Labels

Showing posts with label Best of us. Show all posts
Showing posts with label Best of us. Show all posts

Saturday, 19 May 2012

Cracking Zip Password Files


Tut On Cracking Zip Password Files..

What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.
FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.
FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".

We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

Now that we've gone through all the theoretical stuff, let's get to the actual commands.


--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------


The command line you'll need to use for using brute force is:

fzc -mb -nzFile.zip -lChr Lenght -cType of chars

Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

For Chr Lenght you can use 4 kind of switches...

-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

For the Type of chars we have 5 switches they are:

-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers


Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:

fzc -mb -nzTest.zip -l4-7 -ca1

This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------

Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.

fzc -mwMode number -nzFile.zip -nwWordlist

Where:

Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like

fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

FZC would just start reading at line 50 and would just read with length >= to 9.

Example:

If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50


--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------

Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:

fzc -mr

And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program

Thursday, 17 May 2012

Compress 1GB File to 10MB with KGB Archiver

KGB Archiver is an opensource software which can compress 1 GB file to 10 MB file. This software  is based on PAQ6 algorithm which has AES-256 powerful encryption. KGB archiver is available for Linux and Windows both. 
This software case too much time to compress a file as we can see that the compression ratio is very hign. But the time depends on the size of file being compressed. File compressed with KGB Arciver can only be decompressed with this tool only. If you are compressing any file with KGB archiver and sending the comprssed file to your friends then he must have KBG archiver installed on his computer to decompress the file.
Note: Some of you may not feel happy after reading this not. Because this tool can not compress video files. This tool can only compress 




Features of KGB Archiver: These are some features of this cool compression software.

  • Supports native .kgb files and .zip files
  • AES-256 Encryption
  • Able to create self-extracting archives.
  • Multilanguage supports like Arabic, German, Greek, Japanese, Spanish many more.
  • Unicode is supported in both User Interface and File Systems.
  • An Explorer shell extension is available for the windows version.
  • Make Password protected compressed file.

How to hack with Trojan | Prorat tutorial

Prorat a famous trojan for hacking system, facebook, gmail, yahoo, twitter and other accounts. Today i wil show you step by step guide to hack with Prorat.


First of download Prorat from the given link
ProRat


Then disable your antivirus. It is necessary other wise your downloaded trojan will be detected and deleted. Don't worry, it will not harm your system at this stage.


Now run Prorat.exe
You will see the prorat window. There are so many options but you have to create a server first. 


So click on create server.
There will be 3 options

  1. Create Prorat server
  2. Create Downloader Server
  3. Create Cgi Victim List & usage



now click on create prorat server


A new window will popup. which will have a lots of options in side bar.

  • Notifications
  • General settings
  • Bind with Files
  • Server extnsions
  • Server Icons



You have to use all options one by one to create a server.
Now in Notofication. Mark on Use Mail Notification and enter your email id. there will be a default id. Erase it and enter your. Then Test. It will send a testing mail to your email. Check your spam too.


Then Go to general settings and select all the options which you want to have in your trojan.


Then go to Bind with file and select file to bind your trojan with.
At last select your server extension and icon. Then click on Create server.
Now you have created a server.


Send this server file to the victim you want to hack, but before sending this file to victim make it FUD (Fully UnDetectable) with FUD cryptors. Search for this website for FUD articles. 
after creating server FUD, it is ready to send to the victim.


Send this file to the victim. If the victim will run the server in the system, Trojan server will send you the notification email with the IP address of the victim. Use this ip and run your prorat.


At the top there is an option for IP and port. Enter thr IP and port and click on connect.
wait to connect.
After getting connected to the victim's system.. you can use any of the options available on the prorat to hack the user's system

Wednesday, 16 May 2012

Cool wondow tricks - it starts notepad with automatic typing

 You can send it to your friend to make a fun. This one is also w funny script which will open the notepad and start typing in it automatically. You can set the message it will type. Send it to your friendas a ghost of computer which will do anything on computer.


