Archive for November, 2012

Image

 

Username: EAV-76001317
Password: kd8mbvjbe4

Expiration: 18/02/2013

Username: EAV-76001321
Password: ncsdjh88xc
Expiration: 18/02/2013

Username: EAV-76001335
Password: 856nra3pj7
Expiration: 18/02/2013

Username: EAV-76001355
Password: 2smfd7a37k
Expiration: 18/02/2013

Username: EAV-76001359
Password: kfmpphmm5v
Expiration: 18/02/2013

Username: EAV-73195391
Password: amtuvkx7e3
Expiration: 01/01/2013

Username: EAV-73727883
Password: 2ermb7b5dc
Expiration: 01/12/2012

Username: EAV-75711317
Password: x2j6nu75md
Expiration: 16/02/2013

Username: EAV-75711370
Password: 85tf4fd55n
Expiration: 16/02/2013

Username: EAV-75909358
Password: pbn58dkkvt
Expiration: 17/02/2013

Username: EAV-75909405
Password: v444ft2mnj
Expiration: 17/02/2013

Username: EAV-75909420
Password: v6xvju6etc
Expiration: 17/02/2013

Username: EAV-76184577
Password: 4nm6p4js4c
Expiry Date: 20-02-2013

For Eset NOD32
Username: EAV-76007825
Password: 6aamcex2jj
Expiration: 19/02/2013

Username: EAV-76007831
Password: 744su52ppk
Expiration: 19/02/2013

Username: EAV-76007851
Password: hmrmbnhv5a
Expiration: 19/02/2013

Username: EAV-76007866
Password: uuumchnv3h
Expiration: 19/02/2013

Useful Things to do on CMD!

Posted: November 23, 2012 in Uncategorized

Image

First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.
Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.
This is just to make sure you have NetBIOS enabled. We will have so

me fun with NetBIOS on CMD.

Back to commands:

1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the “ping” command.
Code:

ping x.x.x.x (x is the IP address)
or
Code:
ping www.whatever.com (www.whatever.com is the website you want to ping, but you don’t know the IP)
OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

2) nslookup : This command has many functionalities.
One is for resolving DNS into IP.
Lets say you know the website URL but you don’t know its IP(and you want to find out).
nslookup www.whatever.com (www.whatever.com is the website you want to find out the IP)
Now, another really nice function of nslookup is to find out IP of specific Mail Severs.

Code:
nslookup (enter) set type=mx (enter) yahoo.com
This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn’t it?

3) tracert : This command will give you the hops that a packet will travel to reach its final destination.
OBS: This command is good to know the route a packet takes before it goes to the target box.
Code:

tracert x.x.x.x (x is the IP address)
or
Code:
tracert www.whatever.com (www.whatever.com is the website you don’t know the IP)

4) arp : This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN.
Code: arp -a

5) route : This command will show you the routing table, gateway, interface and metric.
Code: route print

6) ipconfig : This command will show tons of very helpful things.
Your IP, gateway, dns in use.
Code: ipconfig
Code: ipconfig /all
this command will give all that info but for all networks you might have it. Also, in case you have a dynamic IP and want to change it, then type…
Code: ipconfig /release (this will release your IP) ipconfig /renew (this will renew your iP)
OBS: Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don’t do anything stupid.

7) netstat : This command will show you connection to your box.
Code: netstat
or
Code: netstat -a (this will show you all the listening ports and connection with DNS names) netstat -n (this will show you all the open connection with IP addresses) netstat -an (this will combined both of the above)

8)nbtstat : This command will show you the netbios name of the target box.

