Friday, 11 May 2012


 LETS LEARN ABOUT HACKING AND CRACKING PAL.






Free Internet with Airtel Hack:
THINGS U NEED:
–>PC
–>Serial/USB cable/Bluetooth dongle
–>Any Browser (I suggest Opera as we can browse both wap and other sites)
METHODS :
—>Activate Airtel Live sending a message MASALA ACTIVE to 121
—>Create a profile with the following settings in your data account under Data Communication
GATEWAY  : 100.1.200.99
APN : airtelfun.com
USERNAME : blank
PASSWORD : blank
PASS REQ : OFF
ALLOW CALLS : AUTOMATIC
IPADDRESS :
DNSADDRESS :
DATA COMP : OFF
HEADER COMP : OFF
and then Under INTERNET PROFILES,
INTERNET MODE : HTTP or WAP (both works)
USE PROXY : YES
IP ADDRESS : 100.1.200.99
PORT : 8080
USERNAME :
PASSWORD :
–>Create a new dial-up connection on your pc after connecting the mobile to pc,using the NEW CONNECTION WIZARD as follows
ISP Name : Anyname
Phone Number : *99***1#
Username and Password : blank
–>Configure your browser to use the proxy 100.1.200.99 and port 8080.
–>Connect to the dial-up account. You will be connected at 115.2kbps
—>Now if you try to access any site on your mobile you ll get an error message like “Access Denied”
—>Open your browser, and start browsing and voila it opens the regular sites and if u beleive ull get a d/l speed of 5-6 kbps
Common Errors u Face:
If u are getting any error wile dialing a dial up connection than go to
Control panel>> Phone and modem>>>select modem and click on its properties >>advanced
and enter the following initialization commands
CODE
AT+CGDCONT=2, “IP”,”airtelfun.com”,”",0,0
It should be connected without any error now.

Remote Network Penetration via NetBios Hack on a windows PC:

NetBIOS Hacking,What is it?

NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

How can this be of use to me?

Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

What do I need?

Windows OS Cain and Abel (http://www.oxid.it/)

Step 1, Finding the target.

So first off all we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross. Another window will pop up, make sure “All host in my subnet” is selected, and then click ok. It should begin to scan.

NetBIOS Hacking,What is it?

NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

How can this be of use to me?

Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

What do I need?

Windows OS Cain and Abel (http://www.oxid.it/)

Step 1, Finding the target.

So first off all we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross. Another window will pop up, make sure “All host in my subnet” is selected, and then click ok. It should begin to scan.
Cain and Abel
Cain and Abel
Beginning the scan
Beginning the scan
Scan in progress
Scan in progress
Then IP’s, computer names, and mac addresses will show up.
Now remember the IP address of the computer you are going to be breaking into.
If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
During the next step we will begin our trial and error.
Finding the IP address of the target.
Finding the IP address of the target.

Part 2, Trial and Error

Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.
I am only doing this to avoid confusion.
Let’s get back to the hacking.
Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.”
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private information)
Our target is available
Our target is available
IF it didn’t work, meaning that the target is not online, it will look something like this:
Our target is not online.
Our target is not online.
If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.

Part 3, Gathering the Information.

Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.”
This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.
Checking if file sharing is enabled
Checking if file sharing is enabled
Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.
The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.
The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.

The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup.

Step 4, Breaking In

Finally it’s time.
By now we know: that our target is online, our target has file sharing, and our target’s computer name.
So it’s time to break in.
We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\192.168.1.103”
Finding the share name
Finding the share name
We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.
All’s that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\192.168.1.103\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G…,” for a different target.
NetBIOS Hacking
NetBIOS Hacking
As you can see, for my hack I have already used “K,” so I used “G” instead.
You may also do the same for multiple hacks.
If it worked, it will say “The command completed successfully.”
If not, you will have to go retrace you steps.
Now open up “my computer” under the start menu, and your newly created network drive should be there.
NETBIOS hacking
NETBIOS hacking
Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
If you are just doing this to hack something, then go explore it and have some well deserved fun!
Congratulation you are done!

Commands used in this tutorial:

PING
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)
Default null session attack.(same process using just cmd)
  1. A null session attack basicly uses what is called a samba share to get access to the victims share, {ipc$, admin$, etc.}
  2. This is only for windows xp/vista. Well this is a very simple but effective method of “rooting” a box.
  3. Open CMD > Net View
  4. [Shows all hosts on the network]
    > nbtstat -a HOST
    [determines if the workgroup is open, if not try another comp]
    > net view HOST
    [shows open shares being used; ipc$ doesn't automatically show. But if C is open simply type net use \\HOST \c$; then you have root!]
    >net use \\HOST \SHARE /u:USER_NAME
    [ok so you can ushly use the share IPC$, and the user of admin]
  5. Now go to your local network and open your victims folders
  6. To close the connection type: net use \\HOST /delete


 THE DNS SYSTEM:

No matter how big the broadband pipe you use to surf the Web, it’s not big enough. Everyone, whether they use a slowpoke dial-up modem or the fastest FiOS line, wants to surf faster.There’s a simple way you can get to Web sites faster, and it won’t cost you a penny. You can hack the way your PC uses the Domain Name System (DNS), the technology underlying all Web browsing. It’s far simpler to do than you might imagine, as you’ll see in this article.


