rss
twitter
    Find out what I'm doing, Follow Me :)

TRACE IP USING NSLOOKUP TOOL.....HACK IT


Using NSLOOKUP command to get IP and DNS Information


dos3Name Server Lookup or nslookup displays DNS information to test and troubleshoot DNS servers including IP address of a particular machine running in TCP/IP protocol.

Non-Interactive mode
C:\Windows\system32>nslookup /?
Usage:
   nslookup [-opt ...]         # interactive mode using default server
   nslookup [-opt ...] - server   # interactive mode using 'server'
   nslookup [-opt ...] host       # look up 'host' using default server
   nslookup [-opt ...] host server # look up 'host' using 'server'
common usage: nslookup [-option] [hostname] [server]
This is being use if you want for a single piece of information e.g. performing a reverse lookup on an IP address.
C:\Windows\system32>nslookup 72.14.203.121
Default Server:  sn3.dli.bit.net
Address:  201.4.2.9
Name:    tx-in-f121.1e100.net
Address:  72.14.203.121
C:\Windows\system32>nslookup unlockforus.blogspot.com
Default Server:  sn3.dli.bit.net
Address:  201.4.2.9
Non-authoritative answer:
Name:    blogspot.l.google.com
Address:  64.233.189.191
Aliases:  unlockforus.blogspot.com
C:\Windows\system32>nslookup you.wikidot.com
Default Server:  sn3.dli.bit.net
Address:  201.4.2.9
Non-authoritative answer:
Name:    www1.s.wikidot.com
Address:  74.86.234.149
Aliases:  you.wikidot.com


USING THE COMMAND TO TEST AND TROUBLSHOOT DNS SERVERS
Note: Before using this tool in interactive mode, you should be familiar with how DNS works.
Interactive mode
Simply type “nsloolup” and “?” to display all the available commands.
C:\Windows\system32>nslookup
Default Server:  sn3.dli.bit.net
Address:  201.4.2.9
> ?
Commands:   (identifiers are shown in uppercase, [] means optional)
NAME            - print info about the host/domain NAME using default server
NAME1 NAME2     - as above, but use NAME2 as server
help or ?       - print info on common commands
set OPTION      - set an option
    all                 - print options, current server and host
    [no]debug           - print debugging information
    [no]d2              - print exhaustive debugging information
    [no]defname         - append domain name to each query
    [no]recurse         - ask for recursive answer to query
    [no]search          - use domain search list
    [no]vc              - always use a virtual circuit
    domain=NAME         - set default domain name to NAME
    srchlist=N1[/N2/.../N6] - set domain to N1 and search list to N1,N2, etc.
    root=NAME           - set root server to NAME
    retry=X             - set number of retries to X
    timeout=X           - set initial time-out interval to X seconds
    type=X              - set query type (ex. A, AAAA, A+AAAA, ANY, CNAME, MX, NS, PTR, SOA, SRV)
    querytype=X         - same as type
    class=X             - set query class (ex. IN (Internet), ANY)
    [no]msxfr           - use MS fast zone transfer
    ixfrver=X      - current version to use in IXFR transfer request
server NAME     - set default server to NAME,                       using current default server
lserver NAME    - set default server to NAME, using initial server
finger [USER]   - finger the optional NAME at the current default host
root            - set current default server to the root
ls [opt] DOMAIN [> FILE] - list addresses in DOMAIN (optional: output to FILE)
    -a          -  list canonical names and aliases
    -d          -  list all records
    -t TYPE     -  list records of the given RFC record type (ex. A,CNAME,MX,NS,
PTR etc.)
view FILE           - sort an 'ls' output file and view it with pg
exit            - exit the program
You can read for more information about the tool: HERE

Error Messages from Microsoft Windows XP Article
Descriptions
Timed out
The server did not respond to a request after a certain amount of time and retries. You can set the time-out period with the set timeout subcommand retries with the set retry sub command.
No response from server No DNS name server is running on the server computer.
No records The DNS name server doesn’t have resource records of the current query type for the computer, although the computer name is valid. The query type is specified with the set querytype command.
Nonexistent domain
The DNS domain name doesn’t exist.
Connection refused or Network is unreachable The connection to the DNSname server or fingerserver could not be made. This error commonly occurs with ls and finger requests.
Server failure
The DNS nameserver found an internal inconsistency in its database and could not return a valid answer.
Refused The DNS server refused to service the request.
Format error The DNSname server found that the request packet was not in the proper format. It may indicate anerror in nslookup.
Have Fun Learning!

