Thursday, 14 July 2011

Chat in MS-DOS using IP address

it is easy and simple trick.  We can chat using MS-DOS(we have did this as college experiment in network lab with java code).  But i am not going to give you the java code.  Our usual Batch Programming.

You can try this in your school or college systems(it should be networked systems).

Step 1: 
 Get  the ip address of your friend's system.
if you are using college or school system,then ip address will be in particular range.



Step 2:
copy the following Batch code in notepad:
@echo off
:A
Cls
echo TypeIPAddress
set /p n=IPAddress:
set /p m=Message:
net send %n% %m%
Pause
Goto A
Save the file with .bat extension(For Eg: message.bat)

Step 3:
Open command prompt and navigate to that batch file location.
open the file in notepad.

If you don't know how to move to that path,simply drog and drop in cmd.Then hit enter.

Step 4:
Now it will ask you for the IPAddress.
Enter the IP address which you want to send message.
Hit enter
Now it will ask you for the message.
Enter and hit enter

Havij Tool - SQL Injection Withoug Much Effort

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.
The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.
The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.
Download It from Here:

http://www.itsecteam.com/en/projects/project1_page2.htm

SQL ninja 0.2.6-rc2 is now available


Fancy going from a SQL Injection on Microsoft SQL Server to a full GUI access on the DB? Take a few new SQL Injection tricks, add a couple of remote shots in the registry to disable Data Execution Prevention, mix with a little Perl that automatically generates a debug script, put all this in a shaker with a Metasploit wrapper, shake well and you have just one of the attack modules of sqlninja!
Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.
Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.
Have a look at the flash demo and then feel free to download. It is released under the GPLv3
Features

The full documentation can be found in the tarball and also here, but here's a list of what the Ninja does:

    * Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode)
    * Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental)
    * Privilege escalation to sysadmin group if 'sa' password has been found
    * Creation of a custom xp_cmdshell if the original one has been removed
    * Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed)
    * TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port that is allowed by the firewall of the target network and use it for a reverse shell
    * Direct and reverse bindshell, both TCP and UDP
    * ICMP-tunneled shell, when no TCP/UDP ports are available for a direct/reverse shell but the DB can ping your box
    * DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for a direct/reverse shell, but the DB server can resolve external hostnames (check the documentation for details about how this works)
    * Evasion techniques to confuse a few IDS/IPS/WAF
    * Integration with Metasploit3, to obtain a graphical access to the remote DB server through a VNC server injection
    * Integration with churrasco.exe, to escalate privileges to SYSTEM on w2k3 via token kidnapping
    * Support for CVE-2010-0232, to escalate the privileges of sqlservr.exe to SYSTEM

Platforms supported
Sqlninja is written in Perl and should run on any UNIX based platform with a Perl interpreter, as long as all needed modules have been installed. So far it has been successfully tested on:
  1. Linux
  2. FreeBSD
  3. Mac OS X
Sqlninja does not run on Windows and I am not planning a port in the near future

Download Here:

sslsniff v0.7 – SSL Man-In-The-Middle (MITM) Tool

sslsniff v0.7 – SSL Man-In-The-Middle (MITM) Tool


This tool was originally written to demonstrate and exploit IE’s vulnerability to a specific “basicConstraints” man-in-the-middle attack. While Microsoft has since fixed the vulnerability that allowed leaf certificates to act as signing certificates, this tool is still occasionally useful for other purposes.
It is designed to MITM all SSL connections on a LAN and dynamically generates certs for the domains that are being accessed on the fly. The new certificates are constructed in a certificate chain that is signed by any certificate that you provide.


The three steps to get this running are:

  1. Download and run sslsniff-0.7.tar.gz
  2. Setup iptables
  3. Run arp-spoof



Download Here:
http://www.thoughtcrime.org/software/sslsniff/sslsniff-0.7.tar.gz

How to hack twitter account

Many of readers sent me emails for writing a post on twitter account hacking. Before writing more on topic i want to say one thing that there is no any software tool which can give you passwords of any twitter account by entering the user name. If you are here for any this type of software then please leave this website. Twitter is one of the top 10 most visited website having a lots of security features. No tool can intrude or hack its database to give you passwords. If you want to hack a twitter account, you have to use your hacking skills with a good use of social engineering. I think social engeering is the best way to trick a person to give his passwords to you. If you had read my older post on facebook hacking, no trick is new for you. 


