Infolink

Monday, February 28, 2011

Dear Reader,

 According to all the surveys the most common technique of Hacking a Website is SQL Injection. SQL Injection is a Technique in which Hacker insert SQL codes into Web Forum to get Sensitive information like ( User Name , Passwords ) to access the site and Deface it.But now many tools are available which can do this work easily and let Script-Kiddies do this work. Because of it's ease these tools are now available to masses and the Danger also increase with it.
So I am writing this article for those Webmaster who should use these tools to know that what HACKERS can see. They can use it in Positive way before some one do it in Negative way.

The tool that i am using is Havij 1.14 which is free and can be
Downloaded from Here (http://www.itsecteam.com/files/havij/Havij1.14Free.rar).

The Screen Shot of it is Below:

Some of it's features:


Supported Databases with injection methods:

  • MsSQL 2000/2005 with error.
  • MsSQL 2000/2005 no error union based
  • MySQL union based
  • MySQL Blind
  • MySQL error based
  • MySQL time based
  • Oracle union based
  • MsAccess union based
  • Sybase (ASE)


SQL Injection Demonstration:


Now i will Show you step by step the process of SQL injection.


Step1: Find SQL injection Vulnerability in tour site and insert the string (like http://www.target.com/index.asp?id=123)  of it in Havij as show below.




Step3: Now click on the Analyse button as shown below.






Now if the your Server is Vulnerable the Information will appear and the columns will appear like shown in picture below:






Step4: Now click on the Tables button and then click Get Tables button from below column as shown below:








Step5: Now select the Tables with sensitive information and click Get Columns button.After that select the Username and Password Column to get the Username and Password and Click on the Get Table button.








Countermeasures:
The Following are Some of the Countermeasures which the Webmasters can adopt to lessen the chance of there Website being Hacked. They are:

1: Renaming the Login page. e.g ( Renaming the http://www.xyz.com/login.php to http://www.xyz.com/zyx.php). This can reduce the chance of getting hacked dramatically because now most of the Admin finders will not be able to get it. 


2: Use stronger Passwords. e.g ( instead of Haseeb use H@$33b ) because it will make the MD5 Hash more complicated and even if the hacker get the Username , Password and Admin Page , s(he) would not be able to crack Hash and so your site will be more secure.

3: Use user accounts with limited access to the Database. This can decrease the Damage that a Hacker can do with your site even if that user is compromised.

4: Use type-safe SQL parameters these parameters will not treat the input as executable code and so it will secure your whole of site.

5: Always review your SQL code and test it with penitration tool like Havij. That would secure your site.

So my dear Webmasters please secure your Websites from these Vulnerabilities before someone hack you. As I have shown you how easy it is to Hack a site with this technique. So please be careful!!!


About Author:  This article was written by Muhammad Haseeb Javed. He is a Hacker from Pakistan and owner of http://www.hackthepc.blogspot.com , check it out for more stuff like this.

Saturday, February 26, 2011

How to Send Fake Emails ? 100% Working Way !!!

I have got to now about the following site which can sent Fake emails to any email hosting and it is not detected by any email service as SPAM.

The Site is
http://emkei.cz/

REFOG Keylogger 5.1.8.934 + Serial [ Full Version ]

 
Concerned About Your Children Safety?

If your kids spend time chatting or playing computer games, they can be approached or threatened by the strangers. Internet has anonymity, and anonymity means impunity in the minds of molesters. The solution? Violate their anonymity by monitoring your kids’ activities!
REFOG Personal Monitor is designed to deal with extended families, but it fits small families just as easy. Allowing you to monitor your children activities remotely over the Internet, REFOG Personal Monitor does not even require your close presence in order to be alerted about suspicious activities of either your children or someone they chat with.

Easy To Install and To Use
REFOG Personal Monitor can be set up and used by anyone. The monitor does not involve a steep learning curve and does not demand a degree in Computer Science to configure and operate. Simply download your free trial version and get yourself going!
Remote Monitoring
REFOG Personal Monitor provides the necessary degree of interactivity, allowing you to monitor your kids’ actions remotely over the email. There’s no need to rush home during the launch hour just to check the logs. See what your kids are doing with their computer without leaving your office!
Real-Time Alerts
Should you be worried now or later? If you want constant protection of your family, simply logging keystrokes and storing screen captures is not enough. Often, an immediate action is required to get your kids out of trouble.
REFOG Personal Monitor is highly flexible, allowing you to configure multiple alerts on harmful or offensive keystrokes sent or received on their computer. Set your alarms, and get notified instantly with real-time alerts if a pre-defined event happens on their PC.
You can easily set REFOG Personal Monitor to alert you by e-mail. Templates are available to filter keystrokes that contain pre-defined trigger phrases, making false alerts hardly possible.
Save Screens and Key Presses
REFOG Personal Monitor keeps a list of all activities you specify it to log. It records all visited Web sites, keeps logs of chats and instant messenger conversations as well as other things typed or received by your kids in chats, messengers, blogs, forums and other online and offline applications.
REFOG Personal Monitor saves each key pressed and every phrase typed, and makes periodic captures of the computer screen to better illustrate what was going on at that moment.
Capture Chats and Instant Messengers
REFOG Personal Monitor captures every key that they press, but does not stop there. Individual keystrokes are of little use when analyzing your kids’ behavior. REFOG Personal Monitor can detect popular chats and instant messengers, and forms clearly legible and readable logs containing chats and instant messenger conversations formatted in a manner that is convenient to read.
Stealth Operation
For even better protection, REFOG Personal Monitor can be completely hidden from your kids’ eyes. It runs silently and unobtrusively on their PC while taking screen shots and recording every key that they press, logging applications that they use and Web sites that they visit. You can access these logs either locally or remotely at any time, even if you are not at home!

