Thursday, 28 March 2013

'Biggest cyber-attack in history' slows down internet worldwide after quarrel between web-hosting company and anti-spam group

Internet users worldwide are having to endure slow connections after the biggest cyber-attack in history.



The attackers are throwing so much digital traffic at online networks that they have reportedly disrupted access to popular sites such as Netflix, the on-demand TV streaming service. 

Tonight there were fears that any worsening of the attack could affect web browsing and emails.

The onslaught has focused attention on the extent to which modern communications depend on the internet. Matthew Prince, chief executive of CloudFlare, one of the firms dealing with the assault, likened it to a series of digital “nuclear bombs”. “It’s so easy to cause so much damage,” he added.
The attack is believed to have begun last week, when Spamhaus, an anti-spam organisation, was hit by a wave of digital traffic that knocked its website offline. 

The body draws up  lists of the servers used to send spam messages around the world. Email administrators use these lists to block spam.

But last week one of the spammers irked by Spamhouse’s work is believed to have launched the massive distributed denial of service, or DDoS, attack to bring down the anti-spam group.

Saturday, 23 March 2013

EASY WEBSITE HACKING FOR BEGINNERS|A Complete Guide

EASY WEBSITE HACKING FOR BEGINNERS |A Complete Guide| :


REMEMBER :

RULE 1. Destruction of anyone's hard work is a shame and nothing to be proud of!!!
RULE 2. All my Tutorials are for Educational Purpose Only and as usual I vehemently refuse to accept any responsibility for its Misuse.
RULE 3. In no way will I accompany you to any correctional facility or help pay the fine Imposed for being stupid enough to get caught in the first place!
RULE 4. REMEMBER to REMEMBER THAT YOU NEED TO USE FIREFOX!!!

STEP BY STEP INSTRUCTION :

* STEP 1. Go to GOOGLE!!!

* STEP 2. TYPE AND SEARCH FOR :

" Powered by EasySiteNetwork /category.php "
(REMEMBER : When you are choosing a site to hack, make sure you dont choose one mentioning about sql injection...)

* STEP 3. APPLYING THE EXPLOIT :
Make sure the url of the site you chose contains category.php somewhere in the link.Now copy the Script given below and starting from category.php highlight the rest of the url and replace it with the given script.

" /category.php?catid=1+union+select+111,222,concat_ws(char(58),login,password,email),444+from+users/* "

HIT Enter and notice the changes to the page.

* STEP 4. INTERPRETING THE RESULT :
The user information will be displayed along this format :
Username: Password: Email

NOTE: Incases having more then one username and password, then most likely the one displayed second is the Admin Account...


* STEP 5. LOGGING INTO THE ADMIN CONTROL PANEL :
In order to login to the Admin Control Panel, Just add the following extension to the original url :

" /siteadmin/index.php "

NOTE: In most cases you'll see the popup for the Admin Control Panel login, but if in few cases it is-int displayed or doesn't work, then just login like any other user would on the home page.


* STEP 6. Congrats!!! You are now logged into the Admin Control Panel and you have complete access to do as you please.(Doesnt mean you Deface a site!!!)
If you can find out the server or host on which your victims website is Hosted, you can even login to their FTP by typing in a false path!!!

If you are going to copy these posts...Don't forget to credit our work :)

Happy Hacking ;) !!!

Thursday, 21 March 2013

Saints Row: The Third - PC Game

Saints Row: The Third

  • Developer: Volition
  • Publisher: THQ
  • Genre: Action
  • Release Date: November 15, 2011 (US)

Saints Row: The Third

Years after taking Stilwater for their own, the Third Street Saints have evolved from street gang to household brand name, with Saints sneakers, Saints energy drinks and Johnny Gat bobble head dolls all available at a store near you. The Saints are kings of Stilwater, but their celebrity status has not gone unnoticed. The Syndicate, a legendary criminal fraternity with pawns in play all over the globe, has turned its eye on the Saints and demands tribute.

