Current date/time is Sat Apr 27, 2024 4:45 am

Hacking tutorials


  • Hacking tutorials

    Topics
    Posts
    Last Posts
  • Nothing technical but read if wana be hacker


    You can induce it - but only if you are willing to drive yourself mad enough! Go read and practice until you have mastered at least Assembly language and Intermediate Level Electronics! Without this foundation you'll be just another little geek, who might know the magic words to the spell but dosent understand what he's doing! So RTFM! ..so what does that mean? Read The ****ing Manual! You will be sooo amazed at how easy most things are if you just try to read the manual first! The truth is: Most people cant read. Or they read poorly if they read at all. So if you can't really read...STOP RIGHT HERE. GO learn to read first. If you can't read at a minimum 12th Grade level you cant be a hacker. Reading is the basic skill you must have to do EVERYTHING BEYOND THIS POINT. Tell your friends you cant party...you're busy. Spend at least 4 hours a day at your new-found fascination...or decide right here and now that you cant cut it! If you CAN, get a copy of MINIX or LINUX...start learning about OPERATING SYSTEMS. Then start your 1st real hack...try building a computer-controlled, DTMF dialer card for your cheap PC...write the code to use it with, make it a TSR to keep life interesting...now port it to MINIX or whatever ...better yet, port it as an IOCTL call at kernel level! You keep reading... Now you're ready to take on something more complex - go to the Library, start a literature search; topic: Telephone Technologies. RTFM! Learm about the ancient cross-bar, the Pre-ESS systems, the fab MFTSS, the TELEX boxes and circuits...keep reading...buy up an older, cheap (like under $50) cellular phone...by this time you should already have a subscription to 'Nuts & Volts" as well as a few other grassroots technology pubs....buy a copy of the "Cellular Hacker's Bible"....start by doing something simple.. ..disassemble and re-write the phone`s control ROM to allow it to function as an 800MHZ scanner...hopefully you've assembled a large array of tools and test gear by now. You've got a good dual-trace scope, some pc-based PROM burner, a signal generator, a logic probe or two, maybe even a microprocessor-emulator for the 5051, the Z80, the 68010 or something....you may have been dragged into some fields-afar by life - incorporate them: If somebody drasgged you into SCUBA, build your own sonar. If you have gotten interested in amateur radio, you can build a lot of swell stuff...I recommend you checkout Packet's AX25A level2 protocol...very slick stuff! If your bud's are all into motors, take a whak at doing your own Performance PROMS for GM's F.I. and spark advance curves...or try adapting some Volkswagen/BOSCHE Kjetronics F.I. to a Harley Davidson!..maybe you're into music so you buy a synthesizer and learn all about electronic music, you start hacking analog modules and build a nicer synth than you could buy! Then you interface it to a MIDI port on a cheap 286AT and then hack up some sequencer software, or buy some and then disassemble it to fix all the bugs! You keep reading... By now most of your friends are also "far into the pudding", you have either gained 50 lbs or gone totally skinny...your skin tone is 2 shades lighter from being indoors so long...most of the opposite sex is either totally freaked by or with you - they either dig you, or they dont!...you're probably knocking on the door of what will be a $60K+/yr job as a systems analyst...and you are well-aware that 90% of the people in this world can't talk their way out of a badly cooked steak at the local eatery, let alone install a new motherboard in their PC! So you pick up some extra cash on doing **** like that for the straights...you keep reading, and RTFM'ing higher and higher, learning about networks...the VCR breaks down and your SO bitches about having to wait till monday to have it fixed...you fix it in about 40 minutes....the next day the clothes dryer starts to make squeeking noises like a 50' mouse, you've never fixed one before - but somehow it's not that difficult to open the bastard up and find the squeek and fix it...and suddenly it dawns on you that hacking code or hardware is pretty much the same! You keep reading... Congrats, you are now a real hacker. Absolutly nothing but a lack of time (or in some cases money) can stop you. You are a true Technologic Philosopher...you can function in places a mere Engineer or Scientist would truly FEAR TO TREAD! You can read better than Evelyn Wood, you have a collection of tools that would make a Master Machinist and a Prototype EE or ME cry. You can calculate series and parallel resonant circuits in your head. You can fix any consumer appliance - if you can get the parts. Your car has either become one of your main hacks or you'ver deligated the job to a mechanic who you have found to be a fellow hacker; and you work on his homebrew 68010 unix box...because you've got a 68010 emulator and he works on your car because that's the kind he specializes in! Maybe you trade services with people for 50% of what ordinary people have to BUY WITH CASH!...you keep reading... (this is the stage where the author now finds himself...16 years into a career at a Fortune 5 company and age 42...still reading... your mileage may vary! <-((that's my code too! I co-wrote VEEP, (vehicle-economy-emissions-program, a complete auto-simulator, written in Fortran-5 for the Univac 1108 system using punch-cards!) for the Ford Foundation and the DOT while at JPL in 1973))
    17 Topics
    18 Posts
    Wed Aug 03, 2011 2:16 am
    allhadrs  tight pants cheerleader teens porn
  • Absolute basics


    "Do not learn to hack, but hack to learn". Many new comers see this motto tagged around HF and take it head on. The word Motto is defined as "a sentence, phrase, or word expressing the spirit or purpose of a person, organization, city, etc." So DO NOT read some random TuT(tutorial) about hacking a website, network, or PC and get caught. That said, please continue reading. In the beginning we all asked ourselves a few questions... Where do I start? Where do I go to learn? What do I need to Hack? There are numerous facets in the world of hacking that can be VERY overwhelming to a beginner. So many that you will always learn something new until you stop hacking. There is always something new coming out that either replaces or patches(fixes) an older version of software. Therefore necessitating the need for new methods of hacking. So here is a list of programs you should download, tools you should utilize, lessons you should learn, and why you should learn them. Along with links to TuTs from our L33T members. Starting with the basics: Google Google is hands down the most powerful and accurate search engine. Before creating a new thread with a simple question(nothing wrong with asking us) search for it on Google. Wikipedia Wikipedia is a great site for information. It is not a dictionary but an encyclopedia openly update/changed by the public. So you don't have to worry about read some cryptic definition that leaves you with more questions. Nine out of Ten when you search with Google you will see Wiki at the top or close to. Hack Forum Search If there is a new hacking tool you just download and you want to learn more about it and how to use it. Search the HF for it, there is nothing that you as a beginner know more of than our VeTs. Youtube Many rules have changed ever since Google bought Youtube in 2006. More explicit and sensitive videos are allowed more and more than the prevailing years of 2006. You can search for practically any video dealing with hack tools and attacks. Batch - Created by Unclean Spirit Spirit Elementary- Created by Unclean Spirit You simply can not get more simple than .bat files. Batch files are a good way to introduce yourself to CMD Prompt( to get to: Start>Run: tpye "cmd" enter) However batch files are commonly made with notepad. You can create simple or intricate virus .bat files that cause all sorts of chaos. You can find all kinds of virals at the Batch ,Shell, Dos and Command Line Interpreters Cain & Abel Youtube TuT "Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols." Ophcrack- Created by Crow Youtube TuT Unlike Cain and Abel this program can be burned to a CD or configured to a USB to boot from. Meaning that you can have no password access to any computer profile and still crack the password. As far as i know, Cain and Abel can only function if you have access to at least a guest account. Telnet Hacking- Created by Follower Telnet Hack - Provided by Ethical Hacking Articles (Turn on Windows Vista Telnet) - Created by xgsconan Youtube TuT "Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine. The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine. " Aradamax 2.8- Created by VipVince VicSpy -Created by 3 4 1 Youtube Examples Keylogging is a method used for gathering information from your victims computer by recording keystrokes, Screenshots, and other activities. It is hard to find Keylogging tools that are completely undetectable to security programs. The few that are undetectable soon are added to security information databases. This reiterates what i said in the beginning, "There is always something new coming out that either replaces or patches(fixes) an older version of software. Therefore necessitating the need for new methods of hacking." Basic Nmap Usage- Created by Empa7hy Nmap- Created by Austral Hacker Youtube TuT "Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing." Basically tells you everything you need to know about your targets potential vulnerabilities. Very powerful and needed tool. This is what I believe a new comer should start with. Many people have different ways of training that work just as well. However, this is the basics of the basics. Become well briefed in all these categories because they are the most used tools for a hacker using the Windows OS. Now you can delve deeper into the world of hacking. Don't forget, "Do not learn to hack, but hack to learn". >>Hackin Forums FAQ<< Hack Test Hacking Resource- Created by Emap7hy Hacking Resource- Created by Emap7hy Hacking Resource- Created by Unclean Spirit Hacking Resource- Created by Google
    Moderator: Moderators
    161 Topics
    165 Posts
    Wed Dec 07, 2011 8:57 am
    james21 UGG Boots Men Also another name for "Nine UGG Boots Men"
  • Real startup for hacker...


