Thursday, October 30, 2008
getting movies, mp3,games using google
goto www.google.com
put this string in
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
notice that iam only changing the word after the parent directory, change it to what you want and you will get lots of goods. i got plenty of movie sites heh.
Google secrets
--------------------------------------------------------------------------------
method 1
?ww.google.com
put this string in google search:
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Notice that i am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.
voila!
method 2
?ww.google.com
put this string in google search:
?intitle:index.of? mp3
You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson
Google Tips & Tricks
Utilizing search engines
==================================================
So much information is on the web, its mind boggling. Thankfully we have search
engines to sift through them and catagorize them for us. Unfortunatly, there is still so
much info that even with these search engines, its often a painstakingly slow process
(something comparable to death for a hacker) to find exactly what you're looking for.
Lets get right into it.
I use google.com as my primary search engine because it presently tops the charts as far as
the sites that it indexes which means more pertinent info per search.
1. Page translation.
Just because someone speaks another language doesn't mean they dont have anything useful to say. I use translation tools like the ones found at
http://babelfish.altavista.com
and
http://world.altavista.com
to translate a few key words I am searching for. Be specific and creative because these tools arent the most accurate things on the planet.
2. Directories.
These days everything is about $$$. We have to deal/w SEO (search engine optimization) which seems like a good idea on paper until you do a search for toys and get 5 pornsites in the first 10 results. Using a sites directory will eliminate that. You can narrow your search down easily by looking for the info in specific catagories. (PS google DOES have directories, they're at: directory.google.com)
3. Here are some tips that google refers to as "advanced"
A. "xxxx" / will look for the exact phrase. (google isnt case sensitive)
B. -x / will search for something excluding a certain term
C. filetype:xxx / searches for a particular file extention (exe, mp3, etc)
D. -filetype:xxx / excludes a particular file extention
E. allinurl:x / term in the url
F. allintext:x / terms in the text of the page
G. allintitle:x / terms in the html title of that page
H. allinanchor:x / terms in the links
4. OR
Self explanatory, one or the other... (ie: binder OR joiner)
5. ~X
Synonyms/similar terms (in case you can't think of any yourself)
6. Numbers in a range.
Lets say you're looking for an mp3 player but only want to spend up to $90. Why swim through all the others? MP3 player $0..$90 The 2 periods will set a numeric range to search between. This also works with dates, weights, etc
7. +
Ever type in a search and see something like this:
"The following words are very common and were not included in your search:"
Well, what if those common words are important in your search? You can force google to search through even the common terms by putting a + in front of the denied word.
8. Preferences
It amazes me when I use other peoples PCs that they dont have their google search preferences saved. When you use google as much as I do, who can afford to not have preferences? They're located on the right of the search box, and have several options, though I only find 2 applicable for myself...
A. Open results in new browser
B. Display 10-100 results per page. (I currently use 50 per page, but thats a resolution preference, and 5X's the default)
9. *
Wildcard searches. Great when applied to a previously mentioned method. If you only know the name of a prog, or are looking for ALL of a particular file (ie. you're DLing tunes) something like *.mp3 would list every mp3.
10. Ever see this?
"In order to show you the most relevant results, we have omitted some entries very similar to the X already displayed. If you like, you can repeat the search with the omitted results included." The answer is YES. yes yes yes. Did I mention yes? I meant to.
11. Search EVERYWHERE
Use the engine to its fullest. If you dont find your answer in the web section, try the group section. Hell, try a whole different search engine. Dont limit yourself, because sometimes engines seem to intentionally leave results out.
ex. use google, yahoo, and altavista. search the same terms... pretty close, right? Now search for disney death. Funny, altavista has plenty of disney, but no death...hmmm.
If you've read this far into this tutorial without saying, "Great, a guy that copied a few google help pages and thinks its useful info" then I will show you WHY (besides accuracy, speed, and consistancy finding info on ANYTHING) its nice to know how a search engine works. You combine it/w your knowledge of other protocol.
