Sunday 21 August 2011

CHANGING YOUR IP ADDRESS

Proxy changing ur ip address and bypassing firewalls


Proxy is changing ur ip address. Dis chapter is totally related 2 changing ur ip address,changing ip address is very much imp. bcoz by doing it, we get many benefits. [1]   we can download multiple files 4m rapidshare [2]   by dis we can bypass a firewall [3]   der r many sites vch allows only one account on 1 ip address,on dose sites we                can make multiple  ids by dis. [4]   4 being safe while doing cyber hackes,it is very much essential 2 do proxy. [5]   after of doing proxy,we can fool other person very easily.

let's start 

wenever u send some data 2 any web server then dt server watch ur ip adress,in proxy ,first we connect 2 any proxy server,nd now we do surfing,now supose dt u r sending some data 2 any server ,nw bcoz u hv done proxy ,ur data vl be sent via dt proxy server nd dt server where u r sending d data,dt server ud nt be able nw 2 trace u bcoz now dt server can watch dt proxy server ip.
lemme tel u something about working of proxy.
U------>SENDING DATA 2 GMAIL------->GMAIL REPLYING 2 U
AFTER OF DOING PROXY THIS THING LOOKS SOMETHING LIKE DIS
U---->PROXY SERVER--->GMAIL SERVER------>PROXY SRVER-->U
after of doing proxy we found 1 thing dt our internet speed has gone very slow.itgoes 2 70%
nw a small real hacking story.
b4 of some months a 16 year old boy in u.s.a. did dos attack on nasa website.on dt moment nasa had sent his robote 2 mangal[MARS] planet,d moment on vch he did dos attack on dt moment d robot of nasa ws steping on mangal planet,after dos attack dt robot just stopped nd just went 2 hang.robot stopped working.
nw all de nasa scientists started looking at each other face like a stupid,de were nt getting vat is dis going on?
nw de sTarted 2 search who has done it?nd after of 14 day they got d location of d boy nd went 2 his home nd caught.
nw d question rises up,y i hv written dis story here.?
actualy d boy has chnaged his ip address 4 times. i mean first he chaNged his ip address,then he did another proxy over of d first proxy then d 3rd then 4th the 5th,he did nt chANge his mac address.
all i want 2 tell u ,if u hv done proxy then the webmaster cann't trace u vdout going 2 d proxy server 2 vch u hv connected nd if u hv done proxy flooding 4 10times then be 100% assured no1is coming 2 catch u b4 of 1 month.if u hv done proxy 4 10 times then 4 tracing d fbi vl first go 2 d 10th proxy server 2 vch u hv connected thenwards 4m der he vl get 2 knw ur 9th server then wards they vl go 2 d 9th server then 2 8th nd thus continue.nd finaly in coming 2 u they vl take 1

nw a small real hacking story.
b4 of some months a 16 year old boy in u.s.a. did dos attack on nasa website.on dt moment nasa had sent his robote 2 mangal[MARS] planet,d moment on vch he did dos attack on dt moment d robot of nasa ws steping on mangal planet,after dos attack dt robot just stopped nd just went 2 hang.robot stopped working.
nw all de nasa scientists started looking at each other face like a stupid,de were nt getting vat is dis going on?
nw de sTarted 2 search who has done it?nd after of 14 day they got d location of d boy nd went 2 his home nd caught.
nw d question rises up,y i hv written dis story here.?
actualy d boy has chnaged his ip address 4 times. i mean first he chaNged his ip address,then he did another proxy over of d first proxy then d 3rd then 4th the 5th,he did nt chANge his mac address.
all i want 2 tell u ,if u hv done proxy then the webmaster cann't trace u vdout going 2 d proxy server 2 vch u hv connected nd if u hv done proxy flooding 4 10times then be 100% assured no1is coming 2 catch u b4 of 1 month.if u hv done proxy 4 10 times then 4 tracing d fbi vl first go 2 d 10th proxy server 2 vch u hv connected thenwards 4m der he vl get 2 knw ur 9th server then wards they vl go 2 d 9th server then 2 8th nd thus continue.nd finaly in coming 2 u they vl take 1 month.itis nt possible 4 dem 2 trace u4m comuter.they must go personally 2 d proxy server nd all dis takes time.
i think u ppl got d importaince Of doing proxy.
anyway .let' mooov 2 learn hw 2 do proxy.
let's start.

i think u ppl got d importaince Of doing proxy.
anyway .let' mooov 2 learn hw 2 do proxy.

let's start. 



