Monday 30 January 2012

URL Based SQL Injection

Introduction: SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution.
Finding Sites: When talking to find a vulnerable site for SQL Injection you will hear the term Dork a lot, this refers to a google search term targeted at finding vulnerable websites. An example of a google dork is inurl:index.php?id=, entering this string in google search engine would return all sites from google cache with the string news.php?id= in their URL.

Open CMD with right click

If you don’t already have a quick launch icon or a hotkey set to open a command prompt, there’s really quick trick that you can do on any Windows 7 or Vista computer to open up a command prompt without having to navigate the menu.

Lock/Unlock Computer With Pendrive

First, what is “syskey”?
SYSKEY is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key.
SYSKEY was an optional feature added in Windows NT 4.0 SP3. It was meant to protect against offline password cracking attacks so that the SAM database would still be secure even if someone had a copy of it. However, in December 1999, a security team from Bind  View found a security hole in SYSKEY which indicates that a certain form of cryptanalytic attack is possible offline. A brute force attack then appeared to be possible.

Microsoft later collaborated with Bind View to issue a fix for the problem (dubbed the ‘Syskey Bug’) which appears to have been settled and SYSKEY has been pronounced secure enough to resist brute force attack.
According to Todd Sabin of the Bind View team RAZOR, the pre-RC3 versions of Windows 2000 were also affected.

A Virus Program to Disable USB Ports


Virus to disable USB portsIn this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports

How to Test the Working of your Antivirus – EICAR Test


Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer. Here is a step-by-step procedure to test your antivirus.

Sunday 29 January 2012

5 Ways to Speed Up Your Windows PC


Speed Up your PCIf you have a Windows PC that is not maintained properly on a regular basis, it’s performance will most likely tend to degrade with the passage of time. 
To counter this decreased performance, visiting a computer shop isn’t the only solution. Rather, it is possible to improve your computer’s performance yourself. Here is a way to save your money and squeeze more speed out of your Windows PC.
 

How to Repair Registry of Windows PC

Registry Repair Tips

 
Repair Windows RegistryThis article explains how to inspect and repair registry errors in your Windows PC, so as to improve it’s overall performance. If you are a Windows user, then you will most probably be aware of the fact that the Windows registry gets corrupted over time resulting in an overall decreased performance of your computer.
At times, registry errors can also make your PC to freeze down and hang up every now and then causing a serious annoyance to the user. At this point, the registry needs a serious repair to bring your PC back to it’s life. Well, before I tell you how to repair the registry, lets see what causes the registry to get corrupted.
Registry errors may occur due to installing too many applications/softwares from time to time without verifying the publishers. This may create invalid entries in the registry hive leading to errors. With the Internet boom and the era of freeware with free downloads, people often install programs from untrusted sources which results in a serious damage to the registry. Since the registry is a crucial component of the Windows operating system, damage to this registry can cause the system performance to drop down significantly.
 

Sunday 15 January 2012

How to Alter Windows Product ID


Alter Win PIDIf you are running a Microsoft Windows operating system on your computer, then you are most likely aware of the fact that your PC will have a Product ID. This Product ID is a system specific alphanumeric code which is derived/calculated based on the Windows product key you use and the hardware configuration of your Computer. In simple words, Product ID is the alphanumeric code that you see when you Right-Click on the My Computer icon and select the Properties option.
 

Who Knows What Youhavedownloaded.com?

ou may have never heard of youhavedownloaded.com, but if you recently grabbed movies, music or software from online file-trading networks, chances are decent that the site has heard of you. In fact, you may find that the titles you downloaded are now listed and publicly searchable at the site, indexed by your Internet address.

Display Legal Notice on Startup of your Windows


legal_noticesIf your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.
 
1. Go to Start->Run, type regedit and hit ENTER
2. Navigate to the following key in the registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\policies\system
On the right side pane look for “legalnoticecaption“, double click on it and enter the desired Legal Notice Caption.
3. Next below this look for “legalnoticetext” and enter the desired Legal Notice Text. The legal notice text can be up to a page in it’s size so that it can include a set of do’s and dont’s for your computer.
4. After you do this just restart your computer and upon the next startup you can see the legal notice information for your computer. This trick works on both XP and Vista. You can also try it on Windows 7 and should work with no problems.
Hope you like this post. Pass your comments.

What to Do When Your Email Account is Hacked?

How to Recover Hacked Email Accounts?

 
Email Hacked?It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

Saturday 14 January 2012

how to make money from home..

