Web Analytics

ad

Saturday, September 28, 2013

How to Hack an Ethernet ADSL Router

Hack ADSL RoutersAlmost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet. However, most of them are unaware of the fact that it has a serious vulnerability in it which can easily be exploited by anyone with a basic knowledge of computer. In this post, I will show you how to hack an Ethernet ADSL router by exploiting the common vulnerability that lies in it.
Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later.
This makes it possible for the attackers to gain unauthorized access to the router and modify its settings using a common set of default usernames and passwords. Here is how you can do it. Before you proceed, you need the following tool in the process:

Hacking the ADSL Router:

Here is a detailed information on how to exploit the vulnerability of an ADSL router:
  1. Go to www.whatismyipaddress.com. Once the page is loaded, you will find your IP address. Note it down.
  2. Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
  3. Suppose your IP is 117.192.195.101, you can set the range something as 117.192.194.0 to 117.192.200.255so that there exists at least 200-300 IP addresses in the range.
  4. Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.
  5. IP Scanner Settings
    I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Optionsinstead of Tools
  6. Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image:
  7. Angry IP Scanner
  8. Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-passwordpair will be admin-admin or admin-password.
Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below:
Router Settings Page Hacked!
If you do not succeed to gain access, select another IP from the list and repeat the step-5. At least 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can a Hacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or even hijack the DNS by pointing it at a rouge DNS server. If this happens, the victim will have to reconfigure/reset the router settings in order to bring it back to normal.

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.
Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.
Warning!
All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

How to Change the ICON of an EXECUTABLE file

Some times it becomes necessary to change the icon of an executable file so that the file gets a new appearance. Many of the tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user. But, in reality if the file is carried to a different computer, then it shows its original icon itself.
This means that in order to permanently change the icon, it is necessary to modify the executable file and embed the icon inside the file itself. When this is done the executable file’s icon is changed permanently, so that even if you take file to a different computer it show’s a new icon.
For this purpose I have found a nice tool which will modidify the executable file and embed the icon of your choice into the file itself. ie: The tool changes the icon of the executable file permanently.

How to Change the Executable File Icon?

Here is a step-by-step instruction on how to use this tool to change the icon of any EXE file:
  1. Go to www.shelllabs.com and download the trial version of IconChanger and install it (Works on XP, Vista and Win 7).
  2. Run the IconChanger program from Start -> All Programs and you should see an interface as shown below:
    Change EXE File Icon
  3. Now you will see a window stating that “Choose an object whose icon you want to change”. Click on the “OK” button.
  4. Now select the executable file for which you wish to change the icon.
  5. Icon changer will automatically search for all the icons on your “C:\ drive” so that you can select any one of those. If your desired icon is not shown in the window, you may paste the path of your icon file in the field which says “Search icons in” so that your desired icon gets displayed.
  6. Select the ICON of your choice and click on Set button.
  7. Now a popup window will appear and ask you to select from either of these two options.
    • Change embeded icon.
    • Adjust Windows to display custom icon.
  8. Select the first option (Change embedded icon). You are done. The icon gets changed.

How to Make a Trojan Horse

How to Make a Trojan HorseMost of you may be curious to know about how to make a Trojan or Virus on your own. Well, here is an answer to your curiosity. In this, post I’ll show you how to make a simple trojan on your own using the C programming language.
This trojan when executed will eat up the hard disk space on the root drive (The drive on which the Windows is installed, usually C: Drive) of the computer on which it is run. Also, this trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run.
So, I’ll call this as Space Eater Trojan. Since this program is written using a high level programming language, it is often undetected by antivirus programs. The source code for this program is available for download at the end of this post. Let’s see how this trojan works:
Before I move on to explain the working of this program, you need to know what exactly is a Trojan horseand how it works. Unlike what many of us think, a trojan horse is not a virus. In simple words, it is just a program that appears to do a favorable task but in reality performs undisclosed malicious functions that allow the attacker to gain unauthorized access to the host machine or cause a damage to the computer.