Minimum System Requirements

  • OS: Windows XP/Vista/7
  • Processor: Intel Core 2 Duo @ 2.0 Ghz / AMD Athlon 64 X2 4200+
  • Memory: 2 Gb
  • Hard Drive: 15 Gb free
  • Video Memory: 256 Mb
  • Video Card: nVidia GeForce 8600 / ATI Radeon HD 2600 Pro
  • Sound Card: DirectX Compatible
  • Network: Broadband Internet Connection for Online Multiplayer
  • DirectX: 9.0c
  • Keyboard
  • Mouse
  • DVD Rom Drive

Recommended System Requirements

  • OS: Windows 7
  • Processor: Intel Core i5 @ 2.66 GHz / AMD Phenom II X4 @ 2.8 GHz
  • Memory: 4 Gb
  • Hard Drive: 15 Gb free
  • Video Memory: 1 Gb
  • Video Card: nVidia GeForce GTX 460 / ATI Radeon HD 5850
  • Sound Card: DirectX Compatible
  • Network: Broadband Internet Connection for Online Multiplayer
  • DirectX: 10
  • Keyboard
  • Mouse
  • DVD Rom Drive

 

Download Saints Row: The Third – Direct Links

Part 1 – 700 MB

Part 2 – 700 MB

Part 3 – 700 MB

Part 4 – 700 MB

Part 5 – 700 MB

Part 6 – 700 MB

Part 7 – 700 MB

Part 8 – 700 MB

Part 9 – 700 MB

Part 10 – 700 MB

Part 11 – 700 MB

Part 12 – 700 MB

Part 13 – 167 MB

Crack

www.elj-games.blogspot.com

Assassin's Creed: Brotherhood

Assassin's Creed: Brotherhood

  • Publisher: Ubisoft
  • Developer: Ubisoft Montreal
  • Release Date: March 17, 2010 (US)
  • Genre: Action

About Assassin's Creed: Brotherhood

Now a legendary Master Assassin, Ezio must journey into Italy's greatest city, Rome, center of power, greed and corruption to strike at the heart of the enemy. Defeating the corrupt tyrants entrenched there will require not only strength, but leadership, as Ezio commands an entire Brotherhood that will rally to his side. Only by working together can the Assassins defeat their mortal enemies.

Assassin’s Creed Brotherhood Minimum System Requirements

  • OS: Windows® XP (32-64 bits) /Windows Vista®(32-64 bits)/Windows 7® (32-64 bits)
  • CPU: Intel Core® 2 Duo 1.8 GHZ or AMD Athlon X2 64 2.4GHZ
  • RAM: 1.5 GB Windows® XP / 2 GB Windows Vista® - Windows 7®
  • VIDEO: 256 MB DirectX® 9.0-compliant card with Shader Model 3.0 or higher (see supported list*)
  • DX: 9.0
  • HARD DRIVE: 8 GB
  • SOUND: DirectX 9.0 -compliant sound card
  • PERIPHERALS: Keyboard, mouse, optional controller
  • Supported Video Cards: ATI® RADEON® HD 2000/3000/4000/5000/6000 series, NVIDIA GeForce® 8/9/100/200/300/400/500 series
  • Note* * This product does not support Windows® 98/ME/2000/NT

Assassin’s Creed Brotherhood Recommended System Requirements

  • OS: Windows® XP (32-64 bits) /Windows Vista®(32-64 bits)/Windows 7® (32-64 bits)
  • CPU: Intel Core® 2 Duo E6700 2.6 GHz or AMD Athlon 64 X2 6000+ or better
  • RAM: 1.5 GB Windows® XP / 2 GB Windows Vista® - Windows 7®
  • VIDEO: GeForce 8800 GT or ATI Radeon HD 4700 or better
  • SOUND: 5.1 sound card
  • PERIPHERALS: joystick optional (Xbox 360® Controller for Windows recommended)
  • Supported Video Cards: ATI® RADEON® HD 2000/3000/4000/5000/6000 series, NVIDIA GeForce® 8/9/100/200/300/400/500 series
  • Note* * This product does not support Windows® 98/ME/2000/NT

Assassin's Creed Brotherhood (1)

Assassin's Creed Brotherhood (2)

Assassin's Creed Brotherhood (3)

Assassin's Creed Brotherhood (4)

Assassin's Creed Brotherhood (5)