Understanding DNS
Before you start, it’s a good idea to get a basic understanding of how DNS works. When you type in a URL such as www.computerworld.com, that URL needs to be translated into a numeric IP address that Web servers and Internet routers can understand. When you type in a URL, a DNS server does the translation, from www.computerworld.com to 65.221.110.98, for example.
DNS servers live on the Internet, and your computer contacts them with the request to do that translation, which is commonly called name resolution. When you use an ISP, your computer will automatically use the default DNS servers specified by your ISP; you typically don’t need to set up DNS in any way. If you’re on a corporate network, your systems administrator may have set you up to use specific DNS servers.
If there’s a delay in contacting the DNS server, or if the DNS server takes too much time resolving the address, you’ll face a delay in getting to a Web site. So even if you’ve got the world’s fattest pipe, your Web surfing will be slowed down.
If you could speed up the name resolution in some way, you’d be able to speed up your Web surfing. And that’s exactly what I’ll show you how to do.

Speed up Web browsing with OpenDNS
Here’s the simplest way to hack DNS to speed up your Web browsing: Use free, superfast DNS servers run by the OpenDNS service instead of your ISP’s DNS servers. OpenDNS has a monstrously big DNS cache, with DNS servers around the world, so you’ll be able to retrieve IP addresses from it more quickly than from your ISP’s DNS servers.
As I’ll explain a little later in this article, the service includes other benefits as well, such as letting you create browser shortcuts so that you could go to www.computerworld.com, for example, by just typing the letter c in your browser and pressing Enter.
The addresses of the OpenDNS servers are 208.67.222.222 for a primary DNS server and 208.67.220.220 for a secondary server.
To use the OpenDNS servers, you’ll have to tell your computer to use them. If you have Windows XP, first select Control Panel –> Network and Internet Connections –> Network Connections, right-click your network connection from the Network Connections window, and select Properties. A dialog box like that shown below appears.
Highlight the Internet Protocol (TCP/IP) listing and select Properties in order to get to a dialog box that will let you use OpenDNS server.
Highlight the Internet Protocol (TCP/IP) listing and select Properties in order to get to a dialog box that will let you use OpenDNS server. (Click image to see larger view.)
Scroll down to the Internet Protocol (TCP/IP) listing and select Properties. At the bottom of the screen, select “Use the following DNS server addresses.” For the Preferred DNS server, enter this address: 208.67.222.222. For the Alternative DNS server, enter this address: 208.67.220.220. Click OK, and then click Close and Close again. Restart your PC in order for the settings to take effect. The figure below shows the screen filled out properly.
Telling your PC to use the OpenDNS servers.

Telling your PC to use the OpenDNS servers. (Click image to see larger view.)
If you’re using Windows Vista, select Control Panel –> Network and Internet –> Network and Sharing Center. Click the View Status link on the right side of the screen. The Local Connection Status screen appears, as shown in the figure below. Click Properties.
Click Properties in order to get to a dialog box that will let you use OpenDNS servers.

Click Properties in order to get to a dialog box that will let you use OpenDNS servers. (Click image to see larger view.)
You’ll come to the same dialog box as you would for XP that lets you use the OpenDNS servers. Follow the same directions as for using OpenDNS on XP, and you’ll be set.
When you configure a PC to use OpenDNS, only that PC will be able to use the OpenDNS servers. If you want all of the PCs on your network to use the servers, you can tell your router to use the OpenDNS servers, and then all of your PCs on the network will follow suit. That way, you won’t have to configure each individual PC.
The way you do this will vary from router to router, and it changes according to whether you’re using a router for a home office/small office or a larger corporate router. For a small office/home office router, you’ll log into your router, look for the DNS settings, and then use the OpenDNS settings of 208.67.222.222 for the primary DNS server and 208.67.220.220 for the alternative DNS server.
Whether you run a small network or larger network, you can get benefits beyond faster DNS. The service also gives you DNS management tools such as domain blocking. It also gives you statistics and charts about your network’s DNS use.
On Linksys SRX 400 and many other Linksys routers, log into your router by going to the log-in page at 192.1681.1, using admin as the password and leaving the username blank. Scroll down the page until you come to the Static DNS 1 and Static DNS 2, as shown in the figure below. Click Save Settings. Restart your router and the PCs on your network, and they will begin using the OpenDNS DNS servers.
Change the DNS settings on this screen to use the OpenDNS servers for your entire network.

