Monday, August 30, 2010






Thursday, August 26, 2010

Converting Win XP SP2 to SP3 with no installation..

Theses days the technology is changing very rapidly and it took no time while we get new patches ans supplement for several software, though these are always in the favor of the end user but sometime a lot of us just don’t want to implement these latest features. Like me, a few days back have bought a new game CD which requires windows SP3 installed to run it but I just don’t want to do so. So should i left it or any alternatives… Yes I have found one… described below

As for most of the programmes they usually look into the info or the registry file locate the software and patches a PC have and by that means their performance decided so here is the trick to fool such programes which requires Windows XP SP3 patch by altering the Windows XP SP2 version info. To do so go to windows run command (Using windows key +R) and then, type regedit to open Registry Editor. So now you have registry editor opened then only browse to the following key

HKEY_LOCAL_MACHINE\SYSTEM\ CurrentControlSet\ Control\ Windows

and modify “CSDVersion” from “0×00000200” (SP2) to the Windows XP SP3 value of “0×00000300” and reboot

This is the simple trick which will bypass the information so that any program requiring SP3 (and you only have Sp2 ) would work so now enjoy all the gaming fun as I do don’t forget to subscribe and enter your valuable opinion in the comments section

Double Click opens up a new explorer window fix it using registry

Are you facing up the similar situation while you double click on anyone of your drives and it opens up in a new window. Then the following registry fix might help you to came up with a solution.

Though this problem generally occurs with a virus infection but whatever is the case you need to only modify the registry settings as per the steps given below:

1. Open the run window using WINDOWS + R key and type regedit.exe to open the registry editor.
2. Locate the key : HKEY_CLASSES_ROOT/Directory/Shell

Double click on the default value on right and set it as “none”.
Repeat the procedure for the key HKEY_CLASSES_ROOT/Drive/Shell.

Hope the above solution will work for you if it fails however you can also try the below solution

Open start menu and click Run.
Type regsvr32 /i shell32.dll
Click Ok and if this message shows “DllRegisterServer and DllInstall in shell32.dll succeeded” that means the problem is solved.

Wednesday, August 25, 2010

Split GIF Animation Images into Separate Images

GIF images looks good to the eyes as the reason behind those animation images is that it is the combination of several static images that gives the impression of animation. Several single images are combined into one to form one Animated Gif Image
But what if you want certain frame out of the many frames in the GIF image? Yes you can split or break the single GIF animated image into its constituent images to have that desired single image.

There are many ways to do this but the easiest and fast way of splitting the GIF image into several single images is using this free tool called GifSplitter. Gif Splitter can break GIF animation down into individual image frames. Then, you can select any frames of the gif animation, and modify them as you like.

GifSplitter is a fast, free and portable tool that is very small in size as well. Just select the GIF image to split, choose the output directory and click the Split Now button. The individual frames would get saved in the selected directory.

Download GifSplitter

Tuesday, August 24, 2010

Lafangey Parindey Download

Released : Aug 20, 2010


Genre : Romance 
Starcast : Neil Nitin Mukesh, Deepika Padukone, Piyush Mishra
Desc : A dash of style with loads of attitude and a hunger to reach the stars, Lafangey Parindey is about a group of youngsters living in the backstreets of Mumbai. It is an unusual love story of Nandu (Neil Nitin Mukesh) and Pinky (Deepika Padukone) whose path to love is paved by friendship, grit and hope. He is wild. He is born to fight. He is One-Shot Nandu. For the raw, champion street fighter, one-shot is literally what it takes. Absolutely wild, fierce, and hungry to win, this fighter takes boxing to a new level by knocking down his opponents- BLINDFOLDED. Needless to say, One-Shot lives life on his own terms and is a local hero amongst his friends. But all that soon changes, when he meet Pinky Palkar. She is blind. She is born to fly. She is Pinky Palkar. A unique girl, a powerhouse of talent! On one hand she works at a regular, boring 9-to-5 job at a mall but on the other hand, she is a kickass dancer on skates! Strong headed, talented and fiercely ambitious - these traits make up Pinky Palkar`s deadly personality. Her life`s ambition is only one - to riseabove all the `losers` living in her locality and carve a niche for herself.
Duration : 1:49
Size : 130mb
Click Here To Download Part 1  63.4 MB

