Saturday, January 29, 2011

How to protect against pishing

1. What is phishing?
  • Phishing is the method of stealing login info(usernames and passwords) by directing the slave to a clone(fake) login page, that logs the login info without the knowledge of the slave.
  • Such clone website is known as a phisher.
2. How to protect
  • Use your login info in the correct places only.
    Don't ever put your login info anywhere else than the page you registered to, unless it's a trusted service you know(such as youtube or blogger asking for your google account's info).
  • Make sure the website you're logging in isn't fake.
    Whenever you login to a website, if you didn't type the URL(address) of the website yourself, i.e. if you clicked a link that led you to the login page(from message, website, search engine results), always check the url(address) to see if you're in the right place.
    For instance, if you're logging in your facebook account, make sure the url appears as http://www.facebook.com/...
    Where a phisher page would look like http://www.facebook.freewebs.com/... or http://www.facebook.spam.com/... or any url whose part before the .com isn't exactly the same as the page you want to login to.
  • Make sure the links you're clicking aren't fake.
    Whenever you're clicking a link, check where the link goes before clicking it. Links can be masked to appear as something else than the page they're leading to. For example, www.google.com leads to yahoo instead of google. Fortunately, in most browsers, whenever you point your mouse cursor over the link, the true location of the link is displayed on the bottom left part of the screen. Try it with the above link.
    This is particularly important because it can protect you from another, rarer but more dangerous method called cookie stealing, which is basically automatically stealing your account if you're previously logged in the website.
  • Know that links to phishing pages are usually spread via email, and often represent impersonating trusted services and persons, such as making the email appear as it's sent from the website you've registered to, or a friend of yours whose account has been compromised.
3. What to do if you have spotted a phisher?

Friday, January 28, 2011

How to search Google!

How to search Google!
We can find

Credit card numbers:
Passwords
Programs / MP3's
ETC ... After seeing these examples try to create their own searches for
specifically get what they want.

Pruben these searches:

intitle: "Index of" passwords modified
allinurl: auth_user_file.txt
"Access denied for user" "using password"
"A syntax error has occurred" filetype: iHTML
allinurl: admin mdb
"ORA-00921: unexpected end of SQL command"
inurl: passlist.txt
"Index of / backup"
"Chatologica metasearch" "stack tracking:"

Q are to imagine these Grin:

Amex Numbers: 300 .. 399
MC Numbers: 517800 .. 517899
visa 435600 .. 435699

Directories and passwords revealed:

"Parent directory"
/ Appz /-xxx-html-htm-php-shtml-md5-md5sums-OpenDivX

"Parent directory"
DVDRip-xxx-html-htm-php-shtml-md5-md5sums-OpenDivX

"Parent directory" Xvid-xxx-html-htm-php-shtml-md5-md5sums-OpenDivX

"Parent directory"
Gamez-xxx-html-htm-php-shtml-md5-md5sums-OpenDivX

"Parent directory" MP3-xxx-html-htm-php-shtml-md5-md5sums-OpenDivX

"Parent directory" Name of Singer or
album-xxx-html-htm-php-shtml-md5-md5sums-OpenDivX

In these searches'm just changing the name after the parent directory
", Change it to whatever you want and you will get different results.

Try these searches:

? Intitle: index.of? mp3

Q There are only put you artist name or song

Example:? Intitle: index.of? Metallica mp3

inurl: microsoft filetype: iso

Can change the search to whatever you want, example: Microsoft to Linux
rar iso ....

"#-FrontPage-" inurl: service.pwd
Cheesy Frontpage passwords

"Autocreate = TRUE password =*"
Passwords "Website Access Analyzer", a Japanese program creates q
TATISTICS web.

"Http:// *: * @ www" domain

Passwords, just replace "domain" with the domain q look without it. Com
. Net q or whatever.

Example:
"Http:// *: * @ www" micronosoft or "http:// *: * @ www" micronosoft

Another way is to write:
"Http://bob:bob @ www /";

"Sets mode: + k"
This search reveals passwords on IRC channel logs.

allinurl: admin mdb
Grin Databases

allinurl: auth_user_file.txt
File DCForum's password and DCShop (shopping cart). This
crackeable file containing many passwords, user names and
emails.

intitle: "Index of" config.php
Nomarlmente These files contain the user and password for dir
database administration datos.Tendras total DB.

eggdrop filetype: user user
Usernames and passwords on IRC channels.

intitle: index.of.etc
This search will show the main page of the folder etc / where
You can find many important files and passwords are not always
passwords, but you'll find many interesting things here.

filetype: bak inurl: "htaccess | passwd | shadow | htusers"
This will show many files backups (backups) created by programs or
by the administrator.

