Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Showing posts with label Ip address. Show all posts
Showing posts with label Ip address. Show all posts

Friday, December 2, 2011

Hack your desired PC on LAN

As I have told in my previous post Simple Commands for LAN Hacking for Beginners that these days I am working on LAN Hacking so guys here is my new post in this respect .Hope you guys love it .Dont forget to Change your IP Address if you want to remain safe but its not compulsary.Through this technique you will be able to hack your desired PC on LAN .

This technique will be taking advantage of Port 139.Most of the time,Port 139 will be opened.But if unfortunately your victim's Port 139 is filtered or closed then you can't hack him by this method .So guys follow these steps carefully and at the end you will be able to hack Lan computers.
NOTE : All the tools used in this tutorial have already been sent to all the Email subscribers to their emails,but if someone didn't got it then post your email in the comments and if we find that email in subscription list we will send you all the tools.

Steps to Follow

  • First of all,I will do a port scanning at the target computer which is 192.168.40.128.This computer is inside my LAN network. 
  • Scan it using Nmap, this is actually for checking either its port is opened or closed.
  • I get the result and it shows Port 139 is opened up for me. 
  • Now we will need both of these tools:
  1. USER2SID & SID2USER
  2. NetBios Auditing Tool
  • I have already sent these tools to all the Email Subscribers.
  • After you get both of them,put them in the C: directory.
  • Now you need to create a null session to the target computer.For this open cmd prompt and write this below command as it is as shown in image below :
  • Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER. 
  • We will first using USER2SID to get the ID.Just follow all the codes same as shown in below image ,just replace the IP Address of victim
  • We will test against the Guest account because Guest account is a built in account. 
  • After we get the ID,we need to do some modification on the ID.
  • We take the ID we get from the guest account and modified it become "5 21 861567501 1383384898 839522115 500".
  • Please leave out the S-1-,leave out all the - too.
  • Now you will see that you get the username of the Administrator account.
  • In this case,the Administrator account is Administrator.

MAIN PART

  • Now we are going to crack the Administrator account for the password in order to access to the target computer. 
  • First of all,extract the NetBios Auditing Tool in C directory, which you have received in your email.
  • Now open cmd prompt and write the below code as it is :
  • Press on enter and the tool will run and finally you will crack the password.

  • In this case,I have get the password. 
  • In order to proof that I can get access to the target computer using this password.
  • After you press enter,it will prompt you for the username and password.
  • Therefore,just input them inside the prompt and continue.

  • Target C drive will be on your screen.You are done ....

Prevention

  • In order to prevent from this attack,close down port that you do not want to use such as Port 135,Port 136,Port 137,Port 138 and Port 13.

Tuesday, November 29, 2011

Change your IP in less than 30 seconds

The following is a guide on how to change your IP in 30 seconds or less. This can be used if your IP has been banned from a game server, or on gunbound if your IP get's blocked. I've tried this on both Windows XP and Windows 2000, and it has worked :




  • Click on "Start" in the bottom left hand corner of screen.
  •  Click on "Run"
  • Type in "command" and hit ok.
  • You should now be at an MSDOS prompt screen.
  • Type "ipconfig /release" just like that, and hit "enter"
  • Type "exit" and leave the prompt
  • Right-click on "Network Places" or "My Network Places" on your desktop.
  • Click on "properties"
NOTE : You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
  • Right click on "Local Area Connection" and click "properties" 
  • Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
  • Click on "Use the following IP address" under the "General" tab
  • Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
  • Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  • Hit the "Ok" button here
  • Hit the "Ok" button again
NOTE : You should now be back to the "Local Area Connection" screen.
  • Right-click back on "Local Area Connection" and go to properties again. 
  • Go back to the "TCP/IP" settings
  • This time, select "Obtain an IP address automatically"
  • Hit "Ok"
  • Hit "Ok" again
  • You now have a new IP address
NOTE : This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.

Friday, October 28, 2011

Change IP Address using Ultrasurf

In the last post I have told about What is IP address ?? and How can I change my IP Address?? and then we discuss What is TOR and how to use TOR to change IP Address .Now in this tutorial I am gonna tell about another software similar to TOR and function is also same named Ultra Surf . This software is used to change your IP Address like if your current IP is showing that you are working from a city in Asia then after using ultra surf ,it will be shown that you are working from suppose Canada . In other words ,it will totally change your location and no one can find your real location using your IP . Its the best way to secure your PC and serve internet anonymously.

Ultrasurf is totally free software . It is better than any other proxy softwares because of its light weight and easy to install properties.