Type the script given below in notepad and save as Ghost.vbs and send to friend.


Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "This is a Virus. You have been infected."
loop

Download Ice Cream Sandwich source code





Google has made available the source code of its latest mobile operating system, Android 4.0, Ice Cream Sandwich. With this release, the mobile OS is now opensource for all developers which want to create their custom applications for this.


According to a post from Jean-Baptiste M. “JBQ” Queru, a software engineer on the Android Open Source Project, the code is still in the process of being uploaded, and developers are advised to wait til it’s fully complete before they start downloading it themselves. But it’ll be available very soon.


This is more important because this operating system is the latest version of Android which is fully optimized for tablets as well as phones. So all the mobile companies who develeop low cost tablets can use it easily.


get it from download link
http://source.android.com/source/downloading.html

How to hack facebook account

If you are searching for some online easy to use Facebook hacking tools, then read: Facebook hacking tools and online services


This post uses some manual methods to hack Facebook account.


There are many ways to hack facebook account.
for cool computer tricks click here
Best Computer How to guides : http://techlomedia.in


1: phishing:- Phishing or fake page hacking is the most widely used hacking trick for any type of accounts of website. It can also be implemented as in this case too.  Read my previous post on phishing to learn it and download facebook phishing page from below. That post was specially for Gmail. The same process will be applied in the case of faceook too. you only need to save facebook login page to your system and make changes to form element of action as per in my that post. 
you can also use Tabnapping . This is also a type of phishing but it will make it easier to send your fake page to the victim. Download Tabnapping script from this link:TabNapping Script . Read more about Tabnapping here 


IMPORTANT: sending fake page in case of simple case is not so easy. I am suggesting you an effective way of doing that. You get facebook notification emails. Use the format of that email address but replacing the URL with your fake URL ;)


Download facebook phishing page here:
Download 


2: Keylogger:- Keylogger is another useful tool to hack someone's facebook account. If you do not know about keyloggers read here . This is the best way to hack Facebok account.download some keyloggers from this link. Kelogger download . Now it's up to you.. how you are using this tool. If you have physical access to victims system, you can manually install this tool and it will effectively work.
Note: If you do not know much about computer and programming, keylogger is the best and easiest way for you. Download the best keylogger from the link below and read its tutorial. 

Download WinSpy and read How to hack facebook with keylogger


NOTE: Never search for the free or crack. Because that will not work. Some hackers also hosted it for free with Trojan. When you will use those free hosted on some file hosting server, you are taking risk with your facebook account which can be hacked with that trojan. So download only with the official link given above.
  
3: Firesheep:- If your victim uses unsecure wireless network then you can hack him easily by using mozilla firefox and a simple firefox plugin. Firesheep. read this post to know about firesheep and dowload it from that post. Firesheep . For college campus, this tool is easiest to use and best to hack. use this tool to gain access to any of the person using the same unsecure wireless network.


4: Hack Facebook's primary email address:- Hacking someone's email account also need above described methods (phishing, keylogger, firesheep) but you can also hack it by using forgot password and then by guessing his security question. Many times people use simple security questions which are easy to guess. If you know him/her personally, you can easily guess.


5: Facebook's can't access account option:- there is an recovery option in Facebook account. You can mention that your primary email address is also hacked. Then they will ask you many questions regarding that account. as some name of friends, account holder's some personal information etc. If you know about victim well, you can be able to answer all those question. then facebook will ask you for new email address for password recovery. Give any email address which you can access. 


Facebook also has a recovery option with four of your friends in case of lost access to recovery email and recovery number. So you can use four of his/her friends to recover his account on any new email id specified by you. For this you can either use some of existing friends on that profile or can use four fake profiles and add that person.


