caractères (!"#$% &'()*+,-./:;&<=>?@[\]^_`{|}~) sont payantes mais généralement si le mot de passe n'est composé que de lettres et chiffres la plus petite SSTIC04-10k (388MB) pré intégrée dans le LiveCD suffit largement [256Mo RAM minimum]. Si vous voulez la version plus complète SSTIC04-5k (720MB) il vous faudra 512Mo RAM et l'intégrer dans l'ISO du LiveCD à la place de celle existante grâce à un outil comme WinIso

(1*) : Il va falloir graver votre CD. Si vous n'avez pas de logiciel de gravure il en existe des gratuits et des payants. Dans la lignée des gratuits, en français et extrêmement performant je vous propose DeepBurner téléchargeable ici qui gère le format ISO dont on va avoir besoin.
Tu
La différence entre un brute force classique et ce système à Rainbow Table est le fait que toutes les combinaisons ont déjà été calculées et enregistrées dans ces tables (par des supercalculateurs je précise).
Le programme n'essaye pas les mots de passe 1 par 1 mais plutôt les chaînes précacalculées.

Bon tout ça c'est théorique, sinon je n'ai aucune idée de comment tout ça marche en réalité, c'est un preofesseur de cryptographie à Polytechnique qui l'a créé alors c'est pas n'importe qui ;-)
Pour en savoir plus sur les Rainbow Table : http://fr.wikipedia.org/wiki/Table_arc-en-ciel

-----
Problèmes connus:
* Le CD ne boot pas au démarrage. Aucun remède n'existe, celà est du à une incompatibilité du Bios ou sur les anciens ordinateurs.
-----

Comment avoir une table de scan plus importante ?

Merci a AzNKiller qui précise que La version plus complète SSTIC04-5k n'est pas payante et téléchargeable ici .

Je vais donc vous montrer comment trafiquer votre boot CD.
Mais comme l'image ISO fera plus de 800Mo, il vous faudra la graver sur DVD (-RW) !

Commencez par télécharger cette table (voir lien plus haut).
Téléchargez UltraISO 8.3 dispo sur mon FTP: http://xtremshare.free.fr/logiciels/
Installez le logiciel.

Vous faites un clic droit sur l'image ISO "normale" et vous l'ouvrez avec UltraISO. Vous devez avoir ça normalement (ne faites pas attention à WinISO, c'est un logiciel similaire)


[L'IMAGE N'EST PAS EXACTE, JE VAIS PAS RETELECHARGER OPHCRACK POUR UN SCREEN XD]

Maintenant vous allez chercher le dossier 10000 et vous allez copier TOUT ce que contient le .zip dans ce dossier en remplaçant par la même occasion l'ancienne table moins complête.

Vous allez sauvergarder avec le tout, le logiciel recréé l'image ISO.
Et vous gravez normalement le tout sur DVD!
Voilà le tour est joué ! Les tables sont renplacées par SSTIC04-5k !

Program to recover/crack SHA1, MD5 & MD4 hashes

ighashgpu v0.70.48.3
Fastest SHA1/MD5 hash cracker on ATI and NVIDIA GPUs.
World first multihash MD5 cracker for ATI.
Recovery speed on ATI HD 5970 peaks at 5600M/s MD5 hashes and 2300M/s SHA1 hashes.
nVidia GTX 260 w/ 192 SP peaks at 560M/s MD5 & 175M/s SHA1.
donwload 
http://golubev.com/files/ighashgpu_v062.zip

Ace Password Sniffer v1.4

 

Capture passwords through http, ftp, smtp, pop3, telnet
Ace Password Sniffer is able to listen on your LAN and enable network administrators or parents to capture passwords of any network user.

Ace Password Sniffer can monitor and capture passwords through FTP, POP3, HTTP, SMTP, Telnet, and etc.

Ace Password Sniffer works passively and don't generate any network traffic, therefore, it is very hard to be detected by others. And you needn't install any additional software on other PCs or workstations. If your network is connected through switch, you can run the sniffer on the gateway or proxy
server, which can get all network traffic.

This stealth-monitoring utility is useful to recover your network passwords, to receive network passwords of children for parents, and to monitor passwords abuse for server administrators.