Click Here To Download Part 2  66.3 MB

Saturday, August 21, 2010

How to block websites without using any software

So here is the way how to block any website on your machine without using any software in window XP.
We do this by editing the Hosts file in our machine. Hosts file is file that contains IP address to hosts name mappings. When ever we open any website the host name to IP address mapping takes place. Like if you type www.google.com and hit enter then, first the machine will resolve the google.com to its IP address and after that it makes connection to google using its IP address. This is called name resolution and it is done by DNS(Domain Name Server). But in case of window OS the Hosts file is prefered to do mapping, and if no mapping is availabel in Hosts file then mapping is done by DNS. This means the OS will first look for mapping in Hosts file rather than directly making a DNS query.
So now we edit Hosts file so that mapping takes place according to ourself, what we define.
First of all you need to edit the Hosts file in your machine. First make backup of Hosts file. The Hosts file is situated at :
C:\WINDOWS\system32\drivers\etc
if C:\ is your installation directory.
You will see there will be a file named as Hosts.
Open that file in wordpad.
now type following at end of file, create new line at last:
127.0.0.1 Website name u want to block
Save the file and exit.
for example if I want to block orkut.com then I type following :
127.0.0.1 orkut.com
Don't forget to enter space between 127.0.0.1 and orkut.com in above line.
How it works ??
127.0.0.1 is a loopback address. This address is used to check status of TCP/IP in a machine. This is the address that is used to connect to your own machine. For eg:
Open CMD and type the following & hit enter:
ping 127.0.0.1
you will get 100% success, because you are pinging your own machine. If you don't get success then it means there is problem with your TCP/IP settings or your OS have some problems.
Now in above example we are telling to Hosts file that, the IP address of orkut.com is 127.0.0.1 ,
so now when you type orkut.com in browser, your browser will ask Hosts file about IP address and as we have mapped orkut.com's IP to 127.0.0.1 so browser will redirect you to 127.0.0.1.
Thus the website will no open. ;-)
This trick can be used in other way too. Suppose if u try to open yahoo.com , but google.com opens..!!! if u want this to happen then u can try this.
put this line in hosts file as explained above:
74.125.43.104 www.yahoo.com
when u try to access yahoo.com you will be redirected to google.com ;-)
This works as same as I have described above.

How most keyloggers work ?

Most of the keyloggers capture the data before it is written to any application like notepad, browser etc.They use different techniques like hooks, polling etc.
In Polling technique the keylogger keep inquiring the OS that, Has any key been pressed ? if any key is pressed it is then notified to the keylogger. It is passive method.
In Hooks technique the keylogger is informed in advance when data is to be written to application. Which means before your data is written to notepad or email or any other application the keylogger gets the data & it is logged.
Keylogger captures data by features like:
1. Screen shots:
Some keylogger log data by taking screen shots of the pc. They take photos of your screen – usually just around your mouse – either at periodic intervals, or every time you do a mouse click. They programattically take a screenshot of the control (button, text box etc) that is under the mouse using Windows API commands.
2. Mouse Position logging
Each time you click, the coordinates of your mouse are captured by the keylogger. As everytime the onscreen keyboard opens at same position so it is easy to guess the key pressed by knowing the coordinates at which the mouse was clicked.
3. Field scraping :
Field scraping is a term we use to discribe a technique used by quite a few commercial keyloggers to grab your passwords directly from the password field.
How does it work? Using Windows API commands, programs can ask Windows for a list of controls in a program (like buttons, text boxes and picture controls). From this, they know about the text boxes in the program. They then ask Windows whether the text boxes have a password mask (ie. if password is written in ***** form). If yes they can then even get the password in plaintext form.
4. Clipboard logging :
It is a common feature of keyloggers. Whatever you copy to the clipboard is stored, it can be captured by the keylogger. What ever data you cut , copy , paste it is recorded in clipboard and it can be captured by keylogger too.
I recommend you to create your own keylogger for better results. Use language like Visual Basic, C++ , Assembly etc.
Here is list of some keylogger available on internet:
1. Email Keylogger 

