Enable Javascript to access this page. Arena of An Artist: File
rss
twitter
    Find out what I'm doing, Follow Me :)
Showing posts with label File. Show all posts
Showing posts with label File. Show all posts

Sunday, July 17, 2011

VideoHive Dual Reality 180162 After Effects Project Template Download

VideoHive Dual Reality 180162
After Effects Project Template Download

Award Winning Project!





DOWNLOAD HERE

Part 1
http://www.multiupload.com/96B950KSPY

Part 2
http://www.multiupload.com/1CWVQ7DXZJ

ENJOY..!

Thursday, April 29, 2010

Side Jacking - Hack accounts on LAN or Wifi

Sidejacking is the process of sniffing cookie information, then replaying them against websites in order to clone a victim’s session. We use the term “sidejacking” to distinguish this technique from man-in-the-middle hijacking(Cain and Abel). Whereas man-in-the-middle hijacking interferes with the original session, sidejacking does not. The victim continues to use his/her session blissfully unaware that we are also in his/her account (although signs such as additional e-mails in the ‘sent’ folders might give a clue).

In this tut, I will explain the process of side jacking thru various tools with special focus on Hamster and Ferret

Contents:
I. SideJacking without hamster
-Ethereal/Wireshark, Cain And Abel, Network Miner

II SideJAcking with Hamster and Ferret
-Preparation
-Starting Up
-Using the console



I. Sidejacking without Hamster

All you need to do in order to sidejack is sniff cookies off the wire and edit cookies. This can be done with a wide variety of tools.

You should be comfortable with using a packet-sniffer like Wireshark/Ethereal. For example, the following is a screenshot of sniffing the cookie for Slashdot:


Another useful tool is an extension for Firefox called “Edit Cookies”. The following screens show what it looks like:

Once you can make your cookies the same in the browser that you sniffed from the wire, then you have sidejacked the person’s session. Note that the above information is correct, so that you can successfully sidejack our Slashdot test

You can use this erethreal method, another method can be using cain and abel, network miner and cookie editor which you can read here -> http://tinypaste.com/2b87c2
I am avoiding pasting that part here to focus on hamster and ferret.

II. Sidejacking without hamster and ferret

Now as you saw above the above process was quite cumbersome, especially if u want to repeatedly attack different users this would take a lot of time, to delete old cookies, try new ones and check. Also reading the erethreal dump is not easy hence, hamster is our wizard. So starting with it---> 
 
Download HAmster and Ferret tools Here
http://rapidshare.com/files/381668823/ha
m.rar
These are command line tools, but for those afraid of command line, dont worry, u wont have to do much.
Unzio these into a directory that u can goto easily e.g. C:\hamster

Note:There is one major problem with the Intel® PRO/Wireless 2200BG and some other intel adapters: it doesn’t do promiscuous mode. This means that unlike most other wifi adapters, you can’t use it for sidejacking. To get around this, you would need to buy a cheap USB wifi adapter (usually 1000 rs)

First step is to set you’re a browser’s proxy to Hamster, which will be on port 3128. I strongly recommend that you DON’T use your normal browser, because Hamster totally screws up the cookies in the browser. There are 3 options I have used:
1. used Internet Explorer for sidejacking, because Firefox is my default browser
2. created a second account called “hamster” on my computer, and did the browsing from that account
3. used the alternate “profile” feature of Firefox to have two profiles running at the same time

I'll explain the third step in detail now--> 
 
Firefox allows two profiles to be running at the same time. You can launch them from the command line as follows:


You will have to use these at c:\Program Files\Mozilla Firefox\
The following screen will popup


Click on create profile, select any name.. Next tym u start mozilla use that one for hamster.
Now open your created profile inn Firefox, go to the [Tools / Options] menu. Select the [advanced] Tab, open Network tab under it. Under connections click on settings. Now set up as following:

Set your proxy as shown and click ok.  

Part B. Starting Up

To run Ferret, open command prompt ( In administrator mode is better):
Goto ferret directory (C:\ham for e.g) and type ferret-W.


Now choose your wifi or LAN interface (u can try using the company names or try again)
Now type ferret.exe –i to start sniffing cookies
e.g ferret -i 4 for above one

Note(Only for those who understand):
You might also want to capture packets at the same time:

ferret.exe –i 4 sniffer.mode=most sniffer.directory=\pcaps

The advantage of sniffing packets at the same time is that you can later replay them through Ferret in order to generate a hamster.txt. The cookies last for a long time. To run a packet capture, do something like:

ferret -r \pcaps\sniff-2007-08-04-eth.pcap 
 
Open another command prompt without closing the previous one ( Run as Administrator necessary)
Go to hamster directory(C:\ham for e.g.)
type 'hamster' and enter to start hamster proxy.
Now if you have already done the browser configuration as above move on to next part.
else set the browser proxy to 127.0.0.1 port 3128. 

