Monday, February 28, 2011

ONLINE WPA CRACKER-THE CLOUD ERA BEGINS

"LINUX IS SOUL OF HACKERS AND CLOUD IS FUTURE OF HACKING"

Guess what we have new player in the market thats online wpa cracker with cloud computing power.Cracking WPA was never easy it took many days for a normal computer but cloud computing makes it easier for us with 400 cpu cluster of power with 135 million dictionary words thats what you call cracking as a service lolz :D

here is official intro

WPA Cracker is a cloud cracking service for penetration testers and network auditors who need to check the security of WPA-PSK protected wireless networks.
WPA-PSK networks are vulnerable to dictionary attacks, but running a respectable-sized dictionary over a WPA network handshake can take days or weeks. WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords. While this job would take over 5 days on a contemporary dual-core PC, on our cluster it takes an average of 20 minutes, for only $17.
NEW :: We now offer Germany dictionary support, a 284 million word extended English dictionary option, and ZIP file cracking.


there website

note:its not a free service although but fast service. 
developers time to find new extension :P


Do share your views about the new wpa cracker:)

ONLINE WPA CRACKER-THE CLOUD ERA BEGINS

This is my quote"LINUX IS SOUL OF HACKERS AND CLOUD IS FUTURE OF HACKING"

Guess what we have new player in the market thats online wpa cracker with cloud computing power.Cracking WPA was never easy it took many days for a normal computer but cloud computing makes it easier for us with 400 cpu cluster of power with 135 million dictionary words thats what you call cracking as a service lolz :D

here is official intro

WPA Cracker is a cloud cracking service for penetration testers and network auditors who need to check the security of WPA-PSK protected wireless networks.
WPA-PSK networks are vulnerable to dictionary attacks, but running a respectable-sized dictionary over a WPA network handshake can take days or weeks. WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords. While this job would take over 5 days on a contemporary dual-core PC, on our cluster it takes an average of 20 minutes, for only $17.
NEW :: We now offer Germany dictionary support, a 284 million word extended English dictionary option, and ZIP file cracking.


there website

note:its not a free service although but fast service. 
developers time to find new extension :P


Do share your views about the new wpa cracker:)

Sunday, February 27, 2011

Cain & Abel v4.9.37

Cain & Abel is a password recovery tool for Microsoft Operating Systems. Cain & Abel allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols


The latest version of cain and abel faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.
Download Cain & Abel v4.9.37 (ca_setup.exe) here

Cain & Abel v4.9.37

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols


The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.
Download Cain & Abel v4.9.37 (ca_setup.exe) here

BLACKBUNTU COMMUNITY EDITION

Blackbuntu is distribution for penetration testing which was specially designed for security training students and practitioners of information security.
Blackbuntu is Ubuntu base distro for Penetration Testing with GNOME Desktop Environment. It's currently being built using the Ubuntu 10.10 and work on reference Back|Track.


  • Information Gathering
  • Network Mapping
  • Vulnerability Assessment
  • Privilege Escalation
  • Maintaining Access
  • Intrusion Detection and Prevention
  • Digital Forensics
  • Web Application Analysis
  • Reverse Engineering
  • Wireless Analysis
  • Security Distributions
  • Malicious Code Analysis
  • AntiSpyware & AntiVirus Tools
  • Password Recovery & Managers
Download Blackbuntu CE v0.2 (bbuntu-ce-0.2.iso) here.

ISO is abt 2.63 gb it contains few more tools than backtrack.It could be really good for those who have hardware problem with backtrack+are looking for GNOME environment

BLACKBUNTU COMMUNITY EDITION

Blackbuntu is distribution for penetration testing which was specially designed for security training students and practitioners of information security.
Blackbuntu is Ubuntu base distro for Penetration Testing with GNOME Desktop Environment. It's currently being built using the Ubuntu 10.10 and work on reference Back|Track.


  • Information Gathering
  • Network Mapping
  • Vulnerability Assessment
  • Privilege Escalation
  • Maintaining Access
  • Intrusion Detection and Prevention
  • Digital Forensics
  • Web Application Analysis
  • Reverse Engineering
  • Wireless Analysis
  • Security Distributions
  • Malicious Code Analysis
  • AntiSpyware & AntiVirus Tools
  • Password Recovery & Managers
Download Blackbuntu CE v0.2 (bbuntu-ce-0.2.iso) here.

ISO is abt 2.63 gb it contains few more tools than backtrack.It could be really good for those who have hardware problem with backtrack+are looking for GNOME environment

Saturday, February 26, 2011

How To Hack Facebook Using Phishing Technique

How To Hack Facebook Using Phishing Technique


How To Hack Facebook Using Phishing Technique
Ethical Hacking Tutorials

Before we start tutorial how to hack facebook by phishing technique, maybe you interested with this,
Hack and Code for Facebook
Facebook Suspender
What is FacebooZ?
How To Create Fake Login
How To Hack Facebook For Free
Facebook Hacking Course

Firstly, we will using Super Phisher Creator is a more advanced Phisher builder than the simple Phisher Creator. We can create phishing page for any website by using this phisher creator to hack any email account.







