Saturday 20 July 2013

Hiren Boot CD 15.1 Restored Feautures

Hirens’ Boot DVD 15.1 Restored Edition V 2.0 (May 2012)
It is called Restored because it contains all the commercial utilities omitted from the official releases (since version 11.0.)
It also includes other tools such by Acronis, Paragon, Active, and other useful software fully integrated within Hiren’s menus.
hiren-boot-cd-15.1
This edition includes many new utilities, many have been updated and the selection menus have been improved. Yet the size is considerably reduced so that it can fit in a 2 Gb USB flash memory stick.
Hiren=boot-cd

Hiren boot cd 15.1 Restored Feautures

It also includes other tools such by Acronis, Paragon, Active, and other useful software fully integrated within Hiren’s menus.
In addition it now includes the option to add tools such as Backtrack or Geek Squad’s MRI (Detailed instructions included).
Below are listed only the additional programmes and utilities found in this DVD.
Optional self booting utilities
For the following packages there are menu entries, but you need to download and include the iso images yourself. Detailed instructions are included as to how to do this. Read document ‘add-optional-utils.pdf’.
SysRescueCD [2]
A live Linux Gentoo based rescue CD (choice of 32 or 64 bit). It includes many tools for rescuing and managing Linux and windows systems. Hundreds of utilities. e.g. Clam antivirus, Gparted, ntfs-3g, wifi access, syslinux, telnet, ssh, vim, mc, etc., and most important: PXE network booting.
BackTrack
An Ubuntu based Linux live CD for digital forensics and penetration (sic) testing. It includes many well known security (or hacking) tools, e.g. Aircrack, Ophcrack, Gerix Wifi Cracker, disassemblers, sniffers, etc., as well as commonplace applications such as browsers, file managers, editors, torrent clients, etc.
Tails
A privacy oriented linux live CD. It contains everything one needs (browsers, messaging, e-mail, office, etc.) preconfigured with security in mind. Tail internet connectivity relies on the Torr anonymity network to protect privacy. Thus internet connections cannot be traced back. It also leaves no trace on the computer it uses.
MRI
Geek Squad’s diagnostics and repair disk it is not free software. I find it cumbersome and slow whilst not offering anything more than the tools we already have on HBCD. Some people, however, want to integrate it with
HBCD.
Restored DOS Menu utilities
These are found within the HBCD DOS menu. These utilities were included in the official but were left out since HBCD version 11.
  • Acronis Backup & Recovery 11.0 (build 17437)
  • Acronis Disk Director 11.0 Advanced (build 12077)
  • Acronis True Image 2012 (build 7119)
  • Active Partition Recovery 3.0
  • Active Password Changer 3.0.420
  • Active Undelete 5.5
  • DiskGenius 3.3.0525 Proffesional
  • Drive Image 5.6
  • GetDataBack for FAT/NTFS 4.0
  • HDD Regenerator 2011
  • NTFS DOS Pro
  • Norton Ghost 11.5.1
  • Norton PartitionMagic Pro Server 8.05
  • PC-Check 6.21
  • Paragon Partition Manager 12.0.19.15177
