Saturday, December 27, 2008

UNIX Vs LINUX

UNIX Vs LINUX

UNIX:

Unix is a popular operating system.There are two "main" flavors, BSD, and System V. System V is what AT&T developed in 1969, nurtured and sold to people. BSD is the unix that came from Berkeley University.We people have generally interaction with System V unix.
It is a multi-processing, multi-user, family of operating systems that run on a variety of architechtures. UNIX allows more than one user to access a computer system at the same time.
It is the OS in which kernel interacts directly with the hardware.kernal is consider to be heart of this os.In this Operating system everything is considered as a file,provides greater security.

Ex: posix



LINUX:


Linux is an Operating system which use unix as its base and gives further more facilities and applications.Linux was first released by its inventor Linus Torvalds in 1991. Combining the Linux kernel with the GNU software forms the basis of the operating system family generally known as 'Linux'.

Merely speeking GUI is made in linux having unix as its core.Differnent organizations used the UNIX kernal and added their own essence to form their own version of linux.

Ex: Redhat, Fedora, Solaris,AIX,Ubuntu,Susee, Mandrake . .





Both UNIX and LINUX are Open source

HACKING:A PATH:- DOS ATTACK

Definition:



HACKING:A PATH:- DOS ATTACK

Such an attack clogs up so much bandwidth on the target system that it cannot serve even legitimate users.


Working:


ATTACKER-----Infinite Malicious Data-----à VICTIM


Tools:


üPing of Death, SYN Flooding, Teardrop, Smurf, Land [TYPES]


üTrin00, Tribal Flood Network etc [TOOLS]





Steps involved in
DOS Attacks



Ø1.Attacker---------Infinite/ Malicious Data--à Target Network


2.Target Network gets choked or cannot handle the malicious data and hence crashes.


3.As a result, even legitimate clients/ people cannot connect to the target network.



4.This results in loss of revenue, disrupt in services, inconvenience, customer dissatisfaction and many other problems.


PING OF DEATH
Ø

ØThe maximum packet size allowed to be transmitted by TCP\IP on a network is 65 536 bytes.
Ø

ØIn the Ping of Death Attack, a packet having a size greater than this maximum size allowed by TCP\IP, is sent to the target system.
Ø

ØAs soon as the target system receives a packet exceeding the allowable size, then it crashes, reboots or hangs.
Ø

ØThis attack can easily be executed by the ‘ping’ command as follows:
Ø
ping -l 65540 hostname


SMURF ATTACKS
Ø

ØIn SMURF Attacks, a huge number of Ping Requests are sent to the broadcast address of the target network, using Spoofed IP Addresses from within the target network.
Ø

ØDue to infinite loops thus generated and due to the large number of Ping Requests, the target network will crash, restart or hang up.


ØCountermeasure


Filter out all incoming packets which either:

ü Has its source address same as any internal system.

ü Has its target address as the broadcast address. There is NO reason why external systems need to send data to the broadcast address.



LAND ATTACKS

Ø

ØSome implementations of TCP/IP are vulnerable to packets which originate and terminate from the same IP Address.

Ø

ØHence, in a LAND attack, the attacker sends infinite packets to the victim system from the victim system itself (Spoofing!).

Ø

ØThe same source and target address and port number crashes the victim system.

Ø

ØCountermeasure:

Ø

• Simple filtering should solve the problem.



BUSINESS THREATS
•All services unusable.


•All users Disconnected.


•Loss of revenue.


•Deadlines can be missed.


•Unnecessary Inefficiency and Downtime.


•Share Values go down. Customer Dissatisfaction.


COUNTERMEASURES
§
§Separate or compartmentalize critical services.

§Buy more bandwidth than normally required to count for sudden attacks.

§Filter out USELESS/MALICIOUS traffic as early as possible.

§Disable publicly accessible services.

§Balance traffic load on a set of servers.

§Regular monitoring and working closely with ISP will always help!

