Monday, July 25, 2011

Email Tracing -- Find Out Who Sent You Email?

 Email Tracing:

 

In some cases, you may want to know the origin of some e-mails:
  • When you are suspicious with a particular e-mail.
  • When a friend asks you about an e-mail you never send. There are two possible explanations: (1) your computer has been hijacked by nasty viruses/worms and sent out e-mails without your knowing; (2) somebody else uses your e-mail address for the e-mails he/she sent. Whatever the case is, you want to know the truth.
  • Someone contacts you for a job offer, and before you want to proceed any further, you may need to know more about this guy. 

This short tutorial explains the basic of the e-mail system work and how to this knowledge to trace e-mails. Tracing an e-mail is not as hard as you might think. Let's begin to see how it works.

Route of an e-mail message


Mostly people send and receive e-mail messages with E-Mail Client software. Microsoft Outlook, Outlook Express, Netscape Communicator, Eudora and Pegasus are examples of widely used e-mail clients.


When you send your e-mail, you send it to a SMTP server called Mail Transfer Agent (MTA). SMTP stands for Simple Mail Transfer Protocol. Protocol is a standard for network communication. Your friend uses her e-mail client to access a server called Mail Delivery Agent (MDA). MTA is responsible for transferring your e-mail to the recipient MDA. It may transfer it directly to the MDA, or indirectly via other MTAs. Your e-mail route could be one of the following routes:
  • Sending Client - Sending MTA - Receiving MDA - Receiving Client.
  • Sending Client - Sending MTA - (one or more other MTAs) - Receiving MDA - Receiving Client.
Each MTA and MDA is also called a node in the route. The purpose of e-mail tracing / tracking is to find out the identity of each node along the route to the original sender. Each node along the route add a piece of information in the e-mail header section. We trace the e-mail by carefully studying this section.

E-mail headers

An e-mail message contains two main sections: header section and body section. Headers are used to convey control information of the e-mail; while body is used to convey the actual data (the e-mail content). It is like your paper mail or package. The header is the mail envelope and packing documents, while the body is the content inside the envelope or package.
Each node along the e-mail route add a piece of information, except the receiving mail client software. The most important piece of information for e-mail delivery is created by sending e-mail client software. It describes the recipient of the message. However, information created by sender is also the most unreliable. Some senders use fake identities or impersonate other individuals. The information created by your MDA should be considered reliable. We should treat information from other MTAs as quasi-reliable. As the rule of thumb, the closer a MTA to the receiving end, the more reliable it is.

How To Display E-mail Headers


Almost every email clients is different and because of that we have a slightly different steps to trace email header that is needed to track email IP address. Here are a couple most popular:

1.) To find, view and trace Email header for Gmail:
When you open email you will see next to the button "Reply" - down arrow. Click on arrow and choose "Show original". New window will be opened with full email header. Copy and paste full email header to start email tracking.

2.) To find, view and trace Email header for Yahoo Email:
If you right click on the email message you will see option "View Full Headers". Select it and new pop-up "Full Message Header" will appear. Copy and paste all email sources into our free email tracking tool to start tracing Email IP.

3.) To find, view and trace Email header Hotmail (Live) :
If you right click on the email message you will see option "View Message Source". Click with left mouse button and new window with the full email header sources will open. Copy and paste email header into our free email tracking tool for email header analysis.

4.) To find, view and trace email header in Outlook / Incredimail:
Select or open email message. Top left on your screen select "File" and then "Properties". Select then tab "Details" and eventually "Message source". Copy email header source and paste to be able to perform email tracking lookup and trace email IP location of sender.

Headers Created by Sending E-mail Client.

