Tuesday, 25 December 2012

How to Hack a Cisco Phone





Columbia computer scientist Ang Cui helped uncover a weakness in Cisco IP phones that can let a hacker take complete control of them.

Read more at http://spectrum.ieee.org/computing/embedded-systems/cisco-ip-phones-vulnerable

How to hack games from the Windows 8 store




Hi folks,



In this article I’ll share the results of ad-hoc security vulnerabilities research I’ve done on windows 8 apps deployment. Specifically, we’ll discuss fundamental design flaws that allow to Reverse Engineer Win8 apps, modification of installed apps and the negative implications on Intellectual Property rights protection, Licensing models and overall PC security. Finally we’ll

Sunday, 23 December 2012

Remove Windows XP Genuine Validation

windows xp genune validation

My many friend have asked me how can we remove windows xp genuine validation. So I think many other may have the same problem and for that I have written this article about How to remove windows xp genuine validation. Well to remove windows xp genuine validation you just have to change the registry key of the windows. well you dnt have to worry about how will you change it I have made it very easy.. Smile

 

Follow the simple steps to remove windows xp genuine validation

1. Open notepad and paste the bellow code in it.

Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents] "OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd "LastWPAEventLogged"=hex:d5,07,05,00,06,00,07,00,0f,00,38,00,24,00,fd,02 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion] "CurrentBuild"="1.511.1 () (Obsolete data - do not use)" "InstallDate"=dword:427cdd95 "ProductId"="69831-640-1780577-45389" "DigitalProductId"=hex:a4,00,00,00,03,00,00,00,36,39,38,33,31,2d,36,34,30,2d,\ 31,37,38,30,35,37,37,2d,34,35,33,38,39,00,5a,00,00,00,41,32,32,2d,30,30,30,\ 30,31,00,00,00,00,00,00,00,00,0d,04,89,b2,15,1b,c4,ee,62,4f,e6,64,6f,01,00,\ 00,00,00,00,27,ed,85,43,a2,20,01,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,31,34,35,30,34,00,00,00,00,00,00,00,ce,0e,\ 00,00,12,42,15,a0,00,08,00,00,87,01,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,94,a2,b3,ac "LicenseInfo"=hex:9e,bf,09,d0,3a,76,a5,27,bb,f2,da,88,58,ce,58,e9,05,6b,0b,82,\ c3,74,ab,42,0d,fb,ee,c3,ea,57,d0,9d,67,a5,3d,6e,42,0d,60,c0,1a,70,24,46,16,\ 0a,0a,ce,0d,b8,27,4a,46,53,f3,17

2. Now save it as anything.reg like windows.reg and double click on it  and click Yes if prompted.
3. Now you have done !

your windows xp is genuine now !!

Tuesday, 18 December 2012

Block your website from scanners

block website from scanner

Hackers uses the scanners to scan the website and to find the security vulnerability. And today I am going to share one trick to block all the scanners to scan your website. Here I am sharing one script Just add that script in to the .htaccess of your website and it will block all the security scanners like Acunetix, nessus, Openvas etc.

 

 

 

RewriteEngine On
<IfModule mod_rewrite.c>
RewriteCond %{HTTP_USER_AGENT} ^w3af.sourceforge.net [NC,OR]
RewriteCond %{HTTP_USER_AGENT} dirbuster [NC,OR]
RewriteCond %{HTTP_USER_AGENT} nikto [NC,OR]
RewriteCond %{HTTP_USER_AGENT} SF [OR]
RewriteCond %{HTTP_USER_AGENT} sqlmap [NC,OR]
RewriteCond %{HTTP_USER_AGENT} fimap [NC,OR]
RewriteCond %{HTTP_USER_AGENT} nessus [NC,OR]
RewriteCond %{HTTP_USER_AGENT} whatweb [NC,OR]
RewriteCond %{HTTP_USER_AGENT} Openvas [NC,OR]
RewriteCond %{HTTP_USER_AGENT} jbrofuzz [NC,OR]
RewriteCond %{HTTP_USER_AGENT} libwhisker [NC,OR]
RewriteCond %{HTTP_USER_AGENT} webshag [NC,OR]
RewriteCond %{HTTP:Acunetix-Product} ^WVS
RewriteRule ^.* http://127.0.0.1/ [R=301,L]
</IfModule>

Just add above code in to the .htaccess of your website and all the security scanners will be blocked Smile

Monday, 17 December 2012

Collection of Top 10 Deface page

Top deface page

What is deface page ?