  • Paragon Mount Everything 3.0
  • Synantec ImageCenter 5.6
Self booting utilities
  • Acronis [4]
– Backup & Recovery 11.0 (build 17437)
– Disk Director 11.0 Advanced (build 12077)
– True Image 2012 (build 7119)
  • Active Boot Disk 5.5.2 [6]
  • BootIt Bare Metal 1.07 [12]
  • Clonzilla 1.2.12-37 [13]
  • DiskGenius 3.3.0525 Proffesional
  • Eassos PartitionGuru 3.8.0 [14]
  • GParted 0.12.1
  • Hardware Detection Tool 0.5.0.
  • Kaspersky Rescue Disk 10.0.31.4, Updated 20-05-2012 [5]
  • Macrium Reflect Professional 64 bit 5.0 4354
  • Mini Windows 7 (Improved and Updated Drivers)
  • OneKey Ghost 6.5
  • Paragon Partition Manager 12.0.19.15177 [8]
  • Plop Boot Manager 5.0.14 (31.01.2012)
  • Parted Magic Linux 2012_05_14
  • QuickTech Pro SB 5.90.00 Hardware diagnostics and stress test. [9]
  • R-Drive 4.7 (4726)
  • Spinrite 6
Added to HBCDMenu program launcher
  • AIDA64 Extreme Edition 1.85.1600 [15]
  • Acronis Backup & Recovery 11.0 (build 17437)
  • Acronis Disk Director 11.0 Advanced (build 12077)
  • Acronis True Image 2012 (build 7119)
  • Active Password changer professional 4.0
  • Atlantis Word Processor Pro 1.6.5.5 [10]
  • Avast Antivirus 1.0.3 updatable (updated 07-05-2012)
  • Avast Registry Editor
  • Calculator (Micro$oft calc.exe is very good why not have it in MiniXP?)
  • CardRecovery 5.30.1206 [16]
  • DSynchronize (Drive/directory synchronizer) 2.30.2
  • DTaskManager (Powerfull process control) 1.51.
  • Data Recovery Wizard Pro 5.5.1
  • GetDataBack NTFS & FAT 4.22
  • HDClone Professional 13 (10600)
  • HWiNFO 3.65
  • Isobuster 2.8.5 (free edition)
  • MalwareBytes 1.60.1.100 (updatable)
  • MiniTool Power Data Recovery 6.6
  • Norton Ghost 11.5.1, Ghost Cast Server, Ghost Image Explorer
  • Outlook Express Backup 6.5
  • Eassos PartitionGuru 3.8.0 [14]
  • Paragon Partition Manager server 14.04.10.9887 [8]
  • Partition Wizard Server edition 7.1
  • Passware Kit Enterprise 10.3.2585 (Crack any password). [7]
  • PowerCmd 1.9 [11].
  • PSPR 6.3.1 (Proactive System Password Recovery) [20]
  • Raid Reconstructor 4.25 [21]
  • SkyIAR 0.5 Install ACHI/SATA/IDE controller drivers. [19]
  • UltraISO Premium 9.3.6.2766 [17]
  • WXHexEditor 0.11 (Hex editor. Can handle Terabyte files/disks). [18]
  • WinNTSetup 2.2 Install Windows 2000/XP/Vista/7/2003/2008 anywhere, fast,integrate drivers, include customizations.
  • WinRar 4.01
Important Notes
Mini Windows XP and Mini Windows 7 run from RAM. If you start one program after another you will soon run out of memory. So clean the temp folder from time to time. A command for this is provided in the Program Launcher.
Mini Windows 7 is somewhat slow to start up because it loads some drivers. So be patient and give it time. Also it now has the same desktop background as Mini XP so do not be confused.
The HBCD program launcher and some of the portable utilities are incompatible with 64 bit Windows 7. Use only within 32 bit installed Windows, else you can boot Mini Windows from DVD and use them from there.
Hiren-boot-cd