§Patch systems regularly.

§IPSec provides proper verification and authentication in the IP protocol.

§Use scanning tools to detect and remove DOS tools.

TYPES OF WINDOWS VIRUS




TYPES OF WINDOWS VIRUS-
Its really a matter of concern that all virus,trojans,worm,malware,spyware .......and many more have been developed for WINDOWS operating System.No threat for unix,or linux and Macintosh.So here have a look of different types of virus...........

AdTool.*
AdvWare.*
AdWare.*------------------large classification
Backdoor.*(Trojan)-----------largely used for hacking purpose
Badjoke.*
BadTrans.worm
B02K.*
Bolanzo
BOrifice
Caw
CIH
Client.*
Constructor.*
CrackTool.HotHook
Damage.small
danton
DDoS
Dialer.*
Downloader.*
fraudTool.*
HackTool.*
Hoax.*
I-Worm.*
PornDialer.*
PSWTool.*
Rootkit.*
Trojan.*
Trojandownloader.*
TrojanDropper.*
TrojanExpl.Agent.bo
TrojanFlood.Ideknet.e
TrojanGameThief.*
TrojanProxy.*
TrojanPSW.*
TrojanSpy.*
TrojanSpy.zboot.*
W32.*- ----------------- most found virus
Worm.*
Worms.AutoRun.ml
YKRat.Backdoor

Renaming The Start Button:

Renaming The Start Button:



To rename the start button, you will need a hex editor.
My preference is UltraEdit

Copy the \windows\explore.exe file to a new name (e.g. explorer_1.exe)
With the hex editor, open that file and go to offset 412b6
You will see the word start with blanks between each letter
Edit it be any 5 characters or less
Save the file
Boot to DOS
Copy the existing c:\windows\explorer.exe to explorer.org
Copy explorer_1.exe to explorer.exe
You will also need to replace the explorer.exe in the c:\windows\system32\dllcache file as well with the new one.
Note: If the partition is NTFS and you can't access the files from DOS:

Start Regedit
Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon.
Change the value of Shell from Explorer.exe to explorer_1.exe

