Tuesday, 31 December 2013

Make ur Windows Genuine using notepad!!!!

1. Copy and Paste the following code in
the Notepad.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Mi
crosoft\Windows NT\CurrentVersion
\WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b
,6a,8d,6f,d5,33, 93,f d
"LastWPAEventLogged"=hex:d5,07
,05,00,06,00,07, 00,0 f,00,38,00,24,0
0,fd,02
[HKEY_LOCAL_MACHINE\SOFTWARE\Mi
crosoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete
data - do not use)"
"InstallDate"=dword:427cdd 95
"ProductId"="69831-640-1780577
-45389"
"DigitalProductId"=hex:a4,00,0
0,00,03,00,00,00 ,36, 39,38,33,31,2d,
36,34,30,2d,\
31,37,38,30,35,37,37,2d,34,35,
33,38,39,00,5a,00,00 ,00,41,32,32,2d
,30,30,30,\
30,31,00,00,00,00,00,00,00,00,
0d,04,89,b2,15,1b,c4 ,ee,62,4f,e6,64
,6f,01,00,\
00,00,00,00,27,ed,85,43,a2,20,
01,00,00,00,00,00,00 ,00,00,00,00,00
,00,00,00,\
00,00,00,00,00,00,00,00,00,00,
00,31,34,35,30,34,00 ,00,00,00,00,00
,00,ce,0e,\
00,00,12,42,15,a0,00,08,00,00,
87,01,00,00,00,00,00 ,00,00,00,00,00
,00,00,00,\
00,00,00,00,00,00,00,00,00,00,
00,00,00,00,00,00,00 ,94,a2,b3,ac
"LicenseInfo"=hex:9e,bf,09,d0,
3a,76,a5,27,bb,f 2,da ,88,58,ce,58,e9
,05,6b,0b,82,\
c3,74,ab,42,0d,fb,ee,c3,ea,57,
d0,9d,67,a5,3d,6e,42 ,0d,60,c0,1a,70
,24,46,16,\
0a,0a,ce,0d,b8,27,4a,46,53,f3, 17
2. Save the file with the .reg
extension.
3. If you run the file means it will ask
you the confirmation to add the value
to your Registry.
4. Press Yes.
5. Reboot your System.
6. Start Downloading from Microsoft
Site.

Windows Explorer Has Stopped Working Perfect Solution FIX :

1) Click Start, and type “cmd” in Search box.

2) Once you saw cmd.exe, right-click cmd.exe, and then click “Run as administrator”.

3) At the command prompt, type Sfc /scannow and then press ENTER.

4) This method is known as “Run System File Checker” to scan and check your files. Thats it.

Enjoy !! Windows Explorer Has Stopped Working Perfect Solution FIX

How To Unlock an Android Pattern Just follow these simple steps to unlock your phone and use again free of cost.


1. phone want you to enter the user email id you enter in the play store.
2. You don’t know the email id.
3. Then just don’t worry just follow these steps.
4. Just switch off you android phone and then wait for second to switched of it.
A. then first click Up VolumeKeyand hold it.
B. then click on home button and hold it.
C. then press the power button and after is started just release it.
D. and then you can see you enter in the secret android menu you never see it before.
E. just click on home button for up and down in the menu.
F. then just go to third option named as DELETE ALL USER DATA.
G. then it takes dome time.
H. the phone will be started and the unlock patter problem is fixed.

Saturday, 28 December 2013

Port Scanners Hacking Tools

Port Scanners Hacking Tools

Nmap :- This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.

Superscan :- A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

Angry IP Scanner :- A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

Unicornscan :- Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

Port Scanners Hacking Tools

Port Scanners Hacking Tools

Nmap :- This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.

Superscan :- A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

Angry IP Scanner :- A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

Unicornscan :- Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

Port Scanners Hacking Tools

Port Scanners Hacking Tools

Nmap :- This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.

