. REAL HACKINGS | viruses | computer | tricks | tips | securities | encryption
welcome to www.realhackings.com welcome to www.realhackings.com
WELCOME TO THE WORLD OF HACKINGS
If you give a hacker a new toy, the first thing he'll do is take it apart to figure out how it works..
learn hackings
LEARN HACKINGS AND COMPUTER TRICKS.
When solving problems, dig at the roots instead of just hacking at the leaves.Being a hacker is as easy as to pick a flower ,the only thing you have to know is the basics well..
EMAIL SECURITY
EMAIL HACKINGS AND SECURTIY
There are a thousand hacking at the branches of evil to one who is striking at the root.Hacking a email is so easy ,learn from here..
Google itself is a tool for hacking
USE GOOGLE FOR HACKING
There are so many hacks available for Google, Google itself is great tool for hacking..
Computer Tips and Tricks
COMPUTER TIPS AND TRICKS
Learn all computer tips and tricks from here and utilize it for making your computer at its top..
 Email and Internet Security
ARE YOU SECURE
Mail and internet security is essential for everyone, try to be more secure when you are online..
Command prompt tool
CMD IS A FAVOURITE HACKING TOOL FOR ALL HACKERS
Net bios or Command Prompt will be one of the favourite hacking tool for all level hackers..

Android Mobile Phones Hidden Secret Codes

1 comments
There's no other software quite like Android. Google engineered Android, and Google’s own apps run best on it. And with millions of apps, games, songs, and videos on Google Play, Android is great for fun, and for getting things done.
 
Android devices come in all kinds of sizes, with all sorts of features, and at all sorts of prices. Each version of Android is named after a dessert, and the most recent version of Android is Jelly Bean. With Android, you’re in control of your mobile experience.

So here are some secret codes that you try with your Android Mobile

*#06#-IMEI number
*#0*#-Enter the service menu on newer phones like Galaxy S III
*#*#4636#*#*-Phone information,usage statistics and battery
*#*#34971539#*#*-Detailed camera information
*#*#273282*255*663282*#*#*-Immediate backup of all media files
*#*#197328640#*#*-Enable test mode for service
*#*#232339#*#*-Wireless LAN tests
*#*#0842#*#*-Backlight/vibration test
*#*#2664#*#*-Test the touchscreen
*#*#1111#*#*-FTA software version(1234 in the same code will give PDA and Firmware version
*#12580*369#-Software and hardware info
*#9090#-Diagnostic configuration
*#872564#-USB logging control
*#9900#-System dump mode
*#301279#-HSDPA/HSUPA Control Menu
*#7465625#-View phone lock status
*#*#7780#*#*-Reset the/data partition to factory state
*2767*3855#-Format device to factory state(will delete everything on phone)
##7764726-Hidden service menu for Motorola Droid

You can also try secret codes for other mobiles 

Secret codes for Nokia Mobile
Secret codes for Sony Ericsson
Secret codes for Motorola
Secret codes for Siemens Mobile
Secret codes for China Mobiles
Other Cell phone Hacks



continue reading

Tip to Protect HTML and CSS codes

0 comments

Piracy is one of the major problem facing by all developers in almost every fields. In case of web development also, it seems to very high. Normally such people will copy down the CSS and HTML Codes in their websites and use them for their personal use. Here I am introducing a new method to protect your codes and thus avoiding the direct copying of your HTML and CSS Codes by encrypting it. For that we are going to use a tool called online Encryptor that can convert your HTML codes to some other forms

Click Here to use this tool

This Online Tool will help you to protect your HTML, CSS or other Client side codes from others by encoding the whole code into some other forms and retaining it to its original form during run-time. So whenever anyone view your source code from their browser, they will only see the encoded code.
  • In order to use this, first copy and paste your native HTML code, in to the first Box and click Encrypt button. 
  • An Encoded code is produced in the second box in the form of JavaScript, just copy and paste this code into your HTML file and preview it in your browser.
  •  You can see the normal HTML page. Now just Check for its source. Surprised !!.
If you found this tool helpful, Please share it.

continue reading

SNMP Enumeration using snmpwalk and snmputil

0 comments
Simple Network Management Protocol (SNMP) is application protocol for managing devices on IP networks. Devices include routers, switches, servers, workstations, print servers and more. Though it helps managing network devices,SNMP never seems to get the attention These days. The reason for this is vulnerabilities that it has.