RESTRICTIONS IN WIN XP

RESTRICTIONS IN WIN XP

If you want to make restrictions to what users can do or use on their computer without
having to run Poledit, you can edit the Registry. You can add and delete Windows
features in this Key shown below.
Zero is Off and the value 1 is On. Example: to Save Windows settings add or modify
the value name NoSaveSettings to 0, if set to1 Windows will not save settings. And
NoDeletePrinter set to 1 will prevent the user from deleting a printer.
The same key shows up at:
HKEY_USERS\(yourprofilename)\Software\Microsoft\Windows\CurrentVersion\Poli
cies\Explorer so change it there also if you are using different profiles.
1.Open RegEdit
2.Go to HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Policies
3.Go to the Explorer Key (Additional keys that can be created under Policies are
System, Explorer, Network and WinOldApp )
4.You can then add DWORD or binary values set to 1 in the appropriate keys for ON
and 0 for off.
NoDeletePrinter - Disables Deletion of Printers
NoAddPrinter - Disables Addition of Printers
NoRun - Disables Run Command
NoSetFolders - Removes Folders from Settings on Start Menu
NoSetTaskbar - Removes Taskbar from Settings on Start Menu
NoFind - Removes the Find Command
NoDrives - Hides Drives in My Computers
NoNetHood - Hides the Network Neighborhood
NoDesktop - Hides all icons on the Desktop
NoClose - Disables Shutdown
NoSaveSettings - Don't save settings on exit
DisableRegistryTools - Disable Registry Editing Tools
NoRecentDocsMenu - Hides the Documents shortcut at the Start button
NoRecentDocsHistory- Clears history of Documents
NoFileMenu _ Hides the Files Menu in Explorer
NoActiveDesktop - No Active Desktop
NoActiveDesktopChanges- No changes allowed
NoInternetIcon - No Internet Explorer Icon on the Desktop
NoFavoritesMenu - Hides the Favorites menu
NoChangeStartMenu _ Disables changes to the Start Menu
NoFolderOptions _ Hides the Folder Options in the Explorer
ClearRecentDocsOnExit - Empty the recent Docs folder on reboot
NoLogoff - Hides the Log Off .... in the Start Menu
NoViewOnDrive – Restrict a drive to open
And here are a few more you can play with
ShowInfoTip
NoTrayContextMenu
NoStartMenuSubFolders
NoWindowsUpdate
NoViewContextMenu
EnforceShellExtensionSecurity
LinkResolveIgnoreLinkInfo
NoDriveTypeAutoRun
NoStartBanner
NoSetActiveDesktop
EditLevel
NoNetConnectDisconnect
RestrictRun - Disables all exe programs except those listed in the RestrictRun subkey
This key has many other available keys, there is one to even hide the taskbar, one to
hide the control panel and more. I'm not telling you how, as someone may want to
play a trick on you. The policies key has a great deal of control over how and what
program can run and how one can access what feature.
In the System key you can enter:
NoDispCPL - Disable Display Control Panel
NoDispBackgroundPage - Hide Background Page
NoDispScrSavPage - Hide Screen Saver Page
NoDispAppearancePage - Hide Appearance Page
NoDispSettingsPage - Hide Settings Page
NoSecCPL - Disable Password Control Panel
NoPwdPage - Hide Password Change Page
NoAdminPage - Hide Remote Administration Page
NoProfilePage - Hide User Profiles Page
NoDevMgrPage - Hide Device Manager Page
NoConfigPage - Hide Hardware Profiles Page
NoFileSysPage - Hide File System Button
NoVirtMemPage - Hide Virtual Memory Button
In the Network key you can enter:
NoNetSetup - Disable the Network Control Panel
NoNetSetupIDPage - Hide Identification Page
NoNetSetupSecurityPage - Hide Access Control Page
NoFileSharingControl - Disable File Sharing Controls
NoPrintSharing - Disable Print Sharing Controls
In the WinOldApp key you can enter:
Disabled - Disable MS-DOS Prompt
NoRealMode - Disables Single-Mode MS-DOS

Hidden Programs In Windows Xp


1- Private Character Editor
This program is for designing icons and Characters(Alphapet)
Click :start
Then :run
type :EUDCEDIT
.................................................................................................................................................

2- iExpress
This Program is for conerting your files to EXCUTABLE files
Click : start
Then : run
type : iexpress
.................................................................................................................................................

3-Disk Cleanup
This program used for cleaning harddisk to offer space
Click : start
Then : run
type : cleanmgr

.................................................................................................................................................

4-Dr Watson
This program Is for repairing problems in Windows
Click : start
Then : run
type : drwtsn32
.................................................................................................................................................

5-Windows Media Player 5.1
Opens the old media player
Click : start
Then : run
type : mplay32
.................................................................................................................................................

Program ............. CODE
__________ __________

Character Map = charmap

DirectX diagnosis = dxdiag

Object Packager = packager

System Monitor = perfmon

Program Manager = progman

Remote Access phone book = rasphone

Registry Editor = regedt32

File siganture verification tool = sigverif

Volume Contro = sndvol32

System Configuration Editor = sysedit

Syskey = syskey

Microsoft Telnet Client = telnet

XP Secrets...
Defrag

Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information.

Notes - Windows XP will run this automatically every three days or so, during system idle periods. BootVis will evoke this when you run the "Optimize System" function. There is no need to manually run this unless you wish to immediately optimize a newly installed application's load time.


For Paint
Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.

Secret - 10x Zoom
Instructions - Open an image and select the magnifying glass icon. Left-Click exactly on the line below the 8x.

The above 2 tricks works.. and i have checked...

Free Cell Cheat Code:

Secret - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.

Secret - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.


Solitaire Cheat Code:

Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.

Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one. delete

XP HIDDEN SECRATES:

XP HIDDEN SECRATES:

Defrag

Secret - Hidden Command Line Switch

Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information. Similar to what BootVis invokes.

Paint

Secret - Image Trails

Instructions - Open an image and hold down Shift then drag the image around to create an image trail.

Secret - 10x Zoom

Instructions - Open an image and select the magnifying glass icon. Left-Click exactly on the line below the 8x.

Game Secrets

FreeCell

Secret - Instant Win

Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.

Secret - Hidden Game Modes

Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.

Minesweeper

Secret - Reveal Mines

Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.

Pinball

Secret - Extra Balls

Instructions - Type 1max at the start of a new ball to get extra balls.

Secret - Gravity Well

Instructions - Type gmax at the start of a new game to activate the Gravity Well.

Secret - Instant Promotion

Instructions - Type rmax at the start of a new game to go up in ranks.

Secret - Skill Shot

Instructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:

First: 15,000 points

Second: 30,000 points

Third: 75,000 points

Fourth: 30,000 points

Fifth: 15,000 points

Sixth: 7,500 points

Secret - Test Mode

Instructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.

Secret - Unlimited Balls

Instructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting the game.

Solitaire

Secret - Instant Win

Instructions - Press Alt + Shift + 2 during game play to instantly win.

Secret - Draw single cards in a Draw Three game

Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.

OS Secrets

Add/Remove

Secret - Hidden Uninstall Options

Instructions - Warning: Proceed at your own risk! Browse to C:\Windows\inf\ and make a backup copy of sysoc.inf. Then open the original file C:\Windows\inf\sysoc.inf in notepad. Go to "Edit" and select "Replace". In "Find what:" type ,hide and in "Replace with:" type , then select "Replace All", save and close the file. Go to the control panel, "Add/Remove", select "Add/Remove Windows Components". You will now see many more Windows components to uninstall. Do not remove anything with no label or that you do not recognize or fully understand what it does. Doing so can break certain functionality in Windows.

Control Panel

Secret - Hidden Control Panel Extensions

Instructions - Download and install TweakUI, launch, go to "Control Panel" and check any item not selected, then "Apply" and "OK". You will now see the hidden control panel extensions.

Device Manager

Secret - Hidden Devices

Instructions - Go to the control panel, "System" icon, "Hardware" tab and select "Device Manager". Select View and Show hidden devices.

Music

Secret - Music from the Installer

Instructions - Browse to C:\Windows\system32\oobe\images\title.wma and play.

Shutdown

Secret - Display Hibernate Option on the Shut Down dialog

Instructions - Go to "Start", "Turn Off Computer..." and press either Shift key to change the "Stand By" button to "Hibernate".

Support Tools

Secret - Over 100 Windows XP Support Utilities are on the install CD

Instructions for Pre-SP2 users - If you do not have SP2 installed, put the original Windows XP CD in the CD-ROM Drive, run the D:\Support\Tools\setup.exe

Books On Hacking

Books On Hacking

Code:
17. [ FLASH ] rues on IBM AIX
http://video.antichat.net/file17.html


Code:
18. [ FLASH ] sequential of rues ispravlenym eksploytom
http://video.antichat.net/file18.html


Code:
19. Is utilized short hyphen. We make no invisible.
http://video.antichat.net/file19.html


Code:
20. Vulnerability http://www.chatmoscow.ru
http://video.antichat.net/file20.html


Code:
21. IRC. Mockery above Slader-Non
http://video.antichat.net/file21.html


Code:
22. Vulnerabilities SetccMS (XSS)
http://video.antichat.net/file22.html


Code:
23. Installation Apache, Php, Perl, Mysql to localhost
http://video.antichat.net/file23.html


Code:
24. Php- injection in the script of news CuteNews v1.3.1
http://video.antichat.net/file24.html


Code:
25. Method of the interpretation of khesha IPB 2..x and breaking the forum
http://video.antichat.net/file25.html