    &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| ###################################################################### @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ ********************************************************************** ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + + THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING + + + + + + + + + + BY + + REVELATION + + LOA--ASH + + + + + + + + + + + + Written: 08/4/96 Volume: 1 + ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ********************************************************************** @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ ###################################################################### |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& Anyway, for those of you who are wondering "what do the letters "LOA" under his handle stand for?" Well, LOA stands for Legion Of the Apocalypse, which is a group of elite hackers and phreakers in my area. The current members of LOA are: Revelation, Phreaked Out, Phreak Show, Logik Bomb, and Silicon Toad I started LOA when I discovered that there were many good hackers and phreakers in my area. I thought that an organized group of hackers and phreakers would accomplish much more than an individual could by himself. Thus the Legion Of the Apocalypse was formed and has been around for a while since. Our main goal is to show the public what hacking and phreaking is all about and to reveal confidential information to the hacking/phreaking community so that we can learn more about computers, telephones, electronics, etc. We are hoping to get our own World Wide Web page soon, so keep an eye out for it. It will contain all of the hacking, phreaking, computer, telephone, security, electronics, virus, and carding information that you could possibly want. Also, if some of you are wondering why I chose the word Revelation as my handle, well, Revelation means revealing or unveiling, which is exactly what I intend to do as a hacker/phreaker. I intend to reveal all the information that I can gather while hacking and phreaking. Anyway, I wrote this document because I have read all the files that I could get my hands on and noticed that there has never been a really good file written that guided beginning hackers and phreakers step by step. When I began hacking and started reading all of the beginner files, I still had many un-answered questions. My questions were eventually answered, but only through LOTS of reading and practice. In this file, I hope to give basic step by step instructions that will help beginning hackers and phreakers get started. But, DO NOT think that this will save you from having to read alot. If you want to be a hacker/phreaker, reading is the most important thing you can do. You will have to do ALOT of reading no matter what. This document was intended for beginners, but it can also be used as a reference tool for advanced hackers and phreakers. Please distribute this document freely. Give it to anyone that you know who is interested in hacking and/or phreaking. Post it on your World Wide Web page, Ftp sites, and BBS's. Do whatever you want with it as long as it stays UNCHANGED. As far as I know, this is the most complete and in depth beginners guide available, that is why I wrote it. Also, I plan to have new volumes come out whenever there has been a significant change in the material provided, so keep an eye out for them. LOA is planning on starting an on-line magazine, so look for that too. And we are also starting a hacking business. Owners of businesses can hire us to hack into their systems to find the security faults. The name of this company is A.S.H. (American Security Hackers), and it is run by LOA. If you have any questions about this company, or would like to hire us, or just want security advice, please E-Mail A.S.H. at: "revelationmail@usa.pipeline.com". Readers can also send comments and questions to this address. This document is divided into three main sections with many different sub-sections in them. The Table Of Contents is below: Table Of Contents: I. HACKING A. What is hacking? B. Why hack? C. Hacking rules D. Getting started E. Where and how to start hacking F. Telenet commands G. Telenet dialups H. Telenet DNIC's I. Telenet NUA's J. Basic UNIX hacking K. Basic VAX/VMS hacking L. Basic PRIME hacking M. Password list N. Connecting modems to different phone lines O. Viruses, Trojans, and Worms II. PHREAKING A. What is phreaking? B. Why phreak? C. Phreaking rules D. Where and how to start phreaking E. Boxes and what they do F. Red Box plans G. Free calling from COCOT's H. ANAC numbers III. REFERENCE A. Hacking and phreaking W.W.W. pages B. Good hacking and phreaking text files C. Hacking and phreaking Newsgroups D. Rainbow Books E. Hacking and phreaking magazines F. Hacking and phreaking movies G. Hacking and phreaking Gopher sites H. Hacking and phreaking Ftp sites I. Hacking and phreaking BBS's J. Cool hackers and phreakers K. Hacker's Manifesto L. Happy hacking! * DISCLAIMER * "Use this information at your own risk. I Revelation, nor any other member of LOA, nor the persons providing this file, will NOT assume ANY responsibility for the use, misuse, or abuse, of the information provided herein. The following information is provided for educational purposes ONLY. The informaion is NOT to be used for illegal purposes. By reading this file you ARE AGREEING to the following terms: I understand that using this information is illegal. I agree to, and understand, that I am responsible for my own actions. If I get into trouble using this information for the wrong reasons, I promise not to place the blame on Revelation, LOA, or anyone that provided this file. I understand that this information is for educational purposes only. This file may be used to check your security systems and if you would like a thorough check contact A.S.H. This file is basically a compilation of known hacking and phreaking information and some information gathered from my own experience as a hacker/phreaker. I have tried to make sure that everything excerpted from other documents was put in quotes and labeled with the documents name, and if known, who wrote it. I am sorry if any mistakes were made with quoted information." *-Revelation-* LOA I. HACKING A. What is hacking? Hacking is the act of penetrating computer systems to gain knowledge about the system and how it works. Hacking is illegal because we demand free access to ALL data, and we get it. This pisses people off and we are outcasted from society, and in order to stay out of prison, we must keep our status of being a hacker/phreaker a secret. We can't discuss our findings with anyone but other members of the hacking/phreaking community for fear of being punished. We are punished for wanting to learn. Why is the government spending huge amounts of time and money to arrest hackers when there are other much more dangerous people out there. It is the murderers, rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers. We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don't care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn. There are only two ways to get rid of hackers and phreakers. One is to get rid of computers and telephones, in which case we would find other means of getting what we want.(Like that is really going to happen.) The other way is to give us what we want, which is free access to ALL information. Until one of those two things happen, we are not going anywhere. B. Why hack? As said above, we hack to gain knowledge about systems and the way they work. We do NOT want to damage systems in any way. If you do damage a system, you WILL get caught. But, if you don't damage anything, it is very unlikely that you will be noticed, let alone be tracked down and arrested, which costs a considerable amount of time and money. Beginners should read all the files that they can get their hands on about anything even remotely related to hacking and phreaking, BEFORE they start hacking. I know it sounds stupid and boring but it will definetly pay off in the future. The more you read about hacking and phreaking, the more unlikely it is that you will get caught. Some of the most useless pieces of information that you read could turn out to be the most helpful. That is why you need to read everything possible. C. Hacking rules 1. Never damage any system. This will only get you into trouble. 2. Never alter any of the systems files, except for those needed to insure that you are not detected, and those to insure that you have access into that computer in the future. 3. Do not share any information about your hacking projects with anyone but those you'd trust with your life. 4. When posting on BBS's (Bulletin Board Systems) be as vague as possible when describing your current hacking projects. BBS's CAN be monitered by law enforcement. 5. Never use anyone's real name or real phone number when posting on a BBS. 6. Never leave your handle on any systems that you hack in to. 7. DO NOT hack government computers. 8. Never speak about hacking projects over your home telephone line. 9. Be paranoid. Keep all of your hacking materials in a safe place. 10. To become a real hacker, you have to hack. You can't just sit around reading text files and hanging out on BBS's. This is not what hacking is all about. D. Getting started The very first thing you need to do is get a copy of PKZIP or some other file unzipping utility. Nearly everything that you download from the Internet or from a BBS will be zipped. A zipped file is a file that has been compressed. Zipped files end with the extension ".zip". Then you need to get yourself a good prefix scanner.(also known as a War Dialer) This is a program that automatically dials phone numbers beginning with the three numbers (prefix) that you specify. It checks to see if the number dialed has a carrier.(series of beeps that tells you that you have dialed a computer) Try and find a large business area prefix to scan. It is these businesses that have interesting computers. There are many good scanners out there, but I would recommend Autoscan or A-Dial. These are very easy to use and get the job done quickly and efficiently. E. Where and how to start hacking After you get yourself a good scanner, scan some prefixes and find some cool dialups, then do the following: From your terminal, dial the number you found. Then you should hear a series of beeps (carrier) which tells you that you are connecting to a remote computer. It should then say something like "CONNECT 9600" and then identify the system that you are on. If nothing happens after it says "CONNECT 9600" try hitting enter a few times. If you get a bunch of garbage adjust your parity, data bits, stop bits, baud rate, etc., until it becomes clear. That is one way of connecting to a remote computer. Another way is through Telenet or some other large network. Telenet is a very large network that has many other networks and remote computers connected to it. Ok, here is how you would connect to a remote computer through Telenet: First, you get your local dialup(phone number) from the list that I have provided in Section G. Then you dial the number from your terminal and connect.(If you get a bunch of garbage try changing your parity to odd and your data bits to 7, this should clear it up.) If it just sits there hit enter and wait a few seconds, then hit enter again. Then it will say "TERMINAL=" and you type in your terminal emulation. If you don't know what it is just hit enter. Then it will give you a prompt that looks like "@". From there you type "c" and then the NUA (Network User Address) that you want to connect to. After you connect to the NUA, the first thing you need to do is find out what type of system you are on.(i.e. UNIX, VAX/VMS, PRIME, etc.) There are other things that you can do on Telenet besides connecting to an NUA. Some of these commands and functions are listed in the next section. You can only connect to computers which accept reverse charging. The only way you can connect to computers that don't accept reverse charging is if you have a Telenet account. You can try hacking these. To do this, at the "@" prompt type "access". It will then ask you for your Telenet ID and password. Telenet is probably the safest place to start hacking because of the large numbers of calls that they get. Make sure you call during business hours (late morning or early afternoon) so there are many other people on-line. F. Telenet commands Here is a list of some Telenet commands and their functions. This is only a partial list. Beginners probably won't use these commands, but I put them here for reference anyway. COMMAND FUNCTION c Connect to a host stat Shows network port full Network echo half Terminal echo telemail Mail.(need ID and password) mail Mail.(need ID and password) set Select PAD parameters cont Continue d Disconnect hangup Hangs up access Telenet account.(ID and password) G. Telenet dialups Here is the list of all the Telenet dialups that I know of in the U.S.A., including the city, state, and area code: STATE,CITY: AREA CODE: NUMBER: AL, Anniston 205 236-9711 AL, Birmingham 205 328-2310 AL, Decatur 205 355-0206 AL, Dothan 205 793-5034 AL, Florence 205 767-7960 AL, Huntsville 205 539-2281 AL, Mobile 205 432-1680 AL, Montgomery 205 269-0090 AL, Tuscaloosa 205 752-1472 AZ, Phoenix 602 254-0244 AZ, Tucson 602 747-0107 AR, Ft.Smith 501 782-2852 AR, Little Rock 501 327-4616 CA, Bakersfield 805 327-8146 CA, Chico 916 894-6882 CA, Colton
    0 Topics
    0 Posts
  • 5000+ tutorials