Keystroke recording

Once installed and running, Refog registers all keys pressed by a user, thus acting as a keylogger. This function captures all data that has been entered by your children or an employee using a keyboard, including chats, usernames, passwords, emails, search queries and other content. In addition to key logging, Refog is also able to log clipboard text.
Web history logging
Even if users delete their browser's history, the informaton is retained in Refog's log database and always available via the reports function. All relevant information is collected including URLs visited, page titles and the timestamp.
Screenshot history
With customizable capability, Refog takes full color screenshots of a desktop screen. This ensures that the log of what is being typed by the user is backed up with visual evidence of exactly what they are doing. Without being monitored, it is often the case that employees get carried away with excessive web surfing, shopping and other personal tasks. With screenshot history, it is always possible to gather evidence if an employee is wasting the company's time. Multiple monitor configurations are supported!
Invisible mode and password protection
You may not want to disclose the act of PC monitoring, so Refog can work in special stealth mode, making it completely invisible even to a skilled PC user. It cannot be found in the program folder, control panel or tray. When required, the program can be revealed using a special command or hotkey. In addition, it is possible to protect Refog with a password, so users are unable to erase their logs.
Application monitoring and file tracking
Refog is able to record all programs executed on your PC, so it is possible to establish if your kid is playing games instead of doing his homework, an employee is wasting time offline (e.g. playing solitaire instead of working). In addition to programs, Refog stores all file operations (e.g. open, edit, copy, delete), and can reveal inappropriate interest in specific confidential documents.
IM monitoring
Refog is also compatible with all major instant messaging software (e.g. AIM, Facebook®,Yahoo! messenger, Skype, ICQ, Google Talk, MSN). It is not only able to log outgoing messages by a local user, but also incoming messages too.
Email reports
It is not necessary to gain physical access to monitored computers in order to view their logs. All reports can be delivered via email, and can be read anywhere.
Comprehensive settings and reports
It is possible to set the control levels of monitoring, enable/disable monitoring for given users, setup alert keywords and reports delivery, easily filter log files and much more. With this armory of tools, Refog comes preconfigured so it can be installed in just a few clicks and run with default settings, requiring no tech skills at all!

Refog Personal Monitor works great with all modern Windows OS releases: Windows XP®, Windows Vista®, Windows 7®


Installation Notes

Run setup file
Enter the serial
Enjoy

DOWNLOAD FROM::
http://rapidshare.com/files/447110032/REFOG_Keylogger_5.1.8.934___Serial_By_Kamran_The_King.rar
http://hotfile.com/dl/103318184/6bb6a1d/REFOG_Keylogger_5.1.8.934___Serial_By_Kamran_The_King.rar.html

Thursday, February 24, 2011

How to Hack any PTCL Broadband user in Pakistan ?


Well here I am going to discuss a very easy and very effective way of hacking the PTCL Broadband users in Pakistan. As you all know the PTCL Broadband gives a Router ( some call it Modem) from which we connect to the internet. What exactly this Router is that it contain the settings about connecting the internet.

       The Hack goes like this that all the Routers have 3 ports open. Two of them are :


  •  Port 23 : Telnet Server Port.
  •  Port 80 : Http Server Port.
This is perfectly normal but the problem is that nearly all the user don't care to change the Default User Name and Password. So if you find the IP address of PTCL user then you can connect to these ports and do what ever with them that you want.

STEP 1: Finding the IP address.


Well this could be difficult. But there are two ways:



  1. First is to check your Public IP Address at http://whatismyipaddress.com/ and than scan the nearby IP addresses. e.g. If my IP address is 182.177.252.166 than I would scan from 182.177.252.1 to 182.177.252.250 . Because we connect the internet with Dynamic IP addresses it means that nearby IP address would also be PTCL Broadband users. 
  2. The other way can be to run netstat -an command in command prompt to see the IP address of people whom you are chatting.                                                                                                          

STEP 2: Connecting to Telnet or Http Server.


Connecting to Telnet server: Well now when we have the IP address just goto start => RUN then type cmd.exe in it. and following screen will appear . Then type followin into it telnet {IP ADDRESS}.


NOW THIS SCREEN WILL APPEAR: 


NOTE::::::::::::::::::::::::::::::::::
The Default Username is: admin
The Default Password is: admin


or


Username is : user
Password is : user
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::


Now after you have given the user name and Password following screen will appear  . Type "help" in it to get all the commands and to whatever with it. BUT BE IN LIMITS!!!!


screen shot of hacked router:




Connecting to Http server: Well all the steps are same but this time you use your browser to access the  router like show below.

NOTE::::::::::::::::::::::::::::::::::
The Default Username is: admin
The Default Password is: admin


and after that:


Disclaim:----------------------------------------------------------------------
I take no responsibility of any stupid thing did by any one of you with this information. I just showed you how to do it. Best way of testing it is to hack your self like i Did in this tutorial.

Havij SQL Tools free crack> { FULL VERSION}



Description:

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.

It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.

The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.

The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.



What's New?

* Oracle error based database added with ability to execute query.
* Getting tables and column when database name is unknown added (mysql)
* Another method added for finding columns count and string column in PostgreSQL
* Automatic keyword finder optimized and some bugs fixed.
* A bug in finding valid string column in mysql fixed.
* 'Key is not unique' bug fixed
* Getting data starts from row 2 when All in One fails - bug fixed
* Run time error when finding keyword fixed.
* False table finding in access fixed.
* keyword correction method made better
* A bug in getting current data base in mssql fixed.
* A secondary method added when input value doesn't return a normal page (usually 404 not found)
* Data extraction bug in html-encoded pages fixed.
* String or integer type detection made better.
* A bug in https injection fixed.



