Showing posts with label hacking and hackers. Show all posts
Showing posts with label hacking and hackers. Show all posts

Friday, 17 May 2013

How to Bypass or Remove a BIOS Password


How to Bypass or Remove a BIOS Password


A BIOS password is a protection measure that can be used to stop someone powering up a computer system or making changes in some of the computers most sensitive areas. Many big name computer manufacturers such as Dell and HP lock the customers out of this area because they don’t want the customer changing anything and potentially damaging the machine (which the manufacturer may have to warranty). However, when someone like a computer technician or hardware enthusiast needs to make some hardware changes to the computer, they will need to access the BIOS. Here are some methods to be a bios password cracker, removing a BIOS password.

NOTE: Do not try to guess the password on a passworded Hard Drive. 3 wrong guesses will often result in the information on the hard drive being lost forever.
How to Bypass or Remove a BIOS Password by Removing the CMOS Battery:
The simplest way to remove a BIOS password is to simply remove the CMOS battery. A computer will remember its settings and keep the time even when it is turned off and unplugged because these parts are powered by small battery inside the computer called a CMOS battery. If we pull out this battery, the computer will forget alot of its hardware settings, including its BIOS password. This should not be performed on Laptops if you are not experienced working with laptop hardware.
Finding the CMOS BatteryAnyway, open up the computer case using a screw driver and locate the flat, circular and metallic CMOS battery. It should look something like the picture to the right. Some computers have this part standing upright.
Once you have located it, observe how the latches are holding it. There are many different ways to remove a CMOS battery but the most common way on newer computers can be seen in the picture below.
Removing the CMOS Battery
Make sure to power down the computer, unplug the power cables and unplug any USB devices if they are powered. The computer must not be able to get power from anywhere for this to work. Take out the CMOS battery and wait 10 – 25 minutes before putting it back in. The reason for this wait is because the computer can still store power in its capacitors even though everything is unplugged. The waiting period allows enough time for them to discharge.
Plug everything back in, power up the computer and enter the BIOS again. If everything went well there should be no more password. In some cases, if you get weird error messages during bootup now, you will need to goto “Load BIOS Defaults” in BIOS and save the changes to fix them.
If this method didn’t work, try one of the methods below.
How to Bypass or Remove a BIOS Password using Software:
!BIOS is a freeware utility which is designed to be a whole BIOS and security suite. It has the ability to decrypt the passwords used in some of the most common BIOS makes such as Award, Phoenix, American Megatrends, IMB etc..
It also has the ability to brute force the password (known as “blasters”). However, this method is dangerous and can result in some unexpected and unwanted results.
Note: Because of this applications password cracking abilities, some antivirus software may report it as a virus/trojan. This is a false positive.
To start using !BIOS, reboot your computer and take note of the BIOS type and version you are running. For example, If your motherboard uses Award BIOS you should look for the text “Award Medallion BIOS 6.0″ or something similar.
Download !BIOS from here and save it to your desktop. Then, open a DOS command windows by going to Start > Run and type: cmd
Once you see a black screen in front of you, type: cd desktop
You should now see something like: C:\Documents and Settings\YourUserName\Desktop>
Now type the name of the file you just downloaded, if you haven’t changed the name just type in: bios320.exe
!BIOS - Decrypting a BIOS Password
Use the down arrow and choose “Crackers” and then press the right arrow. Using the up and down arrows, select the BIOS that the motherboard is using and press Enter.
You should now see a menu asking what you want to crack, in most cases its the Supervisor or System Passwords you want to crack, so press the 1 key on your keyboard. It will then show you another menu asking how you want it to be cracked. Option 1 is pretty good so try that first by pressing the 1 key on your keyboard. You should now have your BIOS password.
Reboot the computer, enter the BIOS and try it out.
How to Bypass or Remove a BIOS Password using the manufacturer backdoor password:
On many computers (especially old ones), computer manufacturers build in backdoor passwords for their own technicians to use so they can access the BIOS when the hardware is being serviced. Here are some of the ones that have been reported. You may need to try quite a few passwords before you find one that works
These passwords are CaSe SeNsItIve.
AMI BIOS Backdoor Passwords:
  • A.M.I.
  • AAAMMMII
  • AMI
  • AMI?SW
  • AMI_SW
  • BIOS
  • CONDO
  • HEWITT RAND
  • LKWPETER
  • MI
  • Oder
  • PASSWORD
Award BIOS Backdoor Passwords:
    • (eight spaces)
    • 01322222
    • 589589
    • 589721
    • 595595
    • 598598
    • ALFAROME
    • ALLY
    • ALLy
    • aLLY
    • aLLy
    • aPAf
    • award
    • AWARD PW
    • AWARD SW
    • AWARD?SW
    • AWARD_PW
    • AWARD_SW
    • AWKWARD
    • awkward
    • IOSTAR
    • CONCAT
    • CONDO
    • Condo
    • condo
    • d8on
    • djonet
    • HLT
    • J256
    • J262
    • j262
    • j322
    • j332
    • J64
    • KDD
    • LKWPETER
    • Lkwpeter
    • PINT
    • pint
    • SER
    • SKY_FOXSYXZ
    • SKY_FOX
    • syxz
    • SYXZ
    • TTPTHA
    • ZAAAADA
    • ZAAADA
    • ZBAAACA
    • ZJAAADC
Russian Award BIOS Passwords:
  • %øåñòü ïpîáåëîâ%
  • %äåâÿòü ïpîáåëîâ%
Phoenix Backdoor BIOS Passwords:
  • BIOS
  • CMOS
  • phoenix
  • PHOENIX
Other Manufcaturers Backdoor Passwords: (manufacturer name – password)
  • VOBIS and IBM – merlin
  • Dell – Dell
  • Biostar – Biostar
  • Compaq – Compaq
  • Enox – xo11nE
  • Epox – central
  • Freetech – Posterie
  • IWill – iwill
  • Jetway – spooml
  • Packard Bell – bell9
  • QDI – QDI
  • Siemens – SKY_FOX
  • SOYO – SY_MB
  • TMC – BIGO
  • Toshiba – Toshiba