If you need to find some serial numbers for any program, say windows
XP Professional.

"Windows XP Professional" 94FBR

The devido aq 94FBR is this piece of code is in many
CD-keys for windows, so this will decrease the amount q of q porn pages
attempt to deceive.

Why take the trouble of attacking a website in search of
vulnerabilities that have gone unnoticed when you can enter with
comfortably through the front door?

These intrusions can be done through existing databases
Internet connection. As tools for database management
used templates (templates) for submitting standardized data
the network to enter the user certain specific phrases can often
direct access to pages using these templates. For
example, by entering the phrase "Select a database to view" (select one
database to see)-a normal stage in the database interface
FileMaker Pro "in Google, it got about 200 links, the
which led to almost all databases created with FileMaker to which
can be accessed online.

For example if you use the following:
1 - http://www.google.com/
2 - Search
"Index of / admin" + passwd
or
"Index of / wwwboard" + passwd
or
"Index of / backup" + mdb
Really great results.!

If you write down what appears in the google search you can access
database, passwords, websites with bugs, even card numbers
credit. Practice a bit and try out different commands, then create your
own lines to search. A good site with information on how to hack
google is http://johnny.ihackstuff.com/ is in English, but will not reach
nothing if not visit sites like this

filetype: htpasswd htpasswd
intitle: "Index of". "htpasswd"-intitle: "dist"-apache-htpasswd.c
index.of.private (a private)
intitle: index.of master.passwd
inurl: passlist.txt (to find lists of passwords)
intitle: "Index of .. etc" passwd
intitle: admin intitle: login
"Incorrect syntax near '(SQL script error)
intitle: "the page can not be found" inetmgr (weakness in IIS4)
intitle: index.of ws_ftp.ini
"Supplied arguments is not a valid PostgreSQL result" (possible weakness
SQL)
_vti_pvt password intitle: index.of (Frontpage)
inurl: backup intitle: index.of inurl: admin
"Index of / backup"
index.of.password
index.of.winnt

inurl: "auth_user_file.txt"
"Index of / admin"
"Index of / password"
"Index of / mail"
"Index of /" + passwd
Index of / "+. Htaccess
Index of ftp +. Mdb allinurl: / cgi-bin / + mailto
allintitle: "index of / admin"
allintitle: "index of / root"
allintitle: sensitive filetype: doc
allintitle: restricted filetype: mail
allintitle: restricted filetype: doc site: gov
administrator.pwd.index
authors.pwd.index
service.pwd.index
filetype: config web
gobal.asax index
inurl: passwd filetype: txt
inurl: admin filetype: db
inurl: iisadmin
inurl: "auth_user_file.txt"
inurl: "wwwroot / *."
allinurl: winnt/system32 / (get cmd.exe)
allinurl: / bash_history
intitle: "Index of". sh_history
intitle: "Index of". bash_history
intitle: "Index of" passwd
intitle: "Index of" people.1st
intitle: "Index of" pwd.db
intitle: "Index of" etc / shadow
intitle: "Index of" SPWD
intitle: "Index of" master.passwd
intitle: "Index of" htpasswd
intitle: "Index of" members OR accounts
intitle: "Index of" user user_carts _cart OR

_vti_inf.html
service.pwd
users.pwd
authors.pwd
administrators.pwd
test-cgi
wwwboard.pl
www-sql
pwd.dat
WS_FTP.LOG

Google disclose data does not seem all that complicated, especially for all
misconfigured systems ... can display a specific search
directory indexing and accessing, password, files,
roads, etc, etc ...

The Search Tips

the common search inputs below will give you an idea ... by
example if you want to search the index of "root"

Example 1:

allintitle: "index of / root"

Result:

http://www.google.com/search?hl=en&ie=IS...llintitle% 3A +% + of 22index
% 2Froot% 22 & btnG = Google + Search

What it reveals is 2.510 pages you can see and possibly
find your will ...