Example:
Want free music? Free games? Free software? Free movies? God bless FTP! Try this search:
intitle:"Index of music" "rolling stones" mp3
Substitute rolling stones/w your favorite band. No? Try the song name, or another file format. Play with it. Assuming SOMEONE made an FTP and uploaded it, you'll find it.
For example....I wanted to find some Sepultura. If you never heard them before, they're a Brazilian heavy metal band that kicks ass. I started with this:
intitle:"Index of music" "Sepultura" mp3 <-- nothing
intitle:"Index of msica" "Sepultura" mp3 <-- nothing
intitle:"Index of musica" "Sepultura" mp3 <-- not good enough
intitle:"Index of music" "Sepultura" * <-- found great stuff, but not enough Sepultura
At this point it occurs to me that I may be missing something, so I try:
intitle:"index of *" "sepultura" mp3 <-- BANG!
(and thats without searching for spelling errors)
Also try inurl:ftp
I find that * works better for me than trying to guess other peoples mis-spellings.
The same method applies for ebooks, games, movies, SW, anything that may be on an FTP site.
I hope you enjoyed this tutorial, and I saw that recently a book and an article was written on the very same topic. I havn't read them as of yet, but check em out, and get back to me if you feel I missed something important and should include anything else.
intitle:"index of" "google hacks" ebook
Ps. I've said it before, I'll say it again... BE CREATIVE.
You'll be surprised what you can find.
How To Find Serial Numbers On Google
if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up
this works great in google
HOW DOES THIS WORK?
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.
1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.
2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
I hope this trick help you finding your ccd keys easily
Enjoy :)
Play Games On PS2 Without ModChip
In this guide, you will learn the very easy method of making copies of your PS2 and normal Playstaion games so that they are playable on the PS2. This guide will provide you with all the information you need to burn PS2 games.
You will need the following things to burn PS2 games:
a computer with a cd burner
a blank cd-r (don't use the re-recordable type a.k.a. cd-rw)
CDRWIN The version in this guide is 3.8D
FireBurner
PS2 patcher
GameShark 2 for PS2 - the GameShark 2 is available at most stores that sell video games, a few examples would be Best Buy, Circuit City, or Target. You want version 1.0 of the GameShark 2. I have heard that all other versions work, but I have only tested version 1.0. GameShark2 costs about 29.95. Believe me, its worth it!!!
and a PS2 to play the games.
Burning the PS2
The process of burning ps2 games is easy. It is really only a 3 step process.(read the game, patch the game, and burn the game.)
1) insert game into cd drive.
2) Open up CDRWIN and click on the extract disk/tracks/sectors button.
3) Your settings should be as follows:
For extract mode select disk image/ cue sheet
For read options select raw
For error recovery select abort
For jitter correction select auto
For subcode analysis select auto
Data Speed and Audio Speed should be the same
For read retry count type 0
For subcode threshold type 300
Make sure you selected the drive that your PS2 game is in
Make sure you typed in the file name (just type the name of the game) and Check the directory that you're putting your file in.
Then just press start
If you get an error in the middle of reading the disk that says something like can't read sections xxxx-xxxxx of disk, it is becase the disk is scratched and CDRWIN can't read it. Try to clean the disk, if that doesn't work you just have to use a different game (a different copy of the same game)
4) Once CDRWIN is done, click ok and then exit CDRWIN. Open up the PS2 patcher, select the game file you just created and patch it (make sure you select the RAW option.
5) Close the PS2 patcher, next open up Fireburner. Click on the visual cue burner button. When you created your .bin file (the game file) in CDRWIN, a .cue file should have automaticly been created. In that case, drag and drop the .cue file into the Fireburner window. If the .cue file was not created, just drag and drop the .bin file into the Fireburner window. After you have done that, right click (click with the right side button on your mouse) on your file in the Fireburner window, and select Burn/Test burn.
6) In the options window that appears, select your cdwriter, select your write speed(doesn't really matter), and make sure you select Track at once (TOA) for the recording method. As for the options on the right side of the options window, make sure only the following are checked: eject cd and close session.
