Sunday, January 31, 2010

Internet Hacking





How To Extract Saved Password From Internet Explorer, Mozilla Firefox, Google Chrome, Yahoo Messenger, Gtalk And Msn


By-Rahul Jaiswal •»яנ«•


Its a very simple trick.It is not the direct method but sometimes even this helps us..






It is Quite Dangerous to save your password in Internet Explorer, Mozilla FireFox, Google Chrome, or even in Messengers.
Whenever you select “Remember my Password” option, then your Passwords are Automatically saved into your Computer, for further use.
The saved Passwords can be retrieved quite easily.
It is more dangerous when you are using public computers. In that case anyone can easily extract your password and misuse it.
Here is the Tip on how to Extract Saved Passwords:-
1) Internet Explorer
You can Download the Software IE PassView



IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports all the version including Internet Explorer v4.0 v6.0, 7.0, Beta version 8.0.
2) Google Chrome
You can Download the Software Google Chrome Pass



ChromePass is a small password recovery tool that allows you to view the user names and passwords stored by Google Chrome Web browser. For each password entry, the following information is displayed: Origin URL, Action URL, User Name Field, Password Field, User Name, Password, and Created Time. You can also save them in Text and Xml Files.
3) Messengers like Yahoo, Gtalk and Msn
You can use the Download Messenger Key

Messenger Key is a freeware utility to recover passwords of your favorite messengers. Messenger Key recovers passwords for ICQ, MSN, Google Talk and Yahoo instant messengers. All Versions are Supported.
4) Mozilla FireFox
First way:-
You can Easily see the Password in Mozilla Firefox without using software,
Just Follow the following steps:-
I. Open Mozilla then Go to tools
II. Select options tab
III. Then Choose Security
IV. In the second box titled “passwords” you will see “SHOW PASSWORDS option there, just Click it.
V. Now You will see the user name and password.
Second way:-
You can also download the Software Password Fox

PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
It is also quite Easy to Retrieve Save Passwords using Java Script. If you need the code for that i’ll give you.
SECURITY TIP: DONT SAVE YOUR PASSWORD IN YOUR COMPUTER BECAUSE IT CAN BE HACKED EASILY EVEN FROM REMOTE COMPUTER.

Chat Tricks (Rediff bol,yahoo,Gmail)




Chat Tricks(Rediff Bol,Yahoo Messenger & Gtalk)
By-Rahul Jaiswal •»яנ«•

Spamming With Message On Rediff Bol Chat Rooms 
By-•»яנ«•

There are many software to spam in rediff bol since using 
many macro recorder..but the best to be used for rediff bol would be using JMACRO.exe or EASY MACRO.exe using this software you can record or script  your spam and repeat it as many times u wanted..with avery fast speed..if any type of help or information  regarding this peleas let me know .you can easily download these software from net.

For flooding in Yahoo,Gtalk & Rediff bol the best software to be used would be "hobba macro tool.exe".....


---------------------------------

How to be invisible in the Rediff Bol room (nick name not in the online buddy room list)
By-•»яנ«•

For this tricks we need 2 id to be opened...(as i have already described about multiple login in rediff bol in earlier posts)

First we need to login with both the id(e.g-id2 id3).

Now enter in some empty room where very less user are online with the id that u want to make invisible(e.g-id2).

In the room start using foul languages so that rediff may expel you out off the room for the reason of using foul languages in room.(e.g-repeat the foul words for more than 30-40 times continously in the room u will be expel out) 

So now half of the work is done...now enter the room where you want to make your nick invisible with the other id(e.g-id3)

Now enter the same room with the expel id(e.g-id2).The chat room will display a message fail to enter.But what ever message u will type in the expel id (e.g-id2) it will be displayed in the room...so u can see what other are saying with id3 and you can type ur message with id2 and no one will see your nick in the room..

-------------

The benifit of being invisible would be your id cannot be ignored so all have to see ur msg in the room.
and the most is that your id is protected from being booted by other user...

Next time i wil tell u how to boot id in rediff bol and how to escape and about anti-boot..
if you have any doubts please let me know..or need any information contact us.

