Spyware, adware, browser hijackers, and dialers are some of the fastest-growing threats on the Internet today.
By simply browsing to a web page, you could find your computer to be the brand-new host of one of these unwanted fiends!

The most important step you can take is to secure your system. And SpywareBlaster is the most powerful protection program available.

> Prevent the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted software.

> Block spyware/tracking cookies in Internet Explorer and Mozilla Firefox.

> Restrict the actions of potentially unwanted sites in Internet Explorer


SpywareBlaster can help keep your system spyware-free and secure, without interfering with the "good side" of the web.

And unlike other programs, SpywareBlaster does not have to remain running in the background.

Download Here


Free Music Zilla is a free social music downloader. It can download social music from social music service like Last.fm, IMEEM™, Pandora free and easily. Free Music Zilla is a rela free social music downloader for Last.fm, IMEEM™, Pandora...

Free Music Zilla can be integrated with all browser like IE, Firefox, Opera, Maxthon, Avanta and Netscape. You can use it to download free music in any browser.

(1) Open 'Tools' menu then click 'Preferences...' item:


(2) Select the 'Monitoring' tab. Then Check the browser you use, or you can browse any executable file you want to monitore:


Free Music Zilla is a free IMEEM™ downloader which can help you to download IMEEM™ free and easily .
Keywords: How to Download IMEEM™ Free

(1) Install Free Music Zilla and run Free Music Zilla first:


Free Music Zilla is monitoring IE and FireFox by default. Click here to see how to monitore other browser.

(2) Visit IMEEM™.com and play the IMEEM™ music. The playing music will be grabed by Free Music Zilla:


(3) Select the grabbed IMEEM™ music then click 'Download' button. The IMEEM™ music will be downloaded.

Please download it before 'Leech Timeout' count down to 0 and keep the music is playing when downloading.




Tips:

(1) You could run Free Music Zilla to start sniffer BEFORE playing the IMEEM™ music in webpage. If Free Music Zilla don't capture the IMEEM™ music, try refresh the page and make sure the music is PLAYING.
(2) The IMEEM™ music file is in FLV format. And lots of FLV players are in software download sites. Or you can download one of them at here.
(3) Please keep the IMEEM™ music playing when downloading. Or the download will be failed.

Firefox Add-ons

Posted by UnKnOwN | 9:28 PM


Firefox Add-ons

Add-ons extend Firefox, letting you personalize your browsing experience. Take a look around and make Firefox your own.

Here a some useful firefox extension....



Adblock Plus


Ever been annoyed by all those ads and banners on the internet that
often take longer to download than everything else on the page? Install
Adblock Plus now and get rid of them.

Homepage

Download Here


FoxyTunes

Do you listen to Music while surfing the Web?



FoxyTunes lets you control almost any media player and find lyrics,
covers, videos, bios and much more with a click right from your browser.

Homepage

Download Here


PicLens

Full-Screen, 3D -- PicLens transforms your browser into a visually
stunning experience for enjoying online photos and videos. Our
interactive "3D Wall" lets you effortlessly search and zoom your way
around thousands of images and YouTube videos faster and more
immersively than ever before.
See demo at http://piclens.com/demo .

Homepage

Download Here



CCleaner

Posted by UnKnOwN | 2:58 AM


CCleaner is a freeware system optimization and privacy tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)

Cleans the following

Internet Explorer
Temporary files, URL history, cookies, Autocomplete form history, index.dat.

Firefox
Temporary files, URL history, cookies, download history.

Opera
Temporary files, URL history, cookies.

Windows
Recycle Bin, Recent Documents, Temporary files and Log files.

Registry cleaner
Advanced features to remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more... also comes with a comprehensive backup feature.

Third-party applications
Removes temp files and recent file lists (MRUs) from many apps including Media Player, eMule, Kazaa, Google Toolbar, Netscape, MS Office, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and many more...

100% Spyware FREE
This software does NOT contain any Spyware, Adware or Viruses.

Download Here


avast! 4 Professional Edition is a collection of award winning, high-end technologies that work in perfect synergy, having one common goal: to protect your system and valuable data against computer viruses, spyware and rootkits. It represents a best-in-class solution for any Windows-based workstation. This page demonstrates its most important features and provides links to further resources.
The latest version of this program is 4.8.

avast! 4 Professional Edition can be downloaded and used free of charge for a 60-day trial period. At the end of the trial period, a license key must be purchased, which will be valid for a further 12, 24, or 36 months.





