Notice

Join This Channel To Get Latest Phone Tips,Tricks,News,Network Security Course,Hacks etc. For Free on Your Mobile!! ... Join our Facebook Discussion Group -Regards Ankit

31 August 2011

BSNL 3G Hack 2011 + Opera Mini Mod



Trick 1:

Everybody make use of 3rd generation SIM on their mobile phone therefore today I will show the main use of BSNL 3G hack by making which you’ll browse limitless internet from top speed as much as 120 Kb per second. I’m not totally sure whether this hack continues to be operating or not, various mobile phone hacking forums as well as members tend to be posting this hack is actually working acceptable for them. And so I decided to create this publish on my weblog that can help you.
BSNL 3G Hack Browse Unlimited Free Internet at 120Kbps
If you’re interested to carry on with this particular hack you have to have BSNL 2G Sim card and eventually 3G help support mobile handset. Right now just adhere to easy steps to get it done:
1. To begin with recharge your own 2G SIM along with Rs 1 to transform this to 3rd generation SIM.
2. Now look into the balance through number dialing *123#, the content will show that the GPRS free utilization is Absolutely no MB when you are getting this confirmation take a look at 3rd step.
3. Right now recharge once again along with Rs 1 to transform directly into 2G Sim card.
4. As soon as you carried this out now once again recharge along with Rs 274 with regard to unlimited GPRS utilization for 2G Sim card.
5. Once again recharge along with Rs 1 to convert directly into 3G Simulator.
6. That’s it you’ve hacked your own BSNL 3G with regard to unlimited searching check out the GPRS totally free usage through number dialing *123# it’ll show 1250000 Megabytes free usage.

Trick 2:
Make These Settings in Your Phone:

APN-bsnllive
PROXY-218.248.240.190 or 10.220.67.131
PORT-8080

Keep Balance Below 0.30 rs.

Trick 3: 


Download and install This: Opera Mini Hacked For BSNL




Enjoy...

28 August 2011

Reliance data card Hack - Speed up Reliance



Hi Guys,Hope You are Enjoying Network Hacks in This Blog.

Today i am Posting Reliance Data Card Hack to Get 3.1 or Even 28 Mbps Speed.

PS:
TRY at OWN Risk.

Requirements:

1) You must have reliance netconnect datacard that supports both hybrid(cdma1x) and HSD(EVDO).
2) though reliance HSD card plans/tariffs are costly and doesnt matchup with student pocket,so you can take any hybrid plans speed of 144 kbps,ensuring that the internet data card supports EVDO too when required.
3) Activate your datacard,check whether it is working fine or not.
4) If working fine go to >> settings then check on button >> use DNS
Put these IPs in DNS and Alternate DNS Field
DNS - 220.226.182.82
Alternate DNS - 220.226.182.83
5) Change mode from Hybrid/CDMA 1x to Broaband plus, Save settings.
6) Now try to Connect , it will get connected which was earlier not connecting because you were having hybrid plan/cdma 1x plan.
7) you might be thinking, that you will be still billed because you are using your phone number to connect to internet,but check your download stats in reliance website for your daily usage,their you will be shown with 0 download and 0 upload stats, an you will be still downloading daily,and do not panic about bill as i received my bill 3 days ago and it was charged nominal as usually done, and i have already crossed 10 gb download.
8) now to understand how this whole thing works.
Reliance Data card has been delivered to their sales executive/marketing executive as specimen copy, they have unlimited download and speed plan can say they get test reliance data cards which they are not billed for,if you check any salesman datacard, they have settings of DNS placed in their card, the same way i tried and actually it has bypassed my number to their test plan server.
reliance data card hacking speed
Reliance data card screen settings for speed enhancement
reliance data card software hack
reliance netconnect settings for speed hack
reliance datacard hack
Reliance Screen showing 3.1mbps speed from 144kbps
Enjoy...