When you have selected the options, click ok and your PS2 game will burn. That's all you have to do to burn a game.
Burning a Playstion (PSone) game
1) If you want, you can spend 5 minutes using the same method as above to burn your playstation game, but its not necessary. For a playstation game (not PS2) all you need to do is use a program that lets you make an exact copy or a backup disk (CDRWIN) You don't need any selected options, you just need to start the game on the PS2 the same way you would a PS2 game.
Starting the game on your PS2
1) Now for the fun part (and challenging part the first couple of times) This may sound a little complicated at first, but after you do it 3 or 4 times, it's super easy. First things first, you must remove the front of your game drive on your PS2(not a big deal, it can snap on and off).
2) Now insert your gameshark 2 cd(make sure the gameshark memory card is in one of the 2 slots, doesn't matter which one.)
3) In the gameshark options, choose start game, then without. Your screen should read Please insert game disk then press X to continue.
4) Now this part can be trickey for beginners, so I will provide pictures
-the main purpose of this starting method is to open up the PS2 and swap the gameshark disk with your burned game without the PS2 knowing you did it. DO NOT press the eject button on the PS2!!!
-with the PS2 cd tray cover removed, you will be able to look in and see a while tab inside the PS2. With a credit card (or something like it) gently slide the white tab all the way over to the right, if you did it correctly, this should allow you to manually pull open the PS2 cd tray.
5) Next, take the gameshark disk out of the PS2 and put in your burned game.
6) Gently push the PS2 cd tray fully back into the PS2 (Don't press the eject button).
7) Now you need to slide that white tab all the way back to the left (its origional position). To do this you get a strong papper clip(needs to be a strong one) stick it into the PS2 on the right side of the white tab and push the tab back to the left.
If you pushed the tab all the way back to the left and did every thing else right, you are ready to play your game. Just press X on your PS2 controler and watch as your burned game loads. ( It may load slower than an original game, depending on the cd-r you are using, I use Verbatim cd-r's and have no problems.)
Download Programs Mentioned:
http://rapidshare.de/files/961808/PS2_Play.rar.html
Free X-Box Live
WELL GUESS WHAT!!!!!!!!
You can now get it without paying a cent (that is if you have a free 2 month trial)
First go to http://www.xbconnect.com/downloads.php and download the current version of XBConnect...
Secondly you must get a Ethernet cable and connect your X-BOX to your router (if you have, you MUST have one BTW)
Thirdly install and open xbconnect. Create a new account .......
Fourthly go on www.xbox.com/live and sign in your .NET passport and create a profile for xbox live
Fifthly open your xbox with a xbox live supported game and follow the setup for xbox live ....
And YOUR DONE!!!!!
Saturday, October 18, 2008
How To Make XP GO Faster
There are quite a few services you can disable from starting automatically.
This would be to speed up your boot time and free resources.
They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.
Some possibilities are:
Alerter
Application Management
Clipbook
Fast UserSwitching
Human Interface Devices
Indexing Service
Messenger
Net Logon
NetMeeting
QOS RSVP
Remote Desktop Help Session Manager
Remote Registry
Routing & Remote Access
SSDP Discovery Service
Universal Plug and Play Device Host
Web Client
--------------------------------------------------------------------------------
Cleaning the Prefetch Directory
WindowsXP has a new feature called Prefetch. This keeps a shortcut to recently used programs.
However it can fill up with old and obsolete programs.
To clean this periodically go to:
Star / Run / Prefetch
Press Ctrl-A to highlight all the shorcuts
Delete them
--------------------------------------------------------------------------------
Not Displaying Logon, Logoff, Startup and Shutdown Status Messages
To turn these off:
Start Regedit
Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem
If it is not already there, create a DWORD value named DisableStatusMessages
Give it a value of 1
--------------------------------------------------------------------------------
Clearing the Page File on Shutdown
Click on the Start button
Go to the Control Panel
Administrative Tools
Local Security Policy
Local Policies
Click on Security Options
Right hand menu - right click on "Shutdown: Clear Virtual Memory Pagefile"
Select "Enable"
Reboot
For regedit users.....