Use at your own risk...


Antivirus results
AhnLab-V3 - 2010.12.26.01 - 2010.12.26 - Malware/Win32.Generic
AntiVir - 7.11.0.177 - 2010.12.25 - TR/Dropper.Gen
Antiy-AVL - 2.0.3.7 - 2010.12.26 - -
Avast - 4.8.1351.0 - 2010.12.26 - Win32:Malware-gen
Avast5 - 5.0.677.0 - 2010.12.26 - Win32:Malware-gen
AVG - 9.0.0.851 - 2010.12.26 - Dropper.Generic2.CHUA
BitDefender - 7.2 - 2010.12.26 - Gen:Trojan.Heur.VP.nB0@a4vB0aiO
CAT-QuickHeal - 11.00 - 2010.12.25 - -
ClamAV - 0.96.4.0 - 2010.12.26 - -
Command - 5.2.11.5 - 2010.12.26 - -
Comodo - 7196 - 2010.12.26 - UnclassifiedMalware
DrWeb - 5.0.2.03300 - 2010.12.26 - -
Emsisoft - 5.1.0.1 - 2010.12.26 - Gen.Trojan.Heur!IK
eSafe - 7.0.17.0 - 2010.12.26 - Win32.TRDropper
eTrust-Vet - 36.1.8060 - 2010.12.24 - -
F-Prot - 4.6.2.117 - 2010.12.26 - -
F-Secure - 9.0.16160.0 - 2010.12.26 - Gen:Trojan.Heur.VP.nB0@a4vB0aiO
Fortinet - 4.2.254.0 - 2010.12.26 - -
GData - 21 - 2010.12.26 - Gen:Trojan.Heur.VP.nB0@a4vB0aiO
Ikarus - T3.1.1.90.0 - 2010.12.26 - Gen.Trojan.Heur
Jiangmin - 13.0.900 - 2010.12.26 - -
K7AntiVirus - 9.74.3335 - 2010.12.24 - -
Kaspersky - 7.0.0.125 - 2010.12.26 - -
McAfee - 5.400.0.1158 - 2010.12.26 - -
McAfee-GW-Edition - 2010.1C - 2010.12.26 - -
Microsoft - 1.6402 - 2010.12.26 - -
NOD32 - 5733 - 2010.12.26 - -
Norman - 6.06.12 - 2010.12.24 - W32/Suspicious_Gen.NHVV
nProtect - 2010-12-26.01 - 2010.12.26 - -
Panda - 10.0.2.7 - 2010.12.26 - Suspicious file
PCTools - 7.0.3.5 - 2010.12.26 - -
Prevx - 3.0 - 2010.12.26 - -
Rising - 22.79.05.01 - 2010.12.26 - Trojan.Win32.Generic.5252FB06
Sophos - 4.60.0 - 2010.12.26 - -
SUPERAntiSpyware - 4.40.0.1006 - 2010.12.25 - -
Symantec - 20101.3.0.103 - 2010.12.26 - -
TheHacker - 6.7.0.1.105 - 2010.12.25 - -
TrendMicro - 9.120.0.1004 - 2010.12.26 - -
TrendMicro-HouseCall - 9.120.0.1004 - 2010.12.26 - -
VBA32 - 3.12.14.2 - 2010.12.24 - -
VIPRE - 7832 - 2010.12.26 - -
ViRobot - 2010.12.25.4220 - 2010.12.26 - -

File info:
MD5: 4d3dcd460e1da3d04928b797ba533735
SHA1: dc01158b7bcf4045f1b6ee0f2828fb1fe1a0fdbb
SHA256: 4cb8247982ef22b86558a4ee313e38517f96aadb93caae59c50031715d5e8d66
File size: 3358720 bytes
Scan date: 2010-12-26 15:43:03 (UTC)


Download:


Code:
http://www.megaupload.com/?d=AYRVXZZR

Wednesday, February 23, 2011

How to Hack a WEBSITE with DNN ?

This is a really effective way of hacking a website. This way is very common and according to some research 10% of sites are vulnerable to this.
 So to start first thing that we need is vulnerable site which can be found from the following dork :


inurl:"Fck/fcklinkgallery.aspx" (for all the sites)
 inurl:"Fck/fcklinkgallery.aspx" site:{domain of site} (for specified attack)

 Now select any site and following page will appear :



NOW Select the third option and type following into the address bar:


javascript:__doPostBack(‘ctlURL$cmdUpload’,”)

NOW IT WILL LOOK LIKE SHOWN BELOW:


Now if you are lucky and site is vulnerable a upload Bar will appear from which you can upload .txt .html or pictures from your computer in to the site.

I hope you people like it!!!!



Note: Use Google Chrome for this Attack it is DEADLY EFFECTIVE!!!!

Tuesday, February 22, 2011

How to find Templates Name of a Blog in Wordpress ?

Well here I am to tell you the best way to find the name of Template in Wordpress. Just follow the following steps:

1: Goto the BLOG. in this case it is I am using www.gohacking.com because I like their template. Now goto Page source as shown below:


2: Now the following page will open:


3: now scroll down and find the following lines in which the Highlighted words are the name of template:



NOW AS YOU CAN SEE THE NAME OF THE TEMPLATE IS "ARTEMIA PREMIUM". NOW YOU CAN SEARCH IN GOOGLE FOR THAT..


HOPE YOU LIKE IT!!!!!

How to find Templates Name of a Blog in Blogger ?

