Sunday, 22 September 2013

How to find IP Address of the Sender in Gmail

1. Log into your Gmail account with your username and password.


2. Open the mail.


3. To display the headers,


* Click on More options corresponding to that thread. You should get a bunch of links.


* Click on Show original


4. You should get headers like this:

Gmail headers : name

Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is 10.182.181.35

That is be the IP address of the sender!


5. Track the IP address of the sender

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender.


Note that this will not work if the sender uses anonymous proxy servers.


Wednesday, 11 September 2013

How to Chat With Command Prompt (Ms DOS)

All you need is your friends IP address and Command Prompt.

First of all, open Notepad and enter:

@echo off

:A

Cls

echo MESSENGER

set /p n=User:

set /p m=Message:

net send %n% %m%

Pause

Goto A

Now save this as “Messenger.bat”. Open the .bat file and

open it , in Command Prompt you should see:

MESSENGER

User:

After “User” type the IP address of the computer you

want to contact.

After this, you should see this:

Message:

Now type in the message you wish to send.

Before you press “Enter” it should look like this:

MESSENGER

User: 58.218.143.113


Message: Hi

Now all you need to do is press “Enter”, and start

chatting!


Monday, 9 September 2013

107 Command Prompt Shortcuts

Hello Friends!!!


Here Are A Few Commands For You  To Know…


To Those Who Didn’t Know How To Use Here It Is:


 


 


 


START<RUN<CMD


(OR)