If you want to clear the page file on each shutdown:
Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementClearPageFileAtShutdown
Set the value to 1
--------------------------------------------------------------------------------
No GUI Boot
If you don't need to see the XP boot logo,
Run MSCONFIG
Click on the BOOT.INI tab
Check the box for /NOGUIBOOT
---------------------------------------------------------------------------------
Speeding the Startup of Some CD Burner Programs
If you use program other than the native WindowsXP CD Burner software,
you might be able to increase the speed that it loads.
Go to Control Panel / Administrative Tools / Services
Double-click on IMAPI CD-Burning COM Service
For the Startup Type, select Disabled
Click on the OK button and then close the Services window
If you dont You should notice
--------------------------------------------------------------------------------
Getting Rid of Unread Email Messages
To remove the Unread Email message by user's login names:
Start Regedit
For a single user: Go to HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionUnreadMail
For all users: Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUnreadMail
Create a DWORD key called MessageExpiryDays
Give it a value of 0
------------------------------------------------------------------------------
Decreasing Boot Time
Microsoft has made available a program to analyze and decrease the time it takes to boot to WindowsXP
The program is called BootVis
Uncompress the file.
Run BOOTVIS.EXE
For a starting point, run Trace / Next Boot + Driver Delays
This will reboot your computer and provide a benchmark
After the reboot, BootVis will take a minute or two to show graphs of your system startup.
Note how much time it takes for your system to load (click on the red vertical line)
Then run Trace / Optimize System
Re-Run the Next Boot + Drive Delays
Note how much the time has decreased
Mine went from approximately 33 to 25 seconds.
--------------------------------------------------------------------------------
Increasing Graphics Performance
By default, WindowsXP turns on a lot of shadows, fades, slides etc to menu items.
Most simply slow down their display.
To turn these off selectively:
Right click on the My Computer icon
Select Properties
Click on the Advanced tab
Under Performance, click on the Settings button
To turn them all of, select Adjust for best performance
My preference is to leave them all off except for Show shadows under mouse pointer and Show window contents while dragging
---------------------------------------------------------------------------
Increasing System Performance
If you have 512 megs or more of memory, you can increase system performance
by having the core system kept in memory.
Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementDisablePagingExecutive
Set the value to be 1
Reboot the computer
---------------------------------------------------------------------------
Increasing File System Caching
To increase the amount of memory Windows will locked for I/O operations:
Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management
Edit the key IoPageLockLimit
-----------------------------------------------------------------------------
Resolving Inability to Add or Remove Programs
If a particular user cannot add or remove programs, there might be a simple registry edit neeed.
Go to HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesUninstall
Change the DWORD NoAddRemovePrograms to 0 disable it
4096 - 32megs of memory or less
8192 - 32+ megs of memory
16384 - 64+ megs of memory
32768 - 128+ megs of memory
65536 - 256+ megs of memory
How To BOOT XP Faster
1. Open notepad.exe, type "del c:windowsprefetch tosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device 0 or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.
WindowsXP should now boot REALLY faster.
Brontok Made in VB
Why the virus this discusses ?,... I m. ... ... actually I was not too interested in discussing this, I think what I'm interested membahasnya ... I definitely think I caused some of this ..... many frenzied days ago about the virus and brontok was menginfeksi some computer teman2ku.
Ok to shorten the time it's direct
After the file structure visible from the virus was making virusnya using visual basic 6.0 ops .... it made in hell Coy .... But this is added to make interesting.
