Monday, 14 October 2013

TOP 11 BEST HACKING MOVIES OF HOLLYWOOD

                                       TOP 11 BEST HACKING MOVIES OF HOLLYWOOD


In the list of Computer movies we have brought to you the top Hollywood movies based on hacking. These hacker movies just show up the cool way to represent life and happenings in the life of a hacker. Thus if you are interested in hacking stuff, don't forget to have a look on these hacking movies.

 
 So,Here's the list of movies :)
 
 

John McClane takes on an Internet-based terrorist organization who is systematically shutting down the United States.

Rating : 5.9/10 
Director: Len Wiseman
Stars : Bruce Willis, Justin Long and Timothy Olyphant.

2. Hackers (1995)


A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday.

Rating : 5.9/10
Director: Iain Softley
Stars: Jonny Lee Miller, Angelina Jolie and Jesse Bradford

3. Pirates of Silicon Valley (1999)

Pirates of Silicon Valley is a semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc. 

Rating: 7.1/10
Director: Martyn Burke
Stars: Anthony Michael Hall, Noah Wyle and Joey Slotnick

4. The Italian Job (2003)


After being betrayed and left for dead in Italy, Charlie Croker and his team plan an elaborate gold heist against their former ally.

Rating: 6.9/10
Director: F. Gary Gray
Stars: Donald Sutherland, Mark Wahlberg and Edward Norton.

5. Untraceable (2008)


FBI agent Jennifer Marsh is tasked with hunting down a seemingly untraceable serial killer who posts live videos of his victims on the Internet. As time runs out, the cat and mouse chase becomes more personal.

Rating: 6.1/10
Director: Gregory Hoblit
Stars: Diane Lane, Colin Hanks and Joseph Cross.

6. Foolproof (2003)


Kevin, Sam and Rob are founding members of a theoretical group which pulls off heists. Leo, a gangster, blackmails them into pulling off a real multi-million dollar heist. Now it's up to them to get out alive.

Rating: 6.5/10
Director: William Phillips
Stars: Ryan Reynolds, Kristin Booth and Joris Jarsky.

7. Firewall (2006)


A security specialist is forced into robbing the bank that he's protecting, as a bid to pay off his family's ransom.

Rating: 5.7/10
Director: Richard Loncraine
Stars: Harrison Ford, Virginia Madsen and Paul Bettany.

8. The Score (2001)


An aging thief hopes to retire and live off his ill-gotten wealth when a young kid convinces him into doing one last heist.

Rating: 6.8/10
Director: Frank Oz
Stars: Robert De Niro, Edward Norton and Marlon Brando.

9. Swordfish (2001)


A secretive renegade counter-terrorist co-opts the world's greatest hacker (who is trying to stay clean) to steal billions in US Government dirty money.

Rating: 6.4/10
Director: Dominic Sena
Stars: John Travolta, Hugh Jackman and Halle Berry.

10. Sneakers (1992)


Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal.

Rating: 7.0/10
Director: Phil Alden Robinson
Stars: Robert Redford, Dan Aykroyd and Sidney Poitier.

11.The Social Network (2010)


Harvard student Mark Zuckerberg creates the social networking website that would become known as Facebook, but is later sued by two brothers who claimed he stole their idea, and the co-founder who was later squeezed out of the business.

Rating: 7.9/10
Director: David Fincher
Stars: Jesse Eisenberg, Andrew Garfield and Justin Timberlake.

We hope you will like the above collection. You are most welcome with your comments if you are having some more movies like that in your mind. Enjoy people and do not forget to comment.
- See more at: http://www.darkhtu.net/2013/10/top-11-best-hacking-movies-of-hollywood.html#sthash.odobojHq.dpuf

SQL commands (USEFUL FOR PROGRAMMERS)

                                         SQL commands (USEFUL FOR PROGRAMMERS)