SNMP is based on Manager-Agent communications. Managers, called administrative computers, have the task of monitoring or managing a group of hosts or devices on a computer network. Each managed system executes, at all times, a software component called an agent which reports information via SNMP to the manager. The agents recognizes their managers using a string called community string(same as password),which is send on each request.

This tutorial doesnot provides detailed description on SNMP.This tutorial focuses on enumerating an SNMP Agent.For those whose are not familiar with SNMP,I suggest a quick read through

http://net-snmp.sourceforge.net/
ttp://docwiki.cisco.com/wiki/Internetworking_Technology_Handbook

This tutorial uses 2 utilities snmpwalk and snmputil. Snmpwalk dumps a lot of information on a single run that includes open ports, services, users, ipaddresses, interfaces and a lot more. While snmputil can be used to retrieve a particular information such as system name.

Download SNMP now

Few basic terms

MIB - (Management Information Base) - provides a standard representation of the SNMP agent's available information and where it is stored.

OID –(Object Identifier)-identifier for each object kept in MIB.

Eg- .1.3.6.1.2.1.1.1.0

Enumeration using snmpwalk and snmputil

Step 1: start snmpwalk

Step 2: Give the address of the target agent. Change the version of the snmp according to the target agent. If you don’t know version of agent then try it with different ones.SNMP supports SNMPv1,SNMPv2 and SNMPv3.you can switch between these versions in the version combobox.Keep the root OID and request as it is. You should find community String for the agent before using these utilities.For that you can use any of SNMP bruteforce tools.


Step 3: press the sscan button. When scanning is finished you will be asked. To give name and location of a text file for dumping the information


Step 4: Open the dump file to see the results.

Some important information OIDs are:

DUMP FILE

System info

.1.3.6.1.2.1.1.1.0 = String: "Hardware: Intel64 Family 6 Model 37 Stepping 2 AT/AT COMPATIBLE - Software: Windows Version 6.1 (Build 7600 Multiprocessor Free)"

System name

.1.3.6.1.2.1.1.5.0 = String: "MISHAL-PC"

OpenPorts

.1.3.6.1.2.1.6.13.1.3.0.0.0.0.135.0.0.0.0.0 = INTEGER: 135(msrpc)
.1.3.6.1.2.1.6.13.1.3.0.0.0.0.902.0.0.0.0.0 = INTEGER: 902
.1.3.6.1.2.1.6.13.1.3.0.0.0.0.912.0.0.0.0.0 = INTEGER: 912
.1.3.6.1.2.1.6.13.1.3.0.0.0.0.1025.0.0.0.0.0 = INTEGER: 1025
.1.3.6.1.2.1.6.13.1.3.0.0.0.0.1026.0.0.0.0.0 = INTEGER: 1026
.1.3.6.1.2.1.6.13.1.3.0.0.0.0.1027.0.0.0.0.0 = INTEGER: 1027
.1.3.6.1.2.1.6.13.1.3.0.0.0.0.1028.0.0.0.0.0 = INTEGER: 1028
.1.3.6.1.2.1.6.13.1.3.0.0.0.0.1031.0.0.0.0.0 = INTEGER: 1031
.1.3.6.1.2.1.6.13.1.3.0.0.0.0.1121.0.0.0.0.0 = INTEGER: 1121
.1.3.6.1.2.1.6.13.1.3.0.0.0.0.1433.0.0.0.0.0 = INTEGER: 1433

Users

.1.3.6.1.4.1.77.1.2.25.1.1.5.71.117.101.115.116 = String: "Guest"
.1.3.6.1.4.1.77.1.2.25.1.1.6.77.73.83.72.65.76 = String: "MISHAL"
.1.3.6.1.4.1.77.1.2.25.1.1.13.65.100.109.105.110.105.115.116.114.97.116.111.114 = String:
"Administrator"
.1.3.6.1.4.1.77.1.2.25.1.1.14.86.85.83.82.95.77.73.83.72.65.76.45.80.67 = String:
"VUSR_MISHAL-PC"
.1.3.6.1.4.1.77.1.2.26.0 = INTEGER: 1
.1.3.6.1.4.1.77.1.2.27.1.1.5.85.115.101.114.115 = String: "Users"
.1.3.6.1.4.1.77.1.2.27.1.2.5.85.115.101.114.115 = String: "C:\Users"
.1.3.6.1.4.1.77.1.2.27.1.3.5.85.115.101.114.115 = String: ""

