Showing posts with label Introduction to Hacking. Show all posts
Showing posts with label Introduction to Hacking. Show all posts

Sunday, December 26, 2010

Hack Windows Xp Administrators Password! - the N00b Way!

 

If have forgotten your user account password then try the method listed below to get inside your pc!

Start system and when you see Windows Welcome screen / Login screen, press Ctrl + Alt + Dlt keys twice and it'll show Classic Login box. Now type "Administrator" (without quotes) in Username and leave Password field blank. Now press Enter and you should be able to log in Windows.

Now you can reset your account password from "Control Panel -> User Accounts".

Same thing can be done using Safe Mode. In Safe Mode Windows will show this in-built Administrator account in Login screen.

Works in Windows Xp!


 

the secret book of hacking !!!


File name: 1st_Edition.zip
File description: a great book of hacking
File size: 1.73 MB


Saturday, December 25, 2010

Introduction to Hacking ! PART 3

Hacking Windows XP!

* Boot the PC in Safe Mode by pressing the F8 key.

* Select the Safe Mode option, now you can now Login as an Administrator and XP won't prompt for the Password.

* Try rebooting the PC in DOS.

* Now, Access to C:\Windows\system32\config\SAM.

* Rename SAM as SAM.mj.

* Now XP won't ask for Password next time you Login.

* Now, again go to Start menu --> Run.

* Type there cmd prompt.

* Type net user *, It will list all the users.

* Again type net user "administrator" or the name of the administrator "name" *. * It will ask for the password. Type the password and there you are done.

* Hold the Ctrl+Alt key and press Del twice. This will bring up the normal login and you can log on as Administrator. To unhide the Administrator account so it does show up.

* Again go to Start --> Run --> regedit.

* Go to HKEY_LOCAL_MACHINE --> SOFTWARE --> Microsoft --> Windows NT --> CurrentVersion --> Winlogon --> SpecialAccounts --> UserList.

* Unhide the Administrator key by giving it a value of 1.

Hacking vbulletin forum 3.6.1!

* First download Active perl 5.8.8.

* Create a Notepad file.

* Then Copy & Paste this script in Notepad file.

* Click on Save as and rename it as dbbxpl.pl and Save it in bin folder of perl.

* Go to Start menu -->
Run.

* Type there cmd and write this. C:\Perl\bin.

* Now type perl dbbxpl.pl hostname /directory /userid.

* It will extract you the Password Hash of the User ID you provide.

* Basically, User ID of Administrator is 1.

To get the Code Click Here.

Introduction to Hacking ! PART 2

Fooling Hacking-JavaScript! 

* Copy and Scrap this JavaScript to your friends.

* Also say your friends that you are a Hacker.

* Tell them to Copy & Paste that JavaScript in their URL Bar.

* Don't forget to Edit the JavaScript with your name.

* Watch the fun, they will get scared.

___________________________________________________

javascript:function reverse() { var inp = " !atheM htraP yb dekcah si tnuocca tukrO ruoY "; var outp="";for (i = 0; i <= inp.length; i++) { outp =inp.charAt (i) + outp;}alert(outp) ;}; reverse();

___________________________________________________ 

Fake Login Hack!

* Open your Internet Explorer or Mozilla Firefox!

* Open orkut.com but don't Sign in there.

* Open the Page Source of it from the View menu and copy the whole code and save it as Orkut Page Source in your Notepad.

* Open Orkut Page Source that you had saved in Notepad, bring the cursor to the first line and press ctrl+f and type form and add < before form, it will search for it.
* Erase that whole line and the next line.
* You need to type a Code there in the same line which you had erased earlier. To get the Code, Click Here.
* Also rename your E-mail ID in the code.

* Now, press ctrl+f again and type there " g o o g l e _ t r a n s p a r e n t . g i f "> without spaces in between and type img src before " g o o g l e _ t r a n s p a r e n t . g i f "> and type < before img src, but keep space between img and src.
* It will search for it and then rename it by just typing "http://www.google.com/accounts/ before google_transparent.gif">.
* Save this whole script as orkut.html.

* Now, go to http://www.freeweb7.com or http://www.freehostia.com and make an account there.

* Login there and open File Manager and upload orkut.html.

* Check the URL there and now the site is all yours.

Cookie Steal Hack!

* You will need to download Mozilla Firefox 1.5.0.8 even if you have a newer version of firefox, and install Add N Edit Cookies Add-on.
* Go to your any friend's profile, click on Edit menu, click on View Source button.
* Press ctrl+f and type your own Orkut Profile name exactly.
* It will search for your name and that line would be something like this-
p class="thumb">"http://img4.orkut.com/images/small/1188155949/78899849jpg" alt="" title="your orkut's original name" >
* The numbers in red would be your GID number.
* You will need a Cookie Stealing Code for accessing the victim's account. To get the Code Click Here.
* Now, edit Type your GID here with your GID number.
* Ask the person whom you want to hack to Copy & Paste this script in his Scrapbook's URL Bar and hit Enter.

