WEEK-1
Hiiii..... friends. Here is the fabulous Graphics card emulator tool for playing almost all games with out the graphics card. This tool actually uses 128 MB of your DDR2 RAM and provides you a virtual 128 MB graphics card for your computer. It makes your games run smoothly without any breakages. Just downoad this tool
NOTE: Donf forget to register the software after installation.
reference name: ZJGSJ33
registration: A855GM-93NLL-AMT2A-98EBN-RSDVB-LV3X7
Hii friends... this is yet another important tweak you can do in the Windows 7 to improve your Internet browsing speed. Just follow the below steps. Thats it
1. Go to start and open Run (Shortcut is windows button+R button ).
2. Now Type gpedit.msc and press Enter.
There is a secret hidden feature inside the Windows 7. i.e Windows 7 God mode. With the help of God mode you can change the settings of Windows 7 and make it work in your own way.
To do this you should do the following.
Google Web Accelerator is an application that uses the power of Google's global computer network to make web pages load faster. Google Web Accelerator is easy to use; all you have to do is download and install it, and from then on many web pages will automatically load faster than before.
- Sending your page requests through Google machines dedicated to handling Google Web Accelerator traffic.
- Storing copies of frequently looked at pages to make them quickly accessible.
- Downloading only the updates if a web page has changed slightly since you last viewed it.
- Prefetching certain pages onto your computer in advance.
- Managing your Internet connection to reduce delays.
- Compressing data before sending it to your computer.
Hi friends....
- Comodo Firewall - personalfirewall.comodo.com
- Online Armor Firewall - www.tallemu.com
- Outpost Firewall - free.agnitum.com
- PC Tools Firewall Plus - www.pctools.com
- Sunbelt Personal Firewall Version - www.sunbeltsoftware.com
- VirusBuster Internet Security Suite
- Windows 7 Firewall Control - www.sphinx-soft.com/Vista/order.html
- ZoneAlarm Basic Firewall - http://www.zonealarm.com/security/en-gb/anti-virus-spyware-free-download.htm
Hi friends now i'l show you how to create a really worst virus. This virus repeatedly executes the batch file and displays infinite number of message dialogues. There is no way, the victim could stop this process. So, in turn the computer will get hanged.
So. now getting in to actual scenario, the process of creating this virus is as follows.
It's a simple way to optimize your RAM by writing VB script program.
change your DNS server settings as following
This is more effective and more faster than public DNS servers published in previous posts. You'l be amazed to see the increase in the browsing speed of your internet.
Preffered DNS: 208.67.222.222
Alternate DNS: 208.67.220.220
If you are running with a low RAM on your computer you can improve the system performance a little by reduce the RAM usage of FireFox browser on your computer. Some times Firefox can take more RAM potential than it needed. So we need to limit the RAM usage of Firefox browser by changing the Firefox configuration.
Steps to Disable Over RAM usage of Firefox Browser
The actual purpose of DNS servers are to match the IP address of the websites with their actual domain naes and then allowing us to connect to that specific websites. Our Internet Service Provider (ISP) provides us with their own DNS sever and that DNS server is shared between all the computers in that particular network. The DNS server provided by your ISP may be slow due to some reasons. So, if you want a good browsing speed for your computer the other choice is to use PUBLIC DNS SERVERS. You will definitely notice the increase in the browsing speed of your internet.
Here are a few Public DNS servers list. Try these any of these DNS servers and you will definitely observe the change in your internet speed
You can do a simple trick on your AntiVirus software to check its efficiency.
Do the following to do this.
1. First open a note pad.
2. Type the following code in your note pad file.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
SEE DEMO OF FLIPPABLE BOOK HERE FIRST
Yes.... its true...!!!!
Usually we find difficulty in reading E-books through Acrobat reader. So this is yet another way with which you can turn out any E-books or pdf files in to a flippable book with which you can read the contents of that E-book very easily.
Download this simple tool which finds the Windows vista product key.
Just put the Vista DVD in to your DVD tray and run this software. The tool extracts the product key from your vista DVD. Thats it....... :-)
DOWNLOAD IT HERE
Tool looks like this:
Find Windows Vista product keys – Windows Vista Key Finder
In the Filter bar type [network.http.pipelining]. Then, double-click on this line under Preference Name in order to change the value from false to true.
Just download this Hacking tool
DOWNLOAD NOW
Now enter the new password for the Windows XP. It doesnt asks u for the previous password.
Using this tool you can even delete the previous password
Tool loks like this:
Wondering how....
It is actually possible with software known as Offline browser (Download it).
The actual thing the software does is, you should enter the URL of website you want to browse offline in the text field of this software, and the software downloads the whole web site on to your hard disk. Then you can browse that website whenever
Many of us download the trail version softwares like 30 day trail,20 day trail etc. The common tecnique used by most of us to run the trail version software many days even after the expiration date of the trail is, we change the system date regularly to avoid the expiration of the software.This makes the software to run even after the trail version.