START<SEARCH<CMD

1. Accessibility Controls - access.cpl

2. Accessibility Wizard - accwiz

3. Add Hardware Wizard - hdwwiz.cpl

4. Add/Remove Programs - appwiz.cpl

5. Administrative Tools - control admintools

6. Automatic Updates - wuaucpl.cpl

7. Bluetooth Transfer Wizard - fsquirt

8. Calculator - calc

9. Certificate Manager - certmgr.msc

10. Character Map - charmap

11. Check Disk Utility - chkdsk

12. Clipboard Viewer - clipbrd

13. Command Prompt - cmd

14. Component Services - dcomcnfg

15. Computer Management - compmgmt.msc

16. Control Panel - control

17. Date and Time Properties - timedate.cpl

18. DDE Shares - ddeshare

19. Device Manager - devmgmt.msc

20. Direct X Troubleshooter - dxdiag

21. Disk Cleanup Utility - cleanmgr

22. Disk Defragment - dfrg.msc

23. Disk Management - diskmgmt.msc

24. Disk Partition Manager - diskpart

25. Display Properties - control desktop

26. Display Properties - desk.cpl

27. Dr. Watson System Troubleshooting Utility - drwtsn32

28. Driver Verifier Utility - verifier

29. Event Viewer - eventvwr.msc

30. Files and Settings Transfer Tool - migwiz

31. File Signature Verification Tool - sigverif

32. Findfast - findfast.cpl

33. Firefox - firefox

34. Folders Properties - control folders

35. Fonts - control fonts

36. Fonts Folder - fonts

37. Free Cell Card Game - freecell

38. Game Controllers - joy.cpl

39. Group Policy Editor (for xp professional) - gpedit.msc

40. Hearts Card Game - mshearts

41. Help and Support - helpctr

42. HyperTerminal - hypertrm

43. Iexpress Wizard - iexpress

44. Indexing Service - ciadv.msc

45. Internet Connection Wizard - icwconn1

46. Internet Explorer - iexplore

47. Internet Properties - inetcpl.cpl

48. Keyboard Properties - control keyboard

49. Local Security Settings - secpol.msc

50. Local Users and Groups - lusrmgr.msc

51. Logs You Out Of Windows - logoff

52. Malicious Software Removal Tool - mrt

53. Microsoft Chat - winchat

54. Microsoft Movie Maker - moviemk

55. Microsoft Paint - mspaint

56. Microsoft Syncronization Tool - mobsync

57. Minesweeper Game - winmine

58. Mouse Properties - control mouse

59. Mouse Properties - main.cpl

60. Netmeeting - conf

61. Network Connections - control netconnections

62. Network Connections - ncpa.cpl

63. Network Setup Wizard - netsetup.cpl

64. Notepad - notepad

65. Object Packager - packager

66. ODBC Data Source Administrator - odbccp32.cpl

67. On Screen Keyboard - osk

68. Outlook Express - msimn

69. Paint - pbrush

70. Password Properties - password.cpl

71. Performance Monitor - perfmon.msc

72. Performance Monitor - perfmon

73. Phone and Modem Options - telephon.cpl

74. Phone Dialer - dialer

75. Pinball Game - pinball

76. Power Configuration - powercfg.cpl

77. Printers and Faxes - control printers

78. Printers Folder - printers

79. Regional Settings - intl.cpl

80. Registry Editor - regedit

81. Registry Editor - regedit32

82. Remote Access Phonebook - rasphone

83. Remote Desktop - mstsc

84. Removable Storage - ntmsmgr.msc

85. Removable Storage Operator Requests - ntmsoprq.msc

86. Resultant Set of Policy (for xp professional) - rsop.msc

87. Scanners and Cameras - sticpl.cpl

88. Scheduled Tasks - control schedtasks

89. Security Center - wscui.cpl

90. Services - services.msc

91. Shared Folders - fsmgmt.msc

92. Shuts Down Windows - shutdown

93. Sounds and Audio - mmsys.cpl

94. Spider Solitare Card Game - spider

95. SQL Client Configuration - cliconfg

96. System Configuration Editor - sysedit

97. System Configuration Utility - msconfig

98. System Information - msinfo32

99. System Properties - sysdm.cpl

100. Task Manager - taskmgr

101. TCP Tester - tcptest

102. Telnet Client - telnet

103. User Account Management - nusrmgr.cpl

104. Utility Manager - utilman

105. Windows Address Book - wab

106. Windows Address Book Import Utility - wabmig

107. Windows Explorer - explorer.


How to Crack a Password-Protected Zip File

Today we’re going to teach you how to effectively crack password protected .zip files in Backtrack 5 or Kali Linux.


The steps to cracking are listed below.


* Open ‘fcrackzip’

alright once you’re booted in Kali or BT5 go over and find ‘fcrackzip’. once open, type in “fcrackzip -b -c a -l 5 -5 -u


‘zip_file_location’” ( of course replacing zip_file_location with the actual location of the .zip file ) press Enter, and the password should be cracked.


 


 


For ease of use when filling in the .zip file location just drop the .zip file in the terminal right when you’re supposed to type the


location.


How to Restart without turning off your PC

What if we are in the middle of some important work and system crashed but we have no time for a rebooting? Here is an easy method.


First start ‘Task Manager.


Go to ‘Process’ tab & select ‘explorer.exe’.


Right click on it & select ‘End Process Tree’ (By then all the windows & desktop icons will disappear, except Task Manager).


Go to ‘File’ menu of the ‘Task Manager’ & select ‘New Task (Run…)’.


Type ‘explorer.exe’ (Without the quotes) & press ENTER.


Now all the non responding programs will end & desktop icons reappear.


We can even access our CD or DVD now(In case it is stuck).


Now the system is fresh again without the much time consuming ‘reboot’.


Sunday, 8 September 2013

How to Break WEP Encryption

1. Start Wireless Interface in monitor mode ( ex Mon0)


2. Test Injection Capability of the wireless device to the Access Point Use A tool Such As ( Aireplay-ng ) to do a Fake Authentication wit d access point


3.Start Wi-fi Sniffing Tool Such As ( Airodump-ng ) Or ( Cain-&Abel ) With A bssid Filter to Collect Unique IVs


4.Start A Wi-fi Packet Encryption Tool Such as (Aireplay-ng) in ARP

request replay mode to inject Packets


5. Run Cracking Tool Such As Cain and Abel or Aircrack-ng to Extract Encrypt key From IVs


Some Advice For Who Want To Become A Hacker.

1) Never trust sites that ask you for money in return of Hacking Software’s or who claim to Hack Email Id’s in return of money. All such things are Scam . Nothing Works.


2) There is NO DIRECT SOFTWARE to Hack Facebook , Google , Yahoo or any other big website. All the software’s that claim to do so are scam. They are just meant to take your money and in worse cases, those software’s have Trojans or key loggers in them. As a result your account gets hacked trying to hack others.


3) NEVER EVER use the keyloggers or Trojans you find as freeware on internet. Hackers are not fools. They compile keyloggers and Trojans almost with any such software and when you install them , you are already hacked before even trying to hack others.


4) You are never going to be a good hacker without the knowledge of programming and scripting languages. When you are going to use only ready made software’s and would depend on them for hacking anything then your functionality would be limited up to the functionality of the software. When you are not going to use your brain , just doing the copy paste thing, then how can you even think of being a good hacker.


5) If you are a good Hacker, you already become a good programmer , a good script writer , a good web developer and an excellent security expert. Well any good Hacker will/should have good knowledge of various aspects and programming languages. to do XSS (Cross Site Scripting ) , PHP INJECTION , SQL INJECTION , PHISHING , FOOT-PRINTING etc… you will have to be good at programing and scripting. And when you know the Various loop holes , vulnerabilities and security tips, you already become a Computer Security Expert.


So Never Ever Under estimate the term Hacker.


A Hacker Is Not a person who just hacks email id’s or servers but a True Hacker is a Computer Genius who the knowledge of computers more than anyone.