Pay per click advertising, Google Adsense
pay per click advertisingPay per click advertising is one of the greatest money making ideas online. Pay per click service means you pay or paid per click. You pay when you join for a program like Adwords where you join to increase your web site traffic.You are paid per click when you join a service like google adsense as a publisher. Every click on the advertisement displayed on your website helps you to make money. This is one program that helps you to make most with your website. There are various companies or firms offering this service to webmasters. YPN is the pioneer in this field till google adsense arrived and replaced YPN from the top spot. Learn more about the alternatives available to google and YPN  Adsense alternatives
 
 

Blogging your way to success.

If you are looking to make your presence felt online, the First thing you need is a Blog. If you are looking to make money online, again creating and maintaining a blog is something you cannot overlook. Blogging is the first option for a person who is looking forward working from home. According to Wikipedia“A blog (a blend of the term “web log) is a type of website or part of a website. Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order”.
Working from home blogging
Work from home blogger

Common Website Vulnerabilities [ Must See ]

In today's time there are lot of hackers exist in this world which hacked websites daily by daily so we must know that what vulnerabilities exist in our website.

In this, I will be posting about some common vulnerabilities in a webserver's.
  • SQL Injection
  • XSS (Cross-Site Scripting)
  • RFI/LFI (Remote/Local File Include)
    1. SQL Injection

Top 10 Dangerous cell phone viruses [Must See]


Here are the most dangerous cell phone viruses for symbian based mobiles. Like Computer, cell phones are also using system that keeps the cell phone running in a proper way.

15 Ways You Stay Out Of Jail [ Every Hacker must read ]

15 Ways You Stay Out Of Jail 
[ Every Hacker must read ]


1.   Never tell anyone you are a Hacker
2.   Never Hack without a proxy
3.   Always use a proxy when doing anything remotely illegal
4.   Never Hack from your house
5.   Never use your real name in a conversation or sign up sheet
6.   Always use fake information when signing up for something such as an account
7.   Never use the same password more than once
8.   Never use a password that can be found in the dictionary
9.   Always use a firewall
10. Never let the F.B.I./C.B.I into your house without a warrant stating their intentions.
11. Never let the F.B.I./C.B.I in period.
12. Always have a panic button that mass deletes all your questionable material.
13.
Always wave to cops
14. Never Hack from the same computer twice if possible
15.
Make sure that the deletion of your files it is at least in compliance with the Department of Defense deletion protocol if you have time


Thursday 12 January 2012

Download free full version data recovery tool


Easeus Data Recovery Wizard Professional is a tool used to recover data which is lost due to deletion, v
irus attacks, format, partition loss, operating system crash etc. This tool is very easy to use and helps us to recover all type or format of data whether it is a video or a text document. Sometimes we delete the data by a mistake or we lost the data due to VIRUS attacks.  So we can recover that data using this tool. It is the best tool used for recovering the data

 Free version is also available but it only provides 1 GB of data to recover but i am making you available premium version free of cost.  To download this tool click download button below.

                       

How to install Window 7 using USB drive ?

"It's time to be smart with smart windows"


Installing windows 7 using USB drive


What are basic requirements ?
-----Windows 7 DVD
-----And a USB drive having minimum capacity of 4GB.


 What  are advantages if we install window 7 using flash drive ?

----First overall speed of the installation willl increase significantly.
----Carrying USB is more easy and convienient than DVD.
----It also become possible to install windows 7 on  that systems which are not having  DVD drives    such as Net book..


Steps of installing windows 7 using USB drive.
---- Insert USB
---- Run the command prompt as administrator. (Type cmd in start and right click on cmd and click on "run as administrator".)
----In the command prompt type the following command

     -DISKPART

 A new window will appear and execute the following commands in that new window.
 -LIST DISK
-SELECT DISK 1
-CLEAN
-CREATE PARTITION PRIMARY
-SELECT PARTITION 1
-ACTIVE
-FORMAT FS=NTFS
  (This process may take few seconds)
-ASSIGN
-EXIT
Do not  close the command prompt. Minimize it.
----Insert window 7 DVD .
----Maximize cmd and execute the following commands
-   N: CD BOOT   (hit enter Here "N" is my DVD drive letter write your one's here)
-   CD BOOT
-   BOOTSECT.EXE/NT60 O:  (Here "O" is my USB drive letter)
After entering the command this messages appear
                          Your USB device is ready for the boot. Now copy the content of DVD to the USB.
The thing you left to do is to enabling the USB boot options in the BIOS from CD-ROM or HDD.
Enjoy installing windows from USB . If any problem leave it in the comment section.

Read more: http://computertechtrick.blogspot.com/2011/11/how-to-install-window-7-using-usb-drive.html#ixzz1jDb9vrmm

How to remove the drive letters?