Services
.1.3.6.1.4.1.77.1.2.3.1.1.9.73.80.32.72.101.108.112.101.114 = String: "IP Helper"
.1.3.6.1.4.1.77.1.2.3.1.1.9.84.101.108.101.112.104.111.110.121 = String: "Telephony"
.1.3.6.1.4.1.77.1.2.3.1.1.10.68.78.83.32.67.108.105.101.110.116 = String: "DNS Client"
.1.3.6.1.4.1.77.1.2.3.1.1.10.83.117.112.101.114.102.101.116.99.104 = String: "Superfetch"
.1.3.6.1.4.1.77.1.2.3.1.1.11.68.72.67.80.32.67.108.105.101.110.116 = String: "DHCP Client"
.1.3.6.1.4.1.77.1.2.3.1.1.11.87.111.114.107.115.116.97.116.105.111.110 = String: "Workstation"
.1.3.6.1.4.1.77.1.2.3.1.1.12.83.78.77.80.32.83.101.114.118.105.99.101 = String: "SNMP Service"

Snmpwalk dumps all the information from the agent MIB.if you only want to get only a few information, you can use snmputil for that. For example to retrieve hardware details of agent you can use
Snmputil requesttype ipaddress communityString OID
As in the figure.

continue reading

Trick to rename Refresh in Windows XP

1 comments
Resource Hacker has been designed to:

1. View resources in Win32 executable files (*.exe, *.dll, *.cpl, *.ocx) and in Win32 resource files (*.res) in both their compiled and decompiled formats.

2. Extract (save) resources to file in: *.res format; as a binary; or as decompiled resource scripts or images. Icons, bitmaps, cursors, menus, dialogs, string tables, message tables, accelerators, Borland forms and version info resources can be fully decompiled into their respective formats, whether as image files or *.rc text
files.

3. Modify (rename or replace) resources in executables. Image resources (icons, cursors and bitmaps) can be replaced with an image from a corresponding image file (*.ico, *.cur, *.bmp), a *.res file or even another *.exe file. Dialogs, menus, stringtables, accelerators and messagetable resource scripts (and also Borland forms) can be edited and recompiled using the internal resource script editor.Resources can also be replaced with resources from a *.res file as long as the replacement resource is of the same type and has the same
name.

4. Add new resources to executables.Enable a program to support multiple languages, or add a custom icon or bitmap (company logo etc) to a program's dialog.

5. Delete resources.
Most compilers add resources into applications which are never used by the application. Removing these unused resources can reduce an application's size.

Hope you all got enough information about Resource hacker, We have already seen a trick to change windows logon message using resource hacker, Now can continue with our trick. Follow the steps one by one. In mean time you can also learn more Registry hacks and other hacks

Step1. Download Resource hacker for free


Step2:- Open Resource Hacker and click open.
Step 3: Choose Shell32.dll>Menu>215>1033


Step4:- change the word ‘Refresh' to ‘Any other name’ as shown below



Step5:-After Changing the appropriate options,Compile the script by Compile script option.

Step6:- Save as the file at another location.Please ensure that it must not be the original location of Shell32.dll

Step7:- Now open Replacer tool

Step8:- Drag & Drop Shell32.dll file from  system32 in Replacer than press Enter Key.

Step9:- Now Drag & Drop new Save as file on Replacer. Than press enter


Step10:-Press y and reboot the System

Thats it yor are done, Now after rebooting your system, when you right click from your desktop you can see the menus as shown below
continue reading

Hack Window Logon Message using Resource Hacker

0 comments
Resource Hacker has been designed to:
 
1. View resources in Win32 executable files (*.exe, *.dll, *.cpl, *.ocx) and in Win32 resource files (*.res) in both their compiled and decompiled formats.

2. Extract (save) resources to file in: *.res format; as a binary; or as decompiled resource scripts or images. Icons, bitmaps, cursors, menus, dialogs, string tables, message tables, accelerators, Borland forms and version info resources can be fully decompiled into their respective formats, whether as image files or *.rc text
files.

3. Modify (rename or replace) resources in executables. Image resources (icons, cursors and bitmaps) can be replaced with an image from a corresponding image file (*.ico, *.cur, *.bmp), a *.res file or even another *.exe file. Dialogs, menus, stringtables, accelerators and messagetable resource scripts (and also Borland forms) can be edited and recompiled using the internal resource script editor.Resources can also be replaced with resources from a *.res file as long as the replacement resource is of the same type and has the same
name.

4. Add new resources to executables.Enable a program to support multiple languages, or add a custom icon or bitmap (company logo etc) to a program's dialog.