27 August 2011

Session Hacking 101




Hi Guys,
we are here to discuss one more topic related to web application hacking, that is session hacking. Note that session hijacking and session hacking are closely related terms but are slightly different. In session hacking application level attacks are concerned where as in session hijacking application level attack as well as TCP/IP level attacks are covered. Session hacking in other terms can also be called as Session Management Attack. So here I must clear we are discussing session hacking not session hijacking. People with confusion in session hacking and session hijacking should read this post carefully I hope that would help them clear up their confusion.
So first of all what is session, session can be termed as an entity which is responsible for handling your state over internet like whether you are logged in or not or which item you have added to your cart while shopping etc. And most common and well known method known for managing sessions are cookies.

Web applications become vulnerable to session hacking due to improper generation and mishandling of cookies while undergoing process. The data that is passed as cookie is known as token so in fact we can say that weak token generation methods and weakness in handling them is main reason for session getting hacked.

What are common weak token generation methods ?
One of the most common mistake many new web developers make is they design tokens to be meaningful. That means most likely the token is created from user-name, password, email id, telephone or mobile number, country, region, time and similar information about logged user. And if token does not include password there is 100% chance that hacker can log in as any user he/she wants since all other information is readily available in user's profile to create a new legal tokens as cookie values.
Next weak token generation method may include generation of token value that is predictable. Predictable token can be generated in several ways for example creating a pattern to generate token, using only hexadecimal values, using known token generation methods, using hidden sequences while generating tokens.
Lastly creating a session token which is fully time independent or fully time dependent. One of the biggest mistake that can be done while creating tokens for handling session. In fact many experienced hackers might even crack token generated using this method in few minutes. It's never a good idea to use this method for generating tokens.

What are common token mishandling methods ?
The very first in list is coding for cookies in improper way to work in LAN network.
Next is appearance of tokens in session logs and URL.
And third is storing cookies in wrong way.
Lastly thinking that we have implemented SSL means we are secure to session related attacks.

A session token vulnerable to attack means complete session is vulnerable to attack. Underestimating session handling can prove to be serious. So here we end up with basics of session hacking in next post we will have our look on how to perform session hacking attack against weak cookie generation and then in next post to it how to perform attacks on token mishandling methods and lastly how to perform hacked session CSRF attack. Till then thanks for reading, have a nice time and keep visiting. 
Enjoy...

24 August 2011

Network Security Course 101



The area of Network security Course consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security course is required organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done.

Network Security Course Deals with the ISO/OSI Reference Model


Network Security Course is designed to meet the needs of the IT professionals to grasp the software engineering principle within short time. The course syllabus is set in such a way to understand the practical problems of the industry and to guide the IT professionals to follow the software processes as they come across in their environment. Some of the special features are

:: Industry relevant curriculum
:: Extensive Course material
:: Online interactivity with Experts
:: Self pace Learning

On line assessment Communication tools like White Board and Chat provides online interactivity with Instructor and Student. E-mail and Bulletin board give offline communication to share the information between Instructor and Students.

Enjoy...

23 August 2011

How To Reinstall Windows Without Losing Anything



You can use this method as often as you like when you need to repair something that had gotten corrupted and you don't want to do a clean install. This is better than doing a windows repair install from the cd because doing that can cause changes to settings and even make it so you can't get updates anymore from Microsoft update site because of the 'silent install' they did a year or so ago (unless you re reg some dll files).
1- Start Windows xp
2- Go to the location of your source files
3- Run WINNT32 /unattended
For example, D:\I386\winnt32 / unattended ( copy & paste this command into the RUN box, then press ENTER ) Your computer will do the rest. OR Start > All Programs > Accessories > Command Prompt. Copy & paste > D:\I386\winnt32 / unattend (notice the space between 32 and / ) Press Enter. If you have i386 on your drive, you can replace D: ( if D: is your CD drive ) with the location of it. (be sure it's the full i386 though) D: is the driver letter where your windows XP Cd is if D: \I386\winnt32 /unattend doesn't work then try : D:\winnt32 / unattend
 Enjoy...

