Tuesday, June 29, 2010

uTorrent for Mac Graduates from Beta with a Stable 1.0 Release




Mac only: We've been following uTorrent's path to a Mac release pretty closely recently, and today they released the first stable Mac version of the popular BitTorrent client.
The now-stable, native Mac version of the beloved Windows client sports a Mac-like UI, designed for downloading many torrents at once, while also being pretty light on system resources. It doesn't look like there are a huge amount of changes between the last few builds and this one, though a few pretty annoying bugs have been fixed, and anyone holding out for a stable version of the client should now be pretty pleased with how it handles. We haven't done any formal tests yet to compare it to now-Mac-favorite Transmission, but if you're a heavy torrenter and try out the new build, let us know how it works for you in the comments.
uTorrent is a free download for Mac only. Note that while the site still says it's beta, uTorrent has announced it as the stable build on their blog (and the build numbers match). It seems like they just haven't updated the images on their web site.

Saturday, June 19, 2010

How to hack almost any hotmail, easily without keylogging, in 24 hours.

This method is called Reverting, and you will be sending a form in to microsoft customer support to reset the password for your (or somebody elses) hotmail account.

NOTE: If you are interested in protecting yourself against this hacking method, please refer to this thread.

For this method, it helps to know the person, even a little, but i'll still give you a step-by-step tut on how to find the information and fill out each part of the form.

NOTE: THIS TUTORIAL IS FOR EDUCATIONAL PURPOSES ONLY, I AM NOT RESPONSIBLE IN ANY WAY FOR HOW THIS INFORMATION IS USED, YOU USE IT AT YOUR OWN RISK. YOU MAY LEARN ALSO HOW TO GET YOUR OWN ACCOUNT BACK FROM THIS.

Step 1: go here:

https://support.live.com/eform.aspx?prod...mcs&scrx=1

Step 2: Give them your victims full name.

Now, if you do not know their first name, try the following things to find it.

First, try using these two sites, simply enter their email and hit return.

http://www.pipl.com/email
http://com.lullar.com

if you want more, google their hotmail account(s), for example, type into google:

"victimshotmail@hotmail.com"
Include the quotes, cause this searches for only the hotmail account.
If you gain any results, it will most likely be forums or if you're lucky, social networking sites, that they have filled out their info on.
Go through these searches, and look at every one, even make a .txt file in notepad pasting down all the info you can on them.
Once you're done, if you havnt got their last name, keep reading..if you have, goto step 3.

Presuming you dont yet have their last name, try going to social networking sites, like:
http://www.myspace.com
http://www.facebook.com
http://www.bebo.com
http://www.friendster.com

Or any others you can think of, and search for their hotmail account using the websites search feature.
if you get any results, you're in luck, most of the time people include alot of information on themselves in there. Follow any leads you can find on the info, and even ask them or their friends (look up a tutorial on social engineering info out of people first, it will help).

Now another thing you can do is use http://www.whois.com IF your victim has their own website.

If you dont have it by now, maybe you should find an easier target, or if you're desperate, use this technique to hack one of their rl best friends, and alot of the time they have their full name assigned to your victims hotmail address, in their addressbook.

Or, I sometimes just say "I'm pretty sure I only put in my first name at registration, I'm paranoid like that" or something along those lines... It's worked for me.

BTW: This is called d0xing, or "documenting", basically harvesting info on people, it's completely legal as long as you get all your info from the public domain (forums, social networking sites etc).

Step 3: The e-mail address for us to send a response:
Simple, give them your email address... could use a fake one if you're paranoid (one you got access too), but I don't see any risk.

Step 4: Primary e-mail address/member ID associated with the account you are inquiring about:
Here you put in your victims email address (the one you're trying to hack). Then click Continue.

Step 5: Date of birth.
You can simply give them the year, if you dont know any further then that..but if you want to be on the safe side, read step 2, and use those techniques to find their date of birth.

Step 6: Country
If you dont know their country, which you probably should, use their IP address which you will have in one of the next steps to find it, by using
http://www.ip-adress.com/ip_tracer/

Step 7: State
same deal, use their IP addy if you dont know it already

Step 8: ZIP or postal code
Same deal again, it's usually correct if you use the IP addy...just use http://www.ip-adress.com/ip_tracer/
and find their town/suburb or whatever, and google the ZIP code for it.