[*] nw many links will come.go on any1 of them.
[*] now on that website u vl find many ip address nd port no.s.
[*] these r d adress of proxy servers.now copy any1 of de address.mind it,u hv 2 copy both d things,i     mean port no. as well as ip address.
[*] now open ur internet explorer nd go in
tools>internet option>connection>lan setting
go in lan setting,der u vl see 2 blue lines.one is AUTOMATIC CONFIGURATION ND d second one is PROXY SERVER
[*] in proxy server named tab u vl see 4 blocks.2 for ticking nd 2 for giving address.tick both of dem   boxes nd in address put d ip adress u copied nd in port no. put d port no. u copied.never forget 2 tick both d boxes .now click o.k.
[*]  nw open whatismyip.com
[*]  in mozilla firefox go here
tools>options>advanced>network>settings
nd in settings put d ip address nd port no.
dis is d same operation vch is carried out in all type of browser.
[*]  der r many softwares 4 dis purpose.all of dem r shit nd nothing else.
der is anonyomous proxy list verifier named software nd many more ,all of dem do d same work.i don think any1 should use dem.
[*]  u can do d above said work in a more simple way also.
simpally open http://www.proxy4free.com/named site.
der in most left side u vl see written "proxy list"
in proxy list der vl be many lists named list 1list 2 list 3 nd many more .simpally go on list 1 nd copy ip nd port no.l 4m der.
confused

der in most left side u vl see written "proxy list"
in proxy list der vl be many lists named list 1list 2 list 3 nd many more .simpally go on list 1 nd copy ip nd port no.l 4m der.
confused
see,doing proxy makes u more safe while doing illlegal stuffs but d problem is how 2 do proxy flooding.
proxy flooding means connectiong 2 a proxy server then again connection 2 any other proxy server then again 2 ay other server.
if u vl do proxy flooding then u vl be very much safe /
i m telling u some software's name here 4m vchg u can do proxy flooding very easily but mind it i m nt going 2 give u all de software.some of dem i vl give u nd some of dem u hv 2 search on ur own bt d one vch i vl giv u ,vl be enough 2 do proxy flooding ..anyway.
name of tools 4 doing proxy floding-->
Socks Chain,happy browser tool,multiproxy,tor
these are d tools 4 doing proxy flooding,wen u r doing something highly illegal then first of all use any1 of dese softwares nd nw do vatever u vanna do .now u r very much safe/
tool "multiproxy"is a very very very good tool.itensures u police vl nt come 2 u b4 of 1 month nd tor is also very very good./
get tor 4m here.

get tor 4m here.tor.eff.com
use a software named "brozar".it does nt leave any log wen u do illegal stuffs .a very god software 2 make u safe ,searching it is ur duty.
use a software named "torpark browser"it also do d same work of brozar.if u r using it then it makes u sure dt der is no log u r leaving on d internet.this is a perfect tool 2 make u very very much safe.download it 4m here.torrify.com/index.php
4get all d other tools name.i hv given here links also ..simpally download nd be safe ...
freinds
on rapidshare u can't download more than 1 file on 1 time bt vd doing proxy u can download multiple files.
all d sites vch does nt offer u 2 make more than 1 account on ur computer vl allow u 2 make many1 after doing proxy,in colleges where orkut or other sites r blocked ,u can open all d restricted sites vd doing proxy .
well, if u r trying 2 bypass d firewalll of ur coolege nd u r using proxy then it makes ur internet speed very much slow.indt case use a software named "ultra surf"
u can get ultrasurf very easily on internet .simpally write in gogle"download ultra surf"nd u vl get it.after of downloading it ,alll u hv 2 do is 2 a double click on it,a lock sign vl apear nd now no firewall can stop u by doing

u can get ultrasurf very easily on internet .simpally write in gogle"download ultra surf"nd u vl get it.after of downloading it ,alll u hv 2 do is 2 a double click on it,a lock sign vl apear nd now no firewall can stop u by doing browsing.inmany colleges they motherfucker bind d word proxy even nd der by doing proxy u cann't surf d way bt ultra surf is 100% unstopable4m al d firewalls nd it also gives u a very goodbrosing speed there4 bettter in college use ultra surf.
[1]proxy is done 4 being safe while doing illegal stuffs nd 4 bypassing firewalls.itis a very good option 2 download multiple files 4m rapidshare at any single moment.
[2]get proxy server lists nd apply these address in ur browser 2 surf d web anonymously.
[3]use software "tor" 2 do proxy flooding

[2]get proxy server lists nd apply these address in ur browser 2 surf d web anonymously.
[3]use software "tor" 2 do proxy flooding

Learning proxy is very imp. bcoz while doing cyber hacks it makes u some safe .

see,suppose dt u vant 2 propose a girl nd u r very much scared about her reaction then u simpally say ur any freind 2 tell her dt u like her,this is proxy,actually this is nt proxy bt it giveS a solid idea of proxy.

NW i think u hv got d idea of proxy,if still nt got then write in help desk,i vl clear u more.