Installing Ultrasurf

  • First of all download Ultrasurf.Search it on google you will easily find.
  • Nowopen the software.
  • Now log on to whatismyipaddress and check your IP address
  • Now Run u.exe and a window like this will open :
  • Now, there are total three proxy servers with their speed percentages.
  • Select any one of them but better to select which is showing max speed.
  • That's all.
  • Now just log in to Whatismyipaddress and see your newly changed IP Address.
NOTE: If you are using internet explorer then your proxy will be changed automatically but if you are using Mozilla Firefox then you have to manually change your proxy in settings .

How to bypass/hack a Firewall

Firewall is a basic and main component for securing a network . The basic purpose of a firewall is to isolate one network from another network so that networks can't make effect on each other.Hackers often bypass Antiviruses and Anti-spywares by some methods Like Crypting,Hexing, File-pumping etc,but it becomes very difficult for a Hacker to bypass a Firewall that's why I am writing this article about How to bypass a Firewall easily.
Firewall is often called Hindrance(Obstacle) by hackers. In the below chart ,the complete working of firewall is shown :
The method which is mostly used by Hackers to bypass firewall is known as SSH tunneling.

What is SSH Tunneling?

  • Well according to wikipedia:
A Secure Shell (SSH) tunnel consists of an encrypted tunnel created through an SSH protocol connection. Users may set up SSH tunnels to tunnel unencrypted traffic over a network through an encrypted channel.
For more information on SSH Tunneling See it on Wikipedia Here

Reason to Bypass firewall

Firewall is always a problem for Hackers.Particularly if you are in university or working somewhere,you have examined that the network administrators deny access to file sharing, instant messaging or social networks such as facebook or myspace with a firewall or proxy server.So when ever you want to connect to them a message comes that these services are unavailable or something like that.To avoid this ,we have to break firewall so that we may access these services.

SSH Tunneling

Now we will see How to Hack or Bypass firewall using SSH Tunneling
  • First of all Create an account for SSH access.There are many sites which provide paid and free SSH access.One of them is Superprotocol .
  • Now download an open source SSH Client named Putty .
  • After downloading ,execute the software and run it.
  • Now you will come to this configuration settings page.
  • Now in the host name,enter the server through which we can connect SSH access.make sure SSH is selected using port 22.
  • Next, in the SSH options,click on Tunnels,here we will set up a Tunnel.
  • Change the Source port to 8080 and then click on Dynamic.
  • After doing all this click on Open. 
  • Now login in with username and password which we given in SSH Provider.
  • Establishing the tunnel part is completed now.

Wire Shark Instalation

  • Now we need to Download another software named Wire Shark and execute wireshark.
  • Now start Packet capture,in the beginning it will be empty.
  • Open google.com in your browser and then packets getting captured by the software.

Configuring Mozilla

 Now the next part is the configuring of Mozilla Firefox so that we can use SSH connection.
  • Open the Mozilla browser and open "Tools" menu and then "Options".
  • Click on "Advanced" button tab, and then "Network" tab, and then click on "Settings".

  • Now you are in Connection Settings enter "localhost" as the "Socks Host and port number, such as "1080" into the "Port:" field.
  • Now come back to wire shark you will see some SSH connection but now there's no information about what is being sent from server to client.
This tutorial is quite difficult for the newbies. I think its on intermediate level so guys give it a try and tell us how's u find it .... :>

Thursday, October 27, 2011

How to use proxy easily in Backtrack 5

Hey guys how u been ??? hope u enjoying , huh !!!
There are a lot of ways to hide your identity , either by single proxy or by multiple proxies like TOR which Xeo Hacker explained in a recent post.

But if u have BackTrack then nothing to worry about you can use proxy very easily and u can use multilple proxies also.

Well its called proxychains ..


So lets get started

wat it does


Well proxychains is a inbuilt tool in backtrack to let u use proxy very easily. It uses proxy according to the configuration file , which we gonna config and it takes u to any address or url via multiple proxies.


proxychains intro



well actually there is a configuration (.conf) file in etc folder . its named proxychains.conf . This is the file where u will do all ur stuffs and u'll hide your identity just by typing a single command once you configure.

