Colectia de poze gabyyhackerteam.3xforum.ro
Total 1858 poze.

InapoiInainte

 
da si eu am inteles tot :p  glumesc :) :) :zzz: cum facem un generator de codurida si eu am inteles tot :P glumesc :) :) :zzz:
18.11.200913.3KB
:rotfl:  :rotfl:  :rotfl:  :rotfl: ma poate ajuta cineva cu conturi?:rotfl: :rotfl: :rotfl: :rotfl:
11.08.201340.6KB
mi-as dori sa fiu vip
 :wink2: conturi, trackere romanesti [vip member]mi-as dori sa fiu VIP :wink2:
09.12.200958KB
chiar daca am stii dc sa spargem parolele ?  :nod: care ma poate ajuta si pe mn parolele la 2 id dechiar daca am stii dc sa spargem parolele ? :nod:
05.11.20095.9KB

 
download

  agent glovesDownload
07.04.200919.7KB
opt numaram cu imaginiopt
08.05.20094.3KB
pasul programul windows xp a genera un cod de licenta original, cand programul se deschide selectatiPasul 1: Deschide programul Windows XP Keygen,pentru a genera un cod de licenta original, cand programul se deschide selectati ,,Windows Xp Pro.VLK,dupa aceeia selectati butonul ,,Generate,,. Un cod de licenta va aparea jos, lasa-ti programul deschis. Pasul 2: Deschide programul ,,keyfinder,, care iti va arata ce cod de licenta ai in calculator.Click opriunea ,,Options ---> Change Windows Key,,.In casutele care au aparut introduceti codul de licenta generat anterior.Dupa ce ati introdus codul cu atentie apasati butonul ,,Change,,. O intrebare iti va apare ..ignor-o. Pasul 3: Acum deschideti programul ,,WGA-Fix,, va aparea o intrebare , nu iti fa griji de limba in care se afla programul pur si simplu dai click ,,YES,, Pasul 4: Deschide-ti programul MAGDiag ,apasati butonul ,,Continue,, iar apoi apasati butonul RESOLVE Download -----> :finger: :finger: :finger: :finger:
19.04.20094.7KB
am o idee omoarate ar fi bine  :rotfl:  :rotfl:  :rotfl:am o idee omoarate ar fi bine :rotfl: :rotfl: :rotfl:
06.11.20095.9KB

 
omg e imaginea mea preferata si emblema mea :zzz:  :zzz: forumu sa aiba cele mai tari fotografiomg symyforever asta e imaginea mea preferata si emblema mea :zzz: :zzz:
13.07.200917.5KB
io nu prea cred ca ai sa gasesti u un progran din asta :zzz: cum sa faci un fisier care iti stergeio nu prea cred ca ai sa gasesti u un progran din asta :zzz:
17.12.20083.5KB
ms :rotfl:  :rotfl:  :rotfl:  :rotfl:  :rotfl: username si parola de la diferite siteuriMs :rotfl: :rotfl: :rotfl: :rotfl: :rotfl:
26.12.201060.9KB
un program care se foloseste de userii huburilor pentru a lansa atacuri ddos foarte  supernova 3Un program profesional care se foloseste de userii huburilor pentru a lansa atacuri ddos foarte puternice.
06.12.20083.5KB

 
imi spuneti shi mie cum sai strik pc la unul care ma ameninta pe mess =(  =(  =(  =(  =(  =(  =(  =(imi spuneti shi mie cum sai strik PC la unul care ma ameninta pe mess =( =( =( =( =( =( =( =( =(
01.08.200921.6KB
deci am facut un scam doart trebe sa le uploadati dat ytebe sa va faceti cont voi doar trebe sadeci am facut un scam doart trebe sa le uploadati dat ytebe sa va faceti cont voi doar trebe sa intra in fisierul login.php sa bagati mailu vostru fac scamuri aproape orice site orice cereri scam si eu va pun linkurile download scam -
28.10.200950KB
audio party - greek aio says: ( 8 )
irc: (6)
mail bomb: files: (5)
ping & nukes: (15)
port Audio theme: Halman party - Greek Lover This AIO have: Flooders: (21) Gr33k-L0v3r says: ( 8 ) IRC: (10) Keyloggers: (6) Mail Bomb: (17) Mailbombers: (16) Needed Files: (5) Ping & Nukes: (15) Port Scanners: (7) Remote Administration Tool: (22) Servers: (7) Clients: (7) Technical Help: (90) AOpen: (21) Viruses: (318 ) Z@4r1x: (11) More inside. All credits to Gr33k-L0v3r Hackers Tool Kit -103in1- (AIO) List of this AIO: AsciiFactory.exe barcode.zip Basics Of Hacking 2.zip Basics Of Hacking.zip Beginner's Guide To Hacking.doc blank boping.exe boping.zip CCMAKER.EXE COMDLG32.OCX CONFIG.DAT Console.doc coolbeans-nfocreator.exe CrackersKit.1.1-DappA.exe CreditCardGjeneratorV2byTheCracker.exe ddosping.cfg ddosping.exe ddosping.zip diz.dat dizzy.exe dos_utility.exe Ext Changer.exe firewallkiller_original.exe Flooder.exe gesetup.exe Googini.dat Googler.exe Hacker's book.rar Hacker's Desk Reference.zip Hacker's Diary.zip hacker.doc Hackering Start Up's.zip Hackers Best Friend.zip................ More inside. All credits to Hacking Truths. Hackers ToolKit Suite -60in1- (AIO) 67.8MB Compress 79.5MB UnCompress No pass This AIO Have: Hacking pack: AATools v5.50 brutus-aet2 Compiled SNID Server dav donut_http_flooder_1.4 Flooder Net Controller 1.08 Net Metropolitan 1.04 Net Raider Netbus 2 PRO Picture Trojans Netbus1.70 Picture Trojans 2 NetSphere passgen Sprut tosser Nfo Tools: AsciiFactory.exe coolbeans-nfocreator.exe dizzy.exe Feuer's NFO File Maker v2.0 Ims NFO&DIZ Maker 1.87 Inserter v1.12 NFO Maker 1.0 NFOCreator.EXE Patch Kit: CodeFusion wizard v3.0 Fast patch v1.0 Patch creation wizard v1.2 Patch on fly v0.75 Predator's extreme loader generator v0.3 Rlzer v2.20b Rtd win patch engine v1.0 sRlzer v1.01b patch generator Tola's patching engine v1.8 Yoda's process patcher beta Windows keygens: keyfinder.exe RockXP3.exe WinALL Keygen.exe WINDOWS_XP__CD_KEY_GENERATOr.EXE XPProCorp-keyChanger.exe Access Driver Athena cg Cain & Abel CIA Commander Crack crackers kit.2.0 creator 16 Golden eye google hacker HostScan v1.6.5.531 Hotmail Account Freezer md5-w Microsoft macro virus generator Net Tools Soft Ice v4.05 sub 7 legends All credits to MehiriyeT This Collection of AIO Packs (Tools and etc) was Made for Educational Purposes Only. The UpLoader will Not Take any responsibility for what u do with this Tools. This