This virus consists of 1 and 1 Module form, with the name
Form -> BrontokForm
Module -> API
With the following details:
Begin VB.Form BrontokForm
Caption = "Brontok.A"
ForeColor = & & H8000000F
ScaleMode = 1
BeginProperty Fonts
Name = ""
Size = 195323.4944
Charset = 29
Weight = 774
EndProperty
Begin VB.Timer TmrBrontok
Enabled = 0 'False
Interval = 2000
Left = 2160
Top = 0
Width = 57352
Height = 1
End
End
With the name Project: Brontok.vbp, which are stored in the directory:
F: \ VPROJECT \ REHAB \ Re-1 \ BRONTOK.A
Clear that the virus was made by Maggie local programs, which have the skill Secondary Keatas.
There are few & Function procedure used by the name:
Form_QueryUnload (Cancel As interested, UnloadMode As interested)
TmrBrontok_Timer ()
Subr_004 ()
CekKoneksiInternet ()
ManipulasiExec ()
Subr_007 ()
KeluarDong ()
BronReg ()
CopyAppData ()
DownloadVir ()
StartDong ()
Startup ()
DecTeks ()
MutMutex ()
MutCr ()
DownloadFile ()
CekUpdate ()
InfekNetwork ()
Title ()
CekRemDisk ()
BikinFile ()
GetEmailFile ()
CekValidMail ()
GetTeks ()
CekKar ()
ListMail ()
GetTargetMBhs ()
GavMailer ()
BrontokMail ()
Subr_031 ()
DataEmail ()
DownMIME ()
FindFilesAPI ()
ListFileGav ()
InfekFile ()
SmallAttack ()
MinggirLoe ()
GetHostByNameAlias ()
StripNulls ()
BikinKredit ()
Fireworks and some of the functions that used anatara others:
Read Write a function to register:
Declare Function RegOpenKeyExA lib "advapi32.dll" ()
Declare Function RegSetValueExA lib "advapi32.dll" ()
Declare Function RegCloseKey lib "advapi32.dll" ()
Declare Function RegCreateKeyExA lib "advapi32.dll" ()
Declare Function Sleep lib "KERNEL32" ()
Getting Special Folder:
Declare Function SHGetPathFromIDList lib "shell32.dll" ()
Declare Function SHGetSpecialFolderLocation lib "shell32.dll" ()
Reading Contents Page Site:
Declare Function InternetOpenA lib "wininet.dll" ()
Declare Function InternetOpenUrlA lib "wininet.dll" ()
Declare Function InternetReadFile lib "wininet.dll" ()
Declare Function InternetCloseHandle lib "wininet.dll" ()
Getting From A Window Caption:
Declare Function GetWindowTextA lib "user32" ()
Declare Function GetWindowTextLengthA lib "user32" ()
Get active HWND Window:
Declare Function GetForegroundWindow lib "user32" ()
Shutdown, Reboot, LogOff Windows:
Declare Function ExitWindowsEx lib "user32" ()
Declare Function GetCurrentProcess lib "KERNEL32" ()
Declare Function OpenProcessToken lib "advapi32" ()
Declare Function LookupPrivilegeValueA lib "advapi32" ()
Declare Function AdjustTokenPrivileges lib "advapi32" ()
Media get the type of good Removable Disk, CD-Rom, etc.:
Declare Function GetDriveTypeA lib "KERNEL32" ()
Declare Function ShellExecuteA lib "shell32.dll" ()
Declare Function RtlMoveMemory lib "KERNEL32" ()
Winsock API:
Declare Function Closesocket lib "wsock32.dll" ()
Declare Function connect lib "wsock32.dll" ()
Declare Function htons lib "wsock32.dll" ()
Declare Function inet_addr lib "wsock32.dll" ()
Declare Function recv lib "wsock32.dll" ()
Declare Function send lib "wsock32.dll" ()
Declare Function socket lib "wsock32.dll" ()
Declare Function gethostbyname lib "wsock32.dll" ()
Declare Function WSAStartup lib "wsock32.dll" ()
Declare Function WSACleanup lib "wsock32.dll" ()
Declare Function WSAAsyncSelect lib "wsock32.dll" ()
Function associated with the file:
Declare Function FindFirstFileA lib "KERNEL32" ()
Declare Function FindNextFileA lib "KERNEL32" ()
Declare Function GetFileAttributesA lib "KERNEL32" ()
Declare Function FindClose lib "KERNEL32" ()
Etc. ...