Let's Start Tutorial Now.


Open Super Phisper 1.0, Insert as following below.
URL of Login Page : Type whatever website your want to hack, For example : http://www.facebook.com/login.php
Name of Log File : What is your password log file. I suggested you use this : Password.txt
Name of PHP file : Leave it there. No need to change. login.php
Site to redirect to
: What is the redirect page after your victim log in. Example : http://www.facebook.com/?ref=home


After done, click at Build Phisher.

Then, there will be a new folder created named as Output. Open the folder and you can see two file
1) Index
2) Login.php



Upload the files into free web hosting files. I suggeseted RIPWAY (http://ripway.com/)
I strongly disagree with you if you want to upload to 110MB.COM (www.110mb.com) because they always delete your phishing account.

After you upload this two files, Open file of index.html now.

Try to login from your Facebook Phishing page (Index.html).

Then, refresh your ripway account. You will see a new file of password.txt in your files list.

In Password.txt file, all password and username will store and save here.


 DOWNLOAD NOW

I would like to say thank you and highly appreciate your support. Please subscribe from the link bottom to appreciate my work and get the daily updates. Thank You. Happy Ethical Hacking Subscribe to Free Ultimate Download by Email

What Is jQuery and Official jQuery Website


What Is jQuery and Official jQuery Website
Ethical Hacking Tutorials

What Is jQuery
jQuery is a library that makes it quicker and easier to build JavaScript webpages and web apps. Often with jQuery you can write a single line of code to achieve what would have taken 10-20 lines of regular JavaScript code.
jQuery is itself written in JavaScript, and comes in the form of a single .js file that you link to from your webpage. Your JavaScript code then accesses the library by calling various jQuery functions.


Why jQuery
You can use simple JavaScript to perform all the functions that jQuery provides. Then why jQuery? The jQuery library is providing many easy to use functions and methods to make rich applications. These functions are very easy to learn and even a designer can learn it fast. Due to these features jQuery is very popular and in high demand among the developers. You can use jQuery in all the web based applications irrespective of the technology.


What Can You Do With jQuery?

jQuery makes it easy to write powerful JavaScript apps and create eye-catching animated effects rivalling those of Flash movies. Amongst other things, jQuery is great for:
  • Adding animated effects to elements. jQuery lets you easily add effects such as fading in/out, sliding in/out, and expanding/contracting.
  • Making XML (Ajax) requests. These use JavaScript to request additional data from the Web server without having to reload the page.
  • Manipulating the DOM. You can easily add, remove, and reorder content in the Web page using just a couple of lines of code.
  • Creating image slideshows. You can use jQuery effects to build nice animated slideshows and lightboxes.
  • Making drop-down menus. jQuery makes it easy to create multi-level dropdowns with animations.
  • Creating drag-and-drop interfaces. Use jQuery to build a page with elements that can be repositioned or reordered simply by dragging and dropping.
  • Adding power to forms. With jQuery you can easily add complex client-side form validation, create auto-complete Ajax text fields that pull data from a server-side database, and so on.


Feature Include in jQuery

  • Supports All Versions of CSS
  • Supports Events and Utilities
  • Works with Ajax
  • Creates Usability, Effects and Animations
  • Works in all Popular Internet Browsers
  • Small File Size
  • Can combine with Prototype
  • Can work with Other Coding Languges


Why jQuery Use For Development?
jQuery is a coding language that is a branch from JavaScript. jQuery works like JavaScript where its used to help with interaction and effects with your development code. jQuery hasn’t been around very long, it was release in January 2006 and only on version 1.4.0. jQuery is a new and exciting technology that is catching on quickly and making the internet more interactive and enjoyable.





I would like to say thank you and highly appreciate your support. Please subscribe from the link bottom to appreciate my work and get the daily updates. Thank You. Happy Ethical Hacking Subscribe to Free Ultimate Download by Email

How to Search Music Using Google Search Engine

How to Search Music Using Google Search Engine

How to Search Music Using Google Search Engine
 Ethical Hacking Tutorials

Music is a good entertainment for us while we are reading, cooking, studying and everything. There are many type of music nowadays. Usually, people wants to download their music which their love to hear. So, today I will teach you all how to search music using google search engine.


Just type this code
?intitle:index.of? mp3 Music
?intitle:index.of? mp3 “Music”
?intitle:index.of? mp3 “Music” untitled
?intitle:index.of? mp3 “Music”

Change the Music into allbum or music title your want to download.

I would like to say thank you and highly appreciate your support. Please subscribe from the link bottom to appreciate my work and get the daily updates. Thank You. Happy Ethical Hacking Subscribe to Free Ultimate Download by Email

Wednesday, February 23, 2011

WEAKERTHAN LINUX FOR HACKERS

Most of you would have heard about backtrack but its not the only one in the business.Weakerthan is another linux based pentesting distro which is really good..Weakerthan is my second favorite after backtrack


Intro:


WeakNet Linux is designed primarily for penetration testing, forensic analysis and other security tasks. The default desktop environment is GNOME.