Download Assassin's Creed: Brotherhood – Direct Links

Part 1 – 700 MB

Part 2 – 700 MB

Part 3 – 700 MB

Part 4 – 700 MB

Part 5 – 700 MB

Part 6 – 700 MB

Part 7 – 700 MB

Part 8 – 700 MB

Part 9 – 700 MB

Part 10 – 700 MB

Part 11 – 700 MB

Part 12 – 272 MB

CRACK

www.elj-games.blogspot.com

Wednesday, 20 March 2013

Street Fighter X Tekken

Street Fighter X Tekken

  • Developer: Capcom Namco
  • Publisher: Capcom
  • Genre: Fighting, Action
  • Release Date: March 6, 2012 (US)

About Street Fighter X Tekken

Street Fighter x Tekken makes history as fighters from these two bastions of the fighting genre come together for the very first time. Utilizing the same 2D viewpoint and technology that powered Street Fighter IV, this game allows for Tekken characters such as Kazuya Mishima and Nina Williams to make the transition into the Street Fighter universe having been re-imagined using Capcom's much-loved art style. Their looks may be different, but these characters have retained their own unique characteristics and signature moves as they go head-to-head with classic brawlers from the Street Fighter franchise in what promises to be an explosive match up.

Minimum System Requirements

  • OS: Windows XP
  • Processor: Intel Core 2 Duo @ 1.8 Ghz / AMD Athlon 64 X2 3800+
  • Memory: 1 Gb
  • Hard Drive: 10 Gb free
  • Video Memory: 256 Mb
  • Video Card: nVidia GeForce 6600 / ATI Radeon X1300
  • Sound Card: DirectX Compatible
  • Network: Broadband Internet Connection
  • DirectX: 9.0c
  • Keyboard
  • Mouse

Recommended System Requirements

  • OS: Windows XP/Vista/7
  • Processor: Intel Core 2 Duo @ 2.6 GHz / AMD Athlon 64 X2 5600+
  • Memory: 2 Gb
  • Hard Drive: 10 Gb free
  • Video Memory: 512 Mb
  • Video Card: nVidia GeForce 8800 / ATI Radeon HD 2900
  • Sound Card: DirectX Compatible
  • Network: Broadband Internet Connection
  • DirectX: 9.0c
  • Keyboard
  • Mouse

Download Street Fighter X Tekken – Direct Links

Part 1 – 700 MB

Part 2 – 700 MB

Part 3 – 700 MB

Part 4 – 700 MB

Part 5 – 700 MB

Part 6 – 700 MB

Part 7 – 404 MB

Crack

www.elj-games.blogspot.com

Tuesday, 19 March 2013

SMAC : THE MAC ADDRESS CHANGER

SMAC : THE MAC ADDRESS CHANGER 

 

SMAC is a powerful and easy to use MAC Address Changer (Spoofer) for Windows systems, regardless of whether the network card manufacturers allow this option or not. Its features include:
  • Automatically Activate new MAC Address after changing it
  • Show the manufacturer of the MAC Address 
  • Randomly Generate any New MAC Address or based on a selected manufacturer
  • Pre-load MAC Addresses List and choose the new MAC address from the list.
  • IPConfig button - click to show network adapter (IPConfig) info to confirm changes
  • User-friendly GUI
Download here:

http://download.cnet.com/SMAC-MAC-Address-Changer/3000-2085_4-10536535.html

 

Ultimate hack pack 2:

Ultimate hack pack 2:
Apache Hacking TooLz Directory:
Apache Chunked Scanner
Apache Hacker Tool v 2.0
Apache H4x0r Script

Remote File Inclusion And Remote Command Execution Directory :
IIS 5 Dav Scanner & Exploiter
PHP Attacker
PHP Injection Scanner & Exploiter
XML-RPC Scanner & Exploiter

Databases & SQL Injection & XSS TooLz Directory:
Casi 4.0
ForceSQL
Mssql BruteForce TooL
SQL Ping 2
SQL Recon
SQL Vuln Scanner
SQL & XSS TooL

PHP Shells:
rootshell v2.0
c99shell #16
Backdoor php v0.1
r57shell
ajan
casus15
cmd (asp)
CyberEye (asp)
CyberSpy5 (asp)
Indexer (asp)
Ntdaddy (asp)
News Remote PHP Shell Injection
PHP Shell
phpRemoteView
nstview php shellb

http://uploading.com/files/d6b672f7/%20Ultimate_H4ack_p4ck_2.rar/

EMAIL SPAMMER

I though it would be interesting to share it here with you guys.

