Pages

Sunday, June 29, 2008

Java Projects

A few projects are given i this website
              http://projectsinjava.blogspot.com/
a few of them are listed here

+ EAR Utility to Compare two EAR files
+ J2EE recover(Email Recoverd password)
+ Servlet Application
+ A CLASS SHOWS HOW
+ Back&Fore ground color changer
+ Magnifier (VERY NICE)JAR
+ Die Roller
+ DCSoft DOS Casino
+ Card Base Classes
+ A Civilisation Game
+ Javascript Command Interpreter
+ Parellel Port Viewer
+ Swing Code to Maintain CD Database
+ A Pong Game
+ A Basic Game
+ Bomber Man
+ Logo using Runnable Interface
+ Led Digital Clock
+ Server Insertion to DB
+ File to Array Convertor (JAR file)
+ Java Servlet & JDBC Code for Web Development
+ Animated Movable Ball
+ Beat it Game
+ Guessing Game
+ Applet game Template.
+ SMTP
+ Pizza Hut
+ Texteditor
+ Virtual Network Computing
+ GUI For RDBMS
+ Calculator
+ Smart Mail(Big project)

Monday, June 23, 2008

Crack into admin acc from limited account.........

Crack into admin acc from limited account(99.99% works)

Go to cmd

type AT (time) /interactive “cmd.exe”

enter time in 24hr format

means if you want to enter 5.00pm then enter 17:00

then a new window of cmd will open at specified time

In new window type net(space)user

press enter

after this u will see some names on ur screen

notedown the name of admin acc

then type

net user (name of admin acc u want to crack into) *
e.g if the name of admin acc is john then type

net user john *

then it will ask u for new password

enter password of ur choice

and u got the admin password

Monday, June 16, 2008

Google search tips for hacking

Google is the world’s most popular and powerful search engine. It has the ability to accept pre-defined commands as inputs which then produces unbelievable results.

Google’s Advanced Search Query Syntax

Discussed below are various Google’s special commands and I shall be explaining each command in brief and will show how it can be used for getting confidential data.

[ intitle: ]

The “intitle:” syntax helps Google restrict the search results to pages containing that word in the title.

intitle: login password

will return links to those pages that has the word "login" in their title, and the word "password" anywhere in the page.

Similarly, if one has to query for more than one word in the page title then in that case “allintitle:” can be used instead of “intitle” to get the list of pages containing all those words in its title.

intitle: login intitle: password


is same as

allintitle: login password




[ inurl: ]

The “inurl:” syntax restricts the search results to those URLs containing the search keyword. For example: “inurl: passwd” (without quotes) will return only links to those pages that have "passwd" in the URL.

Similarly, if one has to query for more than one word in an URL then in that case “allinurl:” can be used instead of “inurl” to get the list of URLs containing all those search keywords in it.

allinurl: etc/passwd


will look for the URLs containing “etc” and “passwd”. The slash (“/”) between the words will be ignored by Google.

[ site: ]

The “site:” syntax restricts Google to query for certain keywords in a particular site or domain.

exploits site:hackingspirits.com


will look for the keyword “exploits” in those pages present in all the links of the domain “hackingspirits.com”. There should not be any space between “site:” and the “domain name”.

[ filetype: ]

This “filetype:” syntax restricts Google search for files on internet with particular extensions (i.e. doc, pdf or ppt etc).

filetype:doc site:gov confidential


will look for files with “.doc” extension in all government domains with “.gov” extension and containing the word “confidential” either in the pages or in the “.doc” file. i.e. the result will contain the links to all confidential word document files on the government sites.


[ link: ]

“link:” syntax will list down webpages that have links to the specified webpage.

link:www.expertsforge.com


will list webpages that have links pointing to the SecurityFocus homepage. Note there can be no space between the "link:" and the web page url.


[ related: ]

The “related:” will list web pages that are "similar" to a specified
web page.

related:www.expertsforge.com


will list web pages that are similar to the Securityfocus homepage. Note there can be no space between the "related:" and the web page url.


[ cache: ]

The query “cache:” will show the version of the web page that Google
has in its cache.

cache:www.hackingspirits.com


will show Google's cache of the Google homepage. Note there can be no space between the "cache:" and the web page url.