AIOs is with viruses cos these are hacking tools and AV detect as viruses! I think it's better to use deep freeze and than u can freeze ur pc when u use this tools and than u can unfreeze it when u don't use ! torrent Hacking e-Book -34in1- (AIO) This AIO have: BlueTooth Hacking Ethical Hacking Google Hacks Hack & Crack Hack Attacks Revealed Hack Attacks Testing - How To Conduct Your Own Security Audit Hack IT Security Through Penetration Testing Hack Proofing Your Network - Internet Tradecraft Hack Proofing Your Network Second Edition Hack Proofing Your Web Server Hack The Net Hack Xbox 360 Hackers Black Book Hacking Firewalls And Networks How To Hack Into Remote Computers Hacking a Coke Machine Hacking and Network Defense Hacking for Dummies Hacking Intranet Websites Hacking Techniques Hacking The Cable Modem Hacking The Linux Hacking Web Applications Hacking Windows XP Hacking PSP Kevin Mitnick - The Art of Deception Kevin Mitnick - The Art of Intrusion Network Security Hacks - Tips & Tools For Protecting Your Privacy PayPal Hacks PC Hacks Simple Hacks - Addons, Macros And More The Database Hacker Handbook Defending Database Servers Wireless Hacking Wireless Network Hacks & Mods for Dummies All credits to CrOwN. Code: NE TESTAT
17.12.20083.5KB
download:  gta iv mobile gameDOWNLOAD:
14.07.200943.1KB

 
1) parola de mail
2) parola de conectare la un parola pentru un server de de a intelege cum se1) PAROLA DE MAIL 2) PAROLA DE CONECTARE LA UN CALCULATOR 3) PAROLA PENTRU UN SERVER DE NET 1)PAROLA DE MAIL Pentru a intelege cum se sparge o parola de mail trebuie sa stiti cateva chestii elementare: Un server de mail ruleaza de obicei 2 protocoale: SMTP (Simple Mail Transfer Protocol) si POP3 (post office protocol, version 3). Un site face de obicei toate aceste lucruri folosind un limbaj de scripting dinamic (PHP. ASP etc) si baze de date (SQL de obicei) Intr-o adresa de mail de genul E-mail, utilizator=domeniul creat pe serveru respectiv, server=serverul ce detine baza de date despre��â�ť��� domeniul respectiv Pentru a ajunge la parola respectiva exista mai multe metode: a) Brute Force Hack- prin definitie, metoda aceasta ia la intamplare un nume de utilizator, iar daca acesta este valid, incearca toate posibilitatile existente pentru o parola. Se poate particulariza metoda aceasta, utilizand doar anumite caractere, cu o anumita lungime, sau o lista cu cele mai uzuale cuvinte folosite ca parola (internetul e plin de liste de genul asta). Metoda poate dura de la cateva minute, la cateva luni sau chiar mai mult (mie mi-a scris odata ca mai dureaza inca 2 secole pana ce termina de incercat toate posibilitatile) b)Metoda manuala - solicitati niste informatii direct de la utilizatorul respectiv, si daca este destul de naiv, vi le va da. Daca server-ul pe care persoana respectiva are mail, va afiseaza direct pe pagina parola sau daca o modifica, puteti incerca cu optiunea "Am uitat parola". Merge si asta c)SCAM - Ce inseamna scam? Ar trebui sa deschidem un subiect special pentru aceasta categorie de "hacking". Ca sa afli o parola prin scam, nu trebuie decat sa iei pagina de login de la serviciul respectiv... o modifici astfel incat sa trimita datele completate in emailul tau si sa dea o eroare de trimitere utilizatorului si ... merge... faza e ca tipul nu trebuie sa se prinda, asa ca trebuie sa pui si tu un nume credibil la pagina sa fie cu cat mai multe caractere amestecata pt ca utilizatorul sa nu-si dea seama��â�ť��� ... d)Troieni si keyloggere - metoda aceasta a fost discutata in amanunt pe forum dar eu o reiau. Un troian are doua componente: clientul si serverul. Serverul trebuie trimis victimei. O data rulat, acesta da frau liber clientului sa se conecteze pe calculatorul respectiv. Prorat are o optiune pentru aflarea tuturor parolelor de pe PC-ul unde serverul este instalat. De exemplu: vrei sa-i afli parola lui Fane, iar el este un fraier si iti accepta serverul de troian facut de tine. In caz ca nu are antivirus, troianul acceptat si rulat, va deschide o poarta de intrare pe calculator. Din serverul de troian tu scrii (la ip-ul de conectare), IP-ul lui. IP-ul lui poate fi gasit in urmatorul mod: Start>Run>cmd. Scrii netstat-nao si incerci toate IP-urile listate acolo (in caz ca stii pe ce port vorbiti, incerci doar IP-urile cu portul respectiv). La conectare, scrii parola si... ai acces la calculatorul lui. e) Sniffer - Mai pe scurt - un sniffer este un mic program ce capteaza toate informatiile transmise prin retea ...si dupa cum bine spunea laurxxx, incercati sniffer-ul Cain (sau Ethereal - sugestia mea) f) Cross Site Scripting Ce probleme pot aparea? De multe ori este pur si simplu inofensiv insa pot aparea si probleme serioase gen atac la conturi inregistrate, redirectari nedorite sau popups, sau altele. De obicei nu sint probleme cind informatiile nu sint decit afisate si nu exista inregistrare de conturi sau cookies. In aceste cazuri nu prea este mare lucru rau de facut. Insa in alte cazuri problemele pot fi imprevizibile. In plus, este si o problema de prestigiu pentru un site cunoscut sa se spuna despre el ca are probleme de acest gen. Orice problema cit de mica ar trebui corectata imediat. Problema apare din nefiltrarea parametrilor transmisi paginilor cind vine vorba de afisari in pagina. In egala masura pot fi afectate pagini ASP sau PHP sau Perl sau orice altceva. Majoritatea exemplelor gasite se refera la afisarea document.cookie, asa ca o sa dau si eu acest exemplu concret. De exemplu pt. PHP este undeva (pagina.xxx): Sau pt. ASP: <% Response.Write "Parametrul dvs. este:" & Request.QueryString("param" %> Pentru acest caz in mod normal exista link-uri care apeleaza pagina cu diversi parametri. Insa acesti parametri pot fi creati astfel incit sa execute cod JavaScript ca venind din partea site-ului: pagina.xxx?param=1%3Cscript%3Ealert(document.cookie)%3C%2Fscript%3E Asta pur si simplu o sa transforme pagina in: Parametrul dvs. este: 1 Insa se pot face mult mai mult decit afisa cookie. De exemplu chema JS de pe alte servere care practic pot modifica pagina in foarte multe feluri. Acestea intervin mai ales cind codul injectat este salvat in baza de date (semnaturi, postari, comentarii, etc.), care o sa fie afisat de fiecare data cind pagina e afisata. Sau se pot modifica sau transmite cookie cu informatii despre sesiune sau informatii statistice, lucruri nedorite pe toate site-urile. Citeva exemple de situatii reale: - phpBB Cross Site Scripting and Unspecified Vulnerabilities - COD - Hotmail Cross Site Scripting Vulnerability - COD ... 04-07-15/2 - phpBB Multiple Vulnerabilities - COD In ultimul exemplu se poate vedea ca XSS se poate combina cu alte probleme (SQL injection / remote executing), ceea ce le face mult mai puternice si ami grave. Aceste probleme amintite au fost corectate insa ele au fost reale si oricind pot aparea altele. Rezolvarea problemei consta in curatarea tuturor parametrilor folosite in pagini, fie ca acestia vin din URL (QueryString / $_GET), valori POSTate sau chiar cookies. De obicei este bine de elimitat caractere neaparat necesare in astfel de cazuri, far ade care XSS este mult mai greu sau imposibil de realizat: <, >, ', ", etc. Mai multe informatii gasiti la - Real World XSS - COD ... XSS_1.html - MSDN: Cross-site Scripting Overview - COD - MSDN: When Output Turns Bad: Cross-Site Scripting Explained - ... 152002.asp _______________________________________________________________________________ 2) PAROLA DE CONECTARE LA UN CALCULATOR Odata ce aveti parola de conectare la un calculator ce nu va apartine, puteti spune ca ati facut rost de un root... si nu e greu deloc. Exista la fel ca la mail-uri, mai multe metode de aflare a unei parole. Acest lucru depinde de porturile deschise pe calculator. Un port este o cale de comunicare cu exteriorul la calculatorul respectiv. Daca PC-ul respectiv are portul 139 deschis (cum e calculatorul meu --- sa va vad ca incercati sa ma hackuiti. Deci, incercati sa va conectati pe un port, si incercati prima si prima data admin:admin, sau admin:user sau toate chestiile de genul asta(eventual cu un brute force hack). Daca nu merge, incercati sa downloadati niste exploit-uri de pe net. Un exploit este un program ce exploateaza vulnerabilitatea unui protocol, serviciu, program etc. De obicei le gasiti fisierele sursa pe care puteti sa le modificati dupa preferinta ________________________________________________________________________________ 3) PAROLA PENTRU UN SERVER DE NET E acelasi lucru ca spargerea parolei la un calculator, doar ca trebuie sa aflati IP-ul serverului respectiv. Doar ca trebuie sa ii aflati IP-ul, ceea ce nu e prea greu. Acest lucru se poate face cu ajutorul comenzii: tracert. De exemplu, sa zicem ca serverul dumneavoastra ar fi yahoo.com tongue.gif ... Intrati in start>run>scrieti cmd si dupa aia scrieti (in fereastra de command prompt) tracert yahoo.com, la care cmd-ul va va spune: "Tracing route to yahoo.com " Pentru a afla un user de pe serever-ul respectiv, folositit comanda nbtstat (va ajuta sa gasiti si MAC-ul PC-ului respectiv)
19.12.20083.5KB
genero: 4.31 gb
ficha original texas chainsaw massacre: the beginning 


aÑo 2006 
duraciÓn 90 min.Genero: Terror Formato: DVDR Fecha: 10-01-2009 Uploader:MoviesDVDR Idioma: Español,English Subtitulos: Español Tamaño: 4.31 GB Ficha Tecnica: TITULO ORIGINAL Texas Chainsaw Massacre: The Beginning AÑO 2006 DURACIÓN 90 min. PAÍS USA DIRECTOR Jonathan Liebesman GUIÓN Sheldon Turner (Historia: David J. Schow, Sheldon Turner) MÚSICA Steve Jablonsky FOTOGRAFÍA Lukas Ettlin REPARTO Jordana Brewster, Andrew Bryniarski, R. Lee Ermey, Taylor Handley, Matthew Bomer, Diora Baird, Heather Kafka, Marietta Marich, Terrence Evans Sinopsis: Ambientada años antes de la original. Estamos en 1969. Ha estallado el conflicto en Vietnam. El efecto en Estados Unidos es catastrófico. Las pérdidas son innumerables y no dejan de repetir la llamada a filas para alimentar la máquina de la guerra. Y ahora le toca a Dean Hill, que acaba de cumplir 18 años. Pero antes de que Dean pueda acudir al centro de reclutamiento local, su hermano Eric, que acaba de regresar de Vietnam, decide darle una sorpresa. A pesar de la preocupación de su novia - Chrissie - Eric planea volver a alistarse en la Marina con el fin de vigilar a su hermano. Desgraciadamente, los planes de Dean no coinciden con los de Eric. Su estrategia para evitar la guerra es huir a México y para ello tiene todo el apoyo de su novia Bailey, una chica de fuerte carácter. Pero antes de poner en marcha ningún plan, las dos parejas deciden ir a Texas para pasar un último fin de semana de diversión... Download:
12.01.200923.9KB
free call of duty 5 full : if solo c.o.d 5 you must disconnect from internet lan cable and/or routerFree Call of Duty 5 Full Version ---------------------------------------- Note : If Solo C.O.D 5 YOU Must Disconnect From Internet (Disconnect Lan Cable and/or Router and/or Modem etc) ---------------------------------------- Step 1:Download from: Part 1: Part 2: Part 3: Part 4: Part 5: Part 6: Part 7: Part 8: Part 9: Part 10: Part 11: Part 12: Part 13: Part 14: Part 15: Part 16: Part 17: Step 2: Extract the C.o.d folder ---------------------------------------- Step 3: Go in the folder and install the game ---------------------------------------- Enjoy ! :) MERSI PENTRU ATENTIE SI URMAZIMI POSTURILE CU MULTE ALTE JOCURI!! Part :hi:
13.04.20125.3KB
now you can download from rapidshare with this program for no program give you capacity to Now you can download from rapidshare with this program FOR NO LIMIT This program give you capacity to download Multiple files at once without having Premium account Download: Code:
07.12.20083.5KB

 
ms :d l-am cautat ca o musca fara cap :))  :hi:  :nod: prorat se 1.9Ms :D l-am cautat ca o musca fara cap :)) :hi: :nod:
29.09.200920.9KB
gigele  :rotfl:  :rotfl:  :rotfl: fara premiugigele :rotfl: :rotfl: :rotfl:
29.05.200924.8KB
link download   
daca aveti probleme cu programu contact id hackermuri cel mai bun explit messngerlink download daca aveti probleme cu programu contact id hackermuri
20.10.200936.8KB
an that allows you to remotely control utorrent using your mobile device. you can download the appAn application that allows you to remotely control uTorrent using your mobile device. You can download the app directly by goin to wyktor :-D , or if this doesn't work you can download the application using the download link below and copy the utorrent.jad and utorrent.jar files to your phone before installing. Note this application has only been tested on a motorola V3x so your milage on other devices may vary. Instructions: In order to be able to use this application, you first need to ensure that your WebUI has a publicly accessible URL, this usually involves setting up your router port forwarding rules so the webUI server is accessible. Once this is done, start the application and enter the url of your webui (dont include the /gui at the end of the url, this is appended automatically) and your username/password, from there you should be able to view and edit all your active torrents. download
04.07.200910.9KB

 
merge:d soft pt decodat telefoanemerge:D
02.06.20094KB
va mai deosebiti cand jucati cu acelasi model de jucator nu? ei bine sau dus acele momente ! cuDescriere: Greu va mai deosebiti cand jucati cu acelasi model de jucator nu? Ei bine sau dus acele momente ! Cu acest plugin puteti sa va deosebiti prin purtarea unei palarii .Orice jucator poate sasi pune o palarie pe placul lui. Unele is haioase altele is si mai haioase Wink Descarcare: AiCi Instalare: 1. Fisierul Hats02.sma il puneti in addons/amxmodx/scripting 2. Fisierul Hats02.amxx il puneti in addons/amxmodx/plugins 3. Intrati in fisierul addons/amxmodx/configs/plugins.ini si adaugati la urma: Cod: hats02.amxx 4. Fisierul hatlist.ini il puneti in addons/amxmodx/configs 5. Fisierul hat il puneti in cstrike/models Comenzi pentru toti: scrieti in chat /hats si alegeti o palarie care vreti voi Comenzi pentru admini: amx_givehat Nume (da palarie la oricine) amx_removehats (fara aceasta comanda nu puteti scapa de plugin)
06.04.200919.7KB
:hi:  :razz: thx  :razz:  :hi: windows media player 12:hi: :razz: ThX :razz: :hi:
07.02.200941.4KB
how to hack someone with his ip and good for guys. first of all, i want to say that i didn't makeHow to hack someone with his IP address(easy and good for newbies) Hi guys. First of all, I want to say that I didn't make this tutorial myself, I found it on Hacking Library Introduction 1. Welcome to the basic NETBIOS document created by aCId_rAIn. This document will teach you some simple things about NETBIOS, what it does, how to use it, how to hack with it, and some other simple DOS commands that will be useful to you in the future. THIS DOCUMENT IS FOR NEWBIEZ ONLY!!! If you are NOT a newbie then don't go any farther reading this because if you're smart enough you probably already know it all. So don't waste yourt time reading something that you already know. 1. Hardware and Firmware 1a. The BIOS The BIOS, short for Basic Input/Output Services, is the control program of the PC. It is responsible for starting up your computer, transferring control of the system to your operating system, and for handling other low-level functions, such as disk access. NOTE that the BIOS is not a software program, insofar as it is not purged from memory when you turn off the computer. It's firmware, which is basically software on a chip. A convenient little feature that most BIOS manufacturers include is a startup password. This prevents access to the system until you enter the correct password. If you can get access to the system after the password has been entered, then there are numerous software-based BIOS password extractors available from your local H/P/A/V site. NETBIOS/NBTSTAT - What does it do? 2. NETBIOS, also known as NBTSTAT is a program run on the Windows system and is used for identifying a remote network or computer for file sharing enabled. We can expoit systems using this method. It may be old but on home pc's sometimes it still works great. You can use it on your friend at home or something. I don't care what you do, but remember, that you are reading this document because you want to learn. So I am going to teach you. Ok. So, you ask, "How do i get to NBTSTAT?" Well, there are two ways, but one's faster. Method 1:Start>Programs>MSDOS PROMPT>Type NBTSTAT Method 2:Start>Run>Type Command>Type NBTSTAT (Note: Please, help your poor soul if that isn't like feeding you with a baby spoon.) Ok! Now since you're in the DOS command under NBTSTAT, you're