    Create Bootable XP SP integrated CD,Create One-click Shutdown And Reboot Shortcuts.txt Creating a Board aka Forum on your own PC !.rtf Creating Universal Ghost Usb Boot Disk And Cd.txt Data Capacity of CDs [Tutorial].txt ,Debug, Learn how crack windows.txt,Delete An undeletable File.txt,Delete Files From The Recent File List In Windows.txt,Digital Camera Guide.txt Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt 2.20 kB Digital Photo Id Cards, Greate Info.txt 2.88 kB Direct Link To Any Page You Want To In Hotmail.txt 1.95 kB Directx Explained.txt 7.66 kB Disable Compression On Xp, NTFS partition, Disk Cleanup.txt 0.43 kB Disable The Send Error Report, to Microsoft.txt 0.51 kB Disable Windows Logo Key.txt 0.62 kB Discover New Music You'll Probably Love.txt 1.08 kB Download Free Music legally,, legally.txt 3.24 kB Download from a paypal site without paying a penny!.txt 0.95 kB Download From Ftpz, Using Ftp Search Sitez.txt 8.12 kB Download Mp3's Without Using Filesharing.txt 0.69 kB Download Music And Video With ,edia Player9, quick and easy!.txt 0.66 kB Download Timeframes.txt 0.33 kB 1.39 kB Dual Boot After The Fact.txt 1.37 kB Dvd Copying-ripping Definitions.txt 1.25 kB DVD Regions Information.txt 3.84 kB Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt 0.94 kB Easily Disconnect-reconnect From Broadband.txt 0.30 kB Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt 1.40 kB Ebay Hackcracktip.txt 0.50 kB General Keyboard Shortcuts.txt 7.54 kB Get In Windows 2000 As Administrator.txt 0.39 kB Get the Most Out of Your DVD Recorder.txt 11.25 kB Get The Music You Want To Hear.txt 0.90 kB Get unlimited bandwidth from your host for free.txt 2.88 kB Getting A 1gb Yahoo China Account.txt 0.98 kB Getting Counter-strike Source To Work.txt 3.36 kB getting movies, mp3,games using google.txt 0.75 kB Getting older programs to run on Windows XP.txt 2.96 kB Getting started with Linux for nOObs!.txt 17.37 kB Go to Windows updates anonymously.txt 0.40 kB Google Crack Search.txt 0.14 kB Google secrets.txt 0.98 kB Google Tips & Tricks, (utilizing search engine).txt 5.81 kB Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt 2.45 kB Guide For Getting Free Stuff.txt 10.33 kB Guide to IIS Exploitation.txt 27.77 kB Guide to Slipstreaming Service Pack 2.txt 2.82 kB Hard drive Gone Bad.txt 5.55 kB Hardware Firewall.txt 3.02 kB How To Add An Option To Print, the Contents of a Folder!.txt 1.47 kB How To Add Your Own Windows Tips.txt 0.48 kB How to Back Up the Registry.txt 0.76 kB How To Backup Ps2 Games.txt 7.71 kB HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt 1.51 kB How To Block Websties Without Software, block websites.txt 0.64 kB How To Boot Xp Faster (updated).txt 1.66 kB How to build a black box.txt 7.79 kB how to burn quicker in windows xp.txt 0.28 kB How to Bypass BIOS Passwords.txt 9.05 kB How To Bypass Web Filters, tutorial.txt 6.20 kB HOW TO CAPTURE STREAMING MEDIA.txt 1.68 kB How To Change A Cmos Battery.txt 3.18 kB How to change the serial number used in Windows XP, Valid for XP Corporate.txt 1.11 kB How To Change Thumbnail Size And Quality.txt 0.90 kB How to clear Bios info 2.txt 23.55 kB How to clear Bios info.txt 11.75 kB How To Convert File System, fat - fat32 to ntfs.txt 0.52 kB How To Copy A Dvd Which Will Play On A X Box.txt 1.01 kB How to copy songs from your iPod to your PC.txt 1.40 kB How To Customise Your start Button.txt 1.54 kB How To Delete Those Persistent Nasty Files.txt 0.53 kB How To Directly Go To Inbox, Write Msg, w Hotmail, no need for How to find MP3's real quickly.txt 0.35 kB How To Find Serial Numbers On Google.txt 0.79 kB How to fix corrupted files in XP.txt 1.48 kB How to fix Windows Installer problem.txt 0.96 kB How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB How to Get someones ISP password, Get free internet.txt 2.65 kB How To Get Top Ranking, Search Engines.txt 6.58 kB How To Hack Windows Xp Admin Passwords.txt 2.52 kB How to hack-change your Windows XP Boot Screen.txt 1.52 kB how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB How To Make An Animted Logo.txt 5.26 kB How To Make Free Phone Calls.txt 2.29 kB How to make key generators.txt 8.83 kB How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB How To Make XP Go Faster.txt 5.58 kB How To make your own Radio Station 2.txt 3.26 kB How To Make Your Own Radio Station.txt 1.58 kB How to Remove DRM Protection for Video Files.txt 2.29 kB How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB How To Remove Signin Details Of Msn Passport.txt 1.04 kB How To Remove The Default Admin$ Shares.txt 1.03 kB How to remove the Links folder in IE Favorites.txt 0.59 kB How to Remove WinXP Splash and See Operations.txt 1.19 kB How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB How to Rename File Extensions.txt 3.11 kB How To Rename Multiple Files In Winxp.txt 0.56 kB How To Restrict Login Hours Allowed.txt 0.58 kB How to safeguard your files when computer crashes.txt 2.94 kB How to save Windows xp updates.txt 0.63 kB how to search google for RAPIDSHARE links.txt 0.98 kB How To See Hidden Files, Using Dos.txt 0.08 kB How To Set search For All Files In Winxp.txt 0.71 kB How to set up a http server running from you computer.txt 3.06 kB How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB How To Set Up Direct Connect.txt 26.96 kB HOW TO SET UP FTP SERVER.txt 1.79 kB How To Set Up Proxies In Your Browser.txt 1.63 kB How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB How To Speed Up A Slow Computer.txt 1.21 kB How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB How To Stop Spam.txt 8.05 kB How to swear in all languages.txt 28.32 kB How To Unload Cached Dll Files To Free Memory.txt 0.56 kB How to Use and How to Chain Multiple Proxies!.txt 9.70 kB How To Use File Compression In Windows Xp.txt 4.19 kB How To Use Google To Download Mp3's, and applications.....txt 0.60 kB How To Use Newsgroups.txt 0.56 kB How To Use You Gmail With Msn Messenger.txt 0.37 kB How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB Important Faqs For Sp2.txt 9.47 kB Improve Doom 3's Performances!!, simple but efficient trick for every1.txt 4.22 kB Improve your dialup modem preformance.txt 0.73 kB Increase XP Folder Settings.txt 0.79 kB Insert Your Serial For Office 2k, auto install office.txt 1.06 kB Install A New Hard-disk.txt 5.16 kB Install Xp From Dos.txt 0.84 kB Installing Apache on Windows.txt 6.29 kB Installing Gentoo Linux, Amazing step by step tutoria.txt 0.19 kB Installing IIS On Windows Xp Pro.txt 3.04 kB Installing Slackware Linux.txt 34.73 kB Instructions For Removal Of Advertising In Msn Messenger.txt 2.59 kB Ip Address Structure, Expilinatin OF IP Address {A short way}.txt 7.65 kB Irc How To Downlaod From, How to downlaod from IRC.txt 3.95 kB Irc Servers On nix, For people who want to start own IRC net.txt 0.48 kB Keep Files Private.txt 1.51 kB Keep Folders Hidden.txt 0.46 kB Keyboard Shortcuts Result in Excel 2000 - Movement.txt 1.57 kB Keyboard Shortcuts, Microsoft Word.txt 2.37 kB Keyboard Shortcuts, must read.txt 3.72 kB Kill Microsoft Instant Messenger.txt 0.28 kB Lamination Tips, Its a Fast TUT......txt 1.98 kB Leet Way To Get Your Ip In Windows Xp.txt 0.26 kB Linking Your Xbox To Your Computer.txt 33.52 kB Linux Howto's.txt 0.08 kB List Of Sites Not To Go To.txt 4.32 kB Little help for anonymous mailer.txt 1.56 kB Lots Of Windows Xp Tips, Take A Look !.txt 12.43 kB Lyrics With Google.txt 0.08 kB Make A Autorun File For Ur Cd.txt 0.66 kB Make A Batch File To Clean UR PC!!, All In One!!.txt 1.37 kB Make A Roughly 16 Hour Video Dvd.txt 1.01 kB Make Acrobat Reader 6 load faster.txt 0.42 kB Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt 7.41 kB Make Mp3 Files Smaller Without Losing Quality.txt 0.73 kB Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt 3.00 kB Make Your Pc Faster, Guaranteed.txt 6.23 kB MakeXPgoFaster.txt 5.74 kB making a .cue file, in notepad.txt 0.53 kB Making A .txt Executable Server.txt 1.60 kB Making Bootable Floppy Disk to Boot into Windows.txt 4.82 kB Making Cd Version Of Doom3 Into Dvd Version.txt 0.75 kB Making Web Page Fonts Consistent and Uniform.txt 0.80 kB Manage Saved Ie Passwords.txt 0.75 kB Mastering The Windows XP Registry.txt 5.79 kB Maximize Dial-up Modem Settings.txt 2.31 kB Microsoft's Really Hidden Files, Reveled Hidden files.txt 33.95 kB mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt 4.37 kB mIRCcommands.txt 10.10 kB Misc Linux Tips & Tricks.txt 18.55 kB Missing Administrator Account.txt 0.52 kB Mobile Secret Codes.txt 31.09 kB Modify .exe Files And Crack A Program.txt 3.06 kB More Hacking/A beginners guide to Hacking UNIX.txt 5.61 kB More Hacking/A Cracking Tutorial/C101-90.000 3.85 kB More Hacking/A Cracking Tutorial/C101-90.001 32.32 kB More Hacking/A Cracking Tutorial/C101-90.002 30.93 kB More Hacking/A Cracking Tutorial/C101-90.003 14.75 kB More Hacking/A Cracking Tutorial/C101-90.004 54.91 kB More Hacking/A Cracking Tutorial/ED!SON.NFO 1.58 kB More Hacking/A Guide to Internet Security- Becoming an Uebercracker.txt 8.56 kB More Hacking/A Guide to the Easiest Hacking there is.txt 4.58 kB More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands.htm 23.03 kB More Hacking/A Small Guide to Hacking HOTMAIL.txt 3.02 kB More Hacking/A UNIX Hacking Tutorial.txt 82.20 kB More Hacking/Almost Everything You Ever Wanted To Know About Security (but.txt 47.52 kB More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt 40.84 kB More Hacking/An Introduction to Denial of Service.txt 44.78 kB More Hacking/An Introduction to the Computer Underground.txt 17.03 kB More Hacking/Basic Networking.txt 14.04 kB More Hacking/BBS Crashing Techniques.txt 3.72 kB More Hacking/BRUTE- A brute force approach to hacking Unix passwords.txt 3.31 kB More Hacking/Closing the Net.txt 30.69 kB More Hacking/Compression and Cracks for Dummies.txt 52.75 kB More Hacking/Computer Bulliten Boards and the Law.txt 56.06 kB More Hacking/Computer Chrime - Current Practices, Problems and Proposed So.txt 96.53 kB More Hacking/Computer eMail and Privacy.txt 19.18 kB More Hacking/Computer Hackers News Articles.txt 5.89 kB More Hacking/Computer Rights vs First and Forth Amentment Right.txt 44.24 kB More Hacking/Computer Security.txt 63.52 kB More Hacking/Computer Security_2.txt 51.94 kB More Hacking/Computer Viruii.txt 19.98 kB More Hacking/Computerized Governmental Database Systems Containing Persona.txt 40.34 kB More Hacking/COPS and Robbers-Unix System Security.txt 35.18 kB More Hacking/Copyright Guides for Photographers.txt 17.02 kB More Hacking/Crash Course in X Windows Security.txt 12.45 kB More Hacking/Crime and Puzzlement.txt 62.34 kB More Hacking/Cultural Formations in Text-Based Virtual Realties.txt 257.27 kB More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion.txt 20.53 kB More Hacking/Dark Angel's Phunky Virus Writing Guide .txt 18.90 kB More Hacking/Defamation Liability of Computerized Bulliten Board Operators.txt 101.36 kB More Hacking/Dept of Treasury Letter.txt 11.25 kB More Hacking/Electronic Bulliten Boards and 'Public Goods' Explainations o.txt 45.84 kB More Hacking/Electropolos - Communication and Comunity on IRC.txt 112.45 kB More Hacking/Ethload User's Guide.txt 81.28 kB More Hacking/Formulating A Company Policy on Access to and Use and Disclos.txt 12.14 kB More Hacking/Free Speech in Cyberspace.txt 244.25 kB More Hacking/Gender Issues in Online Communications.txt 24.86 kB More Hacking/Government Computer Security Techniques.txt 7.88 kB More Hacking/HACKDICT.TXT 272.00 kB More Hacking/Hacker Test.txt 20.84 kB More Hacking/Hackers A-Z.TXT 256.00 kB More Hacking/Hackers Who Break into Computer Systems.txt 57.40 kB More Hacking/Hacking Bank Of America's Home Banking System.txt 5.79 kB More Hacking/Hacking Compuserve Infomation Service.txt 7.43 kB More Hacking/Hacking Faq.txt 42.06 kB More Hacking/Hacking GTE Telemail.txt 19.12 kB More Hacking/Hacking IRC - The Definitive Guide.txt 13.72 kB More Hacking/Hacking PC-Pursuit Codes.txt 8.10 kB More Hacking/Hacking Techniques.txt 8.52 kB More Hacking/Hacking TRW.txt 2.58 kB More Hacking/Hacking TYMNET.txt 5.79 kB More Hacking/Hacking Unix System V's.txt 10.93 kB More Hacking/Hacking Wal-Mart Computers.txt 4.09 kB More Hacking/Hacking Webpages.txt 3.90 kB More Hacking/How the Traditional Media Clasifications Fail to Protect in t.txt 40.50 kB More Hacking/How to crash AOL.txt 4.75 kB More Hacking/How to dial out of a UNIX System.txt 3.49 kB More Hacking/How to find Security Holes.txt 15.99 kB More Hacking/How to get a Shell in 24 hours.txt 7.98 kB More Hacking/How to Hack UNIX System V.txt 10.93 kB More Hacking/How to login to a C.B.I. System.txt 3.00 kB More Hacking/How to send ICQ Bombs.txt 2.33 kB More Hacking/Information of Hacking AngelFire Websites.txt 3.21 kB More Hacking/Introduction to Denail of Service.txt 44.78 kB More Hacking/IP addressing, and gaining IP's.txt 13.70 kB More Hacking/IP Addressing.txt 13.70 kB More Hacking/ISSN Numbers- An Introduction.txt 5.96 kB More Hacking/Junk Mail- How Did They All Get My Address.txt 12.70 kB More Hacking/LENROS~1.TXT 184.58 kB More Hacking/LENROS~2.TXT 7.41 kB More Hacking/MEMETICS.TXT 45.79 kB More Hacking/MINDVOX.TXT 64.57 kB More Hacking/MORRIS~1.TXT 31.18 kB More Hacking/NEIDOR~1.TXT 41.02 kB More Hacking/NFS Tracing.txt 34.20 kB More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt 20.86 kB More Hacking/NY_2'S Guide to Obtaining An IP Address. .doc 10.50 kB More Hacking/Organizational Analysis in Computer Science.txt 65.00 kB More Hacking/PGP Startup Guide.htm 26.00 kB More Hacking/Presumed Guilty.txt 153.76 kB More Hacking/Raising Hell with Unix.txt 12.91 kB More Hacking/Remarks of the President and Vice President to Silicon Valley.txt 37.70 kB More Hacking/RIGGSB~1.TXT 54.03 kB More Hacking/RIGGS_~1.TXT 54.03 kB More Hacking/RIGHTS~1.TXT 7.99 kB More Hacking/RIVERA.TXT 26.43 kB More Hacking/Security holes.txt 11.77 kB More Hacking/Seisure Warrent Documents for Ripco BBS.txt 72.01 kB More Hacking/Site Security Handbook.txt 247.43 kB More Hacking/SJ-DEC~1.TXT 45.03 kB More Hacking/SJ-RESP.TXT 69.59 kB More Hacking/SMTP-Simple Mail Transfer Protocol.txt 117.61 kB More Hacking/Summary of FBI Computer Systems.txt 5.07 kB More Hacking/SUNDEVIL.TXT 100.17 kB More Hacking/SUPREM~1.TXT 56.70 kB More Hacking/TCP packet fragment attacks against firewalls and filters.txt 4.39 kB More Hacking/Telenet-The Secret Exposed.txt 9.91 kB More Hacking/The Basics of Hacking- Introduction.txt 24.82 kB More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt 85.17 kB More Hacking/The Constitution in Cyberspace.txt 46.60 kB More Hacking/The Cracking Manual.txt 86.38 kB More Hacking/The Electronic Communication Privacy Act of 1986 - A Laymans .txt 10.04 kB More Hacking/The Greatest Hacker of all time.ASC 25.02 kB More Hacking/The Hacker's League.txt 12.37 kB More Hacking/The Inner Circle Book's Hacking Techniques.txt 1.96 kB More Hacking/The Lamahs-Guide to Pirating Software on the Internet.txt 12.21 kB More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB More Hacking/The National Information Infrastructure-Agenda for Action.txt 96.49 kB More Hacking/The Newbies Handbook- ' How to beging in the World of Hacking.txt 43.83 kB More Hacking/The Newbies-User's Guide to Hacking.txt 47.35 kB More Hacking/The Pre-History of Cyberspace.txt 60.25 kB More Hacking/The Price of Copyright Violation.txt 73.11 kB More Hacking/The REAL way to hack RemoteAccess.txt 12.12 kB More Hacking/The Secret Service, UUCP,and The Legion of Doom.txt 19.63 kB More Hacking/the UNIX operating system (Berkley 4.2).txt 13.55 kB More Hacking/Theft of Computer Software-A National Security Threat.txt 12.22 kB More Hacking/Thoughts on the National Research and Education Network.txt
    0 Topics
    0 Posts
  • 4 methos to make your server of rat undetectable to av