Top 3 Command Prompt Tricks and Hacks

Windows Command Prompt might seems to be very boring or relatively useless at first glance but as anyone who has ever used the Command Prompt very often can tell you, there’s much to love!!
Command Prompt Tricks and Hacks
Command Prompt Tricks and Hacks

Command Prompt Tricks and Hacks

Check Out some amazing Command Prompt Tricks.I am Updating cmd tricks while learning. I found found some Command Prompt tricks i collected few years ago while cleaning junk from my pc last night.
  • Manage your Backups through CMD

Thanks to the robocopy command, you don’t need to use Window’s backup software or install a third party program to manage your backups.

Just execute robocopy c:\users\tim\documents f:\backup\documents /copyall /e /r:0 /dcopy:t /mir, obviously replacing the source and destination folders with whatever you’d like to backup and where. The robocopy command with these options functions identically to an incremental backup software tool, keeping both locations in sync.

You don’t have the robocopy command if you’re using Windows XP or earlier. However, you do have the xcopy command, which can be used to do something very similar: xcopy c:\users\tim\documents f:\backup\documents /c /d /e /h /i /k /q /r /s /x /y.

No matter which command you choose to use, just create a script file containing the command and schedule it to run in Task Scheduler and you’ll have your own custom made backup solution.

I’ve chosen to use the robocopy command on my personal computers as my only local backup solution because I like the level of control it gives me. Hopefully you take that as a vote of confidence in this incredibly useful Command Prompt trick.

  • Matrix Wall Command Prompt

1. Click Start-> run -> notepad.
2. Now copy the code below
@echo off
color 0a
:top
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto top
3. After copying the code, now save your notepad file as crazylearner.bat
4. Now click on the filename.bat, you can see matrix code in a cmd prompt now press ALT + ENTER.
5. Matrix code will be displayed.
Command Prompt Tricks and Hacks
Command Prompt Tricks and Hacks

  • How to create an un-deletable folder

  1. Click on Start.
  2. Click on Run. Type in “cmd” without quotes.
  3. In the Command Prompt Window that opens, type the name of the drive you wish to create your folder in the format <drive-name>: and press Enter. e.g. If you wish to create the undeletable folder in D drive, type “D:” without the quotes. Note that the folder cannot be created in the root of C:/ drive (if C: is your system drive).
  4. Type this command- “md con\” or “md lpt1\” without the quotes and press Enter. You can choose any of the keywords given above as the name of your folder.
Now Windows will create an UN-deletable, UN-renamable folder in the drive you entered in Step 3. However the folder can be renamed to another keyword using Windows Explorer.
Tips
  • Get Installed Driver Information
driverquery
It can be very useful when troubleshooting to know what drivers are installed on a system. This
command will give you a complete listing of the drivers and when they were installed.
  • Copy Files Via Infrared Port
irftp filename.ext
This will fire up the wireless link dialog so that you can copy the specified file via an infrared port.
  • Monitor Port Activity
netstat -a 30
This will show you all of the TCP/IP ports that are being used on your system and what they are
connecting to (or being connected from). It will continue to monitor these ports and refresh the
information every 30 seconds. You can change the refresh rate by changing the number at the end of the
command.

CMD Tricks – with new tricks

CMD Tricks : We tend to use the command prompt quite a lot. And in my last post about ” CMD Tricks“.Many of Reader ask me to more Tricks about CMD Tricks, so we decided to show you tricks we use in the command prompt that you might not know–read on to find out what they are.
CMD Tricks
CMD Tricks

Few Shortcut (CMD Tricks)

51. Logs You Out Of Windows – logoff
52. Malicious Software Removal Tool – mrt
53. Microsoft Chat – winchat
54. Microsoft Movie Maker – moviemk
55. Microsoft Paint – mspaint
56. Microsoft Syncronization Tool – mobsync
57. Minesweeper Game – winmine
58. Mouse Properties – control mouse
59. Mouse Properties – main.cpl
60. Netmeeting – conf
61. Network Connections – control netconnections
62. Network Connections – ncpa.cpl
63. Network Setup Wizard – netsetup.cpl
64. Notepad – notepad
65. Object Packager – packager
66. ODBC Data Source Administrator – odbccp32.cpl
67. On Screen Keyboard – osk
68. Outlook Express – msimn
69. Paint – pbrush
70. Password Properties – password.cpl
71. Performance Monitor – perfmon.msc
72. Performance Monitor – perfmon
73. Phone and Modem Options – telephon.cpl
74. Phone Dialer – dialer
75. Pinball Game – pinball

Send a Command’s Output to the Clipboard (CMD Tricks)

Note: This will work for any command.
How many times have you used the ipconfig command only to copy and paste the output? You will never have to do that again as you can simply send the output directly to the clipboard.
ipconfig | clip
CMD Tricks
CMD Tricks

