Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Thursday, December 29, 2011

Few Google Tricks for Begineers

A few things you might want to try with Google:
Hand type the following prefixes and note their utility:





 
 
  • link:url Shows other pages with links to that url. 
  • related:url same as "what's related" on serps.
  • site:domain restricts search results to the given domain.
  • allinurl: shows only pages with all terms in the url.
  • inurl: like allinurl, but only for the next query word.
  • allintitle: shows only results with terms in title.
  • intitle: similar to allintitle, but only for the next word. "intitle:webmasterworld google" finds only pages with webmasterworld in the title, and google anywhere on the page.
  • cache:url will show the Google version of the passed url.
  • info:url will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box.
  • spell: will spell check your query and search for it.
  • stocks: will lookup the search query in a stock index.
  • filetype: will restrict searches to that filetype. "-filetype:doc" to remove Microsoft word files.
  • daterange: is supported in Julian date format only. 2452384 is an example of a Julian date.
  • maps: If you enter a street address, a link to Yahoo Maps and to MapBlast will be presented.
  • phone: enter anything that looks like a phone number to have a name and address displayed. Same is true for something that looks like an address (include a name and zip code)
  • site:www.somesite.net "+www.somesite.+net"
  • (tells you how many pages of your site are indexed by google)
  • allintext: searches only within text of pages, but not in the links or page title
  • allinlinks: searches only within links, not text or title.

Sunday, December 25, 2011

New Facebook Chat Smileys

  • [[171108522930776]] Troll Face 
  • [[164413893600463]] MEGUSTA 
  • [[218595638164996]] YAO 
  • [[189637151067601]] Lol 
  • [[129627277060203]] Poker face. 
  • [[227644903931785]] Forever ALONE. 
  • [[100002752520227]] OKAY 
  • [[105387672833401]] F**K YEA. 
  • [[100002727365206]] CH AC. 
  • [[125038607580286]] Forever alone navidad. 
  • [[143220739082110]] FK KIDDING ME. 
  • [[168040846586189]] Feel like a Sir. 
  • [[169919399735055]] NOT BAD 
  • [[142670085793927]] M O G. 
  • [[170815706323196]] Cereal Guy 
  • [[167359756658519]] NO 
  • [[224812970902314]] Derp 
  • [[192644604154319]] Derpina

Saturday, December 24, 2011

Must know things in HACKING


Hey guys , how you doing ? hope everything is alryt ! :)
Well some of my friends like ujjwal ;-) asked me about port numbers , IPs , and all those basics . So i thought it would be good if  i post a tutorial on these things .
I'll be explaining these things in brief .

INTRO


So here i start . I'll be explaining about IPs , Port numbers , port scanners , IP scanners , whois and archive.org in brief .
Because in network or web-hacking these are most fundamental and most essential information you are gonna use .


IP


IP is short form of Internet Protocol. Like we all have unique address and u can say phone numbers , every computer connected to any network , that might be internet or any private network , must have its own unique IP.

We track any computer through its IP only . There are two types of IP
  • Static ip - these types of IPs are generally assigned to organizations , like your college or university may have static IP.
  • Dynamic IP - these type of IP are assigned to private users like us . Dynamic IPs keep on changing.
To know about how to find IP of anyone check my tutorial on How to know the IP of your friend .


Port numbers

Port numbers are virtual ports on your computer on which different services are running . like when you browse internet , http - protocol for website browsing , uses port 80 .
When hacking a particular computer on any network , after IP address , port number is the most important thing you need to know . If our desired port is opened , we can exploit that according to our choice . Ports can be closed using firewalls.