* The victim's cookie will come to your Scrapbook and will look something like this.
__utmz=85909575.1188902181.1.1.utmccn=(direct)|utmcsr=
(direct)|utmcmd=(none);orkut_state=ORKUTPREF=ID=407231863
351044377:INF=0:SET=111236436:LNG=1:CNT=91:RM=0:USR=b
XJhZ2VudDQ3NkBnbWFpbC5jb20=:PHS=:TS=1191412332:LCL=en
-US:NET=1:TOS=1:GC=DQAAAG4AAACIsv-K99JW-bMrZnKheLB2Yq
NACRJXO4cvu5MkALfcDj2-LrVoEboQI5SNQmF4UxYXmQkm5B7U00
mFgiGirzuvYo1-btRApa-yWyFFLdIp6RgxwuRv16Ven9_nCMW71VG
vnSnfKQ3IFHiq1BX7abu3:PE=bXJhZ2VudDQ3NkBnbWFpbC5jb20=
:GTI=0:GID=bXJhZ2VudDQ3NkBnbWFpbC5jb20=:VER=2:AST=0:S=
LyU+yULRVpGShUI6qeIbfO5hrrk=:;TZ=-330;__utma=85909575.
1988138430.1191437539.1191437539.1191437539.1;__utmb=
85909575;__utmc=85909575

 
* Open your Add N Edit Cookies Add-on from the Tools menu à Cookie Editor and search for the Site Name --- orkut.com and the Cookie Name --- orkut_state.

* Click on Edit, Copy and Paste the value in the Content box from ORKUTPREF=ID=…….till…….5hrrk=:, click on Save and refresh Firefox

 


 

Wednesday, December 22, 2010

Introduction to Hacking! PART 1

Introduction to Hacking!

"Hacking" is the word that shakes everyone whenever it is said or heard by someone. Everyone born in this world with attitude wants to be a Hacker. But it is not a job of a new born baby or an old grown lady. A Hacker needs a brilliant mind to hack anything. His skills should be so powerful that no other hacker can hack him. A Hacker doesn't need a software to hack. There are many rules that he should learn to become an Ethical Hacker. These rules include knowledge of HTML, JavaScripts, Computer Tricks, Cracking & Breaking etc.etc. So, don't fool around anyone saying that "I am a Hacker!".


And Remember ---> Hacking Is Not A Crime!

History of Hackers!

Phishing- Phishing is the method that you are familiar with. You create a Fake Account and ID in yahoo and fool your friends by telling them to send the victim's ID, their own ID and their own Password in your Fake Yahoo Account.

Brute Force Hack- Brute Force Hack is a Hacking which takes much time to get Password of the Victim and it needs a Hacker to learn about JavaScripts and all the non-sense.

Fake Login Hack- Fake Login Hack is the Hacking used by most of you for your goal by creating a Fake Login Page and telling your friends to login there and the Password would come to you.

Cookie Steal Hack- Cookie Steal Hack is somewhat similar to Fake Login Hack as you prepare a Cookie Stealer and tell your friends to open your Cookie so that his Password would come to you.

Web Mail Hack- Web Mail Hack is the toughest method to learn for Hacking as it also needs a Hacker to learn about JavaScripts, Computer Tricks and much more and ther is also a software for this type of Hack.

Kevin Mitnick, often incorrectly called by many God of hackers, broke into the computer systems of the World's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Micro systems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
November 2002

Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a fast-track extradition to the US where he is a Wanted man. The next hearing in the case is slated for today.

Hacking Methods!

Phishing- Phishing is the method that you are familiar with. You create a Fake Account and ID in yahoo and fool your friends by telling them to send the victim's ID, their own ID and their own Password in your Fake Yahoo Account.

Brute Force Hack- Brute Force Hack is a Hacking which takes much time to get Password of the Victim and it needs a Hacker to learn about JavaScripts and all the non-sense.

Fake Login Hack- Fake Login Hack is the Hacking used by most of you for your goal by creating a Fake Login Page and telling your friends to login there and the Password would come to you.

Cookie Steal Hack- Cookie Steal Hack is somewhat similar to Fake Login Hack as you prepare a Cookie Stealer and tell your friends to open your Cookie so that his Password would come to you.

Web Mail Hack- Web Mail Hack is the toughest method to learn for Hacking as it also needs a Hacker to learn about JavaScripts, Computer Tricks and much more and ther is also a software for this type of Hack.

Types of Hackers!
White Hat Hacker- Also referred as Ethical Hacker or sometimes called as Sneakers. A White Hat Hacker mainly focuses on securing corporate Network from outsider threat. They are with good intention who fight against Black Hat.

Grey Hat Hacker- They are Skilled Hacker who sometimes act legally and sometime not. In simple word you may call a Grey Hat hacker as Hybrid between White Hat and Black Hat hacker

Black Hat Hacker- Also referred as Cracker. A Black Hat Hacker's intention is to break into others Network, and wish to secure his own machine. They often uses different techniques for breaking into systems which can involve advanced programming skills and social engineering.