Showing posts with label change ip. Show all posts
Showing posts with label change ip. Show all posts

AATools

"Essential Security Diagnostic Tool for Everyone Who Wishes to Protect His Computer and The Data It Contains"

Have you been port scanned lately? Completely ignoring network security is not smart and ignorance isn't exactly bliss. If you access the Internet via a cable modem, DSL, or even a dial-up connection, someone is always knocking on your virtual front door, giving your system the once-over.
Whether you dial-up your ISP or have an "always on" cable modem, the first item on your agenda needs to be finding a secure firewall to protect your computer. Some firewalls are better than others, but you should never trust clever advertising claiming that a cheap firewall will completely protect your data. Once you have decided on a firewall, be it a hardware or software solution, testing the security of that firewall is essential, and AATools is just a testing utility that verifies the integrity of your security and firewall functions.
Advanced Administrative Tools (AATools) investigates and gathers information about your computer, network status, and service availability. That is a layman’s way of saying it performs an inspection on everything vital to network security as it pertains to the protection of your computer, including the utilization of tools to check open ports, proxies, email lists, Internet applications, and general system information.
Useful for system administrators, service personnel or anyone who simply wants to know more about their PC and its connections to the network or Internet, audit your network security.
– ZDNet/Hotfiles.com
AATools includes:
  • Port Scanner with an internal database of ports (officially assigned, unofficially used, or currently affected by network Trojan programs) that analyzes hosts and different services that have been started on them. Its comprehensive scanning engine gathers information about the services, threads, etc. The AATools Port Scanner accurately determines active ports/services using TCP/UDP port interrogation.
  • Proxy Analyzer that tests lists of proxies and/or verifies a list of addresses on present proxy servers. It provides the most detailed information about the proxy itself, including, its headers, locations etc.
  • RBL Locator (RealTime BlackList Locator) designed to quickly search for an IP address in DNS-Based spam databases. RBL Locator checks an IP address against the most known blacklists. It helps you determine if you're listed as a "bad actor" within any of the shared blacklists.
  • Trace Route that shows you the path that a packet sent from your machine to some other machine on the network takes as it hops from router to router. It will show you the IP address and the actual name of each router, line-by-line.
  • Email Verifier – your unique solution for the "message delivery error". You don't need to disturb your clients and friends anymore to verify whether their e-mail addresses are still valid or not. Email Verifier connects directly to their SMTP server and checks it for you. Nothing is sent to the recipient.
  • Links Analyzer – a new state-of-the-art utility that scans your URLs and IE Favorites and notifies you if a link has been changed or has become invalid. It also acts as a navigation tool and makes it very easy to find what you are looking for eliminating the need to search inside folders.
  • Network Monitor that shows you an extremely large amount of supplementary information about your outbound and inbound network connections. Plus, the AATools Network Monitor maps open ports to the owning application (for Windows NT/2000/XP only). It is useful in diagnosing networks and monitoring your computer's network connections.
  • Process Monitor that provides you the information about the processes and applications loaded into your PC's memory, including sniffers and hooks.
  • Whois, a useful network information utility that allows you find all the available information about IP addresses, host names, location, NSP name, administrator and technical support contact information of any Internet address.
  • System Info that collects and displays your system configuration information. Support technicians require specific information about your computer when they are troubleshooting your configuration. You can use the System Info tool to quickly find the data they need to resolve your system problem.
  • Resource Viewer intended for viewing the resources of executable files (with the .exe and .dll extension). It displays comprehensive information about program resources including dialogs, icons, strings and more. Resource Viewer can also be used to save resources of any selected module on your hard disk.
  • Registry Cleaner that cleans up unnecessary registry entries in your registry and helps increase your computer performance, speed up the operation system loading and reduce the number of failures.
System Requirements
* Windows 2000/XP/Vista/7 (32-bit)
* Internet connection or TCP/IP enabled LAN.
* Internet Explorer 5.5 or higher.

Download Now :
Advanced Administrative Tools
Version: 5.92
For Windows 2000/XP/Vista/7 (32-bit)
* No Mac or Linux version available
Read more ...

Trojan Sub7

If you haven't heard of Sub7, I suggest you leave now, find out what it is, then come back. Stop wasting my time. If you think you have the skilled mind for it, stick around, and I will introduce you to one of the many essential tools hackers have ready at all times.

Origin

Sub7 was invented in the late 1980's by a legend known as Mobman. Mobman wanted to make the basic tasks of a hacker easily accessable and easy to implement. I'm not sure what exactly he programmed it in, but it was probably something extremely difficult and involved, like Visual Basic or A+. I read up on Mobman, no one knows of his whereabouts and some even claim that he is dead (real hackers know better). Either way, we can all thank Mobman for this great program.

What it is

Sub7 is a R.A.T (Remote Administration Tool) that basically has two parts: a client, and a server. After you have the server installed on another machine, or trick another person into installing the server on their machine, you can use the client to connect to them through network protocols and routes. After you're connected to them, the client provides you with a series of hacking tools and features to use on your victim. Which, obviously, is the goal of any hacker.
Sub7 has made this easy, but the only hard part is having the server installed on the other machine. You can see the official Sub7 website for tactics on how to accomplish this.