1: phishing: phishing is the best way to hak any account. If you think only saving a webpage and creating a fake login page with this is phishing, then you are wrong. Phishing is just create a webpage which can trick users to give their passwords. It does not mean that it is a login page or any other page which offers a service to that website. I used a page for finding invisible in orkut for orkut phishing. So think what you can do in this. I am not uploading any phishing page. If you do not know what is phishing, read my old post.


2: Keylogger: keylogger is another way to hack into twitter account by getting the keystrokes from a user's system. download remote keyloggers from keylogger section.



3: Firesheep: If your victim uses unsecure wireless network then you can hack him easily by using mozilla firefox and a simple firefox plugin. Firesheep. read this post to know about firesheep and dowload it from that post. Firesheep 
use this tool to hack.


You can also try to hack primary email id hacking attached with the twitter account. But hacking a Gmail or yahoo account also need above method. Try above given methods and trick users to explore their passwords.

Disable Windows Messenger on a Windows XP machine

If you’re using MSN Messenger as your chat and videoconferencing tool, you may never use
Windows Messenger anymore and have removed it from the startup group to keep it out
of your way. However, you may have seen it pop up on occasion and had to struggle with
closing it down. The reason that Windows Messenger makes these impromptu appearances
is that Outlook, Outlook Express and even some Microsoft Web pages can still make it load
automatically. Fortunately, you can banish Windows Messenger from your desktop by making
an alteration to the local group policy with the Group Policy Editor. Here’s how:
1. Access the Run dialog box by pressing [Windows][R]
2. In the Open text box type Gpedit.msc and click OK to launch the Group Policy Editor.
3. Go to Computer Confi guration | Administrative Templates | Windows Components |
Windows Messenger.
4. Double-click the Do Not Allow Windows Messenger To Be Run setting.
5. In the resulting dialog box, select the Enabled option, and click OK
6. Close the Group Policy Editor.

How do I... Force Disk Cleanup to delete all temporary fi les?

If you’ve ever run the Microsoft Windows XP’s Disk Cleanup utility, you probably discovered
that your temporary fi les occupy a signifi cant amount of space. You might select the
Temporary Files check box in order to allow the Disk Cleanup utility to delete the fi les in
the Temp folder, but the Disk Cleanup utility will not remove all the fi les. The reason for this
oddity is that the confi guration for the Disk Cleanup utility does not allow deletion of fi les
accessed in the last seven days.
Alter the parametersBy altering the LastAccess value in the registry, you can confi gure the Disk
Cleanup utility to delete all the fi les in the Temp folder regardless of the last accessed date. Here’s
how:
1. Launch the Registry Editor (Regedit.exe).
2. Go to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Explorer\VolumeCaches\Temporary Files
3. Locate and double-click the LastAccess value.
4. When you see the Edit DWORD Value dialog box, change the Value Data setting from 7 to 0
and click OK.
5. To complete the operation, close the Registry Editor and restart Windows XP.
Changing the value to 0 will force the Disk Cleanup utility to delete all the fi les in the Temp
folder every time you select the Temporary Files check box.
Notes: Since editing the registry is risky, be sure you have a verifi ed backup before saving any
changes. This tip applies to both Windows XP Home and Windows XP Professional.

How do I... Use BootVis to improve XP boot performance?

