Saturday, April 14, 2007

hacking windows xp password(s)- login

Start >> Run >> [type]cmd // this will open your command prompt
[type] net(space)user(press enter)
[typw] net(space)user(space)[windowsloginid](space)*(press enter)

// for e.g.: net user faraz *(press enter)

[type]new password (press enter)and retype it(press enter).. It will
show u confirmation... // caution it wont show u the password u
type... But it still types... the blinking pointer will b their at the
same place... But it still works...
// for eg: password changed successfully.

Well... this is so easy and can b done within seconds... anyways enjoy
and tc ...

Wednesday, March 14, 2007

Some Basic Telnet

Telnet - A Tutorial to Telnet and Hacking

Now you may be looking at this going, "What the hell is Telnet?". If you are, don't worry, I'll explain everything. First of all, Telnet is software that allows you to connect to another Telnet Host.In windows systems Telnet is usually called Telnet32.exe or Telnet.exe. In newer versions of windows it is Telnet32.exe.
*** Note to Windows XP users: Don't go and get the old version of Telnet, because you have a DOS-Based one. I'll give commands along this guide so you can enjoy it too. You have to either run "Telnet" or "cmd" and then "Telnet".

Telnet is not illegal and is used by thousands of remote computers to interchange data, share connections, and do many other things that would be impossible without it.The default port for Telnet is port 23. When I say for instance, 'Connect to the sys' I am referring to connecting on the system's default port for Telnet. Sometimes you can't determine a port so you will have to port scan a sys to find the Telnet Ports.
Port 25 is the 'Sendmail Protocol' port. We will be dealing with this port as well.

Telnet Security
Because there are so many problems with Telnet today involving cyber crime and hacking, SysAdmins often restrict anonymous use of their sys's Telnet Proxies. This is cheap and can be bypassed easily.Most SysAdmins are amatures at what they do and make me laugh.They restrict the Telnet proxies on port 23 and think that we can't telnet to other ports such as 81 and 25 because we can't use the Telnet Proxy. Well they are wrong. We can easily do it and we will. Let me point out a system that has this and was not effective. I will star out the IP for privacy.

Welcome to Microsoft Telnet. Telnet32.exe.
o
202.232.**.**
connecting to 202.232.**.** 23 (The port number)
Connected.
Connection to host lost (unauthorized use of Telnet Proxy(ies).
o
202.232.**.** 25
Connecting to 202.232.**.** 25 (Watch this..)
Welcome to ********.net Sendmail Program. Welcome to all staff.
vrfy bin
..550
vrfy sys
..550
vrfy root
..550
vrfy admin
..550
vrfy games
..550
vrfy uucp
..550
q
..550
c
Connection to host lost on command.

Ok people is there a problem there? How many addys did I get? Am I supposed to have those? Do I care? No. I am just demonstrating how sh1tty Unix-System security is and how easy it is to use the Telnet Proxy to your advantage. Here, I wil list some commands for all of you running under DOS.

C - Close the Current Connection
D - Display the sys's operating paremeters
O - Connect to a host name (on default port 23) [port]
q - Quit (Exit Telnet).
Set- Set Options
Send - Send data/strings to server

Telnet, as you know so far, is a very useful tool for hackers. Hell, if you can't connect to a computer, you can't hack it. Its that simple.Now the best thing about Telnet is that virtually every Windows computer has it, comes with it, and is able to run it.
Things going wrong on hacking or telnet
I have a Windows 98 computer and I am running Telnet. It gives me a lot more options when connecting to a computer, and these commands don't go anywhere! What do I do? I get the hostname part and all that, just what does Term-Type mean?

Ok people, so many people have asked me this I'm ready to start getting an auto-flame response on my e-mail box LoL. Anyway, here goes:

Term Type means Terminal Type. It is the version of the Telnet Terminal that the host or server is running. You have to specify this, Telnet is not hacker-friendly.