If you include other words in the query, Google will highlight those words within the cached document.

cache:www.hackingspirits.com guest


will show the cached content with the word "guest" highlighted.

[ intext: ]

The “intext:” syntax searches for words in a particular website. It ignores links or URLs and page titles.

intext:exploits


will return only links to those web pages that has the search keyword "exploits" in its webpage.


[ phonebook: ]

“phonebook” searches for U.S. street address and phone number information.

phonebook:Lisa+CA


will list down all names of person having “Lisa” in their names and located in “California (CA)”. This can be used as a great tool for hackers incase someone want to do dig personal information for social engineering.

Google Hacks

Well, the Google’s query syntaxes discussed above can really help people to precise their search and get what they are exactly looking for.

Now Google being so intelligent search engine, hackers don’t mind exploiting its ability to dig much confidential and secret information from the net which they are not supposed to know. Now I shall discuss those techniques in details how hackers dig information from the net using Google and how that information can be used to break into remote servers.

Index Of

Using “Index of ” syntax to find sites enabled with Index browsing

A webserver with Index browsing enabled means anyone can browse the webserver directories like ordinary local directories. The use of “index of” syntax to get a list links to webserver which has got directory browsing enabled will be discussd below. This becomes an easy source for information gathering for a hacker. Imagine if the get hold of password files or others sensitive files which are not normally visible to the internet. Below given are few examples using which one can get access to many sensitive information much easily.

Index of /admin
Index of /passwd
Index of /password
Index of /mail

"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess

"Index of /secret"
"Index of /confidential"
"Index of /root"
"Index of /cgi-bin"
"Index of /credit-card"
"Index of /logs"
"Index of /config"


Looking for vulnerable sites or servers using “inurl:” or “allinurl:”

a. Using “allinurl:winnt/system32/” (without quotes) will list down all the links to the server which gives access to restricted directories like “system32” through web. If you are lucky enough then you might get access to the cmd.exe in the “system32” directory. Once you have the access to “cmd.exe” and is able to execute it.


b. Using “allinurl:wwwboard/passwd.txt”(without quotes) in the Google search will list down all the links to the server which are vulnerable to “WWWBoard Password vulnerability”. To know more about this vulnerability you can have a look at the following link:

http://www.securiteam.com/exploits/2BUQ4S0SAW.html

c. Using “inurl:.bash_history” (without quotes) will list down all the links to the server which gives access to “.bash_history” file through web. This is a command history file. This file includes the list of command executed by the administrator, and sometimes includes sensitive information such as password typed in by the administrator. If this file is compromised and if contains the encrypted unix (or *nix) password then it can be easily cracked using “John The Ripper”.

d. Using “inurl:config.txt” (without quotes) will list down all the links to the servers which gives access to “config.txt” file through web. This file contains sensitive information, including the hash value of the administrative password and database authentication credentials.

For Example: Ingenium Learning Management System is a Web-based application for Windows based systems developed by Click2learn, Inc. Ingenium Learning Management System versions 5.1 and 6.1 stores sensitive information insecurely in the config.txt file. For more information refer the following
links: http://www.securiteam.com/securitynews/6M00H2K5PG.html

Other similar search using “inurl:” or “allinurl:” combined with other syntax


inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php

inurl:gov filetype:xls "restricted"
index of ftp +.mdb allinurl:/cgi-bin/ +mailto


Looking for vulnerable sites or servers using “intitle:” or “allintitle:”

a. Using [allintitle: "index of /root”] (without brackets) will list down the links to the web server which gives access to restricted directories like “root” through web. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.

b. Using [allintitle: "index of /admin”] (without brackets) will list down the links to the websites which has got index browsing enabled for restricted directories like “admin” through web. Most of the web application sometimes uses names like “admin” to store admin credentials in it. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.

Other similar search using “intitle:” or “allintitle:” combined with other syntax

intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart

allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov



Other interesting Search Queries

· To search for sites vulnerable to Cross-Sites Scripting (XSS) attacks:

allinurl:/scripts/cart32.exe
allinurl:/CuteNews/show_archives.php
allinurl:/phpinfo.php



· To search for sites vulnerable to SQL Injection attacks:

allinurl:/privmsg.php
allinurl:/privmsg.php

Use Google to get Serial No of any Software

Most of the people downloading trial and using it, only after the expiration of trial they try for crack, Serial No, Keygen, Patch....