Go to terminal and type following command then hit enter
gedit /etc/proxychains.conf

Wat happened ??? there is a gedit window opened with some text in it ... its actually ur config file


Modes or types of proxychains


There are 3 modes of proxychains
  1. dynamic_chain:This uses the list of proxies in the same order as u placed
  2. strict_chain:almost similar to previous one except it will not work if it gets any dead proxy server
  3. random_chain:this is the best .. this chooses and uses proxies randomly

Configuration of the file


u have to open that file with root privilege to edit that file so first issue following command
sudo su
then issue this command
gedit /etc/proxychains.conf
now you have to follow these steps
  • comment out the mode u want to use









as u can see i have commented out random_chain by "//" .
  • now go to any proxy server list .. just google it .. i'll be using socks4 proxy servers so search on google .. then copy some IPs and their port no. and then  paste it where it says add proxy here . refer the pic at last i have added some IPs.

Now your configuration is done .....

How to use proxychains

to use proxychains just have to issue some commands as listed below.
proxyresolv [the site u want to open]

proxychains firefox [the site u want to open ]  (for firefox)


Hope you enjoyed this .. thanks for reading :)
Stay Tuned !!!
(comment and like plz )


" Copyright © 2011. All rights reserved by “Kumar Sourav" & "xeo hacker" "





What is TOR ? How can I change my IP Address using TOR

In the last post I have told about What is IP address ?? and How can I change my IP Address?? . Now in this tutorial I am gonna tell about a software named TOR . This software is used to change your IP Address like if your current IP is showing that you are working from a city in Asia then after using TOR ,it will be shown that you are working from suppose Canada . In other words ,it will totally change your location and no one can find your real location using your IP . Its the best way to secure your PC and serve internet anonymously.

What Does TOR do ?

First I want to tell you that its just for extra knowledge I just want to explain the importance of this software but you can skip this section and move on to next to know how to install TOR.TOR hides our computer identity by acting as an intermediary between us and the web server that we are accessing,just like a hinderance.Suppose we break into a server using a proxy server thinking that we are anonymous. But what if owner of web server starts enquiring about the clients connecting to it using the proxy server  and it is possible that owners of proxy server might  reveal our identity. So now the problem starts that we are not save even using proxy but this is resolved by TOR .So,here comes the concept of THE ONION ROUTING (TOR) into picture. By using this , the client traffic is supposed to be passed from three different servers or nodes before reaching to actual web server. It may randomly take any path through any three nodes.

Lets consider it has taken path shown by green arrows. Now
  • Node 1 knows only actual origin(client) but not actual destinantion(web server).
  • Node 5 neither knows actual origin nor actual destinantion.
  • Node 9 knows actual destination but not actual origin.
Thus no one exactly knows which client is accessing which web server. So it is highly anonymous and you can serve net without any problem. Now Lets come to main Section.

How to Install TOR

Installing TOR is not much difficult ,just follow the simple steps :
  • First of all, download the TOR Software.  (You can also easily download it from their official site as its totally free to use).
  • Now Install it Click on NEXT as shown in below figure. 
  •  It will ask for components to Install .Check all and click Next.
  • Now give the location where you want to Install it.
  • Now Install the Add-on for browser.
  • Now restart your firefox and You have completed installing TOR Software .

How to Start TOR Software ?

  • Open the 'Vidalia Control Panel' from the task bar.
  • Click on 'Start Tor'.
  • When it shows Connected To The Network ,it means now its connected/
  •  Now open Mozilla Firefox browser, single click on red highlighted 'Tor Disabled' on right corner of browser and it will turn to green highlighted 'Tor Enabled'. 
  • Now your TOR is connected and your can search on net with the proxy of TOR.
  • Now to check whether your TOR is working fine just log on to Whatismyip and you will see that your IP is changing continuously after some intervals of time .
NOTE : Whenever we use proxy software , our net speed drops as now our net is divided into routes ,first it is going to proxy server and then coming to you.

What is IP Address and How can we Change it

What is an IP - Address and what is the purpose of IP - Address ?? This question is asked by me several times so today I thought of explaining this concept in simple words.

What is an ip address ???

Whenever we use internet on our computer, a unique IP- address is assigned to our device alongwith a port number . This assigned IP address is just a unique number called Internet Protocol (IP). IP addresses usually consists of four numbers separated by dots which normally called as 'dotted-quad' and it looks something like that 127.0.0.1.
These numbers are usually assigned to internet service providers according to region in which they are operating , that's why an IP address can easily be used to identify the region,country or even the city from which a computer is connecting to the Internet. In fact an IP Address is mostly used to check the location of he user and so if you are using your original IP Address then its not much Difficult to track you .So first we discuss about how can we check our IP Address . Its not a much Difficult task to check your IP Address .

How Can I Check My IP Address ?