These are some ways of hacking Facebook account. There may be more but this time only these are in my mind. :P
if i will remember any other method i will update this post..


if you like this post please do comment  :)

Tuesday, 15 May 2012

iBoot + MultiBeast: Install Mac OS X on any Intel-based PC


Any OSx86 installation guide can seem daunting at first glance, especially when trying to remember cryptic terminal commands and sorting through volumes of misinformation on the web.  This guide requires no coding, terminal work, or Mac experience of any kind.  You will not need access to a Mac.  In fact, it's easier and faster for me to install Snow Leopard with fully working components on my system than it is to install Windows 7.  And more fun.

The iBoot + MultiBeast method is designed and tested for any desktop or laptop running the latest line of Intel processors, the Core i3/i5/i7s.  I have had reports of success with older machines as well including CoreDuo, Core2Duo, and even Pentium 4.  However, AMD processors are not supported.

YOU WILL NEED

  • A computer running an Intel Processor
  • A blank CD
  • Mac OS X Snow Leopard Retail DVD
  • To leave any fear of your computer at the door.
  • Patience and humility- it may not work out perfectly the first time- but with enough tenacity and grit, you'll reach the promised land.  It's easy to get frustrated, but don't give up!  There are a community of users with similar hardware in the tonymacx86 Forum to provide support if you get stuck.
BEFORE YOU BEGIN
  • If you have greater than 4gb of RAM, remove the extra RAM for a maximum of 4gb.  You can put back any extra RAM in after the installation process.
  • Use only 1 graphics card in the 1st PCIe slot with 1 monitor plugged in.
  • Remove any hard drives besides the blank drive being used for OS X.
  • Remove any USB peripherals besides keyboard and mouse.
  • Remove any PCI cards besides graphics- they may not be Mac compatible.
  • If using a Gigabyte 1156 board, use the blue Intel SATA ports- not the white Gigabyte SATA ports.
  • It's best to use an empty hard drive- you will have to partition and format the drive. 
  • Always back up any of your important data.
STEP 1: BIOS SETTINGS
You will need to set your BIOS to ACHI mode and your Boot Priority to boot from CD-ROM first.  This is the most important step, and one many people overlook.  Make sure your bios settings match these.  It's not difficult- the only thing I did on my Gigabyte board besides setting Boot Priority to CD/DVD first was set Optimized Defaults, change SATA to AHCI mode, and set HPET to 64-bit mode.

STEP 2: INSTALL MAC OS X 

In order to boot the Mac OS X Retail DVD, you'll need to download and burn iBoot.  For desktops and laptops using unsupported Intel CPUs and graphics, a legacy version of iBoot can be downloaded here.
  1. Download iBoot
  2. Burn the image to CD
  3. Place iBoot in CD/DVD drive
  4. Restart computer
  5. At boot prompt, eject iBoot


  6. Insert your Mac OS X Snow Leopard Retail DVD and press F5
  7. When you see the screen below, press enter to begin the boot process
  8. When you get to the installation screen, open Utilities/Disk Utility.  NOTE: If you cannot get to the installation screen, retry from Step 4, type PCIRootUID=1 before hitting enter. If that doesn't work then try PCIRootUID=1 -x or just -x which will enter Mac OS X Safe Mode and will allow you to proceed. For some graphics cards, use GraphicsEnabler=No boot flag to proceed. 
  9. Partition your hard drive to GUID Partition Table
  10. Format your hard drive to Mac OS Extended (Journaled).   NOTE: The bootloader can only boot from a disk or partition of 1 TB or less.  Partition larger drives.
  11. For the purposes of this guide, name it Snow Leopard.  You can rename it later.
  12. Close Disk Utility
  13. When the installer asks you where to install, choose Snow Leopard
  14. Choose Customize‚ and uncheck additional options.  This will hasten the install process.  You can always install this stuff later.
  15. Restart computer.
  16. Place iBoot back in drive.
  17. When you get to the boot selection screen, choose your new Snow Leopard installation.
  18. View the super-cool Mac OS X Snow Leopard Welcome Video, and set up your computer!