    In this tutorial I will be showing you 4 ways of how to make a Trojan undetectable to Anti-Virus software. I am sure there are more then 4, but these should help get you started. 1. Encryptors/Compressors: You would think this should be the easiest way to UD (Undetect) a Trojan...but alas, it is not. The problem is simply this, most people use the same Trojans and Packers so often that Anti-Virus software knows pretty much all the signatures. They either use Ardamax Keylogger, Optix Pro, Beast, ProRat etc. for Trojans. For Packers they use UPX, PECompress, AsPack, Mophine etc. Again, none of these combinations work because all the signatures have been flagged. The best way this option will work is to find lesser known Packers and Trojans to work with. Try a Google search for Executable Packers. Get a few that you have not heard of before or that have a decent rating. If it is not freeware, I am sure there will be a Crack for it. For Trojans, three good resources are VXChaos, LeetUpload or VX Heaven. Remember to pick the ones that are not well known and try to mix and match those Trojans and Packers. 2. Byte Adders: This technique allows you to add junk bytes to your Trojan as to confuse Anti-Virus software. It does this by moving the code around inside the executable as the bytes are being added. This means that the signature will not be in the place the Anti-Virus expects it to be. A good tool for this would be StealthTools v2.0 by Gobo. 3. Hex Editing: This is much more complicated and takes a lot more practice to get right. The idea here is to find the signature that Anti-Virus software has flagged inside of your Trojan and change it by adding a different byte, or changing the Offset to one of its other equivalents. The three things you will need here is a File Splitter, Hex Editor and a Anti-Virus Offset Finder. The File Splitter will cut your executable into smaller files (preferably 1 byte per file). You then use your Hex Editor on the file that holds the signature and change that signature. Or, you can keep the file complete and use your AV Offset Finder to find the Offsets automatically and just change the signatures found with your Hex Editor. Step One: Place your Trojan Server in a folder. Step Two: Split your Server with your File Splitter into 1 byte per file. This may make a lot of files in your folder (depending on how large the Server is), but it is worth it because you will know that only one or two of those files has the signature that is flagged and all the rest are clean. Step Three: Scan your folder with your Anti-Virus software and make note of which files it says are infected. Those will be the ones you edit. Step Four: Open up each infected file with your Hex Editor and change the Offset. There is no fool proof way of doing this, you will have to experiment. Since this will be a 1 byte file, there will not be much you need to change. Just change one character or byte at a time and then save your progress. Re-scan to see if it worked. If it did not, go back and try again. Step Five: Once you feel that you have found all signatures and changed them, Rejoin your files with your File Splitter and test your Server to see if it works. Remember that too much Editing will make your Server useless so be careful. (Optional) Step Six: Another good way is to use a Anti-Virus Offset Finder that will find the correct Offset automatically so you do not have to search for them or split your Server. Get AV Devil 2.1 to find the Offsets (password is: to0l-base). You have to remember that different AV software use different signatures, so scan with as many as you can. 4. Source: The very best way to make an undetectable Trojan has always been to make your own. I know it may seem like a daunting task to do, but it could be simpler then you think. Here I will give a few options on how to do this. The reason why you would want to make your own Trojan is the fact that each time it is compiled, it is given a new signature. Changing just a single string in the Source code can make it undetectable. Option 1: Free Trojan Source Code. Finding free Trojan source code is not hard. Again, going to places like VXChaos or Planet Source Code can yield a plethora of really good and lesser known Trojan code. Pick what Programming Language you like and look for examples. Not much needs to be changed to makes these undetectable. A simple recompile will sometimes do the trick. Option 2: Decompiling. Some may call this "Stealing" source code. I like to call it "Borrowing". The first thing you need to know is what language your Trojan is in. Lets say your Trojan was Optix Pro, your programming language would be Delphi. A good Delphi Decompiler would be DeDe. Decompile Optix Pro with DeDe then recompile it with a Delphi compiler and viola! Just change a few strings around within the source and you should have a undetectable Optix Pro. Another way would be to open your Trojan with a Debugger or Disassembler. Copy down the ASM code and then recompile it in a ASM compiler. That maybe a bit more tricky, but the idea is the same. Try to convert the executable into pure ASM as best you can. There are many free Debuggers/Disassemblers, Google for them. A word of warning, if you do find your own way of making a Trojan undetectable, DO NOT disclose it. You will find your Trojan detected in a very short amount of time. What I have taught here are just the basics of Trojan UDing. It will be up to you to use this knowledge and make it work. Also, DO NOT use any online virus scans to see if your Trojan has been detected. Your signature will be captured and sent to AV companies. Well I hope this tutorial helped you out in some small way. Just one of the examples above could make an undetectable Trojan, or you may need to mix and match them. Try what you can, don't be afraid to experiment, and good luck! VXChaos: http://vxchaos.official.ws/ LeetUpload: http://www.leetupload.com
    0 Topics
    0 Posts
  • 500+ hacking tutorials