ABORT -- abort the current transaction
ALTER DATABASE -- change a database
ALTER GROUP -- add users to a group or remove users from a group
ALTER TABLE -- change the definition of a table
ALTER TRIGGER -- change the definition of a trigger
ALTER USER -- change a database user account
ANALYZE -- collect statistics about a database
BEGIN -- start a transaction block
CHECKPOINT -- force a transaction log checkpoint
CLOSE -- close a cursor
CLUSTER -- cluster a table according to an index
COMMENT -- define or change the comment of an object
COMMIT -- commit the current transaction
COPY -- copy data between files and tables
CREATE AGGREGATE -- define a new aggregate function
CREATE CAST -- define a user-defined cast
CREATE CONSTRAINT TRIGGER -- define a new constraint trigger
CREATE CONVERSION -- define a user-defined conversion
CREATE DATABASE -- create a new database
CREATE DOMAIN -- define a new domain
CREATE FUNCTION -- define a new function
CREATE GROUP -- define a new user group
CREATE INDEX -- define a new index
CREATE LANGUAGE -- define a new procedural language
CREATE OPERATOR -- define a new operator
CREATE OPERATOR CLASS -- define a new operator class for indexes
CREATE RULE -- define a new rewrite rule
CREATE SCHEMA -- define a new schema
CREATE SEQUENCE -- define a new sequence generator
CREATE TABLE -- define a new table
CREATE TABLE AS -- create a new table from the results of a query
CREATE TRIGGER -- define a new trigger
CREATE TYPE -- define a new data type
CREATE USER -- define a new database user account
CREATE VIEW -- define a new view
DEALLOCATE -- remove a prepared query
DECLARE -- define a cursor
DELETE -- delete rows of a table
DROP AGGREGATE -- remove a user-defined aggregate function
DROP CAST -- remove a user-defined cast
DROP CONVERSION -- remove a user-defined conversion
DROP DATABASE -- remove a database
DROP DOMAIN -- remove a user-defined domain
DROP FUNCTION -- remove a user-defined function
DROP GROUP -- remove a user group
DROP INDEX -- remove an index
DROP LANGUAGE -- remove a user-defined procedural language
DROP OPERATOR -- remove a user-defined operator
DROP OPERATOR CLASS -- remove a user-defined operator class
DROP RULE -- remove a rewrite rule
DROP SCHEMA -- remove a schema
DROP SEQUENCE -- remove a sequence
DROP TABLE -- remove a table
DROP TRIGGER -- remove a trigger
DROP TYPE -- remove a user-defined data type
DROP USER -- remove a database user account
DROP VIEW -- remove a view
END -- commit the current transaction
EXECUTE -- execute a prepared query
EXPLAIN -- show the execution plan of a statement
FETCH -- retrieve rows from a table using a cursor
GRANT -- define access privileges
INSERT -- create new rows in a table
LISTEN -- listen for a notification
LOAD -- load or reload a shared library file
LOCK -- explicitly lock a table
MOVE -- position a cursor on a specified row of a table
NOTIFY -- generate a notification
PREPARE -- create a prepared query
REINDEX -- rebuild corrupted indexes
RESET -- restore the value of a run-time parameter to a default value
REVOKE -- remove access privileges
ROLLBACK -- abort the current transaction
SELECT -- retrieve rows from a table or view
SELECT INTO -- create a new table from the results of a query
SET -- change a run-time parameter
SET CONSTRAINTS -- set the constraint mode of the current transaction
SET SESSION AUTHORIZATION -- set the session user identifier and the current user identifier of the current session
SET TRANSACTION -- set the characteristics of the current transaction
SHOW -- show the value of a run-time parameter
START TRANSACTION -- start a transaction block
TRUNCATE -- empty a table
UNLISTEN -- stop listening for a notification
UPDATE -- update rows of a table
VACUUM -- garbage-collectand optionally analyze a database

COLLECTION OF SERIEL KEYS !

                                                   COLLECTION OF SERIAl KEYS !                                                                                       