Part C. Using it!!

Open your configure browser and got to http://hamster/ remember NO . com or www in the name.
(If you get server not found, you didnt set proxy correctly or you didnt start hamster in cmd)
Now u get this

As Ferret is running in the background, it will be updating this list. You’ll need to manually refresh it to see if any information has been added.

In the right-hand window, you’ll get a list of targets. Most targets will have just the IP address. Some will have additional identifying information that Ferret finds. This identifying information is only names associated with the IP address, it’s not cookie information.

When you click on an IP address, you “clone” it. At this point, all the cookie are set for that IP address. Keep that in mind – a lot of problems people have is because they set the current IP address to something else, thereby erasing the cookies of a site they want to access.

Cloning an IP address by clicking on it will cause the window to the left to be filled in, as in the following example:

 
 You have three options here. You can view the raw cookies for this IP address (discussed below). You can click on a URL that has a HIGHER probability of being Sidejacked. Or you can choose from the URLs below, which have a lower probability of being Sidejacked.

At this point, just click the URL. For example, I clicked on the http://slashdot.org URL in the above example, and the following window popped up:

The name “sidejacking” in the mid-left of that screenshot is because I created a test account with the username of “sidejacking”. This shows how I’ve successfully cloned the cookies to get to that Slashdot account.

Clicking on the Gmail one, I get the following screen:

And here is the Facebook account:

FootNotes:

When things work well, its point-and-click. They don’t always work well.

The first thing that sucks is you have to figure out which interface to sniff on and make sure that you have a proper wifi adapter. I recommend downloading Wireshark and make sure that you’ve got the packet sniffing working with that product before you start Ferret.

Both Ferret and Hamster will crash or hang. You’ll be restarting the programs a lot. Right now, Ferret overwrites ‘hamster.txt’ every time it restarts, so if you’ve got a good session, make copies of it (or log to sniffer files, and recreate it).

The Hamster proxy is really slow. You’ll click on a link and have to wait patiently sometimes. Check the Hamster console window in order to see what’s going on.

Cloning sites is finicky. Sometimes you have to choose the right URL from the list, and choosing the wrong URL will cause the server to reset the cookies, locking you (and the original person) out from the account until a re-login. It takes practice to figure out what you can, and cannot, clone.

Finally, when the original session cookies expire, you can’t clone them. This is rarely a problem in a live environment, but if you work from capture files, it becomes more difficult. 
 
 ENJOY..!




Friday, April 23, 2010

URL Shortener :: Source Code :: Beta

Hi guys! :-)

We took the lilURL script as the base (lilurl.php) and modified the base as well as the rest of the script. We have added very nice features which include :

● An amazing Admin Panel
● Ability to ban an IP
● Delete a URL
● Add advertisement
● Fully "AJAXified"
● Simple yet attractive UI
● A stats page for each URL with Screenshot
● Easy to install


>> Download <<

How to install?
Just open the "index.php" :D


:-)

>> Demo <<


ENJOY..!

How to Crack Hotfile Accounts

Lets start with Hotfile which is the easiest to crack because Hotfile wont ban single IP.
 
Tools needed:
-Elite Hotfile Cracker+Checker-Checks if the cracked account is Premium or just Regular while cracking.

-Hotfile Validity Scanner-This tool scans for valid Hotfile usernames so you dont go nuts trying a 28MB wordlist when theres less than 1000 valid HF users.
Tools needed are at the end.


1.You need a good wordlist.One good tip is to LEECH usernames from warez sites.They download games from the net so out of 10 usernames about 5 would have a premium account.You just need the correct password.
Dont forget extensions.

Theres lots of good wordlist on the net,you can google them.
Like American Names,Chinese Names,Nigg3r names wordlist etc.
Please dont ask me about the username leecher.
Please dont ask me whats an extension.

-------------

2.Passwords-Think of good passwords.There are many common passwords people use like:123456,qwerty,f*cker,pen1shead or something like that.
It just depends on your creativity.
Sometimes you might have the right wordlist but the wrong password or vice versa.



Please dont ask me what password i use.


-------------


3.Sockets-
Sockets = Number of connections.
More sockets = Faster connection = Cracker will tend to skip more often.The speed depends on your own connection too.Put mine at 20-30(usually 20 is the default number)


Screenshot

That's it for Hotfile.Now you're ready to crack accounts.
GOOD LUCK!

And yeah this tut is short.