The tools i have selected are tools we use all the time here, as i said, If you find some that you want in it, please let me know. The image is about 1GB meaning; It will have to be on DVD, meaning; I can't host it here without risk of bandwidth dying! I need a place to upload it to. Some code written by WeakNet Labs Assistants from this site that are preinstalled:

* BRuWRT-FORSSE v2.0
* Easy-SSHd
* Web-Hacking-Portal v2.0
* Perlwd
* Netgh0st v3.0
* YouTube-Thief!
* Netgh0st v2.2
* DomainScan
* ADtrace
* Admin-Tool
* Tartarus v0.1
* and much more..


really good GUI+vulnerable applications to test our hacking skills


my personal experience with weaknet was really good & its worth.


WEAKERTHANv2 WeakNet Linux 5 - ISO ~684MB 
WeakNet Linux Complete Administration Guide 

WEAKERTHAN LINUX FOR HACKERS

Most of you would have heard about backtrack but its not the only one in the business.Weakerthan is another linux based pentesting distro which is really good.My second favorite after backi


Intro:


WeakNet Linux is designed primarily for penetration testing, forensic analysis and other security tasks. The default desktop environment is GNOME.

The tools i have selected are tools we use all the time here, as i said, If you find some that you want in it, please let me know. The image is about 1GB meaning; It will have to be on DVD, meaning; I can't host it here without risk of bandwidth dying! I need a place to upload it to. Some code written by WeakNet Labs Assistants from this site that are preinstalled:

* BRuWRT-FORSSE v2.0
* Easy-SSHd
* Web-Hacking-Portal v2.0
* Perlwd
* Netgh0st v3.0
* YouTube-Thief!
* Netgh0st v2.2
* DomainScan
* ADtrace
* Admin-Tool
* Tartarus v0.1
* and much more..



really good GUI+vulnerable applications to test our hacking skills


my personal experience with weaknet was really good & its worth.


WEAKERTHANv2 WeakNet Linux 5 - ISO ~684MB 
WeakNet Linux Complete Administration Guide 

BackTrack 4

Backtrack4 is the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.

it contains about 300 pre installed tools :)
official change log for bt4 r2
  • Kernel 2.6.35.8 – *Much* improved mac80211 stack.
  • USB 3.0 support.
  • New wireless cards supported.
  • All wireless Injection patches applied, maximum support for wireless attacks.
  • Even *faster* desktop environment.
  • Revamped Fluxbox environment for the KDE challenged.
  • Metasploit rebuilt from scratch, MySQL db_drivers working out of the box.
  • Updated old packages, added new ones, and removed obsolete ones.
  • New BackTrack Wiki with better documentation and support.
  • Our most professional, tested and streamlined release ever.

 yes i would totally recommend you guys to use backtrack instead of other distros reason:
Backtrack is owned by offensive security they guys update it regularly+it has biggest community support in terms of hacking distros.

problem with backi was lack of hardware support.

you can download BACKTRACK from here(vmware&iso)

BackTrack 4

the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.

it contains about 300 pre installed tools :)
official change log for bt4 r2
  • Kernel 2.6.35.8 – *Much* improved mac80211 stack.
  • USB 3.0 support.
  • New wireless cards supported.
  • All wireless Injection patches applied, maximum support for wireless attacks.
  • Even *faster* desktop environment.
  • Revamped Fluxbox environment for the KDE challenged.
  • Metasploit rebuilt from scratch, MySQL db_drivers working out of the box.
  • Updated old packages, added new ones, and removed obsolete ones.
  • New BackTrack Wiki with better documentation and support.
  • Our most professional, tested and streamlined release ever.

 yes i would totally recommend you guys to use backtrack instead of other distros reason:
Backtrack is owned by offensive security they guys update it regularly+it has biggest community support in terms of hacking distros.

problem with backi was lack of hardware support.

you can download BACKTRACK from here(vmware&iso)




Tuesday, February 22, 2011

Simple Ping Sweep Using Notepad


 Simple Ping Sweep Using Notepad

This code is a simple batch script for ping sweep if u on the network. Just run it in .bat extension.But what is Ping sweep? Ping sweep  is a technique used to determine which of a range of IP addresses map to live hosts. It consists of ICMP ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. A ping is often used to check that a network device is functioning. To disable ping sweeps on a network, administrators can block ICMP ECHO requests from outside sources.  
Also known, basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers). Whereas a single ping will tell you whether one specified host computer exists on the network, a ping sweep consists of ICMP (Internet Control Message Protocol) ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. Ping sweeps are among the older and slower methods used to scan a network.


Copy the code below.

@echo off
cls
@color 0A
echo
echo ********************************
echo *  Ethical Hacking Tutorials Blogspot    *
echo ********************************
echo.
for /l %%a in (1,1,255) do (
ping -n 1 10.19.127.%%a | find "Reply"
)
----------------------------------------------------------------------
 Paste this code in notepad, then save it in "ping sweep.bat". copy include the quote. Save it.





I would like to say thank you and highly appreciate your support. Please subscribe from the link bottom to appreciate my work and get the daily updates. Thank You. Happy Ethical Hacking Subscribe to Free Ultimate Download by Email

How To Crack Simple MD5


 How To Crack Simple MD5 | Ethical Hacking Tutorials

 In this tutorial, I will teach you how to crack simple MD5. MD5 is hash value which has been employed in a wide variety of security applications nowdays. In global net, we can simplify MD5 decrypter and generate MD5 Hash in online. What is MD5? You can find more information of MD5 in Wikipedia.



MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash function with a 128-bit (16-byte) hash value. Specified in RFC 1321, MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. However, it has been shown that MD5 is not collision resistant as such, MD5 is not suitable for applications like SSL certificates or digital signatures that rely on this property. An MD5 hash is typically expressed as a 32-digit hexadecimal number. MD5 was designed by Ron Rivest in 1991 to replace an earlier hash function, MD4. In 1996, a flaw was found with the design of MD5. While it was not a clearly fatal weakness, cryptographers began recommending the use of other algorithms, such as SHA-1 (which has since been found also to be vulnerable). In 2004, more serious flaws were discovered, making further use of the algorithm for security purposes questionable; specifically, a group of researchers described how to create a pair of files that share the same MD5 checksum. Further advances were made in breaking MD5 in 2005, 2006, and 2007. In an attack on MD5 published in December 2008, a group of researchers used this technique to fake SSL certificate validity. US-CERT of the U. S. Department of Homeland Security said MD5 "should be considered cryptographically broken and unsuitable for further use,"and most U.S. government applications will be required to move to the SHA-2 family of hash functions after 2010.


Let's start our tutorial. How To Crack Simple MD5,

 #!/usr/bin/perl
$ver = "01";
$dbgtmr = "1"; #Intervall of showing the current speed + lastpassword in seconds.

if ($dbgtmr<=0){ die "Set dbgtmr to a value >=1 !\n";};
use Digest::MD5 qw(md5_hex);
use Time::HiRes qw(gettimeofday);

if ($ARGV[0]=~"a") {
$alpha = "abcdefghijklmnopqrstuvwxyz";}
if ($ARGV[0]=~"A") {
$alpha = $alpha. "ABCDEFGHIJKLMNOPQRSTUVWXYZ";}
if ($ARGV[0]=~"d") {
$alpha = $alpha."1234567890";}
if ($ARGV[0]=~"x") {
$alpha = $alpha. "!\"\$%&/()=?-.:\\*'-_:.;,";}

if ($alpha eq "" or $ARGV[3] eq "") {usage();};
if (length($ARGV[3]) != 32) { die "Sorry but it seems that the MD5 is not valid!\n";};

print "Selected charset for attack: '$alpha\'\n";
print "Going to Crack '$ARGV[3]'...\n";

for (my $t=$ARGV ;$t<=$ARGV[2];$t++){
crack ($t);
}

sub usage{
print "\n\nMD5 Hash Bruteforce Kit v_$ver\n";
print "by unix_chro alias backtrack (311733@yahoo.com)\n";
print "Member in staff leader:elite-members,ubuntu-
hackers\n\n";
print "USAGE\n";
print "./md5crack <charset> <mincount> <maxcount> <yourMD5>\n";
print " Charset can be: [aAdx]\n";
print " a = {'a','b','c',...}\n";
print " A = {'A','B','C',...}\n";
print " d = {'1','2','3',...}\n";
print " x = {'!','\"',' ',...}\n";
print "EXAMPLE FOR CRACKING A MD5 HASH\n";
print "./md5crack.pl ad 1 3 900150983cd24fb0d6963f7d28e17f72\n";
print " This example tries to crack the given MD5 with all lowercase Alphas and all digits.\n";
print " MD5 Kit only tries combinations with a length from 1 and 3 characters.\n-------\n";
print "./md5crack.pl aA 3 3 900150983cd24fb0d6963f7d28e17f72\n";
print " This example tries to crack the given MD5 with all lowercase Alphas and all uppercase Alphas.\n";
print " MD5 Kit only tries passwords which length is exactly 3 characters.\n-------\n";
print "./md5crack.pl aAdx 1 10 900150983cd24fb0d6963f7d28e17f72\n";
print " This example tries to crack the given MD5 with nearly every character.\n";
print " MD5 Kit only tries combinations with a length from 1 to 10 characters.\n";
die "Quitting...\n";
}

sub crack{
$CharSet = shift;
@RawString = ();
for (my $i =0;$i<$CharSet;$i++){ $RawString = 0;}
$Start = gettimeofday();
do{
 for (my $i =0;$i<$CharSet;$i++){
  if ($RawString[$i] > length($alpha)-1){
   if ($i==$CharSet-1){
   print "Bruteforcing done with $CharSet Chars. No Results.\n";
   $cnt=0;
   return false;
  }
  $RawString[$i+1]++;
  $RawString[$i]=0;
  }
 }
##################################################  #
  $ret = "";
  for (my $i =0;$i<$CharSet;$i++){ $ret = $ret . substr($alpha,$RawString[$i],1);}
  $hash = md5_hex($ret);
  $cnt++;
  $Stop = gettimeofday();
  if ($Stop-$Start>$dbgtmr){
   $cnt = int($cnt/$dbgtmr);
   print "$cnt hashes\\second.\tLast Pass '$ret\'\n";
   $cnt=0;
   $Start = gettimeofday();
  }
           print "$ARGV[3] != $hash ($ret)\n";
  if ($ARGV[3] eq $hash){
   die "\n**** Password Cracked! => $ret\n";
  }
##################################################  #
 #checkhash($CharSet)."\n";

