Saturday, 17 September 2011

How To Use Trial Software's For Ever In Windows

One of  my blog readers asked me "How can i use trial version software's forever" .Instead of answering him i taught i can write a tutorial on How to use trial version software's for Ever


Concept :-
When you  install a software for the first time it makes an entry into the Windows Registry with details such as Installed Date and Time, installed path etc.After installation every time you run the software it compares the current system date and time with the installed date and time.So with this it can make out whether the trial period is expired or not. So if we make software think that the trial period is not over we can use the software for ever




How To Use Trial Version Software For Ever

Before we start the Hack Download Crack Lock from Here And follow the steps given below


1. Always note down the date and time, when you install a trial software for the first time.


2. Once the trial period expires, never open it
  
3. Now open Crack Lock which we downloaded earlier and select add program
    
4. Now navigate and select the trial software which you want to use it forever and  Inject  the date of the last day in the trial period.

 Example
 If the trial period expires on December  30 , always inject the date as December 29 
5. Follow the same steps to use any Trail version programs for ever


Note :- Once the trial period of the program expires never open it directly always open the program using crack lock 



....................................................................................................................................................

Friday, 16 September 2011

How To Block Websites Without any Software in Windows Read more: http://hackhaholic.blogspot.com/p/contents_27.html#ixzz1XS4bAv4p

In one of my previous post i told you How to Lock  Folders Without any Software today i will teach you How to Block Websites Manually Without  using any Software

There are many reason why you need to know how to block a website. Some of the most common reasons are you have been targeted by spammers who use adware and popups to attack your PC. Other reasons may be to prevent your children from having access to certain site content such as porn and gambling.



You need not waste money on buying software's to block websites you can use this method to block any website you want 
 
How to Block websites without any Software :-

1. To block websites we need to edit Host file which is usually in C:/Windows/System32/drivers /etc

2. To edit Hosts file open notepad click open and go to  C:/Windows/System32/drivers /etc

3. Open the host.file which looks like image shown below



4. Now enter 127.0.0.1   and  the "website you want block " without quotes 

                                                                                                                              
 

5. You can add all the websites that you want to block  in the same format and finally
    click save  That's it we have successfully blocked  websites by editing the hosts file
   
6. If you find it difficult to do it manually every time  you can make a batch file to block  websites 

Example :-
@echo off
echo 127.0.0.1    www.google.com >> C:\windows\system32\drivers\etc\hosts.txt
echo 127.0.0.1    www.yahoo.com  >> C:\windows\system32\drivers\etc\hosts.txt
exit

7. Copy the above code in a note pad and save it as something.bat .Now once you click
    the the batch file google.com and yahoo.com are blocked you can modify the batch file
    according to your needs

...................................................................................................................................................

Thursday, 15 September 2011

How to hack Windows Password Using Ophcrack

Ever wanted to login to your friends/schools computer  which is password protected or  you’ve lost your Windows password and you've logged out of your computer. If you are in one of these situations you can use Ophcrack to hack/recover your passwords  .In this tutorial i will Explain how to hack windows password using Ophcrack




Things we Need :-

1. Ophcrack Live cd or Flash drive .You can download it from Here 
Note :-If u don't know how to make Ophcrack Live CD /Usb  you can have look at my previous Tutorial from Here   


Procedure :-

1. First plug in your Ophcrack Live cd/usb .Now restart your computer and go to boot menu by  pressing ( f12 or del key ) now select your booting device as CD/USB accordingly

2. Now You will be presented with the Ophcrack LiveCD menu. Leave the default selected and hit enter on your keyboard (or just wait 5 seconds for it to automatically boot).


3. Slax, the version of Linux that is packaged with Ophcrack, will start up




4. Ophcrack will start on its own, and the passwords for each of your Windows users will be cracked and displayed on screen.




5. Write down the passwords, remove the CD from your CD/Usb  and restart your computer. Now you can log in to Windows .

.................................................................................................................................................