Code:
26. Breaking Invision Power Board sploytom
http://video.antichat.net/file26.html


Code:
27. New vulnerability PunBB
http://video.antichat.net/file27.html


Code:
28. cuz uze google'n'yandex before askin ' stupid questions %)
http://video.antichat.net/file28.html


Code:
29. WWWThreads Bug
http://video.antichat.net/file29.html


Code:
30. Breaking phpBB 2.0.15 new sploytom
http://video.antichat.net/file30.html


Code:
31. Active XSS in LiveJournal.com
http://video.antichat.net/file31.html


Code:
32. Installation of proxy to unix the machine
http://video.antichat.net/file32.html


Code:
33. XSS in phpBB with use phpNuke
http://video.antichat.net/file33.html


Code:
34. Idea of defeysa of the site through the search demands!
http://video.antichat.net/file34.html


Code:
35. Defeys of the site through the vulnerability in PunBB (php include)
http://video.antichat.net/file35.html


Code:
36. Breaking OF LARGE BROTHER - tntbrat.ru. SQL - injection.
http://video.antichat.net/file36.html


Code:
37. Breaking hack-info.net through PHP injection and GIF the file
http://video.antichat.net/file37.html


Code:
38. Breaking of the mailbox through the holes on the server
http://video.antichat.net/file38.html


Code:
39. SQL- Eng. in IPB 1. *, 2. *. Obtaining khesha of admina
http://video.antichat.net/file39.html


Code:
40. History of the breaking of one site
http://video.antichat.net/file40.html


Code:
41. XSS in MercuryBoard. New.
http://video.antichat.net/file41.html


Code:
42. Vulnerability IkonBoard. Reading it is file
http://video.antichat.net/file42.html


Code:
43. Error of khostera in tuning of system.
http://video.antichat.net/file43.html


Code:
44. Obtaining administrative privelegiy in paBugs
http://video.antichat.net/file44.html


Code:
45. Vulnerability phpBB in module downloads.php
http://video.antichat.net/file45.html


Code:
46. XSS in many search with- swing. It is in detail.
http://video.antichat.net/file46.html


Code:
47. Breaking phpBB new sploytom
http://video.antichat.net/file47.html


Code:
48. XSS in PunBB 1..x
http://video.antichat.net/file48.html


Code:
49. XSS in MercuryBoard 1..x
http://video.antichat.net/file49.html


Code:
50. Vulnerability in SR Guestbook
http://video.antichat.net/file50.html


Code:
51. Breaking of box on e-mail.ru (part of 2)
http://video.antichat.net/file51.html


Code:
62. Vulnerability in phpBB 2.0.12 (KEZ)
http://video.antichat.net/file62.html


Code:
63. Vulnerability in phpBB 2.0.12 (max_.pain89)
http://video.antichat.net/file63.html


Code:
64. We obtain seriynik for progi through ArtMoney
http://video.antichat.net/file64.html


Code:
65. We read strange letters on mail.ru through the sessions
http://video.antichat.net/file65.html


Code:
66. SQL injection in LedForums
http://video.antichat.net/file66.html


Code:
67. Example Post- Flood through DenyoLaunch III
http://video.antichat.net/file67.html


Code:
68. SQL injection in search.php in phpBB 2.0.6
http://video.antichat.net/file68.html


Code:
69. SQL injection in MercuryBoard 1.1.0
http://video.antichat.net/file69.html


Code:
70. Study of protection WinRAR 3..0b =)
http://video.antichat.net/file70.html


Code:
71. Second method of the theft of nikov in the chat room
http://video.antichat.net/file71.html


Code:
72. CHAT ROOM. Seizure of nikov.
http://video.antichat.net/file72.html


Code:
73. Presence s/n for WinZIP 8..0b
http://video.antichat.net/file73.html


Code:
74. We make patch for BlueFace (CodeFusion)
http://video.antichat.net/file74.html