probably wondering what all that crap is that's on your screen. These are the commands you may use. I'm only going to give you what you need to know since you are striving to be l33t. Your screen should look like the following: NBTSTAT [ -a (adapter status) Lists the remote machine's name table given its name -A (Adapter status) Lists the remote machine's name table given its IP address. -c (cache) Lists NBT's cache of remote names and their IP addresses -n (names) Lists local NetBIOS names. -r (resolved) Lists names resolved by broadcast and via WINS -R (Reload) Purges and reloads the remote cache name table -S (Sessions) Lists sessions table with the destination IP addresses -s (sessions) Lists sessions table converting destination IP addresses to computer NETBIOS names. -RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts Refresh RemoteName Remote host machine name. IP address Dotted decimal representation of the IP address. interval Redisplays selected statistics, pausing interval seconds between each display. Press Ctrl+C to stop redisplaying statistics. C:\WINDOWS\DESKTOP> The only two commands that are going to be used and here they are: -a (adapter status) Lists the remote machine's name table given its name -A (Adapter status) Lists the remote machine's name table given its IP address. Host Names 3. Now, the -a means that you will type in the HOST NAME of the person's computer that you are trying to access. Just in case you don't have any idea what a Host Name looks like here's an example. 123-fgh-ppp.internet.com there are many variations of these adresses. For each different address you see there is a new ISP assigned to that computer. look at the difference. abc-123.internet.com ghj-789.newnet.com these are differnet host names as you can see, and, by identifying the last couple words you will be able to tell that these are two computers on two different ISPs. Now, here are two host names on the same ISP but a different located server. 123-fgh-ppp.internet.com 567-cde-ppp.internet.com IP Addresses 4. You can resolce these host names if you want to the IP address (Internet Protocol) IP addresses range in different numbers. An IP looks like this: 201.123.101.123 Most times you can tell if a computer is running on a cable connection because of the IP address's numbers. On faster connections, usually the first two numbers are low. here's a cable connection IP. 24.18.18.10 on dialup connections IP's are higher, like this: 208.148.255.255 notice the 208 is higher than the 24 which is the cable connection. REMEMBER THOUGH, NOT ALL IP ADDRESSES WILL BE LIKE THIS. Some companies make IP addresses like this to fool the hacker into believing it's a dialup, as a hacker would expect something big, like a T3 or an OC-18. Anyway This gives you an idea on IP addresses which you will be using on the nbtstat command. Getting The IP Through DC (Direct Connection) 5. First. You're going to need to find his IP or host name. Either will work. If you are on mIRC You can get it by typing /whois (nick) ...where (nick) is the persons nickname without parenthesis. you will either get a host name or an IP. copy it down. If you do not get it or you are not using mIRC then you must direct connect to their computer or you may use a sniffer to figure out his IP or host name. It's actually better to do it without the sniffer because most sniffers do not work now-a-days. So you want to establish a direct connection to their computer. OK, what is a direct connection? When you are: Sending a file to their computer you are directly connected. AOL INSTANT MESSENGER allows a Direct Connection to the user if accepted. ICQ when sending a file or a chat request acception allows a direct connection. Any time you are sending a file. You are directly connected. (Assuming you know the user is not using a proxy server.) Voice Chatting on Yahoo establishes a direct connection. If you have none of these programs, either i suggest you get one, get a sniffer, or read this next statement. If you have any way of sending thema link to your site that enables site traffic statistics, and you can log in, send a link to your site, then check the stats and get the IP of the last visitor. It's a simple and easy method i use. It even fool some smarter hackers, because it catches them off guard. Anyway, once you are directly connected use either of the two methods i showed you earlier and get into DOS. Type NETSTAT -n. NETSTAT is a program that's name is short for NET STATISTICS. It will show you all computers connected to yours. (This is also helpful if you think you are being hacked by a trojan horse and is on a port that you know such as Sub Seven: 27374.) Your screen should look like this showing the connections to your computer: ------------------------------------------------------------------------------------------------ C:\WINDOWS\DESKTOP>netstat -n Active Connections Proto Local Address Foreign Address State TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT TCP 172.255.255.82:1413 205.188.8.7:26778 ESTABLISHED TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED C:\WINDOWS\DESKTOP> ------------------------------------------------------------------------------------------------ The first line indicated the Protocol (language) that is being used by the two computers. TCP (Transfer Control Protocol) is being used in this and is most widely used. Local address shows your IP address, or the IP address of the system you on. Foreign address shows the address of the computer