Code: nbtstat -A x.x.x.x (x is the IP address) nbtstat -a computername

9)net view x.x.x.x or computername (will list the available sharing folders on the target box)
Now some hints:
Code: net use \ipaddressipc$ “” /user:administrator
(this command will allow you to connect to the target box as administrator)
Now if you want to connect to the target box and browse the entire C drive, then use this command:
Code: net use K: \computernameC$
(this will create a virtual drive on your “my computer” folder)
OBS: Keep in mind that this will only works if the target box doesn’t have an administrator password set.
And least but not last, the “help” command.
Code:
Code:
whatevercommand /help
or
Code:

whatevercommand /?
This command will help you to understand what it does and all the switchs available for each command.
Very useful if you know the command, but forgot the right switch.

Enjoy……..

How To Secure Your Hacking

Posted: November 23, 2012 in Uncategorized

To Never Get Caught [TUT] Tutorial contains:

How hackers get caught. Hiding you and securing as “Hacker”. Destroying your system logs. Setting up VPN – Making you anonymous. Okay, let’s begin!

 1) How hackers get caught. – First stuff that gives you away are “LOGS”. You need to know how events, application, and system logs work. If you dont, you can be easily caught! The shell history will expose your actions. Another giveaway is leaving a “:wq” in /var/log/ messages or binarys. – Your laziness will take you into problems. NEVER HACK FROM HOME! Take your time, and go to net cafe or anywhere else apart from home. Logs will take you down! – The code that you run on system will take you down. If you compile the code on target, libraries will give youI away! – If your victm, notice, that he is maybe hacked, or something is wrong.. He will ask from his ISP for IP logs, and if you dont use VPN, or if you hack from home, they will hunt you down. – Thing, that takes you down 100% is BRAGGING. It is common problem of beginning hackers. They like to brag, to earn respect and reputation but NOT KNOWING that is the matter of minutes, hours mby days when they will be caught. *Don’t use hotmail. CIA Owns it.

 

2) Hiding and Securing you as “Hacker” – Temporary guest accounts, unrestricted proxy servers, buggy Wingate servers, and anonymous accounts can keep hackers carefree. *A young hacker is less likely to know all the little things that an expert hacker might know. Besides, the young hacker may be trying to impress others – and get a little careless about covering his tracks. This is why younger hackers are often caught. *An older hacker, on the other hand, will rarely leave any tracks. They know how to use their slave’s computers as a tool for a launching place to get into another computer. There will always be hackers, and there will always be hackers in prison. * DESTROY LOGS, REMOVE ALL YOUR TRACKS! * DO NOT HACK AT HOME! USE VPN THAT SAVES NO LOGS! HOW TO REMOVE YOUR SYSTEM LOGS: Choose Start > Control Panel. Double-click Administrative Tools, and then double-click Event Viewer. In either pane of the Event Viewer window, right-click System and then select Clear All Events. To save the current system log, click Yes when Windows returns the message, “Do you want to save ‘System’ before clearing it?”, enter a file name for the saved system log file, and then click Save. Virtual Private Network – VPN

 

1) Spoiler . I will recommend you to use proXPN. It is VPN that do not store logs. proXPN: http:// proxpn.com/ download.php ProXPN Windows installation: Click “Next” Just click “Agree” here to continue installation. Let the installer run until completion. Just click the “Finish” button to complete the installation. Welcome to the proXPN client. Click the “Don’t have an account?” link to create a new account. Enter your email address and the password of your choice. Then check the license agreement checkbox and click the “I agree – create account” button. Click “OK” to finish the account signup process in the software client. Check your email for a greeting email from proXPN. In that email is a link which you will need to click in order to activate your free account. If it doesn’t show up within a reasonable timeframe, make sure to check your spam folders. Once you’ve clicked the link in the email, your account should be active. Go ahead and click the “connect” button to connect to proXPN Once you connect, the system tray icon will turn green.I You’re now surfing safe and secure, courtesy of proXPN. And you are done with securing yourself. Just to make sure, go check if you are truly anonimous 😉 http://www.ip-adress.com/Proxy_Checker

Image

Image

External storage devices are pretty useful to transfer files between Computers but recently i noticed that my pen drive started giving me an error that it is “Write protected“ whenever i try to transfer data in it.

