Tuesday, May 18, 2010

computer tips and tricks

hacking tricks
getting Ip's:--

To see the ip all computers you are connected to (web servers, people attempting to hack into your computer).
Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.
Type netstat -r at the command prompt to see the ip of all computers you are connected to

In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn't send file through its proxy.
When you type the netstat -r (or -a for a different view) the ip's are under the foreign address table. The ports are seperated by a : . Different programs use different ports, so you can work out which ip's are from which program.
Connecting to other computers and what ports are:--

Servers send information. Clients retrieve. Simple.
Windows comes with a built in program to connect to other computers called telnet.
To start Windows telnet Start menu> Run> type Telnet. Click connect> remote system
Ports are doors into computers. Hosts are computer names
(ip number or a name that is translated into the ip automatically)
Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is:
11 :- Sends info on the computer
21 :- FTP (File transfer program)
23 :- Telnet (Login to the computers command line)
25 :- Smtp (Sends mail)
80 :- Http (Web pages)
There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in.
Anyway, back to telnet.
Type Yahoo! as the host and port as 80 the click connect.
If nothing happens, you're in. Wow. You are connected to Yahoo's server.
You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about.
Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)
Allowing dos and regedit in a restricted Windows

See OpenDNS for some very cool tactics.
A very simple tactic I found after accidentally locking myself out of dos and regedit is to open notepad and type the following:
REGEDIT4
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVe rsionPoliciesWinOldApp]
"Disabled"=dword:0
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVe rsionPoliciesSystem]
"DisableRegistryTools"=dword:0

Save it as something.reg then run it. Simple.

Making undeletable, unreadable folders

Tested on Windows 95/98
By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some randomn numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command to make a directoy, now try and open the directory in Windows, you can't. To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename)

Proxies

Proxies are computers that you connect through, hiding your computer. Most aren't anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.
Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format hostort

Password files
If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. Download showpass.zip from hereto view all passwords stored. Or rename the files to .bak to delete passwords.
In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you're passwords are shadowed (not actually in etc/passwd). Also make sure they aren't in a file called shadow, especically not in a file called etc/shadow.
Unix passwords are encrypted far better than Windows one's (to be fair, Windows 95 isn't designed for users), but can still be cracked through a program called jon.
 
Skip registering on sites
Skip registering on sites
So sometimes u r to lazy to login or u forget password and u quick need some information.
So good way is faking UA <- User Agent
I will show u example of firefox
Type in URL bar following:
about:config
then u should see alot of options which can be changed
1cm down u will see "Filter:"
Type in box
"useranget" without quotes
We need to change just
general.useragent.extra.firefox
Deafult is Firefox x.x.x or something like that^^
So how to bypass login on that websites(also on h4cky0u)?
just double click & type in that field
Code: Select all
Googlebot/2.X How Google crawls my site
So websites will think u r google bot and allow u searching on website without login smile.gif
enjoy, I've found this on some forum
 
Has Your Anti-Virus Been Compromised?



Do you think you might have a virus on your machine? Not sure if your AV is doing its job? Well, here’s a simple test.

First, create a new text file and paste the following code into it:

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Then save the text as a .COM file (any name will do, like testing.com). Either scan the file manually or the auto protect feature of most AV programs should have already caught it. (My SAV caught it immediately upon saving it as a .txt file.)

This test string is a way to test to see if an anti virus program is not working. It was created by the anti-virus industry as a standardized test and should not be taken to be an effective measurement of your anti viruses ability.

The whole point of the EICAR test is to see if an anti-virus program has been infected. If the anti-virus program doesn't detect the string, then there is a chance a virus has done something nasty to it. This was only meant as an internal test for developers though, not for end users. Also, this doesn’t mean that your system is free of viruses. Just that your AV is working to the best of it capabilities.

The only reliable test for how well your anti-virus program is doing, is how well it's doing funnily enough. Is your computer on fire? Have missiles just launched? Are robots trying to tear down your office door? If so you may have a virus, otherwise your AV is doing it's job.

No comments:

Post a Comment