    DataVault, Irc Warez (Ty 4 Moving X).txt -[ How to rip Dynamic Flash Template ]-.txt 10 reasons why PCs crash U must Know.txt 10 Security Enhancements.txt 16x Dvd+-rw Dl Dvd Writer Comparison Guide.txt 20 Great Google Secrets.txt 23 Ways To Speed WinXP, Not only Defrag.txt 250+ Tech books online.txt 2600 Hertz Single Tone Generator Schematic.txt 36 Graphics & Design Ebooks.txt 8 People Can Use The Same Msn Dial Up Account.txt A Basic Guide to the Internet.txt A Basic UNIX Overview.rtf A BEGINNERS GUIDE TO Hacking Unix.txt A Cracking Tutorial A Guide to Internet Security- Becoming an Uebercracker.txt A Guide to the Easiest Hacking there is.txt A List of every TeleNet code that there is.txt A List Of Government BBS Numbers.txt A List Of Some OF The Most Useful UNIX Hacking Commands.htm A Novice's Guide to Hacking 2004.txt A Novice's Guide To Hacking.txt A Short HACKER SPEAK Glossary.txt A simple TCP spoofing attack.txt A Small Guide to Hacking HOTMAIL.txt A UNIX Hacking Tutorial.txt A very small tut for RealMedia.txt A Web Standards Checklist, How to make a proper website.txt Accessing the bindery files directly.txt Accessing The Entire Internet On Your 3 Phone, U8110, E616 etc..txt Advanced Shellcoding Techniques.txt All about ftp must read.txt All About Movie Tags (what Is A Dvdrip, Cam Etc.).txt ALL About Spyware.txt All mIRC Commands.txt Almost Everything You Ever Wanted To Know About Security (but.txt An Architectural Overview of UNIX Network Security.htm An Extensive Guide to Bell System Man Holes.txt An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt An Introduction into TeleScan.txt An Introduction to Denial of Service.txt An Introduction to the Computer Underground.txt An Introductory Guide To TeleNet Commands.txt Anarchist Cookbook 2004 Anonymity complete GUIDE.rtf Anonymity of Proxy, Anonymity Of Proxy learn it insideout.txt Anonymity.txt ANONYMOUS emails.txt Anonymous FTP FAQ.htm ANSIBombs II Tips And Techniques.txt anti leech hacking tutorial.txt Area Codes and Time Zones.txt attacks on networks how to stop.htm Auto End Tasks to Enable a Proper Shutdown, Win XP Tweak.txt Automatic Windows Installation, No keypress required!.txt B.A. regedit.txt Backdoor.txt Backdoors.txt Backtracking EMAIL Messages.txt Bandwidth Explained!.txt Basic Networking.txt BBS CRASHING TECHNIQUES.txt Becoming A Phreaker - The Quick n' Easy Way.txt Beep Code Manual.txt Beep Codes Error Codes.txt Bell Hell Volume #1.txt Bell Hell Volume #2.txt Best Keyboard Shortcuts.txt Big Brother And Ndisuio.sys, A new Internet phenomenon.txt Bin & Cue Simple Tut.txt BIOS Update Procedure.txt Bit Torrent Tutorials.txt Block Adservers.txt Boot Block Recovery For Free.txt Boot Winxp Fast.txt Border And Text Effects In Psp8, For use with PSP8.txt Breaker B0X.txt Broken Ie, How to fix it.txt BRUTE- A brute force approach to hacking Unix passwords.txt Bulk Editing Of .xxx to .zip or .mp3.txt BulletProof FTP Server Tutorial.txt Burn .bin file Without A .cue file.txt Burn a BIN without a CUE using NERO.txt Burning Bin & Cue Using Nero.txt Bust Avoidance For Dipshits.txt busybox.txt Bypass Internet Censorship.txt Calculating Offsets.txt cannot use my password to get back into Windows XP.txt Cant See Secure Sites.txt Caught A Virus.txt Cellular Listening with a TV .txt Cellular Telephone Phreaking Phile Series VOL 1.txt Change Music In The Malibu And The Pole Position, GTA Vice Modders.txt Change Text on XP Start Button.rtf Change Text on XP Start Button.txt Change The Default Location For Installing Apps.txt Change The Storage Location Of 'my Documents', a bit safer for when your PC crashes....txt Change Your Ip In Less Then 1 Minute.txt Changing Default Location For Installing Apps.txt Check For Dos, Check to see if you are infected..txt Choosing A Good Domain Name, ya..good name is important!.txt Choosing An Internet Merchant Account, nice info on Internet Merchant Account...txt Clear Unwanted Items From Add And Remove.txt Closing Open Holes, System Security How to close open holes.txt Closing the Net.txt CMD Prompt here, add to folder context menu windows xp.txt COMMON FTP ERROR CODES.txt Compression and Cracks for Dummies.txt Computer Acronyms.txt Computer Bulliten Boards and the Law.txt Computer Chrime - Current Practices, Problems and Proposed So.txt Computer eMail and Privacy.txt Computer Hackers News Articles.txt Computer Matinence.txt Computer Rights vs First and Forth Amentment Right.txt Computer Security.txt Computer Security_2.txt Computer Viruii.txt Computerized Governmental Database Systems Containing Persona.txt Configuring ZoneAlarm Pro Security Settings, A ZoneAlarm Pro Tutorial.txt connect A Psx Pad To Pc, Warning soldering is involved...txt Convert Stubborn Webpage To pdf.txt Convert To Basic And Dynamic Disks In Windows Xp.txt Converting Movies To Psp Format.txt Converting to NTFS.txt COPS and Robbers-Unix System Security.txt COPY X BOX GAMES!.txt Copyright Guides for Photographers.txt Cracking Bios, use the followin' code.txt Cracking Zip Password Files.txt Crap Software Config Settings, How to set-up the firewall.txt Crash Course in X Windows Security.txt Create A Huge File.txt Create A Personal Screen Saver In Win Xp!.txt Create An Ftp Server On Your Pc With Serv-u.txt Create Bootable Win XP SP1 CD(nero).txt Create Bootable XP SP integrated CD.txt Create One-click Shutdown And Reboot Shortcuts.txt Creating a Board aka Forum on your own PC !.rtf Creating Universal Ghost Usb Boot Disk And Cd.txt Crime and Puzzlement.txt Cultural Formations in Text-Based Virtual Realties.txt Cyberspace and the Legal Matrix- Laws or Confusion.txt Dark Angel's Phunky Virus Writing Guide .txt Data Capacity of CDs [Tutorial].txt Debug, Learn how crack windows.txt Defamation Liability of Computerized Bulliten Board Operators.txt Delete An undeletable File.txt Delete Files From The Recent File List In Windows.txt Dept of Treasury Letter.txt Digital Camera Guide.txt Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt Digital Photo Id Cards, Greate Info.txt Direct Link To Any Page You Want To In Hotmail.txt Directx Explained.txt Disable Compression On Xp, NTFS partition, Disk Cleanup.txt Disable The Send Error Report, to Microsoft.txt Disable Windows Logo Key.txt Discover New Music You'll Probably Love.txt Do You Want To Learn Maya 6, look, some tutorials.txt Doom 3 Speed Up, Guaranteed 40% better.txt Doom3 Simple Tweeks, how to run doom with tweeks.txt Dos User - No Boot Dos Disk, No Edit.com,How to create Imp Files.txt Download Free Music legally,, legally.txt Download from a paypal site without paying a penny!.txt Download From Ftpz, Using Ftp Search Sitez.txt Download Mp3's Without Using Filesharing.txt Download Music And Video With ,edia Player9, quick and easy!.txt Download Timeframes.txt Downloading Files, Using Archives And Images.txt Downloading Windows Media Streams.txt Drake's Phreaking Tutorial.txt Dreamweaver Tut That Teaches U, to search a database with phpmysql.txt Driverguide.com.txt Dual Boot After The Fact.txt Dvd Copying-ripping Definitions.txt DVD Regions Information.txt Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt Easily Disconnect-reconnect From Broadband.txt Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt Ebay Hackcracktip.txt Electronic Bulliten Boards and 'Public Goods' Explainations o.txt Electropolos - Communication and Comunity on IRC.txt Eliminate Ie's Autocomplete Reminder.txt Email Forge, sends email from anyone.txt Enable Folder and Icon Refresh, Win XP Tweak.txt Erasing_Your_Presence_From_System_Logs.txt Ethload User's Guide.txt Evolution Of Computer Viruses History Of Viruses.txt Excellent tricks and techniques of Google Hacks.txt Exploseek, a simple tool to find music on the net.txt Find Stuff.txt Finding Missing Files From A Release.txt Firefox Speed Tweaks.txt Firefox Tweaks.txt Firewall Protection how to.rtf FlashFXP FAQ.txt Flashget Broadband Tweak.txt FLASHGET INTEGRATION IN OPERA,MOZILLA,NETSCAPE.txt FlashGet v1.4 - More Download Simultaneously.txt Flashing A Video Card Bios [advanced Guide], Step-by-Step Guide for Novice and Expert.txt Formatting An Hdd, when fdisk won't.txt Formulating A Company Policy on Access to and Use and Disclos.txt Free Access To Websites Without Registering.txt FREE Hosting For WAREZ.txt FREE Hosting List php, mysql and more.txt Free Speech in Cyberspace.txt Free World Dialup.txt Free X-box Live !.txt Freebsd Install Guide.txt Gender Issues in Online Communications.txt General Keyboard Shortcuts, General Keyboard Shortcuts.txt Get In Windows 2000 As Administrator.txt Get the Most Out of Your DVD Recorder.txt Get The Music You Want To Hear.txt Get unlimited bandwidth from your host for free.txt Getting A 1gb Yahoo China Account.txt Getting Counter-strike Source To Work.txt getting movies, mp3,games using google.txt Getting older programs to run on Windows XP.txt Getting started with Linux for nOObs!.txt Go to Windows updates anonymously.txt Google Crack Search.txt Google secrets.txt Google Tips & Tricks, (utilizing search engine).txt Government Computer Security Techniques.txt Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt Guide For Getting Free Stuff.txt Guide to Hacking with sub7.doc Guide to IIS Exploitation.txt Guide to Slipstreaming Service Pack 2.txt HACKDICT.TXT Hacker Test.txt Hackers A-Z.TXT Hackers Who Break into Computer Systems.txt hacking and phreaking.doc Hacking Bank Of America's Home Banking System.txt Hacking Compuserve Infomation Service.txt Hacking Faq.txt Hacking for Dummies Volume 2.doc Hacking For Newbies.doc Hacking GTE Telemail.txt hacking in telnet http://ftp.rtf Hacking IRC - The Definitive Guide.txt hacking on Telnet explained.doc hacking on XP part 1.doc hacking on XP part 2.doc hacking on XP part 3.doc hacking on XP part 4.doc hacking on XP part 5.doc hacking password protected site.doc Hacking Password Protected Website's.doc hacking passwords.doc Hacking PC-Pursuit Codes.txt Hacking Techniques.txt Hacking TRW.txt Hacking TYMNET.txt Hacking Unix System V's.txt Hacking VoiceMail Systems.txt Hacking Wal-Mart Computers.txt Hacking Webpages.txt Hard drive Gone Bad.txt Hardware Firewall.txt Have Notepad In Send To.txt have satallite tv for almost free IF not free!!!.txt Hex, How to turn binary or decimal to hex.txt Hide Drives and Partitions.txt How 2 Find EVERYTHING uploaded on Rapidshare.txt How BT phone cards works.txt How do I overburn a CD with Nero.txt How do I remove an extra operating system from by.txt How do I Test My VirusScan Installation.txt How Do U See Hidden Files, Using DOS...txt How Download MP3s from Fanscape.com or other Streaming Audio-Video.txt How Linux boots.txt How Long Has Your XP System Been Running.txt How Phone Phreaks are Caught.txt How the Traditional Media Clasifications Fail to Protect in t.txt How To Access Your Folders From Your Taskbar.txt How To Add A Url Address Bar To The Taskbar.txt How To Add An Option To Print, the Contents of a Folder!.txt How To Add Your Own Windows Tips.txt How to Back Up the Registry.txt How To Backup Ps2 Games.txt How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt How To Block Websties Without Software, block websites.txt How To Boot Xp Faster (updated).txt How to build a black box.txt how to burn quicker in windows xp.txt How to Bypass BIOS Passwords.txt How To Bypass Web Filters, tutorial.txt HOW TO CAPTURE STREAMING MEDIA.txt How To Change A Cmos Battery.txt How to change the serial number used in Windows XP, Valid for XP Corporate.txt How To Change Thumbnail Size And Quality.txt How to clear Bios info 2.txt How to clear Bios info.txt How To Convert File System, fat - fat32 to ntfs.txt How To Copy A Dvd Which Will Play On A X Box.txt How to copy songs from your iPod to your PC.txt How to crash AOL.txt How To Customise Your start Button.txt How To Delete Those Persistent Nasty Files.txt How to dial out of a UNIX System.txt How To Directly Go To Inbox, Write Msg, w Hotmail, no need for hotmail today - http users.txt How To Disable Picture And Fax Viewer.txt How to do a high Quality DivX rip.txt How To Download Bittorrent Files.txt How To Download Directly From Crackdb.com.txt How To Download Movies, From IRC.txt How to Download-Upload Files from email.txt how to edit right click menu.rtf how to execute chm files in linux.txt How to Extend the life of the yousendit download links.txt How to find a remote IP.txt How To Find Ftp's The Easy Way'.txt How to find MP3's real quickly.txt How to find Security Holes.txt How To Find Serial Numbers On Google.txt How to fix corrupted files in XP.txt How to fix Windows Installer problem.txt How To Get A Free I-pod Or Flat Screen Tv, check it out.txt How to get a Shell in 24 hours.txt HOW TO GET ANY WINDOWS PASSWORD.txt How to Get someones ISP password, Get free internet.txt How To Get Top Ranking, Search Engines.txt How to Hack UNIX System V.txt How To Hack Windows Xp Admin Passwords.txt How to hack-change your Windows XP Boot Screen.txt how To Hide Yourself From Network Users!, And give access to only specific users!.txt How To Increase Download Speeds By 100-200 Kbsec.txt How to Install and run Windows CE on your USB Stick.txt How to learn to hack in easy steps.doc How to login to a C.B.I. System.txt How To Make 5cds, 10cds Or 2dvds From Official Dow, These are same as Mandrake PowerPack+.txt How to make a Free Phone Call.txt How To Make A Kvcd.txt how to make a new web site.txt How To Make A Transparent Background, .fla .swf.txt how to make a VCD from a DivX.txt How To Make An Animted Logo.txt How To Make Free Phone Calls.txt How to make key generators.txt How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt How To Make XP Go Faster.txt How To make your own Radio Station 2.txt How To Make Your Own Radio Station.txt How To Make Your Own Radiostation.txt HOW TO MANUAL - THE END OF DELETERS.txt How to modify exe files.txt How To Move Xp Harddrive To New Motherboard.txt How To optimize DSL-CABLE connection speed.txt How To Play Movies (divx Etc) With Subs.txt How to Put an End to Unwanted or Harassing Phone Calls.HAR How to recover MOST of scratched CD data discs.txt How to Remove DRM Protection for Video Files.txt How To Remove Ms Java Vm And Install Sun Java.txt How To Remove Signin Details Of Msn Passport.txt How To Remove The Default Admin$ Shares.txt How to remove the Links folder in IE Favorites.txt How to Remove WinXP Splash and See Operations.txt How To Rename Extensions With Ease, with a Renamer.bat file!.txt How to Rename File Extensions.txt How To Rename Multiple Files In Winxp.txt How To Restrict Login Hours Allowed.txt How to safeguard your files when computer crashes.txt How to save Windows xp updates.txt how to search google for RAPIDSHARE links.txt How To See Hidden Files, Using Dos.txt How to send ICQ Bombs.txt How To Set search For All Files In Winxp.txt How to set up a http server running from you computer.txt How To Set Up A Proxy In Flashget, As Requested.txt How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt How To Set Up Direct Connect.txt HOW TO SET UP FTP SERVER.txt How To Set Up Proxies In Your Browser.txt How To Set Zone Alarm Settings!, Fix for ZA ports.txt How To Setup Your Own Dns (Domain Name Server).txt How To Speed Up A Slow Computer.txt How To Speed Up Http Requests On Internet Explorer, as above.txt How To Stop Spam.txt How to swear in all languages.txt How To Unload Cached Dll Files To Free Memory.txt How to Use and How to Chain Multiple Proxies!.txt How To Use File Compression In Windows Xp.txt How To Use Google To Download Mp3's, and applications.....txt How To Use Newsgroups.txt How to use the Web to look up information on hacking.doc How To Use You Gmail With Msn Messenger.txt How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt HOWTO Change Windows XP Home to Windows XP Pro.txt Important Faqs For Sp2.txt Improve Doom 3's Performances!!, simple but efficient trick for every1.txt Improve your dialup modem preformance.txt Increase XP Folder Settings.txt Information of Hacking AngelFire Websites.txt Insert Your Serial For Office 2k, auto install office.txt Install A New Hard-disk.txt Install Xp From Dos.txt Installing Apache on Wi
    0 Topics
    0 Posts
  • remote administration