Microsoft Windows XP was designed to optimize the boot process so that users can
boot their machines and access the operating system as quickly as possible. For the
most part, XP is successful. There is, however, almost always room for improvement,
and BootVis.exe, a free Microsoft utility, can help you get the best boot performance possible
from an XP system.
How the Windows XP boot process worksA main cause of slow boots with Windows NT/2000
was their method for loading drivers. Prior to XP, Windows versions loaded drivers sequentially.
Windows XP, however, loads drivers concurrently. It also records which applications are launched
during startup. This information is written to the C:\WINDOWS\Prefetch\Layout.ini fi le.
When the Layout.ini fi le is created, XP performs a partial defragmentation on the fi les listed in
Layout.ini. This defrag process attempts to make the fi les listed in Layout.ini available in one
contiguous area on the hard disk, allowing these fi les to be accessed, and the associated drivers to
be loaded, more quickly. This process is run in the background approximately every three days.
There are four factors affecting the defrag process:
• The system must be idle for XP to perform the defragmentation.
• There must be enough free, contiguous disk space to contain all the fi les listed in the
Layout.ini fi le.
• The partial defrag performed by XP will not create the necessary contiguous disk
space. That can be accomplished only by running a full defragmentation with the XP
defragmentation tool or a third-party disk utility.
• The XP defrag process will not use a third-party utility to perform the defragmentation.
Any external tools must be run on their own.
BootVis, which Microsoft describes as a “performance trace visualization tool,” actually performs
the same tasks as the XP boot process, except that BootVis allows the information obtained
during a single boot to be used for optimization, rather than monitoring the system over a
period of several days.
Download the fi le (http://downloads.techrepublic.com.com/abstract.aspx?docid=377428) and
then extract the BootVis.exe utility by double-clicking the archive fi le, selecting a location for
the Bootvis.exe fi le, and clicking OK.
Opening BootVis and running a traceTo run BootVis, simply double-click the BootVis.exe fi le
and the BootVis screen, shown in Figure A, should appear.
The fi rst step in tweaking or troubleshooting your boot process is to run a boot trace. Click
File | New | Next Boot + Drivers Trace. The Trace Repetitions window, shown in Figure B, will
prompt you for the number of repetitions (reboots and traces) to run. Go with the defaults and
click OK.

Disable Windows XP’s Error Reporting notifi cation

When Windows XP encounters a severe error that has the potential to crash the
operating system, it immediately halts the offending program and displays an error
message that says the application has encountered a problem and needs to close.
Then, the operating system prompts you to send an error report to Microsoft. You can avoid
having to click the Don’t Send button by disabling Error Reporting. Here’s how:
1. Press [Windows][Break] to display the System Properties dialog box.
2. Select the Advanced tab and click the Error Reporting button.
3. When you see the Error Reporting dialog box, select the Disable Error Reporting option.
(If you don’t want to see any type of error message, clear the But Notify Me When Critical
Errors Occur check box.)
4. Click OK twice — once to close the Error Reporting dialog box and once to close the
System Properties dialog box.