Wednesday, 20 February 2013

10 Ways How Hackers Can Hack Facebook Accounts



10 Ways How Hackers Can Hack Facebook Accounts

So here are the top 10 methods which have been the most popular in 2012:

1. Facebook Phishing 




Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.
2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealers 



Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful.
4. Session Hijacking




Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's.

5. Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.
6. Mobile Phone Hacking



Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.
7. DNS Spoofing 


If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.

8. USB Hacking 

Usb password stealer
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser,
9. Man In the Middle Attacks


If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article,
10. Botnets 


Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

Sunday, 27 January 2013

Best Cell Phone Tracking Software



Best Cell Phone Tracking Software


With the today’s technology, finding your loved one or simply someone who is important to you is possible through a cell phone monitoring software. Call it spying or stalking but truth is this phone trackers could really come very handy particularly in cases of emergencies. Regardless of whether you have valid reasons or not for monitoring somebody’s mobile phone, truth remains that tracking software is available and ideally will be put to good use.
There are several alternatives open to track a mobile phone, study and decide which one is the most efficient to do the job. First option would be to install GPS tracking to some mobile phone. A GPS chip has to be placed at the back of the cellular unit; it is fairly small and is hardly noticeable. As soon as the chip lies on the phone, power is going to be provided by the cell phone itself. Read the directions on how to install the GPS trackers to the telephone carefully.
The program Gps navigation tracking you down loaded on your computer will be the 1 monitoring the indicators. Most cell phone tracking software has to be triggered after installation, just follow instruction prompted by the software. The truth of this software differs on the distance from the phone, it could be anywhere from a hundred feet to a couple of miles.
tracking software for cell phone
Other cell phone tracking software is available in the internet. Some offer 30 day trial period, giving you enough time for you to determine if it is useful or not. There is software that immediately starts tracking when downloaded.
You probably possess tons of queries about the cell phone tracking software and its capabilities. Mobile phones have to have a GPS feature for the software to operate. Aside from tracking the actual mobile of a man or woman, it can also be useful for pics and vids sharing with family and friends. Different cell phone tracking software can be downloaded free of charge, some requires license key activation which means you will have to pay for it there are some that doesn’t price anything. Before you proceed, make sure that your mobile phone matches the software. The software you will need depends on the operating-system your unit requires; it could be Symbian or Google android platform. Be aware of individuals important details.
The GPS cell phone tracking software is considered the best primarily because of the use of the satellites. This particular application is known for its appropriate and exact information with regards to the position and whereabouts of the cell phone device being supervised.
There are software programs who’s said to be impossible in order to detect while monitoring information about the other person. Besides the location trackers by Gps navigation, this program’s added functions are full accessibility phone’s events, SMS text messages, both sent and received, browsers and call firelogs. Read the comments and appearance the positive and negative feedbacks from people who have experienced using the particular mobile phone tracking software could be helpful in making a choice. Be certain about the plan you choose to download, there are many bogus programs going around the internet. Choose sensibly.