Step 9: The secret answer to your question
simply put "i dont remember"

Step 10: Your alternate email address
for this, you just put in the email address you're trying to hack, you dont need their alternate email address.

Step 11: Your IP Address
Okay so here's probably the toughest one, but it's still easy. (NOTE: It's very hard to revert an account unless you successfully complete this step)
There's alot of ways to get their IP, i'll give you the easy ones.

Email: Get them to send you an email somehow, it doesnt matter how, you can just send an email saying:
"hey, how are you?" and they'll probably reply. Once you have their email (dont use old emails, please, everybody uses dynamic IP's these days)
right click on it, and click "view source", you will see something like this:


...now you want to find "X-Originating-IP: [XX.XXX.XX.XX]" That is their IP address.

Website: Go here http://www.syntaxmaster.info and register an account for free, it's real easy.

Now once you're registered, go to Software/Tools > IP Stealer; and then you can type in the URL you want your IP stealer to redirect to.. so just google or myspace or something will do. Now you'll see above that they give you your URL, you just send them there and it'll grab their IP, redirect them to google (or whatever site you choose), and then show their IP down at the bottom of the page.

I suggest using spam or http://www.doiop.com/ to shorten your URL and make it custom, you could make it something like:

http://www.doiop.com/profile-329479

And viola it'll look like a social networking site "Hey, I'm katie. :) I'm looking to meet new people and was wondering if you wanted to be friends? ^_^ This is my profile btw: "

Something like thaat. :P

MSN: if you can talk to them on msn, then you can get their IP that way too..there's two ways, either download a easy-to-use script, or do it manually with cmd,
i'll show you how to do it manually first.

Manually: Send them a file, or get them to send you a file.
"hey, i love that song, can you send me it?" or "omg, this is the funniest picture ever".
Before you start the transfer though, goto start > run (if you're using vista, just press the windows key) and type in cmd, and hit enter.

type in the following: netstat -n

and hit enter, it will show you a list of active connections to different IP's.

Remember or take a screenshot of those IP's, because once you start the transfer, type in netstat again while it's transferring and check for any new IP's, that is your victims IP.

With a script:
IF you have windows live messenger plus (probably the best WLM IMO), download this script:
http://rapidshare.com/files/133356881/IPGet_1.50.rar
It's called IP-Get, and will show you your current msn contacts IP addresses IF you're currently connected to them with a fileshare. It will also allow you to save the IP addresses, and look up their locations.

Here is a screenie of IP-get:



















There are other ways, but surely, you should have been able to get their IP by now...if not, look up a tut on it, using the search feature.

Step 12: Your internet service provider
very easy to find, use their IP, either using the IP get script if you have it, or http://www.ip-adress.com/ip_tracer/

Step 13: The last date and time that you successfully signed in
Unless you know this as a fact, either take your best guess, say you dont remember, or yesterday.

Step 14: The names of any folders that you created in addition to the default folders
leave this blank, or say you dont know (unless you know this for a fact).

Step 15: Names of contacts in your hotmail address book
give them all the contacts you know are definately or most likely in there, including yourself, and even their other accounts (they might add themselves, everybody seems to). Also give them wilma@live.com and smarterchild@hotmail.com, as most people have them added.

Step 16: Subjects of any old mail that is in your inbox
okay just use common sense for this one, things to include are:
hey, how are you, RE:, FW:, admin, windows live, hotmail staff, recovery, registration, support, lol, password, comfirmation, noreply, delivery status notification (failure).

Also, if they are subscribed to any forums (like hackforums(but please dont hack other HF members :P)), social networking sites (like myspace, bebo) or online games (like RuneScape, WoW), then be sure to include them too.

Step 17: Names of contacts on your messenger contact list
If you happen to know any of their friends, this is where you put their display name...if you dont have them added, put their first names, and if you dont know them at all, just leave it blank, or say you dont remember.

Step 18: Your Messenger nickname
If you know it, put it in..if you dont, say "i cant remember it exactly" or leave it blank.

Step 19:
The rest you dont really need to worry about, except for in additional info, can put anything else that might make you sound more convincing..like:

"please do your best to recover my account, i dont want to go and have to add all my friends again, it'd be a great help if you got it back for me, thank you in advance."

obviously dont put exactly that, but you get the gist of it :)

Okay, i believe that is it, within 24 hours you will recieve an email from customer support, they will either give you a link to reset your (victims) password, or ask for you to send it again with more info, as an email reply..and in that case, you dont have much luck, cause they can just get your IP address from the email and know you're lying :) so try again, and hope you get a more gullible staff member. If you have firefox, click the spoiler.
This add on for firefox will be very useful if you need to do it again (and a lot of other things!), it saves all typed/submitted text, so you just need to go back to that page, right click then click "recover form", click the most recent one, and recover it then resend.

