[*] first of al write in google"list of proxy address" or u may search 4 "free proxy server"
nd u vl see dt ur ip address has been chANged.

come 2 d point vch u did nt get in my previous proxy named thread.
now some extra outstanding good stuffs lolz.
i know i hv told here name of many tools but all u need 2 download onlu tor nd torpark browser.

doing proxy helps u in many ways.

those are some of proxy sites tht will provide u with access to blocked websites

summary of d chapter.

Wednesday 10 August 2011

Thursday 2 June 2011

HACK MOBILE WITH...... BLUETOOTH

BT Info [bluetooth]


To change language open 'nastavenia' -> 'jazyk' select 'english' and press 'späť'.

Program for controlling and reading information from remote phone via bluetooth or infra. Phone List and SMS can be stored in html format.

The latest version features the following functions:
  • Informations: display informations about battery, network, sim card
  • Ringing: playing sounds of incoming call, alarm clock...
  • Calls: dialing number, ending a call..
  • Language: change language in phone
  • Keys, Pressed keys: pressing and watching pressed keys
  • Contacts
  • Reading SMS
  • Silent mode: turning on or off
  • Phone functionality: turning off the network / phone
  • Hlasitosť zvonenia
  • Alarms:
  • Clock: change date and time
  • Phone locks
  • Clip, Clir
  • Change network operator
  • Java: start, delete java applications
  • Media Player
  • Text
  • SE applications
  • Calendar
  • Keys sound
  • Temperature:
  • Paired devices:
  • Volume
  • Memory status:
  • Radio icon
  • Keylock

bt info, ftp_bt, actionsbt info, ftp_bt, media playerbt info, ftp_bt, connections

Files to download

v1.08 with more languages + Russian, Greek


Name ftp_bt_108_2.jar

File size 116 kB

Downloads
(in the last week)
926

v1.08


Name ftp_bt_108.jar

File size 111 kB

Downloads
(in the last week)
421

v1.07


Name ftp_bt_107.jar

File size 115 kB

Downloads
(in the last week)
102

v1.06


Name ftp_bt_106.jar

File size 108 kB

Downloads
(in the last week)
47

v1.05


Name ftp_bt_105.jar

File size 101 kB

Downloads
(in the last week)
89

v1.04_g


Name ftp_bt_104_g.jar

File size 55 kB

Downloads
(in the last week)
30

v1.04_t


Name ftp_bt_104_t.jar

File size 55 kB

Downloads
(in the last week)
31

v1.03


Name ftp_bt.jar

File size 42 kB

Downloads
(in the last week)
78

Hacking Software Collection

LEARN HOW TO SEARCH ON GOOGLE


Use Google as a warez search engine a.k.a Get Free Stuff!
1.Go to
www.google.com
2.In the Search Bar type in:“intitle:index of” and then type in the keyword for whatever you are looking for.
So for example if I want to find some linkin park songs I would type in this:
“intitle:index of” LINKINK PARK(OR SONG NAME) MP3(YES WE CAN ADD EXTENSION ALSO)
View Security Cameras Worldwide. - This will let you hack into random live scurity cameras all over the world and operate them.
1.Go to
www.google.com
2.In the search bar type in:inurl:”viewerframe?mode refresh”
3.Then go to any of the search results and boom here is your camera.

Searching crack

for searching crack u can use following command
crack:name of the software whose crack u want to download
eg-.suppose i want to download crack of nfs most wanted then i type
crack:need for speed most wanted

Searching serials

just type software/game name and after that type 94fbr
eg.-windvd 8 94fbr
how it is working
actually 94fbr a key for windows 2003 which Microsoft distribute free in very big amount
so when we hit 94fbr Google relates it to serial no. and return serial no. of specify software.

POWERED BY HIT JAMMER 1.0!
Allows you to gain access to the admin panel of site running
hitjamer 1.0 script.
1.Go to google.com
2.In the search bar type in:POWERED BY HIT JAMMER 1.0!
3.Look for webpages that have POWERED BY HIT JAMMER 1.0! slogan on the bottom of the main page
4.Once you found the page that has POWERED BY HIT JAMMER 1.0! slogan on the bottom replace the url with this
one:
www.nameofsite.com/admin/admin.php<— That should take you to the admin panel.
Example: If the site’s name is
www.uber1337xxoxox.com/index.php/ifuckgoats/lol
then just replace it with this www.uber1337xxoxox.com/admin/admin.php
FTP HACK
This hack shows all info (including username and passwords) for websites running on ws_ftp sofware.
1.Go to google.com
2.In searchbar type in: intitle:index of ws_ftp.ini
3.Go to any result page and find a file called ws_ftp.ini (press ctrl+f for autosearch)
After you found ws_ftp, click on it and it will give you a whole bunch of private stuff.Look for something along the lines
of PWD=blahblahblah.That’s your password.It’s encrypted.So use an MD5 hash cracker or johntheripper to crack the
password.