 $RawString[0]++;
}while($RawString[$CharSet-1]<length($alpha));
}

sub checkhash{
$CharSet = shift;
$ret = "";
for (my $i =0;$i<$CharSet;$i++){ $ret = $ret . substr($alpha,$RawString[$i],1);}
$hash = md5_hex($ret);
$cnt++;
$Stop = gettimeofday();
if ($Stop-$Start>$dbgtmr){
 $cnt = int($cnt/$dbgtmr);
 print "$cnt hashes\\second.\tLast Pass '$ret\'\n";
 $cnt=0;
 $Start = gettimeofday();
}

if ($ARGV[3] eq $hash){
 die "\n**** Password Cracked! => $ret\n";
}

}



save it as *.pl
How to use ? Easy.
-Install perl language console, then run.
- c:\> perl -script.pl


I would like to say thank you and highly appreciate your support. Please subscribe from the link bottom to appreciate my work and get the daily updates. Thank You. Happy Ethical Hacking Subscribe to Free Ultimate Download by Email

Monday, February 21, 2011

How To Use Windows 7 Without Activation


Well, most of you might be know of the fact that it is possible to use Windows 7 and Vista for 120 days without activation right.? Actually, this is possible to use windows 7 without activation using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. But, in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.




1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.

2. Now type the following command and hit enter
slmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.
4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform

5. In right-side pane, change value of SkipRearm to 1.
6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.
120 days using “slmgr -rearm” command before registry edit +                                                                                                                                                               
240 days using “slmgr -rearm” command after registry edit
 =      360 Days

What is Windows Product Activation (WPA) and How It Works?


 What is  Windows Product Activation (WPA)  and How It Works?

Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well. WPA enforces each end user to activate their copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. How WPA really works was a closely guarded secret until GmbH analyzed WPA using a copy of Windows XP RC1 and published a paper on their findings.
In this post you will find answers to some of the most frequently asked questions about Windows Product Activation.

Why activation?

Microsoft’s intention behind the activation is to limit the usage of it’s Windows operating system to only one machine for which the retail license is issued. Any other computer which runs on the same license must be disallowed from using the software. Thus WPA demands for activation of the product within 30 days of it’s installation so as to ensure that it is genuine. 

What does “Genuine Windows” means?

The copy of Windows is said to be genuine only if the product key used during the installation is genuine. It means that a given product key (retail license) must be used to install Windows only on one computer for which the license was purchased. Thus if the same key is used for the installation on another computer, then it is said to be a pirated copy. 

Exactly what information is transmitted during the activation?

When you activate your copy of Windows you are transmitting an Installation ID code to the Microsoft either by phone or Internet depending on the method you choose to activate. Based on this, the Microsoft’s licensing system can determine whether or not the installed OS is genuine. If it is said to be genuine, then the system will receive the Activation ID which completes the activation process. If the activation is done via telephone then the Activation ID needs to be entered manually to complete the activation process.

What information does the Installation ID contain?

This Installation ID is a 50-digit number which is derived from the following two data.
1. Product ID – It is actually derived from the 25-digit product key (the alphanumeric value that is printed on the sticker over the Windows CD/DVD case) that is entered during the installation of the operating system. The Product ID is used to uniquely identify your copy of Windows.
2. Hardware ID – This value is derived based on the hardware configuration of your computer. 
The WPA system checks the following 10 categories of the computer hardware to derive the Hardware ID:
  • Display Adapter
  • SCSI Adapter
  • IDE Adapter (effectively the motherboard)
  • Network Adapter (NIC) and its MAC Address
  • RAM Amount Range (i.e., 0-64mb, 64-128mb, etc.)
  • Processor Type
  • Processor Serial Number
  • Hard Drive Device
  • Hard Drive Volume Serial Number (VSN)
  • CD-ROM / CD-RW / DVD-ROM
Thus the Installation ID which is a combination of Product ID and Hardware ID is finally derived and sent to Microsoft during the activation process.

How is the Installation ID validated?

The Installation ID needs to be validated to confirm the authenticity of the installed copy of Windows. So after the Installation ID is received by Microsoft, it is decoded back so as to obtain the actual product key and the hardware details of the computer involved in the activation process.
The Microsoft’s system will now look to see if this is the first time the product key is being used for the activation. This happens when the user is trying to activate his Windows for the first time after purchase. If this is the case then the Installation ID is validated and the corresponding Activation ID is issued which completes the activation process.
However Microsoft system will now associate this product key with the hardware ID of the computer and stores this information on their servers. In simple words, during the first use of the product key, it is paired together with the Hardware ID and this information is stored up on the Microsoft servers.

What if a computer running a pirated copy of Windows attempts to activate?