  • Click on Start Button in the bottom left side corner.
  • Now Click on Run.
  • Type in cmd and hit Enter.
  • An MS-DOS Prompt Screen will be opened.
  • In MS-DOS , just write this command as it is ipconfig and you will get some data.
  • Search there and find IP ADDRESS and the number written in front of that is your IP Address.
Now the thing is how we can change our IP Address and remain save in internet world . There are many software which can do this task quite easily.But in this tutorial we just check that how can we change our IP Address :

Changing Ip Address

Here are simple steps to change your ip-address:
  • Right-click on Network Places or My Network Places on your desktop. 
  • Click on Properties.
  • Now a new screen will be opened titled Local Area Connection .
  • Right click on Local Area Connection and then click on Properties.
  • In the General tab you will find an option Internet Protocol (TCP/IP) ,just Double Click on it.
  • Now in the General tab Click on Use the following IP address.
  • Create an IP address .
  • Press “Tab” and it should automatically fill in the Subnet Mask section with default numbers.
  • Hit the “Ok” button here twice,you should now be back to the “Local Area Connection” screen.
  • Right-click back on “Local Area Connection” and go to properties again.
  • Go back to the “TCP/IP” settings.
  • This time, select “Obtain an IP address automatically”.
  • Hit “Ok".
  • Hit “Ok” again.
  • You now have a new IP address
In the next tutorial ,I will completely explain how can we Change the IP Address of our computer using TOR and can serve internet anonymously. Then no one can trace our location using our IP Address.  

Tuesday, February 8, 2011

How To Find The IP Address Of The Sender In Windows Live Mail, Gmail Or Yahoo! Mail

Whenever you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender and this is how you do it.

Windows Live Mail

Log into your Windows Live Mail account with your username and password,Open the inbox.  To display the headers, right click on the email message in the Inbox, and select View Source.

view source

This will open up a new page with a detailed header content.

source
Now look for Received: from followed by IP address within square brackets
ip

If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.

Gmail

Log into your Gmail account with your username and password, Open up the mail. To display the email headers, Click on the Reply drop down box and select Show Original.



 show original

Look for Received: from followed by the IP address between square brackets [ ].

show original

If you find more than one Received: from patterns, select the last one.

Yahoo Mail

Log into your Yahoo! mail with your username and password, Click on Inbox or whichever folder you have stored your mail, Open the mail. If you do not see the headers above the mail message, your headers are not displayed. To display the headers, click on the drop down Standard Header box and select Full Header.

yahoo

Look for Received: from followed by the IP address between square brackets [ ]. If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.

full header

I hope this post will help you finding the IP address of the sender, do let us know what you think by leaving a comment.

Saturday, October 23, 2010

Best proxy ever!!!

Best proxy ever!!! Password protected!!!
1) Go to www.sefreak.com

2) The "Scholar Experience" crap is REAL, it really has an academic portal
3) Click on the hidden lock icon in the upper right
4) User: student
5) Pass: random1
6) Click explorer

Monday, October 11, 2010

How to detect Anonymous IP Address?

Proxies are easiest ways to hide your Identity, However Proxy's are mostly used by fraudsters, scammers and hackers to hide their Identity while committing cyber crimes and therefore in this article I will tell you how to detect those Anonymous IP address

Following are some of the examples where fraudsters use the proxies to hide their actual IP.

 Credit Card Frauds

Anonymous IP's are used for credit card frauds,such as cashing out the stolen credit card numbers and stealing the money, When ever a transaction is done from a credit card, the IP address of the computer from where the transaction is made is captured by the Credit card providers, So if the hacker or Fraudster is cashing out from his original location, he will be easily be traced.
So to avoid it the Hacker or Fraudster would use a proxy in order to hide his original location and the spoofed IP will be captured by the Credit card providers

Bypassing Restriction

In most offices or schools websites like Facebook, orkut etc and other websites are blocked so people use proxy to bypass the restrictions and unlock the websites

Accessing hacked accounts

In Email service providers like gmail you can find the real IP Address from which you accessed the accounts previously, Say if a hacker has hacked some one's Gmail account and he is monitoring the hacked account, If he will login without a proxy, his real IP will be captured and therefore he will be traced

Proxy Detection Servies

Now a days proxy detection has became a critical component, There some services like Fraud labs and Free Proxy Detector to detect the usage of proxy or spoofed IP from users participating online

How Proxy Detection works?

Proxy detection services mostly rely on IP addresses to determine whether or not the IP is a proxy, they keep a record of the IP's which most proxy's use as a Spoofed IP and therefore by comparing the IP with the list of flagged IP's they could find that the IP is a proxy or not, If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy.