how to search google for RAPIDSHARE links

If you wanna find some apps, files etc on rapidshare.de via google, do the following. Paste this into the google search window (not the adress bar):
site:rapidshare.de -filetype:zip OR rar daterange:2453402-2453412
this searches the site rapidshare.de for any file that is rar or zip, and
has been indexed between 1-11 February.

dvd site:rapidshare.de -filetype:zip OR rar daterange:2453402-2453412
This is the same search but it specifically searches for “dvd” with the same
search criteria, so any app posted with the word dvd in it will be found.
SOME IMPORTANT SEARCH STRING
Try these search string in different way
intitle:”Index of” passwords modified
allinurl:auth_user_file.txt
“access denied for user” “using password”
“A syntax error has occurred” filetype:ihtml
allinurl: admin mdb
“ORA-00921: unexpected end of SQL command”
inurl:passlist.txt
“Index of /backup”
“Chatologica MetaSearch” “stack tracking:” “parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory “Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Notice that I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.
nurl:microsoft filetype:iso
You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…
“# -FrontPage-” inurl:service.pwd
Frontpage passwords.. very nice clean search results listing !!

“AutoCreate=TRUE password=*”
This searches the password for “Website Access Analyzer”, a Japanese software that creates webstatistics. For those who can read Japanese, check out the author’s site at: coara.or.jp/~passy/ [coara.or.jp/~passy/]

“http://*:*@www” domainname
This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net

“sets mode: +k”
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.

allinurl: admin mdb
Not all of these pages are administrator’s access databases containing usernames, passwords and other sensitive information, but many are!

allinurl:auth_user_file.txt
DCForum’s password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!).

intitle:”Index of” config.php
This search brings up sites with “config.php” files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.

eggdrop filetype:user user
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users
To locate proxy servers
try these queries:
inurl:”nph-proxy.cgi” “Start browsing”
or
“this proxy is working fine!” “enter *” “URL***” * visit
These queries locate online public proxy servers that can be used for
testing purposes.
Calculator
This trick is extra cool: You can use the blank Google search box as a calculator. Just enter an equation, like 2+2, and then press Enter to have Google tell you 2+2=4. For multiplication, use the asterisk (*), like this: 2*3. For division, use the slash (/), like this: 10/3. You can also use the search box to perform unit conversions, like this: 5 kilometers in miles or how many teaspoons in a cup? For a chart listing of units of measure Google can convert, The calculator works for simple equations and for some seriously complex operations, too, like logarithms and trigonometric functions. You can find a rundown of all its capabilities at. And if you know what a physical constant is or the phrase “base of the natural system of logarithms”
Changing the Number of Results
In the middle of a Google results URL, you can sometimes find num=, which tells you the number of search results Google gives you per page of results. You can temporarily change the number of results to anything from 1 to 100 simply by altering the number in the URL and then pressing Enter. Most of the time, search results are easiest to read when you’ve got 10, 20, or 30 per page . But this trick is a quick way to amp up the number of results on a page for the rare times when you want to review a lot of them at once or compare results 1 and 100 on one page.
Unsafe searching.
The SafeSearch filter tells Google to remove potentially offensive links from your results. The problem is, sometimes the filter gets carried away and removes things you need . To make sure the filter is off, add this to the end of your URL: &safe=off. To make sure it’s on, add &safe=on.

SEARCH ENGINE OPTIMIZATION


SEARCH ENGINE OPTIMIZATION

Nowwards we will moov 2 SEO[SEARCH ENGINE OPTIMIZATION],thenwards SOFTWARES ND CRACKING ,THEN WARDS PROXY ND THENWARDS HACKING IN 2 OTHER'S COMUTER.
THESE R D NEXTCHAPTERS. LET'S START learning seo. Well,SEO gives us d exact thing vch we want 2 get 4m google.suppose dt u r searching 4 something on google then google gives u more than 100000 pages nd it is very much difficult 2 find ur exact needed thing in a single shot.SEO gives u d exact thing vch u need exactly.let's start SEO go here,http://newyears.noo.com/noo/m/browse...wevent/id/518/
here u can see written dis line
"New Years Eve at Pink Elephant"
this is dCOLOR="RED"] "title"[/color] of dis web page
d link vch i posted above is d "url"
nd all d data vch has written der is "text"
now,suppose dt u vant 2 search anything on google nd u want 2 search 4 forum then simpally type
inurl:forum
i mean wenever u hv 2 search anything in url ,write
inurl:desired thing
wenever u hv 2 search in text write
intext:desired thing
wenever u hv 2 search anything in text write
intext:desired thing
well, i know most of u r knowing these things already bt d ppl who r nt knowing these,plz try 2 understand dis thing,vdout SEO,u ppl vl feel a lot of problem while hacking a website 4 sql injection,searching cracks on internet nd 4 deirectry transeversal ,it is very much essential thing
well,  
suppose dt u want 2 search d new year celebration then simpally write in google
intitle:new year celebration
if u vant 2 search any websit's login page then type
 