3D Studio Max 4 :::: Number:226-19791979 / CD Key:XLSQBQ9zfll2WrZc+Vn0hWaw2dV/sccwKwsWY05TPwHden
Acrobat Distiller - WAW210P7121183-537
Adobe After Effects 5.5 : EWW470R1001999-030-259
Adobe Frame maker 7.0 ::::1030-1208-8265-3458-9287-7077-
Adobe Go live 4 ::::GJW400R2100006-625
Adobe go live 5.0 : GJW500R2898273-460
Adobe illustrator 9.0 : ABW900R71111141-999-830
Ado
be InDesign ::::IPE123R12345678-337
Adobe live motion 1.0 : LVW100R7100843-292
Adobe PageMaker 6.5 BR ::::03-5004-201500745
Adobe PageMaker 7.0 ::::1039-1121-2998-7586-7388-7545
Adobe Photoshop 2007 Key - 71045-1151-7925-9569-7562-5749
Adobe Photoshop 6.0 : PWW600R7105467-948
Adobe Photoshop 6.0 : PWW600R7105467-948
Adobe Photoshop 7: 1045-1209-6738-4668-7696-2783/1045-0203-3247-2217-3566-6177/1045-1275-2546-0411-5466-
5760
Adobe Photoshop 8 - serial: EWW470R1001999-030-259
Adobe premiere 6.0 : MBW600R7100765-881
Adobe Premiere 6.0 ::::MBF500B7205104-998
Adobe Premiere 6.0 ::::MBF500B7205104-998-
Adobe Premiere 6.5 ::::MBE600R7100024-900-960-
Adobe Premiere 7.0 PRO::::1132-1381-7346-2847-2617-6783
Adobe Premiere Pro v7.0 ::::1132-1381-7346-2847-2617-6783
Advanced Office XP Password Rec. Pro 2.0 AOXPPR-PRO-TADFH-43369-HTHAF-42745
Advanced Paradox Password Recovery 1.01 MSPP-83852-DWMRA-762
Advanced PDF Password Recovery 1.34 PDFP-99322-EYSVY-886
Advent. Pinball forgotten island: 0901-3066676-3327010-922
After Effects 5.5 ::::EWW470R1001999-030-259
Aldus Photo Styler 2.0 ::::15-1001-000000001-
Aplicativos Commercials ::::2003 0947201
Architectural Desktop 3.3SERIAL :::: 400-12345678 /CD KEY: T4ED6P
AutoCAD 14 ::::117-99703105 / W36H /C3DF32EA-AutoCad 2002
SERIAL: 400-12345678 / CD KEY: T4ED6P
Avast Free Edition - C02004901H1200A0112
8RY3MBRT/C44630904H1200A1112-THHDNLZP
Avast License Key upto 2038 AD - S0718669R9983V1164-FCH0F887
AVG Free License for 10 yrs - 8MEH-RQXTV-HQOWD-E447R-MPHYD-PEMBR-ACED
Avid Liquid 7 - JCHEN-ABBAA-FOPSM-GTSAH-KJJHK or JBSKH-AGAAF-PNKVD-KBMVC-FRIHV