In real “Write Protection” is a security feature that allows you to protect your data store in your Pendrive but a virus can also trigger

this error, so your first step should be to scan your computer with an updated antivirus but if that doesn’t here are some few quick tips to remove write protection from pen drive.
Remove write protection from pen drive:

◘Open Start Menu>Run, type regedit and press Enter.
◘ Navigate to the following Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlset\Control\StorageDevicesPolicies

If you don’t find the StorageDevicesPolicies key then you have to create it manually, right-click into the right window and Select New > Dword (32-bit) value from the context menu and name it WriteProtect.

◘Double click the key WriteProtect in the right pane and set the value from 1 to 0 in the value data box and press OK button. You can change value of 0 to 1 if you want to write protect your USB.

◘At last, exit the registry, restart your computer and then again re-connect your USB pen drive on your computer.

Other Procedure to follow to remove write protection

◘Shutdown your computer.
◘Insert Pen drive into the computer.
◘Turn on the computer and then immediately start pressing F8 key. ◘Advanced Boot Options screen will appear on the screen.
◘Select Safe Mode with Command Prompt
◘After loading files, suppose, if your Pen drive letter is G, then write as

C:\windows\system32>H: and press enter

G:\>format G: and press enter

◘Press Y when (Y/N) prompt appears and press enter
Write Protection will be removed from the Pen drive after the format is complete.

Anonymity Online

Posted: November 23, 2012 in Uncategorized

Image

 

How to protect your identity online [Part 1st] [Extremely DETAILED]
—————————————-—————————————-————

The information I will provide might make you paranoid by the time you are done reading this, so if you don’t want to be informed and paranoid, please don’t read this.

I will be covering:

1) History – Hackers

2) Website owners

3) Your name

4) Your e-mail

5) What you sign up to

6) Information you expose unknowingly

7) Keeping you safe

You hear it on the news, you read it on the newspaper, you live with it everywhere without even acknowledging its existence.

“Hackers have stolen identities” I have heard that line so many times this year, it is ridiculous.

Companies promising to “defend” your identity, memberships giving their words to keep your information to themselves only, the government reassuring that they will only have access.

All this is a lie as information ALWAYS gets leaked or there is an inside worker providing information out into the black market.
Not only that, but securities on big companies are always exposed and hackers always find their way in.

1) History – Hackers

I will explain briefly on the type of hackers that there are out there for the sake of academical knowledge. These descriptions are not in dept, instead they are meant to slightly touch the subject and educate those are who are unaware of these titles on the cyber world.

1) Black Hat Hackers – These are the most infamous hackers there are. These are the guys you hear about it on the news due to committing crimes. These people are whose purpose is to gain information and use for their own need. They could be anyone.

-Black Hats tend to be professionals at what they do and are extremely well informed on everything related with the cyber world and crimes.
-Black Hats tend to be educated people who have worked many years to accumulate all the knowledge they hold. They are not your kid who uses “hacking tools” to scare their gaming buddies online.
-Black Hats is the image typically portrayed on movies.

2) White Hat Hackers – These are the lesser known hackers simply because they do the clean up work that goes behind the scenes cleaning up the messes from Black Hat Hackers.

-White Hats are the heroes of the cyber world. They fight crime using their hacking knowledge to patch exploits on system and assure that your information does not gets leaked out or easily acquired by any Black Hats.
-White Hats are professionals at what they do. They have as much knowledge as Black Hats, but use their skills to fight crime rather than aid it.

3) Gray Hat Hackers – These are the somewhat known hackers simply because they are unpredictable on what their actions might turn into. They are known as “Gray Hats” because it’s a mixture between the color White + Black = Creating: Gray

-Gray Hats are essentially neutrals on what they do. They might decide to do what’s right even if there’s some other entity telling them that it’s wrong or could be vice versa.