After getting admin access in the website hacker will upload his own control penal that’s called the shell and with the help of the shell hacker will Edit the index page of the website and he will change the index page coding so that website can be called the defaced website. And the index page is called the deface page. And the deface page is coded in the simple html language.

 

 

Top 10 deface pages

You don’t have enough time to code the deface page ? well here I am sharing the top 10 deface pages ever.

1- Happy Birthday Deface Page

When you want to wish Happy birthday to some special people then you can use this deface page.
Live Demo : Download


2- Deface Page For Long Messages + Video

When you have to send the long message then you can use this deface page, this is a pro. deface page Designed By Ffessxt Prince Indishell.
Live Demo : Download


3- #opFreedom Palestine,
Deface page with free Palestine message, Designed by The Hackers army
Live Demo : Download


4- Lovely deface Page for Your Girlfriend or loved one

This deface page is designed by the MInhal for his Girlfriend  you can use it for your loved one :D
Live Demo : Download

 

5-Multi color deface page
This is just awesome deface page I liked this deface page personally.
Live Demo : Download

 

6- Simple Black Deface Page
Designed by Hax root
Live Demo : Download

7-Matrix Style Deface Page

Designed by ShOrTy420
Live Demo : Download

8- Awesome  #opFreedom Palestine Page with New Functions

this page designed by Syakila Daniel
Live Demo : Download

9- Awesome Matrix style Deface Page

Designed by coded32 
Live Demo : Download

10- Romantic deface Page with Roses

designed by Deepak  Carpenter
Live Demo : Download


All the deface pages are shared in the pastebin and you can easily edit it and save it index.html and anything you like .html.

credit:devilscafe.in

Sunday, 9 December 2012

Improve Backtrack5

Top tips to improve Backtrack5Backtrack is specially designed for the security researcher and hackers. Its most awesome operating system with lots of the tools but in this operating system we have to add some of the basic application to improve the performance of the operating system. We have to install some of the basic application to use backtrack5 daily. There are 12 basic applications to install in the backtrack5. Now just open your backtrack terminal because in this operating system we have to enter the commands to install the applications.

1. Software Center

Software Center helps you to manage the applications and to search the applications to install Software Center enter the following command in your backtrack terminal.

apt-get install software-center

This command will install Ubuntu software center using that you can search your installed application and you can also install application with just a single click.

 

2. Messenger

To install Messenger in the backtrack enter the bellow command in the terminal and hit enter

apt-get install empathy && apt-get install pidgin

Using this messenger you can be connected with yahoo, Facebook etc.

 

3. Screen Recorder

xvidcap is best screen recorder for the backtrack I have used it for 5-6 time and I personally liked it.
To install screen recorder just enter the following command in the terminal.

apt-get install xvidcap

 

4.Team Viewer

You have to download it from their official website and you have to add the following command to install the team viewer.

root@bt:~# cd Downloads
root@bt:~/Downloads# dpkg -i teamviewer_linux*.deb

5. For archive extraction

Install ark archive in the backtrack5 by adding the following command in the terminal

apt-get install ark

 

6. FTP client

To install FTP client into the backtrack add the following command in the terminal

apt-get install filezilla

 

7. PDF Reader

Install PDF reader into the backtrack 5 add the following command in the terminal

apt-get install xpdf

And now you have done ! now you can easily use Backtrack daily base :)

Top 3 Penetration test E-book

meta sploit ebooks

After publishing many tutorials on hacking today I am going to share my three fav. Penetration test E-book named Metasploit Penetration, Nmap cook-Book, Net cut Power tools. you can download these books from the bellow links.

 Metasploit Penetration | Nmap cook-Book | Net cut Power tools

Saturday, 8 December 2012

Crack any version of Internet Download Manager (idm) manually

creack internet download manager

Internet Download Manager is the best download manager all we know using Internet Download Manager we can download youtube videos and many other web videos easily and the best thing about the Internet Download Manager is you can resume the pushed download link many time. But Internet Download Manager is premium software means its not free you can use it for a 30 days trial version and you have to buy the license. But I am using it without buying the license. So follow the simple steps to crack your Internet Download Manager manually.

Follow the simple steps to crack Internet Download Manager

1. Download the hosts file from here.

2.go to  C:\Windows\System32\drivers\etc and replace that old hosts file with new one.

3. Now open IDM and go to registration > registration.

4. Now enter your name,email etc and add this key HUDWE-UO689-6D27B-YM28M and hit okay
and you have done ! after this your IDM will never ask for the serial key :)
If you have any query then feel free to ask ! make a comment.