So, till now we learnt about changing our MAC address. Now coming to the actual scenario, what is the actual need to change our MAC address. One of the interesting thing we can do by changing our MAC address is, we can actually increase our internet connection speed. Thinking how......!!
SO, for example let us consider that we are connected to the internet through a low speed internet connection with a 128kbps plan for which dowload speed is low. And if we want to change our internet connection speed to 512kbps plan or even higher, it can be done easily by MAC address spoofing.
Simply follow the below steps.
DOWNLOAD NETBUS HERE
For remote access of the target computer, an attacker should first install a trojan on the victim's computer. An attacker cannot send the trojan to the victim's computer directly because the victim can recognize that the received file is a trojan. So instead of directly sending the trojan to the victim's computer, the attacker binds the trojan to any of the executable files like calculator.exe or any flash games etc and sends to the victims computer. When the victim receives the executable file he thinks that that is a normal executable file and executes it.
Trojans are the Remote Administration Tools that allow the remote control and access to the attacker.
Once the trojan is installed on the target computer, then the attacker can remotely access all the software and hardware of the target computer. Simply saying, a complete access will be handed over to the attacker and he can access the remote system as he like. But the trojans can be easily detected by all antivirus softwares.
Some of the Trojans are :
1. NetBus (click here)
2. Backorrifice
3. GirlFriend
4. subSeven
The host file is the file which are present in the windows by default.
Host file is present in the following path in windows.
Windows/System32/drivers/etc.
In host file we can give the Domain names with their respective IP addresses.As a result we can observe the increase in the speed of accessing the websites which are entered in the host file.
We can play with Host file in the following manner.
Zenmap is a fabulous tool actually an extension to Nmap
Zenmap is an excellent graphical user interface tool which can be used fort port scanning the remote computer.
using zenmap tool you can find the following information regaurding the remote computer.
Download zenmap (click here to download zenmap).
What can you find using Zenmap???????
First of all you should install a data sniffer software to know the remote computer's MAC address.
Install any data sniffer you like on your computer.
I prefer Colasoft Data sniffer software ( download here)
STEPS:
1. Open the data sniffer software and run it.
2. Now your friend's MAC address whose IP address is 192.168.199.7
Every ethernet card has a unique MAC address assigned to it.
You can see your ethernet card's MAC address from command prompt.
Simply open cmd prompt and type following
ipconfig /all
Following will be displayed on the screen.
so my MAC address is visible in themarked area of below screen shot
Ping tool is commonly used for detecting whether a remote host is alive or not.
It makes use of ICMP protocal for detecting whether the remote host is alive or not.
Ping can also be missused to perform the following attacks.
1. Denial of service attack (DOS).
2. OS(Operating system) detection purposes.
Various tools for performing ping sweeping are
1. Cping
2. Fping
3. SuperScan
4. Ping Sweep
5. Nmap
6. WS_ping pro pack
Most of the file hosting websites enforce a download limit for the free users.
The phenomena is that the download limit restriction is provided on basis of the total no. of files we download or the total size of the files we download.
1. Simply delete the cookies of your web browser.
OR
2. Use a different web browser when download limit is reached in one web browser.
Proxy bouncing can be treated as an extension for proxy servers.
In proxy bouncing we connect to the internet using multiple Proxy servers. Therefore much more security is provided for our computer.
Tools: MultiProxy (Download here)
Proxy servers acts as a buffer between your computer and the internet.
So your identity is hidden and is not visible to the internet. Instead the proxy server's IP address is visible to the internet when you use proxy servers.
Famous proxy servers are
1. Wingate (Download here)
2. Winproxy (Download here)
Fport is a tool which allows you to map all the open ports, their respective processes, applications and path names for any remote computer
It is a fabulous software and you can just download it here (Download Fport)
Mac address is actually unique 12 digit hexa decimal number assigned to the every ethernet card during manufacturing. It is very simple to change your computer's MAC address by doing slight modifications in your windows registry editor or either by using ready made softwares.
One of those softwares is Etherchange ( download it ). But Eterchange will not run on the windows vista and Windows 7 onwards. Etherchange software can be used in windows XP, NT and 2000. But in Windows vista and Windows 7 you can change the MAC address manually through registry editor. It involves the following steps.
so the process of changing your MAC address through the windows registry editor is as follows.
1. Go to windows registry by typing regedit in your run command.
2. Now go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972- E325-11CE-BFC1-08002BE10318}
3. Now double-click {4D36E972- E325-11CE-BFC1-08002BE10318}.
4. List will be opened which looks like 001,002,003...................,0016.
5. Now you chould manually check all the keys ie 001,002,003...................,0016 for where your ethernet card is present. You should check the the right side pane for your ehernet card(ethernet card is actually the your ethernet card manufacturer name).
6. You will found your ethernet card in one of the keys (001,002,003...................,0016), now in the right side pane right click your mouse and select new string value. Then enter the name for that string value as NetworkAddress. Observe that in the NetworkAddress N and A are capitals.