Open Command Prompt From a Folder (CMD Tricks)

Have you ever opened the command prompt and entered endless cd commands trying to get to a folder ? If the answer is yes then you will pleased to know that you can actually save a lot of time by opening a command prompt within a folder from Explorer. All you have to do is hold shift while right-clicking on a folder and the option will appear in the context menu.
CMD Tricks
CMD Tricks

Command History (CMD Tricks)

CMD Tricks
You most likely have been pressing the up key to get to your previous commands, but this can be a pain when you are trying to track down a particular command. One other way you can view your past command is to use the doskey command.
doskey /history
CMD Tricks
CMD Tricks

Drag and Drop Files to Change the Current Path (CMD Tricks)

Another neat trick if you are not a fan of opening a command prompt from the context menu is the ability to drag and drop folders onto the prompt and have it automatically enter the path of the folder.
CMD Tricks
CMD Tricks
Hope you Enjoy this post about “CMD Tricks”. Now its turn to fire your Querry in Comment section.

Steps of Hacking

Steps of Hacking

Hacker performs his Task in 5 Phases.
Steps-of-hacking

Steps Of Hacking

  1. Reconnaissance
  2. Scanning
  3. Gaining Scanning
  4. Maintaining access
  5. Clearing Tracks

Phase 1 – Reconnaissance

Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. In this phase hacker simply gather all the information regarding Target.
This Reconnaissance phase can be perform in two way
  • Passive reconnaissance involves acquiring information without directly interacting with the target.
• For example, searching public records or news releases
  • Active reconnaissance involves interacting with the target directly by any means
• For example, telephone calls to the help desk or technical department

Phase 2 – Scanning

Scanning refers to the pre-attack phase when the hacker scans the network for specific information on the basis of information gathered during reconnaissance. Hackers have to get a single point of entry to launch an attack Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability and so on. In this phase we simply find the loop of hole of Target.

Phase 3 – Gaining Access

Gaining access refers to the penetration phase. The hacker exploits the loop hole (vulnerability) in the system. The attack can occur over a LAN, the Internet, or as a deception, or theft. Examples include buffer overflows, denial of service, session hijacking, and password cracking
Influencing factors include architecture and configuration of the target system, the skill level of the perpetrator, and the initial level of access obtained. In this phase we attack the Victim.

Phase 4 – Maintaining Access

Maintaining access refers to the phase when the hacker tries to retain his/her ownership of the system, The hacker has compromised the system
Hackers may harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, or Trojans. Hackers can upload, download, or manipulate data, applications, and configurations on the owned system.
In simple manner Hackers put the compromised system in that where again he will get access easily.

Phase 5 – Covering Tracks

Covering Tracks refer to the activities that the hacker does to hide his misdeeds. In simple language hacker remove his all foot print so he will not caught.
Reasons include the need for  continued use of resources, removing evidence of hacking, or avoiding legal action
Examples include Steganography, tunneling, and altering log files.
All the above phase , and tools involved in these Phase;s will be cleared in further posts.
Keep visiting !!

Steps of Hacking

Steps of Hacking

Hacker performs his Task in 5 Phases.
Steps-of-hacking

Steps Of Hacking

  1. Reconnaissance
  2. Scanning
  3. Gaining Scanning
  4. Maintaining access
  5. Clearing Tracks

Phase 1 – Reconnaissance

Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. In this phase hacker simply gather all the information regarding Target.
This Reconnaissance phase can be perform in two way
  • Passive reconnaissance involves acquiring information without directly interacting with the target.
• For example, searching public records or news releases
  • Active reconnaissance involves interacting with the target directly by any means
• For example, telephone calls to the help desk or technical department

Phase 2 – Scanning

Scanning refers to the pre-attack phase when the hacker scans the network for specific information on the basis of information gathered during reconnaissance. Hackers have to get a single point of entry to launch an attack Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability and so on. In this phase we simply find the loop of hole of Target.