5. Delete resources.
Most compilers add resources into applications which are never used by the application. Removing these unused resources can reduce an application's size.

Hope you all got enough information about Resource hacker, Now can continue with our trick. Follow the steps one by one. In mean time you can also learn more Registry hacks and other hacks

Step1. Download Resource hacker for free


Step2:- Open Resource Hacker and click open.

Step3:- Choose C:>>windows>>system32>>logonui.exe

Step4:- Choose logonui.exe>String Table>1>1033

Step5:- change the word ‘Welcome’ to ‘Your Own message‘



Step6:-After Changing the appropriate options,Compile the script by Compile script option.

Step7:- Save as the file at another location. Please ensure that it must not be the original location of logonui_new.exe

Step8:- Now open Replacer tool


Step9:- Drag & Drop logonui.exe file from system32 in Replacer than press Enter Key


Step10:- Now Drag & Drop new Save as file on Replacer. than press enter


Step10:-Press y and reboot the System




Thats it your done ! The next time you ON your system Welcome message will be changed. Hope you enjoyed this.
continue reading

Finding IP address of anyone-Exposed trick

4 comments
Well, When talk about hacking someone the first thing comes to our mind will be about how to find the IP address of the person.Finding the IP address is the only way to attack a remote system.We have already discussed some techniques like How to track any one get their details by sending email. and Tracking using Spypig and some alternate ways to find ip by any means by email or through websites or blog or forums. You can also read this, The easiest way to get the ip of anyone. For hacking anyone, the first stage is, of course, collecting information about the victim. This stage mainly consists of finding IP Address of the victim, so that you can perform further hacks like Port scanning, Netbios, etc using the IP Address.Here I am providing you the exact script to find the IP address of remote system.

STEP BY STEP INSTRUCTIONS

1 . For finding the IP address of a remote system, You need 2 files
  • PHP SCRIPT FILE ( for fetching the ip address of remote PC )
  • TEXT FILE ( To save the IP details in the form of text )

2. Below is the php script to find the IP address of anyone.Just copy the below script, paste it to notepad and save it as PHP, that is with the extension .php. or download the file from here


<?php

$ip = $_SERVER['REMOTE_ADDR'];

$dt = date("l dS \of F Y h:i:s A");

$file=fopen("log.txt","a");

$data = $ip.' '.$dt."\n";

fwrite($file, $data);

fclose($file);

header( 'Location: http://www.google.com' ) ;

?>


3. Now just create a log.txt file ( use the name mentioned in the php file) .

4. Upload these 2 files, thatis the log.txt and php file to any of the free hosting services and use the direct link of the php file to target the ip of any system. If any one clicks on this php file their IP and other details will be recorded in your log.txt file. Its all depends on your creativity to how to use this by either by email or using facebook or anyother.

NOTE: In the last line of php file there is a field called location. It is the Redirect URL for you php file.That is here if any one clicks onthis php file they will automatically redirected to www.google.com. You can use your own links like youtube videos or anyother.

Once you obtained IP address of anyone you can trace the full details or You can even try to Brute force attak that IP if you know more personal details about the person using that ip.

SECURITY MEASURES

So far we have discussed about ways of finding any remote IP and attacking it. But to keep ourselves secure from such IP based attacks you need to be in internet anonymously. That is by hiding all your personal details. You can achieve this by using some proxy servers or using some IP hiding softwares.You can also read this Anonymous web browsing using Super Hide IP
continue reading

Create Video Games on Windows PC with Microsoft Kodu

2 comments
Microsoft Research released a community game cum programming environment for the Xbox 360 called Kodu. Unlike most other video games, Kodu would let players create their own video games for the Xbox without any prior knowledge of programming.

What is Kodu?

Kodu lets kids create games on the PC and XBox via a simple visual programming language. Kodu can be used to teach creativity, problem solving, storytelling, as well as programming. Anyone can use Kodu to make a game, young children as well as adults with no design or programming skills.

The initial version of Kodu required the Xbox 360 console but now Kodu is available as a free download for your Windows PC as well. This means you no longer need an Xbox to design games with Kodu and you can play them on just about any computer using a keyboard and mouse (or an Xbox game controller, if you have one).

The entire Kodu program is more like a video game than a programming environment. It includes several tutorials to help you quickly figure out how to create new games, or you can look at the sample games bundled with the program for new ideas.