7. After giving the name to the string value double click the NetworkAddress.
8. Now in the value data field enter the new MAC address for your computer.
9.Now either disable your network adopter and enable it OR simply restart your computer.
10. Now the work is done. Your MAC address is changed.
Thats it guys. Now just play around with all the IP addresses in your Local LAN.....!!!! : )
WEEK-1
click here
WEEK-2
click here
WEEK-3
click here
WEEK-4
click here
encryption-protectng your files
meet in the middle attack
introduction
The attack
Shell accounts
Shell accounts-2
USB hacking
Undeleting the deleted data
Undeleting the deleted data-2
Permanantly removing data:eraser
tripwire
sysinternals
task kill attack
shoulder surfing
dumpster diving
Road sign hacking
steganography
steganography-2
water marking
steganalysis
Wireless hacking
introduction
setting up a wireless network
wireless security
poisoned hotspots
important terminology
War driving
war driving: How does it work
war driving tools
demo
war driving & GPS mapping
finding WIFI hotspots on the internet
demo
re-Assosiation requests
De-Authentication attacks
countermeasures against war driving
wireless data sniffers
how are wireless connections established
MAC filtering attacks
DOS attacks against wireless networks
WEP security loopholes
Cracking WEP security loop holes
cracking WEP, WPA, WPA2:tools
ARP request relay attack
cracking WEP keys
caffe Latte attack
improvements in WPA over WEP
cracking WPA & WPA2
recoverign WEP & WPA keys from local machine
demo
computer forensics
honeypots
penetration testing & vulnarability assesment
penetration testing & vulnarability assesment-2
backtrack
AFCEH relearn program
AFCEH retake praogram
AFCEH exam kit
Identity thefts
input validation attacks
SQL injection
Cross site scripting attacks
Missuse of hidden HTML tags
Cannonicalization attacks
HTTP response splitting
Web hacking
buffer overflows
Passive Sniffing Attacks
demo
What is a switch?
What is a hub?
Router vs hub vs switch
introduction
countermeasures
active sniffing attacks
ARP poisoning attack
demo
MAC flooding attack
MAC duplication attack
playing with ARP tables
demo
countermeasures
demo
social networking websites security
windows 7 & windows vista password cracking
demo
password cracking
windows 7 & windows vista bypassing the login prompt
demo
windows 7 & windows vista online password cracking
Captcha
introduction
A good captcha system
recaptcha
mail hide from recaptcha
demo
cracking captcha
cracking megaupload captcha
future trends
my favourite twitter scripts
my favourite facebook scripts
my favourite youtube scripts
Tab napping
introduction
tools
demo
DNS poisoning attacks introduction
DNS poisoning sniffing attack
DNS cache poisoning Birthday paradox
DNS poisoning birthday attack
modern day DNS attacks:search engines
modern day DNS attacks:Fat fingers attack
modern day DNS attacks:Domain hijacking
demo
modification on user computers
Hacking demo
Accessing blocked sites using public DNS systems
demo
countermeasures
demo:FCrDNS
ICMP scanning
OS finger printing
zenmap
demo
Detection-screenca
Passive fingerprinting with p0f
demo
web server fingerprinting
avoid OS detection:change default values
demo
packet generation software
demo
Packet generator:Nping
demo
conclusion
E-Mail forging
DOS attacks
Reflective DDos attacks
password cracking attacks
password cracking attacks-2
Cracking saved passwords in browsers
introduction
google chrome
firefox
internet explorer
tools
demo
counter measures
password managers
introduction
keePassX
demo
LastPass
ClipperZ, KeePass.info, Vulnarabilities
Sniffers
Keyloggers
Trojans
EXE binders
EXE binders-2
FireWall tunneling using SSH & Putty
introduction
Steps to follow
Unvlocking p2p File Sharing tools using SSH & putty
Unblocking P2P File Sharing tools using tecniques
demo
HTTP tunneling
introduction
How it works
Tools of trade
demo
Port forwarding
introduction
How it works
Configuring the router
Portforward.com
DYNDNS
Source port forward using fpipe
port forwarding vs port triggering
Who is hacker
what will you learn in course?
The anatomy of an IP address
The anatomy of an IP address demo
Network address translation
Internal vs External IP address
Hacking demo:The anatomy of an IP address
MAC addresses
Demo
MAC address spoofing
demo
how to find the remote computer mac address
demo
changing the MAC address
Fport
Demo
Proxy servers
Proxy servers part 2
Tor:anonimty online
demo
Hacking file hosting web sites
bypassing the Ads & Multiple links_Part1
demo
Bypassing the Ads & Multiple links_Part 2
Bypassing the Download wait countdown
bypassing the download limit
Shortened URL vulnarabilities
Introduction
Threats
Previewing the shortened URL
Hacking demo
ping sweeping
traceroute
whois
reverse DNS lookups
Host files
Host files part-2
Netcat
demo
Ncat
demo
Port scanning
Deamon banner grabbing
Scanline
demo