Enable Javascript to access this page. Arena of An Artist: trick
rss
twitter
    Find out what I'm doing, Follow Me :)
Showing posts with label trick. Show all posts
Showing posts with label trick. Show all posts

Saturday, February 26, 2011

Don’t fall prey to mobile spoofing

Have you ever received a weird SMS from a friend which he or she later claimed never to have sent? You are lucky if you haven’t because more and more people in the city are falling prey to mobile spoofing where one can send SMS from any number without touching the actual phone. All one needs to do is to login to a certain website, register and start sending messages to any one in India with someone else’s mobile number.
After Internet Protocol (IP) or caller ID faking, mobile spoofing is the new security threat that has hit the country. Though the technology has been around for sometime, it is of late catching up with youths in the city. Ethical hackers warn that while many youngsters think they are playing a prank, it may turn out to be a major security risk if some terrorist or anti-social elements get involved in it.

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsIPzk3RCPwuMvC6bHXnN8NI4If6kILfP-ch0IzTeuSKA5bVb6qITFTeaKvfDJI25R6CNp0lt4ik8ulueFAi2lMdP2vFdE3l93bl4O6Qyj5CjDUeLUr8q-eJRDREosSuRCqHH8aReDbPM/
According to cyber crime experts, the person receiving the SMS will not know whether the message is fake or not. The websites facilitating mobile spoofing exploit certain security vulnerabilities to obtain access to the SMS-Internet tunnel by creating a malicious code. Even the mobile service provider is not aware when the network is being misused.
Says additional SP (cyber crimes) U. Rammohan, “We can trace the sender of the fake messages through the IP address, but it is quite a challenging task,” he points out.
Mobile spoofing websites offer both free and paid SMS spoofing services. The popular websites among youngsters are: xxsidxx.co.cc, fakemsg.com, fakemytext.com, www.sneaksms.com and sms.fake.com. There’s also a dedicated software called “SMS spoof” which is freely available on the Internet.
Ethical hackers blame mobile companies for this. “They need to set up advanced authentication mechanisms. SMS servers are hugely vulnerable since they are not properly secured,” observes networking security engineer M.M. Ganga Raju. “The only way to detect and block spoofed messages is to screen incoming messages to verify that the sender is a valid subscriber,” he adds.
“You can send an SMS from a website to a woman using her husband’s number informing her to hand over money to a person he deputes, because of which chances are that she may hand over the money to the impostor,” says ethical hacker M.V. Rama Rao.

Tuesday, February 22, 2011

Bypass Trial Version Limitations In Any Software

Have you ever downloaded any trial version software and it may have expired before you could have tested it for its full capabilties. In this trick I will explain to how you can use the trial version of any software over and again so that you can test the software properly before purchasing its full version.Basically there are two type of restrictions put by the software companies on trial version of softwares.

1.Disable some features of the software

2.Time Bound limitations like 5-days Trial version

This trick can extend only your time bound limitations hence provide you with the capability to use the trial version of the software for as long as you want.

Another big advantage of this trick is that it will increase your system security.For this trick we will be using a freeware software called sandboxie which very small(500 kb).It would protect your computer from malware andspywares to make changes to your system. Sandboxie runs the softwares in an isolated enviroment so that they cannot make permanent changes to your system.Here is the graphical representation of the programs running with sandboxie in memory.



Now,here is the step by step tutorial with screenshots on Trick To Bypass Trial Version Limitations In Any Software


1. DOWNLOAD
2. Install and run it.
3. Click on the Sandbox -> DefaultBox –> Run SandBoxed and then click on Run Any Program

Now a new window will popup.Click on Browse

Locate the setup of the trial software you want to install.Click on open
This will open up a new window and delete all the files created, Press the Delete Sandbox button to fully clear the contents.

Now reinstall the software as mentioned above and you will again get the full trial version.

Note:

1.This trick will not work if you have already used the full trial version of the software without sandboxie.

2.Sandboxie may crash if you run very large programs with it

Disclaimer:This tutorial is only for educational purpose and do buy the softwares to get the full capablities of the software.


Install the software and run it.You will see # in the software tittle bar.It indicates that the software is running under sandboxie.



7. You will get the trial of the software and the trial version will expire after the time bound limitation is over.
8. To reuse the software again after the trial version is over click on Click Sandbox –>DefaultBox andclick Delete Contents.

(Note icon biggrin Trick To Bypass Trial Version Limitations In Any Software onot let the software expire.Do these steps before atleast 1-day of the trial software is left.otherwise the above trick may not work )


This will open up a new window and delete all the files created, Press the Delete Sandbox button to fully clear the contents.



Now reinstall the software as mentioned above and you will again get the full trial version.

Note:

1.This trick will not work if you have already used the full trial version of the software without sandboxie.

2.Sandboxie may crash if you run very large programs with it

Disclaimer:This tutorial is only for educational purpose and do buy the softwares to get the full capablitiesof the software.