aware Professional - password: 1291453
bit defender 2012 antivirus ?616A7EB8CCFF88AE3B4F,6c7b123f3cf99da686ee,75BE25A15232DEFDA
A0A,6BC2AED6F2F9526E0EAA,64D0B59BB622301623BA ,69BC3008B3985A3A6042 ,64E14BBC87AD06174E52.
Cakewalk Home Studio2002 XL :::: 2002 XLCWHX1.02-002397
Cakewalk Home Studio2004 :::: CWHS2.20-003021
Cakewalk Pyro 2003 ::::CWPY200333333 / MP3:95F5AGFD
Cool Edit Pro v2.0 - Name: Peter Quistgard, Serial: 200-00-37YQOQ7L
Corel 11 - Serial: DR11CRD-0012082-DGW
CorelDraw 11 ::::DR11CRD-0012082-DGW
CorelDraw 12 :::: DR12WEX -1504397 - KTY
CorelDraw 8 ::::DR-8XR-23969F-63
Curso- Flash 4 ::::540234330 / 55623255258 /5279103
Delta Translator ::::DTR2-29108-84895-00412-18
Dictionaries Michaelis V.5.0BR :::: CD6BL9805083
Easy CD Creator 5 ::::P-7TGQ4-G06CM-N5G1L
Easy CD Creator 5.2 ::::G332NB-MGJNH-ZFVPB
Easy CD Creator 6 :::: BD-JWZS4-QX3MR-0241L
Easy Media Creator 7.0serial :::: YN-Y7WVY-CQXG6-K3KWZ
Empresário 3 serial ::::e3co-1-co-065-00-00-m1oe111
Enciclopédia de TomografiaComp. LEE :::: RUSR23351
English Teacher ::::03231183
Error Killer V 2.6 - Name: www.bg-warez.org, Key: 4E10-9CCB-8B74-1088
Exchange 2000 Server ::::KRJQ8-RQ822-YRMXF-6TTXC-HD2VM
FBNC4D-K7144B-QY1NTC-53K8QP-QTA4AY-KTEWXP
Folder Lock V 5.8 - Name: JAMES SMITH, Code: 343944892or Name: NewSoft15805, Code: 221281703
Folder Lock XP V 3.5 - 48i6-9Yf2-81JP-EP62
Globalink Power Translator6.4 ::::PT6PU7-6.41-698-0474
Guia do Sexo :::: 3746-Houaiss :::: DHS-21771533
Guitar Pro 5.2 - ID: TEAMZWT, Serial: AEAAK-ANR60-AAAAZ
Inventor 4 ::::202-12345678 / CD KEY:G4ED6P
Iobit Advance System Care 3 ProName: rezman1984,Serial: 263F-263F-NZTT-MQXN/263F-263F-S87N-A6WD\263F-263F-6
U0A-P4WT
Iobit Advance System Care 4 Pro - 1DA1-1DA1-FOFF-73CC
Iobit Malware Fighter Pro - 031F1-5A8E6-C4F36-013AF
Iobit Security 360 - E4390-163B6-1BFCB-43EFA
James Bond 007:NightFire ::::1740-9488245-5171152-5578
Jurissíntese Millenium ::::JS164-29-Kylix 3.0 :::: 6AKT-TE29VM-7GZV6D-28?Y / Aut.Key: GFW-?RW
Kor PS-E9J3T-HHJSM-PV3RM-REXGT-EPJK4-PBTF4
Macromedia Studio MX ::::WSW600-59791-91721-99978
Magic Converter V 7.9.5.1 - MVC182749
Make Money 2.0 :::: PRF0200153
Mechanical Desktop 6.0 ::::400-19791979 / CD-Key:TLSQBS
MS Office 2007 - KGFVY-7733B-8WCK9-KTG64-BC7D8
MS Office 2010 Key - GGG8W-PJFRT-8MRQH-X99J2-PPPVM
MS XP - User Name - Creative, CD Key - FM9FY TMF7Q KCKCT V9T29 TBBBG
Nero Burning Rom 5.5=> 9M03-01A1-PCX7-K31A-8A94-98PT-KT2E-522A3D
Nero v 8.3.2.1 - Password: renegadeddl.com, Serial: 9K20-7839-0295-6KA4-5008-1KM3-8C64or 1K22-2867-0K95-61K4-
5000-CKAC-AA8X
Norton Inter Security2005 :::: BBCY-PK26-GKCP-7BCM-VY22-3VMF
Norton System Works2005 :::: BBCQ-9BCY-PKCX-GJPD-GYTK-HKGJ
Office 2000 :::: GC6J3-GTQ62-FP876-94FBR-D3DX8
Office 2003 :::: GWH28-DGCMP-P6RC4-6J4MT-3HFDY
Office XP Full BR ::::HXT2X-8CDBF-HYY8H-TYJ7Q-HMHHG
Ominipage 11 :::: 2889A L00500020
Page Maker 7.0 ::::1039-1121-2998-7586-7388-7545
Photoshop 5.5 BR ::::PWB550E7100088-110
Photoshop 6.0 BR ::::PWW600R7105467-948
Photoshop 7.0 ::::1045-1209-6738-4668-7696-2783
Photoshop 8 CS ::::EWW470R1001999-030-259
Photoshop Elements ::::1057-4422-1198-0751-6983-5530
Photoshop LE - SPW300R3230626-250
Plus Windows :::: 95411-1410701
PM6.5 - 03W600R1118669-742 or 03w600r1137255-814
PM7.0 - 1039 - 1121 - 2998 - 7586 - 7388 - 7545
Power ISO v 4.7 - Name: TEAM CRUDE, Serial: U5ABB-FGU6Z-4DXQE-Z43TJ-9AP32
Project Server BR 2003 ::::WFDWY-XQXJF-RHRYG-BG7RQ-BBDHM
Project98 BR ::::1112-1111111 qQ8tD/wH3k5+Z9zHHavYnFfs4ZTU9cCNeO9o3JBi
QuarkXPress 5.0 ::::39173027QHSKKJF3199PYJX2
Recover My Files V 2.53Name: User 5346534Serial: G-JEF052-EZMP4W-THP7JR-70D016-J22QXR-TEACFP-AP7Q0F-B0QUCT
RoboHelp Enterprise2002 :::: REF22-C3E40SHK