 The activation fails whenever the copy of Windows installed is not said to be genuine. This usually happens when the product key used for the installation is said to have been used earlier on a different computer. This is determined during the activation process as follows:
During the validation of the Installation ID, the Microsoft’s system checks to see if the same product key was used in any of the previous activation processes. If yes then it looks to see the Hardware ID associated with it. The computer running a pirated copy of Windows will obviously have a different hardware configuration and hence the Hardware ID will mismatch. In this case the activation process will fail.
Thus for a successful activation, either of the following two cases must be satisfied:
  1. The product key must have been used for the first time. ie: The product key should not have been used for earlier activations on any other computer.
  2. If the product key is said to have been used earlier, then the Hardware ID should match. This happens only if the same computer for which the license was genuinely purchased is attempting for subsequent activation.

What about formatting the hard disk?

Each time the hard disk is reformatted and Windows is re-installed, it needs to be re-activated. However the activation process will be completed smoothly since the same computer is attempting for subsequent activation. In this case both the product key and the Hardware ID will match and hence the activation becomes successful.

What is I upgrade or make changes to my hardware?

In the above mentioned 10 categories of hardware, at least 7 should be the same. Thus you are allowed to make changes to not more than 3 categories of hardware. If you make too many changes then your activation will fail. In this case, it is necessary to contact the customer service representative via phone and explain about your problem. If he is convinced he may re-issue a new product key for your computer using which you can re-activate your Windows.

Some things WPA does not do

  • WPA does not send any personal information at all about you to Microsoft. There is still an option to register the product with Microsoft, but that is separate and entirely voluntary.
  • If you prefer to activate via phone, you are not required to give any personal information to Microsoft.
  • WPA does not provide a means for Microsoft to turn off your machine or damage your data/hardware. (Nor do they even have access to your data). This is a common myth that many people have about Microsoft products.
  • WPA is not a “lease” system requiring more payments after two years or any other period. You may use the product as licensed in perpetuity.
 Credit to Gohacking

I would like to say thank you and highly appreciate your support. Please subscribe from the link bottom to appreciate my work and get the daily updates. Thank You. Happy Ethical Hacking Subscribe to Free Ultimate Download by Email

Sunday, February 20, 2011

WHAT IS LINUX


As you move in this world of hacking.You will realise the importance of linux for hackers,programmers,geeks.

I wont go in deep here in hackersbay for more tutorials&functioning of linux you can refer to our sister site

 What exactly is linux&its importance


Linux is an operating system based on unix.Some other common operating systems are Unix (and its variants BSD, AIX, Solaris, HP-UX, and others); DOS; Microsoft Windows; Amiga; and Mac OS.

Linux was originally created by Linus Torvalds with the assistance of developers from around the globe. Linux is free to download, edit and distribute. Linux is a very powerful operating system and it is gradually becoming popular throughout the world.

World's fastest supercomputer uses linux so you can realise how powerful linux can be.

Linux is free operating system not like windows where you have to pay thousands of $$ costing half of the hardware of pc.Linux is an open source means anyone can edit it legally as per his/her convenience.

There are many distributions of linux available -ubuntu, madvira, fedora, open suse, mint etc


But desktop market 7-15% bcuz its not easy to use it..but once u get habit of it i bet ull spit on windows

  Advantages Of linux

1) BETTER SECURITY THAN WINDOWS -- Nowadays you can easily see windows remote exploit flying around.Yes windows is easy to attack as compared to linux.

2)RESOURCES AVAILABLE BY DEFAULT-many software addons drivers are already installed on it

3)GOOD FOR HACKING - There are distributions specially designed for hackers backtrack,weaknet,blackbuntu,secmic etc

4)ITS FREE NOT LIKE WINDOWS (WHO WILL PAY THOUSANDS OF $$ )
the only linux which costs some pennies is redhat.

5)LIVE CD-One of the best feature you can run it without evan affecting your hd

DISADVANTAGES

1)NOT MANY S/W companies supporting linux based softwares

2)NOT EASY AS WINDOWS --Its command based,&requires tweaking.

3)EXE SUPPORT-basic extension exe is not supported but you can run them via WINE


What for beginners?where to start from

Well i would suggest ubuntu(only linux for humans) as it has largest community support so if you have any problem it could be easily resolved easily and its much user friendly linux

grab these 2 books linux bible&ubuntu unleashed.These books have good data for linux and ubuntu if you want to learn linux more deeply.


for linux tweaks and tutorial we wont post them on hb u can find them on basicgeeks.com

upcoming updates:linux distributions for hackers :)




Do share the post with your friends.

WHAT IS LINUX


As you move in this world of hacking.You will realise the importance of linux for hackers,programmers,geeks.

I wont go in deep here in hackersbay for more tutorials&functioning of linux you can refer to our sister site

 What exactly is linux&its importance


Linux is an operating system based on unix.Some other common operating systems are Unix (and its variants BSD, AIX, Solaris, HP-UX, and others); DOS; Microsoft Windows; Amiga; and Mac OS.

Linux was originally created by Linus Torvalds with the assistance of developers from around the globe. Linux is free to download, edit and distribute. Linux is a very powerful operating system and it is gradually becoming popular throughout the world.

World's fastest supercomputer uses linux so you can realise how powerful linux can be.