nd search 4 .
now suppose dt u want 2 find anything in a specific website then use dis syntax
site:website fulll address d thing vch u want2 search in dt website
dis syntax is really very good.
NOW SUPPOSE DT U WANT 2 SEARCH ANY PDF TYPEFILE OR doc type file then simpally use dis syntax
 
d next thing in SEO IS
RELATED NAMED STUFF,u know dt yahoo is a search 
[2]4 srching in title use"intitle:"
[3]4 srhcing in text use "intext:"
[4]2 get a file of specific type use "filetype::
[5]2 restrct ur search in a website use "site:websiteaddress urdesired seacrhing item"
[6]2 get information about a website use"info:website full addres"
[7]2 get related type sites type"related:website ful address"
[8]2 nt appear a syntax in ur srch results use a minus[dash] sign.
to d person who r reading this type thing first time,i m requsting them 2 do very much practice vd all of dese syntaxes.
 

plz mind d words,written in red colours.nw

now do some practice vd d thing vch i wrote here
intext:login inurl:website address
filetype:pdf


D SUMMARY 
[1]4 searching something in url use"inurl:"

STANDARD DEFINITION OF SOCIAL ENGINEERING

>STANDARD DEFINITION OF SOCIAL ENGINEERING

[1] Social engineering is d human side of breaking in to a corporate network
companies3 d authentication processes,firewall,virtual private networks nd network monitoring softwares are still wide open 2 attackssocial engineering is d hardest form of attack to defend against bcoz it can't be defend vd hardware or software alone.
sometimes wen u open a website then u see der something written like"congrats' u r d 1lakhth visitor click here 2 claim"
on dese places everyday thousands of ppl give der credit cards information easily,
der r 2 types of social engineering
[first]HUMAN BASED SOCIAL ENGINEERING
IT IS CATEGORIZED IN 2 DESE PARTS
-->impersonation
--->posing as imp. user
--->3rd person approcah
--->technical support
--->COMPUTER BASED SOCIAL ENGINEERING<-------------
these r classified in dese
-->mail/im attachments
-->pop up windows
--->sweepstakes
--->spam mail
  

wen u vl do something big in ur future then while planning u vl understand d imporataince of social enginnering.
mind it,4 tracing some1 wen u send som1 a e mail or wen u say him 2 send a file or accept a file 4m him then these things r also social egineering.
we wiill be using this social engineering while sending some1 trojan/keylogger nd 4 many more things.these things vl come in dis course in future.keep waiting,

SOCIAL ENGINNERING

SOCIAL ENGINEERING

it is nt only related 2 internet arena bt it is also related 2 ur social nd general life.u do flirt vd a girl dt is social engineering.saying lies 2 some1 4 making ur own work succeed is also social engineering.social engineering is nothing else but 2 do some crooking vd some1 4 making ur own work completed.suppose dt der is some1 ur freind nd u want 2 hack his orkut ,then vdout trying 2 hack his password simpally click on forgot password,a general person generally put very comman question here vch is very easy 2 guess if u r his freind,social engineering is a very imp. thing.
let me tell u d first story of hacking.
it held thru social engineering.
in starting wen telephone ws new in d world then d first hacker of d world,just looked at d working method of telephonic service,he found dt wen we call some1 then our reqst goes 2 telephone office then there it originates a specific freequency then it transfer 2 d person 2 whom we r calling.he just made a tofee nd put a small whistle in dt packet of tofee vd saying it is a gift vd tofee.
ppl nd der children started whistling dt whistle,wenever any1 used dt wistle, it produced d same freequency as d telephone server freequncy nd this thing made dt hacker's calls free around d world.

just look at d whole incident,he just thought nd used a small whistle.
it means social engineering is very much imp.,if u r doing something big then vdout taking d help of social enginering u cann't make ur desired work.
suppose dt der is some1 ur freind nd u want 2 hack his orkut ,then vdout trying 2 hack his password simpally click on forgot password,a general person generally put very comman question here vch is very easy 2 guess if u r his freind,social engineering is a very imp. thing,bcoz he is ur freind den in forgot password.