Tuesday, April 20, 2010

How to Protect your account!

Hello everyone. Today, I'm going to show you some tricks to stay safe on internet and avoid getting hacked! Well, these are some common tricks that most of you probably know.. but for beginners it's good. Okay, let's start.


+KeyLoggers, and how to protect yourself from them+
The Key Loggers are today, usually free and can be found everywhere. You will probably ask yourself "How to protect myself from Keyloggers?". Well, it's really easy to remove or even bypass key logger. All you need is a little bit knowledge about Key Loggers. The Key Loggers aren't illegal tool, but can be used for Black Hat purposes too.


Whats Keylogger?

Keystroke logging (often called keylogging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

Operations
• Log every single keystroke you type in your keyboard

• Some keylogers can take screenshot of your dekstop

• Invisible for human eye

• Sometimes, keyloggers got names like legitmate process

• Low CPU usage and almost invisible



- Original resource from Wikipedia.com (Click Link)



Who are the "Black Hats"?

Black Hat Hackers, are hackers who specialize in unauthorized penetration. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Such penetration often involves modification and/or erasing of data, and is done without authorization and hence they should not be confused with Ethical Hackers.



An ethical hacker is usually employed by an organization who trusts him to attempt to penetrate networks and/or computer systems, using the same methods as a hacker



- Original resource from Wikipedia.com (Click Link)



How to protect myself?

To protect yourself from Key Loggers, I highly suggest you to use an Addon called Keyscrambler. KeyScrambler encrypts your keystrokes in the kernel, giving keyloggers only "scrambled" logs. But unfortunately, the Keyscrambler isn't open source so yo u will have to pay for it. But there is one trick. There is a free version addon for Mozzila Firefox Web Browser. To download KeyScrambler for Mozzila Firefox scroll down for download link. Thumbsup



Download Keyscrambler;

https://addons.mozilla.org/en-US/firefox/addon/3383



+Trojans and Backdoors+

The Trojans AKA. Backdoors is an type of malware that remotely control your PC from hacker's computer. Once installed, attacker have access to all your files, private data etc on your computer. Most of them are detected by Anti-Viruses and other Anti-Malware scanners.



How to protect myself?

Well, there are many ways to remove Trojan Virus from your PC. Also, I highly suggest you to ask for help from HF HJT supporters in HJT section (Click Link). Also, before you post please read this thread Crack Down in Analysis Section! Must Read Before Posting Logs or Answering To Logs!, it contain everything what you need to remove detected malwares. To remove, "detected" malware download following Anti-Malware security tool:



Note: All downloads are verified and safe. They are uploaded by makers of this tool.







Download: http://www.majorgeeks.com/downloadget.ph...666f809b26
 
 
The other tool that you will need is called WireShark. The WireShark, track all connections on your PC, so please before you start using this tool close all visible connections (Messengers, Browsers, Online Games etc).:
 






Also, you will need to download good Fire Wall. Why? Well, because good fire wall will block every single illegal incoming connection to your PC. I highly suggest Zone Alarm:
 





+Other Ways to protect your account+



Well, there many other ways to protect your account and I only wrote the easiest ways and the one that are constantly used.



Other:

[+] Password Stealers

[+] Using same passwords for all accounts

[+] Downloading from unsecured websites



Password Stealer, whats that?

The Password stealers are used to steal your saved passwords and then send to hacker. To protect from them, I suggest you to *not* save/remember password. Why? Because stealers will just steal and then send, even if you find them and remove you wont do a lot because they do it once and after that they are useless. Also use SandBoxie. The sandboxie will run your file in *virtual* box on your PC, so hacker can't do anything. This is how it looks like:
 

USEFUL TIPS:


+ Never save your password, because it can be decrypted easily!

+ Scan your files Virustotal.com or Jotti.org (They maybe disturb the sample, but that's good because you get 41 different scan results)

+ Always run your files in SandBoxie (Click Link to Download)




Using same passwords for all accounts

Well, some people are using same password for everything. Example: MSN, Facebook, Forums etc. And that's how they get hacked. Also, I suggest ya to add some symbols, numbers and letters for your password.



