rss
twitter
    Find out what I'm doing, Follow Me :)

google dorks


Do you know how to use google ? Sounds a silly question because even children can easily use google search engine.But the thing is that how efficiently we can make use of google. Google dorks are nothing but simple search operators that are used to refine our search. okay lets suppose that you wanna search for ebooks on topic 'networking' , our obvious search queries would be like this "Networking ebooks", "free ebooks for networking" etc,we keep going into the websites, clicking on link after links and then get proper downling links. Now lets do the same search in a different way , type on google "ext:pdf networking" (without quotes)

and see what you get in results,google returned direct downloading links of ebooks on networking that is files with extension pdf.
I hope you have got an idea of google dorks or google search operators.

List of basic search oprators,their description and examples.

1. site - It returns the websites of specified domains .

Example- site:explorehacking.com will return the links of webpages of  domain explorehacking.com.site:explorehacking.com phishing will return all the webpages of domain explorehacking.com which contain word 'phishing'.
Suppose you want google to return only government websites,
you can use site:gov or say pakistani websites use site:pk

2.intitle and allintitle - It restricts the results to pages whose title contain specified word/phrase.

 examples-
intitle:admin will return only those pages whose title contains word 'admin'.
intitle:admin login will return only those pages whose title contains word 'admin' and word 'login' can be in anywhere in page.
allintitle:admin login will return those pages whose title contains both words admin and login. This is simply equivalent to intitle:admin intitle:login

3.inurl- as clear from name, it restricts the results to sites whose URL's contains specified phrase.

examples-
inurl:adminlogin will return only those pages whose URL contains  'adminlogin'.
 Like allintitle, you can similarly use allinurl. I dont feel there is need to explain allinurl.

4. related- It returns the websites similar to specified websites.

examples :-
related:www.mobivox.com , now mobivox.com provides free/cheap calls facility. This search query would return results containing websites which provide such kind of services.
related:www.hidemyass.com , now hidemyass.com provides services to maintain anonymity using proxies.This search query would return results containing websites which provide services related to proxies.

5. cache: It returns the cached webpage that is kept with google.

example:-
cache:www.explorehacking.com, this dork is useful very when actually the website is down and
you can still view its contents (from cached pages).

 6. ext- It specifies the extension .

You can use 'filteype' at place of 'ext'.
example-:
ext:ppt hacking - this will return  powerpoint presentations (ppt files) on topic 'hacking'.
ext:doc hacking - this will return microsoft word files on topic 'hacking'

 Extensions that google supports are pdf,swf,rtf,doc,ppt,dwf,ps,kml,kmz,xls.

Note: Undoubtedly,you can combine these search operators for example
site:gov inurl:adminlogin will return the government site webpages who have word 'adminlogin' in URL.

Accessing Unprotected Cameras using google ?
So the heading sounds interesting. We can access the live cameras using google dorks.
Remember, cameras are also present at beaches ;)
Just type this in google search box and hit enter.
inurl:view/index.shtml .

Many of these wont ask for password, view might be dark (coz it would be night there) and you need good internet speed . Have fun.

Download a long list of such dorks to view unprotected cameras and the software from here.

Note:These google dorks when used smartly are really useful from hacker's point of view to search for vulnerable websites. I will try to write a post regarding same

FAKE E-MAILING


Send , identify , trace Fake/Spoofed Email | Email Bombing | Email Spamming



Basics of working of Email 

Email stands for Electronic Mail. Email sending and receiving is controlled by the Email servers.Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.Users from across the world register in to these Email servers and setup an Email account.

Email Travelling Path :-
Let’s say we have two Email providers, one is gmail.com and other is yahoo.com, ABC is a registered user in gmail.com and XYZ is a registered user in yahoo.com.
• ABC signs in to his Email account in gmail.com, he then writes a mail to the xyz@yahoo.com and sends the message.
• But what happens behind the curtains, the Email from the computer of abc@gmail.com is forwarded to the Email server of gmail.com. Server of gmail.com then looks for yahoo.com on the internet and forwards the Email of the yahoo.com for the account of XYZ@yahoo.com. Yahoo server puts that email in that account.
• XYZ then sits on computer and signs in to her Email account.Now she has the message in her Email inbox.


Sending Fake/spoofed Email -:  Fake or spoofed email means the email from any email ID. It doesn't matter whether the sender's email really exists or not. Sender's email ID can be anything@anything.com. 