ROXIO EASY CD & DVDCREATOR SUITE 6.0 :::: BD-JWZS4-QX3MR-0241L
Seagate Crystal Reports8.5 :::: A6A50-8900008-ZE1007S
Seagete Crystal Reports9.2 :::: AVS50-81SG00S-G61002U-SIC 3.02 Serial ::::12D2-2501-8410-32X0-6752 /Série: 060086
Shringer v 2.0 - Name: ARENA, Key: 0001324429D3
Skin Maker 120 - Name: cReKo, Serial: 2070107
Sound Forge 5 ::::3B-9FWG9Z-T60ZYS-0QZY0D
Soundforge 10 - Serial: 164-Z04T-RKLB-NX9S,Activation Code: 2X7EVTCD5-DG2BTL2QG-QCVZCM27C-67HK3SQRP-X3154VC4X-QYNCKT6NE
Soundforge 8 - HQ-B0PVH8-YE7HFD-P12QV3 Soundforge 9 - Serial: 15H-S9FH-KW06-J069,Activation Code: EYPG4JZQEWQRCMZ8GK-9C21Q70QL-9DDKV63YJ-6YJB0X8HH-B27WS66EK
Speeder XP - Name: p00p, Code: 7ad98e6ebf730d3d
Studio Max 4.0 : s/n 226-19791979 key XLSQBQAd
Total Image Converter full version:::
Total Video Converter 3.12 - 0ab52023-ba00347e-9fa86acd-fdc330a9-68578b7e-264b81e1-30bdfeef-cea403fa-20457e4a-
39c03409-f69a9aba-388e8a94-677044c7-643fe9ac-66523c91-18a61801
tune up 2011 keyDV77CD-V10K5J-3HWWD3-2Y2EEQ-4K4PVX-KV1DYT
TuneUp Utilities 2009 - Name: Ferrum, Company: vistasoft,Serial: AQKA2P-HY7FQF-8M0930-DW4H4V-1EJPRC-16CHPNMAMBO04
TuneUp Utilities 2010 - Name: enepoh, Org: pvt.Serial: 5J0743-ACXJ2F-DQ852E-XKF923-D9X4MA-F26YDY/WEB7X9-
4R6K7X-M0KT5M-MJQXAE-5M32YP-43N48D/79A8JV-4K2Q00-AJB93X-PDMQ6A-9Q45DF-VT6QTT/YBDFVC-5W537B-J2EEBYXF7J7Q-7M40BX-JD5R0X/7BN2Y1-9FWF8E-6VE6BB-J3PYWX-FW2D10-XNPCJ6/0EMYNB-Q1QTAD-J2YM6J-083VP7-5F1J4PVDVV8R/6M2RPF-R78B4J-A9E2T8-Q21VEA-02W2MQ-DMHHMY/JF4BRT-13ARPF-6WKT7P-QTWVMD-90TTVK-1M8DHT/
JD7VV-FC596C-06C3NW-TQ8QE7-TM4WJP-2CFRAQ/NWVJH0-561R6W-D56F76-0E0YTY-QQRW9A-CV2H38/1360HMVT69X2-5HRCFX-2XD3AH-XKFW13-PA9YJ1
Ulead Vídeo Studio 8.0 ::::81102-86000-13994421
Ultra ISO v 9.3.6. 2750 - Name: TEAM ZWT, Serial: 4FFB-6D99-4A3D-07B9
Uniblue PowerSuite 2011 v 3.0.1.3 - PS-ZMYAQ-N6SNK-J9BD6-53HZF-LV833-UW27
USB Disk Security V 5.0.0.38 - Name: nonokh, Code: BHHJD17793
Via Voice :::: RPB000049301
Visual Kit 5 V.6.0 ::::W60.000.001.425-789
Visual Kit 5 V.7.0 2003 ::::U5R.Visual SouceSafe 6.0 :::: 885-2814463
Visual Studio 6.0 ::::111-11111
Visual Studio.net :::: D64GG-GXY6T-V6FTR-WCPBB-2YDYB2
Win DVD 2000 ::::GMR22WGYXPUB8LH
Winace ::::ACEQ79TFDSWXC3H4R64
Windows 2000 Server BR ::::M2GHT-V6YK6-P6Q9D-PRCXF-FCWXT
Windows 2003 BR :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
Windows 2003 Server ::::QW32K-48T2T-3D2PJ-DXBWY-C6WRJ
Windows 2003 Server/Enterprise/MSDN ::::QW32K-48T2T-3D2PJ-DXBWY-C6WRJ
Windows 2003 ServerCorporate 3 in 1 :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
Windows 2003 StandardServer :::: M6RJ9-TBJH3-9DDXM-4VX9Q-K8M8M
Windows 2003 WebServer :::: d42x8-7mwxd-m4b76-mkyp7-cw9fd
Windows 7 Ultimate Edition x86 32 bit - CD Key : 7YWX9-W3C2V-D46GW-P722P-9CP4D
Windows 95 :::: 28595-OEM-0005727-80940
Windows 98 :::: KGGJF-Q3HCX-88JJV-DM3KH-VY6VQ
Windows 98SE :::: XJ3XX-YR4CJ-TQD6J-76QJR-GJMJB
Windows ME :::: Q7JRD-HH6DG-RD4BK-H93DF-DQ4FG
Windows ME Completo ::::B6BYC-6T7C3-4PXRW-2XKWB-GYV33
Windows NT 4.0 ::::419-0949015
Windows Server 2003Enterprise CorporateEdition :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
Windows XP BR :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
Windows XP Corporate ::::FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
Windows XP CORPORATE C/SP2 :::: VDDF2-JJWM3-X7P27-FRHRT-8BVHT
Windows XP Home BR ::::K8GMG-PRV3M-VG2JH-DJJ48-RY7FV
Windows XP Professional C/SP2 BR :::: BX6HT-MDJKW-H2J4X-BX67W-TVVFG
Windows XP Professional -Inglês :::: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
Windows XP Server ::::BJXGH-4TG7P-F9PRP-K6FJD-JQMPM/
Xc65ybTnCklQeOzE1p4JwW7OkAoY2jmSDKfvX4ZD
Xilisotf 3GP Converter 2.1.15 - Name: X-Video-ConverterCD-Key: 0V5AVGKPA1VXST64VLNR9E31-AC0E-8717-549D