Suppose someone says that some website's FTP password is this . now what he mean is , FTP : file transfer protocol , by which you can manage your files on a server via any ftp client , or via your command prompt or terminal , can be used using this password.
Now you must know how to use ftp via your command window. you use ftp command in both linux and window to get it done here is an example :
ftp www..com (23) //23 is optional as default port for ftp is 23

IP and Port scanners


There are lot of tools to know the computers which are connected to a particular network by scanning the network by any of these tools. You just have to give the IP range you want to scan for. I am listing some of the scanners below , these scanners shows you open PORTS too.
  • Angry IP scanner
  • LAN scanner
  • Advanced IP scanner
Just google them to download .


whois


First step in  a mannered website hacking is footprinting or information gathering.
whois is a very popular service used by hackers to get information about whatever website they going to hack.
How to use whois:
simple, just search google for whois , then go to any site and enter the website address there. It will show you details of the website . some usefull links are :
  • http://www.whois.com/
  • http://who.is/
  • http://www.whois.net/


archive.org


This is fun :) .
Go to www.archive.org and put any website address there and then click on TAKE ME BACK button . It will show you the history of that site , like when it was published and the dates when it was modified , how it looked back then. this is also a very good step in footprinting .

Guys plz comment and share and like .... thanks
Stay Tuned !!!!


Copyright © 2011. All rights reserved by “Kumar Sourav" & "xeo hacker"




Tuesday, December 20, 2011

Setup a LAN on your virtual box with video


LAN on your PC


hey guys how u been ? hope everything's fine.

anyway what if you want to experiment or check some attacks and you dont have 2 computers ... well you can use virtual box to setup a lan there :D
its great. give it a try :)


VIDEO


guys like and subscribe the videos plz !



command used


ifconfig eth0 192.168.1.2 netmask 255.255.255.0

Guys plz comment and share and like .... thanks
Stay Tuned !!!!



Copyright © 2011. All rights reserved by “Kumar Sourav" & "xeo hacker"

Wednesday, December 14, 2011

Vulnerability in Ajax File Manager - Upload Shell

AJAX is about updating parts of a web page, without reloading the whole page.



 
  •  First of all open Google Search Engine.
  • Now type this google dork in it inurl:/plugins/ajaxfilemanager/ 
  • Now hit Search and open any website shown in the result.
  • Now Put  ajaxfilemanager/ajaxfilemanager.php after /plugins/ in url.
  • It will look like as below :
  • Now Find Upload and Upload Your shell/Deface/file 
  • To view you File find /Uploaded/ directory in Website by using your brain.

Sunday, December 11, 2011

How to increase Facebook page likes - G+ ones - Twitter Followers

How to Change Status Of Someone's Facebook Account

Most of us know that Facebook allows us to update our status using our mobile phone. This feature is called Facebook Text. If you have Facebook Text enabled, you have to just type in the status and send this message to “923223265? using your registered mobile phone. Facebook will automatically update your status.
IMPORTANT!! :The slave MUST have the Facebook Text feature enabled in their account , if they don't then this will not work

So, in this Facebook hack, we will use SMSGlobal to change the status of your friend. SMSGlobal allows us to send message to any number from anyone’s number. That is, we will send Facebook a fake SMS from your friend’s registered mobile number.

Facebook will think that the message has been sent by your friend and his status will be updated according to the message contents sent by us.

  • Go to SMSGlobal.com and register for an account. 
  • After logging in to your account, click on “Send SMS to a Number”
  • Enter the information as follows:
Send SMS To: 919232232665
Sender ID From: The registered mobile number of your friend.
Message: The status you want to update for your friend. Enter anything you want. It will appear as your friend’s new status.
  • Hit on Send SMS. 
  • Now, Facebook will update your friend’s status to the message you have sent.

Saturday, December 10, 2011

What is Backdoor ? How to use Backdoor

Using backdoor, hackers can remotely access your computer without any Authentication and do whatever the hacker wants. I will tell you some of the features rest of them you need to try it and find out. These Programs :




  • Work as a key logger.
  • Send any Information from Victim’s PC to the Hacker’s PC.
  • Run any program on the Victims PC.
  • Display any Violating Image on victim’s Screen.
  • Open the CD Drive of the Victim’s PC.
  • Open any Web page on the Victims Screen.
  • Disable any Specific Key or whole Keyboard.
  • Shutdown Victim’s PC.
  • Start a Song on the Victim’s PC.etc.etc…………..
The best backtrack I found is Back Orifice so I am going to discuss it.