21 August 2011

Vodafone Hack Balance Transfer



Recently,I have Posted 3G hack for Vodafone.Now,i am Posting Vodafone Balance Transfer Trick hope You Enjoy This,.


First Get Your Friends Phone and Then,
Just send an sms “TRAN 25 10 ur_mobile_number ”

To 144

Example: TRAN 25 9048888888 to 144.


This facility is applicable to customers who are 3 months old!


You can transfer the maximum amount upto Rs25.
Enjoy...

18 August 2011

Find Your Friends IP Address



Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives. If you can email the person, or get them to click a link on a forum, you can find out their IP easily.

1. Surf to www.whatstheirip.com. The site will ask for your email. Enter your email and click "get links".

2. You will be emailed a couple links. The links when clicked will lead to a "page not found" and "invalid thread specified". When one of the links is clicked it will email you back the IP of whoever clicked the link.

3. If its a victim that I have interaction with on a board or forum I always ask them "Is this you they are referring to in this thread"....the person invariably clicks the link and I'm emailed back their IP

Now of course once you have someones IP you can remotely shut down their computer or port scan them or whatever your deviant mind can think of.

Enjoy...

12 August 2011

Detecting Anonymous IP Addresses



As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.



How Proxy Detection Works?
Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.
 
How to Tell Whether a given IP is Real or a Proxy?
There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.
Detect Anonymous Proxy
Enjoy...

11 August 2011

Aircel 3G Hack 2011 Finally Revealed Opera Mini Modded



Hi Guys,

In Series of Posting 3G Hacks.I am Now Revealing 3G Hacks For Aircel.Hope It Works For You.



Apn: Pocket Internet

For your Default browser use any of these sites as Homepage:

http://0.facebook.com.kproxy.com
http://0.facebook.com.scarewar.com
http://0.facebook.com.flyproxy.com



Hack Aircel 3G Using Modded Opera Mini:

Download Opera Aircel Modded Opera Mini
You will Find Two Opera There.First Try out with Opera Mini Aircel Mod.jar
If This Works,Use it Otherwise uninstall This one and Opera Mini Handler UI and Do the following:
Go To Handler setting.
In Handler's first box select as custom server 1
Put proxy: 0.facebook.com 
Change http to host
Other fields set blank.
Connect with access point Pocket Internet.

Aircel 3G Hack Bonus Trick:
Use these settings manually::
Proxy- 208.109.128.144
Port- 80

Homepage- 0.facebook.com

Note: APN is same For all Tricks.


Enjoy...

10 August 2011

Make Money With Social Engineering [ZERO Investment]



Hi Guys,


I am Back Again With A New Method of Making Some Bucks online.
Again,This PDF was leaked from a Private Server.


Anyways,I am Sharing This with you.Good Luck!



Requirements:

-Valid Paypal Account
-A Working Brain

This Method is Completely BlackHat.But,wid minimum Risks.

Download:
Make Money From Social Engg

Enjoy...

09 August 2011

Idea 3G Hack 2011



Hi Guys,
Hope you are enjoying my posts.Recently i posted Airtel and Vodafone 3G hack.Again,i am posting Idea 3G hack.Hope it works for you.
You can also use Idea Modded Opera Mini For this.

For Mobile default browser you can use these address:

http://0.facebook.com.php.t9space.com

http://z012.fma.fb.me.php.flyproxy.com

and after opening page enter url and surf freely.

Note: Balance Must be less than 5rs.
Enjoy...

07 August 2011

Ardramax 3.8.4 Full + Tutorial



Step 1:
Start by disabling your antivirus/spyware software.
Then open your internet browser and navigate to the link provided in
the description. Download the Ardamax Kelogger Full file and save it to your desktop!

Step 2:
Extract the .rar file to your desktop,
then run the install_akl.exe,
follow the instructions shown on the screen.




Step 3:
Now, u need to register.
Right click on the little notepad and pen icon, and choose
"Enter registration key"

leave that open, and find your ardamax folder on your desktop.
Open the serial.txt and copy and paste in the correct boxes!