WINDOWS RUN Commands !!!

                                                   WINDOWS RUN Commands !!!


1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System TroubleshootingUtility -
drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) -
gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control
netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad - notepad
65. Object Packager - packager
66. ODBC Data Source Administrator -
odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests -
ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) -
rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility -
wabmig
107. Windows Explorer - explorer
108. Windows Firewall - firewall.cpl
109. Windows Magnifier - magnify
110. Windows Management Infrastructure -
wmimgmt.msc
111. Windows Media Player - wmplayer
112. Windows Messenger - msmsgs
113. Windows System Security Tool - syskey
114. Windows Update Launches - wupdmgr
115. Windows Version - winver

How to hack with IP address

How to hack with IP address

                         

  Did you know how much stuff you can do with an ip address?

There is a plenty of tutorials  that go into how to get an IP Address from the preferred mark of your choice. Now I will not go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first you should ping the IP Address to make sure that its alive or how we say online. Now at the bottom I will include some links where you can get some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" that. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they all have ports. Protocols use these ports to communicate with other services and resources on the network.  Well Blues Port Scanner will scan the IP address that you chose and identify open ports that are on the target box. 

Blues Port Scaner you can download from here:

For example:
Idlescan using Zombie <Domain Name> (192.150.13.111:80); Class: Incremental
Interesting ports on 208.225.90.120:
(The 65522 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
111/tcp open sunrpc
135/tcp open loc-srv
443/tcp open https 1027/tcp open IIS
1030/tcp open iad1
2306/tcp open unknown
5631/tcp open pcanywheredata
7937/tcp open unknown
7938/tcp open unknown
36890/tcp open unknown

In example we see that there are a variety of ports open on this box. Take note of all the ports that you see listed before you. Most of them will be paired up with the type of protocol that uses that port (IE. 80-HTTP 25-SMTP Etc.). Take all that information and paste it into notepad or the editor of your choice. This is the beginning of your targets record. So now we know what ports are open. These are all theoretical points of entry where we could wiggle into the computer system. But we all know its not that easy. Alright so we dont even know what type of software or what operating system that this system is running.

NMAP the Port Scanner has unique OS fingerprinting methods so when the program sees a certain series of ports open it uses its best judgement to guess what operating system its running.

NMAP you can download here:


So we have to figure out what type of software this box is running if we are gonna start hacking the thing right? Many of you have used TELNET for your MUDS and MOOS and weird multiplayer text dungeons and many of you havent even heard of it before period. TELNET is used to open a remote connection to an IP Address through a Port. So this means is we are accessing their computer from across the internet, all we need is their IP address and a port number. With that record you are starting to compile, open a TELNET connection to the IP Address and enter one of the open ports that you found on the target.
So say we typed 'TELNET -o xxx.xxx.xxx.xxx 25' This command will open up a connection through port 25 to the IP xxx.xxx.xxx.xxx. Now you may see some text at the very top of the screen. You may think how is text going to help me. Well It will. Get that list you are starting to write, and copy the banners into your compilation of the information youve gathered on your target. Banners/Headers are what you get when you TELNET to the open ports. Heres an example of a banner from port 25.