Features overview:

Anti-spyware built-in


Spyware is software installed on a computer that is designed to collect information about the computer user, often without their knowledge or consent. This can result in so called identity theft, or theft of valuable information (e.g. bank or credit card details) or proprietary business data. Spyware is often developed by organized crime rings rather than lone individuals and may be installed by a virus.

Certified by West Coast Lab's Checkmark process, avast! has full anti-spyware capabilities built-in, to make your protection even more complete.

Anti-rootkit built-in

Rootkits are programs that install on your computer while keeping themsleves and their activities hidden to remain invisible to the use. They represent a significant security risk on both home computers and company networks and are notoriously difficult to find and remove. Rootkits themsleves are normally installed by a virus or other type of malware infection and it is therefore highly recommended that computer users have up to date antvirus/anti-spyware software installed and running on their computer. One such system is avast! antivirus.

Based on the class-leading GMER technology, avast! can now scan your live system for rootkit infections; no boots disks are required. If a rootkit is discovered, it is initially disabled and then if it can be safely removed without affecting the performance of the computer, it is removed. avast! antivirus includes a virus database which can be automatically updated to provide continuous protection against rootkits.

Strong self-protection

Some viruses may attempt to switch off a computer's antvirus software. To help keep your protection working, even against the latest threats that may try to disable your security protection, avast! has best-in-class strong self-protection built in, to make sure, no matter what you face, avast! carries on protecting your valuable data and programs. This is based on the multi-award winning avast! antivirus technology and provides an extra layer of security to ensure your data and programs are always protected.

Antivirus kernel

The latest version of avast! antivirus kernel features outstanding detection abilities, together with high performance. You can expect 100% detection of In-the-Wild viruses (viruses already spreading between users) and excellent detection of Trojan horses.

The kernel is certified by ICSA Labs; it frequently takes part in the tests of Virus Bulletin magazine, often yielding the VB100 award.

The avast! engine also features outstanding unpacking support. It can scan inside the following archives: ARJ, ZIP, MIME (+ all associated formats), MAPI (Outlook pst files), DBX (Outlook Express archives), RAR, TAR, GZIP, CAB, BZIP2, ZOO, ACE, ARC, LHA/LHX, TNEF (winmail.dat), CPIO, CHM, RPM, ISO, 7ZIP and SIS. It also supports a number of executable packers (such as PKLite, Diet, UPX, ASPack, PeShield, FSG, MEW etc.).

Last, but not least, it can also scan for viruses hidden in Alternate data streams on NTFS volumes.

Simple User Interface


The Simple User Interface is used to start on-demand scanning, work with the results and change various options. Basic resident protection settings can be modified here.

The Simple User Interface is the main application of avast! 4 Home Edition. You can start additional avast! modules from here, such as the Virus Chest, Updater or Log Viewer.

The appearance of the Simple User Interface is very flexible. It supports so-called skins (changeable appearance of the application), so you can change the interface to suit you. The main package contains three skins, with additional skins available from our web pages.

More Details

Download Here
or
Link 2(Ziddu)
-with keygen-


BitDefender Total Security 2008 provides the ultimate proactive protection for your PCs. It combines state of the art protection against viruses, spyware, hackers, spam and other Internet security threats. Moreover, its system maintenance and PC backup tools keep your PC running fast and protected from data loss.

Top features

* State of the art proactive protection against new viruses
* Protects against phishing attacks by filtering all accessed web pages for fraud attempts
* Helps prevent unauthorized access to your Wi-Fi network
* New adaptive engines detect & block spam faster and more reliably than ever
* Parental control blocks access to inappropriate websites and e-mail
* Automated incremental backup backup copies your data to local or removable drives for safekeeping
* Tune-up module improves PC performance


ANTIVIRUS & ANTISPYWARE


  • Protects your PC in real time from known viruses, spyware and other malware with hourly updates
  • Blocks unknown viruses using advanced proactive detection techniques
  • Monitors and prevents spyware threats in real-time
  • Detects and removes the newest breed of hidden threats known as rootkits
  • Provides a smooth gaming experience by reducing the system load to a minimum

ANTI-PHISHING


  • Protects against phishing attacks by filtering all accessed web pages for fraud attempts
  • Reduces the risk of identity theft by preventing personal information leaks via e-mail or web.