Clearly visible on the functions of the fire that is used is that the transmission of the virus brontok use several ways. such as sending email, search the name of the computer that is connected with kejaringan copy itself to the folder in which the sharing and copying himself on the window explorer active. I think one of the creators of viruses have their own SMTP (whew ati-ati gold Grammy ketangkep)
If the views of the structure at the back there are some words that the Encrypt, a possibility exploit code or name gnomes. only the gods and creator of the virus that bad.
This virus has the function of the ExitWindowsEx files imported from user32.dll, this function is usually used to shut the windows.
And sipembuat create viruses that contain the triger off / restart the computer.
In addition, the structure of the file, there are words like this:
FOLDER.HTT
RORO
. HTT
. DOC
. CSV
. EML
. Cfm
. PHP
. WAB
. EML
. TXT
. HTML
. Htm
MY DATA SOURCES
California EBOOKS
MY MUSIC
MY SHAPES
My Videos
MY DOCUMENT
And address some of the sites attacked, what DDOS yes ... I'll be there .. .. I'll be there though. In addition, the virus include the manufacturer's name: - JowoBot # VM Community --
Then try to see the fire following three functions:
Declare Function GetWindowTextA lib "user32" ()
Declare Function GetWindowTextLengthA lib "user32" ()
Declare Function GetForegroundWindow lib "user32" ()
It seems the manufacturer utilize windowexplorer virus to multiply the file to another folder. Caption with how to read are active in the windows directory that contains the name / path. By using the above 2 (GetWindowTextA & GetWindowTextLengthA), while the function GetForegroundWindow used to get the Window Handle (HWND) that are active.
Marketing is not a virus can copy itself was not windowExplorer Caption in the form of Directory / path. To disable the creator of the virus in the Folder Options settings.
Then a more unique virus again read the contents page of this site, which opens on a InternetExplorer using function:
Declare Function InternetOpenA lib "wininet.dll" ()
Declare Function InternetOpenUrlA lib "wininet.dll" ()
Declare Function InternetReadFile lib "wininet.dll" ()
Declare Function InternetCloseHandle lib "wininet.dll" ()
I guess I, creator of the virus seems to find the email address on sites that are open and send the virus is based on the email address found on the pages with keywords such as mailto: ataupun@xxxx.com etc. ...
To clean up .... please read more at other sites AntiVirus ... um ... .. he's sorry that I only discuss this.
But this suitcase off the virus quickly, try entering safemode then rename the file MSVBVM60.dll become MSVBVM60.dl_
because this virus requires VB runtime. So I think it is active, we can remove some registry entry and file viruses brontoknya.
Unfortunately this virus does not use the program Compressor, making it easier for people to recognize them.
v
Hacking on XP part 3
Want a computer you can telnet into and mess around with, and not get into trouble no matter what you do to it? I've set up my
techbroker.com (206.61.52.33) with user xyz, password guest for you to play with. Here's how to forge email to xyz@techbroker.com using
telnet. Start with the command:
C:\>telnet techbroker.com 25
Connecting To Techbroker.com
220
Now you type in who you want the message to appear to come from:
helo santa@techbroker.com
Techbroker.com will answer:
250
Next type in your mail from address:
mail from:santa@techbroker.com
250 Requested mail action okay, completed
Your next command:
rcpt to:xyz@techbroker.com
250 Requested mail action okay, completed
Your next command:
data
354 Start main input; end with
Newbie note:
Anyhow, try typing:
This is a test.
.
250 Requested mail action okay, completed
quit
221
Connection to host lost.
Using techbroker's mail server, even if you enable full headers, the
message we just composed looks like:
Status: R
X-status: N
This is a test.
That's a pretty pathetic forged email, huh? No "from", no date.