And use these email bombers in your dirty job:

I FOUND THIS FKING LIST OF BOMBER SO PLEASE SKIP THE ADD  ITS NOT MY OWN LINK SORRY FOR THAT 

1st Mass Mailer 4.2
This tool will help you to mass spam emails. Little bit complicated but very very effective.
Serial: "18935379480889"

Download

1st Mass Mailer 6.4
This tool will help you to mass spam emails. Little bit complicated but very very effective.
Thanks to elvinguitar for the serial

Download

Mess Bomber
This is also a spammer bot. Same as the previous one , can be used to spam any email you want quickly and easily.
Download

Fill-er-up collection
This 3 softwares are spammers. you can use these tools to spam any email you want very quickly and in only few steps. Ability to attach a file and to stop any time you want. Very effective. All credit go to Nathan72389
Download

Bomb Them!
This is also a spammer bot. Same as the previous one , can be used to spam any email you want quickly and easily. Ability to attach a file and to stop any time you want. All credit go to Nathan72389
Download

72389 Email Bomber
This tool will help you to spam any email you want. This one is special because you have the ability to spam from different email at the same time. All credit go to Nathan72389
Download

Vallen emailer
This tool will help you to spam the emails you want. Ability to choose between a rich text or an html text. Also you can attack files to the message. Try it from here
Download

BOMB MOBILE PHONE WITH SMS : BEAVER'S SMS BOMBER PRO | way2hackintosh

BOMB MOBILE PHONE WITH SMS : BEAVER'S SMS BOMBER PRO

note:- I AM NOT RESPONSIBLE FOR ANY KIND OF DAMAGE U MAKE 

This program will bomb the victim's mobile phone with tons of SMS. It supports all major networks around the world. But if your network is not in the list, then don't worry, you can also add the carrier network with the help of "custom" option. You can also load list of multiple victims and bomb them simultaneously. The improvement that Beaver has made in this version over his previous SMS Bomber is that you can spoof the email address from which you are bombing the victim's mobile phone. For Example, If there was an error sending the message, it will ask you if you wanna change the E-mail/Password you are using. All credits to Beaver for this nice program.

Download here 

JUST CLICK HERE AND FINE IT

or
http://www.mediafire.com/?oyicf11y9n11y9v 

comment for broken link 

Free BSNL 3G Hack & Trick 2013 ( 100% Working )

Hello Friends !! here is in 2013 latest fast proxy trick for BSNL  Network Users. This trick is working with Resume support with downloads and with YouTube, Facebook too. You can download by very fast speed also.This trick is working with 2G and 3G both.So just use it and enjoy super fast 3G speed for free.

it is also tested by me your admin jixxi :P so i guess its working

Trick 1
Use the Following New Connection For Free :-

  1. Name :3G free(any) 
  2. Service Type 1
  3.  WAP Gateway IP : 1 10.100.3.2 
  4. Port no : 1 : 9209. 
  5. Timeout: Never 
  6. CSD No.1 
  7. User Name1: ppp 
  8. Password1: ppp123 
  9. APN setting: wapwest.cellone.in 
  10. User Name : ppp 
  11. Password : ppp123
Now save the following settings and  leave the other settings as default and using this activated settings hack bsnl 3G for free new 2012 trick in bsnl mobile free for 3mbps speed browsing and downloading in bsnl 3G.

OR

Trick 2 :

Requirements:-

 1) You Must Have the 3G Supported Device . 2) 3G Activated SIM ( if you are not using 3G sim it is easy to change the plan to 3G)

 Knowledge about the changing of your internet settings. Change your Internet Settings with the Following Details :-

Name :- BSNL 3G Service
Type 1 WAP
Gateway IP : -1 10.100.3.2
Port no : 1 : 9209.
Timeout: NEVER
CSD No.1
User Name1: ppp
Password1: ppp123
APN setting: wapwest.cellone.in
User Name : ppp
Password : ppp123
By Using this Settings , you have the free internet service at 3 MBPS Speed.