Example 2:

inurl: "auth_user_file.txt"

http://www.google.com/search?num=100&hl=...1&q=inurl% 3A% 22au
th_user_file.txt% 22 & btnG = Google + Search

This gives a figure of 414 possible files to access

OUT THE ROAD

"Index of / admin"
"Index of / password"
"Index of / mail"
"Index of /" + passwd
"Index of /" + password.txt
"Index of /" +. Htaccess
index of ftp +. mdb allinurl: / cgi-bin / + mailto

administrators.pwd.index
authors.pwd.index
service.pwd.index
filetype: config web
gobal.asax index

allintitle: "index of / admin"
allintitle: "index of / root"
allintitle: sensitive filetype: doc
allintitle: restricted filetype: mail
allintitle: restricted filetype: doc site: gov

inurl: passwd filetype: txt
inurl: admin filetype: db
inurl: iisadmin
inurl: "auth_user_file.txt"
inurl: "wwwroot / *."

top secret site: thousand
confidential site: thousand

allinurl: winnt/system32 / (get cmd.exe)
allinurl: / bash_history

intitle: "Index of". sh_history
intitle: "Index of". bash_history
intitle: "index of" passwd
intitle: "index of" people.lst
intitle: "index of" pwd.db
intitle: "index of" etc / shadow
intitle: "index of" SPWD
intitle: "index of" master.passwd
intitle: "index of" htpasswd
intitle: "index of" members OR accounts
intitle: "index of" user_carts OR user_cart

ALTERNATIVE INPUTS

_vti_inf.html
service.pwd
users.pwd
authors.pwd
administrators.pwd
shtml.dll
shtml.exe
fpcount.exe
default.asp
Showcode.asp
sendmail.cfm
getFile.cfm
imagemap.exe


To search the hacker language:

http://www.google.com/intl/xx-hacker/

To search for Linux user mode:
http://www.google.com/linux

To find pages by the proximity to a geographical point:
http://labs.google.com/location

To search how yanquee (ugh!)
http://www.google.com/unclesam

To search for pages to see the results in an animated sequence (test
to understand):
http://labs.google.com/gviewer.html

To search for MAC mode:
http://www.google.com/mac

To search with Google's voice calling over the phone (not fuck)
http://labs1.google.com/gvs.html

To search how Micro $ oft:
http://www.google.com/microsoft.html

To see the definition of a word or phrase:
http://labs.google.com/glossary

To answer any question through google human researchers:
http://answers.google.com/answers/

For google alert you by mail news appearance somewhere
the world on a topic that interests you:
http://www.google.com/newsalerts

To search how BSD
http://www.google.com/bsd

To search universities (U.S. only):
http://www.google.com/options/universities.html

To seek the opinion people have about something:
http://labs.google.com/cgi-bin/webquotes

To search without using the mouse (all from the keyboard, it handles like vi!)
http://labs.google.com/keys/index.html

To search for commercial products, according to price, quality, and other attributes:
http://froogle.google.com/

To search from a Palm, a cell phone or other wireless device:
http://www.google.com/options/wireless.html

This is just for educational mode, use it at your own risk

How To Have Websites Built For You The Cheap Way



Normally, if you want to have professional designers custom build your site, you must be prepared to dish out at least a few hundred dollars. All this can change if you know where to find the best deals, the best designs for the lowest price. Here's a rough guide:

First, you must understand that it is a rip off to get companies to design websites for you. Have you ever seen those advertisements in newspaper classified ad sections that offer a 5-page website at $500? These companies are established companies with physical locations, therefore they have to increase the amount they charge to pay off some overheads: office rent, designer's wages, advertising costs and so on.

Therefore, it would be wise to find freelance designers who work from home. These people are often working from home so they do not have a high operation cost like that of a company. On the other hand, they will be able to design images with quality similar to those of designers from big companies, so it's a "no-brainer" choice.

However, choose freelancers with care. The best way to do this would be to go to elance.com. There, you can post the abstract of your project and get thousands of freelancers to bid on your project, so you will surely get the best deal. On top of that, you will be able to choose the designers based on their experience, past transactions and ratings, so your value for money is secured.

Another route you can take is to design your website yourself. Think about it, if you only need 5 simple pages to present some simple information, why waste hundreds of dollars for it? Just spend a little time to sit down and do it yourself. You'll be able to design your own sites even if you do not know a single line of HTML code with the help of WYSIWYG (what you see is what you get) programs such as Microsoft Frontpage, Macromedia Dreamweaver and so on.

Google hacking (dorks)

OK first i will show how to find any hacker forums,site it doesn't matter!
I mean profesional hackers!

Just read it all because if you are not doing you will not understand these
codes and how do they work!