Here are some key features of "Ace Password Sniffer":

· Efficient
You can see the passwords as soon as it appeared on LAN.
· Support Various Protocols
Fully support application protocols of FTP, SMTP, POP3, TELNET, etc. That means user names and passwords used to send and receive emails, to log on a web site, or to log on a server, can all be captured and saved.
· Support HTTP Protocol
Support HTTP protocol, including proxy password, basic http authenticate authoriation and most passwords submitted through HTML, no matter they are encoded by MIME or base64.
· Verify whether the captured passwords are valid
It can tell whether the passwords are right. You can even get the replies from the server for the login. And it always keeps trying to get valid user name and password pairs.

Downlaod link
http://rapidshare.com/files/122301154/EffeTech_Ace_Password_Sniffer_v1.4.rar

Safely Uninstall Linux if Dual Booted With Windows XP



Recently i posted on How to Dual Boot WinXP SP3 and Ubuntu 9.04 (Linux ).So if you are in a mod to uninstall it...then don't hesitate because i got an interesting tip from one of the blogs online !

When asked to most of the users “How will you uninstall Linux when it is Dual Boot installed with Windows XP?” The common answers we got was “Start windows XP and format Linux Partition“. Well they were half correct, you do have to format the linux partition but what about the grub loader? The grub loader will still be showing you the option to boot Linux during the start up and by mistake if anybody goes for booting linux, the system will not find any linux on your machine and it will restart. so what can you do in this situation?

There is a simple procedure to uninstall or delete linux completely and safely by following a step by step procedure illustrated below and it is tested by me .
Requirements:
You need a windows 98 startup disk or windows XP installation CD.

How to do it:
1. Reboot your laptop with windows 98 start up disc or Windows XP CD and type the command “fixmbr”.
2. Above command will repair ur bootloader and rewrite ntldr which will replace grub loader of Linux and now you can see only Windows XP in the boot menu.
3. Now Boot up in Windows xp.
4. Go to Start > Control Panel > Administrative Tools > Computer Management
5. Go to Disk Management under “Storage”
6. Select your Hard Disk and then the linux partition.
7. Delete the linux partition this will delete linux and grub.
8. Thats it done now boot your laptop or desktop normally it will be booted by default in windows xp.

Wednesday, August 26, 2009

Dual Boot WinXP SP3 and Ubuntu 9.04 (Linux )

The process of dual booting Windows OS like Vista, XP, 98 etc is very easy, as the Windows bootloader itself takes care of the process. But if you want to dual boot any Linux and Windows, it’s a gruelling task. So, here is a how-to sheet for dual booting WinXP and Ubuntu 9.04 ( a flavour of Linux).

1. See how I installed WinXP and Ubuntu on different partitions.



2. First, partition your hard drive appropriately to suit the dual booting. There are many ways of partitioning, but the method I used has no problems. IMP: It’s always better to install XP first and then install Ubuntu later. If you’ve already created partitions after XP installation, just use Easeus Partition manager to create free space of 15gb for linux installation. Partitioning hard drive will help you , how to do it.

3.I partitioned my 40 GB hard drive in such a way that, there is XP, XP – Programs, Linux-ext3, fat32, linux-swap partitions. I divided 40 GB as follows.
  • XP– 13 GB ( This is the primary partition, where I installed XP )
  • XP– Programs– 7 GB. ( This is where I install XP software)
  • Linux. ext3 – 10 gb.( ext3 is file journal system just like NTFS/FAT for Windows. This is also primary partition where I installed Ubuntu linux.)
  • fat32– 7 gb.( This is a common partition for both Windows and Linux to share. Linux can read from NTFS systems, but cannot write. So for to write, it has to be a fat32 system)
  • linux.swap– 2gb. (this is linux swap partition required for linux system usage– can be very small partition)


IMP: Once again, install WinXP first and then install Ubuntu. I hope you know how to install WinXP. So I’m assuming that you already installed WinXPsp3 on your system, according to the above configuration. Now get ready to install Ubuntu 9.04.

4. Download the Ubuntu latest version "Jaunty Jackelope", version 9.04 from here. http://www.ubuntu.com/

5. Go to this link and watch the video for partitioning and installing Ubuntu 9.04.
V.Imp: Remember to install the Grub bootloader to the linux partition itself ( not to the XP partition). DO NOT INSTALL GRUB in the Master Boot Record (MBR)!

