Saturday, 25 May 2013

Make Bootable Pendrive - Windows 7 Using Command Prompt by jaggikhanna

In this post we will Learn  how to make boot-able pen-drive for windows 7 using command prompt.
This trick is really great and you don’t need to use any third party program or application. all the functions we will use are built in in windows 7.
Follow these steps Carefully.

1.Start > (type in the search bar) cmd , Right click on cmd and run as administrator.
.................................................................................................................................................................
2. Once inside the command prompt, type indiskpart , then press Enter

                               After that, a new window, diskpart, will appear.

...................................................................................................................................................................
3. Once inside this new window, type inlist disk . All active drives will be displayed to the command prompt

               After that is done, you will want to select your USB. Typically, it's always the smallest one in size, so you will always be able to tell which one it is. Type in: select disk 1

                         Clean your USB. Be sure to back up all data stored on the USB you are using, because you will lose all your data in this step. Type in: clean 

................................................................................................................................................................
4. Now you will create a partition for the USB. Type in: create partition primary .

...................................................................................................................................................................
5. Type inselect partition 1 . This will select the partition you have just created.
                    
                            Now type in: active . This will make the partition active on the USB.


...................................................................................................................................................................

6. Format your USB. This could take awhile depending on the size of the drive and the processing power of your computer. It could take anywhere from a few seconds to 45 minutes. Type in: format fs=ntfs 

                                Once completed, type in: assign .

............................................................................................................................................................
7. Congratulations, you now have a bootable USB.Type "exit" in command prompt

...................................................................................................................................................................
8. Now.Insert your Windows DVD in the optical drive and note down the drive letter of the optical drive and USB media. Here I use “E” as my optical (DVD) drive letter and “F” as my USB drive letter.
                    Go back to command prompt and execute the following commands:

                   E: CD BOOT and hit enter. Where “E” is your DVD drive letter.

                  CD BOOT and hit enter.

              After that type BOOTSECT.EXE/NT60 F: and hit enter. (Where “F” is your USB drive letter)

..............................................................................................................................................................
9. Once you have done that,Open the DVD from windows explorer(My computer). You might have to right-click, then click on "Open". select all that you see and transfer to your USB.

..................................................................................................................................................................
10. Install your operating system. You will have to go into your BIOS, which can only be accessed when your computer first turns on. You have the option, when the computer boots, to press F2 key and access your BIOS. When you enter your BIOS, make sure your USB is plugged in and go to boot options and then boot device priority and make sure your USB is the first one on the list. That way when your computer reboots, it will load from the USB, thus enabling you to install your Operating System.






----------ENJOY----------

Thursday, 16 May 2013

Free hack softs - What is a RAT (remote access Trojan) - By Jaggi Khanna

                                  Title:What is a RAT (remote access Trojan)
A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment. Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.
Because a RAT enables administrative control, it makes it possible for the intruder to do just about anything on the targeted computer, including:
·         Monitoring user behavior through keyloggers or other spyware.
·         Accessing confidential information, such as credit card and social security numbers.
·         Activating a system's webcam and recording video.
·         Taking screenshots.
·         Distributing viruses and other malware.
·         Formatting drives.
·         Deleting, downloading or altering files and file systems.
The Back Orifice rootkit is one of the best known examples of a RAT. A hacker group known as the Cult of the Dead Cow created Back Orifice to expose the security deficiencies of Microsoft's Windows operating systems.
RATs can be difficult to detect because they usually don't show up in lists of running programs or tasks. The actions they perform can be similar to those of legitimate programs. Furthermore, an intruder will often manage the level of resource use so that a drop in performance doesn't alert the user that something's amiss.
To protect your system from RATs, follow the same procedures you use to prevent other malware infections: Keep antivirus software up to date and refrain from downloading programs or opening attachments that aren't from a trusted source. At the administrative level, it's always a good idea to block unused ports, turn off unused services and monitor outgoing traffic.
RAT also stands for remote administration tool.

Wednesday, 8 May 2013

ALL WINDOWS AND MICROSOFT RUN Commands !

                                         ALL WINDOWS AND MICROSOFT RUN Commands !



1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System Troubleshooting­ Utility - drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) - gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint

56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad - notepad
65. Object Packager - packager
66. ODBC Data Source Administrator - odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests - ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) - rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility - wabmig
107. Windows Explorer - explorer
108. Windows Firewall - firewall.cpl
109. Windows Magnifier - magnify
110. Windows Management Infrastructure - wmimgmt.msc
111. Windows Media Player - wmplayer
112. Windows Messenger - msmsgs
113. Windows System Security Tool - syskey
114. Windows Update Launches - wupdmgr
115. Windows Version - winver
116. Wordpad - write

117. Microsoft word - winword
118. Microsoft excel - excel
119. Microsoft Power Point - powerpnt
120. Microsoft Access -  msaccess
121. Microsoft outlook - outlook

Tuesday, 7 May 2013

IP ATTACKING SENARIO





              A                                                                                                                 B
Static ip                                                can attack                                          Static ip
Static ip                                                can't attack                                        Dynamic ip (lan network)
Dynamic ip address  (lan network)        can attack                                          Dynamic ip



WHAT IS IP ?

Short for Internet ProtocolIP is an address of a computer or other network device on a network using IP or TCP/IP. For example, the number "166.70.10.23" is an example of such an address. These addresses are similar to an addresses used on a house and is what allows data to reach the appropriate destination on a network and the Internet.
There are five classes of available IP ranges: Class A, Class B, Class C, Class D and Class E, while only A, B, and C are commonly used. Each class allows for a range of valid IP addresses. Below is a listing of these addresses.