Back Orifice

Back Orifice is one of the most common backdoor programs, and one of the most deadly. The name may seem like a joke, but sure, the threat is real. Back Orifice was established in Cult of the Dead Cow group. Back Orifice is an Open Source Program. The main Threat of this software is that by making some changes in the code anybody can make it undetectable to the Anti virus Program running on the Victim’s computer. Apart from the strange title, the program usually gets port 31337, the reference to “Lit” phenomenon is popular among hackers.
  • Basics Back Orifice consist of 2 main parts. The "client" and the "server". 
  • The client is the part of Bo2k that you use to control the other party's comp. By defult, it's bo2kgui.exe 
  • The server is the file you install in the other party's comp in order to control it. By defult, it's bo2k.exe. 
  • Never ever run bo2k.exe on your own comp unless you know what you are doing. 
  • Another ipmortant component is plugins. To put it simply, Plugins are addon for Bo2k. They enhance the power of Bo2k.
  • For a list of plugins for Bo2k, goto the Bo2k official Site. 
  • In order to control the other party's comp, you must first sent the bo2k sever to the other party, and once the other party runs it, you just start your bo2k client and using it you can assert your control. 

How to use Back Orifice ?

How to use it? First you must configure both the client and the server. First let's configure the server.
  • Download a copy of Bo2k and unzip it. 
  • Then run the file bo2kcfg.exe. 
  • A window will appear welcoming you to the bo2k configuration wizard.
  • Click on next (For those experts, they don't use the wizard, they configure it manually.But one thing at a time first.) 
  • Then the wizard will ask you for the bo2k server file(that's bo2k.exe). 
  • By defult you just need to click next. However if you rename it or kept it in another folder, go browse for it. 
  • Now it will ask you if you want TCPIO connection or UDPIO Connection. I would recommand TCPIO. 
  • Now they will ask you what port you want it to listen to. More popular ones are 6666, 54321, 33137, 31336 and 4444. Try to advoid these. Try putting a number that you can remember easily. Avoid 12345, 1080, 8808. 
  • Now they will ask you for your encryption type. Usually you get only to choose the XOR option. Do not choose 3DES if you are not in US. 
  • Now they will ask you what password you want to use.Choose one and remember it. 
  • Then click finished. The wizard will auto config the Client part for you. Be patient you can use it soon.
  • Now sent the server part(bo2k.exe ) to the other party and when the other party runs it, you will be able to connect to it. 

What to do when victim clicks on server ?

  • Start bo2kgui.exe. 
  • Click on file, then new server. 
  • Type what ever name you want to call it. 
  • Now type the ip address of the other party. If you don't know it,then you are out of luck. 
  • If the other party is on irc, just goto irc and type /dns and you will get the ip (plz dun include the <> when typing /dns). 
  • Now click on connect. You should see a window saying "Retriving server capability. Please wait.."
  • However if you see "Cannot connect to Remote server" that means the other party either did not run the Bo2k.exe or he is behind a firewall or maybe he has gone offline. Then you are out of luck. :) 
  • One you have connnect, on the right window you should see some folders. I will explain the functions inside the folder in the next post .

Download Back Orifice 2000

  • Back Orifice 2000 can be downloaded at the following address: http://sourceforge.net/projects/bo2k/

How do I delete Back orifice 2000

Removing Back Orifice 2000 may require that you change the registry settings. To remove it at 7 simple steps, refer to the diagram below.
  • Click Start> Run, and type “Regedit”(without the quotes)
  • Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “
  • Now looking in the right box: “The umgr32 = ‘c: \ windows \ system \ umgr32.exe”
  • Right-click on this entry and click Remove. Now restart your computer.
  • After restarting only open Windows Explorer. Make sure you can see all registered extensions. To do so, select “View Options and configure the appropriate settings.
  • Go to the WINDOWS \ SYSTEM directory, and find “umgr32.exe” file. Once you find it, delete it.
  • Exit Windows Explorer and reboot again
NOTE : Only for educational purposes and If I got good response on it ,I will furthur explain the functions of folder and also how to add plugins in it.So give your comments if you like it !!!