find mac address of any pc....hack it


Using GetMAC Tool to display MAC address for Network Adapters


dos3Media Access Control (MAC) address is the computer’sphysical address inside the network. This tool will help you to configure your router(s) to allow only specific computers to access the network or internet. Thanks to William for asking this question last December 16, 2009.
If your computer has more than one network adapter, the MAC address of each adapter is listed separately.
Using the tool to display the network adapters mac address
D:\>getmac
Physical Address    Transport Name
=================================================
00-19-8B-DB-69-1D   \Device\Tcpip_{793CAA85-159E-4EC7-9986-FD793610261B}
00-1B-76-2D-B1-DE   Media disconnected
D:\>
Other Parameters of the tool
D:\>getmac /?
GETMAC [/S system [/U username [/P [password]]]] [/FO format] [/NH] [/V]
Description:
    This tool enables an administrator to display the MAC address
    for network adapters on a system.
Parameter List:
    /S     system        Specifies the remote system to connect to.
    /U     [domain\]user  Specifies the user context under
                             which the command should execute.
    /P     [password]   Specifies the password for the given
                             user context. Prompts for input if omitted.
    /FO    format        Specifies the format in which the output
                             is to be displayed.
                             Valid values: "TABLE", "LIST", "CSV".
    /NH                      Specifies that the "Column Header" should
                               not be displayed in the output.
                               Valid only for TABLE and CSV formats.
    /V                       Specifies that verbose output is displayed.
    /?                       Displays this help message.
Examples:
    GETMAC /?
    GETMAC /FO csv
    GETMAC /S system /NH /V
    GETMAC /S system /U user
    GETMAC /S system /U domain\user /P password /FO list /V
    GETMAC /S system /U domain\user /P password /FO table /NH
D:\>
Anyhow, if your a windows fan and you don’t like the name, you can still use another network tool called ipconfig to get the network adapters physical address (alternative name to mac address)
C:\>ipconfig /all
Ethernet adapter Local Area Connection:
   Connection-specific DNS Suffix  . :
   Description . . . . . .  : Broadcom NetXtreme 57xx Gigabit Controller
   Physical Address. . . . . . . . . : 00-19-8B-DB-69-1D
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled .  . : Yes

Hope this helps!

How To Download Torrent Files With IDM!


How To Download Torrent Files With IDM!







I am going to post new technique that how to download your torrent files using IDM. IDM is a best download that provides maximum download speed by splitting the files into parts. IDM supports maximum 16 connection at a time. And you can download your torrent files more fast.

Advantages Of Downloading Using IDM


  • You can download torrent files with less seeds
  • You get maximum downloading speed
  • You can save your downloading time
  • Safe way to download file.


Follow the ways to Download with IDM


1.First go to Zbigz.com.

2.Signup for a free account there.

3.Then Go to any Torrent Search Engines.

4.Download One Torrent file into your computer.

5.Goto Zbigz and upload your torrent file

5.Then press Go

6.Click on free account and Again click free Press Go

7.After Upload you must get Download link

8.Click on download button and Enjoy A Fast Download Using IDM

DATE CRACKER, never worry about date


reactivate a software after expiry dates ends using RUNASDATE


Get Registered Software's after expiry date 


Hack Software to Run the Trial Program ForeverIn this post, I will show you how to hack a Software and run the trial program forever. Most of us are familiar with many software programs that run only for a specified period of time in the trial mode. Once the trial period is expired, these programs stop functioning and demand for a purchase.
However, there is a way to run the software programs so that they function beyond the trial period. Isn’t this interesting?
Well, before I tell you how to hack the software and make it run in the trial mode forever, we will have to first understand how the licensing scheme of these programs work. I’ll try to explain this in brief.
When the software programs are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After the installation, every time you run the program, it compares the current system date and time with the installed date and time. With this, it can make out whether the trial period is expired or not.
So, with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small tool known as RunAsDate.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.
RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003, Vista and 7.
You can download RunAsDate from the following link:

Steps to Hack the Software and Run the Trial Program Forever:

You will have to follow these tips carefully to successfully hack a software and make it run in the trial mode forever:
  1. Note down the date and time, when you install the software for the first time.
  2. Once the trial period expires, you must always run the software using RunAsDate.
  3. After the trial period is expired, do not run the software(program) directly. If you run the software directlyeven once, this hack may no longer work.
  4. It is better and safe to inject the date of the last day in the trial period.
For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate. I hope this helps! Please express your experience and opinions through comments
.