FIREWALL


  • Controls applications’ access to the Internet while “hiding” your computer from hackers
  • Helps prevent unauthorized access to your Wi-Fi network by notifying you when computers log in to the network.

ANTISPAM


  • Prevents different types of spam and scam e-mails from reaching your Inbox
  • Now responds faster to new spamming techniques with new adaptive engines

PARENTAL CONTROL


  • Blocks access to inappropriate websites and e-mail
  • Allows or blocks web access during specified time periods

BACKUP


  • Safeguards your data by creating backup copies to local and removable drives, CD-R/RW or DVD-R/RW
  • Automatically backs up only new files, based on a pre-set schedule.

TUNE-UP


  • Improves your PC performance by removing unnecessary files and registry entries
  • Completely erases files and "traces" of files from disk to prevent recovery

More Details

Download Here
or
Here(Rapidshare)

-with patch-

Basic Cain guide

Posted by UnKnOwN | 1:44 AM


Posted this quick guide so people who aren't technical at all can follow and use CAIN (like I was!) to sniff their network and grab passwords. Lets begin!

Background Information: The Cain & Abel password recovery tool for Microsoft Operating Systems allows recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force, Cryptanalysis attacks, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

To install:

1) Download and install Cain & Abel from oxid.it

2) Install software and WinPcap packet capture driver

3) Reboot computer.

Instructions to use CAIN (APR): Before you try this, you must make sure that WinPcap is properly bound toyour NIC. Select Configure and make sure you see your adapter ( s) listed. See illustration

At main screen, select Configure, then click your your network adapter, then Apply and Ok.








Click to enable both Sniffer and APR (Left of the + ).

Click on +, then Range. Range for your network (based on adapter you chose) is displayed. Click OK to start scanning.

After 100% you will see IP address, MAC, and OUI fingerprint of devices in range.

Now click on APR icon to enable it.

Click on + and select IP address to poison, then OK

Now you should see it change from Idle to Poisoning.



IP connections should appear from target and spoofing computer(your computer)

So, what we have now, is all the packets are going through your network are being picked up by CAIN and sniffed.. Whats useful about this tool is the passwords page, once someone logs on when your sniffing, their ID and PW are shown their as long as you are configured to pick up that login and pw. Yay!

Good luck, hope this guide showed you the basics of using CAIN if you never used it before.

What you will need:

1. current version of Cain from www.oxid.it

2. Windows 2000 or Windows XPSP1 configured workstation



Getting started:



Cain is an easy application to install and configure. However, there are several powerful tools that should only be configured after you fully understand both the capabilities and consequences to the application and the target network. After all, you can’t very well hack a network if you take it down. Proceed with caution.



Referring back to chapter two, you will need to know what you are trying to hack. This appendix assumes that you are trying to get the administrator’s username and password for the network. The focus of this appendix is on obtaining that information. The other appendices in this chapter deal with other capabilities of the application to gain access to a network. To this end we need to accomplish the following steps to get the admin account:



1. Enumerate the computers on the network

2. connect to a computer and install the Abel remote app

3. Harvest user account information

4. Crack user account information passwords to get the admin account

5. Login to the target machine with the admin account

6. Install the Abel service on the target server

7. Harvest all of the hashes from a server and sent to the cracker



Once we have the admin account on the server, the rest is up to you.



First things first, after you launch the application you will need configure the Sniffer to use the appropriate network card. If you have multiple network cards, it might be useful to know what your MAC address is for your primary connection or the one that you will be using for Cain network access. You can determine your MAC address by performing the following steps:



1. Go to “Start”

2. Run

3. enter the “CMD”

4. A black window will appear

5. Enter the following information into the window without the quotes

“Ipconfig /all” and then Enter

6. Determine which one of the Ethernet adapters you are using and copy the MAC address to notepad. You use this to help determine which NIC to select in the Cain application



With the Cain application open, select the Configure menu option on the main menu bar at the top of the application. The Configuration Dialog box will appear. From the list select the device with the MAC Address of Ethernet or Wireless network card that you will be using for hacking. While we are here, let’s review some of the other tabs and information in the Configuration Dialog Box. Here is a brief description of each tab and its configuration:



1. Sniffer Tab: allows the user to specify the Ethernet interface and the start up options for the sniffer and ARP features of the application.