Sender e-mail client software may create some of these headers:
Date: Original sending date
From: Author(s) of the message
Sender: Actual submitter of the message
To: Primary destination
Cc: Secondary destination (Carbon Copy)
Bcc: Blind Carbon Copy. Same with Cc, but e-mail addresses listed here are not forwarded to each recipient.
Reply-To: Address to reply to. Default reply-to address is From, reply-to-author. However, you may specify a different address to reply-to.
Message-Id: A unique identifier for each message. Message-Ids are provided by Sender e-mail client or Sender MTA. Often a message is a response to a previous message, Message-Id is then the identifier for the header References and In-Reply-To.
Organization: Organization the sender affiliated with.
Subject: Subject or summary of the message.
In-Reply-To: Message-Ids of the parent (previous) messages.
References: Message-Ids of other correspondences.
MIME-Version: Version of the Internet message body format standard in use. MIME stands for Multipurpose Internet Mail Extensions.
Content-Type: MIME type of the content is used in the message body. Some common values are:
text/plain, text/html, text/xml, text/enhanced, image/jpeg, image/gif, audio/basic, audio/au, video/mpeg, application/octet-stream, application/postscript, application/ms-word, application/ms-excel, application/rtf, multipart/mixed, multipart/alternative, multipart/parallel, multipart/related, message/rfc822, message/external-body.
Content-Transfer-Encoding: MIME encoding used to represent data in a message for transfer using a mail transport protocol.
Common values include the following:
  • 7bit - Message contains 7-bit un-encoded US-ASCII data (Default).
  • 8bit - Message contains 8-bit un-encoded data.
  • binary - Message contains an un-encoded octet stream.
  • quoted-printable - Message contents transformed to 7-bit US-ASCII using quoted-printable encoding algorithm.
  • base64 - Message contents transformed to 7-bit US-ASCII using Base64 encoding algorithm.
Disposition-Notification-To: Indicates that the sender wants a disposition notification when this message is received by its recipients.
Keyword: Rarely used.
Comments: Rarely used.
Resent-*: Headers with prefix Resent- are for forwarded messages
X-*: All headers start with X- are additional features that have not yet made it into standard.
X-Mailer: Information about the sender e-mail client software.
X-Priority: Priority of the message. Values: 1 (Highest), 2 (High), 3 (Normal), 4 (Low), 5 (Lowest). 3 (Normal) is default if the field is omitted.

Headers Created by Mail Transfer Agent (MTA).

A MTA may create one or some of these headers:
Received: This is the most important header created by an MTA. The most used format for this field is:
Received: from * by * with * id * for *; timestamp
from *: sending host
by *: receiving host
with *: link/mail protocol
id *: Message-Id generated or copied by the MTA
for *: destination in the field To
Return-Path: It shows the return path of the message, i.e., the address that bounces will be sent to. Final MTA should insert a return-path header containing the envelope sender address when the e-mail arrives at its final destination. Mostly MTAs insert the sender address in Return-Path.
Apparently-To: Rarely inserted by MTA when there is no 'To:' recipient in the original message. Some mailing list hosts insert X-Apparently-To to the mails delivered to members of mailing-lists.
Mailing-List: Mailing List ID or Name. Non-standard. Other mailing-list related headers may follow this header.
Delivered-To: Used mostly for loop detection by many mailing-list hosts and autoresponders.

Headers Created by Mail Delivery Agent (MDA).

Besides MTA headers above, some MDAs may have anti-spam or anti-virus features in their system. These systems may add some specific headers to an e-mail.

Let's trace e-mails

E-mail headers
An e-mail message contains two main sections: header section and body section. Headers are used to convey control information of the e-mail; while body is used to convey the actual data (the e-mail content). It is like your paper mail or package. The header is the mail envelope and packing documents, while the body is the content inside the envelope or package.
Each node along the e-mail route add a piece of information, except the receiving mail client software. The most important piece of information for e-mail delivery is created by sending e-mail client software. It describes the recipient of the message. However, information created by sender is also the most unreliable. Some senders use fake identities or impersonate other individuals. The information created by your MDA should be considered reliable. We should treat information from other MTAs as quasi-reliable. As the rule of thumb, the closer a MTA to the receiving end, the more reliable it is.

How To Display E-mail Headers

Let's trace e-mails


Below is a sample of an e-mail header.
X-Apparently-To: georgeburn@yahoo.ca via 206.190.38.42; Thu, 09 Dec 2004 01:08:32 -0800
X-YahooFilteredBulk: 172.182.209.16
X-Originating-IP: [172.182.209.16]
Return-Path: <vchia@tm.net.my>
Received: from 172.182.209.16 (EHLO tm.net.my) (172.182.209.16)
    by mta128.mail.re2.yahoo.com with SMTP; Thu, 09 Dec 2004 01:08:32 -0800
From: vchia@tm.net.my
To: georgeburn@yahoo.ca
Subject: report
Date: Thu, 9 Dec 2004 10:08:28 +0100
MIME-Version: 1.0
Content-Type: multipart/mixed;
   boundary="----=_NextPart_000_0005_34D93898.B33F1947"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000

In the example, georgeburn@yahoo.ca got an e-mail. From the domain name, he knew that items in blue color were generated by his mail server (yahoo.com), it should be consider reliable. The red headers however, are created by sender e-mail client.
From the red headers, the author claimed that he/she was vchia@tm.net.my (see 'From' header), who used Microsoft Outlook Express 6 as the e-mail client. The e-mail address suggests it is an e-mail from Malaysia (TLD .my is for Malaysia).
However, the header created by the receiving mail server (mta128.mail.re2.yahoo.com) tells us that the origin IP address for this e-mail is 172.182.209.16. Let's us check the validity of sender's information with Quis? Pro. Click links below for the full reports:
Query result of TM.NET.MY.
+---------------------------------------------+
¦ DOMAIN REPORT FOR: TM.NET.MY                ¦
¦ by Quis? {WHOIS In Details} Jun 14, 2011    ¦
¦ http://gadget.stringcodes.com/quis/         ¦
+---------------------------------------------+

[Registrant MYNIC Handle : RGA000355]
Telekom Malaysia Berhad
709B, 6th Floor
Block E, Kelana Park View, No. 1 Jalan SS 6/2, Kelana Jaya
47301 Petaling Jaya
inetnum: 202.71.96.0 - 202.71.111.255

TM.NET.MY is owned by Telekom Malaysia. The IP Addresses allocated for this entity is [202.71.96.0 - 202.71.111.255]. IP Address 172.182.209.16 definitely does not belong to tm.net.my. The report for IP Address 172.182.209.16 reveals the real source. The e-mail originates from a US customer of America Online (AOL).

Thursday, July 21, 2011

Favicon - Intersting thing for website developers

Have you ever noticed when you go to some websites there is a cool image in the address line, rather than the blue 'e'? Or when you add some sites to favourites, an image shows up next to the name? These images are a favicon (favourites icon) and hey're used when you bookmark a page. To have your own image show up in someone's favourites list when they bookmark YOUR page, you need to upload your own favicon.ico. You (usually!!) don't need to add any code to your pages for this to work, browsers above IE5 will automatically look for an icon called favicon.ico when it adds a site to favourites. However, I've found some browsers won't automatically check, so have found it best to place some code into each page stating where the favicon is, so they WILL use it. You can use different icons for each page, but you need to state in your pages that it's a different image to the 'normal' favicon.ico.




  

Inserting Favicon in Various Techanologies

1.)  Favicon in HTML

First, change the name of the favicon to "favicon.ico".
Insert the following HTML tag inside the <head> ... </head> section of your web page:
<link rel="shortcut icon" href="favicon.ico">

If you have downloaded an animated favicon, insert this:

<link rel="shortcut icon" href="favicon.ico">

2.)  Favicon in ASP.NET

favicon in master pages

Place this code in the Head Section of the markup within your master page.
   
    <link runat="server" rel="shortcut icon" href="~/favicon.ico" type="image/x-icon" />
    <link runat="server" rel="icon" href="~/favicon.ico" type="image/ico" />

favicon in webpages

    <link runat="server" rel="shortcut icon" href="~/favicon.ico" type="image/x-icon" />
    <link runat="server" rel="icon" href="~/favicon.ico" type="image/ico" />

OR

   <link rel="shortcut icon" type="image/ico" href="http://www.domain.com/favicon.ico">

3.) Favicon in PHP

echo "<link rel=\"icon\" href=\"images/favicon.ico\" type=\"image/x-icon\">";
echo "<link rel=\"shortcut icon\" href=\"images/favicon.ico\" type=\"image/x-icon\">"; 

And Last Thing How Creating Your Own Favicon

Visit  www.favicon.cc
and here u can create your website favicon... and download after creation

Tuesday, July 19, 2011

WinBubbles Windows 7 & Vista Customization Utility Tweaking Tool

Hey Friends this is the Best tool which i rearly used. Hope all of you also like it and one thing also about is that its freeware!!!!!  Enjoy

                                                                              Er.Ramesh Narwal                           

In just few clicks, the freeware tool will help you to customise and tweak your Windows 7 (and Vista) easily. Its main features cover Maintenance, Hidden Windows Utilities, Customisations, Security and Optimizations for System Performance.



WinBubble 2.0.3.7 (Version 2 Build 3 Revision 7)
****************************************************
WinBubble Admin Tools 1.0.1.1 was updated
Launching of WinBubble via Ease of Access Center has been updated (no need to reboot)
Now supports Smart Screen Capture using Keyboard Shortcut
File-Type Icon Customization Error Messages was removed
Adding of My Computer Icon to Desktop was updated
Password Error while Launching the application while on the Welcome Screen has been fix.
Installation Path error for the setup was fix
Auto-Patch was added

Core NEW Features:
**********************
Welcome Screen Logon Features
Automatic loading and browsing of bitmap files for OEM Customization
Automatic Wallpaper Conversion
File Type Customisations
New Tools in WinBubble Tweaking Toolbox
Windows Utilities and More Policies Tab
My Computer and Control Panel Items Tool
File-type and Open With Context Menu Customization
The program now is Password protected
Changing the Color combination of the Utility
Windows 7 support was added
Right-Click Menu for the important settings was added
WinBubble Admin Tools was added
Bug Fixes

Windows 7 Main Features:
*****************************
Adding Icons to Right-Click Menus
Open With Menu Items and File Type Context Menu Editor
Automatic conversion of Jpeg Images in Windows 7 (tested on 3400 different file sizes)
Logon Background Wallpaper Customisations while on the Welcome Screen
Welcome Screen Text Shadow Customization and Disabling the Start-up sound was added
Access to Windows 7 Hidden Utilities was added
Documentations for Windows Tools was added

Windows Vista only Feature
******************************
Shutdown Button Settings Tool
Turning Off the Glass Effect using the Desktop Window Manager was updated

Windows 7 and Vista Features
*********************************
(Enhanced) Display recent Programs in Start Menu Feature
Open With Menu Items and File Type Context Menu Editor
Adding Items to Desktop, My Computer and Control Panel
Command Prompt Background and Text Color Customizations
Ability to Change WinBubble Background Color
WinBubble Admin Tools Added
Restore Point Creator was updated
User Accounts CP Tool was added

New Windows 7 and Vista Policies/Restrictions

Taskbar and Start Menu
*************************
Add Run Command to Start Menu
Clear Recent Documents History on Exit
Clear Recent Programs List for New Users
Remove Access to Right-Click Menus for the Taskbar
Prevent the User fom adding or removing Toolbars
Prevent users from resizing the Taskbar
Prevent the user from rearranging toolbars
Lock the Taskbar

Desktop
**********
Hide and Disable All Items on Desktop
Prevent Adding, dragging, dropping and closing the taskbars toolbars
Prohibit adjusting desktop toolbars

Machine
**********
CD and DVD: Deny Read Access
CD and DVD: Deny Write Access
Floppy Drives: Deny Read Access
Floppy Drives: Deny Write Access
Removable Disks: Deny Read Access
Removable Disks: Deny write Access
Removable Disks: Deny All Access

Control Panel
***************
Restrict Access to Control Panel

Display Settings
******************
Remove Display in Control Panel
Hide Appearance and Themes Tab
Hide Desktop Tab
Hide Screensaver Tab
Hide Settings Tab
Prevent Changing of Wallpapers

Restrict Microsoft Management Console
*********************************************
Computer Management
Disk Management
Device Manager
Shared Folders
Advance Windows Firewall

System
*********
Prevent access to command prompt and cmd script processing
Prevent access to Registry Editor
Prompt for Password on resume from hibernate / suspend

CTRL+ALT+DEL Options
****************************
Remove Change Password
Remove Lock Computer
Remove Start Task Manager
Remove Logoff

Windows Explorer
********************
Remove Security Tab
Hide All Fix Drives
Remove CD Burning Features


Welcome Screen Wallpaper Customization and other Logon Features
******************************************************************************

Using WinBubbles, you can easily customise the Welcome Screen wallpaper before login using the ease of access center icon located at the lower left side of the screen. The program automatically convert all your existing wallpapers and put them into one location in which each file size less than 250kb. The automatic image converter was tested to more than 4,300 images ranging from different sizes.



Hidden Windows Utilities in Windows 7 and Vista
*******************************************************

Want to learn about these hidden tools in Windows 7 and Vista? WinBubble was designed to access this tools in one location for educational and maintenance purposes.



My Computer, Desktop, Control Panel and Icon Customizations
***********************************************************************
The great thing about the new version of WinBubbles is that you can customise many simple things in Windows 7 for free. For example changing the drive icons easily using the existing Windows high resolution Icons, Useful Right-Click Menu Customizations and many more. WinBubble will do it for you in just few clicks.



Useful Right-Click Menu and Desktop Customizations using WinBubble
********************************************************************************





OEM Logo and Information
******************************

WinBubble will help you to change your Original Equipment Manufacturer's Information's and Logo without knowing the registry tricks.

Useful Tweaks to Desktop and Explorer's Context Menu
****************************************************************

*Taking the Ownership of a file/folder

This will solve the problem, "Access denied" message when opening / moving / deleting a file/folder.

*Copy to/Move To

This will speed up the arrangement of files.

*Add Disk Clean-up to Computer Right-Click Menu

*Turn Off/On Aero, This will give a minimal boost in performance for Gaming and good Battery Usage

* Add WinBubble Launcher, No need to create a shortcut for WinBubble.

* Add Internet Explorer Icon, Network Icon, Control Panel Icon and many more... This will save your time in editing the registry one by one.

* Display the Windows Vista Build number on your

*Slow-Down animation

If you want to activate the animation, it's easy!

Just go to General Tab, Check the "Slow down Animation" and click the Apply button.

*Turn Off your monitor when not in use to save battery. Despite the name, screen savers do nothing. Flashing images and Windows Aero actually consume more energy during active use.

*Add "Open with Notepad" will greatly help you in everyday use of your computer.

OTHER RIGHT-CLICK MENU / CONTEXT MENUS MUST-HAVE FEATURES
************************************************************************************



There are so many things that you can do with the new version of WinBubble especially in Windows 7. The possibility are endless especially when I acquired the necessary skills in the next few months.



Download

Sunday, July 17, 2011

How to Enable /Disable JavaScript in Various Web Browsers and On Various Operatin Systems

Hey friends !!! if you are facing problems in coping data from websites you can easily copy just disabling Javascript in your web browser....which you can do method as I explained below...
Er. Ramesh Narwal

How to Enable/Disable JavaScript

JavaScript is a programming language for the World Wide Web. JavaScript programs are downloaded along with Web pages and run on your computer. Web programmers can include JavaScript programs to make using their Web pages easier. JavaScript can enable links, edit data, help you fill in forms, and do many other useful things. Most complex sites, like Internet e-commerce and banking sites, use JavaScript.

JavaScript is fundamentally safe. The programmers who designed JavaScript deliberately omitted the ability to write to your disk or do other things that could damage your computer. JavaScript has been abused to open unwanted windows or change the page you're viewing in unwanted ways. These things are annoying, but not truly damaging. Modern browsers intercept and prevent the worst of the annoyances.

However, in Microsoft Internet Explorer only, enabling JavaScript also enables VB Script, Microsoft's proprietary Web scripting language. VB Script does not have the inherent safety features of JavaScript. For that reason, if you use Internet Explorer,you may want to leave VB Script (and JavaScript) turned off unless you need it. Only Internet Explorer can run VB Script programs within the browser. If you use any browser other than Internet Explorer, you do not need to worry about this.
Microsoft Windows

The first thing you must do is determine the browser and version you are using to surf the Web. In the command bar at the extreme top of the browser window, click "Help" and select "About." The "About" panel will tell you the name and version of your browser.

Windows: Mozilla Firefox 1.0 and above

Select the "Tools" menu
Select "Options..."
Click on the "Content" tab.
Click on the "Custom Level."
Enable (check-mark) the "Enable JavaScript" line.
Click "OK."

Windows: Microsoft Internet Explorer 5.x and above

Select the "Tools" menu
Select "Internet Options..."
Click on the "Security" tab.
Click on the "Custom Level."
Select the "Scripting" section.
Enable (with the radio button) "Active Scripting."
Click "OK."

Windows: Netscape 4.7 and above

Select the "Edit" menu.
Select "Preferences..."
Expand "Advanced" in the Category tree view to the left.
Select "Scripts & Plugins."
Click the option Enable JavaScript for "Navigator."
Click "OK."

Apple Macintosh

The first thing you must do is determine the browser version you are using to surf the Web. In the command bar at the extreme top of the browser window, click program name at the left (e.g. Safari) and select "About." The "About" panel will tell you the version of your browser.

Macintosh OS X: Internet Explorer

Select the "Explorer" menu.
Select "Preferences..."
Expand "Web Browser" option.
Select the "Web Content" option.
Click the option "Enable Scripting."
Click "OK."

Macintosh OS X: Netscape 7.1

Select the "Netscape" menu.
Select "Preferences..."
Expand "Advanced" in the Category tree view to the left.
Select "Scripts & Plugins."
Click the option Enable JavaScript for "Navigator."
Click "OK."

Macintosh OS 9 and below: Internet Explorer 5 and above

Select the "Edit" menu.
Select "Preferences..."
Expand "Web Browser" option.
Select the "Web Content" option
Click the option "Enable Scripting."
Click "OK."

Linux

These were tested under SuSE Linux, but should work the same way under other distributions.

Linux: Mozilla 5.0 Firefox 1.5.0.4

Select the "Edit" menu.
Select "Preferences"
Click "Content" section of the selector at the top of the "Preferences" window.
Enable ("x" mark) the "Enable JavaScript" line.
Click "Advanced" button on "Enable JavaScript" line.
Choose which of the five "Allow scripts to:" actions to enable. (Click "Help" button for more information, if needed.)
Click "Close".

Linux: Konqueror 3.5.1

Select the "Settings" menu.
Select "Configure Konqueror"
Click "Java & JavaScript" section of the selector on the left of the Configure window.
Select "Java" tab.
Enable ("x" mark) the "Enable Java globally" line if you wish to turn Java support on for all web sites, otherwise: click on "Help" button to learn how to set up "Domain Specific" policies.
Select "JavaScript" tab.
Enable ("x" mark) the "Enable JavaScript globally" line if you wish to turn Java support on for all web sites, otherwise: click on "Help" button to learn how to set up "Domain Specific" policies.
Select (with the radio button) which of the five "JavaScript Policies" you wish to allow, ask, deny o ignore.
Click "Apply".
Click "OK".

Linux: Mozilla 5.0 SeaMonkey 1.0.2

Select the "Edit" menu.
Select "Preferences"
Click "Advanced" menu.
Enable (check-mark) the "Enable Java" line.
Expand the "Advanced" in the Category tree view to the left.
Select "Scripts & Plugins."
Click the option Enable JavaScript for "Navigator."
Click which of the six "Allow scripts to:" options to (check-mark) enable.
Click "OK".

Linux Epiphany 1.8.5

Select the "Edit" menu.
Select "Preferences"
Select "Advanced" menu.
Click "Privacy" tab.
Enable (check-mark) the "Enable Java" line.
Enable (check-mark) the "Enable JavaScript" line.
Click "Close".

Saturday, July 16, 2011

Mantra Security Toolkit 0.6.1 Released ____Browser Based Hacking Framework


Mantra is a collection of free and open source tools integrated into a web browser, which can become handy for students, penetration testers, web application developers,security professionals etc. It is portable, ready-to-run, compact and follows the true spirit of free and open source software.



The software is intended to be lite, flexible, portable and user friendly with a nice graphical user interface. You can carry it in memory cards, flash drives, CD/DVDs, etc. It can be run natively on Linux, Windows and Mac platforms. It can also be installed on to your system within minutes. Mantra is absolutely free of cost and takes no time for you to set up.

Mantra can be very helpful in performing all the five phases of attacks including reconnaissance, scanning and enumeration, gaining access, escalation of privileges, maintaining access, and covering tracks. Apart from that it also contains a set of tools targeted for web developers and code debuggers which makes it handy for both offensive security and defensive security related tasks.


Project Goals
  • Create an ecosystem for hackers based on browser
  • To bring the attention of security people to the potential of a browser based security platform
  • Provide easy to use and portable platform for demonstrating common web based attacks( read training)
  • To associate with other security tools/products to make a better environment.
You can download Mantra 0.6.1 here:
Linux 32-bit – Mantra Security Toolkit – Gandiva.tar.bz2
Windows – OWASP Mantra Security Toolkit – Gandiva.exe
Or read more here.

Thursday, July 7, 2011

Send Any number of e-mail or sms by using new ....... E-Mail And SMS Bomber


Cell phone text messages typically use the SMS (Short Message Service) protocol.
Most cellular service providers charge fees to send and receive text messages.
There are numerous methods to send text messages for free, but they vary between cell service providers.


This is the FIRST working virus free SMS bomber that I have found to be successful

Here is a picture of the icon


[Image: 647fd4b34de8ea70ba0e00db1d8150ea.png]

Start up picture


[Image: 8c0d43eafe7914608c009122edebd2a0.png]


SMS bomber picture




Link to Download

Virus Creation........By Using JPS Virus Construction Tool

Hi Friend,

This article is just for educational purposes....plz use it in a legal way

You can use it for killing virtual machine in as many ways as possible ......

JPS Virus Maker Tool


This is a small but very useful software . With the help of this you can create any type of trojans and program it to do whatever you want.


This can be programmed to do the following things:

Disable Registry Editor
Disable Ms Config
Disable Task Manager
Disable Yahoo! Messenger
Disable Media Player
Disable Internet Explorer
Disable Time
Disable Group Policy
Disable Windows Explorer
Disable Norton Antivirus
Disable McAfee Antivirus
Disable Note Pad
Disable Word Pad
Disable Winows
Disable DHCP Client Service
Disable Taskbar
Disable Start Button
Disable MSN Messenger
Disable Command Prompt
Disable Security Center
Disable MSN Messenger
Disable System Restore
Disable Control Panel
Disable Desktop Icons
Disable Screen Saver
Hide Service Manager
Hide Outlook Express
Hide Windows Clock
Hide Desktop Icons
Hide All Process in Task Manager
Hide All Tasks in Task Manager
Hide Run in Start Menu
Change Explorer Caption
Clear Windows XP Password
Swap Mouse Buttons
Remove Folder Options
Lock Mouse & Keyboards
Mute Sound
Crazy Mouse
Allways CD-ROM Open
Turn Off Monitor (30 sec's)
Destroy Taskbar
Destroy Offlines (Y!Messenger)
Destroy Protected Strorage
Destroy Audio Service
Destroy Clipboard
Terminate Windows
Hide Cursor
Auto Startup
Restart-Logoff-Turnoff-Hibrinate Automatic After 30 minutes
Change Server Name After Install in Process
Change Server Name
-------------------------------------
New Fetures in Version 3.0:

Change XP Password
Change Computer Name
Change IE Home Page
Close Custom Windows
Disable Custom Service
Disable Process
Open Custom Website
Run Custom Command
Enable Convert To Worm - Auto Copy Server To Active Path With Custom Name & Time
Change Custom Icon For your created Virus (15 Icons)

Note
THIS IS A VIRUS MAKING SOFTWARE SO SOME ANTIVIRUS MAY DETECT IS AS A VIRUS
BUT ACTUALLY IT IS NOT A VIRUS
SEE THE PIC FOR PROOF.. AND DON"T TRY TO OPEN THE CREATED VIRUS ON YOUR OWN COMP.


Download