Step 4:
It's time to configure ardamax to work on your pc before we
make it ready for sending to a friend. Right click on the tray
icon, and Click 'Remote Installation...',


Now,you should see this:
[Image: step613.jpg]

If you want to bind Keylogger Engine with another application or file click the box that says 'Append keylogger engine to file or another applitacion' and browse file or applitacion that you want to bind it with.

[Image: step710.jpg]

Now click 'Additional components' and tick 'Installation Package Bilder' like done in the screenshot.

[Image: step810.jpg]

Now you should be at 'Invisibility', make sure all the boxes are ticked, then click 'Next'.

[Image: step918.jpg]

Now you should be at 'Security', click 'Enable' and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click 'Next'.

[Image: step1010.jpg]
[Image: step1110.jpg]

Now you should be at 'Web Update', un-tick 'Check for updates' and Click 'Next'.

[Image: step1210.jpg]

Ok,you should now be at 'Options', use setting like done in screenshots.

[Image: step1310.jpg]

Btw you can make your keylogger to self distruct any time you like.

[Image: step1410.jpg]

 Ok, now you should be at 'Control', click the box that says 'Send logs every', now make it so it sends logs every 20 minutes, then where it says 'Delivery', un-tick 'Email' and tick 'FTP', then where it says 'Include' un-tick 'Screenshots', now un-tick the box where it says 'Send only if log size exceeds', once thats done, it should all look like it does in this screenshot:



[Image: step1510.jpg]

Next Put Your FTP Account Details.Click Test and You will see something like this:





-------------------------------------------------------------------------------
Once done, do NOT change your FTP password or rename/delete the folder, if you do, the logs will not come through.

You should now be at 'Control', un-tick 'Enable Screenshots Capturing' then click 'Next'.

[Image: step1810.jpg]

  Now you can change name and icon your Keylogger Engine as you want it to look like.

[Image: step1910.jpg]

[Image: step2010.jpg]

and click 'Next'.

  Now you should see this.

[Image: step2110.jpg]

just click 'Finish'.

After you click 'Finish' you should see this:

[Image: step2210.jpg]

Click 'Ok'

Now your Keylogger engine is created.

[Image: step2310.jpg]

Send it to Anyone and You will Receive the logs in Your FTP.
Enjoy...

04 August 2011

Hack Vodafone 3G



After Posting my Trick on How to Hack Airtel 3G i was getting requests for free 3G on Vodafone Vodafone has been slightly strict about there GPRS until this hack has been found out.In order to get Vodafone free 3G,you will have to try out this method I’ve mentioned below exactly.This vodafone hack has been tested on many mobiles and found out to be effective.You can also Use Modded Opera Mini For This Trick.

Settings For Vodafone Free GPRS [mobile]
Account Name : Vodafone_gprs
Homepage : http://live.vodafone.in [or anything useful]
User Name: (not required)
Password :(not required)
Access Point Settings:[ to be configured in mobile,if not already given]
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data
Bearer Settings: [to be setup in mobile]
Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal


User Name :(not required)
Password :(not required)


After configuring these settings in your Vodafone mobile,check for connection.If you are unable to access free internet[GPRS] on your vodafone mobile using this trick,then switch off your mobile,reinsert sim card and switch ON again.Now you can browse on your mobile for free.Enjoy...

Top 10 p2p Clients



Users can use software that connects in to a peer-to-peer network to search for shared files on the computers of other users (i.e. peers) connected to the network. Files of interest can then be downloaded directly from other users on the network. Typically, large files are broken down into smaller chunks, which may be obtained from multiple peers and then reassembled by the downloader. This is done while the peer is simultaneously uploading the chunks it already has to other peers.

Due to the vastness of the p2p landscape,  searching for the most efficient file sharing app as dictated by your needs and preferences can prove tiresome – that’s why we thought we should make this task easier for you by listing 20 of the best peer-to-peer programs currently in use.