2. Revealer Keylogger 
3. Handy Keylogger
5. Powered keylogger
6. ELITE keylogger
7. Quick keylogger 
8. Spy keylogger 
9. Perfect keylogger 
10. Invisible keylogger 
11. Actual spy 
12. Spytector ftp keylogger 
13. IKS software keylogger 
14. Ghost keylogger

Hack Email Through Social Engineering

This topic is rarely discussed because,it is a non-technical type of hacking. But believe me it has great importance.
What is Social Engineering ?
Social engineering refers to the method of influencing and persuading people to reveal sensitive
information in order to perform some malicious action. It is used to gather confidential
information, authorization details, and access details by deceiving people and manipulating them.
Thus in this we intentionally ask the victim , such type of questions so that we can guess his/her
confidential information by the answers of those questions. The social engineering can be seen in movies like oo7, Italian Job, Catch Me if you can, Bourne Identity & other series, Eagle Eye, Hackers, Hackers 3 Antitrust etc.
One of the greatest advantage of Social Engineering as compared to other attacks is that there is no software or hardware to halt it. It can only be halted by the understanding power & IQ
of victim.
Types of Social Engineering :
Social Engineering can be broadly divided into two types:
1. Human-based
2. Computer-based.

Human Based Social Engineering :
Human-based social engineering involves human interaction in one manner or another. It means that it will involve the attacker to perform some activities manually or physically.
The Human based social engineering is performed by following ways:
1. In Person :
Attackers might try to visit a target site and physically survey the organization for
information. A great deal of information can be gleaned from the tops of desks, the trash, or even phone directories and nameplates. Attackers may disguise themselves as a courier or delivery person, a janitor, or they may hang out as a visitor in the lobby. They can pose as a businessperson, client, or technician. Once inside, they can look for passwords on terminals, important papers lying on desks, or they may even try to overhear confidential conversations. Thus attacker is like a rouge in this attack.
For eg: Attacker can enter an organization by pretending to be an Air Conditioner mechanic. As A/C are mostly implemented in organizations. Now he can freely survey the organization's structure and even if he gets a chance he install keylogger or trojan in of the machine. Other example is the attacker may possess himself as a company employee and make call to company's technical support to eilcit information.
2. Third-party Authorization :
Another popular technique for attackers is to represent themselves as agents authorized by some authority figures to obtain information on their behalf. For instance, knowing who is responsible to grant access to desired information, an attacker might keep tabs on him/her and use the individual’s absence to leverage access to the needed data. For eg:
let Mr. pr3dat0r be the Networking and Security Admin of Zenia Company. Now he will only
have permission to gain access to information related to company's network. Let miss. Xena
be pr3dat0r's junior network admin and all information about network is given by her to pr3dat0r.
Now consider an attacker Crypto wants to gain access to network information of zenia company. So what he will do this ; Crypto will keep recording the daily routine of Mr. pr3dator, and try to
know how he works & how he gets information about Network of company. Now when Crypto knows all the working schedule of pr3dat0r, so now whenever mr. pr3dat0r will be not present in office, Crypto will goto Xena and say politely "Hi, I am MR. Crypto from your ISP, I have an appointment with MR. pr3dat0r and he asked me to collect the Network Log from you." Now when xena learns that Crypto is reffered by pr3dat0r , she will soon hand the n/w Log to him. Usually it has been seen that junior employees don't ask much questions to the persons who are reffered by their seniors employee.
Then what, after Crypto gets Log & he flee away.
3. Tailgating :
Usually this attack works in big organization, having enormous emplyees.An attacker, wearing a fake ID badge, enters a secured company's area by closely following an authorized person through a door requiring key access. An authorized person may not be aware of having provided an attacker access to a secured area. The attacker usually says following words to an authorized person who is having ID:
“I forgot my ID badge at home. Please help me...”
An authorized person provides access to an attacker by keeping the secured door open.
Thus by following the authorized person closely the attacker will enter the secured areas of company, as attacker follows the authorized person closely so it is called Tailgating.
4. Shoulder Surfing :
This attack is very common among the students in school & colleges. It is also very common in cyber cafes.
In this attack the attacker silently stands stealth behind the victim at some distance and carefully watches the keystrokes that are hit by victim when, victim is entering password or any other such sensitive information during surfing. for eg: Here is how I one day used this attack to get password of Admin account of a machine in my internet lab at college, usually students are provided limited account at Labs. So, I went to the Lab assistance and said him that "Sir, I want to install Turbo C++ in a machine in this lab so I could practice here, because I don't have laptop or PC." So, he came along with me and now he was going to login to Admin account of that
machine. I stood little away and watched the keystrokes. How ever I was not able to see all keystrokes. But soon after he went I easily guessed the password by knowing the keystrokes that I had seen. Then I owned that machine. However shoulder surfing is a risky attack, because you can be caught red hand. But I feel fun in risks. ;-)
The other great example is that some boys keep standing near the STD or Phone Recharge shops, & when some sexy girl comes there to get her cell recharged those guys overhear her contact number when she is telling to shop keeper. ;-)
Other place where this attck take place in large amount is ATM, when someone is withdrawing cash from ATM the attacker usually sees the code entered by the person, and if that person throws the slip that ATM machine prints out after any transaction then attacker picks up & read that slip to know how much money that person got. After that it is up to attacker how to obtain that ATM card. You should better know how to get ATM card from owner because I can't teach you martial arts in this topic. ;-)
5. Dumpster diving :
In this the attacker basically searches the garbage of company to gain information. The attacker will search the printer thrash bins, dust bins, filled with papers that contain information about the company. Usually this type of attack provides following information:
Employee name, employee ID, Phone numbers, email ID, FAX, Financial information.
So this is the reason why many banks usually burn the dumps before they throw them.
Now for eg: If u get some employee's contact number by dumpster diving, now you can call him/her in middle of night and ask him/her to work for you by giving greed of money. Usually
disgruntled employee will agree soon.