For windows 7
-Open My Computer.
-Click on Organize below the address bar and click on "Folder and search options".
                         Or
Press "Alt" key. Menu bar appears. Click on tools on Menu bar Then click on "Folder options"

-In Folder options Click on View.
-Look for "Show Drive letters" in Advanced settings.
-Uncheck the box.
-Click Apply then click Ok.

For windows XP.
-Click on Tools in the menu bar.-Then Click on Folder options.
-Click on View.
-Look for the "Show Drive letters"
-Uncheck the box.
-Click Apply then click Ok.

Sunday 8 January 2012

-: Bypassing Windows-XP Firewall :-


There is a technique using which we can bypass windows-xp service pack-2 firewall.
This techniques is nothing but the vulnerability found in windows-xp sp2 firewall.
This is explained here in detail with exploit code.

Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious program to connect the network.

-: Ethical Hacking eBooks :-



Hacking GPS
-: Hacking GPS :-
Hacking GPS shows you how to get more out of owning a GPS receiver. Written with the Extreme Technology community in mind, this book shows you how to do a variety of different things with your receiver:
* Build custom cabling
* Protecting your GPS from the elements
* Connecting your GPS to a PC or PDA
* Build and mount external antennas
* Load new, modified, firmware onto your device
* Access secret diagnostic screens and test utilities
* GPS games & much more...!
If you've got a GPS and you want to be able to make the most of it then this is the book for you!
  Download  (Size :- 8.50 MB) 



oracle hackers handbook
-: Oracle Hackers Handbook :-
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems.
This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.
Discover how to deal with the security flaws revealed in the Oracle RDBMS. Explore some never-before-published forays into Oracle security holes and learn to defend them from attack.
  Download  (Size :- 480 KB) 



Security and Cryptography
-: Security & Cryptography :-
6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
Editors: Rafail Ostrovsky, Roberto De Prisco and Ivan Visconti
Hardcover: 423 pages
Publisher: Springer; 1 edition (September 1, 2008)
Language: English
ISBN-10: 3540858547
ISBN-13: 978-3540858546
Format: pdf
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008
  Download  (Size :- 4.86 MB) 



Shellcoders Handbook
-: Shellcoder's Handbook :-
The Shellcoders Handbook, discovering and exploiting security holes is the second edition. It covers introduction to exploitation: linux on x86 contains stack overflows, shellcodes, format string bugs, heap overflows. Also for windows platform and solaris exploitation too. OS X shellcode, cisco ios exploitaion, unix kernel overflows, windows kernel hacking, protection mechnism and much more.....!
  Download  (Size :- 2.98 MB) 

-: Ethical Hacking eBooks :-



Gray Hat Hacking
-: Gray Hat Hacking :-
A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in. Very highly recommended whether you are a seasoned professional or just starting out in the security business. Basically divided into five parts :-
Part I: Introduction to Ethical Disclosure,
Part II: Penetration Testing and Tools ,
Part III: Exploits 101,
Part IV: Vulnerability Analysis,
Part V: Malware Analysis
  Download  (Size :- 8.08 MB) 



Hacker Highschool
-: Hacker Highschool :-
The Hacker Highschool project is the development of license-free, security and privacy awareness teaching materials and back-end support for teachers of elementary, junior high, and high school students. Today's teens are in a world with major communication and productivity channels open to them and they don't have the knowledge to defend themselves against the fraud, identity theft, privacy leaks and other attacks made against them just for using the Internet. This is the reason for Hacker Highschool.
  Download  (Size :- 3.83 MB) 



CheatBook
-: CheatBook-2008 :-
Cheat-Book (02/2008) - Issue February 2008 - A Cheat-Code Tracker with Hints for several popular PC Action and adventure Games. 488 PC Games, 53 Walktroughs for PC and 114 Console Cheats are represented in this new version from Strategy Games, Adventure Games to Action Games. This Database represents all genres and focuses on recent releases.
  Download  (Size :- 3.88 MB) 



Windows-XP Hacks
-: Windows-XP Hacks :-
Completely revised and updated, this smart collection of insider tips and tricks covers the XP operating system from start to finish, including all the new features that come with Service Pack 2 (SP2).
You'll also find time saving hacks for security, file distribution, digital media, web browsing, and more.
An ideal all-in-one resource for XP beginners, as well as more experienced power users.
  Download  (Size :- 1.78 MB) 



Computer Viruses
-: A Little Black Book :-

"A Little Black Book Of Computer Viruses" is the first in the series of three. Deeply covers all the basic types along with source codes. It focuses on topics like:- types of viruses, functional elements of viruses, tools used for writing viruses, storage for viruses, installation in memory, etc. Source codes also given for TIMID, INTRUDER, KILROY, STEALTH, Basic Boot Sector, etc. viruses.
  Download  (Size :- 1.29 MB)