2. ARP Tab: Allows the user to in effect to lie to the network and tell all of the other hosts that your IP is actually that of a more important host on the network like a server or router. This feature is useful in that you can impersonate the other device and have all traffic for that device “routed” to you workstation. Keep in mind that servers and routers and designed for multiple high capacity connections. If the device that you are operating from can not keep up with traffic generated by this configuration, the target network will slow down and even come to a halt. This will surly lead to your detection and eventual demise as a hacker as the event is easily detected and tracked with the right equipment.

3. Filters and Ports: Most standard services on a network operate on predefined ports. These ports are defined under this tab. If you right click on one of the services you will be able to change both the TCP and UDP ports. But this will not be necessary for this tutorial, but will be useful future tutorials.

4. HTTP Fields: Several features of the application such as the LSA Secrets dumper, HTTP Sniffer and ARP-HTTPS will parse the sniffed or stored information from web pages viewed. Simply put, the more fields that you add to the HTTP and passwords field, the more likely you are to capture a relevant string from an HTTP or HTTPS transaction.

5. Traceroute: It is what it is, trace route or the ability to determine the path that your data will take from point A to point B. Cain adds some functionality to the GUI by allowing for hostname resolution, Net mask resolution, and Whois information gathering. This feature is key in determining the proper or available devices to spoof or siphon on your LAN or internetwork.



Ok, So now you have everything all set and you are ready to rumble, as it were. Now, after I select the adapter on the sniffer tab, I generally set the sniffer to start on start up and then select apply. Do not enable the arp poisioning at this point, you will not need it and if this is your first exposure to Cain and or hacking, you will just get yourself caught with the ARP stuff. I generally stop and start the application at this point to get a clean start and reload the application with my intended settings.



So, launch the app and make sure that the first icon on the Left that looks like a miniature Ethernet card appears depressed. This indicates that the sniffer is activated. At this point, it is time to get a cup of coffee and let the app just sit. Yep, that is right, just leave it running and don’t touch anything. The reason for this is that not every device is talking all of the time and some protocols only talk on specific intervals. You will need to wait at least 300 seconds to ensure that the Cain sniffer has heard from each protocol at least once. This is most germane to routing protocols, but I have seen it take this long or longer to see all of the hosts on a LAN.



NOTE: The next section makes the assumption that you have properly configured your Ethernet interface with an IP address that is correct for your network and that you have logical connectivity to the target hosts.



At this point you are asking your self “Are we ever going to start hacking…?”



Let’s hack then. Go to the network tab and double click on the Microsoft windows network under the Entire Network navigation tree. After a few moments, the tree will expand and show each of the workgroups and domains that are accessible to your network card. From here select your target network and click the “+” symbol to the Left to open the tree.



Understanding that servers generally, or are supposed to, have more security than the other devices on the network, it is generally better to go for a workstation over a server out of the gate. Also, some servers will have monitoring agents on then that could detect what is going to happen next.



Double click on the All Computers object in the tree under the target network section of the tree. Now look at the names of the all of the devices listed. Many times the administrator will name the servers with some naming convention that will single them out in not time flat. Try to use the naming convention to your advantage and look for a pc that potentially is used by multiple persons. Key giveaways are names like scanner1, or receptionist, or lab. These machines will have several accounts on them and one of them is likely to have an admin account on it. These machines are key targets for two reasons. One, they are generally set up in a hurry when the company first sets up the network during a time when security is an afterthought, and as such they are likely to have default configurations for the local admin. Secondly, they generally have several apps on then and lots of people use them. With multiple applications, excessive rights are often granted to all users to ensure that every one can use the app that they need. Anyway, back to the hack….



When you click on your target, you will see 4 new objects in the tree under your target. These will be Groups, Services, Shares, and users. “Users” is what you want first. Double click on the users object icon and select yes to start the user enumeration. Caution! – Do not go for the history information at this time, we will get to that later. After all of the user accounts are enumerated they will be listed in alphabetical order and the local administrator will have a large red A in front of it. Ok, here we go. Go back to the computer object of the computer that you just enumerated and right click on the object. Select the connect as option. Just for fun, if the administrator account has not been renamed, it is likely that it will have a blank password or be something fairly simple. Try to log in with the user account administrator and a blank password. In about 70% of my experience at this point, the hack is over for the local machine and you are in and can start playing. If it did work, then right click on the “Services” object for the device that you have just logged into and select Install Abel. Cain will install Abel.exe and Abel.dll into the %systemroot% on the local machine. Collapse the computer object and then re-expand it by double clicking on the computer object icon and you should see a Black square with a Blue A in the middle directly under the computer object in the tree. (I get excited just thinking about it). At this point you have the keys to the castle, you just need to see which key goes where. First lets get the hashes and get the ready to crack. Double click on the users object in the tree. Say no to the history pop up for now. Select all of your users by right clicking on an account and selecting “Send all to cracker.” Leave them for now, we will come back to them. What you have just done is load a portion of the application with all of the NT and NTLM hashes for every account on the target PC.