Vodafone 2G & 3G Hack 2013 With Super Fast Speed By way2h

Hi Friends Today i will share the vodafone internet trick for 2013 .By this Trick you will get 6 GB Free Internet Data for 6 Months .This Latest Trick Already Tested before published in Rajasthan,Punjab,Haryana,West Bengol and other places .So hurryup



Process :-
Proxy Settings for Vodafone unlimited 3g Hack:-
Make these Settings as Below :-
Account Name:- HackingHomeMobileTrick
home page : live.vodafone.in
proxy:- 10.10.1.100
apn:- portalnmms
port:- 9401 or 8799

 just type ACT FB and then send the message to 144
after you will get conformation  msg and free internet for 6 month

if you want increase your internet data then try this again after 6 month

so enjoy and yeha keep your bal low \m/ comment if not working :)

Airtel 3G Unlimited GPRS Trick And Hack With Fastest Proxy 2013

Follow the Instructions Below :-
  1. Create A New Airtel Manual Settings
  2. Apn : airtelgprs.com
  3. Proxy : 208.77.23.4
  4. Port : 80
  5. Home Page : fb.me
  6. If Its Not Working Try live.airtelworld.com
  7. ....... read more click here 

CRETE ACCOUNT LOGIN AND READ REST OF THE TRICK 

Monday, 18 March 2013

Website Hacking Tools Collection

Includes:
- Easy SQL Injection Tool

- MySQLi Dumper v1.4 Alpha

- Server Attack

- Shell upload video
- SQLi Helper v2.5

- Super Scan 4

- Link to web-page that finds the admin log-in page of any site
- c100 shell (php file)
- Cain and Abel

- SQL Injection detailed tutorial. Watch it together with Mathias's SQL Injection tutorial, and you'll master it in no time!
- Nessus

- Nmap

- WhoIs

- Ethereal v0.99

 FileFactory Mirror:

Code:
http://www.filefactory.com/file/agh3488/n/_Website_hacking_7z

TurboUpload Mirror:

Code:
http://www.turboupload.com/yf1fukydnu3r/^^_Website_hacking.7z.html

Password:

Code:
"gamefreak" or maybe its "Gamefreak"

Enjoy! Thumbsup
 

How To Find An IP On Skype

equirements -
  • Skype - Can be downloaded Here
  • CMD - Every computer has CMD (Start > All Programs > Accessories > Command Prompt)

Step 1.

[Image: skypedownload.png]

Step 2.
  • Add the slave you wish to IP Grab.
 Step 3.
  • After adding the slave, Make sure your Skype is like this shown in the picture. 
 Step 4.
  • Double click the slave you wish to IP Grab.
 Step 5.
  • Go to Start > All Programs > Accessories > Right-click Command Prompt (CMD) & Run As Administrator. 
Step 6.
  • Close unwanted applications that are open, Such as other opened Skype friends. Leave open the slave you wish to IP Grab.

Step 7.
  • In CMD (Command Prompt) Type " netstat -nbt " (without the quotes)

Step 8.
  • A whole bunch of stuff should come up. Find [Skype.exe]

Step 9.
  • Now there will be more then one Skype.exe which is why you have to close the unwanted tabs of Skype. Now there should be 4 Not More IP's.

Step 10.
  • All you have to do now is Track does 4 (Even less) IP's and one will occur to be the one your looking for.

Hope this Tutorial is helpful, A Thanks would be appreciated.


Friday, 15 March 2013

Hack a WiFi Network In 8 Easy Steps.( Using Windows)

It takes about 5-6 hours if the password is weak a high signal of the WiFi network you are going to hack and you have sometimes 10-12 for more complicated passwords and if the WiFi signal of the Network is weak .The time taken also changes if the WiFi network you are going to hack has many other clients already accessing it .  


those who know how to hack using backtrack please don't laugh its for beginner 
Tools needed :

Packet sniffer:
* Commview for WiFi ( check it website and see if ur wifi card is supported https://www.tamos.com/
products/commwifi/adapterlist.php )
{ get the 30 day trial or use the free full version available on net from other sites.) (i recomment the 30 day trial because it will be the latest ) after it expires y can always go to other means.