Dorks:

inurl:"view.asp?page=" intext:"plymouth"

Ok what this code does ?
So this is the university schools you can hack with this dork university schools.

inurl:"shoutbox.php" intext:"script"

with this code you can hack shoutbox or to find scripts


inurl:"index.php?act=" rapidleech

This code will find rapidleecher sites very quickly.

inurl:"index.php?act=idx"

This code will find ipb forums quickly to hack

inurl:"Photoshop.aspx" "tutorials"

This code will find photoshop tutorials

inurl: ftp://ftp site:.com

This code will find any ftp servers and root any protected sites.

allinurl:user_index.jsp

This code will find any free hosting

powered by vbulletin games 3.8.4 inurl:member.php?u=1

This code will find any vbulletin game forums and admin page.

powered by vbulletin 4.0.3 Debug Information

This code will show all vbulletin forums php codes and information
and their bugs you root into it.

powered by vbulletin "warez"

This code will find any warez forum.

video to mp3 converter online intext:"mp3"-intext:"High Quality"

With this code you can download mp3 from youtube very quickly.

intext:"Warning: mysql_fetch_array()"

With this code you will find any vulnarable sites and hack them.

i will make this tread in two part.coz of server problem.just see other part aslo


inurl:radioandtv.php

This code will show all torrents hidden radios stations.

inurl:"posting.php?mode=s milies" "phpbb"

With this code you will be able to hack phpbb forums and put xss inside forum.

allinurl:tools/spider-view.php

With this code you can to find sites links very quikcly.

embed src=".mp3" type=audio/mpeg

Html injection code to find secret sites with html mp3 embed code
you will see it even on google.

"powered by vbulletin" + "account dumps"

With this code you will be able find passwords
for any sites,forums not for porn.

allinurl:"guestbook/smileys.php"
inurl:"smileys.php" + "talking"
allinurl:smiliehelp.php

Talking smilies.

"intitle:index of" admin/FCKeditor/_samples/html

With this code you will be able to find fck server html
editors and hack them.

owl city fireflies + "instrumental"

With this code you will be able any mp3 instrumental and change this
owl city fireflies

HTTP/1.1 :: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3)
access_log

with this code you will be able to hack sites access
logs and see all information.

"sql google scanner" + "php"

Google sql injection online hack vulnerable sites,forums
and find vulnerables sites very easy.

site:youtube.com *@gmail.com

This will find any youtube or any site emails.

allinurl:html_colors.html

This will find very quickly html chart codes.

private torrent + "open sign up"

This will find any private torrent open to register.

hotfile + mediafire + "http://" + "rar" horror 2010 dvdrip,
(hotfile|mediafire).rar 2010 horror dvdrip

This will find any secret sites with dvdrip movies just change horror.

dvdrip 400mb "2010"

This will find ripped dvdrip movies in 400mb and lastest.

sql injection dork bank

This will find bank dorks for hacking google.

inurl:archive/index.php "visual basic"

This will find secret forums directory where you will see all information.

Friday, January 21, 2011

MAC address spoofing

MAC address (Media Access Control address) is a quasi-unique identifier consists of a six byte number that attached to most network adapter card or network interface card (NIC). As such, all network cards, whether it’s of Ethernet NIC, Gigabit Ethernet NIC or wireless 802.11a/b/g/n WiFi or HiperLAN adapter, should have different MAC addresses, which also known as Ethernet Hardware Address (EHA) or adapter address.

In operating system, MAC address is often represented in 12-digit hexadecimal number. For example, 1A-2B-3C-4D-5E-6F. In practical usage, layer 2 MAC address is converted from layer 3 protocol addresses such as Internet Protocol (IP address) by ARP (Address Resolution Protocol), which then allowed each host to be uniquely identified and frames to be marked for specific hosts on broadcast networks, such as Ethernet. After translated (or when a host on LAN sends its MAC address to another machine which does n ot configured not to accept unrequested ARP replies on the network for preemptive caching), MAC address is cached on source PC ARP table for later use. Content of ARP table on each computer can be viewed by typing arp -a in Windows or arp in Linux. MAC address thus forms the basis of most of the layer 2 networking upon which higher OSI Layer protocols are built to produce complex, functioning networks.