Computer Based Social Engineering
Computer based social engineering is implemented by using software or programing applications like e-mails, Virus, trojan, Chatting, etc. Following are the ways to perform Computer based social engineering:
1. Pop-up Windows :
In this type of social engineering, a window appears on the screen informing the user that he/she
has lost his/her network connection and needs to reenter his/her username and password. A
program that the intruder had previously installed will then email the information to a remote
site. This type of attack is mainly done by using virus and trojans. The spyware can aslo perform this type of attack. The spyware will pretend to be a antivirus and will pop up a message to user that his/her machine contains virus & in order to remove them , it needs username & password etc. When user enters those information it will then give a fake reply like virus removed and in backend it will send information to attacker.
2. Spam & e-Mail Attachments :
In this attack the user sends a email to victim in order to get information.for eg: The mail will declare that you have won a lottery of 20,000$ and then it will ask you to goto some link, where then it will ask you about your confidential information like bank account details so that delevery can be made. Attacker can aslo send an attachment along with email & that attachment can be virus or trojan.for eg:“Anna Kournikova” worm. Social engineers try to hide the file extension by giving the attachment a long file name. In this case, the attachment is named AnnaKournikova.jpg.vbs. If the name is truncated, it will look like a jpeg file and the user may not notice the .vbs extension.
3. Chatting/Instant Messaging :
Now a days it is quite popular medium of communication. People of almost all ages chat online.
Usually it is very popular among the teenagers. Performing social engineering via chatting is quite easy.
Attacker just need to chat with someone and then try to elicit the information. As chatting is informal way of communication which means attacker is not directly communicating with the person. Now due to this attacker can even tell lie to other person about his/her identity etc. Because victim can't see attacker.(without webcam)
for instance:
Usually what attacker do is , he/she chats with boys by behaving as a girl & vice-versa. By using fascinating picture during chatting attacker can lure any one. Display picture usually works like bait. Then slowly attacker will ask certain questions by which he/she can elicit information about the victim. And believe me this method is very dangerous because you would not even know when you got victim to social engineer.
Me and my friends tried this social engineering many times.
I tried this technique many times, & you may not believe me that I easily go the password of e-mail id, by simply asking the victim "What is ur password ?"
But for this you first need to create deep trust with victim then make ur final attack on victim.
Mainly it depend upon you how clever & smart you are and how good in communication & in manipulating the answers.
4. Malicious Websites :
This involves a trick to get an unwitting user to disclose potentially sensitive data, such as the
password used at work. Some methods include using advertisements that promote and display
messages offering free gifts and holiday trips, and then asking for a respondent’s contact email
address, as well as asking the person to create a password. This password may be one that is
similar, if not the same, as the one that the target user utilizes at work. Many employees enter the same password that they use at work, so the social engineer now has a valid username and
password to enter into an organization’s network. Now a days I have ssen many websites ask you to use your e-mail id as Username while registering a new account. Then it ask to create a new password.
Now some people get fooled they enter the same password that they are using with that email account..!!
