Monday 28 February 2011

<div><table cellpadding="0" cellspacing="0"><TR VALIGN="MIDDLE"><TD style="background-image: url(http://beemp3.com/player/corner-topleft2.gif);background-repeat: repeat;font-family: Arial, Helvetica, sans-serif;font-size: 12px;vertical-align: bottom;"></td><TD style="background-image: url(http://beemp3.com/player/bkgnd-top2.gif);background-repeat: repeat;font-family: Arial, Helvetica, sans-serif;font-size: 12px;vertical-align: middle;"> Black Eyed Peas Feat. Justin T - Where is the Love .mp3</td><TD style="background-image: url(http://beemp3.com/player/corner-topright2.gif);background-repeat: repeat;font-family: Arial, Helvetica, sans-serif;font-size: 12px;vertical-align: bottom;"></td></TR><TR VALIGN="MIDDLE"><TD WIDTH="16" style="width: 16px;background-image:url(http://beemp3.com/player/left-ltrow2.gif);"/> </TD><TD style="background-image: url(http://beemp3.com/player/light2.gif);background-repeat: repeat;font-family: Arial, Helvetica, sans-serif;font-size: 11px;vertical-align: bottom;"><embed class="beeplayer" wmode="transparent" style="height:24px;width:290px;" src="http://beemp3.com/player/player.swf" quality="high" bgcolor="#ffffff" width="290" height="24" align="middle" allowScriptAccess="sameDomain" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" flashvars="playerID=1&bg=0xCDDFF3&leftbg=0x357DCE&lefticon=0xF2F2F2&rightbg=0x64F051&rightbghover=0x1BAD07&righticon=0xF2F2F2&righticonhover=0xFFFFFF&text=0x357DCE&slider=0x357DCE&track=0xFFFFFF&border=0xFFFFFF&loader=0xAF2910&soundFile=http%3A//www.freewebs.com/tylerjia/01-black_eyed_peas_feat.mp3"></embed> <img style="padding:0;border:0;vertical-align:bottom" src="http://beemp3.com/player/logo_small.gif"/> </td><TD WIDTH="16" style="width: 16px;background-image:url(http://beemp3.com/player/right-ltrow2.gif);"/></TD></TR><TR><TD WIDTH="16"><IMG style="padding:0;border:0;" SRC="http://beemp3.com/player/corner-bottomleft2.gif"></TD><TD style="background-image: url(http://beemp3.com/player/bkgnd-bottom2.gif);background-repeat: repeat-x;font-family: Arial, Helvetica, sans-serif;font-size: 11px;vertical-align: top;text-align: center;padding:0;border: 0;margin:0;">Found at <a href="http://beemp3.com/download.php?file=7186785&song=Where+is+the+Love">bee mp3 search engine</a></TD><TD WIDTH="16"><IMG style="padding:0;border:0;" SRC="http://beemp3.com/player/corner-bottomright2.gif"></TD></TR></table></div>

Sunday 27 February 2011

How to Hack an Ethernet ADSL Router


Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.
Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in theDefault username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.
Before you proceed, you need the following tool in the process
Here is a detailed information on how to exploit the vulnerability of an ADSL router.
Step-1: Go to www.whatismyipaddress.com. Once the page is loaded you will find your IP address. Note it down.
Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
Suppose your IP is 117.192.195.101, you can set the range something as117.192.194.0 to 117.192.200.255 so that there exists atleast 200-300 IP addresses in the range.
 
Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selectionenter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.
IP Scanner
I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Options instead of Tools
 
Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.
IP Scanner
 
Step-5: Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.
Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below.
Router Settings Page
 
If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.
 

What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.
 

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack. 
Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.
Warning!
All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

how to detect any ip


As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.
 
1. Credit Card Frauds
For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which the billing address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeria and other high risk countries. So in order to bypass this restriction the credit card fraudster uses a proxy to spoof his IP address so that it appears to have come from New York. The IP address location appears to be legitimate since it is in the same city as the billing address. A proxy check would be needed to flag this order.
 
2. Bypass Website Country Restrictions
Some website services are restricted to users form only a selected list of countries. For example, a paid survey may be restricted only to countries like United States and Canada. So a user from say China may use a proxy so as to make his IP appear to have come from U.S. so that he can earn from participating in the paid survey.
 

Proxy Detection Services

 
So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind andFraudLabs to detect the usage of proxy or spoofed IP from users participating online.
Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.
 