Underscores vs dashes in URLs - Which is Better?

The best thing I love about webmaster team is Matt Cutts video tutorials. He discusses SEO Tips and removes misconceptions and myths being wrongly propagated by several SEO agencies. I am proud of Google's great customer service.  We all write post titles daily and these titles are responsible for driving most of the traffic from search engines. People often don't realize that every single character in the title has its own significance. Titles that are called the king are only those which are highly optimized in terms of keyword choice, word limit and use of Special Characters that we will be discussing today.

What is an optimized title?

Any title which has these features:
  • Title containing no more than 66 Characters.Use one liners
  • Title containing simple daily used English words. You don't need to use complex Vocabulary and no need to consult a Thesaurus for writing titles. Just apply the rule of KISS (Keep it simple Stupid). Average internet user always go for words that sound familiar in search results page.
  • Select choice of words from Google Keyword Tool. Ignore word Tracker
  • You can use the following symbols frequently:     -  :   !  ?     
  • Use the following symbols rarely:  . &  %  # |
  • Never use the long Dash or Underscore i.e.  _     

Lets See What Google Says

Matt Cutts from webmaster help suggests that Underscores should always be avoided because Underscores are normally used by programmers while writing algorithms and is often misinterpreted by search robots. He suggested that dashes are much better to act as separators. Lets see what else he said:

Thursday, December 8, 2011

How to Download Any Torrent File With IDM

Downloading files from the Torrents site is easy and its legal (unless you are downloading copyrighted files). But the downloading speed from torrents depends upon many factors like seeders, leechers, internet connection etc. So if you have high speed internet connection still it happens sometimes that you are not getting good downloading speeds.Here is the solution for this problem, you can use IDM to download them.There are many methods on the internet to do this but this is the easiest, simplest and tested method, which I come to know just 2 minutes before by one of the member of our Facebook group named Rahul Ramachandran .

How to Download Torrent Files with IDM:

  • First of all,Search and Download the torrent file (.torrent) of your desired file from any site,like I am using Torrentz .
  •   After downloading the file, go to Torcache and browse the downloaded torrent file and then click on the cache button.
  • This will generate a new link for your torrent file.
  • Now just copy that new link from the opened window as shown in below image.
  • Now go to the Torrific and create a free account there if you don't have already and log in your account. 
  • In the text field paste the address of the new torrent file obtained in 4th step ( also shown in above image ) and click on "Get" button.
  • After clicking the GET button ,you will get the list of available files that are present in that torrent file.
  • Now Click on initiate bittorrent transmission button.
 
  • This will give the full option to download all the available files. Just click on any link and you can see the download manager IDM popping out for downloading the file.
  • Now enjoy the ultimate Speed of IDM for downloading torrents too.
  • Now Start Downloading your file.
NOTE : The maximum limit is 100 MB per file,you cant download the files above 100MB.Secondly, You should use this method only if you are getting very poor speed with your torrent client because if you download it with IDM the link will not be resumable and you have to finish it without breaking your internet connection.

Tuesday, December 6, 2011

Latest Shortcut Keys for Facebook

If you spend a lot of time on Facebook as we know we all do then why not spend this time more efficiently and quickly.There are some keyboard shortcuts for Facebook which are specific to browser.Using these shortcuts you can easily create new messages,view account settings,View notifications etc .In the beginning its a little difficult to use them but once you get familiar with these shortcuts then you will really feel easy to navigate on facebook.So today I will share some Facebook shortcut keys with you guys for Google Chrome, Firefox and Internet Explorer.There is also a trick to create custom shortcuts keys for your computer programs.

Here is a comprehensive list of Facebook Shortcuts for each browser.