You will use this tool for capturing the packets sent and recieved through the Access Point you are going to hack .The more packets you capture the better chances of cracking the password .You will need more than 1,00,000 minium packets to crack the password .The packets will be captured in the .ncp format .You will use this tool to convert the .ncp to .cap .

NOT MANY NETWORK CARDS ARE SUPPORTED SO PLEASE CHECK YOUR NETWORK ADAPTER IN DEVICE MANAGER. IF it is not supported then there is no other option then to use backtrack with extra hardware.

Decrypter :

* Aircrack suite (http://www.aircrack-ng.org/)
You will use this tool to crack the password of the Access Point using the . Cap files you obtained from the Commview application .

NOTE  :
You will need a packet sniffing program (we will use Commview for WiFi) and not airodump-ng ( already integrated in aircrack suite).

Or if YOU can get another packet sniffer that support your card then use it instead of commonview.


Now Get Ready to Hack :

Step 1 : Install CommView for WiFi . It doesnt matter whether you install it in VoIP mode or Standard mode . I used VoIP . It automatically installs the necessary drivers . Allow it to install .

Note :- You will not be able to connect to any Network using WiFi when using CommView .

Step 2 : Click on the PLAY ICON in the Left First .

Step 3 (Choosing the Network (a) ) : A new window should pop up now. Click on the START SCANNING button .
 
 
Step 4 : (Choosing the Network (b) ) : Click on the WiFi network you want to hack in the Right Coulumn and Click on CAPTURE.


Note :- This tutorial is only for WEP protected networks .
 
 Step 5 : (Capturing the Packets) : The windows should close now and you should see that CommView has started Capturing Packets .
 Step 6 : (Saving the Packets ) : Now that the Packets are getting captured you need to Save them. Click on Settings->Options->Memory Usage Change Maximum Packets in buffer to 20000.
 
 
 
 
Click on the LOGGING Tab .
Check AUTO-SAVING
In the Maximum Directory Size : 5000
Average Log File Size : 50
 
 
Now CommView will automatically Start Saving packets in the .ncp format at a size of 20MB each in the specified directory .

Step 7 : ( Concatenating the Logs ) : Since you are capturing a lot of logs you will need to concatenate them into once file . To do this go to Logging and click on CONCATENATE LOGS Choose all the files that have been saved in your specified folder and Concatenate them .

Now you will have one .ncf file .

Step 8 : (Converting .ncf to .cap ) : Now that you have one file with all the packets you need to Convert it into .cap file for AIRCRACK to crack .

Click on File->Log Viewer->Load Commview Logs-> Choose the .ncf file. Now File->Export->Wireshark/TCP dump format .

Aircrack Part :

Now for the Second Part Cracking this is very simple . Just open the Aircrack Folder->Bin->Aircrack-ng GUI.exe Choose the .cap file and you should be able to do the others .
 Also select the encryption(WEP or others) and Key size (64). Press launch and the key will be revealed.
or try other settings if not working.

Thursday, 14 March 2013

EXPLANATION ABOUT ENCRYPTION,HASHING ALGORITHMS,SALTS AND DECRYPTION


EXPLANATION ABOUT ENCRYPTION,HASHING ALGORITHMS,SALTS AND DECRYPTION !!!!




1.Encryption&Hash

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted). Hashing is a one way encryption. That means that it is not possible to use a reverse algorithm in order to come back from the hash to the password. Any way people found a way to crack hashes by using a bruteforce or dictionary attacks. Because of this hashing was made even more secure. After reading the whole tutorial you will get the point.

2.Hashing Algorithms

Cracking any hash is not that simple like running a bruteforcer. Sometimes a bruteforcer or a dictionary attack will do the job but only in a very rare situations where the algorithm is a plain md5 and where the hash is without salt. Plain md5 algorithm ? What does that mean ? Nowadays people use more complicated algorithms in order to increase the security. For example a plain md5 is an algorithm like this:


Code:
md5($pass)

What is this going to do ? This is going to make a md5 hash from the given pass. But what happens if you have something like this:

Code:
md5(md5($pass))

This makes first one md5 from the password and then another md5 hash from the new generated md5. So for example if the password is HI the results will be:

Code:
first one : md5("HI") = "bf8c144140b15befb8ce662632a7b76e"
second one: md5(md5"HI") = "ce8441edc9a85ed9839a849f99ed5ecc"

So as you can see for a same password we have two different MD5s. That is why when you are trying to crack a MD5 or any other hash ( the upper mentioned cases are the same for any other encryption out there ) it is very important to know the algorithm that was used to generate those hashes coz otherwise bruteforcing will have no sense and you will be stuck forever... There for always use a bruteforcer that allows you to enter the hash algorithm so that you can be sure that eventually you will find the password...