Now let’s move on to the working of our Trojan:

The trojan horse which I have created appears itself as an antivirus program that scans the computer for malware programs. However, in reality it does nothing other than eating up the hard disk space on the root drive by filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result, the the root drive gets filled up completely with in minutes of running this program.
Once the disk space is full, the trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any of the cleanup program. This is because, the trojan intelligently creates a huge file in the Windows\System32 folder with the .dll extension. Since the junk file has the .dll extension it is often ignored by the disk cleanup software. Hence there is now way to recover the hard disk space other than reformatting the drive.

The algorithm of the Trojan is as follows:

  1. Search for the root drive.
  2. Navigate to %systemroot%\Windows\System32 on the root drive.
  3. Create the file named “spceshot.dll“.
  4. Start dumping the junk data onto the above file and keep increasing its size until the drive is full.
  5. Once the drive is full, stop the process.
You can download the Trojan source code HERE. Please note that I have not included the executable for security reasons. You need to compile it to obtain the executable.

How to compile the program?

For step-by-step compilation guide, refer my post How to compile C Programs.

How to test this trojan horse?

To test the trojan, just run the SpaceEater.exe file on your computer. It will generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up the hard disk space

How to Compile C Programs

How to compile C programs
Here is a step-by-step procedure to install Borland C++ compiler 5.5 on your PC and compile the C programs.

How to Install Borland C++ compiler?

Follow the below steps to install Borland C++ compiler 5.5 on your PC:
  1. Download Borland C++ compiler 5.5 (for Windows platform) from the following link:
  2. After you download, run the file C++5.51.exe. The default installation path would be:
    C:\Borland\BCC55

How to configure Borland C++ compiler?

Here is a step-by-step instruction on how to configure the compiler:
  1. After you install Borland C++ compier, create two new Text Documents.
  2. Open the first New Text Document.txt file and add the following two lines into it:
    -I”c:\Borland\Bcc55\include”
    -L”c:\Borland\Bcc55\lib”
    Save changes and close the file. Now rename the file from New Text Document.txt to bcc32.cfg.
  3. Open the second New Text Document (2).txt file and add the following line into it:
    -L”c:\Borland\Bcc55\lib”
    Save changes and close the file. Rename the file from New Text Document (2).txt to ilink32.cfg.
  4. Now copy the two files bcc32.cfg and ilink32.cfg, navigate to C:\Borland\BCC55\Bin and paste them.

How to Compile the C Source Code (.C files)?

Here is a detailed instruction on how to compile C source codes:
  1. You need to place the .C (example.c) file to be compiled in the following location:
  2. C:\Borland\BCC55\Bin
  3. Now go to the command prompt (Start->Run->type cmd->Enter)
  4. Make the following path as the present working directory (use the CD command):
  5. C:\Borland\BCC55\Bin
  6. To compile the file (example.c) use the following command:
  7. bcc32 example.c
  8. Now if there exists no error in the source code, you’ll get a compiled executable module (example.exe) in the same location (C:\Borland\BCC55\Bin).
  9. Now you have successfully compiled the source code into an executable file(.exe file).
NOTE: The above tutorial assumes that you’ve installed the compiler onto the C: drive (by default).

How to Enable or Disable Toast Notifications on Windows 8

Toast Notification
Windows 8 is among the most incredible and interesting kind of Windows version from Microsoft. It has visually eye catching design, which is found in modern user interface that is meant for redesigning a number of operating systems, worked out for users. If you have used or seen someone using Windows 8 you could have noticed the toast notifications in this modern version of windows, which simply appears the moment you install or uninstall any application. There are many users who are well versed with the bubble notifications, which were found in the earlier versions of Windows seen via the taskbar. The new application platform in Windows 8 comes with an integrated notification system for installing or uninstalling a number of modern applications.
The Windows 8 style application can employ a number of notifications types including the traditional toast notifications, live titles and lock screen. These can be managed by either disabling or enabling the notification of your application for certain accounts or simply silencing the notifications temporarily so that you are not often bugged by them. Unfortunately, this new version of Windows 8 simply doesn’t carry any notification center, which allows you to view the history of your notifications in just one place. The pop up notification of Windows 8 is very much transient wherein its lock screen application and live tiles portray a more permanent kind of notifications. Well, let’s check out the step by step tips to enable Toast Notifications found in Windows 8 as under:

Enabling Toast Notifications on Windows 8

You have a number of options when it comes to enabling or even disabling the Toast Notifications in Windows 8. This feature is very much beneficial; however, at times it can be annoying while you see them popping up time and again. Hence you have some simple ways to enable and disable the same. Once you have disabled it and after some time want to enable it, don’t get disheartened. Unlike the simple ways of disabling, the steps involved for enabling the toast notifications in Windows 8 too are very much simple. Let’s check them step by step.
Steps for Enabling Toast Notifications:
The users have the option to receive the toast notifications by simply changing the PC settings found over the OfficeScan client PC. This is the place where you have the option of enabling the toast notifications.
Step 1 – If you are keen to enable the same, the first step you need to do is to move the pointer of your mouse at the right corner of your screen just at the bottom side so that you end up displaying the Charms bar.
Step 2 – Once you carry out the first step, it’s time to move to the second, wherein you need to click at Settings and then to – “Change PC Settings” then you will see the PC Settings screen appearing before you.
Step 3 – Once you are done with the second step, it’s time to head on to the third step wherein you need to click over the option called “Notifications”. The moment you click over this section, you are supposed to choose the “On button” so that you enable the Toast Notifications in your Windows 8 based computer system.
Step 4 – This is the final step, wherein you have to choose on the option of “ON” to the three things. These include the “Show App Notifications”, “Play Notification Sounds” and the “Show Application Notifications” on the Lock Screen. The first one is mandatory while the last two are are optional and the choice to enable them is upto you.

Final Word

Microsoft has come up with this feature only in the latest versions of Windows – the Windows 8. However, if you are using operating systems like Windows 7, Windows XP or Windows Vista then make sure you do not have this notification to bug you. In your initial days, you may find a bit difficult doing whole lot of these steps as discussed above, hence it is vital to jot down all these steps in your notepad and start doing it as and when you need them. Doing them several amount of times can enable you to remember the same.
Windows 8 is a new and the most modern kind of operating system and hence different than the previous versions. You need some time to get accustomed to the same before you start using them proficiently. This certainly includes the enabling and disabling of the Toast Notifications.

How to Spy on BBM Messages

Spy on BBM Messages
Just when we thought that BlackBerry was dead and gone, or perhaps on its last breath, the BlackBerry Corporation (formerly known as Research In Motion) released a new series of handsets at the beginning of the year with the latest version of their OS the BlackBerry 10 OS. As soon as the set was released the initial worldwide reception was enough to get just about any BlackBerry critic to admit the comeback.
So BlackBerry sets are being seen sported around again which consequently means that the company’s legendary BlackBerry Messenger service is kicking and roaring back into action. The service is an in platform messaging software which allows individuals who use the BlackBerry platform to communicate with each other through messages without incurring any extra data plan or package fee. If someone close to you owns a BlackBerry then you will be only too familiar with this service and might also get the itch to read the messages that are being exchanged. Whether you are a concerned parent or suspicious spouse, to know what’s happening in their life, you must know how to access their BBM messages. Here is how to go about it.
1. Look For BBM Spy Software: In order to get into their BBM messages, you will need the help of specially designed software that can retrieve the desired data. However, there is a dearth of good programs that will specifically target the messaging service. Many apps will allow you to access phone conversations or call logs but not the actual messages exchanged in BBM chat. So when looking for software to use, make sure it specifies itself as a Blackberry Spy app.
2. Evaluate the Options: Once you find software that can access BBM messages, pick one that suits your needs the best. If you are unable to figure out any at all, then there are two good apps for starters that you can try. Spyera is a good option that solves many problems when it comes to spying. With this one you can access BBM conversations, emails, texts and even ongoing phone calls. You can also try MobiStealth spy software. Like Spyera you can use it to access BBM messages, videos and photos but not live calls. Both of them allow for the user to monitor the target BlackBerry remotely. With MobiStealth you can receive the data from an online dashboard or private email account.
3. Download and Install: Once you have decided on BBM spy software, you need to purchase it. In order for it to work it needs to be accessed from the target’s phone. That means you must physically retrieve the BlackBerry you wish to monitor and access the Internet. Stealth would be required on your side of course. After that you proceed to downloading it from the source site. Once download is complete, begin the installation process. Once the notification of installation completion appears, you can be sure that the spy software is successfully in place. Simply wait for conversations to take place and then monitor them!
//