Linux is free operating system not like windows where you have to pay thousands of $$ costing half of the hardware of pc.Linux is an open source means anyone can edit it legally as per his/her convenience.

There are many distributions of linux available -ubuntu,madvira,fedora,open suse,mint etc


But desktop market 7-15% bcuz its not easy to use it..but once u get habit of it i bet ull spit on windows

ADVANTAGES

1)FAR FAR BETTER SECURITY THAN WINDOWS -- Nowadays you can easily see windows remote exploit flying around.Yes windows is easy to attack as compared to linux.

2)RESOURCES AVAILABLE BY DEFAULT-many software addons drivers are already installed on it

3)GOOD FOR HACKING - There are distributions specially designed for hackers backtrack,weaknet,blackbuntu,secmic etc

4)ITS FREE NOT LIKE WINDOWS (WHO WILL PAY THOUSANDS OF $$ )
the only linux which costs some pennies is redhat.

5)LIVE CD-One of the best feature you can run it without evan affecting your hd

DISADVANTAGES
 

1)NOT MANY S/W companies supporting linux based softwares

2)NOT EASY AS WINDOWS --Its command based,&requires tweaking.

3)EXE SUPPORT-basic extension exe is not supported but you can run them via WINE



What for beginners?where to start from

Well i would suggest ubuntu(only linux for humans) as it has largest community support so if you have any problem it could be easily resolved easily and its much user friendly linux

grab these 2 books linux bible&ubuntu unleashed.These books have good data for linux and ubuntu if you want to learn linux more deeply.


for linux tweaks and tutorial we wont post them on hb u can find them on basicgeeks.com

upcoming updates:linux distributions for hackers :)




Do share the post with your friends.














Reset Trial Version on Kaspersky Anti Virus, Internet Security and Pure By Regedit

Resetting Trial Version on Kaspersky Anti Virus, Internet Security and Pure on Regedit
Resetting Trial Version on Kaspersky Anti Virus, Internet Security and Pure By Regedit
Free Trial Forever

This tutorial will explain how to use kaspersky forever without key or activation code . We only use trial version on kaspersky. Can be use in Kaspersky Anti Virus and Kaspersky Internet Security 6,7,8 and 2011 Pure. You can download kaspersky here.

The method we are going to use is resetting the PCID, so that each time kaspersky thinks its a new computer and gives us a month of fully functional and upgradable trial.

But Firstly, Thank to kadir@Kamen Rider for requesting this tutorial.

SO the method is as explained below :-

For this tutorial, I need to install Kaspersky Pure 2011 and wait for 3days. All this picture credit to Free Ultimate Download.

Example 28days Kaspersky Pure 2011
See Below




1) First of all delete the existing key if you have.

Existing Key Trial Key

2) Goto Setting, then Self Defence, Uncheck the "Enable Self Defense" and click OK.

 
 Setting

Uncheck Self Defence

3) Now right-click the kaspersky icon from taskbar and click on "Exit".


Now, Self Defence is disable

4) You will get a promt like this . Click "Yes".



5) Now goto run and type in "regedit".

 Start>Run>Regedit>Enter

Regedit

6) Now goto HKEY_LOCAL_MACHINE ---->SOFTWARE ---->KASPERSKYLAB ---->PROTECTED ---->AVP9 ---->ENVIRONMENT .

Double Click to PCID

7) Now in the right hand side you can see PCID. Double click it and change the last two values before the flower bracket and click ok.
eg:- The last two values are "32"... So i change it to "F9"...


PCID Change Last Two Values

8) Now open kaspersky again and you will see this.

Open Kaspersky Pure Again

9) Select "Activate Trial License" and click next.

Activation On 20/2/2011 Expired on 22/3/2011
31Days

10) Now enable Self-Defence and you are good to go.

Credit to Free Ultimate Download

Subscribe Our Update above. Thank You

I would like to say thank you and highly appreciate your support. Please subscribe from the link bottom to appreciate my work and get the daily updates. Thank You. Happy Ethical Hacking Subscribe to Free Ultimate Download by Email

Friday, February 18, 2011

Top 10 viruses in January 2011


Top 10 viruses in January 2011

1 Troj/Invo-Zip
2 W32/Netsky
3 Mal/EncPk-EI
4 Troj/Pushdo-Gen
5 Troj/Agent-HFU
6 Mal/Iframe-E
7 Troj/Mdrop-BTV
8 Troj/Mdrop-BUF
9 Troj/Agent-HFZ
10 Troj/Agent-HGT

Source: Sophos

I would like to say thank you and highly appreciate your support. Please subscribe from the link bottom to appreciate my work and get the daily updates. Thank You. Happy Ethical Hacking Subscribe to Free Ultimate Download by Email

Cisco’s faster router for home media

Wireless technologies have always seemed a black art to me. From Bluetooth to Wi-Fi to 3G, mysterious signal dropouts and connection failures seem to occur at regular intervals.