ClassAddress RangeSupports
Class A1.0.0.1 to 126.255.255.254Supports 16 million hosts on each of 127 networks.
Class B128.1.0.1 to 191.255.255.254Supports 65,000 hosts on each of 16,000 networks.
Class C192.0.1.1 to 223.255.254.254Supports 254 hosts on each of 2 million networks.
Class D224.0.0.0 to 239.255.255.255Reserved for multicast groups.
Class E240.0.0.0 to 254.255.255.254Reserved for future use, or Research and Development Purposes.

Ranges 127.x.x.x are reserved for the loopback or localhost, for example, 127.0.0.1 is the common loopback address. Range 255.255.255.255 broadcasts to all hosts on the local network.

IP address breakdown
Every IP address is broke down into four sets of octets that break down into binary to represent the actual IP address. The below table is an example of the IP 255.255.255.255. If you are new to binary, we highly recommend reading our binary and hexadecimal conversions section to get a better understanding of what we're doing in the below charts.
IP:255255255255
Binary value:11111111111111111111111111111111
Octet value:8888
If we were to break down the IP "166.70.10.23", you would get the below value. In the below table, the first row is the IP address, the second row is the binary values, and the third row shows how the binary value equals the section of the IP address.
166701023
10100110010001100000101000010111
128+32+4+2=16664+4+2=708+2=1016+4+2+1=23
Automatically assigned addresses
There are several IP addresses that are automatically assigned when you setup a home network. These default addresses are what allow your computer and other network devices to communicate and broadcast information over your network. Below is the most commonly assigned network addresses in a home network.
192.168.1.00 is the automatically assigned network address.
192.168.1.11 is the commonly used address used as the gateway.
192.168.1.22 is also a commonly used address used for a gateway.
192.168.1.3 - 254Addresses beyond 3 are assigned to computers and devices on the network.
192.168.1.255255 is automatically assigned on most networks as the broadcast address.
If you have ever connected to your home network, you should be familiar with the gateway address or 192.168.1.1, which is the address you use to connect to your home network router and change its settings.
Getting an IP address
By default the router you use will assign each of your computers their own IP address, often using NAT to forward the data coming from those computers to outside networks such as the Internet. If you need to register an IP address that can be seen on the Internet, you must register through InterNIC or use a web host that can assign you addresses.
Anyone who connects to the Internet is assigned an IP address by their Internet Service Provider (ISP) who has registered a range of IP addresses. For example, lets assume your ISP is given 100 addresses, 109.145.93.150-250. This means the ISP owns addresses 109.145.93.150 to 109.145.93.250 and is able to assign any address in that range to its customers. So, all these addresses belong to your ISP address until they are assigned to a customers computer. In the case of a dial-up connection, you are given a new IP address each time you dial into your ISP. With most broadband Internet service providers because you are always connected to the Internet your address rarely changes and will remain the same until the service provider requires it to be changed.
Connecting to the Internet

Monday, 6 May 2013

Hack WebSite's - Admin login Using Havij


Hi Friends in this Tutorial i will Tell you How to Hack Web Sites With Sql Injection tool, there are large amount of sql vulnerable sites available.

Google Dorks: Google dorks are specifically query's that can reveal all the information about the specific website. I am giving you some Google dorks which you can use for finding the website vulnerable to sql injection.


    addToCart.php?idProduct=
    addtomylist.php?ProdId=
    add-to-cart.php?ID=
    adminEditProductFields.php?intProdID=
    advSearch_h.php?idCategory=
    affiliate.php?ID=
    affiliate-agreement.cfm?storeid=
    affiliates.php?id=
    ancillary.php?ID=
    archive.php?id=
    article.php?id=
    phpx?PageID
    basket.php?id=
    Book.php?bookID=
    book_list.php?bookid=
    book_view.php?bookid=
    BookDetails.php?ID=

Finding target:
1) Now just paste any one of the query in Google search box you will get a lot of websites.


2) Now open any of the website so you will get the link like this.
    www.example/index.php?id=12 or any number

3) We have to just add a single quote (') at the end of link so it will become some thing like this.
    www.example.com/index.php?id=12'

4) Look closely at the page before adding single quote (') and after adding single quote (') . If the some element of the page is missing then Bingo!!! you have found a vulnerable website. Now we can start our sql injection. And if the page remains the same or show's error like page not found then it is not vulnerable and you should move to another website. 

Now we have our target ready so what are you waiting for just attack.

1) First of all download Havij 1.15 

                                           Download Havij


2) Now extract it and run it. It will look some thing like this.



3) Now paste your target in the highlighted box. And click analyze.


4) Let it analyze your target for some time. and then you will see something like this.


5) Now click on "Tables" tab. You will see something like this.



6) Now click on "Get DBs" ( Make sure you have tick-marked on the first option, let it be anything ). Now wait for about a minute you will some thing like this.


7) Now tick-mark both the option's. And click on "Get Tables". And wait for some 2-3 minutes. You will get a lot of information from this. It'll look something like this.


8) Now search something sensitive like admin, users, login, passwords, and many more. Tick-mark them and click on "Get Columns". You will see something like this.


9) Now there you have user_id, password, user_name. Now tick-mark them and select "Get Data". You will see something like this.


10) Now find admin panel. And login using the user_id and password found.