Now, if you have been following the book, you will remember the endless posts on hackerthreads that talked about using the command line to get at certain directories on a target machine, well here is where they will come into play. (If you are not too familiar with the cmd line, please refer to the Glossary of this book and review the command line hacking section. There are many useful tools like adding users and computers to domain security groups.



Let’s go over our options:



Console: This is the command prompt on the remote machine. Anything that you can do on your pc from the CMD prompt can be done from here. Examples include mapping a drive back to your pc and copying all the files from the target or its mapped drives to your machine for later data mining, adding local users to the local security groups or anything really. With windows, everything is possible from the command prompt.



Hashes: Allows for the enumeration of user accounts and their associated hashes with further ability to send all harvested information to the cracker.



LSA Secrets: Windows NT and Windows 2000 support cached logon accounts. The operating system default is to cache (store locally), the last 10 passwords. There are registry settings to turn this feature off or restrict the number of accounts cached. RAS DUN account names and passwords are stored in the registry. Service account passwords are stored in the registry. The password for the computers secret account used to communicate in domain access is stored in the registry. FTP passwords are stored in the registry. All these secrets are stored in the following registry key: HKEY_LOCAL_MACHINE \SECURITY\Policy\Secrets





Routes: From this object, you can determine all of the networks that this device is aware of. This can be powerful if the device is multihommed on two different networks, but you read about all of that in chapter 5 – Heard, but Not Seen, Right?



TCP Table: A simple listing of all of the processes and ports that are running and their TCP session status.



UDP Table: A simple listing of all of the processes and ports that are running and their UDP session status.





Ok, back to the hack, for those of you that did not get in with the admin account with no password, another trick is to try to login to each account in the list with the same password as the username. For example, right click on the computer object in the tree and try to login with on of the user account names and use the username as the password. If that does not work then try each one with no password. I have only run into one network where these two things did not work. Also, the LSA Secrets tree object will dump the following user accounts in plain text for you if they are present:



$Machine Account

Aspnet_WP_PASSWORD

L$******************** (this is the currently logged on user with the password)

L$******************** (this will be every user that has logged in up to the total number of cached logons.

RASDAILPARAMERTERS (these are present if RAS is configured and has been used)

Backup user accounts

Misc other accounts

Note: when you see the account in plain text, it will have separators. When you type the password into a logon, omit the extra “.”. ie. The password Ramius!@# will show up as R.a.m.i.u.s.!.@.#.... All that you will type the Ramius!@#.



OK, so far we have accomplished the following goals:



1. Enumerate the computers on the network

2. connect to a computer and install the Abel remote app

3. Harvest user account information



We still need to finish the hack by performing the following steps and then move the hack to a server or more valuable target.



1. Crack user account information passwords to get the admin account

2. Login to the target machine with the admin account

3. Install the Abel service on the target server

4. Harvest all of the hashes from a server and send to the cracker

5. Crack all of the accounts



Well, we learned in chapter 2 that staying focused is the key to hacking, so lets get back to it. In the Cain application, lets to the “Cracker Tab” and have a look.



The cracker tab has two basic parts. On the left are all of the hash types that Cain will crack for you. On the right are all of the associated hashes with their usernames. What we need to do is determine the password from the hash.



Note: Now would be a good time to copy the rainbow tables and password lists from the CD’s found in the back of the book to a directory on your local machine. The use of the rainbow tables will greatly increase the speed and efficiency of the cracking process as will the dictionary files included on the CDs.



Cain provides three options for determining the password from a harvested hash; these are Dictionary guessing, Bruting and Cryptanalysis. The preferred method is Cryptanalysis as it is by far the fastest if you have the tables generated. As stated in chapter 1, it would be a good idea to have tables generated for all of the possible variants for passwords from 1-7 with all possible combinations of letters and numbers and symbols. Dictionary cracking is by far the easiest of all configurations and every hacker should have extensive lists available to use.



In this appendix we are going to explore all three options.



