HACK TRACK

HACK TRACK
Gear yourself up....

Thursday 10 January 2013

KON BOOT DOWNLOAD LINK

www.metro-mendax.webege.com/koCD.iso

Tuesday 4 December 2012

How to Bypass or Remove a BIOS Password




           A BIOS password is a protection measure that can be used to stop someone powering up a computer system or making changes in some of the computers most sensitive areas. Many big name computer manufacturers such as Dell and HP lock the customers out of this area because they don’t want the customer changing anything and potentially damaging the machine (which the manufacturer may have to warranty). However, when someone like a computer technician or hardware enthusiast needs to make some hardware changes to the computer, they will need to access the BIOS. Here are some methods to bypass or remove a BIOS password.

 NOTE: Do not try to guess the password on a passworded Hard Drive. 3 wrong guesses will often result in the information on the hard drive being lost forever.

How to Bypass or Remove a BIOS Password by Removing the CMOS Battery:
 The simplest way to remove a BIOS password is to simply remove the CMOS battery. A computer will remember its settings and keep the time even when it is turned off and unplugged because these parts are powered by small battery inside the computer called a CMOS battery. If we pull out this battery, the computer will forget alot of its hardware settings, including its BIOS password. This should not be performed on Laptops if you are not experienced working with laptop hardware.

Anyway, open up the computer case using a screw driver and locate the flat, circular and metallic CMOS battery. It should look something like the picture to the right. Some computers have this part standing upright.

Once you have located it, observe how the latches are holding it. There are many different ways to remove a CMOS battery but the most common way on newer computers can be seen in the picture below.

Make sure to power down the computer, unplug the power cables and unplug any USB devices if they are powered. The computer must not be able to get power from anywhere for this to work. Take out the CMOS battery and wait 10 – 25 minutes before putting it back in. The reason for this wait is because the computer can still store power in its capacitors even though everything is unplugged. The waiting period allows enough time for them to discharge.

Plug everything back in, power up the computer and enter the BIOS again. If everything went well there should be no more password. In some cases, if you get weird error messages during bootup now, you will need to goto “Load BIOS Defaults” in BIOS and save the changes to fix them.

If this method didn’t work, try one of the methods below.

How to Bypass or Remove a BIOS Password using Software:
!BIOS is a freeware utility which is designed to be a whole BIOS and security suite. It has the ability to decrypt the passwords used in some of the most common BIOS makes such as Award, Phoenix, American Megatrends, IMB etc..
 It also has the ability to brute force the password (known as “blasters”). However, this method is dangerous and can result in some unexpected and unwanted results.

Note: Because of this applications password cracking abilities, some antivirus software may report it as a virus/trojan. This is a false positive.

To start using !BIOS, reboot your computer and take note of the BIOS type and version you are running. For example, If your motherboard uses Award BIOS you should look for the text “Award Medallion BIOS 6.0 or something similar.

Download !BIOS from here and save it to your desktop. Then, open a DOS command windows by going to Start > Run and type: cmd

Once you see a black screen in front of you, type: cd desktop
 You should now see something like: C:\Documents and Settings\yourusername\Desktop>

Now type the name of the file you just downloaded, if you haven’t changed the name just type in: bios320.exe


 Use the down arrow and choose “Crackers” and then press the right arrow. Using the up and down arrows, select the BIOS that the motherboard is using and press Enter.

You should now see a menu asking what you want to crack, in most cases its the Supervisor or System Passwords you want to crack, so press the 1 key on your keyboard. It will then show you another menu asking how you want it to be cracked. Option 1 is pretty good so try that first by pressing the 1 key on your keyboard. You should now have your BIOS password.

Reboot the computer, enter the BIOS and try it out.

How to Bypass or Remove a BIOS Password using the manufacturer backdoor password:

On many computers (especially old ones), computer manufacturers build in backdoor passwords for their own technicians to use so they can access the BIOS when the hardware is being serviced. Here are some of the ones that have been reported. You may need to try quite a few passwords before you find one that works

These passwords are case sensitive.

AMI BIOS Backdoor Passwords:
A.M.I.
AAAMMMII
AMI
AMI?SW
AMI_SW
BIOS
CONDO
HEWITT RAND
LKWPETER
MI
Oder
PASSWORD

Award BIOS Backdoor Passwords:
(eight spaces)
01322222
589589
589721
595595
598598
ALFAROME
ALLY
Ally
Ally
Ally
Apaf
Award
AWARD PW
AWARD SW
AWARD?SW
AWARD_PW
AWARD_SW
AWKWARD
Awkward
IOSTAR
CONCAT
CONDO
Condo
Condo
D8on
Djonet
HLT
J256
J262
J262
J322
J332
J64
KDD
LKWPETER
Lkwpeter
PINT
Pint
SER
SKY_FOXSYXZ
SKY_FOX
Syxz
SYXZ
TTPTHA
ZAAAADA
ZAAADA
ZBAAACA
ZJAAADC