For example, Black Hat steals bank information and leaks out on the internet. Gray Hat could either decide to either use the information OR let the owners, authorities, or the companies know of the exposure.

2) Website owners

Websites, there are millions of them around the world in all languages. You can keep yourself entertained on them or you can become smarter reading potential useful information as you are reading now.

Do you ever wonder “Who owns this website?” or “How can I find out who owns it?”

I decided to include this topic on here since more and more people decide to pay for hosting services to have their very own website for either personal usage or some sort of business.

Well, unlike in the real world where you fill out papers and they get stacked or hidden in some compartment where not a random person could have access. Websites expose your information unknowingly. Maybe not the websites themselves, but the companies that provide hosting services.

I will use this website “HackForums.net” as an example to teach what I’m talking about.

There is something known as a “whois” that essentially tells you who registered the domain name.

You can easily Google “whois domain” and a huge list of websites that allow you to whois either a location or a domain to find its location.

My favorite website to do whois is:

http://whois.domaintools.com/

Now, if we do a whois on HackForums.net, here’s what we get.

Quote:Domain Name: HACKFORUMS.NET
Registrar: MONIKER

Registrant [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US

Administrative Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155

Billing Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155

Technical Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155

Domain servers in listed order:

NS1.DALLAS-IDC.COM
NS2.DALLAS-IDC.COM
NS1.ZANMO.COM 69.162.82.250

Record created on: 2005-09-27 14:18:41.0
Database last updated on: 2010-11-29 02:16:59.78
Domain Expires on: 2011-09-27 14:18:41.0

As you can see it exposes a lot of information that you wouldn’t want strangers to get a hold of you and then use to sell for their own good.

Common Hacking Forums, Websites are registered as a “Private” domain, so no real information is shown of the real owner. Instead, it displays the information of the company providing the service for the domain or hosting.

This is also how you can contact a company if you want to report a website with disgusting content such as child pornography.

I’m not going to whois a person’s website since it would be against the rules to expose personal information about anyone, but I believe that you get the idea of what can be done to discover information such as address, name, phone number, fax number, and more using nothing but a website name.

Experienced website administrators always should use Private domains to avoid exposing information to the public as much as possible.

If you have a website, whois it yourself and find out whether if you are exposed or not. If you are, call the company you registered your domain and request your domain to be put as private. They might require a fee of around $7 extra a year, but it’s worth it knowing that you’re not exposed.

You could also find out the ISP or company by doing a ping on an IP.

Example,

Open Command Prompt and type “ping Hackforums.net” the response will be an IP. Once you have that IP, you can use:

http://iplocation.net/

To tell you where the servers are located and giving you a definite location for the company’s machines.

http://iplocation.net/ Can also be used to find the location of a person’s location with their IP.

3) Your name

Your name is as unique as you can be. Your parents/guardians named you and that’s what makes you, you.

Your name can be your worst enemy when you are online as it can be used to expose so much information about you to the point of where you could be blackmailed.

Where should you ever use your real name online? NEVER. Why? Because, using your name alone anyone can find out where you live within a matter of 5 seconds.

Websites such as:

http://com.lullar.com/

http://www.pipl.com/email/

http://www.spokeo.com/

http://www.emailfinder.com/

http://www.411.com/
http://www.ask.com/
http://www.bebo.com/
http://www.facebook.com/
http://www.flickr.com/
http://www.ip-adress.com/ipaddresstolocation/
http://www.myspace.com/
http://www.myyearbook.com/
http://www.searchenginez.com/findpeople.html
http://www.skipease.com/
http://www.sonico.com/
http://www.spock.com/
http://www.twitter.com/
http://www.usatrace.com/
http://www.whitepages.com/
http://www.whois.com/
http://www.whois.net/
http://www.wink.com/
http://www.youtube.com/
http://www.zabasearch.com/
http://www.zoominfo.com/

Make it extremely easy to search names, e-mails, etc to dig information about whoever you want. There are more websites in which I personally use to dig information about people, but I will not mention them since I do not want the news station going crazy on a new rage of identity exposers.