However, you can make your headers better by using a trick with the data command. After you give it, you can insert as many headers as you choose. The trick is easier to show than explain:
220
helo santa@northpole.org
250
mail from:santa@northpole.com
250 Requested mail action okay, completed
rcpt to:
250 Requested mail action okay, completed
data
354 Start main input; end with
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221
Connection to host lost.
The message then looks like:
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
The trick is to start each line you want in the headers with one word
followed by a colon, and the a line followed by "return". As soon as
you write a line that doesn't begin this way, the rest of what you
type goes into the body of the email.
Notice that the santa@northpole.com from the "mail from:" command didn't show up in the header. Some mail servers would show both "from" addresses.
You can forge email on techbroker.com within one strict limitation.
Your email has to go to someone at techbroker.com. If you can find any way to send email to someone outside techbroker, let us know, because you will have broken our security, muhahaha! Don't worry, you have my permission.
Next, you can read the email you forge on techbroker.com via telnet:
C:\>telnet techbroker.com 110
+OK <30961.5910984301@techbroker.com> service ready
Give this command:
user xyz
+OK user is known
Then type in this:
pass test
+OK mail drop has 2 message(s)
retr 1
+OK message follows
This is a test.
If you want to know all possible commands, give this command:
help
+OK help list follows
USER user
PASS password
STAT
LIST [message]
RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message]
HELP
Unless you use a weird online provider like AOL, you can use these
same tricks to send and receive your own email. Or you can forge email to a friend by telnetting to his or her online provider's email
sending computer(s).
Hacking On XP part 2
The queen of hacker commands is telnet. To get Windows help for
telnet, in the cmd.exe window give the command:
C:\>telnet /?
Here's what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.
port Specifies a port number or service name.
****************
Newbie note: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer. Some ports are easy to understand, like keyboard, monitor, printer and modem. Other ports are virtual, meaning that they are created by software. When that modem port of yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has the ability to open or close any of over 65,000 different virtual ports, and has the ability to connect to any of these on another computer - if it is running that port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There are two ways: by number or by name.
****************
The simplest use of telnet is to log into a remote computer. Give the
command:
C:/>telnet targetcomputer.com (substituting the name of the computer you want to telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you may
get the message:
login:
Type your user name here, making sure to be exact. You can't swap between lower case and capital letters. For example, user name Guest is not the same as guest.
****************
Newbie note: Lots of people email me asking how to learn what their user name and password are. Stop laughing, darn it, they really do. If you don't know your user name and password, that means whoever runs that computer didn't give you an account and doesn't want you to log on.
****************
Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?
Every day people write to me complaining they can't telnet. That is
usually because they try to telnet into a computer, or a port on a
computer that is set up to refuse telnet connections. Here's what it
might look like when a computer refuses a telnet connection:
C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
Or you might see:
C:\ >telnet techbroker.com
Connecting To techbroker.com...Could not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.
If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.
**************
Newbie note: your Windows computer has a telnet client program,
meaning it will let you telnet out of it. However you have to install
a telnet server before anyone can telnet into port 23 on your
computer.
*************
If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.
How to Telnet into a Shell Account
Even though you can't telnet into an account inside some computer, often you can get some information back or get that computer to do something interesting for you. Yes, you can get a telnet connection to succeed -without doing anything illegal --against almost any computer, even if you don't have permission to log in. There are many legal things you can do to many randomly chosen computers with telnet. For example:
C:/telnet freeshell.org 22
SSH-1.99-OpenSSH_3.4p1
That tells us the target computer is running an SSH server, which enables encrypted connections between computers. If you want to SSH into an account there, you can get a shell account for free at
One reason most hackers have shell accounts on Internet servers is because you can meet the real hackers there. When you've logged in, give the command w or who. That gives a list of user names. You can talk to other users with tht talk command. Another fun thing, if your shell account allows it, is to give the command
ps -auxww
It might tell you what commands and processes other users are running. Ask other users what they are doing and they might teach you something. Just be careful not to be a pest!
***************
You can get punched in the nose warning: Your online provider might kick you off for making telnet probes of other computers. The solution is to get a local online provider and make friends with the people who run it, and convince them you are just doing harmless, legal explorations.