    Hey guys, by request, I'm doing a rather long tut, of which I will keep secret of what it is until the part where it says keylogger. Ohh shit. Secrets out and I'm to lazy to push the backspace key. Alright, so as I get farther away from the word I will get closer to the subject. Today we are going to learn how asses the options we have, and from there we will decide what it best for us and then we will do eeettt. :) Ok so now, we have a target. What do we want, I guess I'll say we want his myspace password. Well now we have the goal. Let's make it happen m'kay? So now lets assess the options * Do I have physical access to this computer.(It's at your house or a friends) * Does this prick have an Instant Messenger service. * Does this person trust me, if not would it be hard to gain? * Do I really want to learn the art of keylogging? Ok so now we have those options assessed. Now say we have Physical access to the computer, I will only go briefly on this one because all of you little crazy 12 year old runescape addicts want to remotely send them. Physical Access Keylogging * CLICK HERE * Download * When you download set it up and make sure the file is somewhere you can remember * Every day check the log file and I'm sure you will get the password you want. * Finish reading my tut on keylogging you prick. Ok, so now for the fun part. Remote Keylogging * Numero uno (1) lol. Download THIS * Password is crazy-coderz.net * And now you have vicspy, now you go learn how to set up an FTP server. Its easy. I recommend http://www.0catch.com thats what I always use for FTP. Ohh and if you use FireFox (if you don't then please off yourself.) you can use FileZilla for a FTP client. * Now basically you just make the keylogger (self explanatory) * Bind using the binder that it comes with * Tell your friend on MSN or whatever, Hey look at this! and when he opens you have succesfully keylogged him. Now remember to set up your ftp before doing any of this, and when you set up your ftp, remember to put all of the stuff needed, as well as when you set up the keylogger. A little mistake could make it not work. We dont want that shit. Alright guys! Looks like you just learned how to keylog! I'm sorry if there is anything in there that you don't understand just pm me or add the msn down under. Rep+ me if you want I don't care I just felt like helping you guys out. Dueces Edit: please reply to this :) I want to see how I did. If you are unregistered and you are just lurkin around please for the love of god, register and tell me how I did. And if you go that far.. Go to the top and click upgrade and go hf 133t because you love Omni so much. Thanks.
    0 Topics
    0 Posts
  • spreading rat server,trojan or keylogger