3. SALTS

What is a Salt ? Why do people use Salts ? Hashing became even more secure way of encrypting passwords with the use of Salts. Salt is actually a random pass phrase that is added to the main password. How it is added depends from the algorithm that was used. Salts are being used coz bruteforcing a salted hash without knowing the Salt is impossible. For example imagine that you have a password HI. See what happens in the next cases if we take 1234567890 for a salt:

Code:
md5($pass) => md5("HI") = "bf8c144140b15befb8ce662632a7b76e"
md5($pass,$salt) => md5("HI1234567890") = "4f4d880dbc772fb6acba84a98bce6136"

That is why cracking a salted hash without knowing the hash is impossible... But what happens if we know that salt ? Then we need to specify in our bruteforcer like previous mentioned the algorithm in our case => md5($pass,$salt) and we need to specify the salt. Knowing this the bruteforcer will perform the attack like a normal bruteforce except it will add the salt to every combination he makes. On the paper it goes like this :

Code:
A1234567890
AA1234567890
AAA1234567890
.
.
.

...and so on and so on. So basically every combination will end with 1234567890 and the only thing generated will be the thing before 1234567890. The use of Salts as you can see makes hashing even more secure.

4. Cracking

Cracking was mentioned during the whole tutorial but in here I will make a precise list of what you need to think before starting with decryption.

- First of all you need to figure out what type of hash do you have ( md5, sha1, mysql... )
- Then you need you need to see figure out if the hash is salted or not. If the hash is salted then you need the salt aswell
- Having the salt is not enough. You need to find the algorithm that was used. Only then you will be able to start with the decryption.
- If you came to all this things somehow you are ready to start with decryption.

Wednesday, 13 March 2013

James Bond 007: Blood Stone

James Bond 007: Blood Stone

  • Developer: Bizarre Creations
  • Publisher: Activision
  • Genre: Action
  • Release Date: November 2, 2010 (US)

About James Bond 007: Blood Stone

An international conspiracy has placed the UK's most secretive bio-chemical project into deadly hands, and only Her Majesty's most lethal agent, James Bond, can unravel the mystery. To navigate through layers of corruption, you, as Bond, will embark on a global chase that will have you battling on land, sea and air through Athens, Istanbul, Monaco, and Bangkok. Nothing is what it seems as each adventure reveals a deeper and more sinister conspiracy.

Minimum System Requirements

  • OS: Windows XP, Vista or Windows 7
  • CPU: Intel Core 2 Duo E4300 @ 1.80 GHz or AMD Athlon 64 X2 4000+ @ 2.0 GHz
  • RAM: 1 GB XP , 2 GB for Vista, 7
  • HDD: 8 GB free disk space
  • Graphics: 128 MB Graphics Memory
  • Sound Card: DirectX 9 Compatible
  • DirectX: Version 9.0c

Recommended System Requirements

  • OS: Windows XP, Vista or Windows 7
  • CPU: Core i3-530 2.9GHz or Phenom II X4 905e
  • RAM: 2 GB
  • HDD: 8 GB free disk space
  • Graphics: 256 MB Graphics Memory
  • Sound Card: DirectX 9 Compatible
  • DirectX: Version 9.0c

Download James Bond 007: Blood Stone – Direct Links

Part 1 – 700 MB

Part 2 – 700 MB

Part 3 – 700 MB

Part 4 – 700 MB

Part 5 – 700 MB

Part 6 – 700 MB

Part 7 – 700 MB

Part 8 – 700 MB

Part 9 – 700 MB

Part 10 – 700 MB

Part 11 – 61 MB

Crack

www.elj-games.blogspot.com