Wednesday 30 March 2011

How to use cain to crack md4 hashes Tips




Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.
Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.
The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and  some not so common utilities related to network and system security.

For video

Saturday 26 March 2011

How to Make Blogspot DoFollow?

To remove nofollow tag from comments.
  1. Allow anonymous comments, go to Settings in Blogger and then Comments.
  2. Go to Blogger layout and click on Edit HTML.
  3. Check Expand Widget Templates.
  4. Search “nofollow“  . you will see tag like <a expr:href=’data:comment.authorUrl’ rel=’nofollow’><data:comment.author/></a>
  5. Remove tag rel=’nofollow’
To remove nofollow tag from  trackback and pingback.
  1. Again search “nofollow” and you will see tag like <a expr:href=’data:backlink.url’ rel=’nofollow’><data:backlink.title/>
  2. Remove tag rel=’nofollow’
  3. Its done Save template.

For Video

10000000000% Waorking Gmail Bommber

Hi Friends
Here is a email bomber. This is easy to use. 
This bomber sends more than 1000 emails in 1 hour that to IN THE INBOX. Just you need to enter victims email , your email id and pass , and the message you want to send.
Here is the image of the bomber

Kill All Hidden Processes Trojan ,keyloggers From Your Computer

Process Revealer Free Edition is a free hidden process detector that reveals what does not appear in standard detection utilities like Windows Task Manager. Process Revealer provides detailed information about each process running on your computer to help you know if a process is related to a malicious program. Hidden programs are automatically highlighted in the interface and can be removed in one click.


As seen in image above, hidden processes are highlighted and can be easily identified in the list of active process. Kill or delete the source file off the trojons and make your pc happy n secure once again


Download

Friday 25 March 2011

How to Crack Windows XP Password?

To crack Windows XP password we'll use a program called Ophcrack
Well, to crack a password there is one big science discipline called cryptography. Here we won't get into details but rather explain how this program works.

So, if you lock your account in Windows with a password for example admin, here is what happens. Windows takes that password and encrypts it with one of the methods of encryption and then saves it into a file(with Windows XP it's a SAM file located in system32). Now your password is no longer stored as admin, but rather something like 5fsujf92+*?sdwfhsa=)seqv , depending on the encryption method. However, we ask ourselves, why don't we just take that encrypted password and decrypt it back to admin. The thing is we can't because it's a one way encryption and that is actually the point of it all. So how do we actually crack it?

There is a number of methods but the most famous one is brute force attack. Brute force actually means to start with a letter a and encrypting it. Then see if the encrypted strings match. If not then b, c, until we've gotten to admin. Then the encrypted strings will match and we'll know that is the right password. Brute force attack is the slowest method of cracking, but there is no risk that you'll not find the password. The thing about brute force is that the time of cracking rises rapidly depending on how long the password is, how many characters are being used in it and so forth.
Other methods, such as dictionary attack and an attack using rainbow tables are a better option. Ophcrack itself works using rainbow tables and brute force combined.


1. Download For Windows Ophcrack LiveCD  
Download For Vista Ophcrack LiveCD
2. This program is now an ISO image. Just burn it with Nero or whatever you're already using for burning images( for burning only ISO images download this burning program - ISORecorder)
3. Now reboot your computer with the CD inside (if the CD will not boot you need to set the boot priority inside BIOS, so that the CD-ROM is the first in the list)
4. A menu like this will appear:
Select the Ophcrack Graphic Mode
5. After the CD is done loading, a user interface like this will appear:

The last right column are the passwords for the given users.
Now depending on many reasons, the cracking of the password could take a long time.
Now just reboot your computer and log into Windows :)

 

Introduction

Hi My Name Win_hacker


And Its My First hacking blog So 


Don't Say To Hack A This Web Site 


I Make This Blog For Help N00b So


Plzz Corporate With ME