    lright so for many people they get their trojan all figured out possibly test it but then become stump on how to distribute it. Now I will be providing a few methods for mass distribution as well as how to get a specific target. This is a proof of concept executing any of these actions is not what is intended with this tutorial and I will not be held responsible for your private actions. Mass Distribution Ok so you don't have one single target you just wanna fuck with as many people as possible. Here's some ideas. * Merge the server with another server put this up somewhere advertise for it. * Create an iso with autorun. Autorun Tutorial * Create some cd's with autorun and leave them in random places. Autorun Tutorial Single Target You have a single target. Whether it be a cheating ex or a friend that screwed you or just some asshole you want revenge. Here's some interesting ways to go about this. * Send a binded exe that does something they want it to do. If they don't trust you infect a friend and a friend's friend etc until you have someone's msn aim yahoo or email that you can send it through that they'll accept. * Once again create an autorun cd http://hackforums.net/showthread.php?tid=29756 give it to them have someone give it to them label it as their favorite band or maybe a movie they wanna see get creative. * This is by far my funniest idea. Buy one of those shitty ipods or mp3 players off ebay the ones that are broken. Send it to them with an "installation cd" with your trojan on it. Trust me they'll fall for it. As always get creative. If you like you can talk with me about some ideas. Hope this is useful. Ask questions as needed
    0 Topics
    0 Posts
  • hiding file into an image.jpg