connected to yours. State tells you what kind of connection is being made ESTABLISHED - means it will stay connected to you as long as you are on the program or as long as the computer is allowing or is needing the other computers connection to it. CLOSE_WAIT means the connection closes at times and waits until it is needed or you resume connection to be made again. One that isn't on the list is TIME_WAIT which means it is timed. Most Ads that run on AOL are using TIME_WAIT states. the way you know the person is directly connected to your computer is because of this: ------------------------------------------------------------------------------------------------ C:\WINDOWS\DESKTOP>netstat -n Active Connections Proto Local Address Foreign Address State TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT TCP 172.255.255.82:1413 abc-123-ppp.webnet.com ESTABLISHED TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED C:\WINDOWS\DESKTOP> ------------------------------------------------------------------------------------------------ Notice the host name is included in the fourth line instead of the IP address on all. This is almost ALWAYS, the other computer that is connected to you. So here, now, you have the host name: abc-123-ppp.webnet.com If the host name is not listed and the IP is then it NO PROBLEM because either one works exactly the same. I am using abc-123-ppp.webnet.com host name as an example. Ok so now you have the IP and/or host name of the remote system you want to connect to. Time to hack! Open up your DOS command. Open up NBTSTAT by typing NBTSTAT. Ok, there's the crap again. Well, now time to try out what you have leanred from this document by testing it on the IP and/or host name of the remote system. Here's the only thing you'll need to know. IMPORTANT, READ NOW!!! -a (adapter status) Lists the remote machine's name table given its name -A (Adapter status) Lists the remote machine's name table given its IP address. Remember this? Time to use it. -a will be the host name -A will be the IP How do i know this? Read the Statements following the -a -A commands. It tells you there what each command takes. So have you found which one you have to use? GOOD! Time to start. Using it to your advantage 6. Type this if you have the host name only. NBTSTAT -a (In here put in hostname without parenthesis) Type this is you have the IP address only. NBTSTAT -A (In here put in IP address without parenthesis) Now, hit enter and wait. Now Either one of two things came up 1. Host not found 2. Something that looks like this: -------------------------------------------- NetBIOS Local Name Table Name Type Status --------------------------------------------- GMVPS01 <00> UNIQUE Registered WORKGROUP <00> GROUP Registered GMVPS01 <03> UNIQUE Registered GMVPS01 <20> UNIQUE Registered WORKGROUP <1E> GROUP Registered --------------------------------------------- If the computer responded "Host not found" Then either one of two things are the case: 1. You screwed up the host name. 2. The host is not hackable. If number one is the case you're in great luck. If two, This system isn't hackable using the NBTSTAT command. So try another system. If you got the table as above to come up, look at it carefully as i describe to you each part and its purpose. Name - states the share name of that certain part of the computer <00>, <03>, <20>, <1E> - Are the Hexidecimal codes giving you the services available on that share name. Type - Is self-explanatory. It's either turned on, or activated by you, or always on. Status - Simply states that the share name is working and is activated. Look above and look for the following line: GMVPS01 <20> UNIQUE Registered See it? GOOD! Now this is important so listen up. The Hexidecimanl code of <20> means that file sharing is enabled on the share name that is on that line with the hex number. So that means GMVPS01 has file sharing enabled. So now you want to hack this. Here's How to do it. (This is the hard part) LMHOST File 7. There is a file in all Windows systems called LMHOST.sam. We need to simply add the IP into the LMHOST file because LMHOST basically acts as a network, automatically logging you on to it. So go to Start, Find, FIles or Folders. Type in LMHOST and hit enter. when it comes up open it using a text program such as wordpad, but make sure you do not leave the checkmark to "always open files with this extension" on that. Simply go through the LMHOST file until you see the part: # This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts # files and offers the following extensions: # # #PRE # #DOM: # #INCLUDE # #BEGIN_ALTERNATE # #END_ALTERNATE # \0xnn (non-printing character support) # # Following any entry in the file with the characters "#PRE" will cause # the entry to be preloaded into the name cache. By default, entries are # not preloaded, but are parsed only after dynamic name resolution fails. # # Following an entry with the "#DOM:" tag will associate the # entry with the domain specified by . This affects how the # browser and logon services behave in TCP/IP environments. To preload # the host name associated with #DOM entry, it is necessary to also add a # #PRE to the line. The is always preloaded although it will not # be shown when the name cache is viewed. # # Specifying "#INCLUDE " will force the RFC NetBIOS (NBT) # software to seek the specified and parse it as if it were # local. is generally a UNC-based name, allowing a # centralized lmhosts file to be maintained on a server. # It is ALWAYS necessary