Wednesday, 14 September 2011

Different Types of Hashes and Salts

I decided to write this article because many of my blog readers were confused of different types of hashes



What Is a Hash?

Ok, firstly alot of you still believe that hashes can be "decrypted", this is a common misconception because hashes are generated by One Way Cryptographic Hash Algorithms these means the algorithm that created them CAN NOT be reversed to determine the plain text password.

These one way functions are used by computers to prevent storing passwords in plain text in memory, instead when a password is entered (for example at a log in screen) a one way hash algorithm is applied to the supplied password and then the hashed output is compared to the hash for that user, stored in memory. If the two hashes match, the passwords are the same and the user is authenticated, if the two hashes are not the same the passwords do not match and the user is denied access.

Types Of Hashes And How To Identify Them

MD5 - The most common hash you will come across in the wild is an MD5 hash
(Message-Digest algorithm).

These hashes are easily identified by the following factors:
- They are always 32 characters in length (128 Bits)
- They are always hexadecimal (Only use characters 0-9 and A-F)
Code:


Example - f5d1278e8109edd94e1e4197e04873b9


If the hash breaks one of these rules - IT IS NOT MD5.

SHA1 -
Still used frequently on the internet and is one of a large family of Secure Hash Algorithms.

These hashes are easily identified by the following factors:
- They are always 40 Characters in length (160 bits)
- They are always hexadecimal (Only use characters 0-9 and A-F)


Code:



Example - ab4d8d2a5f480a137067da17100271cd176607a1


If the hash breaks one of these rules - IT IS NOT SHA1.

MySQL < 4.1 -
These aren't used very often but still come up on  very often because people have no idea what to do with them, they are used in older versions of Mysql.

These hashes are easily identified by the following factors
- They are always 16 Characters in length (64 bits)
- They are always hexadecimal (Only use characters 0-9 and A-F)

If the hash breaks one of these rules - IT IS NOT MYSQL < 4.1.


Code:



Example - 606727496645bcba

MYSQL5 -
Used in newer versions of MYSQL to store database user passwords.

These hashes are easily identified by the following factors
- They are always 41 characters in length
- They are always capitalized
- They always begin with an asterisk

If the hash breaks one of these rules
- IT IS NOT MYSQL5.

Code:

Example - *C8EB599B8E8EE7BE9F1A5691B7BC9ECCB8DE1C75

MD5(Wordpress) -
Used in word press driven sites, one of the most commonly confused hashes by everyone

These Hashes are easily identified by the following factors
- They always start with $P$
- They are always variable case alpha numeric (0-9 A-Z a-z)
- The are always 34 characters long

If the hash breaks one of these rules
- IT IS NOT MD5(Wordpress).

Code:

Example - $P$9QGUsR07ob2qNMbmSCRh3Moi6ehJZR1

MD5(phpBB3) -
Used in PHPBB forums, another commonly miss identified hash, especially amongst skids.

These Hashes are easily identified by the following factors
- They always start with $H$
- They are always variable case alpha numeric (0-9 A-Z a-z)
- The are always 34 characters long

If the hash breaks one of these rules -
IT IS NOT MD5(PhpBB).
Code:

Example - $H$9xAbu5SruQM5WvBldAnS46kQMEw2EQ0

SALTS:-

Ok now there is ALOT of confusion around salts , so im going to try and quickly clean this up - the most commonly salted hash is MD5 because it is cryptographically weak and easy to crack. So a salt gets added to the password before hashing to increase the parity. For example MD5($password.$salt).

Salted MD5 - Used in a large amount of applications to increase hash parity and to increase the time it takes to crack.

These Hashes are easily identified by the following factors
- They consist of two blocks connected by a colon, the first is the hash the second is the salt.
- The first part of the salted hash is hexadecimal, the second is variable case alphanumeric.
- They first part will always be 32 characters long
- The second part can be any length.