    Set up: 1. Must have a .zip or .rar compressor. 2. Willingness to learn. Steps: 1. Save the picture of choice to your desktop. 2. Make a new .rar or .zip folder on your desktop. 3. Add the files you want to hide into the .zip or .rar 4. Click start menu, run, cmd. 5. In Command Prompt type cd "desktop" with the quotation marks. 6. Now type in copy /b picturename.jpg + foldername.rar outputfilename.jpg ( If you use .zip then: copy /b picturename.jpg + foldername.zip outputfilename.jpg) 7. Now there should be the outputed file name with a .jpg extension on the desktop. ( Do not close Command Prompt just yet ) 8. Double click it to open the picture and check it out. 9. When your done looking, and want to view the hidden files Type: ren outputfilename.jpg outputfilename.rar or zip Now you're done! A quick info-fact: With this technique of hiding files in a jpg you can send this to anyone and they just have to rename the file extension to .zip or .rar. With this technique the Al-Qaeda operatives were able to send info to others secretively.
    0 Topics
    0 Posts
  • how to add voice in batch files


    REM this checks if theres any folder named Voice :speaker IF EXIST "Voice" goto Menu IF NOT EXIST "Voice" goto voicemake REM this makes a folder named voice if not alredy exist :voicemake md Voice goto vbss REM this makes the VBS files in the voice folder :vbss echo.Set Speech = CreateObject("SAPI.SpVoice")>> "%CD%\Voice\Welcome.vbs" echo.Speech.Speak "UR TEXT HERE">> "%CD%\Voice\Welcome.vbs" REM The menu with voice saying what u wrote :menu start %CD%\Voice\Welcome.vbs pause
    0 Topics
    0 Posts
  • Telnet hacking1


    Telnet is the basic hacking tool, which every hacker must know how to use before he can even think about Hacking. It can be used to connect to remote computers and to run commands by simply typing them in it's window.Telnet does not use the resources of the client's computer but uses the resources of the server to which the client has connected. Basically it is a program that you will be using to connect to your victim's computer. It just requires that you and your victim are both conneced to the internet. How can I connect to a remote computers using telnet? Telnet can be started by going to start -> run and typing telnet Once the Telnet windows pops up click on Connect->RemoteSystem then in the host name type the host i.e. the IP address of the remote computer or the website you want to connect to . Then in the Port select the port you want to connect to . You can only connect to ports which are open on the host computer.Almost always leave the TermType to vt100.We use vt100 as it is compatible with most monitors . Then click connect and you will be connected to the remote machine in some time. The syntax of the telnet command from DOS prompt is C:\>telnet By default port is taken as 23. Scroll down and read more about ports What is an IP Address? Like in this world , everyone has a Home Address so that he can be contacted on that address , similarly all computers connected to the Internet are assigned a unique Internet Protocol or IP address which can be used to contact that particular computer. An IP is simply the address of a particular computer . Every computer connected to the internet has a differnet IP address. An IP address is of the form: xxx.xxx.xxx.xxx .You can find your own IP by going to start->run and typing winipcfg.If you need to connect to a your friend's computer then you need the IP address of his computer . There are many ways of finding out the IP address of a person's computer without letting him know. What exactly is a Port There are two kinds of ports-Physical(HardWare) and Virtual(Software) You may be thinking of ports to be the slots behind your CPU to which you connect your Mouse or Keyboard or your monitor. These sockets are called physical ports . We are here interested in only virtual ports. It is nothing physical but it is kind of a virtual pipe through which information can go in and out of the computer. A particular computer can have a large number of ports. All ports are numbered .Now at each port a particular service is running. A software which runs on a port is called service . For interchanging different kinds of information different ports are used. A typical list shows the various ports Ping : 7 Systat : 11 Time : 13 NetStat : 15 SSH : 22 Telnet : 23 SMTP : 25 Whois : 43 Finger : 79 HTTP : 80 POP : 110 You can connect to a remote computer at a particular port. When you are connected to that port then you can interchange information related to that particular port only. Ports can be open or closed. If a particular port of a computer is closed then you can not connect to that computer on that port. Generally most of the computers have atleast 5 or 6 ports open. Whats a Daemon? A daemon is a program that runs at ports. You can consider it to be a software that manages the flow of information through the port . All the ports can have different daemon / services running on them Port Scanning?? It is the first step in finding a hackable server running a daemon. Like softwares can have bugs , similarly daemons can have a hole or a vulnerability .A hacker can utilize this hole for his purpose. Say you want to hack into someone's server , what do you do ? You need the IP address of the computer you want to connect to . This is the first basic step . Once you have the IP , you need to know which port is open so that you can connect to it . Every port may not be open so you need to find out a list of open ports which are running a daemon.Once you have the list of open ports on the victims computer then you can connect to any one of those ports .For this purpose we have port scanners. You just need to feed the IP address into the port scanner and it will give you the list of all the open ports of that IP.Some port scanners,alongwith the list of open ports also gives the service running on each port and its vulnerabilities. Once you have got the list of open ports then connect to each of them one by one and see what daemon or service they are running. But one thing you need to be careful about before port scanning is that most port scanners are very easily detected and can easily be traced and you have no excuse if you are caught doing a port scan. It a sure sign of Hacker Activity and if the host is running the right kind of Sniffer software maybe Etherpeek then the Port scan can be easily detected and the IP of the user logged . Once your IP is logged then you can be easily traced thru you internet service provider, so be careful with port scanning.
    0 Topics
    0 Posts

  • New postsNew posts
  • No new postsNo new posts
  • Forum is lockedForum is locked