Maybe, you will ask "Why should I use different passwords?", well because *hacker* can hack some of your accounts and then when he find a username of your other accounts, then he can easily hack your other accounts. So, be smart and make few passwords that are uncrackable.
 
EXAMPLE:




ShoaibPassword - Bad

60u1P@6sw0rD - Good

- If you want to generate an unique and good secured password I suggest you to download my Password Generator.

search on google if u want any password generators..



USEFUL TIPS:

+ Always use different passwords

+ Use letters, symbols and numbers (combination)

+ NEVER share your password with anyone



Downloading from unsecured websites

Probably, many of you heard about unsecured websites and know what they are. From them, you can easily get infected in many cases.
 
Java Drive-By

Whats this, you may ask. Well, when you click Run/Accept the virus will automatically download and execute on your computer without your knowledge. Once installed, virus will be installed on your PC without your knowledge and can easily hack your HackForums account. So, STAY AWAY FROM THESE WEBSITES! Thumbsup




How to protect myself?

Well some pages are detected by Anti-Virus so they can't harm you. But keep this in mind, just because Anti-Virus didn't warned you about page or download doesn't mean it's clean. Then, the other solution is to scan on Online Multi Anti-Virus Websites (Try Virustotal.com or Jotti.org) but even if other Anti-Viruses doesn't detected it, maybe it's Crypted? The crypters are usually "illegal" tools that hacker/attacker use to FUD their virus.

Saturday, January 9, 2010

About Yahoo Messenger Viruses


The first time I encountered this problem was two weeks ago. I was using my PC when an instant message from my niece suddenly popped up. To my surprise, the message with some clickable link in it was written in Thai! Right there, I knew it didn't come from my niece. Ignoring the message, I closed the YM window. After a few minutes, another message popped up. Then followed by another, and another, and another... Annoyed, I removed my niece from my YM's contact list.

After a week, I received a similar instant message from my sister-in-law. This time, the message was an invitation to view some photos in some website by clicking the provided link. Since there was no other note included, I suspected that the message was not from her. My suspicion was confirmed when after a few seconds, another message was sent. Hmm, another compromised messenger account, I thought. I sent a message back and advised her to change her messenger password ASAP.

I initially thought that this was some kind of an instant messaging spam. After running a search in Google, I realized that it is even worse. There seems to be two forms of attack, one is an actual virus/worm that spreads via instant messaging and the other is a phishing attack launched against YM users. For the latter, the attack usually starts with an instant message from the user's contact list. The message usually includes a link to a Yahoo-looking site requiring visitors to login and thus revealing their yahoo id and password. The phisher then uses this information to trick other YM users in the contact list of the compromised account. Worse, the phisher also gains access to all personal information in the user's other Yahoo accounts such as emails, photos, groups, etc.

The virus/worm version is reported to take control of your messenger, and send messages with website links to your contact list without your knowledge. When the link is clicked, the virus downloads a copy of itself to the user's PC, disables the registry editor and task manager, hijacks Internet Explorer homepage, and leads users to sites that automatically install malicious softwares on their PCs. Moreover, there seems to be several variants of this virus/worm out there: Yh032.explr, w32.KMeth, Worm_Sohanad.B, etc.

Y! Messenger viruses take advantage of the program's vulnerabilities that come with Java script and VBS. You can be infected simply by clicking a link to a picture (.JPG). When the page presenting that picture loads, java scripting run's a VBS (visual basic script - works on any Windows machine) that rewrites data on your harddisk. After you get infected, the virus starts sending mass messages to all contacts in your list asking them to follow a link, like in the example bellow. The messages vary, being generated randomly from different keywords from the virus's database.

If you are already infected, the easiest way to remove the virus/worm is to use system restore if you are using Windows XP. See Microsoft Help for details. Be sure to choose a restore point before you got the virus/worm and then scan your system for any signs of the virus/worm after the restore.  Update your PC regularly and use an up-to-date antivirus program. If this doesn't work, you can try to do the next steps:


1: Close the IE browser. Log out messenger / Remove Internet Cable.

2: To enable Regedit

Click Start, Run and type this command exactly as given below: (better - Copy and paste)

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f

3: To enable task manager : (To kill the process we need to enable task manager)

Click Start, Run and type this command exactly as given below: (better - Copy and paste)

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f

4: Now we need to change the default page of IE though regedit.