*************
Sometimes a port is running an interesting program, but a firewall won't let you in. For example, 10.0.0.3, a computer on my local area network, runs an email sending program, (sendmail working together with Postfix, and using Kmail to compose emails). I can use it from an account inside 10.0.0.3 to send emails with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer,
here's what happens:
C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on
port 25.
No connection could be made because the target machine actively
refused it.
However, if I log into an account on 10.0.0.3 and then telnet from
inside to port 25, here's what I get:
Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical
address meaning localhost, the same computer you are logged into]
Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix
The reason I keep this port 25 hidden behind a firewall is to keep
people from using it to try to break in or to forge email. Now the
ubergeniuses reading this will start to make fun of me because no
Internet address that begins with 10. is reachable from the Internet.
However, sometimes I place this "test-box" computer online with a
static Internet address, meaning whenever it is on the Internet, it
always has the same numerical address. I'm not going to tell you what its Internet address is because I don't want anyone messing with it. I just want to mess with other people's computers with it, muhahaha. That's also why I always keep my Internet address from showing up in the headers of my emails.
***************
Newbie note: What is all this about headers? It's stuff at the
beginning of an email that may - or may not - tell you a lot about
where it came from and when. To see full headers, in Outlook click
view -> full headers. In Eudora, click the "Blah blah blah" icon.
****************
Hacking On XP part 1
Part I: The Magic of DOS
In this guide you will learn how to telnet
nslookup
So you have the newest, glitziest, "Fisher Price" version of Windows: XP. How can you use XP in a way that sets you apart from the boring millions of ordinary users?
****************
Luser Alert: Anyone who thinks this GTMHH will reveal how to blow up people's TV sets and steal Sandra Bullock's email is going to find out that I won't tell them how.
****************
The key to doing amazing things with XP is as simple as D O S. Yes, that's right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS version. Various versions of command.com come with Windows 95, 98, SE, ME, Window 3, and DOS only operating systems.
The other DOS, which comes only with the XP, 2000 and NT operating systems, is cmd.exe. Usually cmd.exe is better than command.com because it is easier to use, has more commands, and in some ways resembles the bash shell in Linux and other Unix-type operating systems. For example, you can repeat a command by using the up arrow until you back up to the desired command. Unlike bash, however, your DOS command history is erased whenever you shut down cmd.exe. The reason XP has both versions of DOS is that sometimes a program that won?t run right in cmd.exe will work in command.com
****************
Flame Alert: Some readers are throwing fits because I dared to compare DOS to bash. I can compare cmd.exe to bash if I want to. Nanny nanny nah nah.
****************
DOS is your number one Windows gateway to the Internet, and the open sesame to local area networks. From DOS, without needing to download a single hacker program, you can do amazingly sophisticated explorations and even break into poorly defended computers.
****************
You can go to jail warning: Breaking into computers is against the law if you do not have permission to do so from the owner of that computer. For example, if your friend gives you permission to break into her Hotmail account, that won't protect you because Microsoft owns Hotmail and they will never give you permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN permission before demonstrating that you can hack on a school computer.
****************
So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying something like this:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>
Your first step is to find out what commands you can run in DOS. If you type "help" at the DOS prompt, it gives you a long list of commands. However, this list leaves out all the commands hackers love to use. Here are some of those left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup
TCP/IP stands for transmission control protocol/Internet protocol. As you can guess by the name, TCP/IP is the protocol under which the Internet runs. along with user datagram protocol (UDP). So when you are connected to the Internet, you can try these commands against other Internet computers. Most local area networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to communicate between computers. This is often used by Windows computers, and by Unix/Linux type computers running Samba. You can often use NetBIOS commands over the Internet (being carried inside of, so to speak, TCP/IP). In many cases, however, NetBIOS commands will be blocked by firewalls. Also, not many Internet computers run NetBIOS because it is so easy to break in using them. We will cover NetBIOS commands in the next Guide to XP Hacking.