Methods :-

1. Using Open Relay servers :  An open relay server is that which allows people to send email by connecting to it. User connect to it via telnet and instructs server to send email. This method is outdated or simply I should say that, it doesn't work. I would not talk about it more.

2. Using Websites : There are numberless websites that provide free service to send fake emails. But the problem is that they attach the advertisments along with your email.  But the best two, I have found that do not attach the advertisments.

www.emkei.cz      {have some advance options}
www.hidemyass.biz/fake-mailer/

3. Using mail sending scripts : The PHP contains mail sending function which allows us to send email with fake headers.
Download a php script from here.
We just need to upload the mail sending script on a web hosting site. It doesn't work on every webshosting site because there is no email sending support.  I have tested x10hosting.com (could take upto a day for account activation) , it works perfect. Some of the other are www.000webhost.com,byethehost5.com

Note: This script contains options of sending spoofed email, spamming and email bombing. Your hosting account might be immediately suspended on spamming/bombing. But it works perfect if you have any your own premium web hosting account. If you want to try email bomber, I could let you to use my own if sufficient people request in comments.

What is Email Spamming and Email Bombing ?

Email Bombing as clear from the name is sending the mass emails that is large number of emails to a email ID in a single click. Email spamming is like sending an email to large number of email IDs in a single click. These activties are performed mainly for the advertisements of the products or services provided by a company. Many spammers spam to collect individual's personal information through some stupid things like 'fill these details to get your lottery amount' and that information is sold to businessmen looking for the people of different categories. There could be many more reasons of spamming. Spammers use automated tools to collect as many emails available on websites,forms,chat rooms and send spams to them.

How to identify whether an email is real or spoofed ?

It can be done by checking headers. Email headers is simply the text which contains the information about the mail servers that the email encountered in its path from the sender to receiver. It contains a lot of other information too.
Note: I am just telling you a few points about this so that you would just get an idea about the approach. This may or may not depend on some factors.

We can view email headers in gmail by clicking at 'show orignal', in yahoo by clicking at 'Full headers' and such kinds of options in other email service providers.

If  you get an email displaying sender's email like someone@gmail.com, someone@hotmail.com, someone@yahoo.com . Then it should be orignated from gmail,hotmail and yahoo servers respectively. But if it doesn't, the most probably the email would be fake. 

I will show you by an example, I received three emails in my gmail inbox from sender's address "someone@gmail.com."  Sender's address shows me that they should have been orignated from gmail/google server, if they would be real.

Note : There is a field called "Return-path" in headers.  If the email ID shown in this field and email ID you get as sender's email ID doesnt match, then the email is surely fake.

Can we get sender's IP address from Email Headers ?

We may or may not. Gmail, yahoo normally do not reveal sender's IP address. But when we send an email from a php script,  the headers might reveal Sender's IP. The conclusion is that answer to this question varies from different email service providers and the way how email is sent.

Can we trace sender's location, if we get his IP address ?

The IP address could only tell that which Internet Service Provider (ISP) is used by sender. Further details can not be revealed without the help of that ISP. Normally the Public IP is dynamic that is it keeps changing. We need to ask ISP about the user who was assigned that IP at the time email was sent. If sender has purchased a static IP address, it doesn't matter that when exactly was email sent. He could easily be traced.

PHISHING HACK


Phishing - Creating,uploading and using fake login pages




I could simply give you the fake page generators or already made fake web pages but I want you to manually create yourself.

First, I shoud tell you the basic methodology of making phishing page of any website. In a website where the users are supposed to enter/submit any data (data might be email,password or anything), there is a piece of code in html code called as action form. It looks like this
<form method="POST" action="something">.
You can find this out by simply viewing the source of web page. Right click on webpage to do so. "something" here in the action field is name or path of the file where submitted data goes. So the idea of fake login page is simple. Just download the webpage on your computer, modify the action field to change the path where data goes according to yourself, upload this modified webpage on any web hosting site and you are done. :)

I have taken example of gmail.

Download a php file and a text file from here which would be required. Password:explorehacking.com

Setps to make a phishing/fake login page :-
1. First of all, sign up for a account at any free webhosting site like my3gb.com,ripway.com,110mb.com etc.
I have chosen my3gb.com
2.Goto www.gmail.com.  Click on 'Save page as' option  and save the complete web page. You must have got a html file and a folder in which there must be two images.
3. Open the html file in any text editor like wordpad or notepad. Press "Ctrl+F"  to search for word "action".
4. Replace the link in action field by "explore.php" and save it.
5. Go to File Manager and Upload this html file ,hacked.txt , explore.php  on your web hosting site.