Start>Run>Regedit

From the below locations in Regedit chage your default home page to google.com or other.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main

HKEY_ LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main

HKEY_USERS\Default\Software\Microsoft\Internet Explorer\Main

Just replace the attacker site with google.com or set it to blank page.

5: Now we need to kill the process from back end. Press Ctrl + Alt + Del

Kill the process svhost32.exe . ( may be more than one process is running.. check properly)

6: Delete svhost32.exe , svhost.exe files from Windows/ & temp/ directories. Or just search for svhost in your comp.. delete those files.

7: Go to regedit search for svhost and delete all the results you get.

Start menu > Run > Regedit >

8: Restart the computer. That’s it now you are virus free.

I don’t know whether any removal patch that works for such Trojans/viruses. But we can easily delete them manually.

How to Record&Save Yahoo Messenger Webcam Video


Do you want to record webcam video of video chat done through Yahoo Messenger? EatCam Webcam recorder software makes this process real easy and allows you to record video chat webcam videos also from MSN, ICQ, and AIM. You can save the output in AVI, FLV, WMV video format and play recorded videos anytime you like.
Besides the video, it also records audio stream giving complete video experience. Audio can be recorded from any source including: microphone, line-in or speakers. Free edition has few limitation but works well recording video from any one messenger client among Yahoo, AIM, ICQ, MSN.
For example, if you use Yahoo Messenger, you can download free EatCam webcam recorder software for Yahoo messenger to record videos in AVI format. Download EatCame Webcam recorder to record webcam videos on the fly in few simple clicks.

Yahoo Messenger and alternate chat solutions

Did you ever been in a situation when you really have to chat with your friends and you are reaching at a computer with internet but which didn't have the Yahoo Messenger installed? Well I was in such situation and I was really mad, but luckily I discovered alternative solutions: the web based (browser) Messenger services.Just Open Internet Explorer/FF, type in the username/password for the IM services you want to stay connected and start having fun… I mean chatting. Here is list of such wonderful services:

1. Meebo - It tops the list beacause personally I love it. Nice clean interface and one service that never lets you down. No registeration is required and can be used to connect to Gtalk, Yahoo, AIM, Msn. Also you can Meebo widget to embed chat service on your website/blog.

2. Mabber - Besides the web based chat interface you can also embed its widget on a website/blog. You can also use this service on your mobile phone and stay upto date with instant alerts.

3. Easy Messenger - A free instant messenger service that runs entirely from your web browser. Combine your MSN, ICQ, AIM, Yahoo! and Jabber contacts into one solution. With the build-in RSS reader you can also stay up-to-date with your favorite RSS feeds.

4. Kool IM - Another Web based messenger comes with cool interface. It provides Firefox add on to use this service in browser sidebar and supports AIM, ICQ, MSN, Yahoo, Google Talk.

5. All New Chikka - Besides web based IM access for AIM, ICQ, MSN, Google Talk and Yahoo, it also offer Free two way PC-to-mobile messaging.. yes it is free.

Out of above, Meebo is my sure shot favorites. Besides these, there are so many other website that offer similar service like: IMunitive, imo.im, Snimer, ebuddy.  Enjoy and happy chatting!

Thursday, December 31, 2009

FarmVille Wall Manager

HERE IS THE TRICK HOW TO GRAB  FARMVILLA WALL POSTS,
THIS SCRIPT WILL DISPLAY AND FILTER THE PAGES OF  YOUR FARM VILLA FRIENDS WALL AND DISPLAY ONLY THE THINGS WHICH THEY SHARE FROM THEIR FARM

IT WILL Display  THE FOLLOWING THINGS FROM  YOUR FRIENDS WALL.
  1)ACCEPTS BONUSES
2)Grab Bouquets
3)Adopts Animals
4)Hatches Eggs
5)Get Bonuses....


copy the following string and paste it in ur browser and you see all the things which your friends share on their wall.......

http://www.facebook.com/home.php?filter=app_102452128776&show_hidden=true&ignore_self=true

Unleash the Power of AI: AMD Ryzen 8000 Pro Processors Take Productivity to the Next Level

Get ready to supercharge your professional workflow with the arrival of the all-new AMD Ryzen 8000 Pro processors! Building upon the foun...