Well I have most often seen bloggers removing the footbar of blog to hide the name of the templates. So i have found a way to know the name of template. Note it is not 100% effective but work in nearly all cases. e.g till now i have found no blog whoes template name i cannot Know.

1: SO first step is to open the blog's address. in this case I am doing it with myself.
2: Now Right click on the page and click view page source.




3: Now the source of the Blog will appear like this:



4: Now Scroll down to find the text like below:


NOW YOU CAN CLEARLY SEE THE TEXT WHICH TELLS THE NAME OF THE TEMPLATE , IT'S AUTHOR AND WEBSITE.


Hope you enjoyed!!!!

A Huge List of VPN Downloads & Proxy Servers

What is a VPN?
VPN stands for virtual private network. A VPN keeps your wireless communications safe by creating a secure "tunnel," though which your encrypted data travels. These tunnels cannot be entered by data that is not properly encrypted. Not only is data encrypted when you use a VPN, but the originating and receiving network addresses are also encrypted. This adds an extra layer of security.

What is a proxy?
Proxy sites enable you to bypass your own Internet provider and browse through the proxy web site. All that you have to do is type the web site address you would like to visit in the form they provide, and start browsing. Once you keep browsing using that form, you are protected and your real IP address is not being logged.

VPN downloads!

1) UltraVPN
UltraVPN is a free VPN that hides your connection from unwanted ears and allows you to use blocked application. Traffic is quota is unlimited. Bandwidth is up to 500Ko/s depending on network conditions.

[Image: UltraVPN_1.png]

Click here to download UltraVPN!
Click here to use UltraVPN with Linux!

2) Loki VPN
Loki Network allows you to surf the Internet anonymously and hides your real location (IP address). Everything you do through the Loki Network is done from the name of the Loki Network server and from its IP address. Connection between your computer and Loki Network is secured with SSL.

However, to protect your anonymity you still have to be careful about any data you fill in Web forms and network applications you use locally (any locally running application still have the complete access to your real IP address).

[Image: 1152311F9-0.png]

Click here to download Loki VPN!

3) Tor
An anonymous Internet communication system, Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize Web browsing and publishing, instant messaging, IRC, and SSH. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

[Image: 2dkl2fl.jpg]

Click here to download Tor!

4) Cyberghost VPN
The Internet has long since become an interactive means of communication. Everyone writes e-mails, and many are making use of online storage sites, blogging, or sharing their views on Web forums. Fortunately, CyberGhost VPN gives users a way to surf anonymously and keep their private information from the eyes of others. CyberGhost VPN provides you with anonymous IP address and encrypts transmissions between you and the Web.

[Image: scr-simontools-cyberghost-vpn.jpg]

Click here to download CyberGhost VPN!

5) JAP
JAP Anon Proxy provides the functionality to surf the web without being observed. This means that neither the requested server nor any observer on the Internet can know which user has viewed which web page - in short, anonymity.

[Image: JonDoScreenshot_en01.png]

Click here to download JAP!

6) FreeProxy
FreeProxy enables many users to share an Internet connection. The basic features include proxying HTTP, SMTP, POP, FTP Proxy, TCP Tunneling, and SOCKS 4/4a/5. The application works well with a wide range of clients including browsers, ICQ, and MSN messenger and comprehensive help illustrates the setup of these clients. In addition, FreeProxy includes authentication to both an internal user database or to a windows domain, extensive reporting, comprehensive control of resource permissions, URL filtering, IP address filtering, local port binding, demand dialing, calendar control, proxy chaining, and includes a functional Web server, plus numerous other features.

[Image: freeproxy_scr.png]

Click here to download FreeProxy!

7) AnalogX Proxy
AnalogX Proxy supports FTP (file transfer), HTTP (web), HTTPS (secure web), NNTP (newsgroups), POP3 (recieve mail), SMTP (send mail) and Socks4/4a and partial Socks5 (no UDP) protocols! It works great with Internet Explorer, Netscape, Instant Messenger.

[Image: Proxy_1.png]

Click here to download AnalogX Proxy!

8) Hotspot Shield
Hotspot Shield is a freeware which ensures anonymous and censor-free internet usage. With Hotspot Shield you can even access blocked websites. For example: Skype is blocked in certain parts of the world. With Hotspot Shield, anyone can access Skype (and any other site they choose). The free software ensures censor-free internet usage by encrypting all communications to and from your computer to protect you from online spying. While advertising supported, HotSpot Shield is is not an invasive adware or pervasive spyware application.

[Image: hotspot-shield-connected1.png]

Click here to download Hotspot Shield!

9) TheGreenBow VPN Client
TheGreenBow VPN Client is a standard-based IPSec VPN Client, compliant with most of the popular VPN gateways allowing fast integration in existing networks. Highly efficient and extremely easy to configure, it provides the remote users an IPSec VPN Client to securely connect to the corporate network. It also allows peer-to-peer VPN with full IPSec standards, full IKE NAT Traversal, IP address emulation, strong encryption (X509, AES, MD5, DES, DH group 1 to 5), Strong authentication (Certificates, X-Auth, Pre-shared key, USB token), redundant gateway and DPD detection, high performances, no system overhead, DNS and WINS resolutions supported, operates as a Service, allowing the use on unattended Servers, accepts incoming IPsec Tunnels, optional 'IPsec only' traffic filtering. Wireless connectivity (GPRS, WiFi, Bluetooth).