Beware about this.
5. Insider Attack :
60% of attacks in organization are done by insiders. In this attack the attacker uses some other person to implement the attack. for eg:
A competitor can inflict damages to an organization by stealing sensitive data, and may eventually bring down an organization by gaining access to a company through a job opening by sending a malicious person as a candidate to be interviewed, and—with luck—hired.
Other attacks may come from unhappy employees or contract workers. It takes just one
disgruntled person to take revenge on a company by compromising its computer system.
How to defend against social engineering ?
As I told you before that there is no software or hardware to halt social engineering.
The only one way to avoid it is by using your own brain. Try to think twice before you give any answer or information to any person, because the word lie sits exactly between the word believe..!!

Hacking E-mails

E-mail hacking means to get the login credentials of the e-mail account of the victim.
The email hacking can be done by using following techniques :
1. Phishing/Using fake login pages
2. Social Engineering
3. Using Keylogger
Now I explain you all these techniques briefly :

1. Phishing/Using Fake login pages :
In this technique the attacker usually creates a Fake login page of a website and send this page to victim. When victim uses this page to login, then all login details that are Username and password are sent to Attacker. The Attacker usually uploads that fake page and sends the link to that page to Victim. The link is mainly sent via e-mail, it can be sent in other means too like during chatting. Usually Attacker fools the victim by creating some story so that Victim clicks on that link. Usually the linked sent to victim is scrambled to hide the detail and to fool the victim. Scrambling is done by using hexadecimal characters in URL link. Basically scrambled URL is used along with some javascript code snippet. The attacker send the javascript code which contains scrambled URL , and attacker asks victim to put that javascript code in address bar of his/her browser. Now when victim enters that javascript code in his/her browser and hit enter then, the victim maybe redirected to that scrambled URL address or it may also steal cookie from victim's machine and sent to attacker, it basically depends what function is defined by attacker that his/her javascript code would perform.
Here is an example of scrambling:
Consider a sample url like: http://www.fakewebsite.com
now this simple URL can be scrambled as following representation :
ht%20%2B%20tp%3A%2F%2Fwww.fakewebsite.com
Now lets us break this scrambled URL.
First let us consider first part ht%20%2B%20tp ---------------> (eq. 1)
in this %20 is basically a hexadecimal character that is for Space%2B is for + sign. And + sign is the addition operator it will combine two strings or letters. Now if u replace %20 with space & %2B with + in above equation(eq 1.) we get :
ht + tp
and then after '+' operator will combine it to http hence it is the protocol used to access webpages.
http ------------------------------>(eq 2.)
Now let us inspect the second part of scrambled URL.
%3A%2F%2Fwww.fakewebsite.com ------------------------>(eq 3.)
Here %3A is hexadecimal character that represents a semicolon (:) , and %2F is hexadecimal character that represents a slash (/). Now if u replace %3A with (semicolon) and replace %2F with / (slash) we get following result :
://www.fakewebsite.com --------------------------->(eq 4.)
Now by combining eq. (2) and eq.(4) we get following result:
http://www.fakewebsite.com
Thus we learn that how ht%20+%20tp%3A%2F%2Fwww.fakewebsite.com converts tohttp://www.fakewebsite.com . So now you can understand how an Attacker can scramble the URL to fool the victim and hide original URL.
Below is a chart where u can see all hexadecimal values of characters. :