10 services to turn off in MS Windows XP

As long as Microsoft Windows has been a network capable operating system, it has come with quite a few
services turned on by default, and it is a good idea for the security conscious user of Microsoft’s
fl agship product to shut down any of these that he or she isn’t using.
Each version of MS Windows provides different services, of course, so any list of services to
disable for security purposes will be at least somewhat particular to a given version of Microsoft
Windows. As such, a list like this one needs to be identifi ed with a specifi c Microsoft Windows
version, though it can still serve as a guide for the knowledgeable MS Windows user to check
out the running services on other versions as well.
If you are running Microsoft Windows XP on your desktop system, consider turning off the
following services. You may be surprised by what is running without your knowledge.
• IIS — Microsoft’s Internet Information Services provide the capabilities of a Webserver for
your computer.
• NetMeeting Remote Desktop Sharing — NetMeeting is primarily a VoIP and
videoconferencing client for Microsoft Windows, but this service in particular is necessary
to remote desktop access.
• Remote Desktop Help Session Manager — This service is used by the Remote
Assistance feature that you can use to allow others remote access to the system to help you
troubleshoot problems.
• Remote Registry — The capabilities provided by the Remote Registry service are
frightening to consider from a security perspective. They allow remote users (in theory, only
under controlled circumstances) to edit the Windows Registry.
• Routing and Remote Access — This service bundles a number of capabilities together,
capabilities that most system administrators would probably agree should be provided
separately. It is rare that any of them should be necessary for a typical desktop system such
as Microsoft Windows XP, however, so they can all conveniently be turned off as a single
service. Routing and Remote Access provides the ability to use the system as a router and
NAT device, as a dialup access gateway, and a VPN server.
• Simple File Sharing — When a computer is not a part of a Microsoft Windows Domain,
it is assumed by the default settings that any and all fi lesystem shares are meant to be
universally accessible. In the real world, however, we should only want to provide shares to
very specifi c, authorized users. As such, Simple File Sharing, which only provides blanket
access to shares without exceptions, is not what we want to use for sharing fi lesystem
resources. It is active by default on both MS Windows XP Professional and MS Windows
XP Home editions. Unfortunately, this cannot be disabled on MS Windows XP Home. On
Performance 101 Microsoft Windows XP tips, tweaks, and hacks you need to know 8
MS Windows XP Professional, however, you can disable it by opening My Computer ->
Tools -> Folder Options, clicking the View tab, and unchecking the Use simple fi le sharing
(Recommended) checkbox in the Advanced settings: pane.
• SSDP Discovery Service — This service is used to discover UPnP devices on your network,
and is required for the Universal Plug and Play Device Host service (see below) to operate.
• Telnet — The Telnet service is a very old mechanism for providing remote access to a
computer, most commonly known from its use in the bad ol’ days of security for remote
command shell access on Unix servers. These days, using Telnet to remotely manage a Unix
system may be grounds for fi ring, where an encrypted protocol such as SSH should be used
instead.
• Universal Plug and Play Device Host — Once you have your “Plug and Play” devices
installed on your system, it is often the case that you will not need this service again.
• Windows Messenger Service — Listed in the Services window under the name Messenger,
the Windows Messenger Service provides “net send” and “Alerter” functionality. It is
unrelated to the Windows Messenger instant messaging client, and is not necessary to use
the Windows Messenger IM network.
On your system, these services may not all be turned on, or even installed. Whether a given
service is installed and running may depend on whether you installed the system yourself,
whether you are using XP Home or XP Professional, and from which vendor you got your
computer if MS Windows XP was installed by a vendor.
With the exception of Simple File Sharing, all of the above listed services can be disabled from
the same place. Simply click on the Start button, then navigate to Settings -> Control Panel,
open Administrative Tools, and from there open the Services window. To disable any service
in the list, double-click on its entry in that window and change the Startup type: setting. In
general, you should change services you are turning off for security purposes to a “Disabled”
state. When in doubt about whether a given service is necessary for other services, check the
Dependencies tab in the service’s settings dialog.
Obviously, this is not a comprehensive list of everything running on your computer that you
may want to turn off. It is merely a list of ten items that you most likely do not need to have
running, and constitute a security vulnerability if left running. Most users will never have need
of any of the services in this list, once the computer is up and running. Other services may be
disabled without ill effect as well, though you should research each item in the complete services
list before you disable it to ensure that you actually do not need it running. Some of them are
quite critical to the normal operation of your system, such as the Remote Procedure Call (RPC)
service.
Every running — but unused — service on your machine is an unnecessary security
vulnerability. If a service is not important at all for authorized users and basic system
functionality, turn it off. 􀂙

Hacking rapidshare for unlimited downloads.

HERE IS THE COOL METHOD TO HACK RAPID SHARE...

FOR FIREFOX:-
The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors.
The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment.
But most of the time, that advantage is available only to people with the programming skills to make the changes they want.

That's where Grease monkey, a free plug-in for Firefox, comes in -- it simplifies hacking the browser.

Released at the end 2004, Grease monkey is the latest in a growing arsenal of Firefox customization tools.
It changes how Web pages look and act by altering the rendering process.


http://greasemonkey.mozdev.org/

1) Install the Grease monkey extension>>
http://downloads.mozdev.org/greasemonkey/greasemonkey_0.2.6.xpi
2) Restart Firefox
3) Go to http://rapidshare.de/files/1034529/rapidshare.user.js.html
4) Right click on rapid share.user.js and choose "Install User Script".
5) Run Fire Fox.
6) From 'File' Menu click on Open File then browse to wherever you saved the 'greasemonkey.xpi' plug-in.
Open it, wait a couple seconds for the install button becomes active.
7) Click on it to install this plug-in then CLOSE FIREFOX.
8) Run Fire Fox again.
From the File Menu click on Open File then browse to wherever you saved the 'rapidshare.user.js'.
9) Open it.
10) Click the Tools Menu then click on Install User Script then click OK.
11) Close Fire Fox.

The script will let you enjoy "no wait" and multiple file downloads......!

Tuesday, 12 July 2011

download-Facebook Colour Changer 2009-02-05





DOWNLOAD: http://adf.ly/255B7

download-Internet Download Manager 6.07


DOWNLOAD: http://adf.ly/2553b

BEAST CRYPTER(SCAN TIME)1.1 FUD

here is my own personal crypter which is only scan time but FUD...
have fun enjoy...
BUILDER: http://adf.ly/241pG .
STUB:http://adf.ly/241q3
NOTE:-PLACE STUB AND BUILDER FILE SIDE BY SIDE TO WORK....
ENJOY
PLEASE COMMENT