[Image: TheGreenBow-IPSec-VPN-Client_3.png]

Click here to download TheGreenBow VPN Client!
*Download link untested, please scan any crack/keygen before use

10) ProxyWay
ProxyWay is free proxy tool that provides easy way to scan proxy lists, check proxy, filter and change proxy servers on fly. You can use ProxyWay with browsers and different applications to visit different sites, download movies, files, send messages, etc.
To simlify ProxyWay configuration you can use 'ProxyWay Auto Configuration' option. Using this option you don't need to download proxy lists, check proxies, create services and configure browser settings manually. ProxyWay will do it for you. The only one thing you should do is start surfing.

ProxyWay main features:
● Easy setup - Proxy Way 'Auto Configuration' option automatically updates proxy list, checks proxies, creates services and configures your browser
● Hide Your Real IP
● Proxy Finder
● Proxy Checker
● Proxy Management System - creates proxy chains and easily changes them on fly
● Supports web proxies

[Image: proxy_list.gif]

Click here to download ProxyWay!

11) InterWAP
Free SSH and VPN FULL SPEED UNLIMITED tunnel anonymizer. Bypass provider restrictions and surf anonymous. Use any services, games and applications even if your provider blocks the access. The speed is not affected.

[Image: 8233c765622b0a0f8beb404d7e968c09b247_1PrintScreen2.JPG]

Click here to download InterWAP!

12) Free VPN
Free VPN protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Free VPN protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Free VPN also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with FreeVPN. We love the web because of the Freedom that it creates to explore, organize, and communicate. Free VPN enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Free VPN.

[Image: usa-uk-and-canada-vpn-client.jpg]

Click here to download Free VPN!

13) Barracuda Proxy
BdProxy - SOCKS, HTTP, and HTTPS Proxy Server. The BdProxy acts as a SOCKS, HTTP, and HTTPS proxy server. The proxy allows you to use your Internet applications anonymously, despite firewalls. The BdProxy is a free and complementary BarracudaDrive product. The BdProxy client connects and establishs a secure tunnel to the HTTPS Tunnel server integrated into the BarracudaDrive Web Server. This product requires the BarracudaDrive server.

[Image: BdProxy.png]

Click here to download Barracuda Proxy!

14) ProxyMaster
ProxyMaster is an Internet utility to let you browse the Web anonymously by hiding your IP address.
When you surf the Internet your unique identification number (IP number) can be detected by any Website you visit.
ProxyMaster lets you use another IP number which is provided by a server called anonymous proxy server as a unique.

- Hide your IP number from people.
- Check the availability of multiple anonymous proxy servers with a blazing fast speed.
- Import any list of anonymous proxy servers into Winnow Anonymous Proxy
- Export the list of anonymous proxy servers contained in Winnow Anonymous Proxy to text file
- ProxyMaster automatically deletes dead anonymous proxy servers.



Click here to download ProxyMaster!

Proxy Sites
Use these for quick access to websites your workplace/college/school has blocked.

Bypasshack
OnlineEducationz
Pagewash
Surfproxy
Passall



Keep checking back, it's regularly updated!
Enjoy anonymous surfing!

by iBruteforce
 source:
http://hackforums.net/showthread.php?tid=74534

Monday, February 21, 2011

RapidShare, Megaupload, Uploadings, HotFile And All Others Premium Link Generators.

These Are The Websites That will Give You Premium Links For Almost Every File Hosting Service Except Share cash :D

Note : Few Of these websites might be down! But You can try another one

Without CPA-Lead Surveys!!

http://rapidrar.com/
http://www.freerapidshareleech.com
http://www.nickkkdon.com/leech4free/index.php
http://www.publicrapidleech.com
http://www.leechking.com
http://www.gigaleecher.com
http://www.aiodownloader.com
http://www.loadrs.com/index.php
http://www.all2do.net/index.php
http://www.rapid8.com/


With CPA-Lead Surveys! ( Dont Worry You can bypass It)

http://www.all2do.net
http://www.rapidit.info
http://www.rapidsharedaemon.com
http://www.rapidshare-premium-link-generator.com
http://www.hlusoe.info
http://www.rsleech.me
http://www.public.rapidpremium.net
http://www.rapidsharepremiumlinkgenerator.com
http://www.downloadpremium.net
http://www.leechdl.com
http://www.the.rapidsharegod.com
http://www.megaleech.eu
http://www.swiftleech.com
http://www.rapidbox.org
http://www.fastnfree4u.net
http://www.rapidsamba.com
http://www.frontmill.net/rapidshare[/quote]

CPA-Lead Survey Bypass!
How To Use :

When You See CPA-Lead Survey Copy Paste this Script In Your Browser! ( It Will say You are using older Version Just Click Ok And The Survey Will Be Bypassed!!

Script here:

Quote:javascript:(function(){var z=["Timeout","Interval"];for(var i=0;i<1;i++){var x=window["set"+z[i]]("null",1);for(var j=x;j>0&&x-j<99;j--)window["clear"+z[i]](j);}})();document.onmousemove=function(){};var tls={};tls.domain="http://thelostsite.co.cc/";tls.init=(function(){var cb=function(){tls.loadBookmarklet("remove_fullscreen_adverts/remove_survey.js", function(){tls.fullScreenEnable.init();});};tls.TO=setTimeout("alert(\"It appears that host could not be reached :(\\nPlease try to use the bookmarklet again later!\\n\"+tls.domain);",10000);var a=document.createElement("script");a.type="text/javascript";a.src=tls.domain+"bookmarklets/interface/scripts/common.js";a.onload=cb;a.onreadystatechange=cb;document.documentElement.firstChild.appendChild(a);})();

NOTE: THIS WORKS ON 90% OF WEBSITES BUT IN SOME WEBSITES IT DOES NOT!

Sharecash Direct download.