There are many reasons or possibilities that an user may want to change the MAC address or a network adapter, which also known as MAC spoofing. For example, to bypass the MAC address filtering on firewall or router. The trick can be used to get pass the network access restriction by emulating a new unrestricted MAC address, or to gain access connection by spoof an authorized MAC address after sniffing the legitimate MAC address out of the air in MAC filtering Wi-Fi network.

Beside, hackers or enthusiasts also spoofing another host’s MAC address as their own in order to receive traffic packets not meant for them, although ARP poisoning technique is more commonly used. However, changing MAC address can still keep the real information from been detected and logged by various services such as IDS, firewall, DHCP server, wireless access points and etc, and is essential protect user’s privacy. MAC spoofing also potentially trigger a Denial of Service (DoS) attack by causing routing problem with duplicating MAC address exists in the network, especially those similar with gateway and AP router’s BSSID (Basic Service Set Identifier.)

Whatever the reason, it’s pretty easy to change the MAC address or perform MAC spoofing on most of today’s hardware, listed below. Actually, the original MAC address is burnt and imprinted to the network card, and cannot be changed. However, operating system can spoof as if there is different MAC address for the network interface card using tricks below.

Change the MAC address in Windows

1. Go to Start -> Control Panel. Double click on Network Connections (inside Network and Internet Connections category in Windows XP). The, right click on the active network connection with network adapter that you want to change the MAC address (normally Local Area Network or Wireless Network Connection) and click on Properties.

Above steps work in Windows XP, Windows 2000 and Windows Server 2003. For Windows Vista, access to NIC’s properties is from Control Panel -> Network and Internet -> Network and Sharing Center -> Manage Network Connections.

Alternatively, if you already know which network adapter that’s responsible for your network or Internet connection, go to Device Manager and open the properties dialog by double click on the NIC itself.
2. In the General tab, click on the Configure button.
3. Click on Advanced tab.
4. In the Property section, select and highlight Network Address or Locally Administered Address.
5. To the right, “Not Present” radio button is by default selected as value. Change the value by clicking on radio button for Value:, and then type in a new MAC address to assign to the NIC.

Change MAC Address of Network Adapter

The MAC address consists of 6 pairs of numbers (0 – 9) and characters (A – F) combination. For example, 88-17-E8-90-E2-0A. When entering the new MAC value, omit the dash (-), for example 8817E890E20A.
6. Click OK when done.
7. To verify the change of MAC address, go to command prompt, then type in one of the following commands:

ipconfig /all
net config rdr
8. Reboot the computer if successful to make the change effective.

Note: To restore or reset back to original default MAC address, simply set back the option to “Not Present”.

Change the MAC Address of NIC in Windows via Registry

1. Open a command prompt.
2. Type the following command and hit Enter.

ipconfig /all
3. Record down the Description and the Physical Address (is MAC address) of the active network connection (discard those with Media Disconnected state).

Get MAC Address for Network Card

For example, in figure above, Description is Intel® Wireless WiFi Link 4965AGN and MAC address is in the format of 00-XX-XX-XX-XX-XX.
4. In the command prompt also, type the following command and hit Enter.

net config rdr
5. Record down the GUID for the MAC address for the active connection’s NIC which MAC address to be changed. The GUID is contained within the { and } brackets right in front of the MAC address as shown in figure below.

GUID for the NIC
6. Type regedt32 or regedit in Start -> Run box or in Start Search for Windows Vista. Note: for Windows NT 4.0 and Windows 2000, regedt32 must be used.
7. Navigate to the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}
8. Expand the {4D36E972-E325-11CE-BFC1-08002BE10318} tree, and there will be more sub-keys in the form of 0000, 0001, 0002 and so on.
9. Go through each sub-key starting from 0000, look for subkey that has DriverDesc value data that matches NIC description copied from step above, that want its MAC address to be changed. In most cases, it will be similar to the network adapter card name.

To verify that the subkey found is indeed a correct one, check the value of the NetCfgInstanceId, which should have the same value with the NIC’s GUID taken from step above.
10. Once a sub-key is matched to the network interface card that MAC address want to be spoofed, select and highlight the subkey. Right click on the sub-key (for example, 0000), then select New -> String Value. Name the new value name as NetworkAddress.

Note: If NetworkAddress REG_SZ registry key is already existed in the right pane, skip this step.
11. The double click on NetworkAddress and enter a new MAC address as its value data.