Screenshot of the Sub7 client window



Features

Sub7 is well-known for it's wide selection of elite tools and features. Listed below are just a few that come to mind:
  • Keylogger
  • Uploader
  • Server
  • Customized skins
  • Hide cursor
  • Client
  • CDROM close/open
  • Hide cursor
  • IP Pinging
  • Name lookup/revolution
  • Change the appearance of icon

Availability

Sub7 was banned by the United Nations in 1995, but I consulted my many underground resources and found it for you. The last version that was made was Sub7 Legends, and is available for download here. This file is extremely rare, and was very hard to find. I had to download it through KaZaA.
Again, as with many things found on this site, the creator of this site is NOT responsible for anything you do with the knowledge or tools found within the site. Everything here is for educational purposes only. If you do not agree, leave now.
Read more ...

CallerIP

Similar to Caller ID for your telephone, CallerIP shows you who is connecting to your system at any time.
# Plot all connections
This feature enables you to have CallerIP plot all the connections on the world map. This in turn allows for easy and quick analysis of where connections made to/from your machine reside.
# New look table
The new look table includes gradient fills. This means the color of the row in the table depends on the threat of the connection. If the connection being made to your machine is harmless then the gradient will be green. Another quick an easy way to identify the threat of a connection.
# Condensed CallerIP
CallerIP now allows you to minimize it to a very small and detailed dialog box. The small window gives you everything you need to know but stays in the background.
# Realtime monitoring instantly identifies suspect activity and spyware
CallerIP monitors all connections to and from your system and actively scans ports for possible back doors that allow unauthorized access.
# Identifies the country of origin for all connections
A connection to/from a high-risk country is a key indicator of suspect activity and could likely be someone looking to steal your confidential information or compromise your system. CallerIP shows you the country location of connections so you can identify suspect activity and protect your information.
# Network Provider reporting with abuse reporting information
See the contact and abuse reporting information for the company providing internet access for an IP address or website, so you can easily report hackers or Internet abuse.
# Worldwide Whois reports
CallerIP Pro queries worldwide databases to report the up-to-date registration information for the 'owner' of an IP address or domain. Information includes name, address, phone and email contact information.
# Detailed log of connection history with search options
Each connection or attempted connection is automatically logged, with search capabilities for quick lookups of past connection activity.
Advanced Features
# The Advanced Edition includes all the standard features plus:
# CallerIP Server
Allows you to monitor your machine from a remote location. You can view the Caller History and Current Callers list in a browser window from anywhere in the world. Keep tabs on your home PC from the office of vice versa. No need to worry about your PC being connected to without your permission. The ultimate in PC security. Screenshot.
# Improved logging technique
Searching large log files is literally hundreds of times faster than before. Find any IP or connection in lightning quick time.
Automated alerts of high-risk connections
Instant notifications for high risk or suspect connections are provided by email, pop-up window, or color-coded reports. And customizable alerts enable you to see an alarms for a connection by type (incoming/outgoing), country of origin, IP address, port or process name.


Read more ...

How To: Change Your Ip In Less Then 1 Minute

This article will help you to change your IP address within a minute. Just follow the following step and you will be thru.

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

Read more ...

How to Trace IP address from Emails

If you deal with Computer Security and Penetration testing , you must be knowing the importance on IP address . To perform any kind of penetration testing or hacking you first need to know the IP address . Here I am going to discuss how to obtain IP address from Gmail , Yahoo and Hotmail .

Gmail

Open the mail you have received from your friend and click on the down arrow to the

 right of the reply button. Now click on Show Original.



 You will get to see the complete headers of the mail from which you have to find 
the IP from which this mail   was sent. Mostly in case of a static IP, the IP is
shown as in the figure


Hotmail:

Right click on the received mail and select 'view message source'



 

You will get the complete message with source. This is how the originating IP looks in hotmail


Yahoo:


Open the mail and at the right bottom of the mail, click on 'Full headers'




 Again over here you will get to see the IP in the same format as in hotmail and gmail, shown above.

Read more ...

Netbios Hacking - A Network hack

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.



STEP-BY-STEP NETBIOS HACKING PROCEDURE

1.Open command prompt

2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).

Example: C:>net view \59.43.45.212

The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here “59.43.45.212? is an IP address of remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP address in it’s place.If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address.

3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios command which makes it possible to hack remote drives or printers.

Example-1:
C:>net use D: \59.43.45.212F
Example-2:
C:>net use G: \59.43.45.212SharedDocs
Example-3:

C:>net use I: \59.43.45.212Myprint

NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.

NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT

F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer.These are displayed after giving “net use” command. “59.43.45.212? is the IP address of remote
computer that you want to hack.

4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.
[ad code=1 align=center]
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system.You can access filesfolders quickly through “Command Prompt”.

NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address.
Read more ...

How to Trace Any IP Address

In my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.
Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address.
A sample snapshot of the results from ip2location.com is given below


You can also visually trace route any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.
Read more ...

How to Find the IP Address of a Remote Computer

Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.

I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.
1. Download the IP Finder script (IP_Finder.ZIP) that I have created.
2. Open a new account in X10Hosting (or any free host that supports PHP).
3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.
4. You can rename the ip.php to any name of your choice.
5. Set the permission to 777 on ip_log.txt.
Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.
For your better understanding let’s take up the following example.
Suppose you open a new account in X10hosting.com with the subdomain as abc, then your IP Finder link would be


You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.
To find the recorded IP address check the logs using the following link.


The sample log will be in the following format
79.92.144.237 Thursday 07th of May 2009 05:31:27 PM
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM
NOTE: You have to replace abc with your subdomain name. 
I hope this helps. Express your opinion and suggestions through comments.
Read more ...
Powered by Blogger