So finding the perfect home Wi-Fi router has been like a search for the Holy Grail, and it hasn’t exactly ended with  Cisco’s latest product –  the Linksys E4200 Maximum Performance Dual Band N Router.
Cisco describes it as the industry’s highest performing home router – “made exclusively for today’s multi-use, multimedia homes that include Internet TVs, game consoles, smartphones, iPads, eReaders, multiple computers and VoIP devices”.
I have just about all of those and recently bought  a comparable high-end Netgear product – the  WNDR3700 dual-band Wi-Fi gigabit router – to try to improve performance on my heavily-laden system.
Signal strengths did improve somewhat on my previous $30 Wi-Fi b/g router and speeds did seem a little faster. But I have suffered some hard-to-trace dropouts at times when internet connectivity suddenly disappears and I find it difficult to get a connection at all on one of its two bands.
Cisco’s $180 E4200 is also a dual-band gigabit router, which means its  N-class Wi-Fi operates on two different bandwidths rather than one and its four hard-wire ethernet ports on the back can pass data at gigabit-per-second speeds to a connected PC or other device.
It represents a new sleeker design for Linksys routers, although it is one that rules out switching it to a vertical position, which has proved to be a space-saving feature for me in the Netgear product.
Set up was very straightforward with the included CD, which instructed me to connect the cables to the right places and choose a name and password for the Wi-Fi network.
The Cisco Connect software also provided clear instructions on how to add devices to the network, set up guest access and impose parental controls, such as blocking websites and setting time limits for my children to access the web on their laptops.
Advanced settings were hidden away but still accessible, with the software being pretty much the same in this top-end router as in  the starter Valet routers introduced last year.
Given that this is aimed more at the advanced user, I would have appreciated it being bundled with Cisco’s Network Magic software, which provides a graphical representation of a network setup and has several useful tools. However, I was able independently to download and install a free version of Network Magic.
Cisco says by using both internal and external amplifiers for its chipsets and with six antennae inside, signal strength will be boosted across greater distances in the home. It claims the E4200 is capable of 450Mb/s on its 5Ghz band and 300Mb/s on the 2.4Ghz one.
To me that means web pages loading in a flash and games and video streaming smoothly without interruption, which I have yet to see with any Wi-Fi router.
I only received my review unit on the day the product was launched this week and so have had little time to test it to date. But testing signal strengths around the home with an iPhone app I have found them to be about the same as for the Netgear product.
The Netflix movie streaming service launched at the same pace as the Netgear and played smoothly on my Apple TV. However, an HD music video on YouTube, which had played flawlessly on my hard-wired PC, appeared jerky on a MacBook Air connected to Wi-Fi two rooms away from the router, and the picture froze several times.
Like the Netgear product, the Linksys has a useful extra feature of a USB port that allows external storage to be added to the network and its content easily shared. Its media server software allows movies, music and photos stored this way to be shared around the home.
In summary, the E4200 is a nicely designed router with easy setup and several useful features, such as separate guest access and the ability to add external storage.
But, based on my brief experience with it, it is still not the ultimate solution for fast, stable wireless connectivity around the home and consumers could probably achieve similar results with less expensive models.

Websecurify Security Testing Framework



Websecurify is a powerful web application security testing platform designed from the ground up to provide the best combination of automatic and manual vulnerability testing technologies.

Some of the main features of Websecurify include:

  • Available for all major operating systems (Windows, Mac OS, Linux)
  • Simple to use user interface
  • Built-in internationalization support
  • Easily extensible with the help of add-ons and plugins
  • Exportable and customisable reports with any level of detail
  • Moduler and reusable design
  • Powerful manual testing tools and helper facilities
  • Powerful analytical and scanning technology
  • Scriptable support for JavaScript and Python
  • Extensible via many languages including JavaScript, Python, C, C++ and Java 



You can download Websecuify here

Websecurify Security Testing Framework



Websecurify is a powerful web application security testing platform designed from the ground up to provide the best combination of automatic and manual vulnerability testing technologies.

Some of the main features of Websecurify include:

  • Available for all major operating systems (Windows, Mac OS, Linux)
  • Simple to use user interface
  • Built-in internationalization support
  • Easily extensible with the help of add-ons and plugins
  • Exportable and customisable reports with any level of detail
  • Moduler and reusable design
  • Powerful manual testing tools and helper facilities
  • Powerful analytical and scanning technology
  • Scriptable support for JavaScript and Python
  • Extensible via many languages including JavaScript, Python, C, C++ and Java 



You can download Websecuify here

Wednesday, February 16, 2011

PenTBox v1.4

PenTBox is a Security Suite with programs like Password Crackers, Denial of Service testing tools like DoS and DDoS, Secure Password Generators, Honeypots and much more.Pentbox is destined to test security and stability of networks.

Tools included in PenTBox
Base64 encoder y decoder,
Digest for MD5,
SHA1,
SHA256 and SHA512,
Port scanner,
TCP DoS,
TCP AutoDoS,
SYN DoS,
Honeypot,
L33t Sp3@k Converter 

PenTBox is programmed in Ruby so ruby is required, and oriented to GNU/Linux systems compatible with Windows, MacOS and more.

Tutorial for PenTBox

1.Download PentBox and un tar
2. We are using windows box , simply run exe and choose from three options.
3. And your ready to attack  or audit. Nothing much to think or relay on.
Download PentBox Here

Pentbox is simple yet powerful .Feature i liked most is simple honeypot :)