Friday, 4 January 2013

hacking heroes


 

hacking heroes 

 

No. 1 - Robert Tappan Morris

 
Even if you know next to nothing about computer viruses, you've probably heard of "worms." That's because news stories about this particularly contagious (and therefore destructive) breed of virus abound.Blame Robert Tappan Morris for it all.Back in 1988, while a graduate student at Cornell University, Morris created the first worm and released it on the Internet. He claimed it was all an experiment gone awry, a test to see how big the then-new Internet was. The worm turned out to be more than a test: it replicated quickly, slowing computers to the point of non-functionality and virtually crippling the Internet. He was eventually fined and sentenced to three years probation.Since then, he's earned his Ph.D. from Harvard and made millions designing software. Today, he's a computer science professor at MIT. Not bad.


No. 2 - Kevin Mitnick

 
Kevin Mitnick started out just wanting a free ride on the bus.He came a long way from his hacks into the Los Angeles metropolitan bus system and early dabbling in phone fraud. Mitnick went on to become the most wanted computer hacker in the country, known (and wanted) primarily for his hack into Digital Equipment Corporation's network to steal their software.It may have been his first notable break-in, but Mitnick went on to other big targets, including cell phone giants Nokia and Motorola.Even his eventual arrest was notable: After hacking into fellow hacker Tsutomu Shimomura's computer, Mitnick was tracked down by Shimomura and the FBI in 1995.Today, Mitnick has served a five-year sentence and come clean, but he continues to profit off his former title, authoring books and working as a security consultant.


No. 3 - Adrian Lamo

 
It's true that companies sometimes hire hackers to test their systems for weaknesses, but no one ever hired Adrian Lamo.In 2002 and 2003, Lamo broke into several high-profile targets, just for kicks. He then told the targets what he had been able to do and how he did it. How kind of him. Lamo's targets included Microsoft, Yahoo and the New York Times, where he inserted his contact info into their database of experts.Known as "the homeless hacker," Lamo slept in abandoned buildings and hacked via laptop from Internet cafes and public libraries. His network-busting technique of choice involved going in through the out door, entering sites through proxy access, a setup that corporations often use to let their computers connect out to the Internet. That led to his arrest in 2003.Lamo served two years probation and now works as a tech journalist.

No. 4 - Gary McKinnon (aka Solo)

 
Scottish-born, London-based hacker McKinnon wasn't just in it for fun; he had a political axe to grind.Conspiracy-theorist McKinnon broke into computers at the U.S. Department of Defense, Army, Navy, Air Force and NASA sometime in 2001 and 2002. What exactly was he looking for? Evidence of really fuel-efficient alien spacecraft, for one.No joke.McKinnon believes the U.S. government was hiding alien technology that could solve the global energy crisis. Now, in the process of snooping around for this stuff, the self-taught hacker concedes he may have deleted a whole bunch of other files and maybe some hard drives as he attempted to cover up his tracks. Nothing significant, he insists.The U.S. government begs to differ, claiming McKinnon's hack job cost them $700,000 to fix. They also kind of doubt the whole UFO story and wonder if his snooping had more earthly intentions. Back in the U.K., Gary's lawyers insist that their client, who suffers from Asperger's Syndrome, deserves special mental health considerations.Gary himself has become a cause celebre, with his pending extradition being protested by celebrities like Sting.


No. 5 - Raphael Gray (aka Curador)

 
Raphael Gray called himself a saint, insisting he was only trying to help e-commerce sites when he broke into their databases to steal credit card numbers and personal information from 26,000 or so American, British and Canadian customers in 2000. The then-18-year-old Welsh teenager insisted he was merely trying to draw attention to lax online security systems. So, if he was really just trying to help, then why did he post the card numbers online? Well, that's another question.Gray was sentenced in 2001 to three years of psychiatric treatment.


No. 6 - John Draper

 
Draper is pretty much the granddaddy of hackers.Back in the early 1970s, he was the king of "phone phreaking," meaning he was playing the phone company. Back in the pre-Internet, pre-personal computer days, the phone system was the big computer to beat and Draper did it well.Draper's breakthrough came when he and a friend realized that a toy whistle, a giveaway in a breakfast cereal box, emitted the same frequency as the tones used by AT&T switches to route phone calls.Building off that, Draper made homemade devices, "blue boxes" that could get you all the long distance calls you wanted...for free. What did all this get him? Some time in prison, as well as the attention of Apple co-founder Steve Wozniak, who wanted to get in on phone phreaking himself. Draper went on to write one of the first word-processing programs, EasyWriter, but now specializes in, go figure, security.