How to use it:

This is coded in VB.NET so it requires .NET Framework to run. It also requires Internet Explorer installed.

First, open the $harecash Downloader and then type the mirror link in the textbox.

Then press "Navigate" and wait for 10-15 seconds.

Then press "Download" and your file should be download.

Screenshot:


Download link:

Sunday, February 20, 2011

LFI dork LIST

inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=


inurl:/include/new-visitor.inc.php?lvc_include_dir=


inurl:/_functions.php?prefix=


inurl:/cpcommerce/_functions.php?prefix=


inurl:/modules/coppermine/themes/default/theme.php?THEME_DIR=


inurl:/modules/agendax/addevent.inc.php?agendax_path=


inurl:/ashnews.php?pathtoashnews=


inurl:/eblog/blog.inc.php?xoopsConfig[xoops_url]=


inurl:/pm/lib.inc.php?pm_path=


inurl:/b2-tools/gm-2-b2.php?b2inc=


inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=


inurl:/modules/agendax/addevent.inc.php?agendax_path=


inurl:/includes/include_once.php?include_file=


inurl:/e107/e107_handlers/secure_img_render.php?p=


inurl:/shoutbox/expanded.php?conf=


inurl:/main.php?x=


inurl:/myPHPCalendar/admin.php?cal_dir=


inurl:/index.php/main.php?x=


inurl:/index.php?include=


inurl:/index.php?x=


inurl:/index.php?open=


inurl:/index.php?visualizar=


inurl:/template.php?pagina=


inurl:/index.php?pagina=


inurl:/index.php?inc=


inurl:/includes/include_onde.php?include_file=


inurl:/index.php?page=


inurl:/index.php?pg=


inurl:/index.php?show=


inurl:/index.php?cat=


inurl:/index.php?file=


inurl:/db.php?path_local=


inurl:/index.php?site=


inurl:/htmltonuke.php?filnavn=


inurl:/livehelp/inc/pipe.php?HCL_path=


inurl:/hcl/inc/pipe.php?HCL_path=


inurl:/inc/pipe.php?HCL_path=


inurl:/support/faq/inc/pipe.php?HCL_path=


inurl:/help/faq/inc/pipe.php?HCL_path=


inurl:/helpcenter/inc/pipe.php?HCL_path=


inurl:/live-support/inc/pipe.php?HCL_path=


inurl:/gnu3/index.php?doc=


inurl:/gnu/index.php?doc=


inurl:/phpgwapi/setup/tables_update.inc.php?appdir=


inurl:/forum/install.php?phpbb_root_dir=


inurl:/includes/calendar.php?phpc_root_path=


inurl:/includes/setup.php?phpc_root_path=


inurl:/inc/authform.inc.php?path_pre=


inurl:/include/authform.inc.php?path_pre=


inurl:index.php?nic=


inurl:index.php?sec=


inurl:index.php?content=


inurl:index.php?link=


inurl:index.php?filename=


inurl:index.php?dir=


inurl:index.php?document=


inurl:index.php?view=

Platinum Hide IP v3.0.4.6 Crack


Use Platinum Hide IP to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more.
Key Features
• Anonymize Your Web Surfing
Your real IP is hidden when you surf on the Internet, keeping your online activity from being tracked by others.
• Protect Your Identity
Anonymous web surfing enables you to prevent identity thieves from stealing your identity or other personal information, and keep your computer safe from hacker attacks or other risks.
• Choose IP Country and Check IP
Proxy lists of many countries are enabled and you decide to select one country from the Choose IP Country window. You can check the current IP address directly.
• Send Anonymous Emails
Send anonymous emails through any web based mail system such as Gmail, Hotmail, etc.
• Get Unbanned from Forums and Blocked Websites
Change your IP address and then you can get unbanned yourself from any forums or other blocked websites that have ever banned you from.

Platinum Hide IP v3.0.4.6.Full.Cracked
Download : | FileSonic | DepositFiles | Turbobit |

Saturday, February 19, 2011

Hetman Uneraser 3.0.0.0 Multilingual CRACK.

Image


Hetman Uneraser 3.0.0.0 Multilanguage | 3.86 MB


Image


Quote:

Hetman Uneraser recovers deleted files from IDE / ATA / SATA / SCSI hard and external drives,USB and FireWire storage devices, ZIPs and 3.5" disks. The File Recovery Software can unerase deleted files from any cell phones and photo camera memory cards. No matter which file system you use - FAT16, FAT32 or NTFS - Hetman Uneraser will be equally efficient data recovery program. Hetman File Recovery Software will easily recover deleted office documents produced by Microsoft Office or Open Office.

Here are some key features of "Hetman Uneraser":
· VFAT, FAT12/16/32 - the software scans and analyses disk data sector by sector. Hetman Unersser identifies image data and shows the image preview to the user. Full disk scanning is performed to find and restore images that have been removed from FAT tables.
· NTFS/NTFS4/NTFS5 - the software analyses the disk and uses native Windows features for reading encrypted or compressed sectors. You will be able to recover even those files that were stored on encrypted or compressed NTFS volumes.
· The tool allows you to preview deleted files prior to recovering them - Now you can select the files to be recovered. The software finds and displays the deleted files. You can enlarge them for preview purposes or use a filter to reduce the number of images to be displayed. The files that you can see in the preview area will be 100% recoverable after you register the program!
· Recovers files from deleted volumes - Data are often lost after power failures, hardware crashes and virus attacks. Hetman Uneraser will recover files from deleted, formatted and damaged volumes on HDD/USB drives and flash cards.
· Deep disk scanning - The use of cutting-edge scanning and data analysis algorithms allows you to find and recover twice as many files than you normally would with our competitors' products.
· Recovers files that were removed from the Recycle Bin - Recovers files that were deleted without being placed to the Recycle Bin or lost after the Recycle Bin was purged.
· The recovery process is fast and simple - Affordable, simple and always efficient, it will help you recover lost data in situations when time is critical and there is no help around.
· Safety - The software makes absolutely no changes to your drives while scanning and recovering data. Hetman Uneraser performs disk scanning on a low level and restores the selected images to a location of your choice.