First, let’s look at what we can tell so far from the hashes and the Cain application. One of the columns heading looks like this <8. This means that any password with an “*” symbol is less than 8 characters. These will be the easiest to brute as they can be bruted in about 5.5 hrs with a marginal processor and memory. You can sort all of the hashes by size by clicking on the header bar at the top of the column. On the PC that I am hacking for this tutorial, I have 13 hashes and 7 of them appear to be less than 8 characters so we will start with cracking first.



Dictionary Cracking – Select all of the hashes and select Dictionary Attack (LM). You could select the NTLM but the process is slower and with few exceptions the NTLM and NT passwords are the same and NT cracks (Guesses) faster. In the Dictionary window, you will need to populate the File window with each of you dictionary files. (Move files from the CDs to your hard drive or it will take significantly longer than necessary. Check the following boxes: As is Password, Reverse, Lowercase, uppercase, and two numbers.



Dictionary Cracking



Click start and watch Cain work. The more lists and words that you have, the longer it will take. When Cain is finished, click exit and then look at the NT password column. All of the passwords cracked will show up next to the now owned accounts. Voila!



Take a second to look carefully at the accounts and passwords in the list. Look for patterns like the use of letters and characters in sequence. Many administrators use reoccurring patterns to help users remember their passwords. One time I found a network where the passwords were the first three letters of the first name and the three letter month abbreviation of the month that the password was set. Example: Ramius password reset in November would have a user account of RAMNOV. If you can identify patterns like this you can use word generators to create all possible combinations and shorten the window.



Cryptanalysis attacking



Alright then… Resort your hashes so single out the accounts that you have left to crack. Now select all of the un-cracked or guessed accounts and right click on the accounts again and select Cryptanalysis (LM). Add the tables that you copied from the CD to the Cain LM hashes Cryptanalysis Sorted rainbow tables window. Click start. This should go pretty quick. Voila! Take a second to review your progress and look for additional patterns.



At this point, I would grab a program like sam grab that has the ability to determine which accounts are members of the domain administrators group to see if you have gotten any admin level accounts. Once you move to the next step, which is bruting, most of what you have left are long passwords that are going to be difficult and time consuming. Any time saver applications that you can find will be helpful.



Bruting



Repeat the same process for selecting the accounts. Here is the first time that you will actually have to use your brain in this appendix. Bruting can be extremely time consuming. Look closely at all of the passwords that you have cracked and look for patterns. First do you see any special characters in any of the passwords cracked. How about numbers? A lot of all upper case of all lower case? Use what you see to help you determine what parameters to include when you are bruting. As you will see, the addition of a single character or symbol can take you from hours to days or even years to crack a password. The goal is to use the least amount of characters and symbols to get the account that you need. So lets finish it off. Select all of the un cracked accounts and follow the previous steps and select Brute Force (LM). The default for LM is A-Z and 0-9. This is because that is due nature of LM hashes and the way that they are stored. Another note is that sometimes you will see a “?” or several “????” and then some numbers or letters. This is also due to the nature of NT versus NTLM and the method that NT used to store passwords. If you read chapter 2, you already know why this is. If not see if you can find a repeating structure that is based on the number 7. Anyway, based on the other passwords and those accounts with an “*” in the <8 field on how many characters to specify in the password length pull down box. Make your selection and have at it. Holy crap Batman … 123749997 years to completion. If you see this, then you should rethink the need for this account. However, working with the application, rainbow tables and password generators can help your narrow down to reasonable time frames to get the job done.



Ok, so now we have our admin account and are ready to finish the hack. Go back to the network tab in the Cain application and select the Domain Controllers object under the same domain where the PC was that you harvested the hashes. Double Click. Now look through the serves in the domain and select your target. If you find one with PDC or BDC in the list, pick that one. Right click on the server and select connect as and enter the “Hacked Credentials.” Now go to the “services” object and right click again and install the service. Voila! You have admin and likely every other type of access to the target host!



Now you can repeat the steps to finish the hack



And this concludes our hack as we have accomplished each of out goals.



Some things to consider:



When you exit the Cain application, all of the password hashes and cracked accounts will be saved and can be hacked later in a remote location. They can also be used against you in court as evidence.



Also you can export all of the hashes to an .lc or text file and open up the file in Excel to perform some additional sorting and the like.