Code:
75. We make patch for WinZIP 8..0b (CodeFusion)
http://video.antichat.net/file75.html


Code:
76. We penetrate in strange comp. through Remote Administrator
http://video.antichat.net/file76.html


Code:
77. Pincha no longer catches the antivirus
http://video.antichat.net/file77.html


Code:
78. Survey of bagov in cgi scripts.
http://video.antichat.net/file78.html


Code:
79. Idea of brutoforsa amperesecond through HTTP demands.
http://video.antichat.net/file79.html


Code:
80. As to drive away as'ku. One of the methods.
http://video.antichat.net/file80.html


Code:
81. By vlom with the aid of rAdmin Of brutforsera!
http://video.antichat.net/file81.html



Code:
82. one additional method to skachat' paid mp3 c of site mp3search.ru.
http://video.antichat.net/file82.html


Code:
83. Defeys on the rapid. Bagi on the server. Admin did not advance right on the folders.
http://video.antichat.net/file83.html


Code:
84. Vulnerability of site on cursor runcms
http://video.antichat.net/file84.html


Code:
85. Story about troyane pinch 1.0
http://video.antichat.net/file85.html


Code:
86. The new vulnerability Mybb. XSS works in all browsers.
http://video.antichat.net/file86.html


Code:
87. Breaking IcrediBB (SQL-injection)
http://video.antichat.net/file87.html


Code:
88. Baga in the the guest MPM Guesbook Pro
http://video.antichat.net/file88.html


Code:
89. As to rock mp3 for free from site mp3search.ru
http://video.antichat.net/file89.html


Code:
90. Sql-injection on cursor Php-Nuke
http://video.antichat.net/file90.html


Code:
91. SQL-injection in forum Zorum
http://video.antichat.net/file91.html


Code:
92. XSS and SQL-injection MyBB the forum
http://video.antichat.net/file92.html


Code:
93. Seizure Flesch chat room (part of 2)
http://video.antichat.net/file93.html


Code:
94. Seizure Flesch chat room (part 1)
http://video.antichat.net/file94.html


Code:
95. XSS in the forums in sparenykh BB tags VBulletin 3.0. *
http://video.antichat.net/file95.html


Code:
96. As to become adminom of forum ITA V1.49.
http://video.antichat.net/file96.html


Code:
97. Vulnerabilities in Zeroboard.
http://video.antichat.net/file97.html


Code:
98. Video about the the new XSS in the forums in sparenykh BB the tags
http://video.antichat.net/file98.html


Code:
99. UNION in SQL demands. Example of work.
http://video.antichat.net/file99.html


Code:
100. Vozmozhye vulnerabilities in scripts Manlix.
http://video.antichat.net/file100.html


Code:
101. As to become adminom on the site made in Flat-nuke.
http://video.antichat.net/file101.html


Code:
102. Error of adminov with installation Guestbook v1.1. Defeys on the rapid.
http://video.antichat.net/file102.html


Code:
103. Defeys for the small. Defeys on the rapid.
http://video.antichat.net/file103.html


Code:
104. Again PHPBB. if the provider of dull.
http://video.antichat.net/file104.html


Code:
105. XSS vulnerability in forum forum.antichat.ru (vbulletin 3.0.3)
http://video.antichat.net/file105.html


Code:
106. To the article about mail.ru. We steal Cooks in the chat room. More detailed video.
http://video.antichat.net/file106.html


Code:
107. To the article about mail.ru. We steal Cooks in the chat room. We become moderators chat.mail.ru.
http://video.antichat.net/file107.html


Code:
108. php inklyuding KorWeblog
http://video.antichat.net/file108.html


Code:
109. Breaking e-mail'ov 2. Sorting of passwords. Is utilized Brutus (under Windows).
http://video.antichat.net/file109.html


Code:
110. Breaking e-mail'ov. Is utilized THC - Hydra.
http://video.antichat.net/file110.html