Watch Video http://www.youtube.com/watch?v=w8a-smrPlvE

Ping Pong DDOser

Image Hosted by ImageShack.us

Donwload link
http://rapidshare.com/files/117440792/Ping-2.zip

Botnet collection

Download link 
http://www.ziddu.com/download/10316462/Botnet%20Collection%20by%20mr%20electroman%20TH3-pro%20blogspot%20com.zip.html

Password :- defaced (if any)

the archive only has bot sources
you need to compile them with a c or c++ compiler

A small tut on making bots



**********************************************************
* *
* Botnet, provided to you by Mohammad Ahmadi Bidakhvidi. *
* *
************************************************************

1) Making your own DDoS botnet

This tutorial will teach you how to make a botnet. Now I'm
going to keep this plain and simple, for fully understanding
this tutorial there is some basic C++ programming knowledge
needed.

2) Goals

With a botnet you control some amount of PCs (also called
zombies). Mostly they are used for:

a) Infecting other computers so your botnet gets bigger
DDoS attacks

3) What do you need:

a)Basic knowledge of C++
Microsoft Visual C++ 6.0 (Enterprise or Corporate edition)
c) SDK update (click here)
d) A botnet bot source code (C++) - there are different botnet bots, I'll give you the source of some good bots

4) Let's get started

You download the source here, change config.h, and done that
you will build the EXE. Of course you don't run the EXE, that
EXE must spread know, but there is one problem, the virus scanners
detect your tool... Well the solution is easy, use a EXE packer to
hide your virus, to mislead virus scanners. Don't use famous packers
like UPX, virus scanners will look to packed EXEs by those packers as
win32.bloodhound (possible threat).

5) The Bots

There are many bots avaible in this pack, every bot has several
"versions", these versions are modifications of the original source
so they have better or extra functions and eventually bug fixes.
These are the sources of the bots avaible [all VC++ sources]:

a) urxbot
Spybot
c) sdbot
d) rxbot
e) rbot
f) phatbot
g) litmus
h) gtbot
i) forbot
j) evilbot
k) darkirc
l) agobot
m) acebot
n) Others (jbot, microbot, blueeyebot, icebot, q8bot, happybot, ...)

By Mr electroman 

Metasploit Video tutorials Now In Stock

Now You can watch online Metasploit tutorial IN TH3 professional security Click in the link bellow to watch the SWF video tutorial


@by mr electroman good luck :)

How to Recover Hacked Email Accounts?

Email Hacked? 
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
 

For Gmail:

 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
[stextbox id="info"]Gmail Password Reset Link[/stextbox]
If you cannot find success from the Step-1 then proceed to Step-2.
 
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
[stextbox id="info"]Account Recovery Form[/stextbox]
 

For Yahoo and Hotmail:

 
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
 
I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected!

How to Change the Logon Screen Background in Windows 7

Win 7 Customized Logon Screen 
How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.

1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.
2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or 1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image as backgroundDefault.jpg.
3. You will need to copy this image to
[stextbox id="info"]C:\Windows\system32\oobe\info\backgrounds[/stextbox]
You will need to create that path if it does not already exist on your computer.
4. Now open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key
[stextbox id="info"]HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\Background
[/stextbox]
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.
5. Double-click on OEMBackground and set the Value Data to 1.
6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.
I hope you like this trick. Just try out and give your feedback!

Upload Pictures to Facebook from Desktop – BloomFacebook

Bloom is a multi platform desktop app that let you upload your photos and videos easily and efficiently to Facebook, download albums and view your friends’ photos.

Upload Pictures to Facebook from Desktop with Bloom

You can upload photos to a new or an existing album, you can tag them and you can view your friends photos.

Features of Bloom :

  • Upload photos and videos to Facebook which includes tagging people: (more than 200 photos supported and privacy)
  • Import cutom photo Exif info (IPTC) into the photo caption
  • Download albums from Facebook
  • View your friends photos
  • Save individual photos
  • Support for uploads behind a Proxy server
  • Windows/Mac/Linux/Solaris compatible

Download Bloom: Link

You can also download full albums with this tool.

what is the reason for many people to loose their accounts?



Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is:”Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.

If this is the case, then what is the reason for many people to loose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who loose their email accounts are not the victims of hacking but the victims of Trapping. They loose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.

Are you confused? If so continue reading and you’ll come to know…

Now I’ll mention some of the most commonly used online scams which fool people and make them loose their passwords. I’ll also mention how to protect your email account from these scams.

1. WEBSITE SPOOFING

Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original)especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.

For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and loose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.

Solution:

  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site.Never click on the hyperlink to enter the site.

2. BY USING KEYLOGGERS

The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely loose your password. This is because the keylogger records each and every keystroke that you type.

Solution:

Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES

Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.

This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.

So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…


تطوير : مدونة حكمات