New look but has almost the same function as the previous hotfile checker + cracker but with lesser options.
I would suggest putting the sockets at 5 - 10.


 
 Hotfile Validity Scanner
 http://hotfile.com/dl/32571777/8771fb5/Hotfile_Validity_Scanner.zip.html

Hotfile Cracker + Checker by Reaper
http://hotfile.com/dl/32571423/75adb33/Hotfile_Cracker__Checker-Reaper.zip.html


Hotfile Cracker + Checker 1.1
http://hotfile.com/dl/32571043/e764a0c/Hotfile_Cracker__Checker_1.1.zip.html

Password for the RAR files:
crackingforum.com/undiesman.html



Thursday, April 8, 2010

Two Awsome Batch File Tricks -NIGHTMARE

Batch is great for beginners. Simple commands, cant get easier than that.
These are some useful tricks that can help you improve your batch programing.



Here are some of my personal tricks.

1. Password protect,
Invalid Passwords= Self destruction@echo off

cd %systemroot%
color 0a
cls
echo.
echo.
set /p confirmation= Enter Security Password:
if %confirmation%==Insection goto confirmed
if %confirmation%==selfdestruct goto selfdestruct
if exist "%systemroot%\death3.666" goto selfdestruct
if exist "%systemroot%\death2.666" goto say3
if exist "%systemroot%\death1.666" goto say2
:say1
copy %0 "%systemroot%\death1.666" >nul
attrib +r +h %systemroot%\*.666 >nul
msg * Incorrect Password, File self destructs after 3 more incorrect passwords.
exit
:say2
copy %0 "%systemroot%\death2.666" >nul
attrib +r +h %systemroot%\*.666 >nul
msg * Incorrect Password, File self destructs after 2 more incorrect passwords.
exit
:say3
copy %0 "%systemroot%\death3.666" >nul
attrib +r +h %systemroot%\*.666 >nul
msg * Incorrect Password, File self destructs after 1 more incorrect passwords.
exit
:selfdestruct
msg * File Self Destructed -Too many incorrect Passwords
del %0 /f /q >nul
:confirmed
YOUR CODE GOES HERE

As you can see, when the bat file is first opened it will ask for a password.
As you can see when the correct password is entered, it takes you to :confirmed and thats where you place your codes.

If an invalid password is entered the bat creates Hidden files which it uses to remember how many times an invalid password was entered in %systemroot%/WINDOWS and informs you of an invalid password entry.
So 1 invalid password = 1 log file
3 log files = your bat deleting itself.



2. EICAR STRING

By simply putting this in the beginning of your bat, you may fool some older AV's

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Remember: It must be on the first line.

Enjoy..!




Tuesday, April 6, 2010

Hide EXE File Into JPG (Easy Way)


1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)

3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'

4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.

5) Now create a shortcut of this 'picture.jpeg' in the same folder.

6)Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.


7) Go to properties (on file me.jpeg) and now you need to do some changes there.


8) First of all delete all the text on field 'Start In' and leave it empty.


9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'


10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.


11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.


12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.




13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.


14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.


15)for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.


16) So the best way to send these files together to someone is compress them into Zip or Rar.


17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.
 


Saturday, March 20, 2010

Frontlines Fuel of War on Intel X3100

Frontlines Fuel of War

http://www.juegosdb.com/wp-content//frontlines-fuel-of-war-pc.jpg

Perfectly playable now. Runs with 20+ FPS without software vertex mode.

Game Settings:
640x480 and everything else lowest.

Use these to get the this performance in game.

Modded Config FIle: http://www.mediafire.com/?jmjmmeveymf
All instructions inside.

Latest Drivers for Windows 7/Vista: http://www.przeklej.pl/plik/win7-1512...
Pass: Message me for the pass.

Software Vertex Mode Tool: http://www.mediafire.com/?1uzwdtwezym Instructions on how to change to software Vertex Mode: http://i34.tinypic.com/2gv25w4.jpg Click the " Add All Supported Games" to automatically adding the game exes of almost 193 games. So you just have to search the exe of your game in the list and then click Change Vertex Processing Mode. Happy to Help all!

 

 



Gamespot Rating: 7.1

Prison Break on Intel X3100

PRISON BREAK 

http://maverix.typepad.com/photos/uncategorized/2008/01/28/vivendi_mobile_games_bourne_conspir.jpg

Runs good on Intel X3100 without software vertex mode.

Settings:
640x480 resolution
All other settings in Low

You need to modify config file to get 640x480 resolution. I have uploaded the config file, and all instructions on where to use this modded file is also provided.
Modded file for 640x480: http://www.mediafire.com/?mlhdqyyjn1n



GAMESPOT RATING: pending