If the hash breaks one of these rules - IT IS NOT A SALTED MD5.
Code:

Example - 49adee90123f8c77d9020bba968c34dd:PS2en

Warning - in some cases the salt can contain symbols (but this is rare)

NOTE -
You need both the salt AND the hash to decrypt a salted md5.




How To Crack Hashes

MD5 - MD5 hashes are easily broken in the present day due to the prevalence of online MD5 crackers such as  www.hashchecker.de. However if you cant crack your hash online then you will need to use a tool such as John The Ripper or more advanced hash crackers such as Password Pro or HashCat.


Note :- You can also read what is md5 hash and how to use it

Credits :- Solaris , John
..............................................................................................................................................................

Tuesday, 13 September 2011

Password Cracking Tools

In my previous post i explained some basic methods of  cracking a password   . Today i will explain  some best password cracking tools some of them have been listed below



Cain and Abel :- The top password recovery tool for Windows. This Windows-only password recovery  tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.


Home:- http://www.oxid.it
Latest Release:- cain & abel v4.9.23
Download:- http://www.oxid.it/cain.html

John the Ripper :- A powerful, flexible, and fast multi-platform password hash cracker. John the Ripper is a fast password cracker, currently available for many flavors of Unix, DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches.

Home:- http://www.openwall.com
Latest Release:- John the Ripper 1.7
Download:- http://www.openwall.com/john/  


THC Hydra :- A Fast network authentication cracker which support many different services. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more.

Home:- http://www.thc.org
Latest Release:- THC-Hydra v5.4
Download:- http://freeworld.thc.org/thc-hydra/



L0phtcrack :- Windows password auditing and recovery application 
L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc).

Home:- Not Available
Latest Release:- L0phtcrack v5.04
Download:- http://download.insecure.org/stf/lc5-setup.exe
                  http://download.insecure.org/stf/lc5-crack.zip (keygen)  


Pwdump :- Windows password recovery tool.
Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file.

Home:- http://www.foofus.net/fizzgig/pwdump
Latest Release:- pwdump6 version 1.7.2
Download:- http://swamp.foofus.net/fizzgig/pwdump/downloads.htm  

RainbowCrack :- An Innovative Password Hash Cracker.
The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.

Home:- http://www.antsight.com
Latest Release:- rainbowcrack v1.2
Download:- http://www.antsight.com/zsl/rainbowcrack/  



Brutus :- A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more.

Home:- http://www.hoobie.net
Latest Release:- brutus-aet2
Download:- http://www.hoobie.net/brutus/brutus-download.html  

................................................................................................................................................................

Spy Cell Phones with Spyphone Gold

Spyphone Gold  (Spyera gold)  is the most advance cell phone keylogger on the market today. This is based on its supercharged features, reputation and great system core stability. It has been in the business of developing phone spy applications for over ten years which makes it one of oldest companies in this particular market. During this time Spyera’s engineering team has ensured that this product remained one of the leaders in the development of new phone spy features and also phone compatibility (e.g. Spyera was the first Blackberry spy app to work on O/S 6). Basically if you would like to monitor virtually any cell phone in any location in the world then Spyera is the way to go.



Who uses this product?

Virtually anyone who has suspicions that their partner is cheating, employee is stealing or children are being led astray can use Spyera. There are other phone surveillance apps on the market but what makes this one different is the fact that you will be able to intercept live phone calls. This means that you will hear every single nitty gritty detail in the call without the participants knowing.  If you combine this function with the other features of this product, you will know beyond a shadow of a doubt if that person is guilty of any wrong doings. Intercepting other communications are great but it is nothing better than listening in to a cell phone conversation. After you discover what you were looking for you will be able to take appropriate action.

How does Spyphone Gold work?

After your purchase, you can directly download the installation module onto the target cell phone. Installation takes only a few minutes. After installation, each activity on the target phone is recorded and uploaded onto the SpyPhone servers. You can login to your online account from your PC to view the logs at any time. The logs contain Text messages, Contacts List, Call History, GPS Locations and many such information
If you need to listen into a phone conversation you will just have to dial into the target phone during the call and you will be added to the conversation. Don't worry you will be notified via sms message that the call is in place.


