sign text quotes

..

* * * * * * * * * * * * * * * * * * * * * * * *

teach me rulz i will teach u how to break it..........

teach me rulz i will teach u how to break it..........

Hi Friends

below u can see a comment box please comment me so that i can improve my site i m in developing state and want to make worlds best blog so please help me

Tuesday, June 3, 2008

Ethical rapidshare hacking -Proxy Browser

After searching a lot i found dis amazing thing. its like a proxy browser. It can change your permanent IP to static IP. so just when u restart your browser u will have new IP... u can also set intervals between changing your proxy...so now download multiple files at d same time......it also has integration of IDM with it..

Rapidshare hacking



tip:

u have to close this particular browser than open again and it will start downloading from RAPIDSHARE again no need to disconnect..
easy..

The software name is TORPAK.
Download it here.

Get a New IP Address Even If You Have a Static IP

To start off, you need a direct connection to your modem and computer. If you have a router, disconnect it and directly hook up your modem to your computer.

1. Open up the command prompt by pressing Start->Run and typing in cmd

2. In the command prompt, type “Ipconfig/all”. This will tell you your current IP Address. After, type “ipconfig/release”. Keep the command prompt open for easy access.

3. Go to “Network Connections” (accessible through the control panel). Right click “Local Area Connection” and click “Properties”

4. With “Internet Protocol (TCP/IP) selected, click the “Properties” button.

5. A new window will open. Under the “General” tab, select “Use the Following IP address”. Under “Ip Address”, put “10.0.0.1″. Press the “Tab” key on your keyboard.

6. Press Ok on both open windows.

7. Repeat steps 3-4. Under the “General” tab, press the radio button “Automatically Assign Me an Ip Address”. Press ok on both windows.

8. Go back to the command prompt and type in “Ipconfig/all”. You’ll now notice you have a new IP address.

So, this will be handy if you want to by-pass Rapidshare 1 hour download limit, provided that you have a static IP address.

Top 10 Password Crackers

After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. Fyodor asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed them to expand the list to 100 tools, and even subdivide them into categories. This is the category page for password crackers -- the full network security list is available here. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with.


Here is the list, starting with the most popular:

#1
Windows
GUI Interface
Cain and Abel : The top password recovery tool for Windows
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented.

Also categorized as: packet sniffers


#2
Linux
*BSD
OS X
Windows
Command-line interface
Source code
John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here, here, or here.

#3
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
THC Hydra : A Fast network authentication cracker which support many different services
When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC.

#4
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Aircrack : The fastest available WEP/WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

Also categorized as: wireless tools


#5
  TITLE=
Windows
GUI Interface
L0phtcrack : Windows password auditing and recovery application
L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, but you can still find the LC5 installer floating around. The free trial only lasts 15 days, and Symantec won't sell you a key, so you'll either have to cease using it or find a key generator. Since it is no longer maintained, you are probably better off trying Cain and Abel, John the Ripper, or Ophcrack instead.

#6
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Airsnort : 802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. You may also be interested in the similar Aircrack.

Also categorized as: wireless tools


#7
  TITLE=
Windows
GUI Interface
SolarWinds : A plethora of network discovery/monitoring/attack tools
SolarWinds has created and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force cracker, router password decryption, a TCP connection reset program, one of the fastest and easiest router config download/upload applications available and more.

Also categorized as: traffic monitoring tools


#8
Windows
Command-line interface
Source code
Pwdump : A window password recovery tool
Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file.

#9
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
RainbowCrack : An Innovative Password Hash Cracker
The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.

#10
Windows
GUI Interface
Brutus : A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more. No source code is available. UNIX users should take a look at THC Hydra.
MySpace Codes, Myspace Generators, Myspace Graphics

download you tube vedios without any effort

Download youtube Video