220 jesus.gha.chartermi.net ESMTP Sendmail 8.12.8/8.12.8; Fri, 7 Oct 2005 01:22:29 -0400

Now this is a very important part in the enumeration process. You notice it says 'Sendmail 8.12.8/8.12.8' Well what do you know, we now have discovered a version number. This is where we can start identifying the programs running on the machine. There are some instances in which companies will try and falsify their headers/banners so hackers are unable to find out what programs are truly installed. Now just copy all the banners from all the open ports *Some Ports May Have No Bannners* and organize them in the little record we have of the target. Now we have all the open ports, and a list of the programs running and their version numbers. This is some of the most sensitive information you can come across in the networking world. Other points of interest may be the DNS server, that contains lots of information and if you are able to manipulate it than you can pretend to hotmail, and steal a bunch of peoples email. Well now back to the task. Apart from actual company secrets and secret configurations of the network hardware, you got some good juicy info. http://www.securityfocus.com is a very good resource for looking up software vulnerabilities. If you cant find any vulnerabilities there, search on google. There are many, many, many other sites that post vulnerabilities that their groups find and their affiliates.

At SecurityFocus you can search through vendor and whatnot to try and find your peice of software, or you can use the search box. When i searched SecurityFocus i found a paper on how Sendmail 8.12.8 had a buffer overflow. There was proof of concept code where they wrote the shellcode and everything, so if you ran the code with the right syntax, a command prompt would just spawn. You should notice a (#) on the line where your code is being typed. That pound symbol means that the command prompt window thats currently open was opened as root. The highest privilage on a UNIX/Linux Box. You have just successfully hacked a box. Now that you have a command shell in front of you, you can start doing whatever you want, delete everything if you want to be a  jerk, however that is not recommended. Maybe leave a text file saying how you did it and that they should patch their system. Whoever they are. And many times the best thing you can do is just lay in the shadows, dont let anyone know what you did. More often than not this is the path you are going to want to take to avoid unwanted visits by the authorities.

There are many types of exploits out there, some are Denial of Service exploits, where you shut down a box, or render an application/process unusable. Called denial of service simply because you are denying a service on someones box to everyone trying to access it. Buffer Overflow exploits are involved when a variable inside some code doesnt have any input validation. Each letter you enter in for the string variable will be 1 byte long. Now where the variables are located at when they are in use by a program is called the buffer. Now what do you think overflowing the buffer means. We overflow the buffer so we can get to a totally different memory address. Then people write whats called shellcode in hex. This shellcode is what returns that command prompt when you run the exploit. That wasnt the best description of a buffer overflow, however all you need to remember is that garbage data fills up the data registers so then the buffer overflows and allows for remote execution of almost every command available. There are many, many other types of attacks that cannot all be described here, like man-in-the-middle attacks where you spoof who you are. Performed correctly, the slave will enter http://www.bank.com and his connection will be redirected to your site where you can make a username and password box, make the site look legit. And your poor mark will enter their credentials into your site, when they think its really http://www.bank.com. You need to have a small script set up so it will automatiically display like an error or something once they try and log in with their credentials. This makes it seem like the site is down and the slave doenst give it a second thought and will simply try again later.
So as a summary of how to own a box when you only have an IP Address
Method Works On both *Nix and Windoze

You can do the same with domain names (IE google.com) than what you can with IP Addresses. Run a whois Lookup or something along those lines. Or check up on InterNIC you should be able to resolve the domain name to an IP address.

- Port Scan The Address And Record Open Ports
- Telnet To Open Ports To Identify Software Running On Ports

netcat - Network swiss army knife. Like TELNET only better and with a lot more functionality. Both can be used when you are trying to fingerprint software on open ports

- Record Banners And Take Note Of The Application Running and The Version Number
- Take A Gander Online At SecurityFocus.com or Eeye.com. If you cant find any vulnerabilities then search google.
- Make a copy of some Proof-Of-Concept code for the vulnerability.

I will not teach you how to cover your track. This is prohibited and i put that here only for informational reasons.