Note: Make a new directory with name exactly same as name of folder in which images are there.
 Upload the images in that directory.

Now you can test whether it works or not. Just visit your fake login page.It must be http://username.my3gb.com/filename.html. Enter any username and password , you will
be redirected to real gmail webpage.The data must have been saved in hacked.txt

Note: You can see the code of explore.php . There is a line like header:"location: path". It is
actually the path where victim would be redirected after submitting data. You can change it as per your need. 

I hope the logic and methodology of creating a fake/phishing page is clear to you. You can use this for any website. If you are really lazy or facing problems in making phishing page of any other website, Kindly mention in comments and I have an other option for you.
Warning : Your account might be removed any time because of violating terms and conditions of site. So always have a back up of your data.
Note: Read about advance way of phishing that is Desktop Phishing here.

How to Remote Control your Windows PC with Email or SMS


How to Remote Control your Windows PC with Email or SMS

computer worries


It's a long weekend and you're happy because you'll get to spend the next three days with your family. You left the office in an excited mood but as the cab was approaching home, you suddenly realized that you forgot to shut down the Office PC. Oops!.
It's a sinking feeling because there're so many confidential documents on the computer and since most of your trusted colleagues have also left for the day, there's no point calling them for help.
So what do you do? Drive back to Office? Well that's not required - just take out your cell phone or switch on the laptop at home, send an email (or an SMS or a tweet) and that will instantly lock your Office workstation. And if you share the same computer with multiple people, you can use another email command to remotely log off or even shut down the computer from anywhere in the world.
twitter commandsThere's no magic here, it's the power of TweetMyPC utility that lets you remote control your computer from a mobile phone or any other Internet connected computer.
It works like this. You first install the free TweetMyPC utility on any Windows PC and associate your Twitter account. The app will silently monitor your Twitter stream every minute for any desktop commands and if it finds one, will act upon it immediately. The initial version of TweetMyPC was limited to basic shutdown and restart commands, however the current v2 has a far more robust set of commands, enabling a far more useful way of getting your PC to carry out certain tasks especially when you're AFK (Away From Keyboard).
Before we get started, it may be a good thing if you can set up a new twitter account for remote controlling your desktop and also protect the status updates of this account to ensure better security.
Protecting the account means that you prevent other users from reading your tweets which in this case are email commands that you sending to the computer. To protect your Twitter profile, log in to Twitter with the credentials you want to use, click Settings and check the box next to "Protect my Updates".
Let's get started. Install the TweetMyPC utility of your computer and associate your Twitter and Gmail
 account with the application. It will use Twitter to receive remote commands (like shutdown, log-off, lock workstation, etc) from while the email account will be used for send your information (e.g., what process are currently running on your computer).

How to Send Commands to th e Remote Computer

Now that your basic configuration is done, it's time to set up a posting method. You can use email, SMS, IM, web or any of the Twitter clients to send commands to the remote computer.
By Email: Associate you Twitter account with Posterous (auto-post) and all email messages sent to twitter@posterous.com will therefore become commands for the remote computer.
By SMS: If you live in US, UK, Canada, India, Germany, Sweden or New Zeleand, you can send associate Twitter with your mobile phone (see list of numbers) and then control your remote computer via SMS Text Messages.
By IM: Add the Twitter bot - twitter@twitter.com - to your list of Google Talk buddies and you can then send commands via instant message.
By Web:If you are on vacation but have access to an internet connected laptop, just log into the Twitter websiteand issue commands (e.g., shutdown or logoff) just as another tweet.
lock computer shutdown

Download Files, Capture Remote Screenshots & more..

While the TweetMyPC is pretty good for shutting down a remote computer, it lets you do some more awesome stuff as well.
For instance, you need to download an unfinished presentation from the office computer so that you can work on it at home. Or you want to download a trial copy of Windows 7 on the Office computer while you are at home.
Here's a partial list of commands that you can use to remote control the PC - they're case-insensitive and, as discussed above, you can send them to Twitter via email, SMS, IM or the web.
Screenshot : This is one of the most useful command I've come across after the shutdown command. Want to know what's happening within the confines of your PC when you're not around? Just tweet screenshot and TweetMyPC will take a screenshot of your desktop and post it to the web
ShutDown, LogOff, Reboot, Lock : The function of these useful commands is pretty obvious from their names.
Standby, Hibernate : Don’t want to shutdown the remote PC? Save power by entering standby mode with this command. Or hibernate your PC with a tweet, thereby saving even more power.
                          