Here’s an example of a person I searched for the sake of showing.

Cliack here :

( http://img130.imageshack.us/img130/332/identity.png )

I have satellite pictures using Google Earth to pinpoint exactly where she lives and what her house looks like, but I will not expose that.

Where is this information normally exposed? Hmm…I’ll let you guess. Or maybe not…The answer is Social Networks. Ah, Facebook, Myspace, Orkut, and so many others…The list goes on and on.

I highly recommend that you NEVER use your real name, instead use an edited name or initials instead rather than exposing your real name to the real world. If your friends on social networks already know you, they should not need to see your complete name as they will already know you.

For example,

Bill Gates

My recommendation would be to use “Billy Gates” simply because a letter being off makes it so incredibly difficult to pinpoint someone.

You can use your imagination for what you should replace your name instead of your real name. That is, if you want to avoid being looked up.

Something I have found based on experience is that it’s much more difficult pinpointing teenagers on the internet since they are not normally registered with government database that eases finding them.

If you are a teenager, do not have your parents names exposed as the name of your parents can be used to pinpoint you or vice versa, if you are a parent. Ironically, it’s the teenagers that expose more information than adults and yet, they are the ones harder to pinpoint.

—————————————-—————————————-————

How to protect your identity online [Part 2nd] [Extremely DETAILED]

4) Your e-mail

Your e-mail, the one you use to check on your everyday business or activities online. The one you rely to deliver things to you safely.

Question is, are you delivering to it safely? Probably not, or at least I hope you are.

The e-mail problem is an easy fix since all it takes is common sense.

If you have various accounts such as Social networks, have an e-mail specifically for messing around. If you have accounts for serious business such as your Paypal, Bank, etc…

Have an e-mail that only you have access to and is different from your regular “messing around” e-mail.

If you work for any companies or have services with an ISP, avoid using their e-mail services to register on important websites where your money is dealt with such as Paypal, AlertMoney, banks, etc…

Why? Because they have been known to get hacked leaving all your information exposed for hackers to gorge in. Instead, I would recommend focusing on big companies such as Yahoo, Hotmail, or Gmail since these are much more secured companies and will always be up 24/7 any time of the year.

Not much to say on that, just have different e-mails for different activities for security measures. Not only that, but also have different passwords that require extensive typing with various complicating symbols such as:

you%(3cool

That above is a ridiculous example, but I believe you get the idea.

You know what hackers love the most? Not having to do much work and having everything set for them easily for the taking. For example, if you are infected with a keylogger, a hacker would love to have 1 e-mail to have access to everything. So, this gives you an idea why you should have a variety at all times with up-to-date information to assure that you could retrieve it, in case if it were to get stolen.

5) What you sign up to
Ever wondered why you get so much spam e-mails? Well, it’s simple. It’s because e-mail collectors acquire a list of e-mails in which they can mass e-mail to send spam.

Just as I mentioned earlier, have an e-mail for messing around and e-mails for serious business. Avoid using an e-mail for all activities as this will only clog your inbox with useless e-mails that will steal your valuable time.

There are many websites which sell their database of e-mails to E-mail spammers for a certain amount of money behind the scenes or the collectors themselves have set traps through the internet such as Phishing to acquire a list of e-mails to spam.

Avoid registering to websites such as products and random useless subjects that promise to pay you money for signing up or trying their products.

Seems to me like it’s common sense, but it’s good to know.

6) Information you expose unknowingly

Well, I hope that I have given you a good idea of easily information can be acquired using the internet.

Privacy does not exists anymore on the internet.

If you use Social Networks, try to have your information concealed as much as possible from the public and do not expose valuable information such as Birthday, location, or name to keep yourself as underground as possible.

You have to consider that information could be leaked physically or electronically as well.

Keep yourself up-to-date and informed to know if a company you might use has been breached or not.

http://en.wikipedia.org/wiki/Timeline_of…er_history

As they say, Google is your friend. Use it when you need it.

7) Keeping you safe

This is probably the most important part of the tutorial as this is where the most incidents occur due to infections or traps.

Infections or traps can range from:

-RATs (Remote Access Tool) which essentially give completely control of your computer.

-Keylogging which retains a log of all the keys you ever press on your keyboard.

-Phishing which retains a log when you manually input your information on a fake website emulating an original website.

-And more, but those above are the most common.

How can you protect yourself?

Around 90% of malware on the internet was coded to infect Windows Operating systems. I got that number from PC World about a year ago, forgive me if it’s incorrect now.

Anyway, assuming that you run on Windows you are the ones are the highest risk of getting targeted or infected.

You will want to always have your computer clean and secured having the proper tools. All these tools are the best of the best and are all free. They are probably better than paid security software.

How do I know this? Well, there are websites where you can scan malware after you crypt them (making them undetectable) to ensure that they are not detected by Anti-virus of any kind. Avira is the one that people always have a hard time bypassing, so I can safely say that it’s the best from my personal experience of crypting and scanning.

Download and install all these tools below and I can assure you that your computer will be protected 1000% better than what it might be as of now. Get the free versions.

http://www.malwarebytes.org/

http://personalfirewall.comodo.com/

Avira Anti-Virus – Follow the instructions on that link on how to get it free.

KeyScrambler Pro 2.7 – Follow the instructions on that link on how to get it for free. This software helps to encrypt everything you type on the internet.

If you use Google Chrome, get this:

https://chrome.google.com/extensions/det…ckof?hl=en

It encrypts all your website visits as https:// rather than http:// which makes you more secured.

If you use Firefox, get this:

http://www.eff.org/https-everywhere

It encrypts all your website visits as https:// rather than http:// which makes you more secured as well.

http://notendur.hi.is/~gas15/FireShepherd/

FireShepherd, a small console program that floods the nearby wireless network with packets designed to turn off FireSheep, effectively shutting down nearby FireSheep programs every 0.5 sec or so, making you and the people around you secure from most people using FireSheep.
The program kills the current version of FireSheep running nearby, but the user is still in danger of all other session hijacking mechanisms. Do not do anything over a untrusted network that you cannot share with everyone.
-Know that this is only a temporary solution to the FireSheep problem, created to give people the chance to secure themselves and the others around them from the current threat, while the security vulnerabilities revealed by FireSheep are being fixed.

The other option is using a different operating system which has a lower percentage of being targeted.

You don’t have to spend tons of money on Apple computers, instead you can get a free operating system from the Linux distributions.

The easiest to use and most similar to Windows looks is Ubuntu. You can install Ubuntu as a normal program on Windows and once it restarts, it shows you the option to choose Ubuntu over Windows.

You can watch this video:

http://www.youtube.com/watch?v=UdI8_92QTkQ

To learn more in dept. It’s very simple, so don’t be afraid to try.

The video focuses on completely replacing your current operating system Windows and replacing it or dual booting with Linux Ubuntu.

If you are a noobie, I would recommend you stop at the part where he goes to:

Wubi Installer – Ubuntu

It’s as simple as going Next, next, next on any normal installation and whenever you restart your computer, it will ask you to choose either Ubuntu or Windows.

Running under a Linux distribution will put you at around a 2-5% of getting infected with anything. Not only is Linux good, but you don’t have to worry much about installing anti-virus or anti-malware software to keep your computer clean and running.

I have been running on Backtrack 4 R2, a Linux Distribution and I can tell you that I have NEVER been infected.

Well, I believe this is all I have to say.

I hope you guys learn something from this new tutorial.

 
Image

Heads Up! Beware Thanksgiving screensavers designed to infect your PC with malware

Fake Apple invoices lead to Black Hole that drains your bank account