Your Ad Here


Friday, July 25, 2008

Thursday, July 24, 2008

Hack - View Locked Scrapbooks

How To Use this Hack?
There are three ways to use this hack.You can choose the one that best suits you.

a> Login To Your Sandbox Profile and Directly View The Locked Scrapbook


b> Using this Javascript :

* Navigate to the profile which has disallowed non-friends to view his/her scrapbook
* Run this script in the address bar

* javascript:document.location=’’+encodeURIComponent(location.href);void(0)

* Wait for 4-5 seconds and you will get to see the scraps.


c> Userscript (Credits - D3 ) - The Recommended Method because you need not run any script again and again. Kindly follow the instructions stated below:

* Install Grease Monkey in case you don’t have it - Search for it on google (another way to resort to Firefox)
* Install View Locked Scrapbook Script
* In case you have any problems downloading or operating these scripts, you must read this tutorial.

Find IP info using Gmail/Yahoo/Hotmail mails

When you recieve an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, []
Finding IP address in Gmail

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the email headers,

Click on the inverted triangle beside Reply. Select Show Orginal.
4. manually find the IP address, proceed to 5.
5. Look for Received: from followed by the IP address between square brackets [ ].

Received: from [] by web4587.mail.***

6. If you find more than one Received: from patterns, select the last one.
7. Track the IP address of the sender

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.

2. Click on Inbox or whichever folder you have stored your mail.

3. Open the mail.

4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

Click on Options on the top-right corner
In the Mail Options page, click on General Preferences
Scroll down to Messages where you have the Headers option
Make sure that Show all headers on incoming messages is selected
Click on the Save button
Go back to the mails and open that mail
5. You should see similar headers like above

Or if you want to manually find the IP address, proceed to 6.

6. Look for Received: from followed by the IP address between square brackets [ ]. Here, it is

That is be the IP address of the sender.

If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.

7. Track the IP address of the sender

Finding IP address in Hotmail

1. Log into your Hotmail account with your username and password.

2. Click on the Mail tab on the top.

3. Open the mail.

4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

Click on Options on the top-right corner
In the Mail Options page, click on Mail Display Settings
In Message Headers, make sure Advanced option is checked
Click on Ok button
Go back to the mails and open that mail
5. You should see the email headers now.

6. manually find the IP address, proceed to 7.

7. If you find a header with X-Originating-IP: followed by an IP address, that is the sender’s IP address

Hotmail headers

In this case the IP address of the sender is [].

8. If you find a header with Received: from followed by a Gmail proxy like this

Hotmail headers

Look for Received: from followed by IP address within square brackets[
In this case, the IP address of the sender is [].

9. Or else if you have headers like this

Hotmail headers

Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [] (Spam mail).

10. If you have multiple Received: from headers, eliminate the ones that have

11. Track the IP address of the sender

Create Folders And Files With NO! Name

This trick will allow you to create files and folders without any name. (But you cannot delete these folders, to do so, start your computer in safe mode and delete it from there.)

Just follow the following steps:
1.Select any file or folder.
2.Right click on it, press rename or simply press F2.
3.Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad.

Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys.

4.Press Enter and the nameless file or folder will be created.

Reason: The file or folder that seems nameless is actually named with a single space.

But what if you want to create another nameless file or folder in the same directory ?

For this you will have to rename the file with 2 spaces. Just follow these steps below:

1.Select file, press F2.
2.Hold alt key and type 0160 from the numpad.
3.Release the alt key. Now without doing anything else, again hold alt key and press 0160.
4.Press enter and you will have second nameless file in the same directory.
5.Repeat step 3 to create as many nameless files or folders in the same directory.

Essential Bluetooth hacking tools

Essential Bluetooth hacking tools

Bluetooth technology is great. No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?).If you want the best Bluetooth hacker java app, then refer to the “Super Bluetooth Hack” post
If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.

This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices. For every hack one software if suggested which you can find through a simple search in google..

Discovering Bluetooth Devices

BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. Download BlueScan.

BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. Download BlueSniff.

BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. Download BTBrowser.

BTCrawler -BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Download BTCrawler.

Hacking Bluetooth Devices

BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. Download BlueBugger.

CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Download CIHWB.

Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Download Bluediving.

Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Download T-BEAR.

Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. Download Bluesnarfer.

BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges. Download BTcrack.

Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. Download Blooover II.

BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. Download BlueTest.

BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. Download BTAuding.

What’s next? Let everyone know to disable Bluetooth until they really need it. Additionally, make sure to update your phone software on a regular basis

Tuesday, July 22, 2008

Best Chapters Of My Life..

The Day I'll Leave..

I sit alone, thinking about the day I’ll leave,
Friends, family and the farewell I’ll receive.
I’ll leave the sands, leave the sky, leave you, leave I,
Left would be just nostalgia, as the time would fly.

How is it going to be, I surmise a strange insecurity,
Will it be a convivial celebration or just a protocol pity.
Who would laugh and who would cry,
Who would gird me when I say my goodbye .

Will there be someone to whisper a wish in my ears,
Will there be someone to wipe away my tears.
Will there be the one whom I gave a smile,
Will there be the one who walked a while.

Have I done, given, been good enough,
Or have I made even the smooth ends rough.
Have I bothered much to be bothered about,
Or have I been a cipher that all may count out.

Will the love and lenity I gave in the past,
Will it make me and my subsistence last.
Will my ardor be revered and rewarded,
Or will I just be a bygone done and discarded.

In spite of this dubious battle,
There will be a day when I’ll have to leave.
May be I’ll bewail, may be I’ll be blithful,
Still there will be a day when I’ll have to leave.

A Routine Day at College..

"Shit Shit Shit.. one more attendance gone.." i managed to breathe out to myself, as i skidded to a screeching halt just when the door slammed shut right at my face. "Crap!", I blurted out. The sexagenarian yet moronic security incharge, passing by from behind, nodded in discontentment at me. I immediately thanked god for i didnt mouth the f-word, else he would have surely suspended me from college.

Sensing the drama, grinned at me from the other side of that door made of wood, with a small glass window in the centre. I tried to explain - "Mam, my bus got late", as if i was audible inside. Obviously guessing what i was animatedly trying to tell her, she passed that wicked smile again, but this time with a seemingly taunting comment. Just as i was trying to decipher what that could have been, the door creaked open. And she stood there - one hand on her waist, the other, gripping the door handle tightly, waiting to slam it again at my face.
"Did your cab got stuck in a jam? Or did it have a flat tyre? Oh I know, it must have been that girl... you got late because of her, right?". I knew this was coming. "Uhh.. Err.. Well... we forgot to pick up a person, so we had to go all the way back!", I knew she'd slam the door hearing that. "Uhh... please send those five idiots out, else i'll get bored...", THUD!

"This is the limit man! I was only 20 mins late", i shrugged. "Why did the first lecture have to be of that Teacher?
I managed to pass the rest of the 20 mins left of the lecture by loitering around the college. Entered the library (surprize surprize!), to flip through the newspaper; "What! No ET (Economic Times)!", i gasped, "What kind of a library is this!", and left. Didnt really have anything to do, so decided to utilize the rest of 10 mins in the loo. Oops, sorry, "Rest Rooms", as they call it! Stared at the mirror for quite some time, eased off and washed hands twice for no apprehensible reason. Soon, a sudden rush in that dingy lavatory suggested that it was 9:20. Time for the next lecture.

I was again greeted with that familiar grin, this time from those 'idiots' aka friends aka classmates. "Why does everyone greet me with that half-cheek up smile everytime?", I demanded despite knowing the answer. No one cared to reply. The stupid grin on their faces just emancipated into an even sillier burst of laughter. "Shutup, you morons!" i retaliated, and looked for a seat next to them. The moment i got seated and the white-board came into view, i saw her...

"What! same lecture again!", i felt like banging my head against a wall.
"She's taking this lecture too", Dhiraj broke the good news to me. I desperately searched for a wall. "Continuous one hour and forty minutes of OB!!! Thank God she didnt let me attend the first one!", i felt almost victorious. "Thank your cab you fool!", Babita aka Babe'z, seated to my left, corrected me.
"VIKAAASSSS"... screamed same teacher, deafening me for a second.
"Yes Mam", i responded, trying hard not to laugh, but failing miserably.
"Please find better excuses from next time", she continued in her trademark tantilizing manner.
"I'll try mam".

Thursday, July 17, 2008