But many don't known where to get Serial No, Some websites may be infect your system with Trojan horse, Viruses, Ad ware, Spy ware....

So for beginners this is a simply way to find hack with less effort and it saves time to, But make sure you have anti virus activated before trying to get some Serials, Patches to avoid data loss

Just follow the steps as instructed below

1) Go to http://www.google.com
2) type this syntax in search bar " 94FBR"
3) Replace Product name with desired software and leave a space then type 94FBR
4) Press enter, thats it

Now you receive Many pages which contains Serial no, Crack, Patches....

Just make a try, this simple trick works for many people

Saturday, June 14, 2008

XP to Mac Transformation




you can download it from http://rapidshare.com/files/82949391/MAC_TRANAFORMATIOM_PACK_by_mechodownload.rar
and password is : mechodownload

Create Your Own Orkut Themes In Seconds

Now you can create your own Orkut themes within seconds by just a single click.You can add any image to your theme and after making your theme just send it to me if I like it I will display it in my blog by giving proper credits.

Instructions :

Visit this website http://nbfun.net/orkuttheme.php
Add your image URL and click on submit
A new window will open and just click on Install Theme.
That's it,you are done.

You will need Greasemonkey to install this theme.Read this post to know about Greasemonkey.

Download From Rapidshare As A Premium User

Alot of users were asking me that they are facing difficulty to download from Rapidshare,can you please provide some alternate method.

So here comes the new method :

No software,no referrals nothing.If you want to download from Rapidshare as a Premium User follow the instructions given below.

First copy this code
4797cd4816902713f1249a9777a5725a

Then open http://www.rapid4free.com/rapidkod.php and paste the code here.

Just paste the URL of the rapidshare file and you can download as a premium user.

Note : The daily limit for downloading is 300 MB,it will increase in future.So keep visiting... :)

PDF Trick!!!

Hey peeps now u can listen to wats there in a pdf document instead of reading the whole document....
Try out the following key
combinations for Acrobat 6.0 & 7.0:
- ctrl+ shift + b ---> To hear the whole document
ctrl + shift + v ---> To hear only the page
ctrl + shift + c ---> To resume
ctrl + shift + e ---> To stop

Make your wndows Xp GENUINE.!!

This will allow you to bypass the Microsoft Genuine Validation thingythis method works better than many others i've tried before.
forget the cracks and injectors etc... this is the BEST WAY:

1) start > run > "regedit" (without the quotes of course)

2) go to the key:HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer...and doubleclick on it.
Then change some of the value data to ANYTHING ELSE...delete some, add some letters, I don't care...just change it!now close out regedit.

3) go to start > run > "%systemroot%\system32\oobe\msoobe.exe /a" (again, dont type the quotes)

4) the activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.

Now you can dl all the updates without activating, and the Genuine Microsoft Validation thingy won't bug you any more!!

Works with most WinXP versions though there r some exceptions...

RapidShare Hack

Method 1
1.open your rapid share link
2.then click on free.
3.As soon as timer start type this in address bar and click enter
javascript:alert(c=0)
4.a pop up message will come click ok your counter is zero just download the stu
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.

Method 2
1.Delete the cookies in your browser internet explorer or Firefox or opera or whatever u use).
2.Press start->run,type cmd.
3.In the command prompt,type ipconfig/flushdns press enter.Then type ipconfig/release,then ipconfig/renew .Now type exit.
4.Now try downloading, for many people this may work if their ISP provides a dynamic ip.
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Method 3
1.Just switch off your router or modem) and switch it back on.
2.This may work for some users Mtnl and Bsnl) and maybe some others too.

Actually these methods generally work for those people whose ISP gives them dynamic ip.
If these don't work then one more thing that can be done is to use proxies.

Method 4

1.Download the software Hide ip platinum from here http://rapidshare.de/files/34451917/hideipv32.rar
2.Run it, then it will automatically chose a proxy (ip of a different country) for you. So you can easily download without any restrictions. You just have to change the proxy each time you download.

