Jump to content

catchyanow

Active Members
  • Posts

    117
  • Joined

  • Last visited

Posts posted by catchyanow

  1. I have managed to make a batch file that will stop all (or most anyway) security services that prevent our tools from running. It is a simple batch file and I think that with a bit of editing it can be implanted into Switchblade.

    Credit:

    The guys at Hack Forums.net and DELmE's Batch Virus Generator v 2.0

    Thanks guys.

    Download:

    Media Fire

    Rapidshare, Mega upload and LOTS more (Multiupload.com)

    If you need to kill another process just tell me what it is and I will add it to the list and update the links. :D

    Hope all of this helped.

  2. I have managed to make a batch file that will stop all (or most anyway) security services that prevent our tools from running. It is a simple batch file and I think that with a bit of editing it can be implanted into Switchblade.

    Credit:

    The guys at Hack Forums.net and DELmE's Batch Virus Generator v 2.0

    Thanks guys.

    Download:

    Media Fire

    Rapidshare, Mega upload and LOTS more (Multiupload.com)

    If you need to kill another process just tell me what it is and I will add it to the list and update the links. :D

    Hope all of this helped.

  3. Stop playing runescape, if your older than 12 your too old for it.

    Kerbaos, this was possible on runescape in 2001, approx, in 2009 its impossible, since 2002/3 there were no hacks, just bots, except the ocassional glitch somewhere, all calcs etc are done by the server, Cheat engine can change the amount of gold it looks like you have, but its only client side.

    Thanks man :D

  4. UPDATE FOR WIRELESS:

    debug

    Debug

    debug1

    Debug1

    Tech

    tech

    Tech1

    tech1

    monitor

    Monitor

    Monitor1

    monitor1

    root

    Root

    Root1

    root1

    recovery

    Recovery

    Recovery1

    recovery1

    operator

    Operator

    Operator1

    operator1

    diag

    Diag

    diag1

    Diag1

  5. I have a list of common passwords for your computer and wireless passwords.

    Wireless:

    user

    User

    user1

    User1

    admin

    Admin

    admin1

    Admin1

    administrator

    Administrator

    administrator1

    Administrator1

    poweruser

    Poweruser

    poweruser1

    Poweruser1

    password

    Password

    password1

    Password1

    Computer Passwords:

    (From Wikipedia)

    blank (none)

    the words "password", "passcode", "admin" and their derivatives

    a row of letters from the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)

    the user's name or login name

    the name of their significant other, a friend, relative or pet

    their birthplace or date of birth, or a friend's, or a relative's

    their automobile license plate number, or a friend's, or a relative's

    their office number, residence number or most commonly, their mobile number.

    a name of a celebrity they like

    a simple modification of one of the preceding, such as suffixing a digit, particularly 1, or reversing the order of the letters.

    a swear word

    and so, extensively, on

    Others:

    password

    123456

    qwerty

    abc123

    letmein

    monkey

    myspace1

    password1

    link182

    (your first name)

    Sites:

    http://www.phenoelit-us.org/dpl/dpl.html

    Please feel free to add to this list.

    Thanks

  6. The things google can do. This is just a quick guide that I will give.

    Reference:

    Google Hackers

    How to cyberstalk employees (IronGeek)

    First go to google and type in: inurl:service.pwd

    And choose you target site. You can find out the site administration or even users passwords here!

    Now look at the address

    You should see something like http://www.SiteNameHere.com/something(I got _vti_pvt - that's basically where the index of is)/service.pwd

    Now look at the / after the domain name. Get rid of the /service.pwd and hit enter. If you are lucky you should get one of those Index of /_vti_pvt things. Now feel free to look at the files. I chose WS_FTP.LOG and found the persons real name!

    Some file worth looking at are:

    service.pwd (of course)

    The access.cnf file (gives you the login page for the password from the service.pwd)

    service.cnf (some useful information)

    service.grp (the list of site administrators)

    WS_FTP.LOG (the directory of all the saved files on their actual computer)

    svcacl.cnf (this can give you the options the person has chosen for their site)

    Most of the other files are just random garble and some that can not be opened in your browser (eg .btr files)

    I hope this helps you with you google hacking ;)

  7. Yes, it will be blocked.

    I sent Messenger Password Viewer to VirusTotal (report). Sophos tagged it as malware ("Messen" Hack tool).

    So if you try to run it, Sophos will show a warning message and will stop it from running.

    FU**

×
×
  • Create New...