How Proxy Detection Works?
Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.
 
How to Tell Whether a given IP is Real or a Proxy?
There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.
Detect Anonymous Proxy
So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps. Pass your comments

Hack Any Website - Using JavaScript



January 3, 2009

Hack Any Website - Using JavaScript





If you want to fool your friend or colleague, then you can use this simple java script to hack any web site.

Just copy and paste this JavaScript code in the address bar of your web browser and hit enter, and any web page/ web site will become editable just as a notepad/MS Word document.
javascript: document.body.contentEditable = 'true';document.designMode = 'on'; void 0
Other than fooling your friends, this method is useful for you too: in case your mouse stops working, you can easily place the cursor on any web page and copy the text from it !

buy it



hack it

hack it

Infolinks - The In Text Advertising Leader - Join Us Now

Infolinks - The In Text Advertising Leader - Join Us Now
<script src="http://www.assoc-amazon.com/s/link-enhancer?tag=hackit-20&amp;o=1" type="text/javascript"></script>

Saturday 26 February 2011

hack bitcomet


Tweaks to increase torrent download speed:

1.Hack the max TCP connections on Windows XP
If you are currently using on Windows XP sp2, your Windows TCP connections are limited to a maximum of 10. I highly recommend your modify Windows TCP/IP.sys with LvlLords Event ID 4226 Patcher to get better performance bittorrent download speed. If not modifying Windows TCP/IP.sys, It will seriously hurts your bitcomet download speed because it wont let you connect to a high amount of ip numbers.
2. BitComet Connection Preferences
Increase BitComet Torrent download speed
Click – > Option – > Preferences ( CRTL + P)
When you see the connection properties. There is no Limit on Global Max Upload Rate or Global Max Download Rate. I recommend you let your upload to 90% of overall upload and download speed. So, you still have overall 10 percent to surf internet or downloading other files.
For Task Schedule, It’s an useful bitcomet tweak option. As you see, Max Simultaneous download task is 10 but if you have fast internet connection and plan to downloading more torrent files. You can setup the number of download task higher.
Listen Port also important on bitcomet tweak. As some of country ISP’s have blocked the default Bittorrent ports, So, you can choose or enter specific port number to listen on. For improve the downloading, if you set your internet modem port forwarding features to your computer IP address.
3.Task Preferences
Click Preferences —> Task on the menu.
BitComet Task Preferences
There’s a lot of settings here that you might like to change. It always helps to have a default download path set, so if you have a downloads that you put all your downloads into you can click on the the option in the list and browse for a folder to set as default. As you can see you also have some more max upload rate options. This is per task and is meant for users who will be downloading multiple files. Regardless of what you put in here, your overall upload speed wont reach over your Global Max Upload Speed limit that you set a moment ago in the Connection Preferences. Other options in preferences such as Appearance are up to you, now we will look at downloading with BitComet.
4. Connection Preferences
Click Preferences –> Connection
BitComet Connection Properties
  1. Global Maximum Number of Connections: 130This number should not be set too low or the number of connections made to your torrents will be limited. Setting it too high may cause too much bandwidth to be used and can cause slowdowns.
  2. Maximum Number of connection per task: 10If you see that the peers connected to a specific torrent are exactly this number, or very close, increase this number to improve speeds.
  3. Max Simultaneous half open TCP connection : 40you can set the number of max half open tcp connection to 50 but you might facing slow internet surf on other application. so, i recommended you use 40 is sufficient.
  4. Enable DHT Network: CHECKED This is recommended to be checked to improve speeds. More people will be available for sharing if this is checked.
  5. Enable uPnP port mapping : CHECKED
  6. Enable remove port on NAT/Firewall when exiting : Checked
5. Disable Windows Firewall
Bittorrent application very hate Windows Firewall because it will blocking or slow down your download speed of bitcomet on torrent files. So, disable Windows firewall and and get yourself a decent firewall like Zone Alarm.
6. Set your router
if you have router, you can set below bitcomet tweaks to improve or increase your BitComet bittorrent download speed if you know how to set your router.
  • Set port forwarding or virtual server features on your router. Then map your router to forward this port date to your local ip address. This will improve bitcomet bittorrent download speed. Remember set the both (TCP and UDP).
  • Enable uPnP features on your router.
Other references for increase bittorrent download speed:-


Read more: Increase BitComet Download Speed http://www.techmixer.com/increase-bitcomet-download-speed/#ixzz1F8rqBePQ