Download <url> : You can download any file from the Internet on to the remote computer using the downloadcommand. For instance, a command like download http://bit.ly/tCJ9Y will download the CIA Handbook so you have the document ready when you resume work the next day.
GetFile <filepath> : The Download command was for downloading files from the Internet onto the remote computer. However, if you like to transfer a file from the remote computer to your current computer, use the GetFile command. It takes the full page of the file that you want to download and will send that you as an emailattachment. If you don't know the file page, use the command GetFileList <drivename> to get a list of file folders on that drive.
GetProcessList : This is like a remote task manager. You'll get a list of programs that are currently running on the remote computer along with their process IDs. Send another command kill <process id> to terminate any program that you think is suspicious or not required.
Conclusion:
TweetMyPC is a must-have utility and you never know when you may need it. And if you have been trying to stay away from Twitter all this time, the app gives you a big reason to at least create one protected account on Twitter.
twitter whale gmail whale
That said, there's scope for improvement. For instance, the app will wait for a minute to check for new messages in your Twitter stream so it's not "instant". The developers can actually increase that limit because the Twitter API now allows upto 100 checks per hour.
And since the app is dependent on Twitter and Gmail, it will not work during those rare fail-whale moments

HOW TO CREATE MULTI PARTITION IN USB DEVICE?



HOW TO CREATE MULTI PARTITION IN USB DEVICE?

In this tutorial you are going to learn how to make partition your pen drives and other flash drive. Usually in windows operating system. Your flash drive will be detected as a removable drive, so can't partition it. Now you need to force your system to detect your flash drive as a Hard disk device, which will enable partition option. Follow below steps to multi partition your flash drive.


1. Open Run (Shortcut: Windows + R) then type in "devmgmt.msc" and hit Enter. Device manager will popup,

2. find your device and Right click select "Properties"

.
3. Switch to "Details" tab and then select “device instance path” (Win vista, Win 7 & Win 8) or “device instance id” (in XP). copy that below string code and close the window.



4. Now open  USB drivers folder which you had downloaded earlier and open the file named “cfadisk.inf ” with any text editor notepad or word-pad.


5. Search for "device_instance_id_goes_here" and replace it with "PASTE YOUR FLASH DEVICE  INSTANCE PATH OR ID" Save the file and close your text editor.


6. Open the pen drive properties window again. Go to ‘Driver’ tab and click on update driver.


7. Choose "Advance" mode. Next.


8. Choose "Don't search, I will choose the driver to install" then Next.



9. Then click on the “Have disk button” and “Browse” and choose that cfadisk.inf file that you edited and Next..






10. Now a warning message should popup.


 11. Ignore the other warnings that pop up.



12. Ignore all such warnings at this moment and click on yes. Installation of the drivers will started and will be completed in few minutes. Then click on install.


Wait for the system to complete the installation.




Now your operating system will detect the pen drive as a hard disk. Since pen drive appears to be a hard drive now you can move on to make partitions just the way you do it normally.

Download Drivers here:        SERVER 1
                            SERVER2=

HOW TO CONVERT ANY INSTALLING APP TO PORTABLE?


HOW TO CONVERT ANY INSTALLING APP TO PORTABLE?

Installing application is one of the boring thing to do, Why.? to wait until the installation gets completed. Yes! you heard right. Now its possible, Cameyo is a simple and user friendly program which create a virtual environment and pack's (portable apps builder) entire Install-able software including reg files etc. and makes a portable .EXE application that can be travel any where with you and runs almost on any windows computer. Check the below tutorial for Cameyo guidance.

Firstly download it, Link is given at the end of this article.
  Note : You have to signup at cameyo site (free)

Run it (double on click it),
wait until Cameyo loads the splash screen

1. Select "Studio".

2. Choose "Ghost Capture" as shown in fig.



3. Drag the setup file into the command box.


4. Install in "Ghost mode" and the portable application will be created in your documents library.

Now the app. is free to carry and even works from USB flash drive.

App details:
Version: 2.0.834.0
Size: ~ 10 MB
Language: English
Price: Freeware

Supported OSes:
Windows XP,
Windows Vista,
Windows Windows 7,
Windows Windows 8.

Download (Official site):

Read more at http://www.SHAZCONVICTED.BLOGSPOT.IN


MICROSOFT USB MANAGER


MICROSOFT USB MANAGER


freeware-tiny-app-to-manage-backup
Under Creative Commons License: Attribution






Tags : Backup Data, Data, Download, Freeware, How to, Microsoft, Pen Drive, Tips, Trick, USB, USB Flash drive, Windows 0 Comments
Microsoft USB Flash Drive Manager software will help you to easily backup and restore data from USB Flash Drive devices and with its user friendly interface you can backup/restore data, modify properties, drag & drop files direct to your pen drive and you can all so setup Wireless network wizard on your pen drive. It is a freeware tool and tiny program with many useful features. (Download below)
Features:
Backup and restore
Enable autorun
Drag and drop (copying)
Change USB Properties
Delete all
Wireless network wizard (LAN)

App details:
Version: 1
Size: ~ 650 KB
System requirements:
Supported operating systems: Windows XP, Windows XP Home Edition , Windows XP Media Center Edition, Windows XP Professional Edition, Windows XP Service Pack 1, Windows XP Service Pack 2.
NET Framework 1.1+

Download (Official site):


Read more at http://www.shasconvicted.blogspot.in

PASSWORD PROTECT YOUR USB



USB Safeguard 6.0 Full (Medafire)

Posted by shasconvicted.blogspot.in



USB Safeguard 6.0 | 1.06 MB
Mirrors: Mediafire | Uppit


USB Safeguard is a portable software program to encrypt and protect data with a password on your removable pen drives using the AES 256 bits encryption.The main purpose of using a USB pen drive is that you can bring your data with you wherever you go. Loosing the drive can be very dangorous for you or your company if you have confidential information on it.

Protect the pen drive with a password! USB Safeguard offers users (novice and expert) a friendly yet extremely powerful security solution that fully protects valuable data stored on USB pen drives.

Also, the program has a useful feature that allows you to enter your email or phone if you lose the pen drive.

Here are some key features of  USB Safeguard :

� Runs with any USB pen drive
� No installation required
� On the fly AES 256 bits encryption
� Secure your data if drive is lost
� Unecessary admin rights
� There is no back door
� 100% portable

Password - www.egyhacks.net


direct download link=




DeadLine's Virus Maker 1.1



DeadLine's Virus Maker 1.1

Posted by shasconvicted.blogspot.in



Hi all users, This is a cool virus maker we're posting here, it is not created by us. This original author DeadLine we've mentioned his name at the end of this post. This is what it's author have to say about it.

I decided to make a custom virus maker because I don’t trust all the other virus makers that are out there on the net. I think it took me about 4 hours to code this. If you are wondering why it took me that long: it is because I used a new theme and new components, and I’m still learning how to use them properly.

Video:

Download Mediafire

send free sms all over the world



send free sms all over the world






Hi all users, now a days we're posing very quickly (all are your blessings :) In this post we've collected and categories some most popular website, which allow you to send SMS worldwide as well as regional. We've categories this list as Internationla SMS site, SMS sites in UK,  SMS sites UK, SMS sites in India, SMS sites in Pakistan. So let's start sending message anywhere for free.


Free International SMS Sites:
http://www.textmefree.com
http://www.sendsmsnow.com
http://www.160by2.com
http://www.send-sms-now.com
http://www.seasms.com/
http://www.send-sms-now.com/
http://smssheep.com/
http://solinked.com/

Top Free SMS Sites in UK:
http://www.freebiesms.co.uk
http://www.textmefree.com
http://www.textmefree.com
http://www.smstoday.co.uk
http://www.freesmsfrog.co.uk
http://www.tosms.co.uk
http://www.swagsms.com
http://www.textmefree.co.uk/

Top Free SMS Sites in US:
http://smseverywhere.com/
http://www.funsms.net/
http://www.send-sms-now.com
http://www.gizmosms.com
http://www.seasms.com
http://www.txt2day.com
http://www.freeglobesms.com
http://www.freebiesms.us
http://www.txtdrop.com/

Top Free SMS Sites in India:
http://www.160by2.com
http://www.way2sms.com
http://www.freephonesms.com
http://www.funsms.net
http://www.sendsmsnow.com
http://www.smsgupshup.com
http://www.indyarocks.com
http://www.textmefree.com/
http://www.sms2friends.com
http://www.indiansms.net
http://www.textmefree.com
http://www.send-sms-now.com
http://www.freesmsfun.com
http://www.total160.com
http://www.mysmsworld.com/
http://www.smsfame.com/

Send SMS to Pakistan:
http://www.smsyard.com
http://www.smsoye.com
http://www.bulksmspk.com