You can easily edit any game by pressing escape, make the changes and then jump back into playing the game with your changes. Although you cannot edit every little thing inside the game, it still gives you a nice launch pad for creating simple games.

You can download Kodu for PC from fuse.microsoft.com/kodu. Additionally, the graphics settings can be turned down to allow it to run on a computer with lower resources. Kodu requires .NET 3.5 and the XNA framework 3.1 to run - if you don’t have them, the Kodu installer will automatically download and install them for you.

Kodu Teaches more than Programming

  • Kodu is a rich tool for narrative creation and storytelling
  • Kodu demonstrates that programming is a creative medium
  • Kodu helps children with critical thinking, breaking a complex goal into manageable steps, and iterate on the design process – an approach applicable to all academic subjects, business and personal relationships
  • Kodu introduces the logic and problem solving of programming
  • Kodu introduces conditions and sequences, which teaches cause and effect
  • Students learn about cooperation, logic and creativity in addition to programming
System Requirements
  • Operating Systems:
  • Windows 7
  • Windows Vista
  • Windows XP (latest updates required)
  • Additional requirements:
  • A graphics card that supports DirectX 9.0c and Shader Model 2.0 or higher
  • .NET Framework 3.5 or higher
  • XNA Framework 3.1 Redistributable

Here are the screen shots of some games created using Kodu 






continue reading

Binders and Crypters to make your virus file FUD

10 comments
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

Encryption software executes an algorithm that is designed to encrypt computer data in such a way that it cannot be recovered without access to the key. Software encryption is a fundamental part of all aspects of modern computer communication and file protection and may include features like file shredding.The purpose of encryption is to prevent third parties from recovering the original information. This is particularly important for sensitive data like credit card numbers. Similarly this technique can be used for virus files to make it undectable to the antivirus programs.

On other hand, Binding Exe files means combining 2 or more exe files so that running the main execution file will also run a hidden execution file in background without the knowledge of user who is running it. Normally binding technique is done to make some virus files (mostly keyloggers) attach to some genuine softwares so that when anyone install this software, The keylogger attached to it also gets installed without the knowledge or permission of the user who is installing it.We have already discussed some binding method with Windows Own tool called IEXPRESS. You can also read How to create keyloggers And How to defend against autorun and other viruses. Ok lets continue with Crypting and Binding, we are using a tool called Chrome Crypter to bind and Crypt exe files

DOWNLOAD LINK


INSTRUCTIONS

1. Extract all the files and run Chrome Crypter to see a window as shown below.


2. Select the 2 files to bind and you can even Select icon for the final exe file.



After selecting the exe files to bind, just click the Protect button and select the location to save the final crypted and binded EXE file and thats it ..Enjoy !!!!!!!!

If you found this article useful please pass your comments and help us by sharing this article..
continue reading

Trick to undo or callback a Sent Email from Gmail

0 comments
Gmail is a free, advertising-supported email service provided by Google, With an initial storage capacity offer of 1 GB per user, Gmail significantly increased the webmail standard for free storage from the 2 to 4 MB its competitors such as Hotmail offered at that time.Individual Gmail messages, including attachments, may be up to 25 MB, which is larger than many other mail services support. Gmail has a search-oriented interface and a "conversation view" similar to an Internet forum. Gmail is noted by web developers for its pioneering use of AJAX.

So far we seen the advantages of Gmail and I am pretty sure that you all may be using this service regularly, that is for sending Emails or other important doccuments through your Gmail. But what happens when you accidently send an incomplete Email, Its gone !! and you can't retrieve or block it. But it can be done with the help of an application designed by Google Labs just add this to your Gmail account and thats it you will be prompted with an extra option named UNDO as seen below.


WHAT IS GOOGLE LABS

The Gmail Labs feature, introduced on June 5, 2008, allows users to test new or experimental features of Gmail, such as bookmarking of important email messages, custom keyboard shortcuts and games. Users can enable or disable Labs features selectively and provide feedback about each of them. This allows Gmail engineers to obtain user input about new features to improve them and also to assess their popularity and whether they merit developing into regular Gmail features. All Labs features are experimental and are subject to termination at any time. 

HOW TO SET UP THIS FEATURE IN YOUR GMAIL.

1. Adding this application to your Gmail Account is simple, Just goto Mail settings, You can see a window as shown below.


 
2. Just select the Labs tab to see a number of supported apps, from this select UNDO SEND as shown below.




3. Just enable this feature to activate UNDO SEND and save your changes. Thats it and enjoy..
continue reading