Google Chrome Facebook Shortcuts

  • Alt+1: View your News Feed
  • Alt+2: View your own Profile
  • Alt+3: View pop-up of friend requests
  • Alt+4: View pop-up of messages
  • Alt+5: View pop-up of notifications
  • Alt+6: View Account Settings
  • Alt+7: View Privacy Settings
  • Alt+8: View Facebook’s own profile
  • Alt+9: Read latest Terms of Service agreement.
  • Alt+?: Search
  • Alt+m: Compose a new message

Firefox Facebook Shortcuts

If you are using Firefox browser then you also need to press SHIFT along with the above shortcut keys.

  • Shift+Alt+1: View your News Feed
  • Shift+Alt+2: View your own Profile
  • Shift+Alt+3: View pop-up of friend requests
  • Shift+Alt+4: View pop-up of messages
  • Shift+Alt+5: View pop-up of notifications
  • Shift+Alt+6: View Account Settings
  • Shift+Alt+7: View Privacy Settings
  • Shift+Alt+8: View Facebook’s own profile
  • Shift+Alt+9: Read latest Terms of Service agreement.
  • Shift+Alt+0: Open Facebook Help Center
  • Shift+Alt+?: Search
  • Shift+Alt+m: Compose a new message
NOTE : If you are using Internet Explorer then you you can use the Facebook shortcuts of Google chrome but you have to press ENTER after each shortcut .

Friday, December 2, 2011

Hack your desired PC on LAN

As I have told in my previous post Simple Commands for LAN Hacking for Beginners that these days I am working on LAN Hacking so guys here is my new post in this respect .Hope you guys love it .Dont forget to Change your IP Address if you want to remain safe but its not compulsary.Through this technique you will be able to hack your desired PC on LAN .

This technique will be taking advantage of Port 139.Most of the time,Port 139 will be opened.But if unfortunately your victim's Port 139 is filtered or closed then you can't hack him by this method .So guys follow these steps carefully and at the end you will be able to hack Lan computers.
NOTE : All the tools used in this tutorial have already been sent to all the Email subscribers to their emails,but if someone didn't got it then post your email in the comments and if we find that email in subscription list we will send you all the tools.

Steps to Follow

  • First of all,I will do a port scanning at the target computer which is 192.168.40.128.This computer is inside my LAN network. 
  • Scan it using Nmap, this is actually for checking either its port is opened or closed.
  • I get the result and it shows Port 139 is opened up for me. 
  • Now we will need both of these tools:
  1. USER2SID & SID2USER
  2. NetBios Auditing Tool
  • I have already sent these tools to all the Email Subscribers.
  • After you get both of them,put them in the C: directory.
  • Now you need to create a null session to the target computer.For this open cmd prompt and write this below command as it is as shown in image below :
  • Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER. 
  • We will first using USER2SID to get the ID.Just follow all the codes same as shown in below image ,just replace the IP Address of victim
  • We will test against the Guest account because Guest account is a built in account. 
  • After we get the ID,we need to do some modification on the ID.
  • We take the ID we get from the guest account and modified it become "5 21 861567501 1383384898 839522115 500".
  • Please leave out the S-1-,leave out all the - too.
  • Now you will see that you get the username of the Administrator account.
  • In this case,the Administrator account is Administrator.

MAIN PART

  • Now we are going to crack the Administrator account for the password in order to access to the target computer. 
  • First of all,extract the NetBios Auditing Tool in C directory, which you have received in your email.
  • Now open cmd prompt and write the below code as it is :
  • Press on enter and the tool will run and finally you will crack the password.

  • In this case,I have get the password. 
  • In order to proof that I can get access to the target computer using this password.
  • After you press enter,it will prompt you for the username and password.
  • Therefore,just input them inside the prompt and continue.

  • Target C drive will be on your screen.You are done ....

Prevention

  • In order to prevent from this attack,close down port that you do not want to use such as Port 135,Port 136,Port 137,Port 138 and Port 13.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers