Pages

New Improved Google Search !!!!!!

Custom Search

Jun 25, 2011

-: Windows-XP Password Cracking :-dsa

http://cdn.gottabemobile.com/wp-content/uploads/windows_xp_logo-thumb.jpg 


-: Windows-XP Password Cracking :-


Here we use the tool "Cain and Abel" for cracking passwords of any local user/administrator.
First download cain and abel from "http://www.oxid.it/cain.html" and install it on your system.

Make sure that you have disabled the antivirus/firewall running on your system before installing and throughout this process.

Two most effective techniques used here are "Brute-Force" and "Cryptanalysis".

Brute-Force:- As this techniques takes more time to complete, the attacker prefer this technique only when there is a hope that the password contain same type of characters or may be two. i.e only loweralpha, only alpha, only numeric or may be loweralpha-numeric, also it should contain less than 7 characters. Otherwise it takes more time to crack password, which may be the mixture of all types of characters along with special symbols.
The step-by-step explaination for this technique is given below-

1) Open the tool "Cain and Abel"  


2) Go into the category "Cracker"     it displays all sub-categories under "Cracker" in left panel.


3) Select "LM & NTLM Hashes" from left panel and then click on     symbol, you will be greeted by a window as shown.


4) Check "import hashes from local system" and then click "Next". This shows all the active accounts on local system like administrator, guest, etc. along with LM and NT hashed values of their respective passwords, as shown below.


5) Right clicking on any username shows all available options using which we can crack it's password.


6) Here we select "Brute-Force Attack" and then "NTLM Hashes", since windows uses NTLM hashes to store local users' passwords.

7) You will be greeted by a window where you can modify properties for brute-force attack such as password length, character set, etc.


8) Click on "Start" button.

9) On completion it will reveal the exact password.

 
 
Cryptanalisys :- Basically, Cryptanalisys means Operations performed in converting encrypted messages to plain text without initial knowledge of the crypto-algorithm and/or key employed in the encryption.
This is the fastest technique of password cracking possible due to "Rainbow Tables".
A rainbow table is a file that is used to lookup an unknown plaintext from a known hash for an algorithm that does not usually permit this operation.
Steps 1 to 4 i.e upto importing hashes from local system, are similar to previous technique (i.e brute-force). The steps coming after that are as follows-

5) Here, select "cryptanalisys attack" then "NTLM hashes" and then select "via rainbow tables". Here we can choose either OphCrack or RainbowCrack formats of tables. The rainbow tables are available free to download on internet.
Due to large file size of rainbow tables (350MB - 3GB); instead of downloading we can also create at own just by downloading rainbow table generator (winrtgen.zip of 181KB) free download at "http://www.oxid.it/downloads/winrtgen.zip"


6) Click on "Add Table"


7) Browse for the location of rainbow table on your system, select proper table and click "open".


8) Select the loaded table and then click on "Start" button.


9) On completetion it will show the exact password.

Jun 22, 2011

-: Address Resolution Protocol (ARP) Attacks :-

http://www.grc.com/nat/arpsteptwo.gif 


What Does ARP Mean?
Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made.

On a majority of operating systems, such as Linux, FreeBSD, and other UNIX based operating systems, and even including Windows, the "arp" program is present. This program can be used to display and/or modify ARP cache entries.

An example of the "arp" utility's output would look like the following:

Windows:
> arp -a
Interface: 192.168.1.100 .- 0x10003
Internet Address        Physical Address        Type
192.168.1.1          00-13-10-23-9a-53       dynamic

Linux:
$ arp -na
? (192.168.1.1) at 00:90:B1:DC:F8:C0 [ether] on eth0

FreeBSD:
$ arp -na
? (192.168.1.1) at 00:00:0c:3e:4d:49 on bge0


How ARP works?
Specifically for Internet Protocol Version 4 (IPv4), ARP maps IP addresses between the Network layer and Data Link layer of the Open System Interconnection (OSI) model.
For a more complete and thorough explanation of how address resolution works, and protocol specifics, please consult RFC 826.


ARP Protocol Flaws :-
ARP's main flaw is in its cache. Knowing that it is possible for ARP to update existing entries as well as add to the cache, this leads one to believe that forged replies can be made, which result in ARP cache poisoning attacks.


Terms & Definitions :-
ARP Cache Poisoning : Broadcasting forged ARP replies on a local network. In a sense, "fooling" nodes on the network. This can be done because ARP lacks authentication features, thus blindly accepting any request and reply that is received or sent.

MAC Address Flooding : An ARP cache poisoning attack that is mainly used in switched environments. By flooding a switch with fake MAC addresses, a switch is overloaded. Because of this, it broadcasts all network traffic to every connected node. This outcome is referred to as "broadcast mode" because, all traffic passing through the switch is broadcasted out like a Hub would do. This then can result in sniffing all network traffic.


The ARP Attacks :-
1] Connection Hijacking & Interception : Packet or connection hijacking and interception is the act in which any connected client can be victimized into getting their connection manipulated in a way that it is possible to take complete control over.

2] Connection Resetting : The name explains itself very well. When we are resetting a client's connection, we are cutting their connection to the system. This can be easily done using specially crafted code to do so. Luckily, we have wonderful software that was made to aid us in doing so.

3] Man In The Middle : One of the more prominent ways of attacking another user in order to hijack their traffic, is by means of a Man In The Middle (MITM) attack. Unlike the other attacks, a MITM is more a packet manipulation attack which in the end however does result in packet redirection to the attacker . all traffic will get sent to the attacker doing the MITM attack. This attack however is specific. As opposed to MAC Address Flooding or other attacks against a router/switch, the MITM attack is against a victim, and also can be done outside of a switched environment. Thus meaning, an attack can be executed against a person on the other side of the country.

4] Packet Sniffing : Sniffing on a Local Area Network (LAN) is quite easy if the network is segmented via a hub, rather than a switch. It is of course possible to sniff on a switched environment by performing a MAC flood attack. As a result of the MAC flood, the switch will act as a hub, and allow the entire network to be sniffed. This gives you a chance to use any sort of sniffing software available to you to use against the network, and gather packets.

5] Denial of Service : MAC Address Flooding can be considered a Denial of service attack. The main idea of the MAC flood, is to generate enough packet data to send toward a switch, attempting to make it panic. This will cause the switch to drop into broadcast mode and broadcast all packet data. This however did not result in a crash, or the service to be dropped, but to be overloaded.

Jun 14, 2011

Disable Error Report In Windows

Disable Error Report In Windows

windows error
Microsoft’s Error Reporting in windows sometimes is disturbing, most of us don’t want to send that error report because it’s of no use.
There’s an easy way to disable Microsoft error report in windows.
Disable Microsoft Error report in Windows XP :
1) Open Control Panel (Start > Control Panel)
2) Open the Problem Reports & Solutions applet Under advanced options and disable error reporting.
Disable Microsoft Error report in Windows Vista :
1) Right click on my computer (Desktop) and click properties
2) Click the Advanced Tab
3) You’ll see a “Error reporting” button at the bottom, click it
4) Select Disable Error Reporting.
And you’re done….!

Jun 7, 2011

-: Calculations On Command Prompt :-

http://www.savingsaccountcalculator.net/wp-content/uploads/2010/03/savingsaccountcalculator.jpg 


-: Calculations On Command Prompt :-


The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:
C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a "31>>2"
7
Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.
For more information, type set /? at the command prompt.

Jun 4, 2011

-: Folder Lock Without Any Software :-

http://4.bp.blogspot.com/-cs3ER2FTDgw/TdJO4K5LxCI/AAAAAAAAAFI/5TDAo1YmhyU/s1600/Folder-Lock1.png 

Folder Lock With Password Without Any Software-
Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.


if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

Jun 3, 2011

Best and one-click way to download Youtube videos





http://cache.ohinternet.com/images/e/ef/Youtube_logo.png


Now get relieved of all hassles of downloading YouTube video. Now no need to copy url and paste on another site to get your favorite video downloaded.

Just download a Firefox addon and your work is done.


Just click on “Add to Firefox” and restart your browser.

Now beside each video you open in YouTube, you will get three options for downloading that video – 3gp or mp4 or HD.

Click on any of the three options and current video gets downloaded instantly without affecting the playing video.

Subscribe via email N get Tips

Enter your email address:

Delivered by FeedBurner

Label Cloud

2009 (1) 2010 (3) 2011 (1) 2011 IPL Player (1) 3 IDIOTS (1) 3G dongle (1) Academics (3) ACCOUNT (1) ACRTICALS (3) acta (1) Addons (1) ADSL Router (1) Adzero (1) AIRTEL (14) Airtel 3G (1) airtel Grps (1) airtel proxy (1) android (3) Android Phone (3) Android Phone codes (1) ANTIVIRUS (7) ARP hacking (1) BAT (2) BHUVAN (1) BIOS (2) bitcomet (16) BITTORRENT (21) BLOG (4) BLOGGER (5) blu ray (1) BOLLYWOOD LATEST MOVIES (4) BOLLYWOOD MOVIES (4) BOOK (2) British rapper (1) BROADBAND (4) BSNL (7) BTJunkie (1) BTJunkie Shut down (1) BTJUNKIES (17) Cabana (1) calender (2) Caller ID (1) CAM RIPS (8) CAPCHA (1) CAT (1) CCNA (6) CCNP (1) CES 2011 (1) CHAT (2) CHATING (1) CHATTING (1) CHINA (3) Christmas (1) CID (1) CISCO (8) CISCO PRESS (2) CLONING (1) CODE (5) COLLECTION (2) COMMAND (2) CRACK (26) crack key (3) CRACKSOFTWARE (11) CSS (1) DAILY MOTION (1) Dan Bull (1) DAP (1) data backup (1) data storage (1) dekstop (1) Delhi 100 Year (1) DESI TORRENTS (20) DISK (1) DIY (1) DOCOMO (2) Docs (1) DOWNLOAD (13) DragonBall Browser (1) dvd (1) DVD Rip (12) dvd vs blu ray (1) E-mail (1) Ebook (7) EDUCATION (3) ERROR (3) ESET (1) ET (4) EXAM (8) EXPLORER (2) EXRTA TORRENT (20) extratorrent (10) FACEBOOK (8) facebook hacking (6) FACEBOOK TIMELINE (2) FACEBOOK Tips (1) FAT32 (1) FILESHARNING (1) FIRE FOX (14) First Bamboo Smartphone (1) FIRST ON NET (1) FOLDER (2) FORMAT (1) Free DNS (1) FREE GPRS (22) FREE MMS (12) FREE SMS (16) freesoftware (6) FRIST ON NET (1) FTP (1) full software (25) FUNNY (3) G.D (1) G.D. (1) GAME HACKING (12) GAME KEYS (2) GMAIL (12) GMAIL HACKING (16) GMAT (1) GNS3 (1) GOOGLE (53) GOOGLE CROME (20) Google Doodles (3) GOOGLE EARTH (23) Google Global DNS (2) Google Map. (1) Google Nexus (2) Google Nexus mobile (2) Google Open DNS (2) google pulgins (16) google Search Tips (7) google software (5) Google Tip (6) Google Tricks (6) GOOLGE HACK (35) GSM (2) gsm hack (1) GTALK (7) GURU OF HACKING (8) H (3) HA (1) HAC (3) HACK (100) HACKER (39) Hackers (14) HACKING (76) HACKINGTOOLS (38) Happy holidays (1) Happy holidays 2011 (1) HARDWARE (2) HOLLYWOOD MOVIES (4) hotmai (1) How To (1) how to backup data (1) how to store data (1) HSTR (2) HTML (1) HUTCH (2) I-PHONE (4) I-phone 4 (3) I-Phone 5 (3) I-Phone 5 Leak (2) I-phone Leak Video (2) IDEA (6) IDM software (1) IE (8) IE8 (6) IE9 (6) India Delhi (1) INFORMATION (3) INTERNET (22) IP-ADDRESS (6) iPhone 3 (1) iPhone 4s (1) iPhone 4s Tariff plan for india (1) iPhone 5 (1) iPhone4 (1) IPL 2011 (1) IPL 4 Auction News (1) IPL4 (1) IPLT20 Schedule (1) ISOHUNT (2) ISP (2) IT (2) jingle bells (1) JOKES (2) JTO 2009 (1) KEY (4) KeyBoard (1) Keyboard Tips (1) Kieron-Scott (1) KUTCH (1) learning software . Photoshop (2) lightroom (1) long term data backup (1) long term storage (1) Lumia 710 (1) Lumia 800 (1) MAC (2) MAC OS (1) Malware (1) Mango (1) MANGO Mobile OS (1) MANGO OS (2) MAT (1) MBA (3) Meego (1) MESSENGER (3) METACAFE (1) MICROSOFT (7) Microsoft Onenote (1) Microsoft PowerPoint (3) MOBILE (41) MOBILE CODES (27) Mobile Memory Card (1) Mobile Repair. (2) Mobile Save (1) mobile software (1) MODEM (2) MOTOROLA (2) MOUSE (1) MOVIES (5) MS-DOS (4) MS-OFFICE (3) MS-OFFICE KEYS (2) MSN HACKING (7) MSN PASSWORD (11) MTV (2) MYSPACE (1) N-SERIES (1) Network (5) NETWORKING (6) new camera (1) New Year (5) NEWS (3) NOD32 (1) NOKIA (10) Nokia lumia (1) Nokia Lumia 800 (1) Nokia Lumia 820 (1) Nokia Lumia 900 (1) Nokia Lumia 920 (1) Nokia Mango (2) Nokia meego (2) Nokia N9 (1) NORTON 360 (1) NOTEPAD (1) NOTIFICATION (1) NTFS (1) OPERA (5) ORKUT (16) ORKUT HACKING (18) ORKUT VIRUS (8) OUTLOOK (4) P2P (10) PAPER (1) PASSWORD (7) PC SUITE (3) Peer To Peer (8) PENDRIVE (1) PHILIPS (1) PHOTO (2) photoshop (1) pipa (1) Piracy (13) PIRATESBAY (26) PRINTER (1) PROXY SITES (3) Ragaa.com (1) RAPID HACK (6) rapidshare (1) Rapper protests piracy (1) REGISTRY (4) Reset Your Mobile Memory (1) RESULTS (4) ROADIES (4) Roadies 8.0 Raghu Rajiv RAnvijay Bani Roadies 5.0 Roadies 6.0 Roadies 7.0 (2) ROUTER (4) RSS (1) S60 (5) SAGEM (2) SAMSUNG (7) SARDAR (1) SCPIRTING (5) SCRAP (2) Search by Image (1) secret codes (2) Secure Your Computer (1) SECURITY (6) Serial key (2) SETTING (2) Shirt (1) SIM (1) SIMULATOR (3) SITEMETER HACK (1) SKYPE (1) Smartphone (1) SMS (7) SOFTWARE (17) Songs (1) Songs.pk (1) SOPA (2) SOPA Cabana (1) SPAM MAIL (3) statcounter (1) STD (1) storage (1) suraj fake (1) SYSTEM (1) T (1) TAG (1) Tango OS (1) TECH NEWS (1) THEMES (3) Timeline (1) TIMEPASS (4) TIP (110) TIPS (126) TNA (1) TOOLBAR (1) TOOLS (7) torrent (23) TORRENT HACK (9) TRICK (187) TROJAN (4) TUTORIAL (1) TV (1) TWEAK (8) UK (1) Unlimited Download (1) unlocking (1) UNRATED EDITIONS (3) USB (9) USB dongle (1) UTORRENT (15) VIDEO (4) Virus (2) Virus google (1) Virus total (1) Virustotal (1) VODAFONE (5) w3 counter (1) WAY2SMS (2) website (1) WI-FI (14) WINDOWS (96) WINDOWS 7 (44) windows 7 GodMode (2) Windows 7.5 OS (5) Windows 8 (9) windows 8 installation (2) WINDOWS VISTA (27) WINDOWS XP (92) windowsphone (1) Winzip (1) WIRELESS (12) WORDPRESS (1) WP7 (3) WP8 (3) WVIL (1) WVIL unbelievable (1) WWE PAYPER VIEW (1) WWE RAW (1) WWE SMACKDOWN (1) www.extrattorrent.com (5) XAT (1) XP Password (2) Xvid (9) YAHOO (18) YAHOO HACKING (11) yahoo messanger (4) YOUTUBE (9) YOUTUBE dOWNLOAD (3) YOUTUBE DOWNLOADER (3) youtube new look (2) zip7 (1)