Phase 3 – Gaining Access

Gaining access refers to the penetration phase. The hacker exploits the loop hole (vulnerability) in the system. The attack can occur over a LAN, the Internet, or as a deception, or theft. Examples include buffer overflows, denial of service, session hijacking, and password cracking
Influencing factors include architecture and configuration of the target system, the skill level of the perpetrator, and the initial level of access obtained. In this phase we attack the Victim.

Phase 4 – Maintaining Access

Maintaining access refers to the phase when the hacker tries to retain his/her ownership of the system, The hacker has compromised the system
Hackers may harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, or Trojans. Hackers can upload, download, or manipulate data, applications, and configurations on the owned system.
In simple manner Hackers put the compromised system in that where again he will get access easily.

Phase 5 – Covering Tracks

Covering Tracks refer to the activities that the hacker does to hide his misdeeds. In simple language hacker remove his all foot print so he will not caught.
Reasons include the need for  continued use of resources, removing evidence of hacking, or avoiding legal action
Examples include Steganography, tunneling, and altering log files.
All the above phase , and tools involved in these Phase;s will be cleared in further posts.
Keep visiting !!

Thursday 11 July 2013

Chat with Friends through Command Promp


Chat with Friends through Command Prompt

                                                     Hello friends Now U Can Chat With Command Prompt THrough So Here IS A Trick.....

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:



7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:
 


8) Now all you need to do is type your message and press Enter.
Start Chatting.......!

DONE....ENJOY.~!!

How Hackers Send Virus,RAT,.EXE Files to Victim on Facebook,Gmail,Yahoo etc

How Hackers Send Virus,RAT,.EXE Files to Victim on Facebook,Gmail,Yahoo etc.





WHAT IS A COMPUTER VIRUS ?

A potentially damaging computer program’s, capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.



1. Binder - Binder is a software which is used to bind or collaborate the server or virus you have created with some other file like a MP3,JPEG or any other file.You can fool the victim by sending him a song or picture and as soon as he opens the picture or song the Binder also gets open and starts working.Get a binder HERE .

2. Crypter - crypter is a tool which changes the binary code of the .exe (virus,RAT etc.)file and applies many encryptions on it which makes the .exe file undetectable.You can get Chrome Crypter HERE





3. Zipping - Another smart way to  send files is by putting your server in a Zipped folder and then sending it to the victim.Zipping the file changes the extension of the srver from .exe to .zip,which bypasses the file transfer facility of gmail,facebook,yahoo etc..

DOWNLOAD WINRAR  FOR ZIPPING  HERE

 

4. Extension - You can change the extension of the Server you want to send as it is not possible to send .exe files,so you can change the extension of .exe to .jpeg,.mp3 etc. when you save the file and then send it to the victim.But in this method you will have to tell the victim to change the extension back to .exe after he receives the server.This method can only be used in cases where the victim is very dumb and has no knowledge of this field.
A person who is not much interested in cyber security should have knowledge of above mentioned methods as they can be used against anyone.

Hack Your Friend's Computer:10 FREE KEYLOGGERS

Hack Your Friend's Computer:10 FREE KEYLOGGERS


10 FREE KEYLOGGERS TO MONITOR YOUR LOCAL PC OR LAPTOP! 

 

 

HERE IS AN EXCLUSIVE LIST OF TOP 10 FREE LOCAL KEYLOGGERS. HOWEVER IF YOU ARE PLANNING TO MONITOR ONLY YOUR PC OR ANY PC WHICH YOU HAVE CONTROL OF, THEN YOU CAN BLINDLY GO FOR “HARDWARE KEYLOGGERS” AS THEY ARE THE SAFEST KEYLOGGERS AND OPERATE IN A COMPLETE STEALTH. IF YOU STILL WANNA PREFER FREE KEYLOGGERS THEN BELOW IS THE LIST OF FREE KEYLOGGERS THAT WILL REALLY HELP YOU MONITOR YOUR PC.