Download:
Code:
http://hotfile.com/dl/85477434/ea27435/HU_v_3.0.0.0.rar.html

Folder Guard Professional 8.3.2 Full Version


Folder Guard Professional is a powerful computer security software that you can use to control access to files, folders, and other Windows resources, such as Control Panel, Start Menu, and so on. You can use Folder Guard to lock your personal files and folders with passwords, to stop other users from peeking into your records. You can even completely hide your private folders from virtually all applications, and such folders would remain invisible until you enter a valid password. You can also protect sensitive system files from modification or destruction, disable access to the removable drives, restrict access to Control Panel, and more.

Folder Guard Professional Edition for Windows Vista, XP, 2000, Server (both 32-bit and 64-bit)
This edition combines the 32-bit and x64 editions of Folder Guard in one convenient package. When installed on the 32-bit versions of Windows it offers the same functionality as Folder Guard 32-bit Edition. When installed on the x64 versions of Windows, it works in the same way as Folder Guard x64 Edition. The older MS-DOS-based releases of Windows (such as Windows, 95, 98, Me) are NOT supported by this edition.

Why should you choose Folder Guard:

>> Folder Guard lets you password protect your files and folders.
You can protect with password virtually any folder or file, allowing only the authorized users to open the protected files or folders. You can protect an unlimited number of files and folders, each with its own password, or you can use the Master Password of Folder Guard to unprotect them all at once.

>> Folder Guard can hide your personal folders from other users.
You can set up Folder Guard to hide your private folders (or make them appear empty). The folder would be hidden from virtually any program, including Windows Explorer, Office, MS-DOS programs, etc.

>> Folder Guard can restrict access to Control Panel, Start Menu, Desktop, etc.
You can set up Folder Guard to allow only certain users to change the computer settings with Control Panel, while denying that to other users. You can control access to various settings of Start Menu, Desktop, Taskbar, and other Windows resources. You can remove the Run and Search commands on the Start menu, hide specific drives, lock the Internet settings, and more.

>> Folder Guard can protect access to the floppy, CD-ROM and other removable drives
You can configure Folder Guard to allow or deny access to the removable drives, restricting the user's ability to run or install unauthorized programs on your computer.

>> Folder Guard is suitable for a wide range of the computer security tasks.
You can stop other users of your computer from peeking into your personal files. You can protect the system files and folders from destruction by cyber-vandals. You can allow specific users to run a program while deny it to others. You can allow users to use the removable drives to store their documents while prevent them from running unauthorized programs from the removable disks.

>> Folder Guard protects your files without encrypting them.
There is no risk of losing your documents if you lose your encryption key: with Folder Guard all your files remain intact, without modification of any kind.

>> Folder Guard lets you quickly enable or disable the protection via a "hot key".
You can choose a specific keyboard combination as the hot key of Folder Guard, to be able to quickly enable or disable the protection of your computer. Of course, the "hot key" is protected with your password, too, only you can use it!

>> Folder Guard can operate in the "stealth mode".
You can set up Folder Guard to operate in the stealth mode, to hide its own files and shortcuts from being seen by other users. You would still be able to control Folder Guard via the "hot key".

>> Folder Guard supports easy recovery in case of emergency.
If you forget your password, or experience other problems, simply use the Emergency Recovery Utility (free download) to quickly restore access to your protected folder.

>> Folder Guard works with drives of any format.
If your computer can handle it, Folder Guard can protect it. You don't have to format your hard drive with the NTFS file system: Folder Guard can protect files and folders on both NTFS and FAT/FAT32 disks.

>> Folder Guard runs on a wide range of Windows platforms.
From Windows 2000 to Windows XP to Windows Vista and later, with all service packs and hotfixes, all are supported by at least one of the available editions of Folder Guard.

>> Folder Guard is easy to use.
Folder Guard sports one of the most intuitive user interfaces, that makes it easy to use for both novice users and computer professionals.

>> Folder Guard "speaks" plain English.
You don't have to be a computer professional to understand how to use Folder Guard. The Quick Start Wizard can guide you through the steps necessary to set up the password protection of your personal folders. Folder Guard Advisor warns you about situations that may require your attention and offers possible workarounds. Folder Guard User's Guide describes its commands and operation in plain English, without "pseudo-techno" or "geeky" talk. (And it does not baby-sit you either).

>> Folder Guard is not a toy.
Folder Guard is used by large corporations and small businesses, schools and police departments, universities and correctional facilities, libraries and hospitals (to name a few).

>> Folder Guard is widely used.
Hundreds of thousands of copies of Folder Guard have been downloaded by computer users from virtually all countries of the world.

>> Folder Guard offers the best value for the money.
None of our competitors offers a product that would come close to Folder Guard.

>> Folder Guard is flexible.
Although Windows lets you restrict access to folders located on a NTFS drives, it cannot hide them. With Folder Guard, you can not only restrict access to, but also hide folders, or make them look empty. Unlike Windows, Folder Guard lets you protect only some files within a folder, and keep the rest of the files visible and accessible, if you wish. Or, you can protect files and folders each with its own individual password, and then unlock them separately from each other (Windows cannot do that).