TRACING A PERSON VD WHOM U R CHATTING

TRACING A PERSON VD WHOM U R CHATTING
well,
if u r chatting vd a person then simpally ask his ip address if he tels then its ok. bt vat if he does nt tell?hehehe LOLZ
anyway
see,here r some cases.some different cases nd u must hv 2 do different operation vd different massengers.
wait i am writing.
well,
in dis section first of all i ud like 2 remind u d working method of netsta -n command vch i wrote previously.
netstat command gives u d information of all the communication vch u r doing vd internet.i mean,suppose dt if u r connected 2 orkut nd g mail nd any porn site at a single instant then netstat tells u about all they 3 server's ip address.
this moment there r many massengers vch ppl use ,,,4 example--->icq massaneger,msn,yahoo massenger,g talk massenger nd many more ,ppl also use some sites like meebo.com 2 use masenger.
now der r some cases
 


CASE [1]
 

if u r chatting 2 some1 on icq massenger then here is d working method of icq massenger
you------>ur freind
ur freind---->you
well,this thing makes very easy 2 trace some1 while chating on icq massenger,wen u r chatting vd him then b4 of starting chatting just open run type cmd hite enter nd write
netstat -n
mind it ,till now u hv nt done started chatting vd him,now many ip address will come,simpally note down them somewhere,
now start chatting vd him,
nd while chatting vd him
again open run,type cmd hit enter nd type
netsta -n
now u vl see,a new id address.
bingo,now u hv got d ip address of ur freind


CASE [2]

CHATTING ON YAHOO,MSN,G TALK MASSENGER
these massengers works in dis way,
you------->massenger's server------>ur freind
if u vl do d previous operation then u vl find massenger's ip addres.
here,u may use social eengineering,
social eenginering is d next chapter bt here a small introduction.
social eengineering mans making some1 fool nd hacking him,
in dis masenger case[mind it most of d massenger follow dis way]simpally say ur freind 2 send a file or 2 recieve a file,if he agrred then just do previous operation.
when he vl send u d file then it vl nt come thru massenger ,it vl directly come 2 u nd by writing netstat -n,u may find 1 more ip address dt is of ur freind.
or der's a 1 more method,u may say him 2 mail you or write a mail 2 him nd use readnotify thing,vch i told previously nd now wen he vl send u mail or wen he vl reply 4 ur mail,u can get his ip address.
confused

CASE [3]

TRACING SOME1 WHILE CHATTING ON MEEBO.COM TYPE ONLINE MASSENGERS.
,
here's no method 2 trace him apart of saying him 2 send a mail 2 you or u may send him a mail nd wen he vl reply u vl get or u may say him 2send u a file.
dt's it.


well, tracing some1 is nt a big job nd u can do it very easy.

der r some more commands 2 find ur id address nd der r many more things about ip address,der r 4 different types of ip addresses,
der is subnet id nd hostid named things exits,u can open a website by writing dt ip address only in d url nd der r some hexatransFer,qustra transfer named things also exits but trust me de things r of no use.
u may get each nd every information abour ur ip address by doing dis
open run ->type cmd
write ipconfig/all
dis will tell u ur smtp,dhcp information nd many things,writing only ipconfig in command prompt vl also give u many information nd writing inconfig/series will also give bt netstat is fine.
only ipconfig/all is a good syntax 2 give u ur onw all informations
tracing ip address is completed now.
 

Tuesday 31 May 2011

TRACING A PERSON


Tracing a person is also easy.no.no..it is very easy.
see, first of all we will learn 2 trace a person who has sent u a mail thenwards we vl learn 2 trace a person vd whom u r doing chatting.

TRACING A PERSON WHO HAS SENT U AN E-MAIL 
Open ur mail box ,open any e mail.now click on reply .now click on show original.
view whole d data written der.now u may find dt person's ip address...in show original column u may find dt person ip address but if some1 has sent u mail 4m gmail.com then u cann't get his ip address 4m dis mehod.
actually gmail uses https[secured=s]
there4 u cann't get his id addres.
but there is an way 2 trace g mail also.

Now dis trick is 4 tracing gmail,yahoomail,hotmail nd 4 all mail services.
4m dis technique[vch i am going 2 write down]u can trace all email's ip address.
first of all open
readnotify.com
register der.
now wenever u vl be needing to trace any1 then compose a mail 2 him nd in email to section write
victim'semailid.rednotify.com
nd send him d mail.wen he vl read ur mail ,a mail 2 ur readnotify wil go automatically nd by opening ur readnotify account der u can see dt person' ip adderess.
actually readnotify sends an automatic generated image vd ur mail nd dis hidden image gives u victim's ip address.
dis technique is very good.

HOT SHOT
AFTER OF TRACING A PERSON 4 KNOWING WHERE HE IS,ND 4 KNOWING IN VCH COUNTRY IN VCH STATE ND IN VCH CITY HE IS?
JUST OPEN
ip2location.com
here on dis website put d ip address of dt person nd u vl get 2 know his physical appearance.dis thing is also possible 4m telnet bt leave dt .dt is very complicated.