to provide a mapping for the IP address of the # server prior to the #INCLUDE. This mapping must use the #PRE directive. # In addtion the share "public" in the example below must be in the # LanManServer list of "NullSessionShares" in order for client machines to # be able to read the lmhosts file successfully. This key is under # \machine\system\currentcontrolset\services\lanmans erver\parameters\nullsessionshares # in the registry. Simply add "public" to the list found there. # # The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE # statements to be grouped together. Any single successful include # will cause the group to succeed. # # Finally, non-printing characters can be embedded in mappings by # first surrounding the NetBIOS name in quotations, then using the # \0xnn notation to specify a hex value for a non-printing character. Read this over and over until you understand the way you want your connection to be set. Here's an example of how to add an IP the way I would do it: #PRE #DOM:255.102.255.102 #INCLUDE Pre will preload the connection as soon as you log on to the net. DOM is the domain or IP address of the host you are connecting to. INCLUDE will automaticall set you to that file path. In this case as soon as I log on to the net I will get access to 255.102.255.102 on the C:/ drive. The only problem with this is that by doin the NETSTAT command while you are connected, and get the IP of your machine. That's why it only works on simple PC machines. Because people in these days are computer illiterate and have no idea of what these commands can do. They have no idea what NETSTAT is, so you can use that to your advantage. Most PC systems are kind of hard to hack using this method now because they are more secure and can tell when another system is trying to gain access. Also, besure that you (somehow) know whether they are running a firewall or not because it will block the connection to their computer. Most home systems aren't running a firewall, and to make it better, they don't know how operate the firewall, therefore, leaving the hole in the system. To help you out some, it would be a great idea to pick up on some programming languages to show you how the computer reads information and learn some things on TCP/IP (Transfer Control Protocol/Internet Protocol) If you want to find out whether they are running a firewall, simply hop on a Proxy and do a port scan on their IP. You will notice if they are running a firewall because most ports are closed. Either way, you still have a better chance of hacking a home system than hacking Microsoft. Gaining Access 7. Once you have added this to you LMHOST file. You are basically done. All you need to do is go to: Start Find Computer Once you get there you simply type the IP address or the host name of the system. When it comes up, simply double click it, and boom! There's a GUI for you so you don't have to use DOS anymore. You can use DOS to do it, but it's more simple and fun this way, so that's the only way i put it. When you open the system you can edit, delete, rename, do anything to any file you wish. I would also delete the command file in C:/ because they may use it if they think someone is in their computer. Or simply delete the shortcut to it. Then here's when the programming comes in handy. Instead of using the NBTSTAT method all the time, you can then program you own trojan on your OWN port number and upload it to the system. Then you will have easier access and you will also have a better GUI, with more features. DO NOT allow more than one connection to the system unless they are on a faster connection. If you are downloading something from their computer and they don't know it and their connection is being slow, they may check their NETSTAT to see what is connected, which will show your IP and make them suspicious. Thats it. All there is to it. Now go out and scan a network or something and find a computer with port 21 or something open.
16.01.20095.4KB

 
ms  :rotfl:  :rotfl:  :rotfl:  :rotfl:  :hi:  :hi:  :hi:  :hi:  :hi:  :hi:  :hi: gabyy pls help!!!Ms :rotfl: :rotfl: :rotfl: :rotfl: :hi: :hi: :hi: :hi: :hi: :hi: :hi:
27.07.20092.1KB
pentru a putea juca pe serverele care au trecut deja la protocolul 48 vei avea nevoie de un clientPentru a putea juca pe serverele care au trecut deja la protocolul 48 vei avea nevoie de un client CS 1.6 adecvat, cu care sa te poti conecta. Ai aici un client simplu, eficient, care poate fi personalizat foarte usor. Poti sa-i adaugi harti, sunete, skin-uri, modele. Jocul este optimizat atat pentru protocolul 48 cat si pe protocolul vechi 47. Installer-ul iti va creea pe desktop doua shortcut-uri in plus, cate unul pentru fiecare protocol. Vei deschide jocul din unul dintre ele, in functie de protocolul pe care vrei sa joci. Se descarca repede, se instaleaza usor si nu ia multe resurse Un client Counter Strike 1.6 Non Steam care este configurat pe ambele protocoale (atat pe 47 cat si pe 4Cool. Nu ocupa mult spatiu pe disc (aproximativ 500 MB dupa instalare) nu ia multe resurse si se poate juca cu el pe orice server Non Steam. Installerul iti va face trei shortcut-uri pe Desktop (shortcut-ul principal al jocului, si inca doua pentru fiecare protocol in parte). Prima data cand accesezi jocul, intra din shortcut-ul principal (cel gri), dupa care poti intra din celelalte doua pentru fiecare protocol.
07.04.200919.7KB
poi incercati si voi si vedeti ce face  :wink2:poi incercati si voi si vedeti ce face :wink2:
08.12.20083.5KB
dar ce face? 2008dar ce face?