Change and Spoof MAC Address in Registry

Note that the 12-digit MAC address in hexadecimal format, and should be entered without any dash (-). For example, 1A2B3C4D5E6F.
12. Reboot the system to make the new MAC address effective. Alternatively, if you don’t want to restart the system, try to disable and then re-enable the network adapter in Device Manager.
13. To verify the change of MAC address, go to command prompt, then type in one of the following commands:

ipconfig /all
net config rdr

Note: To restore or reset back to true original hardware burned-in MAC address, remove the NetworkAddress registry key that is been added.

Alternative: Third party tools and utilities to change the MAC address in Windows operating system are plenty, for example: SMAC (direct download link to smac20_setup.ex, supports Windows Vista, XP, 2003, 2000), Macshift (direct download link to macshift.zip, for Windows XP), BMAC (almost identical SMAC MAC changer clone by moorer-software.com), Mac MakeUp (direct download link to macmakeup.zip, for Windows 2000/XP/2003/Vista), MadMACs (MAC Address Spoofing And Host Name Randomizing App For Windows, directly download MadMACs.zip), EtherChange (direct download link to etherchange.exe), and Technitium MAC Address Changer (for Windows 2000 / XP / Server 2003 / Vista / Server 2008).

How to Change MAC Address (MAC Spoofing) in Linux and *nix

To change your MAC address in Linux and most Unix-like (*nix) system, run the following script commands:

ifconfig down

ifconfig hw

ifconfig up

For example, the command looks lik “ifconfig eth0 down hw ether 1A:2B:3C:4D:5E:6F”. First command brings down the network interface, second command change its MAC address while third command bring up the interface again. Note that in some cases, to bring down and bring up the network interface, the following commands have to be used:

/etc/init.d/networking stop or /etc/init.d/network stop (in the case of Fedora Core 5)

/etc/init.d/networking start or /etc/init.d/network stop (in the case of Fedora Core 5)

Alternatively, for Fedora Code 5 Linux with Iproute2 tools installed, the following commands also can change the MAC address to spoofed version:

/etc/init.d/network stop

ip link set address 1A:2B:3C:4D:5E:6F

/etc/init.d/network start

For example, “ip link set eth0 address 1A:2B:3C:4D:5E:6F”. To check whether the MAC address has been spoofed, use ip link ls eth0 or ip addr ls eth0 instead of using ifconfig eth0.

How to Make the Spoofed MAC Address Permanently Even After Reboot in Linux

Edit the ifcfg-eth0 file (or other similar file if you’re changing different interface), add the following variable line to the file:

MACADDR=12:34:56:78:90:ab

Then run service network restart to make the change effective immediately.

How to Make the Spoofed MAC Address Permanently on Restart in Debian

Edit the /etc/network/interfaces file and add in the following variable line to the appropriate section so that the MAC address is set when the network device is started.

hwaddress 02:01:02:03:04:08

For example, “hwaddress ether 02:01:02:03:04:08″.

Alternative: GNU Mac Changer (for Debian, Slackware, ArchLinux, Mandrake, Crux and other RPM-based distributions such as Fedora, Red Hat, CentOS, ASPLinux, SUSE Linux, OpenSUSE and etc.

How to Change MAC Address (MAC Spoofing) in BSD or FreeBSD

Issue the following commands in shell:

ifconfig down

ifconfig

ifconfig up

First command brings down the network interface (optional), second command change its MAC address while third command bring up the interface again (optional). For example, the command looks lik “ifconfig xl0 link 1A:2B:3C:4D:5E:6F” or “ifconfig fxp0 ether 1A:2B:3C:4D:5E:6F”

How to Change MAC address in Solaris

The shell command to change the MAC address in Sun Solaris is as below:

ifconfig



For example, the command looks like “ifconfig hme0 ether 1A:2B:3C:4D:5E:6F”. Note that the change is temporary that does not persist after a reboot. To make this change permanent, the command can be placed in a runtime control script (/sbin/sh).

How to Spoof MAC Address in HP-UX

It’s possible to change MAC address using HP-UX SAM. Select Networking and Communications, then selecting the interface, then click on Action -> Modify -> Advanced Options. Finally, change the value of station address, which is MAC address name in HP-UX.

How to Spoof and Change MAC Address in OpenBSD

Use the following command to change MAC Address to spoofed MAC in OpenBSD (after version 3.8):

ifconfig lladdr

For example, “ifconfig bge3 lladdr 1A:2B:3C:4D:5E:6F”.