GATHRING INFORMATION ABOUT ANY WEBSITE


Gathering information is d first job of a hacker.untill d moment u vl nt be aware about each nd everyting about a website or about a ip address u cann't do anything...der is a name of gathering information thing and dt isreconnaisance

I think on a website now u ppl easily can do reconnaisance.
see,
>> OPEN COMMAND PROMPT
    type in
    nslookup website url
    hit enter

nslookup command wen u applied ,
u may see written der .u r nt authentized 2 dis route.
is der something wrtten like it?
i know der is.now u can think d importaince of dis command.
now 4 getting ip address nd 4 getting many sensitive information about a website u may also use these websites.
open
samspade.com
nd open
dnsstuff.com
nd open
whois.net

on these websites just enter d name of any website nd dis website vl give u each nd every inforamtion about dt website.u may also write down here any ip address nddese sites vl tell u each nd every thing about dt website.
it is really very cool....plz open al d websites nd try 2 get d inforamtion of orkut.com nd google.com nd ur college's website.u may easily know ur college is taking who's help 2 give u internet .
u may also know wen a website has been made nd each nd everything about dt website.
try on orkut nd google nd ur clg website now.

 A GENERAL MISCOnCEPTION------>



I KNOW DIS THING IS NT RELATED 2 IP ADDRESS bt it is very much essential 2 tell here ,see most of u think on internet we cann't get highly sensitive information..dis is nt true.on internet many person has posted rapidshare accounts vch u need very much bt d problem is u donno where it is?d same thing is vch other things also.on internet many ppl has written many highly secret things about a website bt we donno dt .
here all u have 2 make urself clear that on internet u can get highly informative topics also.oki?
let's moov 2 our original place.

TRACING A IP ADDRESS


TRACING IP ADDRESS
I know many of u know dis thing,tracing some1 but i vl tell u here many new nd exiting ways.
let's start.
First of all,vat is d need we have 2 trace any1?
see,suppose dt u vant 2 hack anywebsite or 2 any person then d most imp. thing is 2 get his ip address.
Untill d moment u vl nt be knowing his id address how can u do anything?
Here i vl teach u only tracing ip address. attacks vl come in future.
Let's start ,be prepared 4 knowing many new ways 2 trace any1.
 
>> Click on start>run>type cmd>hit enter
write
tracert websitename
hit enter
Now some information vl come automatically
U vl see written der[mind written in blue clr]
Tracing route 2 wensite name[ip address of d website]


nd then many more things.
yes nw u successfully got d ip address of d website.it is really very easy.
d line vch i hv written in blue clr vl be d first line automatically came nd in dt first line u may see d ip address of d website.now in second line u vl see written.
over a maximum hops of 30

Explanation of hopes

See,wenever u open any website u just send some data 2 dt website 4 vch dt website replies u nd den u send some data gain nd dis process continues ,nw suppose dt after of writing tracert google.com ,ur data packets reached 2 google.com ,now google vl try 2 reply u,bcoz google is a very big website ,it take help of many servers ,replies 4m google vl come 4m dese servers .
now look at ur command prompt.der u can see written tracing vd a maximum of 30 hopes.here u r getting ip address of d servers 4m vch datas r processing 2 u .
here u vl see * dis sign in some places,here they have fixed firewall,so dt u cann't attack easily.
written * means der is a firewall,bcoz tracing any1 is very easy,der4 de webmaster fix some firewalls so dt no1 ud be able 2 attack on dem properly.

IP ADDRESS


EXPLOITING IP ADDRESS.

IP ADDRESS STANDS for internet protocol address. your ip address is d unique address on vch data r sent 2 you. ur internet service 
provider make hiMself sure dt datas r going 2 u bcoz he is sending data on d address specialy assigned 2 you.

1)Getting ur own ip address---->
 > Click on start,go on run,open run type cmd hit enter a command prompt vl appear > Write der         netstat -n       nd hit enter > A list vl appear..look at local address .d first local address is ur ip address.>> D second method 2 get ur ip address is open whatismyip.com on dis site u may easily know ur ip address. NOTE : Writing netstat is more good dis command tells about all ip address vch r connected 2 u dis moment. memorize dis small list
ftp---->21
smtp--->25
dns---->53
http--->80
https---->81
pop3---->110
telnet--->23
these r port no.s.

INTRODUCTION 2 HACKING

FIRST OF ALL WAT IS HACKING ?
# HACKING IS NOTHING BT BREACHING IN TO A COMPUTER OR IN A SYSTEM OR IN A SOFTWARE RELATED 
 THING,IN VCH ACCESS IS NT PUBLIC..HACKING MEANS GETTING ND MAINTAINING ACCESS IN A CYBER PLACE WHERE U DONT HAVE RIGHTS 2 ENTER.