How Attacker attacks ?
Attacker may send victim a mail that you have won a lottery please click on this link to claim the prize. As soon as victim clicks the link the, victim is directed to fake page created by attacker. This page requires victim to login in order to complete further procedure. So victim enters his/her username and password and gets hacked. Attacker may also try to ask victim to
enter Bank account details. So, this is the main way how Fake pages work.
Sometimes Attacker may ask victim to download the fake page from the attachment from email and ask to login through it.
Creating Fake pages ?
I am not going in detail ok.
Fake pages can be created easily. You need to know HTML. The attacker edits the source code of legal/genuine webpage and then creates fake page. Source code can be easily seen by using view sourcecode option of browser. You can save any webpage and then use tool like Macromedia Dreamweaver to edit webpages easily. Basically the login pages contains GET or POST method to retrieve data entered by the user during login process. This data is then sent over the network to the server. So, now what Attacker does is he/she edit the GET/POST filed and redirect the data to go to his/her fake page rather than let it going to genuine/legal server.
You don't need server for this , there are many web hosting sites that can provide you this service for free, google them. Search for Free web hosting sites.
If you feel that creating fake webpage is quite complex then you can get ready made fake pages from internet. Search for free fake page download in google.
Don't forget to use scrambling of URL to foll the victim.

How to change MAC address in Windows

So here is way to change the MAC address of your NIC (Network Interface Card). Basically there are 2 methods to do so depending on the type of NIC you have. If you have a card that support Clone MAC address, then you have to follow the below given steps:
First goto command prompt and type in ipconfig /all note the MAC address value.
Now :
1. Go to Start->My Network Places
Now on left side click on View Network Connections.
2. Right click on the NIC you want to change the MAC address and click on properties.
3. Under General tab, click on the Configure button
4. Click on Advanced tab
5. Under Property section you should see an item called Network Address or Locally Administered Address, click on it.
6. On the right side, under Value, type in the New MAC address you want to assign to your NIC. Usually this value is entered without the - sign between the MAC address numbers. for eg enter: 005544000000
7. Goto command prompt and type in ipconfig /all note the changes to MAC address value. If the changes are not in affect, then use the Second method.
8. If successful, reboot your machine.