Code:
111. Vulnerability Ultimate PHP Board (UPB) v1.9
http://video.antichat.net/file111.html


Code:
112. Forum Russian Board Or as it is not necessary to write authorization system. (found Max_.pain)
http://video.antichat.net/file112.html


Code:
113. As to obtain strange letters on ramblere
http://video.antichat.net/file113.html


Code:
114. LiteForum 2 (SQL-injection)
http://video.antichat.net/file114.html


Code:
115. We look passwords on forum Powered by Web Wiz Forums.
http://video.antichat.net/file115.html


Code:
116. Overcrowding of buffer. Theory.
http://video.antichat.net/file116.html


Code:
117. We steal UIN, having a base of the users
http://video.antichat.net/file117.html


Code:
118. As to steal the Internet on 445 port
http://video.antichat.net/file118.html


Code:
119. Baga ConfYmi 2.1
http://video.antichat.net/file119.html


Code:
120. We obtain root, I use sploita.
http://video.antichat.net/file120.html


Code:
121. Practitioner Flood
http://video.antichat.net/file121.html

Cool Trick

Cool Trick
If you are very much conscious about your space on hard drive, then a good idea would be uninstalling some unwanted application of windows such, which are never used, like Windows Messenger, but can’t find them on Add and Remove list, then try this one open notepad and open the file located in SystemRoot ( generally c:/> ) /windows/inf/sysoc.inf, once you have open the file then find the word “hide” in the file and simply delete it.





Now go to Add and Remove programs, Find the application, and uninstall it. Alternatively you can use this one to uninstall window messenger, click on run (start>run) now put this line and hit enter to uninstall windows messenger:

RUNDLL32 ADVPACK.DLL,LaunchINFSection %windir%\INF\MSMSGS.INF,BLC.Remove



Similarly to install back windows messenger just run this line:

RUNDLL32 ADVPACK.DLL,LaunchINFSection %windir%\INF\MSMSGS.INF,BLC.msmsgr

To allow Windows XP to close non-responsive applications automatically upon shutdown:

To allow Windows XP to close non-responsive applications automatically upon shutdown:

In the above method we decrease the time of shut down of applications,
but by this tweak, Windows XP can be set to close crashed applications automatically. While this does not technically speed up the shut down process, it does streamline it, and ensure that the user will not give the shutdown command then get up and leave, only to find the PC still powered on because Windows never received input on what to do with a hung application.

Open REGEDIT and navigate to ‘HKEY_CURRENT_USER\Control Panel\Desktop’





Highlight the value ‘AutoEndTasks.’

Change the value to ‘1'



XP will now be able to close hung applications without user input during the shutdown process.

Uninstalling Windows from Command Prompt

Uninstalling Windows from Command Prompt

One option included in Windows XP is the ability to uninstall XP if you performed an upgrade from Windows 98, 98SE, or Windows Me. The standard method of removing XP is achieved by booting into XP normally and uses the Add/Remove Programs tool in Control Panel. If you are unable to start XP normally, the second option is to load XP in Safe Mode then use the same tool. If you are unable to boot normally or boot into Safe Mode, XP can be removed by uninstalling from a Command Prompt. The procedure is as follows:

Important Note: This procedure is available only if a successful image of the previous operating system was created during the XP upgrade.

Start the computer to Safe Mode with Command Prompt.

At the command prompt, type cd\, and then press ENTER



Type cd\windows\system32, and then press ENTER.



Type osuninst.exe, and then press ENTER.



On screen instructions will guide you through the uninstall process to revert to the previous operating system.

This procedure can only be performed by users logged on as Administrator or a user with administrative rights.