Block any app, trialed by chrome


block Google chrome using applocker


Hai, here i am going to share with you the tricks to block applications using security policy

Step 1. Edit the Group Policy Object that is targeted to the computer you want to apply this policy. Navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Application Control Policies and then click on “Configure rule enforcement”

image
Step 2. Under Executable rules tick “Configured” and select the “Enforce rules” option from the pop-down menu then click “OK”.
image
Step 3. Right click on “Executable Rules” and click on “Create New Rule..”
image
Step 4. Click “Next”
image
Step 5. Select “Deny” and then click “Next”
image
Step 6. Select “Publisher” condition and click “Next”
Note: The “Path” and “File hash” option are the same condition as was available in a software restriction policy that was in Windows XP and Vista.
image
Step 7. Click on “Browse”
image 
Step 8. Select the “chrome.exe” executable file and click “Open”
image
Step 9. In this example we are just going to accept the defaults and click “Next”.
Optional: If you wanted to just block a particular version of browser (or program) or just any version below a certain number tick “Use custom values” and then enter the version number in the “File version” field and select “And Below” from the pop-down menu.
image  
 Step 10: Click “Next”
image 
Step 11: Click “Create”
image 
Step 12: You will now be prompted to create some default rules that ensure that you don’t accidently stop Windows from working. Click “Yes” to this if you don’t already have these rules created.
image 
Step 13 (Optional): If you also want this AppLocker rule to apply computer administrators then right-click on the “BUILTIN\Administrators” rule and click “Delete”
image
Step 14 (Optional): Click “Yes”
image
You AppLocker Rules are now setup and should now look like this…
 image
Now there is one more thing you need to do to enable AppLocker on the computer…
Step 15. In the same Group Policy Object you were just editing navigate to Computer Configuration > Policies > Windows Settings > Security Settings > System Services and double click on the “Application Identity” service.
Note: This is the process that scan’s all the file before they are executed to check the name, hash or signature of the executable before it is run. If this is not turned on then AppLocker will simple now work.
image
Step 16: Tick “Define this policy setting” and tick “Automatic” then click “OK”
image
The services section should now look like this…
image
Your all done… Now when the user tries to run an un-approved browser (or program) they will be presented to this dialogue box…
image
Now if you want to make sure you have covered all the bases below is a an image of the AppLocker rules configured with a few more denied browsers…
image

Copy any locked & unreadable Cd's & Dvd's


ISO Buster(Copy any locked & unreadable Cd's & Dvd's)


 

Download Here : https://www.sugarsync.com/pf/D8750833_66555229_26586

                           or Download or Download


CD, DVD, BD and HD DVD data recovery software !

                                IsoBuster is an award winning , highly specialized and easy to use CD, DVD and blu-ray (BD, HD DVD) data recovery tool.
It supports all CD / DVD / BD / HD DVD formats and all common file-systems ... Rescue lost files from a bad or trashed CD or DVD disc, save important documents, precious pictures, video from the 
family, your only system backup, ... IsoBuster can do it all ! 

FUD CRYPTER, HIDE YOUR TROJANS


What is FUD Crypter ? Free Download Latest version 2012

What Is FUD Crypter?
FUD is acronym for fully undetectable.It is a software that can be used to encrypt your exe files.

What is the use of FUD Crypter?
FUD crypters can be used to encrypt viruses,RAT,keyloggers,spywares etc to make them undetectable from antiviruses.


How Does FUD Crypter Work?

The Basic Working Of FUD Crypter is explained below
The Crypter takes the original binary file of you exe and applies many encryption on it and stores on the end of file(EOF).So a new crypted executable file is created.