Superscan :- A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

Angry IP Scanner :- A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

Unicornscan :- Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

Port Scanners Hacking Tools

Port Scanners Hacking Tools

Nmap :- This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.

Superscan :- A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

Angry IP Scanner :- A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

Unicornscan :- Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

Port Scanners Hacking Tools

Port Scanners Hacking Tools

Nmap :- This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.

Superscan :- A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

Angry IP Scanner :- A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

Unicornscan :- Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

Port Scanners Hacking Tools

Port Scanners Hacking Tools

Nmap :- This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.

Superscan :- A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

Angry IP Scanner :- A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

Unicornscan :- Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

Install Windows xp in 10 minutes

Install Windows xp in 10 minutes

This simple tricks goes this way.

1. Boot through Windows XP CD.

2. After all the files are completely loaded, you get
the option to select the partition. Select “c”.

3. Now Format the partition, whether it is normal
or quick with NTFS or FAT

4. Once the formatting is completed, All the setup
files required for installation are copied. Restart your system by pressing Enter.
Now, here begins the Simple trick to save 10-15
minutes.

5. After rebooting, you get a screen where it
takes 40 minutes to complete or finalize the OS
installation.

6. Now, Press SHIFT + F10 Key -> This opens
command prompt.

7. Enter “Taskmgr” at the command prompt
window. This will open Task Manager.

8. Click the Process Tab, here we find a process
called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal.

Initially it
will be Normal.
Thats it, no more work to do. Relax your self and
see how fast the installation process completes

Who R Using Win 8 ??

Who R Using Win 8 ??
Some Keyboard Shortcuts 4 them...
Windows key – brings up the Metro start screen. You can start typing to search for an app, just like the Win7 start menu.
Win + D – brings up the old Windows desktop.
Win + C – brings up the Charms menu, where you can search, share, and change settings.
Win + I – opens the Settings panel, where you can change settings for the current app, change volume, wireless networks, shut down, or adjust the brightness.
Win + Z – opens the App Bar for the current Metro application.
Win + H – opens the Metro Share panel.
Win + Q – brings up the Metro App Search screen.
Win + W – brings up the Metro Settings search screen.
Win + F – brings up the Metro File search screen.
Win + K – opens the Devices panel (for connecting to a projector or some other device)
Win + , (comma) – Aero Peek at the desktop.
Win + . (period) – Snaps the current Metro application to one side of the screen. (Right side)
Win + Shift + . (period) – Snaps the current Metro application to the other side of the screen. (Left side)
Win + J – switches focus between snapped Metro applications.
Win + Page Up / Down – moves the current app to the other monitor.
Win + Tab – opens the Metro application switcher menu, switches between applications.
You might notice that we didn’t show screenshots of how all these shortcut keys work, and there’s a reason for that: you need to test them out for yourself to really learn how they work.
Win + X – lunch kind of start menu, very useful
Windows Key + Print Screen saves a screenshot into your Pictures folder. It’s quite handy.

Simple Trick To Use Web Browsers As Text Editor

Simple Trick To Use Web Browsers As Text Editor

1 Copy below code in browser Url Section

data:text/html,

2. Now Press Enter.
3. Now you can type anything as would do on any other text editor like Notepad.
4. To save your text file Press Ctrl + S and save it as anything.txt (.txt Is Must)

How to bypass internet filters and firewalls inposed by school, work, or country.

How to bypass internet filters and firewalls inposed by school, work, or country.

So I was asked this question a lot how to bypass internet filters and firewalls inposed by school, work, or country.

There's many way but the easiest is using custom proxy in our regular web browsers!

Using custom gives you a site instead of another!
If you type Wikipedia.org it will still redirect you to your proxy page where you can put the Address and browse any site!

For Chrome goto Settings>advance settings>change proxy settings> select your connection>setting> enable custom proxy and put your proxy site!

On Mozilla goto settings>advanced>network>use custom proxy>add the proxy site you like and done!