-------------
  


Multiple login in Google talk, yahoo messenger
By-•»яנ«•

By default all google talk, yahoo messenger allow us to run a single instance of the program at a time.
If you have several gmail or yahoo accounts, you may want to run multiple instances of google talk or
yahoo messenger at once,so here is the trick how to do it…

.
Multiple Login in Google TALK

1. Create a gtalk shortcut on the desktop.
2. Right click that icon and select properties and then in the target place u will see something like this. “”C:\Program Files\Google\Google Talk\googletalk.exe” /startmenu”
3. Rename it as”"C:\Program Files\Google\Google Talk\googletalk.exe” /nomutex”
4. click apply and OK.

.
Multiple Login in yahoo messenger

1. Go Run . Type regedit, then enter .
2. Navigate to HKEY_CURRENT_USER / Software / yahoo / pager /Test
3. On the right pane , right-click and choose new Dword value .
4. Name it as Plural.
5. assign a decimal value of 1 by Double clicking it.
6. Now close the registry and login with multiple Ids.


That’s It, if you have any doubts please let me know..

Saturday, January 23, 2010

General Hacking


Data Recovery


                   By Abir  Atarthy





There is a lots queries regarding data recovery in my mail box. So here i thought to write something on it.
Data recovery is an important subject and it’s definitely a good thing to have a positive understanding of data recovery and how it could effort you personally or your business.


Definition:


Data recovery is the salvaging of data originally stored on media such as magnetic disks and tapes and which has become corrupt or inaccessible.
Data gets damaged or missing in a variety of ways from virus attacks to improper storage of the media to accidents like floods. It could also have simply just been erased. Very often a large percentage of this data can be recovered using a variety of techniques.

Recovering or salvaging the data from such media can sometimes be performed using simple hardware or software but may occasionally require the assistance of data recovery specialists.
There are many types of data recovery issues are there but i will discuss only on deleted files issues here.



Can erased data be recovered? 

Yes, usually. When you delete a file the file is not actually deleted. It's just the entry in the index pointing to the file's actual location that is deleted. The file itself is left untouched but subsequent work you do on the PC could overwrite the location where the file was so it's important to minimise any amateur attempts at data recovery. 


How can I completely erase a hard disk? 

You can't. Any data you've deleted can probably be recovered later. Formatting doesn't remove the data beyond recovery. Neither does low-level formatting or "shredding". Even when every single byte of information on your drive has been written over a lot can still be recovered by extra sensitive recovery systems in use by the local plod (well, maybe not him but his peers in their hi-tech departments). But, always seek assistance at the earliest signs of trouble rather than relying on the assumption that everything can be recovered. 


Recovering data after logical damage




Logical damage is primarily caused by power outages that prevent file system structures from being completely written to the storage medium, but problems with hardware (especially RAID controllers) and drivers, as well as system crashes, can have the same effect. The result is that the file system is left in an inconsistent state. This can cause a variety of problems, such as strange behavior (e.g., infinitely recursing directories, drives reporting negative amounts of free space), system crashes, or an actual loss of data. Various programs exist to correct these inconsistencies, and most operating systems come with at least a rudimentary repair tool for their native file systems. Linux, for instance, comes with the fsck utility, Mac OS X has Disk Utility and Microsoft Windows provides chkdsk. Other many third party softwares are also available.



Preventing logical damage




The increased use of journaling file systems, such as NTFS  5.0ext3,  is likely to reduce the incidence of logical damage. These file systems can always be "rolled back" to a consistent state, which means that the only data likely to be lost is what was in the drive's cache at the time of the system failure. 




Recovery techniques




Two common techniques used to recover data from logical damage are consistency checking and data carving. While most logical damage can be either repaired or worked around using these two techniques, data recovery software can never guarantee that no data loss will occur. For instance, in the FAT file system, when two files claim to share the same allocation unit ("cross-linked"), data loss for one of the files is essentially guaranteed.



Consistency checking




The first, consistency checking, involves scanning the logical structure of the disk and checking to make sure that it is consistent with its specification. For instance, in most file systems, a directory must have at least two entries: a dot (.) entry that points to itself, and a dot-dot (..) entry that points to its parent. A file system repair program can read each directory and make sure that these entries exist and point to the correct directories.Both chkdsk and fsck work in this fashion.



Data carving




Data Carving is a data recovery technique that allows for data with no file system allocation information to be extracted by identifying sectors and clusters belonging to the file. Data Carving usually searches through raw sectors looking for specific desired file signatures. The fact that there is no allocation information means that the investigator must specify a block size of data to carve out upon finding a matching file signature, or the carving software must infer it from other information on the media.  Data carving, also known as file carving, has traditionally required that the files recovered be located in sequential sectors (rather than fragmented) as there is no allocation  information to point to fragmented file portions



Recovery software

Bootable




Data recovery cannot always be done on a running system. As a result, a boot diskLive CDLive USB, or any other type of Live Distro containing a minimal operating system and a set of repair tools is needed.



Consistency checkers




  • CHKDSK : A consistency checker for DOS and Windows systems.



File Recovery




  • Recuva - Freeware data recovery program. Runs under Microsoft Windows 7, Vista, XP, 2003, 2000 and 98.



Forensics

The Sleuth Kit : Also known as TSK, The Sleuth Kit is a suite of forensic analysis tools developed by Brian Carrier for UNIX, Linux and Windows systems. TSK includes the Autopsy forensic browser.



 ------------------------------------

C/C++




                

C program without semicolon

By Ankita Chaterjee
(Student, Techno India Group of College,Kolkata)

If you are asked to write a program that will print something,but the program will have no semicolon. Then...probably you will have to think
a bit. Few will say how it's possible?
Well here is the program in C, that will print welcome to hackingheart. How the program is working that i am leaving on you.
Try and find out the logic. Of course  if you have problem then put a comment, i will reply.

#
include<stdio.h>

void main()
{
if ( printf("Welcome to hackingheart\n"))
{
if ( printf("successful"))
{}
}
else
{
if ( printf("Failure"))
{}
}
}

Java Script

Java Script form validation


By   Tanaya Karmakar
(student, Future Group  of Engineering College,Kolkata)







Here is a Javascript form that i have made. Most  common types of  input mail validations you can check through it.  You can add it in your website or in your college project.


Download the complete code from following link


http://rapidshare.com/files/339789811/javascriptform.txt


save it as .html file and run it.


Fill the form and keep one or two fields blank. Then click submit button.
Now see how  input validations are done.


If you like it  don't forget to give comments. I have given a screenshot for you, how it will look like when it will run in browser.














Friday, January 15, 2010

Windows hacking

Hack/change your Windows XP Boot Screen


By-Rahul Jaiswal •»яנ«•




HACKING THE XP BOOT SCREEN


This is a very simple trick to do if you have done the same for the logon screen and the start button. There are 2 ways to do this trick that I know about one is doing it manually and the other is using a program called bootxp. I am going to tell you the manual way to do it, but if you want to know the other way just let me know, so I can do an update to the guide. Now once you have downloaded your ntoskrnl.exe file save it a general location so that you will have easy access to it, like my folder.
Once you have ntoskrnl.exe file in an easy access folder, restart your pc into safe mode. Once into safe mode go to the folder where your files are located.


Now that you are there copy the file that you want to change your boot screen too. Once you have copied that file, hit the window key + r or type %windir%\system32 in the run command, so that folder as follows.


Once there paste your new file into the folder and overwrite the existing folder.


Now that you have your new file in the folder restart your pc as you normally would and your new boot screen should appear. You can download this bootscreen here.


ALWAYS BACKUP EVERYTHING YOU EDIT OR DELETE. I’M NOT RESPONSIBLE IF YOU MESS YOUR COMPUTER UP BY DOING THIS HACK OR ANY TYPE OF HACK. DO IT AT YOUR OWN RISK.


Image and ntoskrnl.exe files provided by www.themexp.org