In Windows 98/95/ME you are not running a DOS-Based version of Telnet. You get a client program, somewhat considered shit for me. I like the DOS based one and frankly, I find it a lot easier to use.
I can't connect to the host!
Well, the host either doesn't exist, does not support Telnet Packets or Connections, or is currently restricting proxy access or usage from your addy or all addresses. I went further than you because I thought I knew what I was doing! I got this message saying my hacking attempt was logged! Am I going to go to jail!?!?!

Don't worry, as long as its not with the extension .log or .hlog or .hacklog you're fine, as 95 percent of these messages are BS and lies.

IF THEY'RE LIES, how come they knew I was hacking them?

They don't. They simply search for incoming connections not recognized by the server. If the SysAdmins didn't modify the message, you would have gotten this:

"Error 229292: Data not recognized 8191: Distinct Remote Service Lost or Corrupt."

They just modified it. Breath in, breath out, relax.
My dad or mom found out I was hacking, and my dad's an expert on computers! He made it so I can't view anything on AOL. What the hell's going on! Give me a trick to evade this!

Sure thing. Connect to AOL, ping the site you're trying to view, and type in the IP address. You will get to the homepage, but this isn't that good a trick because you can't ping sub-addys and you're going to get text for the sub-urls. This might or might now work.
I was screwing around with my friends computer. I think I left my information somewhere, but where?

Usually, you have a critical system log. If you delete a system file (which unless you're 133t you'd NEVER EVER do) the computer's going to boot and give you a log of what happened before the deletion of the file so you know what went wrong. If you did happen to delete it, it will list something like "deletion from x.x.x.x. (your IP)". If it does, damn, you're busted. But there are ways of getting rid of this "hacker-knock out". First off, get a WAN-Controller, or any sort of program that lets you input screen or Hardware input by the output. This means you can control their computer with yours. But you can't boot this computer, because it will break the connection.

Access the log files usually in system or system32 (both system files located in C:/Windows or C:/). There, you will see encrypted sh1t. CTRL+A will select it all and delete it all. If you do delete this file, (after you do), try recovering the system file. WHATEVER YOU DO DON'T DO A SYSTEM RESTORE, YOU HAVE BEEN WARNED.
Some hacker has my IP and hacks it every time I log on. It's static, which means it doesn't change. How do I make him stop? I don't know what his IP is, either!

Go to start, run, "netstat -a". Hacking is almost equivalent to connecting, if he's hacking you your connected to him and he's connected to you. Netstat -a is a command that allows you to see all your connections to hosts and servers, associated with TCP/IP. If you see a hostname that you don't recognize, log it. In fact, click Print Screen, go to paint, CTRL+V, Crop the image of the DOS window for Netstat, and save it. That should be quite easy.