This is how it's done! bypass all internet filters and firewalls inposed by school, work, or country and have fun browsing Facebook and other blocked sites freely

Remove time limit

Remove time limit
Many of the downloading sites have a timelimit
which restricts Mobile Users from downloading
eg. Hotfile etc. Steps:
1]Open Opera Mini.
2]In the Address Bar,
Type: Javascript:alert(c=0)
3]Press Go.
4]Bookmark this page.
5]Go to hotfile or any hosting site.
6]Click on the Regular Download.
7]After the Time Limit Shows 58 sec etc..
8]Wait for 1 Min.
9]Opnen the Bookmark you created.
10]Now your Download is Unlocked .
friend save ur Time and Enjoy

What is SSH

What is SSH

Recently I wanted to set up a remote desktop sharing session from home pc to my laptop. While going through the set up guide I came across ssh tunneling. Even though there are many articles on the subject still it took me a considerable amount of googling, some experimenting and couple of Wireshark sessions to grasp what’s going under the hood. Most of the guides were incomplete in terms of explaining the concept which left me desiring for a good article on the subject with some explanatory illustrations. So I decided to write it my self. So here goes…

Introduction
A SSH tunnel consists of an encrypted tunnel created through a SSH protocol
connection. A SSH tunnel can be used to transfer unencrypted traffic over a
network through an encrypted channel. For example we can use a ssh tunnel to
securely transfer files between a FTP server and a client even though the FTP
protocol itself is not encrypted. SSH tunnels also provide a means to bypass firewalls that prohibits or filter certain internet services. For example an organization will block certain sites using their proxy filter. But users may not wish to have their web traffic
monitored or blocked by the organization proxy filter. If users can connect to
an external SSH server, they can create a SSH tunnel to forward a given port on
their local machine to port 80 on remote web-server via the external SSH
server. I will describe this scenario in detail in a little while.

To set up a SSH tunnel a given port of one machine needs to be forwarded (of
which I am going to talk about in a little while) to a port in the other
machine which will be the other end of the tunnel. Once the SSH tunnel has been
established, the user can connect to earlier specified port at first machine to
access the network service.

Port Forwarding
SSH tunnels can be created in several ways using different kinds of port forwarding
mechanisms. Ports can be forwarded in three ways.

Local port forwarding
Remote port forwarding
Dynamic port forwarding
I didn’t explain what port forwarding is. I found Wikipedia’s definition more explanatory.

Port forwarding or port mapping is a name given to the combined technique of

translating the address and/or port number of a packet to a new destination
possibly accepting such packet(s) in a packet filter(firewall)
forwarding the packet according to the routing table.
Here the first technique will be used in creating an SSH tunnel. When a client application connects to the local port (local endpoint) of the SSH tunnel and transfer data these data will be forwarded to the remote end by translating the host and port values to that of the remote end of the channel.

So with that let’s see how SSH tunnels can be created using forwarded ports with an examples.

Tunnelling with Local port forwarding
Let’s say that yahoo.com is being blocked using a proxy filter in the University.
(For the sake of this example. . Cannot think any valid reason why yahoo would be blocked). A SSH tunnel can be used to bypass this restriction. Let’s name my machine at the university as ‘work’ and my home machine as ‘home’. ‘home’ needs to have a public IP for this to work. And I am running a SSH server on my home machine. Following diagram illustrates the scenario.

To create the SSH tunnel execute following from ‘work’ machine.

1
ssh -L 9001:yahoo.com:80 home
The ‘L’ switch indicates that a local port forward is need to be created. The switch syntax is as follows.

1
-L :-host>:
Now the SSH client at ‘work’ will connect to SSH server running at ‘home’ (usually running at port 22) binding port 9001 of ‘work’ to listen for local requests thus creating a SSH tunnel between ‘home’ and ’work’. At the ‘home’ end it will create a connection to ‘yahoo.com’ at port 80. So ‘work’ doesn’t need to know how to connect to yahoo.com. Only ‘home’ needs to worry about that. The channel between ‘work’ and ‘home’ will be encrypted while the connection between ‘home’ and ‘yahoo.com’ will be unencrypted.