To run any application installed in sandbox

1)Go to the folder where you have installed sanboxie. Suppose it in F:\ drive.
2)Open "Sandbox" and enter your profile(say my profile is vks in sandboxie so I go to F:\Sandbox\vks )



3)Open the box in which you installed your app. by default you should install in the "Default box"(if you didnt create any other)


4) Now open the folder "drive".In it you'll see your drives.Go to the one you installed your application in and then create a shortcut to the exe of the application on your desktop




Wednesday, December 8, 2010

BSNL website HACKED by Ashish :)

BSNL Hacked by Simple SQLi .. Never thought this much BIG Govt. site will be vulnerabe to suach a Chindi thing :P


http://www.topnews.in/files/BSNL-India-.jpg

See Yourself.. 

go here
LINK 1

or
 

LINK 2

simply Enter

' or '1'='1

In password field

and





ENJOY..!
 
NOTE: It is for educational Purpose Only

Friday, May 28, 2010

Crack WEP on Windows without linux, supports

This is what you need:
1. Commview 6.2(it supports intel 5100 & 5300)
- this is a direct download, i copied the url from IDM.

2. Aircrack for windows:
http://www.aircrack-ng.org/
PICTURE:
http://www.dll-files.com/dllindex/dll-fi...ml?cygwin1
INSTALLATION:
1.Install commview 6.2, install like any other regular program.
2. extract aircrack zip file to root, which is "C" for most computers
3.now extract peek zip file to the bin folder which is in aircrack like this C:\aircrack folder\bin.
4. and extract dll file to bin folder also.

You will be overwriting some files, just click yes to overwrite them.
I recommend making a shortcut for aircrack GUI.exe, because your going to use it alot.
Now go take a 5 minute break.

OK back from break? Now get ready

Real WEP capturing steps:
1. open commview 6.2 and click the M and the C to shade them and then click play.(The D should be unshaded )

2.Now click start scan, choose band "i use the b/g/n" and then click capture don't worry.
3.Now wait about 2 minutes and right click and copy mac address of the wep network with the most packets or best signal.
4. Enable MAC address rules, action: capture, add record: both, paste mac address, then click add mac address(look like pic except the mac address, will be different)
5. Final steps in configuration
Click logging tab, make sure auto saving is checked, and increase size to 150 or higher, this can be adjusted later and leave logs directory as is.(I did 1,000,000 mb = 1GB, because of capturing 13 networks at a time).
NOW WAIT until you get about 1million through 2 million packets, or just record overnight for atleast 2 night. Then continue.

AS you can see I have collected keys for about 1 week on and off, becuase of torrent download

PART 2

1.click logging tab and save all packets in buffer, then click concatenate Logs. and select all logs and save in folder.(I saved in a new folder called binded and you can see theere from different days)
2. Open log viewer, by pressing ctlr+L or going to file in top right corner.

3.Load commview logs, should look like this pics when loaded.(I have 189518 keys, out of almost 2 millon packets ) 

5. Your done with commview, but i recommend to leave open to get more packets just in case.

PART 3
1. Open aircrack GUI.exe
2. now click choose, and go find the .cap file you saved.

3.click launch and click the one you want, i wanted the first one so i choose 1 and press enter.(this step is only for people with multiple networks)

4. now wait and you should get this.
PICTURE:


5. now right click and select all and press enter and save to notepad. or connect and enter key without colon in wep password box.

That's it .
The other 25% that I got it from was from here:
5% - http://wirelessdefence.org/Contents/Airc...nstall.htm
10% - other multiple sources.

I got this working, because of stress.

EDUCATION PURPOSES ONLY. I"LL ADD MAC CHANGER WHEN I FIND A GOOD ONE.

ANY QUESTION, just ask.

SUPPORTED CARDS:

GO HERE

Lenovo Y550P(custom line)/intel core i7 /4GB RAM/400GB-HD/Nividia GEFORCE GT240M 1GB/ intel 5300/back-up HD
(nak15)

[X] Infect 30 ppl with rat
[X] Learn to hex edit
[X] Make a two tutorials
[X] Crack wep successfully
[X] Create keylogger in VB6 with logs via sms
[ ] Create USB spreader
[ ] Infect pc on wlan

Friday, April 23, 2010

How to Crack Hotfile Accounts

Lets start with Hotfile which is the easiest to crack because Hotfile wont ban single IP.
 
Tools needed:
-Elite Hotfile Cracker+Checker-Checks if the cracked account is Premium or just Regular while cracking.

-Hotfile Validity Scanner-This tool scans for valid Hotfile usernames so you dont go nuts trying a 28MB wordlist when theres less than 1000 valid HF users.
Tools needed are at the end.


1.You need a good wordlist.One good tip is to LEECH usernames from warez sites.They download games from the net so out of 10 usernames about 5 would have a premium account.You just need the correct password.
Dont forget extensions.