Wednesday, January 31, 2007

Totse's ways

Disabling the proxy settings in Internet Explorer.This method will NOT work with packet filters
This is the quickest method but can sometimes be tricky. In this case we will assume that the settings have been locked, the desktop does not have any icons, the run command is missing from the start menu, and that you have been denied access to the registry editor.
NOTE: Internet Explorer cannot be running while you are activating this patch (Steps 2-5) or it will not take effect.
1. Copy the code at the end of the article and save it as ByeByeBESS.reg or anything else that you want as long as it ends in .regNOTE: This file can be downloaded at home and then put on a disk.2. On the computer that is limited by Bess, Start Notepad or Paint and choose Open from the File menu.3. Go to the Disk (probably the A: drive) and in the drop-down box labeled "Files of Type", choose "All Files (*.*)"4. You should see the file you downloaded. Right-Click it and then, in the menu that appears, left-click on "Merge"5. When you see the message saying that it worked, click ok and then start internet explorer.
NOTE: You can also accomplish this by unlocking the settings using the system policy editor which is on the windows CD and should fit on a disk.
Using a Proxy ServerThis method will work with packet filters and NAT blocks
There are two main types of Proxy Servers. However, they both function roughly the same:
1. You tell the server where you want to go2. It downloads the page you are looking for3. It tells Bess that it is the source of the page and then gives it to you.
The first of the two types is the regular proxy server. Server-side censorware products are actually modified proxies.You can find lists of regular proxy servers using google by typing the keywords FREE PROXY. The fatal flaw to this technique is that the proxy server is rendered useless if it is blocked by the NAT Router.This method works with an alternate browser or with internet explorer. To use an alternate browser, simply type the address of the proxy into the appropriate box in the preferences page. It is also possible to create a patch to unlock Internet Explorer.
The second type of proxy is the CGI proxy. The difference is that a CGI proxy can be used simply by browsing to it with your browser.You can run your own CGI proxy server if you have either an always-on internet connection like Cable or DSL, a dial-up connection that you can leave on, or if you have a web page account with CGI support.
If you want to run your server at home, install the Apache Web Server and Perl and then follow the instructions for if you have a CGI-enabled server.
If you have a CGI-enabled web server, download and install one of these packages:
* CGIProxy* AccessWeb* HTTP Bridge* And Others...
They will convert your site into a CGI Proxy server
The fatal flaw to this technique is that the proxy server is rendered useless if it is blocked by Bess.
Using a Secure Tunnel
This method will work with packet filters and NAT blocks
A secure tunnel is a technique by which your machine can exchange data with another by hiding it within seemingly innocent data. You can find the software at Sourceforge. The downside is that the unblocked computer must be running Linux and that this can be very complicated to set up.

Bypass Websites Using Google

Ok, let's start from the beginning. We all know that Google is more than a search engine; we do use it as provider for email, mapping, news and many other services. Google is now also a free proxy service. Proxy is a device that stands between a PC and the internet, providing all the connections to the world wide web. What a proxy does is to receive all data from a requested site, so when you access web pages all data come from proxy.

What's the purpose for Google as a proxy? We often use office/school/university connections, usually those services are set to provide more safety, blocking the access to undesidered web sites (the "black list"). What you can do now is use Google translator service (language tools) as a proxy to bypass the restrictions set for our connection!

You just need to type the following URL:

http://www.google.com/translate?langpair=en|en&u=www.forbiddensite.com
(www.forbiddensite.com stands for the URL you need to go to...)

What you'll get is the translation (english to english!) of the page you want to see... your connection is directed to a google.com page so this page won't be blocked (would be blocked only with google.com on the black list), no matter what's the content.

Notice that the URL has been a little hacked because the parameter "langpair"(1) is set to "en|en" (english/english) so the page is processed by Google but you can keep the original language of the page (no need to translate!). If you need another language (e.g. french) you just need to set the parameter langpair to "fr|fr" and you'll be able to read french pages in french!

A couple of examples:

english... http://www.google.com/translate?langpair=en|en&u=hacks.oreilly.com

Last but not least: if you use this trick, you're not sure to protect your privacy, this kind of connection lets you see blacklisted pages but doesn't hide your IP address. Just go to http://www.google.com/translate?langpair=en|en&u=www.whatismyip.com to see your IP is not hidden...

That's all for now.

How to install the Circumventor

This page describes how to install the "Circumventor" program, which can be used to get around all Web blocking programs. However, Please Note!! You don't actually install the Circumventor on the computer that is blocked from accessing Web sites. You, or a friend of yours, has to install the Circumventor on some other machine which is not censored. For example, if you want to get around Web blocking at work, don't install the Circumventor on your work computer. Install the Circumventor on your home computer. When the installer is done, it will give you the URL for your new Circumventor, and then you write that URL down and take it in with you to work, where you can use that URL to bypass the Web blocking there. Similarly, if you're in China and blocked from accessing certain sites, don't install the Circumventor on a machine in China; instead, get a friend to install it outside China, and then they can send you the URL that you can use to access banned sites.