All of the devices that you infected with the Abel.exe and Abel.dll will have the Abel.exe service running and because the list is alphabetical, it will always be on top of the list. Any admin, even poor ones will question the presence of a new service. And there are ways to trace the install time and originating IP and MAC address of the installing machine back to YOU. Read Chapter 5 – Heard but not seen! Covering your tracks… It is everything. Here is a hint. Enable the telnet service and connect to the hacked and from the command prompt you will use the following commands



Net stop abel.exe

Cd %windir%

Del abel.*

CD %windir%/system32

Del abel.*

Exit



Once this is complete, you will have to reinstall the Abel client app to reconnect through Cain.



The new Uniblue PowerSuite offers you a complete solution to manage your system’s stability, performance and security in one powerful bundle.

PC computer technology is becoming more powerful and complex. So is the software that we use. It’s never been more important or more critical for you to maintain and optimize your PC and keep your private information safe. Uniblue PowerSuite gives you complete coverage improving the system stability, security and performance by integrating the power from SpeedUpMyPC, SpyEraser and RegistryBooster into one powerful solution.

Firewall and a good anti-virus product are important. But these alone won’t protect you from intrusive spyware or keep your PC optimized for peak performance. This is why Uniblue PowerSuit has been developed to be the perfect support bundle for Windows PCs, operating with existing antivirus products.

With Uniblue PowerSuite, you get best performance, protection, privacy and security in one fantastic bundle.

Find and fix PC problems
Keep your system running at peak performance and optimum speeds
Control your system and prevent problems with professional level tools
Ensure personal privacy for your important information.

Boost PC Performance
Use SpeedUpMyPC 3 to sustain maximum processing power from your CPU, memory and RAM, optimize your internet settings for faster downloads and protect your data security with file shredder and privacy protection features.

Increase Protection
Use SpyEraser to keep all forms of spyware and other malware at bay, using the latest detection technologies to find existing threats and new variants, plus daily updates, plus ‘always on’ Live Guard scanning when online

Improve System Stability
Use RegistryBooster 2 to deep scan, defrag and optimize your important registry settings for peak efficiency and avoid system slowdowns, seizures and crashes.

Exceptionally Simple to Use
Set in a highly intuitive, attractive, logical and user-friendly graphical user interface, Uniblue PowerSuite sets the standard for ease-of-use.

Safe and Trusted
Avoid crashes, seizures, slow downs and error messages. Protect your private data with the safest and most trusted solution from a leading software vendor.

More Details

Download Here
or
Link 2(Rapidshare)

-with serial key-


Recycle Bin - I’ve always thought I can give a better name to it.



And if you’ve wanted to do the same, why not you go ahead and rename it?

* Go to Start >> Run

* Type regedit.exe and hit enter to open the Registry Editor

* Navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\
ShellNoRoam\MUICache

* You’ll find probably something like this: @C:\WINDOWS\system32\SHELL32.dll,-8964

Change it’s value to what you want the Recycle Bin’s name to be.

Disclaimer: Modifying the Registry may harm your system. Make sure you have a backup. Do it at your own risk.


If you've found that your Hibernate option is missing from Windows Vista, it might be from running the disk cleanup wizard and removing the hibernate files. This is due to a known bug in Vista that might not have been hotfixed already.

Turning it back on is very simple, however.

Type cmd into the start menu search box, and use Ctrl+Shift+Enter to open in administrator mode. You can also right-click the item in the menu and choose Run as Administrator.


From the command prompt, type in the following command:

powercfg /hibernate on


You'll have to restart your computer before it will take effect.

Update: Alternative Method

An alternative method with more steps was suggested by Shane in the comments. If the above doesn't fix your problem, you can use these steps.

* Go to the command prompt icon in the Start menu under Accessories and right click the icon: click "Run as administrator".

* Paste: "powercfg.exe /hibernate on" and hit Enter and also paste "powercfg -h on" and hit enter just to be safe.

* Open Control Panel and type in "Hibernate" in the Search.

* Click "Turn hibernation on or off"

* Click "Change advance power settings"

* Scroll to and expand the "Sleep" option.

* Select "Off" to the "Allow hybrid sleep" option.

* Scroll to and expand the "Power buttons and lid" option.

* Select "Hibernate" for the "Sleep button action" option. 10. Select "Hibernate" for the "Start menu power button" option.

Hopefully one of these methods will solve your problem!


Some one wrote this great Post at orkut about Catching Hackers

I don't know who exactly the writer of this great post is...
Here is what he had to write :

"just wrote this guide to give you some tips of which you may not have heard yet. Hopefully, it won't come to a hacker getting in, but if it does...