Hope you liked the post ! Please Pass the comments

Tuesday, February 2, 2010

Hide your IP address

Your IP is exposed when ever you visit a website,when your Ip gets exposed it becomes easy to trace you and find out your personal information,Hackers can use your Ip to gain access to your personal files and documents and even can get into your paypal,alert etc accounts,Hide the Ip is a Software which masks your IP with one click and you can surf web anonymously,on the other hand Hackers can use this software to hide theiridentity and not get caught,its benificial for all and i recommend that every Pc should have this software installed
Hide the IP to be the best one. It’s ease of usereliabilitywide range of optionsspeed and unmatchable price were on top when compared to that of the remaining IP Hising softwares on the market.


Key Features of Hide the IP:





Hide IP Address »
 Single click to completely hide your Online Identity. Others will see a fake IP address masking your real IP, thus, protecting your privacy.


Select Your Physical IP Location »
You decide which country will be indicated as your origin by simply choosing from a country list. We have hundreds, hourly updated, IP addresses available for use.


Anonymous Web Surfing »
You are protected from hackers who will be tricked by your fake IP instead of your real. They will never be able to find any information about you by tracing the fake IP.
Send Anonymous E-mails » Hide your IP in E-mail headers. Be protected while sending emails from Yahoo!, Hotmail, GMail. Upgrading to Platinum Service add-on will protect you in Outlook!


Bypass Website Country Restrictions » 
Surf websites which are restricted for your country. Surf in forums on which you were banned.



Supports Internet Explorer, Firefox, Google Chrome, Safari, Opera.
So what are you waiting for? Download the free trial and test Hide the IP on your computer now! For more information on Hide the IP visit the following link.

Hide the IP

Sunday, January 3, 2010

How to Trace the location with Ip address






Do you want to know where your Internet visitors are coming from? Which country? Which state? Which city? Which ISP? Which domain name? Which connection type? Which ZIP code?




IP2Location™ is a geo IP solution to help you to identify visitor's geographical location, i.e. country, region, city, latitude, longitude, ZIP code, time zone, connection speed, ISP and domain name, IDD country code, area code, weather station code and name using a proprietary IP address lookup database and technology without invading the Internet user's privacy.



Just go to http://www.ip2location.com/?rid=939 and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.




1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address.
A sample snapshot of the results from ip2location.com is given below
trace ip address

Hope you had enjoyed the article,Kindly show your feedback by Comments 

Friday, December 18, 2009

How do ip gets traced

Lets start .....
Ip gives it all
Most people wonder how do websites come to know of your location from IP.Now you too can find out.Forget users you can even sneak up on websites. Just enter IP/URL/mailid and vola all the details of are given.


. This has some great tools that will help you. You can enter IP/URL/Domain name and much more.

Above is a pic of what it can do (It gives your location. who is your internet provider, how you are connected to him.



This software costs about 60$. What if you dont want to buy the software you can use the lite version. This give only how the data is sent., how are you connected yo him



What if you dont want to download any thing. then there are some online tools

Samspade.org


net4domain.com


visualware.com and more.


.......

Monday, September 14, 2009

How to Trace ip address of remote computer

Trace ip address
Most of you may be curious to know how to trace the IP address of a remote computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk or msn.In this post I will tell you How to trace ip address of a remote computer,Well i had been asked this question for a long period and many of users have requested me make a post on How to trace ip address on a remote computer

I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.


How to trace ip address - Method

1.
Download the
IP Finder script (IP_Finder.ZIP) that I have created.

2. Create an account on
110mb,ripway,t35(or any free host that supports PHP).

3.
Extract the IP_Finder.ZIP file and upload the two files
ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.

4. You can rename the
ip.php to any name of your choice.

5.
Set the permission to 777 on ip_log.txt.

Now you are all set to
trace the IP address of a remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.

For your better understanding let’s take up the following example.

Suppose you open a new account in 110mb.com with the subdomain as
123, then your IP Finder link would be

http://123.110mb.com/ip.php

You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.

To find the recorded IP address check the logs using the following link.

http://123.110mb.com/ip_log.php

The sample log will be in the following format

101.92.133.233 Friday 07th of sep 2009 07:31:27 PM
45.45.144.237 Friday 07th of sep 2009 07:31:28 PM
123.44.144.233 Friday 07th of sep 2009 07:31:31 PM

NOTE: You have to replace abc with your subdomain name.

I hope this helps,Please express your thoughts by commenting



.......

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers