Here's how to break into *some* pr0n sites that accept checks. I know most or all CCBill sites are vulnerable to this.
NOTE: Use a proxy.
First, go to the Fedwire directory at http://www.fedwiredirectory.frb.org/search.cfm . Find a bank somewhere.
I've chosen The Bank of Clovis, in Clovis, New Mexico.
What I need is the routing number. This bank's is: 112206776
Now I need a pr0n site. For this tutorial, I'll use http://www.sapphicerotica.com .
So I head over to the Join page. It looks like they accept Online Check!
I sign up with a fake e-mail, they never confirm.
Now it takes me to the CCBill join page. I put in fake info with a real address (Mcft's). They don't verify this, either.
What is important is the billing info:
Name on account: Just make it your fake name
Routing Number: You got this from Fedwire. No hyphens are used here.
Account number: Just type a random, 7-digit number.
"Thank you for your purchase, you have been approved!"
I'm in!
A few notes:
Your account won't last long. As soon as the bank says "that info is fake", the account is gone.
This works on more than just CCBill. It doesn't work on all check-accepting processors, but I've hit at least four different processors that it does.
Not all sites accept checks, probably because of this.
If it doesn't work the first time, switch proxies, find new info, and try again.
Wednesday, September 17, 2008
Wi-fi Without Routers
sharing your existing ethernet internet connection
1. go to control panel -> network connection.
2. right click on your ethernet connection and click on “properties”.
3. go to “advanced” tab.
4. check “allow other network….. internet connection”
5. in the drop down below select the wifi connection of your pc. if it is disabled, it will be showing your wifi connection already.
6. click on “settings”
7. check the protocols you need to share.i normally use only http and https.
8. click on “ok”.you reach the network connection page. the sharing part is now over.
finding dns server ip address.
1. click on start -> run
2. type in cmd in the run prompt
3. in the new window type “ipconfig /all” and press enter.
4. note down your dns server ip address from the screen.
configuring the wifi
1. go again to control panel -> network connections.
2. right click on your wifi connection and click “properties”.
3. go to”wireless network” tab.
4. the “use windows to configure my wireless network connection” should be checked.
5. in the preferred network connection section click on add button
6. enter a name of your wish to the network name.
7. network authentication is “open”
8. change data encryption to “disabled”
9. check the “this is a computer to computer …. not used” connection.
10. click “ok”.
11. click on general tab. select “internet protocol(tcp/ip) and click on properties button.
12. now type 192.168.0.1 in ip address, 255.255.255.0 in subnet mask, leave default gateway empty.
13. fill in the dns server entry which you had noted down earlier.
14. click on “ok” and your network is set.
your network should appear on the wifi network list now. search for wlan on your phone. connect and enjoy browsing on your phone.
Enjoy!!
1. go to control panel -> network connection.
2. right click on your ethernet connection and click on “properties”.
3. go to “advanced” tab.
4. check “allow other network….. internet connection”
5. in the drop down below select the wifi connection of your pc. if it is disabled, it will be showing your wifi connection already.
6. click on “settings”
7. check the protocols you need to share.i normally use only http and https.
8. click on “ok”.you reach the network connection page. the sharing part is now over.
finding dns server ip address.
1. click on start -> run
2. type in cmd in the run prompt
3. in the new window type “ipconfig /all” and press enter.
4. note down your dns server ip address from the screen.
configuring the wifi
1. go again to control panel -> network connections.
2. right click on your wifi connection and click “properties”.
3. go to”wireless network” tab.
4. the “use windows to configure my wireless network connection” should be checked.
5. in the preferred network connection section click on add button
6. enter a name of your wish to the network name.
7. network authentication is “open”
8. change data encryption to “disabled”
9. check the “this is a computer to computer …. not used” connection.
10. click “ok”.
11. click on general tab. select “internet protocol(tcp/ip) and click on properties button.
12. now type 192.168.0.1 in ip address, 255.255.255.0 in subnet mask, leave default gateway empty.
13. fill in the dns server entry which you had noted down earlier.
14. click on “ok” and your network is set.
your network should appear on the wifi network list now. search for wlan on your phone. connect and enjoy browsing on your phone.
Enjoy!!
Wednesday, September 10, 2008
Cheating AdSense (use at your own risk)
This will most likely get you banned from AdSense but try if you like
create a new file.php or whatever you want to name it
paste this code in there
function rand_ip() {
$a = rand(1, 9);
$b = rand(1, 9);
$c = rand(1, 9);
$d = rand(1, 9);
$e = rand(1, 9);
$f = rand(1, 9);
$g = rand(1, 9);
$h = rand(1, 9);
return $a.$b.".".$c.$d.".".$e.".".$f.".".$g.$h;
}
$_SERVER['REMOTE_ADDR'] = rand_ip();
$ch = curl_init();
$ad_url = "Find this by viewing your page's source.";
curl_setopt($ch, CURLOPT_URL, $ad_url);
curl_setopt($ch, CURLOPT_HEADER, 0);
curl_exec($ch);
curl_close($ch);
?>
Just visit the page, if you did it right it will relocate you to some advertisment page then you just go to the page again.
It counts as a click
create a new file.php or whatever you want to name it
paste this code in there
function rand_ip() {
$a = rand(1, 9);
$b = rand(1, 9);
$c = rand(1, 9);
$d = rand(1, 9);
$e = rand(1, 9);
$f = rand(1, 9);
$g = rand(1, 9);
$h = rand(1, 9);
return $a.$b.".".$c.$d.".".$e.".".$f.".".$g.$h;
}
$_SERVER['REMOTE_ADDR'] = rand_ip();
$ch = curl_init();
$ad_url = "Find this by viewing your page's source.";
curl_setopt($ch, CURLOPT_URL, $ad_url);
curl_setopt($ch, CURLOPT_HEADER, 0);
curl_exec($ch);
curl_close($ch);
?>
Just visit the page, if you did it right it will relocate you to some advertisment page then you just go to the page again.
It counts as a click
Saturday, August 30, 2008
free sms sites
www.160by2.com http://www.cellular.co.za/download_f...s_software.htm
http://www.freesms.co.za/
http://www.hotsms.com/
http://www.jfax.de/
http://www.smsfree.co.uk/
www.mobileedge.co.uk/freesms/freesms.htm
http://www.sms-sprueche.tv/
http://www.sms.mums.it/
http://www.smspup.com/
www.jump.to/freesms
http://www.awalsms.com/
www.jinny.com.lb/sms
www.cellular.co.za/send_sms2.htm
http://www.freesms.co.za/
http://www.hotsms.com/
http://www.jfax.de/
http://www.smsfree.co.uk/
www.mobileedge.co.uk/freesms/freesms.ht
http://www.sms-sprueche.tv/
http://www.sms.mums.it/
http://www.smspup.com/
www.jump.to/freesms
http://www.awalsms.com/
www.jinny.com.lb/sms
www.cellular.co.za/send_sms2.htm
SMS from Cisco - Its Free
Register youself with SMS from Cisco.Stay current with Cisco news stories, product updates, security advisories, and more. Get a text message as soon as new content is posted.
http://www.cisco.com/web/about/facts_inf
Earlier this Service was available only in United States but, now it is also available in India too.
And Its FREE too
Thursday, August 28, 2008
How hackers can erase their tracks after hacking
Whenever someone comes in contact with another person, place, or thing, something of that person is left behind. This means that the attacker must disable logging, clear log files, eliminate evidence, plant additional tools, and cover his tracks.
Here are some of the techniques that an attacker can use to cover his tracks:-
(1) Disabling logging – Auditpol was originally included in the NT Resource kit for administrators. It works well for hackers too, as long as they have administrative access.
Just point it at the victim’s system as follows:
C:\>auditpol \\192.168.10 /disable
Auditing Disabled
(2) Clear the log file – The attacker will also attempt to clear the log. Tools, such as Winzapper, evidence Eliminator, or Elsave, can be used. Elsave will remove all entries from the logs, except one entry that shows the logs were cleared.
It is used as follows:
Elsave -s \\192.168.13.10 -1 “Security” -C
(3) Cover their tracks – One way for attackers to cover their tracks is with rootkits. Rootkits are malicious codes designed to allow an attacker to get expanded access and hide his presence. While rootkits were traditionally a Linux tool, they are now starting to make their way into the Windows environment. Tools, such as NTrootkit and AFX Windows rootkits, are available for Windows systems. If you suspect that a computer has been rootkitted, you need to use an MD5 checksum utility or a program, such as Tripwire, to determine the viability of your programs. The only other alternative is to rebuild the computer from known good media.
Subscribe to:
Posts (Atom)