Original Exe
 Crypted Exe
001————- 010                                      101————-110
100|Original File|000->  Cryptor  ->010|Original File|110
010————- 111                                        110————-010
The new exe is not detected by antiviruses because its code is scrambled by the crypter.When executed the new .exe file decrypts the binary file into small the data small pieces at a time and injects them into another already existing process or a new empty one, OR it drops the code into multiple chunks in alternative data streams(not scanned by most a/v) then executes it as a .txt or .mp3 file.

Why Most FUD Crypters Donot Work?

As a FUD crypter becomes popular it also get the eyes of antivirus companies.The antivirus companies update their software and employ detection mechanism that detect the encryption’s by the crypter.So, most of the popular FUD crypter are easily detected by antiviruses.

Where can I test Whether my Crypter is FUD or not?
To test you crypter encrypt any virus with it and test it onhttp://vscan.novirusthanks.org and make sure you check the boxDo not distribute the sample .

Note:-Donot test your crypter on virustotal.com as it distributes the samples and your crypter will not remain FUD if you scan with virustotal.

Where can I Download a Free FUD crypter?

As I already mentioned that as the crypter becomes popular it doesnot remain FUD.So the only FUD crypter available are those made by indivuals and they can be found by spending a little time on google by searching.It will not make profit to anybody if I share my FUD crypter here as it will not remain FUD for long as some noobs will surely scan it with virustoal.So,its better you search your own and keep it to yourself.

Download Free FUD Crypter

I am giving you a link to a free crypter so that you can play it with and test whether it is FUD or not.


KEYLOGER DOWNLOAD


KEYLOGER DOWNLOAD




This is a nice collection of' "must have" tools for a hacker such as RAT, keylogger, mail bomber, crypter etc. The advantage of using this package is that all the tools are joined under the same GUI and all the tools are FUD i.e. they will not be detected by your antivirus. So I advice you to use them at your own risk. Alternatively you can useSandboxie or Deep Freeze to protect your computer if something unexpected happens.


Step bye Step instalation of Windows AIK For Windows 7


Step bye Step instalation of Windows AIK For Windows 7


Windows AIK Installation

(Windows AIK or WAIK) is a collection of tools and technologies produced by Microsoft designed to help deploy Microsoft Windows operating system images to target computers or to a VHD (Virtual Hard Disk). It was first introduced with Windows Vista. The WAIK is a required component of the Microsoft Deployment Toolkit.[1]
Windows AIK Version 1.0 was released with Windows Vista. New or redesigned tools and technologies included Windows System Image Manager (Windows SIM), SysPrepImageX, and Windows Preinstallation Environment (WinPE) v2.0.[2]
Windows® Preinstallation Environment (Windows PE) 3.1 is being released as an Windows Automated Installation Kit (Windows AIK) supplement for Windows 7 Service Pack 1 (SP1). Windows PE 3.1 includes all optional components and language packs. You can apply these optional components and language packs to customize the boot.wim and winre.wim images that are part of the Windows 7 SP1 installation media.


STEP 1     Download the Windows AIK

This is a very large download (1.77GB). A broadband (high-speed) internet connection is highly recomended.

STEP 2    Create the windows AIK DVD
         Once the WAIK file is downloaded, you'll need to burn it to a DVD. The file is in a .img format. Many burning programs like MagicISO, WinISO, etc. can handle the .img format. If you don't have a program that will handle it, you can download a free program called ImgBurnImgBurn will burn the .img file directly to a DVD.

STEP3   Install Windows AIK

       # Insert DVD And Run Startcd.exe
    

Click on Continue
     

The main installation window should now display. Select the Windows AIK Setup option to begin the installation.
         
waytoitexpe



                                               



















How to create windows PE?

create windows PE
PRE-INSTALLATION ENVIRONMENT


1 ) copype.cmd x86 c:\Winpe

2)  copy c:\Winpe\winpe.wim c:\Winpe\ISO\sources\boot.wim

3 ) copy "c:\program files\windows AIK\Tools\x86\imagex.exe" c:\winpe\ISO

4 ) oscdimg.exe -n -bc:\winpe\etfsboot.com c:\Winpe\ISO c:\Winpe\winpe.iso

copy these commands one by one and exit
(type this on cammand prompt of win aik)