Method 2:
This method requires editing of Windows Registry. Make a backup of your registry and store somewhere safe.
a. Goto command prompt and type ipconfig /all and
I. Record the Description for the NIC you want to change.
II. Record the Physical Address for the NIC you want to change. Physical Address is the MAC Address
b. Goto command prompt and type net config rdr hit enter key
c. Remember the number between the long number (GUID) inside the { }.
for eg: {1A9324CC-BFD7-4920-702A-DB281838637C}. You can copy and paste it to the Notepad, for future reference.
d. Go to Start -> Run, type regedt32 to start registry editor.
e. Do a backup of your registry in case you get fucked up the following steps.
f. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318} Double click on it to expand the tree. The subkeys are 4-digit numbers, which represent particular network adapters. You should see it starts with 0000, then 000100020003and so on...
g. Go through each subkey that starts with 0000. Click on 0000, check DriverDesc keyword on the right to see if that's the NIC you want to change the MAC address.
The DriveDesc should match the Description you recorded from step (a.-I.) above. If you are not 100% sure about the DriverDesc, then you can verify by checking if the NetCfgInstanceID keyword value matches the GUID from step (c).
If there is no match, then move on to 0001, 0002, 0003, and so on, until you find the one you want. Usually 0000 or 0001 contains the first NIC you installed on the computer.
h. Once you selected the subkey , check if there is a keyword NetworkAddress exist in the right side of the window.
I. If "NetworkAddress" keyword does not exist, then create this new keyword by following the below steps :i. Click on the drop down menu Edit -> Add Value.
ii. In the Add Value window, enter the following value then click OK.
Value Name: = NetworkAddress
Data Type: = REG_SZ
iii. String Editor window will pop up at this time.
iv. Enter the new MAC address you want to modify. Then click OK.
(There should not be any - sign in this address. Your entry should only consist of 12 digits
II. If NetworkAddress keyword exists, make sure it shows the keyword type is REG_SZ, and it should show as NetworkAddress:REG_SZ: This keyword might not have a value at this time.
i. Double click on the keyword NetworkAddress and the String Editor window will pop up.
ii. Enter the new MAC address you want to modify. Then click OK.
(There should not be any - sign in this address. Your entry should only consist of 12 digits.)
j. There are 2 ways to make the new MAC address active. Method I does not require a system reboot:

Method IGoto Start->Setting->Control Panel, and double click on Network Neighborhood.
WARNING: Make sure you understand that you will lose the network connection after completing step "ii." below, and if you have a DHCP client, you will get a new IP address after completing step "iii."
i. Select the Network Adaptor who's you just changed the MAC address.
ii. Right click on the selected Network Adaptor and click Disable. Verify the status column for this adaptor changes to Disable"
iii. Right click on the selected Network Adaptor and click Enable. Verify the status column for this adaptor changes to Enabled.
iv. If for any reason it cannot be disabled or re-enabled, you have to reboot your system to make the changes effective.
II. Reboot your Windows system.
k. After your machine is rebooted, go to command prompt, type ipconfig /all to confirm the new MAC address.
If MAC Address changes does not work :
If for some reason the MAC address cannot be changed using method 2, make sure you restore the registry setting by following :
Restore the registry you just backed-up to get your system back to the original state.
Restoring the true MAC Address :
A) Remove the entry you added:
1. If you followed Method 1, then go back to the advanced properties window and remove the entry you add.
2. If you followed Method 2, then remove the NetworkAddress keyword you added in the registry.
B) Use step (j) above to activate the change you make.
C) Once rebooted, go to command prompt, type ipconfig /all to confirm the original MAC address...

Tracking stolen Laptops and PC

If your machine gets stolen or misplaced you can track it easily. There are tracking softwares available that can perform tracking of your machine (laptop/pc/notebook etc.).
How this tracking software works ?
This software is installed on the machine. It is invisible and stealth like keylogger or rootkit etc. Now if some attacker steals your machine you just need to inform the company who's product you have installed on your machine, rest of work will be done by the tracking software company.
Now whenever the attacker will connect to internet via any means using your machine, that tracking software will send the information like IP address to a central server that is the server of company who's product you have installed on your machine. Now the company got IP of the attacker it can trace its geographical location easily. If attacker connects to internet via dialup method then telephone number is also sent to server.
After it is confirmed that this is stolen machine some tracking sofware even make the whole data encrypted on the HDD and can even deny that laptop to communicate via internet anymore.
But here is drawback of tracking software :
The main power of this software is its weakness too.
If attacker uses some techinque to hide his/her actual IP by using proxy or any other means then your machine can't be traced.
So, next time if you steal laptop or PC better use proxy to connect to internet or format the HDD, else you can be in jail. ;-) lol
Here is list of some tracking software:
Ztrace Gold

CyberAngel

Computrace Plus

XTool Computer Tracker
Hope you find this information useful.

