www.metro-mendax.webege.com/koCD.iso
HACK TRACK
Thursday 10 January 2013
Tuesday 4 December 2012
How to Bypass or Remove a BIOS Password
A BIOS password is
a protection measure that can be used to stop someone powering up a computer
system or making changes in some of the computers most sensitive areas. Many
big name computer manufacturers such as Dell and HP lock the customers out of
this area because they don’t want the customer changing anything and
potentially damaging the machine (which the manufacturer may have to warranty).
However, when someone like a computer technician or hardware enthusiast needs
to make some hardware changes to the computer, they will need to access the
BIOS. Here are some methods to bypass or remove a BIOS password.
NOTE: Do not try to guess the password on a
passworded Hard Drive. 3 wrong guesses will often result in the information on
the hard drive being lost forever.
How to Bypass or
Remove a BIOS Password by Removing the CMOS Battery:
The simplest way to remove a BIOS password is
to simply remove the CMOS battery. A computer will remember its settings and
keep the time even when it is turned off and unplugged because these parts are
powered by small battery inside the computer called a CMOS battery. If we pull
out this battery, the computer will forget alot of its hardware settings,
including its BIOS password. This should not be performed on Laptops if you are
not experienced working with laptop hardware.
Anyway, open up
the computer case using a screw driver and locate the flat, circular and
metallic CMOS battery. It should look something like the picture to the right.
Some computers have this part standing upright.
Once you have
located it, observe how the latches are holding it. There are many different
ways to remove a CMOS battery but the most common way on newer computers can be
seen in the picture below.
Make sure to power
down the computer, unplug the power cables and unplug any USB devices if they
are powered. The computer must not be able to get power from anywhere for this
to work. Take out the CMOS battery and wait 10 – 25 minutes before putting it back
in. The reason for this wait is because the computer can still store power in
its capacitors even though everything is unplugged. The waiting period allows
enough time for them to discharge.
Plug everything
back in, power up the computer and enter the BIOS again. If everything went
well there should be no more password. In some cases, if you get weird error
messages during bootup now, you will need to goto “Load BIOS Defaults” in BIOS
and save the changes to fix them.
If this method
didn’t work, try one of the methods below.
How to Bypass or
Remove a BIOS Password using Software:
!BIOS is a
freeware utility which is designed to be a whole BIOS and security suite. It
has the ability to decrypt the passwords used in some of the most common BIOS
makes such as Award, Phoenix, American Megatrends, IMB etc..
It also has the ability to brute force the
password (known as “blasters”). However, this method is dangerous and can
result in some unexpected and unwanted results.
Note: Because of
this applications password cracking abilities, some antivirus software may
report it as a virus/trojan. This is a false positive.
To start using
!BIOS, reboot your computer and take note of the BIOS type and version you are
running. For example, If your motherboard uses Award BIOS you should look for
the text “Award Medallion BIOS 6.0″ or something similar.
Download !BIOS
from here and save it to your desktop. Then, open a DOS command windows by
going to Start > Run and type: cmd
Once you see a
black screen in front of you, type: cd desktop
You should now see something like:
C:\Documents and Settings\yourusername\Desktop>
Now type the name
of the file you just downloaded, if you haven’t changed the name just type in:
bios320.exe
Use the down arrow and choose “Crackers” and
then press the right arrow. Using the up and down arrows, select the BIOS that
the motherboard is using and press Enter.
You should now see
a menu asking what you want to crack, in most cases its the Supervisor or
System Passwords you want to crack, so press the 1 key on your keyboard. It
will then show you another menu asking how you want it to be cracked. Option 1
is pretty good so try that first by pressing the 1 key on your keyboard. You
should now have your BIOS password.
Reboot the
computer, enter the BIOS and try it out.
How to Bypass or
Remove a BIOS Password using the manufacturer backdoor password:
On many computers
(especially old ones), computer manufacturers build in backdoor passwords for
their own technicians to use so they can access the BIOS when the hardware is
being serviced. Here are some of the ones that have been reported. You may need
to try quite a few passwords before you find one that works
These passwords
are case sensitive.
AMI BIOS Backdoor
Passwords:
A.M.I.
AAAMMMII
AMI
AMI?SW
AMI_SW
BIOS
CONDO
HEWITT RAND
LKWPETER
MI
Oder
PASSWORD
Award BIOS
Backdoor Passwords:
(eight spaces)
01322222
589589
589721
595595
598598
ALFAROME
ALLY
Ally
Ally
Ally
Apaf
Award
AWARD PW
AWARD SW
AWARD?SW
AWARD_PW
AWARD_SW
AWKWARD
Awkward
IOSTAR
CONCAT
CONDO
Condo
Condo
D8on
Djonet
HLT
J256
J262
J262
J322
J332
J64
KDD
LKWPETER
Lkwpeter
PINT
Pint
SER
SKY_FOXSYXZ
SKY_FOX
Syxz
SYXZ
TTPTHA
ZAAAADA
ZAAADA
ZBAAACA
ZJAAADC
Russian Award BIOS
Passwords:
%øåñòü ïpîáåëîâ%
%äåâÿòü ïpîáåëîâ%
Phoenix Backdoor
BIOS Passwords:
BIOS
CMOS
Phoenix
PHOENIX
Other
Manufcaturers Backdoor Passwords: (manufacturer name – password)
VOBIS and IBM –
merlin
Dell – Dell
Biostar – Biostar
Compaq – Compaq
Enox – xo11ne
Epox – central
Freetech –
Posterie
Iwill – iwill
Jetway – spooml
Packard Bell –
bell9
QDI – QDI
Siemens – SKY_FOX
SOYO – SY_MB
TMC – BIGO
Toshiba – Toshiba
Sunday 2 December 2012
OPEGYPT TASK-1
Hello Hackers;
There is a good chance to become a member of anonymous
hackers group.