STEP 3: UPDATE TO 10.6.8
If you have a Sandy Bridge system, please follow these specialized instructions to update to 10.6.8.
  1. Open Finder and navigate to your Snow Leopard drive.
  2. Download the Mac OS X 10.6.8 Combo Update
  3. Download MultiBeast
  4. Open MultiBeast- don't run it yet, just leave it open.  Set up windows as shown.
  5. Mount MacOSXUpdCombo10.6.8.dmg
  6. Install MacOSXUpdCombo10.6.8.pkg
  7. Upon completion, the installer will ask you to reboot.  DO NOT REBOOT.
  8. Switch to the already open MultiBeast.  If it closes, just re-open it.
STEP 4: MULTIBEAST
MultiBeast is an all-in-one post-installation tool designed to enable boot from hard drive, and install support for Audio, Network, and Graphics. It contains two different complete post-installation solutions: EasyBeast and UserDSDT.  In addition it includes System Utilities to rebuild caches and repair permissions and a collection of drivers, boot loaders, boot time config files and handy software.

Choose one of the following options directly following a fresh installation and update:   

EasyBeast is a DSDT-free solution for any Core/Core2/Core i system. It installs all of the essentials to allow your system to boot from the hard drive. Audio, Graphics and Network will have to be enabled separately.  

UserDSDT is a bare-minimum solution for those who have their own pre-edited DSDT. Place your DSDT.aml on the desktop before install. Audio, Graphics and Network will have to be enabled separately.  HINT: Check the DSDT Database for a pre-edited DSDT. 
  1. Run MultiBeast.
  2. If you have a custom DSDT that's been edited, place the file on your desktop and chooseUserDSDT.
  3. All others select EasyBeast 
  4. Select System Utilities.
  5. Optionally, you may install further drivers via Advanced Options to enable ethernet, sound, graphics, etc...  Be sure to read the documentation provided about each installation option.  NOTE: EasyBeast, and UserDSDT install the bootloader by default, so you'll not need to check that option.     
  6. Install to Snow Leopard- it should take about 4 minutes to run scripts.
  7. Eject iBoot.
  8. Reboot- from your new Snow Leopard installation drive.

Congratulations!  You're done!!

Your PC is now fully operational, while running the latest version of Mac OS X Snow Leopard!  And you have a nice Boot CD to get into your system in case things go awry.  Boot your system from iBoot if you have issues.  You may run MultiBeast as often as you like.

If you can't boot, try typing -x at the boot prompt to enter safe mode, or just boot with iBoot.  When you get to the desktop, you can make all of the changes you need to.  The best way to start fresh is delete whatever you're trying to get rid of- including the whole /Extra folder, as most kexts are installed there.  Then you can re-run MultiBeast.  As long as you rebuild caches and repair permissions after you're done, you can do just about anything you want to /Extra/Extensions and /System/Library/Extensions.  Anything can be tweaked and enabled upon subsequent uses of MultiBeast.

If you've had success using iBoot + MultiBeast, consider a contribution to help keep the sites going.  We're constantly updating and tweaking our tools to help you.

Thanks in advance! 

all thanks to tonymacx86

Breaking Administrator’s Password


Hello friends today I am share a new  Administrator password hacking and breakingtrick by hackingtrick.


Administrator password can be broken by replacing sam file in system32\config by the sam file in repair folder of windows. it can be easily done on a machine with dual operating systems, simply log on to os other then the one whoes password is to becracked the way is exactly same as written above but if there is a single os on a machine then there is only one way i.e to use ms dos start up disk or some other boot disk and replace the sam file in config folder with the one in repair folder


note:- this method works only if hard drive is FAT32 formatted because NTFS drive does’nt take boot from Ms DOSThis way you can remove the old administratOr password as if the windows is newly installed and the password was’nt set


I hope you like this post . pass your comments..

BLOG AUTHORS