13.04.200931.5KB

 
cand aveti un site aveti destule motive sa blocati accesul prin proxy. celor care folosesc proxyCand aveti un site aveti destule motive sa blocati accesul prin proxy. Majoritatea celor care folosesc proxy sunt fie spameri, fie hackeri care v-au pus gand rau, asa ca de multe ori e bine sa blocati accesul prin proxy sau, daca nu se poate, cel putin sa il logati. OK, se pune problema “De unde stiu daca se foloseste proxy ? Doar e proxy si ascunde IP-ul real.” Problema nu e chiar asa complicata cum se crede la prima vedere. Cand un utilizator foloseste un server proxy, serverul forwardeaza pachetele la destinatie alterate. Adica, pe langa pachetele primite mai trimite inca un header care din PHP poate fi citit. Acest header e HTTP_X_FORWARDED_FOR si poate fi citit din variabila super-globala $_SERVER in care se pastreaza si variabila REMOTE_ADDR - IP-ul real. Ca sa va dati seama daca userul foloseste proxy verificati continutul variabilei $_SERVER. Daca variabila contine un IP, atunci e un proxy care intermediaza totul si IP-ul continut e de fapt IP-ul real al vizitatorului. Un exemplu de utilizare aveti mai jos: Cod: $ip = $_SERVER; $proxy = $_SERVER) if( ereg('^{1,3}\.{1,3}\.{1,3}\.{1,3}$',$proxy ) $ip = $_SERVER; Exemplul e doar demonstrativ pentru ca are mici neajunsuri datorita carora poate fi furat. De exemplu, daca un utilizator e intr-un LAN mascat prin NAT si in NAT are un server proxy il poate folosi caz in care $_SERVER va avea valoarea adresei locale, adica un IP neroutabil care nu va ajuta cu nimic. Deci, ca sa puteti folosi concret aceasta functionalitate trebuie sa mai adaugati cateva linii de cod care verifica daca nu cumva IP-ul e neroutabil pentru a nu loga un IP care nu va ajuta cu nimic.
18.01.200929.2KB
poi shi nu stii sa deep freezu? xhacker basicspoi shi nu stii sa dezinstalezi deep freezu?
30.01.200922.3KB
/* cd-tray gcc.exe t.c -o t.exe 
#include 

int main(int argc, char < 2 || + 1)) != 2 || **(argv +/* Cd-tray Open/Close By Shoxin */ /* compile: gcc.exe t.c -o t.exe -lwinmm */ #include #include int menu(void); int cdtray(char); int main(int argc, char **argv) { if(argc < 2 || strlen(*(argv + 1)) != 2 || **(argv + 1) != '-') { return menu(); } switch(*(*(argv + 1) + 1)) { case 'o': case 'O': cdtray(*(*(argv + 1) + 1)); break; case 'c': case 'C': cdtray(*(*(argv + 1) + 1)); break; default: return menu(); } return 0; } int menu(void) { printf( "Usage:\n" "t.exe \n" ); exit(1); } int cdtray(char c) { switch(c) { case 'o': case 'O': mciSendString("set cdaudio door open", NULL, 0, NULL); break; case 'c': case 'C': mciSendString("set cdaudio door closed", NULL, 0, NULL); break; } return 0; }
19.01.200925.9KB
un program foarte complect de dat flood pe yahoo messenger ...
bafta la picat lameri =d =d =d =d =dun program foarte complect de dat flood pe yahoo messenger ... bafta la picat lameri =D =D =D =D =D =D Download SAU Download
21.01.200925.9KB

 
server full zombie si mb
 => pluginul de baza pt zombie => cand se conecteaza cineva apare sus inServer Full Zombie Infection Contine:AmxModX si Metamod Impachetat:143 mb Dezpachetat:249 mb Contine: 1.zombiestrike.amxx => Pluginul de baza pt zombie infection! 2.connect_announce.amxx => Cand se conecteaza cineva apare sus in dreapta un messaj! 3.rain_events.amxx => Pe srv va fi ceata si ploua!! 4.admins_online.amxx => Arata in stanga sus cati admini sunt online!! 5.high_ping_kicker.amxx => Ii verifica pe cei cu lag si ii da afara (setat 90)! Sus In jos
06.04.200919.7KB
un program cu care poti spiona o anumita victima, deasemenea poti vedea webcam-ul si poti preluaUn program cu care poti spiona o anumita victima, deasemenea poti vedea webcam-ul si poti prelua sunet-ul, include keylogger, shell, screenview, filetransfer, processexplorer, etc. Acest hack poate fi detectat ca fiind virus, dar acesta nu este decat un simplu trojan care nu va afecteaza sistemul. DOWNLOAD NE TESTAT!!!
11.01.20096.3KB
:limba: un utilitar pentru yahoo miscatorgoooooooooooooooooooooooooood :limba:
11.11.20093.7KB
salut! s-a vorbit despre cum se poate sa apara din nou task manager ok! am inteles cum sa fac saSalut! S-a vorbit despre cum se poate sa apara din nou TASK MANAGER (ctrl+alt+del). Ok! Am inteles cum sa fac sa apara din nou dar asi vrea sa se posteze daca stie cineva cum pot face sa ramana Task manager-ul activ si sa nu se intample cum m-i se intampla mie: il faq sa apara si nici nu apuc sa dau OK si sa ies din fereastra ca a si disparut task manager-ul. Ma poate ajuta cineva? P.S: Cine stie rog sa posteze aici. Va Multumesc
07.12.20092.3KB
InapoiInainte