How to Change to Spoofed MAC Address Permanently in OpenBSD

To make the MAC address changed at boot before network connection is established, and even before parsing of hostname.* file, edit the /etc/netstart file to add in the following lines before the line of “# Now parse the hostname.* file”:

if [ "$if" = "INTERFACE" ]; then
ifconfig lladdr
fi

# Now parse the hostname.* file
....

How to Change MAC Address in Mac OS X

Since Mac OS X 10.4.x (Darwin 8.x) onwards, the MAC address of wired Ethernet interface can be altered in Apple Mac OS X in a fashion similar to the Linux and FreeBSD methods. To do so, type the following command in Terminal.app:

sudo ifconfig en0 ether aa:bb:cc:dd:ee:ff

or

sudo ifconfig en0 lladdr aa:bb:cc:dd:ee:ff (for Mac OS X 10.5 Leopard)

where en0 is the network interface (numbered from en0, en1, en2 …) and aa:bb:cc:dd:ee:ff is the desired MAC address in hex notation.

Alternative: MacDaddy (download MacDaddyX.dmg, support Airport wireless adapter)

Saturday, January 15, 2011

How to get any e-book you like directly sent to you via IRC

How to get any e-book you like directly sent to you via IRC


IRC client
The first thing you're going to need is an IRC client. If you're running windows i suggest mIRC (download here)

Connecting to a server
You then want to run mIRC and input your nickname, your real name and e-mail are optional. Then in the speech bar bit you want to type "/server -m irc.irchighway.net" what this does is creates a new window inside mIRC which is connected to the "irc.irchighway.net" server.

In this new little window type in "/j #ebooks" this connects you to the "ebooks" channel.

Searching for e-books
When in this channel all you need to type is "@search" and the name of what you're looking for to find a list of e-books available. So, for example if i was searching for 'Python programming' i would type in "@search Python programming" this then sends you a .txt file with a list of e-books available.

Getting the e-book
To get the specific e-book sent to you directly simply open up the text file you have just received, see which book you'd like to have and type in the whole command which should look like this "!botnick name_of_book.pdf" the e-book then gets sent directly to you similarly to the .txt file.

Sunday, January 9, 2011

HAck admin with guest account

Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command prompt with administrator privileges because no user has logged on. From there we can hack the administrator password,even from a guest account.

Prerequisites:

Guest account with write access to system32.

Here is how to do that -

* Go to C:/windows/system32
* Copy cmd.exe and paste it on desktop
* Rename cmd.exe to sethc.exe
* Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.
When asked to overwrite,overwrite the sethc.exe
* Now log ut from your guest account and at the user select window,press shift key 5 times.
* Instead of sticky Key confirmation dialog,command prompt with full administrator privileges will open.
* Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
* You will see “ The command completed successfully” and then exit the command prompt and login into administrator with your new password.
* Congrats You have hacked admin from guest account.

Further..


Also, you can further create a new user at the command prompt by typing “NET USER xyz/ADD” where “xyz” is the username you would like to add with administrator privileges. Then hide your newly created admin account by -

Go to registry editor and navigating to this key

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserLis t]

Here create a new DWORD value, write its name as the “user name” that u created for your admin account

Use trial program forever

It works by making the program believe the date remains constant always.
No need to have cracks, keygens or serials for the software.
Just one software can take care of all your trial softwares and let you use them forever.

This is one of the best tools available.
Download CrackLock

You can also use another tool called "run as date". just google it.

Another one is Time Stopper.

There are many other softwares too. All these softwares have the same working style.
Now, one software will take care of all your needs.

Hack a Website by XSS

Wednesday, January 5, 2011

How to write upside down text

Ever wanted to write text upside down on websites? Click on this link and start flipping away everything that you type instantly.. you can then copy/paste them on wherever you want.



˙ʇuɐʍ noʎ ɹǝʌǝɹǝɥʍ uo ɯǝɥʇ ǝʇsɐd/ʎdoɔ uǝɥʇ uɐɔ noʎ ˙˙˙ʎןʇuɐʇsuı ǝdʎʇ noʎ ʇɐɥʇ ƃuıɥʇʎɹǝʌǝ ʎɐʍɐ ƃuıddıןɟ ʇɹɐʇs puɐ ʞuıן sıɥʇ uo ʞɔıןɔ ¿sǝʇısqǝʍ uo uʍop ǝpısdn ʇxǝʇ ǝʇıɹʍ oʇ pǝʇuɐʍ ɹǝʌǝ




http://www.sevenwires.com/play/UpsideDownLetters.htm