>> Folder Guard can be used with other disk tools.
You can designate your anti-virus and other disk maintenance tools to be the "trusted" programs, to make them able to work with your protected disks without restrictions.

>> Folder Guard is extensible.
You can fine-tune the access rules to the files and folders of your computer by creating appropriate filters.

>> Folder Guard will save you hours of learning time.
You don't have to learn how to use the Group Policies, user groups, Access Control Lists, privileges, and other built-in security features of Windows, because Folder Guard does the hard work for you: its visual and intuitive user interface lets you manage the restrictions with ease.

>> Folder Guard is actively maintained.
Since its first release back in 1997, we've been continuously extending, enhancing, and improving Folder Guard. Now in version 7.92, Folder Guard gives you more power than ever.

Folder Guard 8.3.2 Incl. Patch zoo
Download : | FileSonic | DepositFiles | Turbobit |

Friday, February 18, 2011

Core Impact Exploiting Software. CRACK FULL DOWNLOAD.

Core Impact
CORE IMPACT Pro is the most comprehensive software solution for assessing the security of network systems, endpoint systems, email users and web applications. IMPACT Pro takes security testing to the next level by using penetration testing techniques to safely identify exposures to critical, emerging threats and trace complex attack
paths that can put your organization’s most valuable information
assets at risk.
See Your Security from an Attacker’s Viewpoint

CORE IMPACT Pro is the only penetration testing software that allows you to see your network, endpoint, email-user and web application security as an attacker would. With IMPACT, you can:

* pinpoint exploitable OS and services vulnerabilities in network and endpoint systems
* measure end-user response to phishing, spear phishing, spam and other email threats
* test web application security and demonstrate the consequences of web-based attacks
* distinguish real threats from false positives to speed and simplify remediation efforts
* configure and test the effectiveness of IPS, IDS, firewalls and other defensive infrastructure
* confirm the security of system upgrades, modifications and patches
* establish and maintain an audit trail of your vulnerability management practices
* schedule tests to run automatically on a recurring basis

IMPACT gives you the information you need to effectively secure customer records, financial data and intellectual property. This helps to protect your organization´s reputation, maintain network stability and productivity, and ensure compliance with industry and government regulations.
Integrate Penetration Testing Across Enterprise Systems and Applications

IMPACT enables you to safely assess an organization’s security posture against the top three attack methods that jeopardize data today:

* penetration of network defenses via exploits designed to compromise vulnerabilities in server operating systems and services, as well as client applications that run on desktop systems
* deception of employees, contractors and other end users via email-based social engineering attacks, such as phishing and spear phishing
* manipulation of web applications to access backend data via SQL injection and remote file inclusion techniques

The product’s unified interface provides a consistent methodology for replicating data breach attempts that spread among these attack vectors. For instance, IMPACT can replicate an attack that initially compromises a web server or end-user workstation and then propagates to backend network systems. Only IMPACT allows you to utilize penetration testing to assess your information security in such an integrated, comprehensive, in-depth and seamless fashion.
Pinpoint security exposures with a proven Penetration Testing methodology

With CORE IMPACT Pro, you don’t have to be a security expert to identify risks and determine how to improve your information security. Rapid Penetration Testing (RPT) methodology makes it easy for you to bring comprehensive security assurance to your organization. The RPT provides a simple and intuitive interface that automates network, end-user and web application testing, allowing you to quickly evaluate your security posture. You can leverage the RPT to frequently, accurately and cost-effectively test:

* Server and desktop operating systems and critical OS services
* Endpoint applications (e.g., web browsers, email readers, instant messaging, media players, business applications, productivity tools, etc.)
* Endpoint security solutions (e.g., antivirus, anti-phishing, anti-malware, host-based intrusion detection and prevention systems, etc.)
* End-user awareness of phishing, spam and other social engineering attacks
* Web applications (e.g., e-commerce, online banking, customer self-service applications, ERP solutions, etc.)
* IDS, IPS, firewalls and other network security solutions
* Vulnerability scanner results and remediation system effectiveness
* Security policies and compliance processes for various regulations (e.g., PCI, GLBA, SOX, HIPAA, etc.)

Focus your resources and gain confidence in your security posture

By enabling you to validate network vulnerabilities, end-user threat response, and web application exposures on a regular basis, CORE IMPACT Pro gives you confidence that your security infrastructure and policies are performing as required. Rather than simply identifying potential threats, you methodically and safely launch real-world attacks that:

* positively distinguish critical network vulnerabilities from false positives
* identify exactly where your organization is at risk from social engineering threats, such as phishing, spear phishing and spam
* validate security exposures in web applications and determine where application code should be improved
* combine network, client-side and web application tests to replicate multistaged attacks

Code:
 
http://rapidshare.com/files/226834129/core_impact.rar

Thursday, February 17, 2011

Havij Tutorial.

Download havij 1.10


First Find a sqli infected site .Now here i found a vulernable site

Now Let's start

Open havij and copy and paste infected link as shown in figure
Now click in the "Analyze"
Then It shows some messages there....Be alert on it and be show patience for sometime to find it's vulernable and type of injection and if db server is mysql and it will find database name.Then after get it's database is name like xxxx_xxxx

Then Move to another operation to find tables by clicking "tables" as figure shown.Now click "Get tables" Then wait some time if needed

After founded the tables ,you can see there will be "users" Put mark on it and click in the " get columns " tab as shown in figure
In that Just put mark username and password and click "Get data"

Bingo Got now id and pass that may be admin...
The pass will get as md5 you can crack it also using this tool as shown in figure...



 

.........................................................................................................................................B......................
.........................................................................................................................................