No. 7 - Kevin Poulsen (aka Dark Dante)

 
Today, Kevin Poulsen is an editor at tech-savvy Wired magazine, but back in the 1980s, he was just your average phone-phreaking, Porsche-driving hack.Poulsen gained some notoriety for a clever prank he played on Los Angeles radio station KIIS, in which he rigged the phones to allow only him to get through and win a trip to Hawaii and the aforementioned Porsche.Known as Dark Dante, Poulsen also took on more serious targets. His break-in to the FBI's database eventually led to his 1991 arrest and five years prison time. Since then, he's gone respectable, retiring to the editor's chair and using his cybersleuth powers for good deeds, like tracking sex offenders on MySpace.


No. 8 - Dmitri Galushkevich

 
When pretty much the whole country of Estonia was suddenly caught up in Internet gridlock in May 2007, the very-small-but-very-tech-savvy former Soviet Republic thought they knew who to blame: the Russian government.At the time, the two countries were caught up in a series of riots over the removal of Soviet-era statues, but now it had gotten serious. The weapon of choice? A botnet.The hackers responsible for the cyberterror hijacked computers and used them, en masse, to overload servers across the country. ATM machines didn't work, Web pages didn't load, government systems were shut down.It took weeks for Estonian officials to untangle the mess and even longer for them to find the culprit: Dmitri Galushkevich, a 20-year-old ethnic Russian living in Estonia. Was he working alone? Unclear, but for wreaking this havoc, Galushkevich was fined 17,500 kroons. Or about $1,620.



No. 9 - Jonathan James (aka c0mrade)

 
On the list of computer systems you'd want to be really, really, really secure, the Department of Defense surely shows up, which makes Jonathan James' (aka c0mrade) break-in to the DoD's Defense Threat Reduction Agency server all the more impressive. James' 1999 spree included not only the DoD, but NASA as well. The then 16-year-old used his purveyed access to steal software, not defense secrets, but James still got into some dangerous territory, including software used to control the International Space Station's living environment. For his crimes, he served an abbreviated minor's sentence of six months and also had to pledge to give up computer use.




No. 10 - The Deceptive Duo

 
In 2002, the Deceptive Duo (really 20-year-old Benjamin Stark and 18-year-old Robert Lyttle) were responsible for a series of high-profile break-ins to government networks, including the U.S. Navy, NASA, FAA and Department of Defense. Like so many other hackers, California-based Lyttle and Florida-based claimed they were merely trying to expose security failures and protect Americans in a post-911 world. The two hackers posted messages, left email addresses and defaced Web sites in an attempt to get the government's attention...and get the government's attention, they did. Lyttle and Stark pleaded guilty in 2005. Stark was sentenced to two years probation, Lyttle served four months in prison with three years probation, and both were ordered to pay tens of thousands of dollars in restitution for the damage they caused.



Wednesday, 2 January 2013

Top 5 Computer Hackers Ever

Top 5 Computer Hackers Ever

byauthor
A Hacker is cleaver System Programmer. And he/she interested in playing with system securities and other electronic devices. Hacker is passionate about learning in how a system will work, and finding new things. In the business of hacking there are three types of hacker.




1. White Hat Hacker : These hackers are considered as good guys . They don't use their hacking methods for doing illegal things. White hackers will help people from being hacked.

2. Grey Hat Hacker : Grey Hat Hackers are do both good things and bad things. They do legal and illegal things.

 3. Black Hat Hacker : Black Hat Hackers are show their skill using hacking websites and stealing passwords and Creating some Trojan Malware Fuctions etc.

Top 5 Computer Hackers Ever



1. Kevin Mitnick
Kevin Mitnick is a most famous hacker. He is the author of two books The Art of Deception The Art of Intrusion. He damaged some Communication networks like Nokia, Motorola and Sun Microsystem etc. Kevin Mitnick has damaged DEC systems source code [Digital Equipment Corporation has spent around $160,000 in cleanup the DEC systems].  To to win a bet he occupied administration privileges to IBM Computers at the Computer Learning center in LA [Los Angeles] .


2. Adrian Lamo
Adrian Lamo is a Grey Hat Hacker. Using his hacking skill he hacked many computer networks like The New York Time, Yahoo, Microsoft .