SEEM INTERNET IS NT VERY OLD IN DIS WORLD.IT CAME 2 PUBLIC IN 1989 IN YOROPE ND IN U.S.A. ND IN DEVELOPED CONUTRIES ND IN INDIA IT CAME IN 1992.
ACTUALY INTERNET HAS COME B4 OF MANY YEARS BT USING AT PUBLIC LEVEL ,USING AT A GENERAL HUMAN LEVEL HAS BEEN STARTED IN D YEAR ,IN VCH I HV WRITTEN .
NOW U MAY THINK INTERNET IS NT VERY MUCH OLD.
NOW TYPES OF HACKERS---->MOST OF D PPL THINK THEY R OF 2 TYPES.ONE IS ETHICAL HACKERS ND D SECOND 1 IS UNETHICAL HACKER..NO,DTS NT TRUE.
IN REALITY.HACKERS R OF 3 TYPES.
  
FIRST
WHITE HAT HACKERS

>THEY R ETHICAL HACKERS.THEY JUST WORK AS A SECURITY EXPERT IN ANY BANK/SOCIETY/ONLINE COMPANY.
THEY JUST FIND VULNERABILITIES ND POSSIBLE ATTACK IN A SYSTEM ND MAKE DT SYSTEM MOR3E SECURE.THEY HAVE PERMISSION 2 MAKE TESTING OF VULNERABILITIES IN D SYSTEM ND DE DO DERSELF ATACK ND TELL VAT IS D VULNERABILITY.THEY R ETHICAL HACKERS ND NEVER HARM ANYTHING .

SECOND TYPE
BLACK HAT HACKERS

> THEY R UNETHICAL HACKERS.THEY JUST FUCK ANY ONLINE SYSTEM.THEY DO IT 4 FUN OR MONEY.IT MA SEEM VERY FUNNU BT APART OF FUN ND MONEY THERE IS NO3RD ISSUE 4 VCH HACKING IS DONE.

THIRD TYPE
RED/GREY HAT HACKER

>THEY R D PERSON WHO DO HACKING 4 MONEY .IF U VL PAY THEM MONEY THEY VL SECURE YEW COMPANY IF U VL PAY THEM MONEY THEY VL HARM ANY WEBSITE OR VATEVER U VL SAY 2 THEM 2 DO.
 
AS I TOLD U PREVIOUSLY THERE R 3 TYPES OF HACKERS BT IN GENERAL SENSES,IN PUBLIC LAUNGUAGE THEY THINK THERE R 2 TYPES 1 IS HACKER ND S SECOND 1 IS CRACKER.
WHO IS A HACKER---->NOW THESE LINES R GOING 2 SHAKE UR MIND ABOUT UR CONCEPT OF HACKERS.A HACKER IS A PERSON WHO ONLY SEARCH ND FIND VULNERABILITIES IN A SYSTEM .HE DOES NT HARM IT .A HACKER IS GENERALY A PROGRAMMER WHO IS ONLY INTERESTED IN SEARCHING BUGS IN A ONLINE SYSTEM.THEY R PROGRAMMERS ND GENERALLY WRITE THERE OWN PROGRAAME 2 SEARCH NEW HOLES.

Airtel Free GPRS

Airtel free internet surfing with resume downloading ON PC AND MOBILE WITH default browser and internet browser,,,speed is super fast than any other proxies...its capable to hold cache so its cache capable proxy with mind blowing speed FOR PC and mobile:

Trick Steps:
1) Activate MOBILE OFFICE ZERO RENTAL  Dial *567*11# 
2) Keep BALANCE below .30 paisa
3) Just connecct mobile with pc via pc suite.
4) Put apn airtelgprs.com
5) Now open any browser (i recomdd mozilla firefox or opera for resume downloading) and put this address 122.170.122.214.proxytea.appspot.com/surfing site NAME without http.
note: After '/' put your site name with out http' for example:
122.170.122.214.proxytea.appspot.com/www.google.com
122.170.122.214.proxytea.appspot.com/www.hackingtute.blogspot.com 
6) Now u can browse all free

there are many appspot proxies working with our dis ip use any of the below:
122.170.122.214.bypass-proxy.appspot.com/ur url without http
122.170.122.214.bypass-filter.appspot.com/ur url without http
122.170.122.214.cache-0035.appspot.com/ur url without http
122.170.122.214.cache-049.appspot.com/ ur url without http
122.170.122.214.cache-0046.appspot.com/ur url without http

when u wil go to download page or tab just click the left button and copy the download link and paste it into below site (but remember romove the 122.170.122.214.proxytea.appspot.com/ from download link )
and paste the rest orignal url in the search box of the below site:
http://122.170.122.214.0000a-fast-proxy.de

(plz open it in new tab)
so its nothing but to surf via google appspot proxy engine and resume downloading via .de german proxy domain if u hv internet downd manager then it gives high speed wid resume support.