Features

  • Spy phone calling - This is the ability to call the phone and listen to the surroundings of the phone. Therefore if the person is in traffic you will hear horns blowing etc and you will confirm what they are up to.
  • Call Interception (Listen to Phone Call) – this Spyera feature enables you to secretly liste to incoming & outgoing calls.
  • Remote Monitoring – want to find out what is going on “around” the iPhone? This remote listening feature is how you do it.
  • SMS Logging (Incoming / Outgoing) – this will enable you to read all text messages, even if they are deleted.
  • Call History (Incoming / Outgoing) – get access to all incoming and outgoing call logs to find out their calling habits.
  • Call Duration (Incoming / Outgoing) – this will give you visibility into how much time they are spending on each call.
  • GPS and Cell ID Location Tracking – this Spyera feature will secretly track the iPhone in real time.
  • Email Logging (Incoming / Outgoing) – want to know who they are emailing & what they are sending? This feature will show you.
  • Contact Name in Address Book Linked to each call/sms – View the contact details of everyone they contact.
  • SIM Change SMS Notification – If your target ever changes their SIM card, Spyera Gold will notify you & send you their new number.
  • %100 Undetectable – No chance they will find out Spyera is on their iPhone. Spyera Gold is 100% undetectable!
  • Remote Control – Control Spyera (activate spy call, uninstall, etc..) via remote SMS commands.
  • 10 Days %100 Money Back Guarantee – Spyera stands behind their iPhone spy product.
  • Unlimited device change – This will ensure that if your target changes their phone, you’ll be able to monitor their new one.


Compatible Cell Phones:

Spyphone Gold is fully compatible with the following mobile phones
  • Nokia, LG, Samsung and Sony Ericsson Phones
  • BlackBerry Phones
  • Apple iPhones
  • Windows Mobile Phones

 Download Spyphone Gold :


So what are you waiting for! Grab a copy of Spyphone gold  and start spying your friends ,spouse cellphones

Download Spyphone Gold


.....................................................................................................................................................................

Monday, 12 September 2011

Update Facebook Status Using Twitter


Wouldn’t you love to update your status on both Facebook and Twitter at the same time. Just install the Twitter application for Facebook. Once synced, your tweets including the #fb tag would automatically be posted as status updates on your Facebook.

...............................................................................................

Display Your Facebook Status Upside Down

This is a cool and fun trick. To display upside down status updates, simply head over to FlipText and type in your status. Then simply click on Flip Text and copy-paste the upside down text into your Facebook status box.

 
................................................................................

Sunday, 11 September 2011

Hack Facebook Accounts With Facebook Freezer

Yesterday when i was surfing on the net i came across an interesting script kidy tool Facebook Freezer  Actually this tool is not used for hacking Facebook but it is simply used to prevent users from logging into Facebook sounds cool ? ha . Follow the instructions given below to prevent your friends , from logging into their Facebook account



Concept Behind The Hack  :-
Facebook has a security feature in which after 25 or so logins the account is temporarily disabled,to enable the account the account owner must reset his/her account
Thus, even when victim tries to login his Facebook account using correct password, he is not able to login to his Facebook account, thus you can hack Facebook account thanks to Facebook Freezer.



Hack Facebook Accounts With Facebook Freezer :-


1. Frist a fall  Download Facebook Freezer from Here , and to get the password click Here


2. Now extract the files into a folder 
  
3. Now  run Facebook Freezer.exe file  as shown



4. Now enter the email id of  the victim whose Facebook account you want to hack using Facebook freezer and finally hit "Freeze".


5. That's it. You will now be able to hack Facebook account using this Facebook freezer. This freezing will continue until you hit "Stop Freezing".This will not hack facebook account for you but it will prevent the victim from logging into his ,her account,



.................................................................................................................................................