Russian Award BIOS Passwords:
%øåñòü ïpîáåëîâ%
%äåâÿòü ïpîáåëîâ%

Phoenix Backdoor BIOS Passwords:
BIOS
CMOS
Phoenix
PHOENIX

Other Manufcaturers Backdoor Passwords: (manufacturer name – password)
VOBIS and IBM – merlin
Dell – Dell
Biostar – Biostar
Compaq – Compaq
Enox – xo11ne
Epox – central
Freetech – Posterie
Iwill – iwill
Jetway – spooml
Packard Bell – bell9
QDI – QDI
Siemens – SKY_FOX
SOYO – SY_MB
TMC – BIGO
Toshiba – Toshiba

Sunday 2 December 2012

OPEGYPT TASK-1


Hello Hackers;
There is a good chance to become a member of anonymous hackers group.
The Irc registration process is In the following post read it carefully.
There is a revolt going on Egypt join the revolt by ddos attack over the respected targets given.
The Tagets will be available at irc channel of anonops
Server:    irc.anonops.com
Channel: #egypt
Software you have to use:
Hping:          http://www.hping.org/
slowloris:     http://ha.ckers.org/slowloris/
HOIC:           http://www.mediafire.com/?jkc7924jsa0161Z
Pyloris:         http://sourceforge.net/projects/pyloris/
THC-SSL-DOS: http://www.thc.org/thc-ssl-dos/

I RECOMMEND HOIC
For anonymity use a vpn software Compulsory
DOWNLOAD FREE HOTSPOT SHIELD at www.hotspotshield.com

BUT Hacktrack Is Not Responsible For Anything , So u Have To Do it On Ur Own Risk.



REGISTER IN IRC CHANNEL:


REGISTER IN IRC CHANNEL
Follow these following steps to register in Irc,
Download An Irc Client: xchat (recommended)
Install it and run it
Click start
In Window at Bottom u will be Seen a Chat Box
Type These Commands to get registered
/nick NickName
Press Enter
Enter the server address on which server u want to be registered
/server irc.anonops.com (recommended)
Press enter
/msg nickserv register password email@address
Then a Mail will be sent to your mail account and they will give a command link
Just paste the link in the chat box of the Irc client
Then U will be registered in their server
Whenever u want to login
Just enter the server command given and it will ask to identify
Then enter the following command and press enter
/msg nickserv identify password
After finishing identify then u have to join a channel
Type the following command to join a channel
/join #channelname
For joining in anonymous group first logon to their server
And join the following channels
#opegypt
#opisrael

Then u Will Be Seen Many Members Chatting with each other join them



Wednesday 7 November 2012

BLUETOOTH:



           The simplest and most common way for two hand held devices to communicate with each other is via Bluetooth. Bluetooth networking transmits data via low-power radio waves. It communicates on a frequency between 2.402 GHz and 2.480 GHz. This frequency band has been set aside by international agreement for the use of industrial, scientific and medical devices (ISM). Bluetooth devices send out weak signals of about 1 mill watt to avoid interference with other devices such as computers and cell phones. This low power, however, limits its range to 10 meters, but its signal can pass through walls so direct line of sight is not required.

           Another great advantage of Bluetooth is that it can connect up to eight devices simultaneously without interference. It use a technique called “spread-spectrum frequency hopping” which, put in simple words, means it keeps changing its frequency in the designated range and thus interference, if any, lasts for a fraction of a second and goes unnoticed.

            Like any wireless network, security is a concern with Bluetooth. The automatic nature of the connection which makes it easy to use can also be used against you by sending data without your permission. To avoid this, Bluetooth offers several security modes, and device manufacturers determine which mode to include in a Bluetooth-enabled gadget, the user has to decide whether to allow it. If you use the device quite often, you can mark the device as trusted and it will be able to exchange data without permission.

CEC (CONSUMER ELECTRONIC CONTROL):



          One of the biggest challenges of technological revolution is creating intelligent devices that can communicate with each other. The CEC technology brings us one step closer to the dream. CE (CONSUMER ELECTRONIC) devices can automatically configure themselves and correct errors without user intervention. Using the HDMI frame work, CEC takes user experience to a whole new level. For example, you can connect your camcorder to your CEC-enabled HDTV and TV will automatically detect the device and display it on the screen. You can control your camcorder with your CEC-enabled HDTV. Same goes for DVD players and set-top boxes; you don’t need to switch remotes when you use different devices. Unlike DLNA, interportability is an issue here. You can control devices only of they have the same manufacturer.

DLNA (DIGITAL LIVING NETWORK ALLIANCE):




When people started networking home entertainment devices, it was difficult and confusing to add a new device and get it to communicate with their computers and other network devices. There was need for standards and guidelines for home networking media devices. So, several manufactures got together to create a standard so that all of their products were compatible in a home network and thus the digital living network alliance was born in 2003. When a device is DLNA certified devices irrespective of the manufacturer of the product. DLNA certified devices can: find and play movies; send, display and/or upload photos; find, send, play and/or download music; and send and print photos. DLNA uses universal plug and play (UPnP) for media management, discovery and control so they require little or no setup and can be immediately connected to your existing DLNA network.