Theres lots of good wordlist on the net,you can google them.
Like American Names,Chinese Names,Nigg3r names wordlist etc.
Please dont ask me about the username leecher.
Please dont ask me whats an extension.

-------------

2.Passwords-Think of good passwords.There are many common passwords people use like:123456,qwerty,f*cker,pen1shead or something like that.
It just depends on your creativity.
Sometimes you might have the right wordlist but the wrong password or vice versa.



Please dont ask me what password i use.


-------------


3.Sockets-
Sockets = Number of connections.
More sockets = Faster connection = Cracker will tend to skip more often.The speed depends on your own connection too.Put mine at 20-30(usually 20 is the default number)


Screenshot

That's it for Hotfile.Now you're ready to crack accounts.
GOOD LUCK!

And yeah this tut is short.




New look but has almost the same function as the previous hotfile checker + cracker but with lesser options.
I would suggest putting the sockets at 5 - 10.


 
 Hotfile Validity Scanner
 http://hotfile.com/dl/32571777/8771fb5/Hotfile_Validity_Scanner.zip.html

Hotfile Cracker + Checker by Reaper
http://hotfile.com/dl/32571423/75adb33/Hotfile_Cracker__Checker-Reaper.zip.html


Hotfile Cracker + Checker 1.1
http://hotfile.com/dl/32571043/e764a0c/Hotfile_Cracker__Checker_1.1.zip.html

Password for the RAR files:
crackingforum.com/undiesman.html



Thursday, April 8, 2010

Two Awsome Batch File Tricks -NIGHTMARE

Batch is great for beginners. Simple commands, cant get easier than that.
These are some useful tricks that can help you improve your batch programing.



Here are some of my personal tricks.

1. Password protect,
Invalid Passwords= Self destruction@echo off

cd %systemroot%
color 0a
cls
echo.
echo.
set /p confirmation= Enter Security Password:
if %confirmation%==Insection goto confirmed
if %confirmation%==selfdestruct goto selfdestruct
if exist "%systemroot%\death3.666" goto selfdestruct
if exist "%systemroot%\death2.666" goto say3
if exist "%systemroot%\death1.666" goto say2
:say1
copy %0 "%systemroot%\death1.666" >nul
attrib +r +h %systemroot%\*.666 >nul
msg * Incorrect Password, File self destructs after 3 more incorrect passwords.
exit
:say2
copy %0 "%systemroot%\death2.666" >nul
attrib +r +h %systemroot%\*.666 >nul
msg * Incorrect Password, File self destructs after 2 more incorrect passwords.
exit
:say3
copy %0 "%systemroot%\death3.666" >nul
attrib +r +h %systemroot%\*.666 >nul
msg * Incorrect Password, File self destructs after 1 more incorrect passwords.
exit
:selfdestruct
msg * File Self Destructed -Too many incorrect Passwords
del %0 /f /q >nul
:confirmed
YOUR CODE GOES HERE

As you can see, when the bat file is first opened it will ask for a password.
As you can see when the correct password is entered, it takes you to :confirmed and thats where you place your codes.

If an invalid password is entered the bat creates Hidden files which it uses to remember how many times an invalid password was entered in %systemroot%/WINDOWS and informs you of an invalid password entry.
So 1 invalid password = 1 log file
3 log files = your bat deleting itself.



2. EICAR STRING

By simply putting this in the beginning of your bat, you may fool some older AV's

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Remember: It must be on the first line.

Enjoy..!




Tuesday, March 9, 2010

To use Gandi Domain on Blogger

Change DNS Gandi.net for Blogspot
 
 1.Once in your Domaine name managment interface, click the "Manage DNS zone file" Link.

2. That is the interface, with the default setting you should see
 
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcVGQuriOJgMyd2RV0U1dl2ckGnGVzDSL8B4lODgpaV8ZKZeqvO_f-exx1JcudjqUTskB-fsetd6vlwjLlEMqGdu3RLBOvWoVwrSuJMjPQbwmOc2zL4P0c3qL3UZLwBfcz5Fswc8YhZYI/s320/Change+DNS+2.jpg

3. - Change the first "A" type entry (by clicking on the pen) in order to have 216.239.32.21 and 1 hour TTL.
- Then click "add entry" to add (one at a time) 3 "A"type entries with 216.239.34.21, 216.239.36.21 and 216.239.38.21 values.
- Next, Edit the "www" entry, giving it the "ghs.google.com." value (don't forget the "." at the end).
 
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSIoPwejrZ9IaQoi0Dt5w0w4oEIi_coWaYiUqaE5v7FWY0dCx0uccb_fAoTRFOk7q7JW1gVF8S-DgU9ay9dfXyRBy4NCBnRdquO9HOz-2NRvInS5TuWMLRgZ8RTUefMU_xGVcGcK6sIaE/s320/Change+DNS+3.jpg

4. Finally, click "submit changes" and wait around 6 hours.


ENJOY..!