Tip 1: Hackers cover their tracks. Experienced hackers cover them more thorougly, but amateur hackers sometimes leave things behind. Don't expect them to leave any really big evidence behind; expect more of little things here and there you might find surprising. For example, if you're writing a term paper and a black hat hacker accidently saved it when he took a paragraph out- that's suspicious. Where did that paragraph go? Well, for one thing, now you know he was in that area. Check the folders surrounding the file- you might find something.

Tip 2: Decipher between the type of hackers that are attacking you. Experienced hackers will have a more in depth look around when they penetrate your system. They won't touch much because they know that that won't add too much to their knowledge. But if you know a hacker's been in, and some files are messed with, and you have a log of someone guessing passwords to a file or something of that sort, its probably some newbie who's just starting out. These are the easiest hackers to catch. They usually get so caught up in thoughts like "I'm in!" that they forget the basics, such as work behind a proxy.

tip to protect yourself
My friend was setting up a webserver once. His first time too, and he wasn't to anxious to set up some good software to protect against hackers and viruses. He didn't put up one IDS, and before you know it, the obvious happened. But this time, a newbie had struck. The nice log files showed, bluntly across the screen, multiple instances of a foreign IP address that stood out. Some stupid newbie had tried to login as "uucp" on my friend's XP computer, with a password of "uucp." Well, that's great, but he also had tried the same user/pass combination three times, enough to get himself logged nicely. Even a semi-brainless user with some form of neurological system knows that uucp isn't a default XP account. Again, excitement toiled this hacker's brain, and maybe if he hadn't done that, along with a few other stupid things, he wouldn't have gotten caught. What other things did he do? Well, lets see. He openned 35 instances of MS-DOS. He tried to clean the printer's heads, and he edited a .gif in notepad. Then he uninstalled a few programs and installed some html editor, and replaced four files with the words "14P." he might as well have posted his phone number. In a few days, we had tracked him down to a
suburban town in Ohio. We let him go, not pressing any charges, because he had done nothing really damaging and had provided me with an example of a moron for this guide.

Tip 3: Don't go crazy if you lose data. Chances are, if it was that important, you would have backed it up anyway. Most hackers nowadays wish they were back in 1989 when they could use a Black Box and having a Rainbow Book actually meant something. Most hackers aren't blackhat, they are whitehat, and some even greyhat. But in the end, most hackers that are in systems aren't satisfied by looking around. From past experiences, I have concluded that many hackers like to remember where've they been. So, what do they do? They either press delete here and there, or copy some files onto their systems. Stupid hackers (yes, there are plenty of stupid hackers) send files to e-mail addresses. Some free email companies will give you the IP of a certain e-mail address's user if you can prove that user has been notoriously hacking you. But most of the time, by the time you get the e-mail addy it's been unused for weeks if not months or years, and services like hotmail have already deleted it

Tip 4: Save information! Any information that you get from a log file (proxy server IP, things like "14P", e-mail addresses that things were sent to, etc.) should be saved to a floppy disk (they're not floppy anymore, I wish I could get out of the habit of calling them that) incase there's a next time. If you get another attack, from the same proxy, or with similar e-mail addresses (e.g: one says Blackjack 123@something.whatever and the other says Black_jack_45@something.znn.com) you can make an assumption that these hackers are the same people. In that case, it would probably be worth the effort to resolve the IP using the proxy and do a traceroute. Pressing charges is recommended if this is a repeat offender.

Tip 5: Don't be stupid. If you've been hacked, take security to the next level. Hackers do talk about people they've hacked and they do post IPs and e-mail addresses. Proof? Take a look at Defcon Conventions. I've never gone to one, but I've seen the photos. The "Wall of Shame"-type of boards I've seen have IPs and e-mail addresses written all over them in fat red, dry-erase ink. Don't be the one to go searching the Defcon website and find your e-mail address posted on the Wall of Shame board!

Tip 6: Don't rely on luck. Chances are, sometime or another, you're going to be targeted for an attack. Here you can rely on luck. Maybe they'll forget? Maybe they don't know how to do it? If you think this way, a surprise is going to hit your face very hard. Another way you could stupidly rely on luck is by saying this: It's probably just a whitehat. On the contrary, my friend, it's probably just a blackhat. A blackhat with knowledge stored in his head, ready to be used as an ax. It's your data. You take the chance.

Adding A Floating Social Media Button In Blogger by Itching And Burning Sensation

Get This