How to install the Circumventor
The machine where you install the Circumventor must have a fast Internet connection (not dial-up), and it must be running Windows XP or 2000 (this includes most computers these days). Also, once you install the Circumventor on your machine, the Circumventor will only work as long as you have your machine turned on and connected to the Internet, so you should only install it on machines that are online more or less all the time. NOTE: By installing this software, you will be joining an interconnected Web of Circumventor machines, so just as you can surf the Web via other people's machines (at sites like StupidCensorship.com), at times other users will be surfing the Web through your machine. However, they will not have access to any files or programs on your machine.

To install:
Download ActivePerl from this link and install it. It must be installed to C:\Perl (this should be the default). Accept all of the default options.
Download OpenSA 2.0.2 beta from this link (FireFox users -- please right-click and pick "Save Link As") and install it. Accept all of the default options. (If you get to a screen titled "Server Information" and it doesn't have values filled in for "Network Domain", "Server Name" and "Administrator's Email Address", just fill in these boxes with made-up random values -- the Circumventor doesn't use them.)
Download the circumventor-setup.exe program from this link and pick "Save" -- then once you have saved it on your computer, run the circumventor-setup.exe file that you saved.
If the circumventor-setup.exe program succeeds, it will display an "It's ready!" page at the end of the install. If it fails, it will create a file circumventor-setup-log.txt -- send that file to bennett@peacefire.org and we will try to figure out what went wrong.
Happy surfing!

--I did not write this, so I am not sure how accurate it really is.

Friday, January 26, 2007

Another way to get yourself admin access

Pull out the network cable out of the back of the computer;restart the computer and boot into safe mode, usually by pressing F8 or somthing similar, this will bypass the main login and you should have admin.. Then plug the network cable back in, and edit the user accounts to give your account admin access. Then restart the computer normally, log onto your account, and if done right, you will have admin access. <<<>>

Friday, November 24, 2006

Getting SYSTEM Privileges (higher than Admin)

By running as a SYSTEM, you have more power than an administrator. You have full control of the operating system and its kernel.

Directions:
1. Open up command prompt
2. At the prompt, enter the following command then press enter: at
3. If it responds with an “access denied” error, then we are out of luck; if it responds with “There are no entries in the list” (or sometimes with multiple entries already in the list) then we are good
4. If you can use the at command, enter the following commands, then press [ENTER]: at 15:25 /interactive “cmd.exe”Lets break down the preceding code. The “at” told the machine to run the at command, everything after that are the operators for the command, the important thing here, is to change the time (24 hour format) to one minute after the time currently set on your computers clock, for example: If your computer’s clock says it’s 4:30pm, convert this to 24 hour format (16:30) then use 16:31 as the time in the command.
5. When the system clock reaches the time you set, then a new command prompt will magically run. The difference is that this one is running with system privileges (because it was started by the task scheduler service, which runs under the Local System account).
6. You’ll notice that the title bar has changed from cmd.exe to svchost.exe (which is short for Service Host). Now that we have our system command prompt, you may close the old one. Run Task Manager by either pressing CTRL+ALT+DELETE or typing taskmgr at the command prompt. In task manager, go to the processes tab, and kill explorer.exe; your desktop and all open folders should disappear, but the system command prompt should still be there. At the system command prompt, enter in the following: explorer.exe
A desktop will come back up, but what this? It isn’t your desktop. Go to the start menu and look at the user name, it should say “SYSTEM”. Also open up task manager again, and you’ll notice that explorer.exe is now running as SYSTEM. The easiest way to get back into your own desktop, is to log out and then log back in.
7. Now that we have SYSTEM access, everything that we run from our explorer process will have it too, browsers, games, etc. You also have the ability to reset the administrators password, and kill other processes owned by SYSTEM. You can do anything on the machine, the equivalent of root; You are now God of the Windows machine. I’ll leave the rest up to your imagination.