Considering the vast psp softwares availabe, searching for the most efficient file sharing apps can be tiresome, most espcially with the increase of malware, viruses and spywares - for that reason i though it would be good to make this task easier for you by collating the best peep to peer file sharing softwares.

Note: Make sure you know what you are downloading, coz most software disguises as being genuine whereas they are habouring viruses and some hackers uses this medium to penetrate into your system.

So be careful and good luck.

20 Best p2p (Peer to Peer) File Sharing Apps and Softwares

1) µTorrent:

The program is designed to use minimal computer resources while offering functionality comparable to larger BitTorrent clients such as Vuze or BitComet.

2) SoulSeek:

Soulseek is a peer-to-peer (P2P) file-sharing network and application. It is used mostly to exchange music, although users are able to share a variety of files. It was created by Nir Arbel, a former Napster programmer. The server used is composed of two networks since 2006. Since 6 July 2008, there has been an attempt to merge them with the arrival of a new stable release.

3) DC++:

DC++ is a free and open-source, peer-to-peer file sharing client alternative to the original client, NeoModus Direct Connect (NMDC); it connects to the same file-sharing network and supports the same file-sharing protocol. One of the reasons commonly attributed to the aforementioned popularity of DC++ is that it has no adware of any kind, unlike NMDC.

4) Vuze:

Vuze (previously Azureus) is a BitTorrent client used to transfer files via the BitTorrent protocol. Vuze is written in Java, and uses the Azureus Engine. In addition to downloading data linked to by .torrent files, Azureus allows users to view, publish and share original DVD and HD quality video content.

Content is presented through channels and categories containing TV shows, music videos, movies, video games and others. Additionally, if users prefer to publish their original content, they may earn money from it.

5) LimeWire:

LimeWire is a free peer-to-peer file sharing (P2P) client program that runs on Windows, Mac OS X, Linux, and other operating systems supported by the Java software platform. LimeWire uses the gnutella network as well as the BitTorrent protocol. A free software version and a purchasable "enhanced" version are available.

6) eMule:

eMule is a free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule now connects to both the eDonkey network and the Kad network.

The distinguishing features of eMule are the direct exchange of sources between client nodes, fast recovery of corrupted downloads, and the use of a credit system to reward frequent uploaders. Furthermore, eMule transmits data in zlib-compressed form to save bandwidth.

7) Shareaza:

Shareaza is a peer-to-peer file sharing client running under Microsoft Windows which supports the gnutella, Gnutella2 (G2), eDonkey, BitTorrent, FTP, HTTP and HTTPS network protocols and handles magnet links, ed2k links, and the now deprecated gnutella and Piolet links. It is available in 30 languages.

One unique thing about Shareaza is that it hashes its files for all networks, and then distributes those hash values on G2 which then allows it to download one file from several networks at once. When another Shareaza client connected to G2 finds such a file, it is given the hash values for all networks and can search on the other networks with their respective hash values, which increases the number of sources and the download speed of the file. Shareaza also uses its G2 network to find more sources for torrents.

8 ) BitComet:

The BitComet program is a multi-threaded multi-protocol hybrid download manager and BitTorrent Peer-to-peer (P2P) file-sharing application. It supports simultaneous download tasks. To complete a particular download, it can draw parts of files from many sources across different P2P and client–server protocols.

9) aMule:

aMule is a free peer-to-peer file sharing application that works with the EDonkey network and the Kad Network, offering similar features to eMule and adding others such as GeoIP (country flags). It was forked from the xMule source code on August 18, 2003, which itself is a fork of the lMule project, which was the first attempt to bring the eMule client to Linux.

10) giFT:

giFT is a collection of various software components geared towards improving the overall usability of a multitude of peer-to-peer file-sharing networks. This goal is accomplished by unifying the components such that a user of the software may choose any of the available interfaces to access any of the available networks. The central application, giftd, uses a plugin-based architecture capable of using multiple networks simultaneously through a single user interface.

Enjoy...

Views This Month

 

HaCk-O-PeDia - The Hacker's Encyclopedia. Copyright 2010 All Rights Reserved To Ankit