How to View Deleted or Removed YouTube Videos

How is thispossible? Well when a video has been removed from YouTube, it is not immediately deleted from their servers. Just like our hard drive. When we delete a file and empty the recycle bin, is it not really deleted. It is only marked as deleted and is ready to be overwritten. So if it is not being overwritten, we can still view the videos but of course not from youtube.com.

Viewing removed YouTube videos is easy. Here's how to do it.

First of all, you need to know the Video ID which is at the end of the YouTube link. An example of a YouTube video link is http://www.youtube.com/watch?v=UzeV1Ux5YlI

The video ID for the link above is UzeV1Ux5YlI

Just copy and paste it in the ID text box and click view video. Here are a few sites that is able to play deleted YouTube videos. Surprisingly, they are all not the same. I've tested a deleted video ID on all 3 sites but one of it reported that it could not find deleted video. So if you desperately need to watch a deleted video, try on all of the sites and you might get to watch it.
1. UndeleTube
2. DeletedYoutubeViewer
3. Delutube

Edit the boot logo and boot logo palette in Windows XP

today i have seen how to  Edit the boot logo and boot logo palette in Windows XP

watch this site and enjoy  http://www.geocities.com/thejjoelc/XPbootcolors.html

●▬╡‹¦[«-̲̅S̲̅i̲̅f̲̅y̲̅ ̲̅h̲̅a̲̅c̲̅k̲̅e̲̅d̲̅-»]¦›╞▬●

Yσυ ภєє∂:
#тσ ๒є คภ єxเรтเภg รเƒy cυรтσмєя, เ. є. нค√є тнє ฬเяє cσмเภg тσ yσυя нσυรє.
#ค мคc ค∂∂яєรร cнคภgєя -> нттթ://яคթเ∂รнคяє.cσм/ƒเℓєร/122288791/∂єรkтσթ.яคя.нтмℓ
#คภgяy เթ รcคภภєя -> нттթ://รσυяcєƒσяgє.ภєт/թяσjєcт/รнσฬƒเℓєร.թнթ?gяσυթ_เ∂=25534&թคckคgє_เ∂=240285
#Yσυя รเƒy ๒яσค∂๒คภ∂ ℓσcคℓ เภƒσ ℓเkє เթ รυ๒ภєт мครk gคтєฬคy єтc.
нσฬ тσ?
1)ƒเℓℓ เภ คℓℓ тнє เภƒσ เภ тнє ℓσcคℓ คяєค cσภภєcтเσภ.
2)թℓυg เภ тнє ฬเяє :|
3)тσ cнєck เƒ เтร ∂σภє թяσթєяℓy, яυภ тнє Cℓเєภт, เƒ เт cσмєร тσ ℓσgเภ รcяєєภ, เт เร cσяяєcт.
4)мy ℓσcคℓ เթ เร 10.250.83.152. รσ เ รєคяcнє∂ เภ คภgяy เթ รcคภภєя ƒяσм 10.250.83.1 тσ 10.250.83.225.
5)σթєภ тнє мคC cнคภgєя, тคkє тнє мคC σƒ คภy σภє σƒ тнє คℓเ√є เթร ƒяσм คภgяy เթ รcคภภєя, cнคภgє yσυя թc'ร ฬเтн тнคт σภє, cнคภgє yσυя เթ ฬเтн тнє เթ σƒ тнє мคC yσυ тσσk ƒяσм тнє รcคภภєя.
6)เƒ тнє σтнєя υรєя เร ℓσggє∂ เภтσ รเƒy, CσภGяคтร yσυ нค√є ƒяєє нเgн-รթєє∂ ภєт ฬเтн yσυ, เƒ нє เรภ'т тяy คภσтнєя เթ :թ.
ภσтє: тнเร ฬเℓℓ รтσթ ฬσяkเภg ฬнєภ тнє σтнєя υรєя รเgภร συт ƒяσм нเร คccσυภт.
тнเร тяเck нคร ๒єєภ ƒυℓℓy cσภƒเямє∂ ๒y мy ƒяเєภ∂ คภ∂ мє.