3. Gary Mckinnon
Gary Mckinnon is a Biggest Military Computer Hacker of all time. In one interview Gary Mckinnon said "Hacked into US military computer systems looking for information about UFO's". He Broken security systems of NASA and Pentagon And using his hacking skill he hacked 97 Computer systems [It damaged around $700,000 to the society].
Source: BBC News

4. Robert Tappan Morris
Robert Tappan Morris is Created the first Computer worm on the Internet in 1988 and named it as Morris WormRobert Tappan Morris now working as Professor at MIT CS and Artificial Intelligence Laboratory.

5. Jonathan James
Jonathan James is an American hacker. He damaged NASA Systems, It costed $41,000 to fix the systems. 
Jonathan stealed software from NASA It worth $1.7 Million.

for more CLICK

Friday, 28 December 2012


Hack Facebook, Gmail, and Much More using All In One Keylogger [[ Software ]]:-


Wanna Hack Accounts of Facebook, Gmail, Yahoo and much more sites ?? Then follow the steps carefully and I am fully sure you will like this post. This trick is 100% working because I personally checked this. You just have to put your Email username & passwords. Don't worry it's safe, actually this keylogger use your password to send the keystrokes and logs files to your email id which you will fill here. Still if you are thinking about security of your account than I recommend you to use any fake email id and password just for testing this keylogger is safe or not.

Note : Please fill valid Email Ids and Passwords else you will not get victim's logs.

Download Now
Rinlogger.Exe
Password : cstricks

FOLLOW ALL STEPS & SNAPS CORRECTLY :

1) Firstly you have to decide that you want victim's pc screenshot or not, here you can set your duration of log details too.

2) Next you can choose your keyloggers name and place where you want to install this keylogger in victim's pc like My music, My pictures, etc.
3) Here you can spread your malware anywhere on the Internet.
4) Here create custom message boxes at runtime to fool your victim. ( This is an optional feature ).
5) In this step you can put name of website which will open in the victim's browser ( This is an optional feature ).
6) Here in this area if you want that your victim has a sharp mindso you must use this option you should bind a jpeg file or any file you want here you should use your own social engineering that what your victim likes the most . ( This feature is optional )


7) Here also some are useful options that you want to steal their passwords which are stored in the browser and which homepage you want to set. ( This feature is optional ).






8) This option is very important. In this option you can block many things in your victim’s pc like block cmd, block shutdown and many more.

9) This step enable you to setup the server's file metadata such as copyright, description, version, etc.

10) This is the final step for setting up your own keylogger. After this process you will be able to have your own custom build server for spreading.






   comment below...

Wednesday, 26 December 2012


FACEBOOK HACK:

Hello All, "HOW TO HACK FACEBOOK ACCOUNT" , this quote is amongst top 5 in google search so I am going to guide you through this trick. Hacking facebook account is not a easy deal but still some certified hackers can do it easily. Don't worry you don't have to learn any hacking courses. The trick which I am going to disclose is exactly not a type of hacking, its a minded trick through which you can hack. This is also known as " REVERSE HACKING ". 

To getting success in this trick you have to create 3 fake accounts and make sure they are in friend list of that particular person whose account you are going to hack. 

This tutorial is only for educational purpose, Don't use it with wrong intension.

FOLLOW THE STEPS CAREFULLY :

1) Firstly goto Facebook and click on Forgot your Password.

2) Now in next window put victims username, as we all know finding anyone's username is as easy as abc. And click on search.
3) In Next window you can see victim's account. Click on " This is My Account ".
4) Next step will take you to the Reset Password window, their you can see half hidden email and mobile numbers of your victim, ignore that and Click on " No Longer have Access To These ".
5) Here comes the main trick, now in new window you can see two options, one is NEW EMAIL and another is CONFIRM NEW EMAIL, just put any of your emails which is not associated with facebook previously and click on continue.
6) Now if victim account is protected with security question then you will see a security question page, if you know victim's security question then your task is completed, but sometimes if victim's account is not protected with security question then you can see a new window with " Recover your account through friends ". Click on continue.

7) Now here comes the task of your three fake accounts. In this step you can see some friend's list, select your three fake accounts one by one and click on continue.
8) Here comes last steps with confirmation of three friend's whom you want to send codes, but make sure all three accounts which you choosen is your's fake account so that you can access all three codes. If you did everything right then finally click on " Send codes to friends ".
After selecting three friend's, facebook will send security codes to the Email address associated with those fake accounts. Login to each account and fill the security codes in the same manner.

◘ Now you will get password reset E-mail on Email address that you have entered in fifth step.


◘ Bravo !! You Did It, Now Your Friend's Account is HACKED !!