READ WHAT IS A KEYLOGGER  FROM HERE


1) REFOG FREE EDITION

Refog Free Keylogger beats competition in two respects: it’s simple to use and it’s free. REFOG Free Keylogger can look after your children without them even noticing. Even technically minded children won’t detect the key logger when it runs in a stealth mode. The program removes all the shortcuts and can be accessed only through a hot key combination. Running unobtrusively from the moment the system boots, REFOG Free Keylogger keeps track of all typed or pasted text.

Download It From HERE

2) Black box express

Simple to use monitoring of one local computer; Monitor Screen recordings, Programs, Keystrokes typed, Websites, Web Searches, Emails/Webmails/ Instant Messenger Chat sent and received. Alerts and Warnings instantly or as a summary on your e-mail or cell phone. everything for 100% Free. No strings attached.

Download It From HE
RE

3) PERSONAL KEYLOGGER

The Personal Keylogger application was designed to be a small tool that will allow you to secretly record all keystrokes and other input. All specific instructions are explained in the application. To exit it and receive your logs, you will need to enter in your keycode. If you have forgotten your keycode, you will need to restart the computer. Keycode is like password. To stop Personal keylogger, you can enter your keycode anywhere on the screen. Once you type-in your keycode, the keylogger will stop monitoring and the log.txt file will be created in your selected destination folder.

Download It From HERE

4) PY KEYLOGGER

PyKeylogger is an easy-to-use and simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a short python script that you can easily examine. It is primarily designed for personal backup purposes, rather than stealth keylogging. Thus, it does not make explicit attempts to hide its presence from the operating system or the user. That said, the only way it is visible is that the process name shows up in the task list, so it is not immediately apparent that there is a keylogger on the system.
#Tip: Press and hold ‘left-CTRL + Right-CTRL + F12′ keys simultaneously to bring up the Control Panel (default password is blank).

DOWNLOAD  IT FROM HERE


5) HERETIC MACRO

Heretic is a powerful tool that is able to record user events, such as mouse clicks and keys, into a C/Java-like script, and play that script either once or repeatedly. It has many commands for dynamic pixel-based botting, window based botting, and static botting/macro-ing (i.e. key presses, mouse clicks, mouse moves, and pauses).

DOWNLOAD IT FROM HERE


6) Ultimate Keylogger

Ultimate Keylogger Free is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrokes, applications, passwords, clipboard, email, and visited websites’ URLs. You can view the reports as HTML files. Ultimate Keylogger Free will help you to find out, what exactly took place in the system.

DOWNLOAD IT FROM HERE


7) Actual keylogger

It runs hidden in the background and automatically records all keystrokes (including Alt, Ctrl and other functional buttons). The interface can be password protected and the log files are encrypted. You can view the reports as HTML or plain text. In the hidden mode it is invisible in all operating systems.

DOWNLOAD  IT FROM HERE


8) Revealer Keylogger Free Edition

Revealer Keylogger is surely the easiest and faster way to record keyboard inputs. There is almost nothing to configure, in fact everything is configured internally with the best settings. Free keylogger monitoring tool that logs every keystroke even passwords behind asterisks and conversations in common instant messengers. Its interface is password protected, the software does not appear in Add/Remove programs or in the taskbar.

DOWNLOAD  IT FROM HERE


9) Romaco Keylogger

Romaco Keylogger is a small and easy to use tool that can log all key-presses that are made while it is running, and display them to you in its window. It automatically exports the logged text to a text file every 5 minutes, or manually. It can be hidden at the click of a button, and recalled by vigorously pressing one of the least used keys on the keyboard, the break key.

DOWNLOAD IT FROM HERE


10) KidLogger

KidLogger collects user activity journal on the Computer and creates detailed Analysis of the user activity available online. Creates the list of most used web sites. Record the text was typed on the keyboard in any application


DOWNLOAD IT FROM HERE