Now it is possible to browse yahoo.com by visiting http://localhost:9001 in the web browser at ‘work’ computer. The ‘home’ computer will act as a gateway which would accept requests from ‘work’ machine and fetch data and tunnelling it back. So the syntax of the full command would be as follows.

1
ssh -L :-host>:

It is also possible to specify a port in the ‘home’ computer itself instead of
connecting to an external host. This is useful if I were to set up a VNC session
between ‘work’ and ‘home’. Then the command line would be as follows.

1
ssh -L 5900:localhost:5900 home (Executed from 'work')
So here what does localhost refer to? Is it the ‘work’ since the command line is executed from ‘work’? Turns out that it is not. As explained earlier is relative to the gateway (‘home’ in this case) , not the machine from where the tunnel is initiated. So this will make a connection to port 5900 of the ‘home’ computer where the VNC client would be listening in.

The created tunnel can be used to transfer all kinds of data not limited to web browsing sessions. We can also tunnel SSH sessions from this as well. Let’s assume there is another computer (‘banned’) to which we need to SSH from within University but the SSH access is being blocked. It is possible to tunnel a SSH session to this host using a local port forward.

the transferred data between ‘work’ and ‘banned’ are encrypted end to end. For this we need to create a local port forward as follows.

1
ssh -L 9001:banned:22 home
Now we need to create a SSH session to local port 9001 from where the session
will get tunneled to ‘banned’ via ‘home’ computer.

1
ssh -p 9001 localhost
With that let’s move on to next type of SSH tunnelling method, reverse tunnelling.

Reverse Tunnelling with remote port forwarding
Let’s say it is required to connect to an internal university website from home.
The university firewall is blocking all incoming traffic. How can we connect from ‘home’ to internal network so that we can browse the internal site? A VPN setup is a good candidate here. However for this example let’s assume we don’t have this facility. Enter SSH reverse tunnelling..

As in the earlier case we will initiate the tunnel from ‘work’ computer behind the firewall. This is possible since only incoming traffic is blocking and outgoing traffic is allowed. However instead of the earlier case the client will now be at the ‘home’ computer. Instead of -L option we now define -R which specifies
a reverse tunnel need to be created.

1
ssh -R 9001:intra-site.com:80 home (Executed from 'work')
Once executed the SSH client at ‘work’ will connect to SSH server running at home creating a SSH channel. Then the server will bind port 9001 on ‘home’ machine to listen for incoming requests which would subsequently be routed through the created SSH channel between ‘home’ and ‘work’. Now it’s possible to browse the internal site
by visiting http://localhost:9001 in ‘home’ web browser. The ‘work’ will then create a connection to intra-site and relay back the response to ‘home’ via the created SSH channel.

As nice all of these would be still you need to create another tunnel if you need to connect to another site in both cases. Wouldn’t it be nice if it is possible to proxy traffic to any site using the SSH channel created? That’s what dynamic port forwarding is all about.

Dynamic Port Forwarding
Dynamic port forwarding allows to configure one local port for tunnelling data to all remote destinations. However to utilize this the client application connecting to local port should send their traffic using the SOCKS protocol. At the client side of the tunnel a SOCKS proxy would be created and the application (eg. browser) uses the SOCKS protocol to specify where the traffic should be sent when it leaves the other end of the ssh tunnel.

1
ssh -D 9001 home (Executed from 'work')
Here SSH will create a SOCKS proxy listening in for connections at local port
9001 and upon receiving a request would route the traffic via SSH channel
created between ‘work’ and ‘home’. For this it is required to configure the
browser to point to the SOCKS proxy at port 9001 at localhost.