Change the DNS settings on this screen to use the OpenDNS servers for your entire network. (Click image to see larger view.)
If you run a corporate network and need help getting it set up, your best bet is to go to the OpenDNS FAQ page.
Note that OpenDNS may not work when using a virtual private network. For example, I wasn’t able to get it to work using a Cisco VPN. And if you’re on a corporate network, you should check with your systems administrator before using OpenDNS.
OpenDNS also lets you create shortcuts that let you visit Web sites by typing in a letter or group of letters instead of a full URL. To do that, you’ll first need to register, which is free. After you do that, go to the site, log in, and click the Shortcuts link. On the page that appears, type in the shortcut text in the top box, and the URL in the bottom box and click Create Shortcut. From now on, when you type the shortcut text into your browser window, you’ll be sent to the full URL.
You can also add the OpenDNS bookmarklet (found at the bottom of the page) to your browser and, in that way, create a shortcut no matter where you are on the Internet.
Creating a shortcut in OpenDNS.

Creating a shortcut in OpenDNS. (Click image to see larger view.)
Speed up Web access with a HOSTS file
There’s another way to speed up DNS — by creating or editing a local HOSTS file on your own PC that contains URLs (also called hostnames) and their corresponding IP addresses. Windows will first look there to see whether there’s an entry for the hostname, and if it finds it, it will resolve the address itself. That way, you won’t have to go out to a DNS server and wait for the response before visiting a Web site.
The HOSTS file is a plain-text file you can create or edit with a text editor like Notepad. You should find an existing HOSTS file in C:\Windows\System32\Drivers\Etc\HOSTS in both Windows XP and Windows Vista. (In some versions of Windows, it may be located in C:\Winnt\System32\Drivers\HOSTS). The file has no extension; it is named only HOSTS. If you don’t find one, create it in Notepad.
Open the HOSTS file in Notepad and enter the IP addresses and hostnames of your commonly visited Web sites, like this:
65.221.110.98 computerworld.com
Each entry in the file should be on one line. The IP address should be in the first column, and the corresponding hostname in the next column. At least one space should separate the two columns. When you’re finished editing the file, save it to its existing location.
Make sure to check your HOSTS file regularly and keep it up-to-date, or else you might deny yourself access to certain Web sites. For example, if www.computerworld.com were to change its IP address but your HOSTS file kept the old, incorrect address, your browser would not be able to find the site.

Adjust Windows’ DNS cache
To speed up DNS, Windows puts the DNS information into a local DNS cache on your PC when you visit a site. So when you want to go to a site, Windows first looks in its local DNS cache, called the resolve cache, to see whether the DNS information is contained there. That way, if it finds the information locally, it doesn’t have to look in your HOSTS file or query a remote DNS server to find IP information. The cache is made up of recently queried names and entries taken from your HOSTS file.
The cache contains both negative and positive entries. Positive entries are those in which the DNS lookup succeeded and you were able to connect to the Web site. When Windows looks in the cache, if it finds a positive entry, it immediately uses that DNS information and sends you to the requested Web site.
Negative entries are those in which no match was found, and you end up getting a “Cannot find server or DNS” error in your browser. Similarly, when Windows looks in the cache and finds a negative entry, it gives you the error message without bothering to go out to the site.
Negative entries can lead to problems. When you try to make a connection to a site that has a negative entry in your cache, you’ll get an error message, even if the site’s problems have been resolved and it’s now reachable.
You can solve this problem, though, using a Registry hack. By default, Windows caches negative entries for five minutes. After five minutes, they’re cleared from your cache.
But if you’d like, you can force Windows not to cache these negative entries so that you’ll never run into this problem. Run the Registry Editor by typing Regedit at a command prompt or the Windows Vista search box, and press Enter. Then go to
HKEY_LOCAL_MACHINE\SYSTEM
\CurrentControlSet\Services\Dnscache
\Parameters
Create a new DWORD value with the name NegativeCacheTime and give it a value of 0. (The value might already exist. If it does, edit its value to 0.)
The DWORD determines how much time, in seconds, to keep negative entries in the DNS cache. If you like, you can have the entries stay alive for one second by giving the DWORD a value of 1.
After you’re done editing, exit the Registry. To make the change take effect, restart your computer, or flush your cache by issuing the command ipconfig /flushdns at a command prompt. The command will flush your DNS cache — all the entries, both positive and negative, will be flushed — and it will be empty until you start visiting Web sites. Negative entries, however, will not be added to the cache if you’ve given the DWORD a value of 0.
You can also use the Registry to control the amount of time positive entries are kept in the DNS cache. By default, they are kept for 24 hours. To change the default, go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters again and create a DWORD value called MaxCacheEntryTtlLimit. (If it’s already present, just edit the value.) For the value, enter the amount of time you want the entry to remain, in seconds, making sure to use decimals as the base.

No comments:

Post a Comment