The Irc registration process is In the following post read it
carefully.
There is a revolt going on Egypt join the revolt by ddos
attack over the respected targets given.
The Tagets will be available at irc channel of anonops
Server:
irc.anonops.com
Channel: #egypt
Software you have to use:
Hping:
http://www.hping.org/
slowloris:
http://ha.ckers.org/slowloris/
HOIC:
http://www.mediafire.com/?jkc7924jsa0161Z
Pyloris:
http://sourceforge.net/projects/pyloris/
THC-SSL-DOS: http://www.thc.org/thc-ssl-dos/
Torshammer: http://packetstormsecurity.org/files/98831
I RECOMMEND HOIC
For anonymity use a vpn software Compulsory
DOWNLOAD FREE HOTSPOT SHIELD at www.hotspotshield.com
BUT Hacktrack Is Not Responsible For Anything , So u Have To Do it On Ur Own Risk.
REGISTER IN IRC CHANNEL:
REGISTER IN
IRC CHANNEL
Follow these
following steps to register in Irc,
Download An
Irc Client: xchat (recommended)
Install it
and run it
Click start
In Window at
Bottom u will be Seen a Chat Box
Type These
Commands to get registered
/nick
NickName
Press Enter
Enter the
server address on which server u want to be registered
/server
irc.anonops.com (recommended)
Press enter
/msg
nickserv register password email@address
Then a Mail
will be sent to your mail account and they will give a command link
Just paste
the link in the chat box of the Irc client
Then U will
be registered in their server
Whenever u
want to login
Just enter
the server command given and it will ask to identify
Then enter
the following command and press enter
/msg
nickserv identify password
After
finishing identify then u have to join a channel
Type the
following command to join a channel
/join
#channelname
For joining
in anonymous group first logon to their server
And join the
following channels
#opegypt
#opisrael
Then u Will
Be Seen Many Members Chatting with each other join them
Wednesday 7 November 2012
BLUETOOTH:
The simplest and most common way for two hand held devices
to communicate with each other is via Bluetooth. Bluetooth networking transmits
data via low-power radio waves. It communicates on a frequency between 2.402
GHz and 2.480 GHz. This frequency band has been set aside by international
agreement for the use of industrial, scientific and medical devices (ISM).
Bluetooth devices send out weak signals of about 1 mill watt to avoid
interference with other devices such as computers and cell phones. This low
power, however, limits its range to 10 meters, but its signal can pass through
walls so direct line of sight is not required.
Another great advantage of Bluetooth is that it can connect
up to eight devices simultaneously without interference. It use a technique called
“spread-spectrum frequency hopping” which, put in simple words, means it keeps
changing its frequency in the designated range and thus interference, if any,
lasts for a fraction of a second and goes unnoticed.
Like any wireless network, security is a concern with Bluetooth.
The automatic nature of the connection which makes it easy to use can also be
used against you by sending data without your permission. To avoid this, Bluetooth
offers several security modes, and device manufacturers determine which mode to
include in a Bluetooth-enabled gadget, the user has to decide whether to allow
it. If you use the device quite often, you can mark the device as trusted and
it will be able to exchange data without permission.
CEC (CONSUMER ELECTRONIC CONTROL):
One of the biggest challenges of technological revolution is
creating intelligent devices that can communicate with each other. The CEC
technology brings us one step closer to the dream. CE (CONSUMER ELECTRONIC)
devices can automatically configure themselves and correct errors without user
intervention. Using the HDMI frame work, CEC takes user experience to a whole
new level. For example, you can connect your camcorder to your CEC-enabled HDTV
and TV will automatically detect the device and display it on the screen. You
can control your camcorder with your CEC-enabled HDTV. Same goes for DVD
players and set-top boxes; you don’t need to switch remotes when you use
different devices. Unlike DLNA, interportability is an issue here. You can
control devices only of they have the same manufacturer.
DLNA (DIGITAL LIVING NETWORK ALLIANCE):
When people started networking home entertainment devices,
it was difficult and confusing to add a new device and get it to communicate
with their computers and other network devices. There was need for standards
and guidelines for home networking media devices. So, several manufactures got
together to create a standard so that all of their products were compatible in
a home network and thus the digital living network alliance was born in 2003.
When a device is DLNA certified devices irrespective of the manufacturer of the
product. DLNA certified devices can: find and play movies; send, display and/or
upload photos; find, send, play and/or download music; and send and print
photos. DLNA uses universal plug and play (UPnP) for media management,
discovery and control so they require little or no setup and can be immediately
connected to your existing DLNA network.
Subscribe to:
Posts (Atom)