Thursday, August 19, 2010

Ardamax Keylogger Tutorial(Hack all keystrokes on remote pc)

Today i will tell u how to hack ur friends pc keystrokes using ardamax keylogger.Ardamax Keylogger is an invisible Keylogger  that captures a user's activity and saves it to an encrypted log file.
The log file can be stored as a text or web page. Use this keylogger to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids.
Note:if any body crypt the remote installation file..I will publish free add for 1 month to that person in my blog.(adult content is not allowed).it means antivirus does not detect the file...
just follow the following steps :
First download ardamax keylogger 
1. Once you've downloaded and installed it, you'll see a little notepad icon in your taskbar.
[Image: step1111.jpg]
2.Now right-hand click it and click 'Enter registration key...'.
[Image: step210.jpg]
Name: Nemesis
Serial: YKPJVSDPITIUTRL
3.Copy/Paste Registration name and Registration key from Serial.
[Image: step310.jpg]
4.Once done click 'Ok' and you should get a pop-up saying 'Registration code is accepted. Thank you for registration!'
[Image: step410.jpg]
II. Creating the Keylogger Engine:
1. Now your going to make the Keylogger Engine (The thing you give to your victim). Click 'Remote Installation...', 
[Image: step514.jpg]
click 'Next'
2.Now,you should see this.
[Image: step613.jpg]
3.If you want to bind Keylogger Engine with another application or file click the box that says 'Append keylogger engine to file or another applitacion' and browse file or applitacion that you want to bind it with.
[Image: step710.jpg]
4. Now click 'Additional components' and tick 'Installation Package Bilder' like done in the screenshot.
[Image: step810.jpg]
5.Now you should be at 'Invisibility', make sure all the boxes are ticked, then click 'Next'.
[Image: step918.jpg]
6. Now you should be at 'Security', click 'Enable' and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click 'Next'.
[Image: step1010.jpg]
[Image: step1110.jpg]
7. Now you should be at 'Web Update', un-tick 'Check for updates' and Click 'Next'.
[Image: step1210.jpg]
8. Ok, you should now be at 'Options', use setting like done in screenshots.
[Image: step1310.jpg]
Btw you can make your keylogger to self distruct any time you like.
[Image: step1410.jpg]
9. Ok, now you should be at 'Control', click the box that says 'Send logs every', now make it so it sends logs every 20 minutes, then where it says 'Delivery', un-tick 'Email' and tick 'FTP', then where it says 'Include' un-tick 'Screenshots', now un-tick the box where it says 'Send only if log size exceeds', once thats done, it should all look like it does in this screenshot:
10. Now you should be at 'FTP', create a free account athttp://www.drivehq.com/secure/FreeSignup, then make sure your at 'Online Storage', then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone), Now on your FTP on Ardamax Keylogger, where it says 'FTP Host:', put this:
Code:

FTP.DriveHQ.com
Now where it says 'Remote Folder:', put this: Logs
Now where it says 'Userame:' and 'Password:', put your DriveHQ username and password, then it should look something like this:
[Image: step1610.jpg]
Now Click 'Test' and it should pop up like this:
[Image: step1710.jpg]
Once done, do NOT change your DriveHQ password or rename/delete the folder called 'Logs', if you do, the logs will not come through.
11. You should now be at 'Control', un-tick 'Enable Screenshots Capturing' then click 'Next'.
[Image: step1810.jpg]
12. Now you can change name and icon your Keylogger Engine as you want it to look like.
[Image: step1910.jpg]
[Image: step2010.jpg]
and click 'Next'.
13. Now you should see this.
[Image: step2110.jpg]
just click 'Finish'.
14.After you click 'Finish' you should see this:
[Image: step2210.jpg]
Click 'Ok'
Note:The remote Installation file is detected by antivirus because it is a stealer...
 
 

Blogger