Rename your processor

Rename your processor

1) open regedit



2) goto HKEY_LOCAL_MACHINE->HARDWARE->DESCRIPTION->SYSTEM - > CENTRALPRCESSOR



3)CHANGE PROCESSORNAMESTRING


-------------------------------------------

Correcting System Hang at Startup

Correcting System Hang at Startup

If your system hangs about 2 or 3 minutes at startup, where you can't access the Start
button or the Taskbar, it may be due to one specific service (Background Intelligent
Transfer) running in the background. Microsoft put out a patch for this but it didn't
work for me. Here's what you do:


· Click on Start/Run, type 'msconfig', then click 'OK'.



· Go to the 'Services' tab, find the 'Background Intelligent Transfer' service.
· Disable it, apply the changes & reboot.


(Note: Windows updates will not work correctly if this service is disabled)

MAKING WINDOWS XP GENUINE THE EASY WAY

MAKING WINDOWS XP GENUINE THE EASY WAY



download jellybean keyfinder from this website
http://www.magicaljellybean.com/keyfinder.shtml

Now open keyfinder.exe
Click on options and click "change windows key"
Now enter this key and you're done.
*****************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*****************************

P.S: this works on windows xp sp2 only......

ppl u can try this out...
this might sound silly but it works perfectly...

TRY INSTALLING IE7 OR MEDIA PLAYER11

How to Speedup your PC by disabling various Services

How to Speedup your PC by disabling various Services

Windows XP has a lot of services, some of which are not needed for normal use. To speed up and increase your systems security, disable these services.

To enter service manager-

Go to Start > Run and type services.msc and hit enter



Scroll down and highlight the service you want to adjust, right-click on it and choose Properties.

Now click the stop button and select Disable or Manual in the Startup Type scroll bar.

:idea: A useful tip is that instead of disabling something you are unsure of, set it to manual. When you restart your machine if that service has started then it is probably required by one of your components or software products. If it is still OFF then consider disabling it for greater protection.

Here’s the list of useless services:

Alerter - notifies selected users and computers of administrative alerts. If this service is turned off, applications that use the NetAlertRaise or NetAlertRaiseEx APIs will be unable to notify a user or computer (by a Message Box from the Messenger service) that the administrative alert took place.
Recommendation: Disabled.





Application Layer Gateway Service - Provides support for 3rd party plug-ins for Internet Connection Sharing/Internet Connection Firewall. Required if using Internet Connection Sharing/Internet Connection Firewall to connect to the internet.
Recommendation: Automatic if using ICS, Disabled if not.

Application Management - Used for Assign, Publish and Remove software services. If you can not modify your software installation of certain applications, put this service in to Automatic or Manual.



-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Make Your Menus Load Faster

Make Your Menus Load Faster

1. Go to Start then Run



2. Type ‘Regedit’ then click ‘Ok’





3. Find “HKEY_CURRENT_USER\Control Panel\Desktop\”





4. Select “MenuShowDelay”



5. Right click and select “Modify’

6. Reduce the number to around “100 ’





This is the delay time before a menu is opened. You can set it to “0’ but it can make windows really hard to use as menus will open if you just look at them - well move your mouse over them anyway.

Do anyone know where the password file is stored in pc(user account's) ?

Do anyone know where the password file is stored in pc(user account's) ?



Here is the answer for it

Yes password file was stored in windows system32 config and sam file

named as SAM

location : C:\windows\system32\config\SAM


we can change password by entering into the location given above.
limitation:
you cant access properly if you have not the administrator rights even you can do the changes if you are added in the power user list other wise you cant do anything with the limited account.

But you can do using cmd as given below

Go to Dos type net user administrator *
press enter now type your own password
So now you have hacked the administrator

Sunday, December 21, 2008

Hack The time on the windows xp taskbar

Hack The time on the windows xp taskbar:

To hack the Time on the taskbar let's use the registry
Start -----> Run and type "regedit"





once on the regedit, we will navigate through HKEY_CURRENT_USER\Control Panel\International and select the"International folder"On the right panel we will change the value of s1159 and s2359 by MORNING and EVENING









To do that let's double click on s1159 or right click and click on modify and change AM by MORNING do the same thing to s2359







close all and that it is