Saturday, December 28, 2013

Hello Friends, In our previous tutorial we have discuss about ping sweep, today i will explain you theTrace route or simply routing in windows. I know all you know what is trace route but actually you really don't. Its quite different and its use is also quite different. I know you always tried to understand the output of trace route but not been able to what each line means in trace route. So after reading this you can understand everything quite clearly. Today i am writing my WHITE PAPER ON TRACE ROUTE..So read on..

What is Trace Route?
As the name suggests trace route, means tracing the path, but which path. Actually whenever any user opens any website in his web browser, from him it opens directly but have you ever tried to understand what background processing is going on. How your web browser actually getting to that address. That working of website i will explain on some other day but for now must know to reach to some web address, our web browser goes to different paths and chooses the best suitable path having the minimum response time.

Trace route is a network based utility which shows the path over the network between two systems and lists all the intermediate routers to get to the final destination. For what purpose trace route is used ?Main purpose of trace route is to fix network problems. This helps you in identifying, while connecting to some network where the connection is actually slowing down, which intermediate router is responsible for that. 
Technically trace route is also an ICMP echo based protocol similar to ping.

But its only a primary use, for what else we can use this. As i have already told you how to get an IP address. Now when you do trace route with that IP address what it will show is that which service provider the victim is using means ISP(Internet service provider), this will help you in determining his few basic things like Country, state and sometime more deeper information too. Now how this is going to be helpful for Network forensic experts. Suppose you have made an hacking attempt on some bank or some government or some security concerned website, what they do is that they store an IP address and timestamps of each visitor in their database. Now what network forensic expert will do is that it will trace route your IP address and confirm your ISP and your country( country from which ISP belongs). Now Forensic expert will contact your ISP and provide your IP address and time to ISP and ask him to provide details that at that time this IP was assigned to which person and that how they will get complete address of the hacker and catch him red handed. I hope you got my point why trace route is that much important. 

How trace route is done practically?
In windows, trace route is done by using the command tracert in command prompt. You can do it two different ways:
1. To trace route an IP address: This can be of any website or any computer system or of any network.
SYNTAX:
tracert IP(like tracert 127.0.0.1)

2. To trace route websites: When you don't know website's IP address let trace route to translate that address for you.
SYNTAX:
tracert websiteaddress(like tracert www.google.com)

More options:
-d     Do not resolve address to host-names
-h (maximum hops) Maximum number of hops to search the target system
-j (host-list)      Loose source route along with host-list
-w timeout       Wait timeout milliseconds for each reply

Linux trace route has more options available.

Note: you will always get less results in case when you try to trace route an Computer system of any victim. Ahhahhh more precisely you will only get around 3 to 10 entries. Three to Four when firewall of the victim doesn't alter your trace routing and more when firewall blocks ICMP echos.

Note: If you get asterisks(*) after the first entry then it confirms that firewall is playing its part and it doesn't allowing us to trace route the system but still we will be able to get his ISP address and with that we can get his location overview.

Understanding Trace Route:
Below is snapshot of normal trace route output of victim (normal computer):
tracert, trace route tutorial
Trace route live practical example.
Lets start from very first Line:
1. Very first line after the tracert shows Host Name and IP address which it got using the reverse DNS(domain name system) look up.
2. Over maximum 30 hops: 30 hops means that traceroute will only route first 30 routes between your system and victim's system. 30 is too much it usually ends in 3 to 15 hops but sometimes it goes deeper based on security and no response(as in our first case when we tries to route 14.97.26.147).

Note: Timings are basically round trip times. There are three round trip times in ping. The round trip times (or RTTs) tell us how long it took a packet to get from me to that system and back again, called the latency between the two systems. By default, three packets are sent to each system along the route, so we get three RTTs.

3. This is the address translation private IP by any one of the services from these ( RIPE, ARIN, APNIC, LACNIC, AfriNIC).
These are the IP address ranges for these private IP's:
10.0.0.0 – 10.255.255.255,
172.16.0.0 – 172.31.255.255,
192.168.0.0 – 192.168.255.255 
and 224.0.0.0 - 239.255.255.255 are reserved IP Addresses for private internet use for network address translations of above mentioned services.

4. This means that the target system could not be reached. More accurately, it means that the packets could not make it there and back; they may actually be reaching the target system but encountering problems on the return trip (more on this later). This is possibly due to some kind of problem, but it may also be an intentional block due to a firewall or other security measures, and the block may affect trace route but not actual server connections.

5. If firewall doesn't block remote connections then the result will be like this.
Note: This step provides the ISP(Internet service provider).

Now Understanding trace route for websites:
tracert website, trace hackers
Trace route of website
Since hackingloops is a blog hosted on google that's why at start it reverse DNS name as ghs.l.google.com and translated IP address of hackingloops is 209.85.175.121. So our destination is 209.85.175.121

Now steps 1 to step 4 shows private internet use addresses as explained above which is used for address translation. Step 5,6 and 9 are also static private IP addresses with which but these are local IP addresses for your localhost with with the DNS communicates.

Step 7 and 8 determines the response from your ISP address. Above clearly predicts i am using tata teleservices ISP.
Step10 and 13, 14 and 15 are also Google IP address responses as this is google blog.
Steps 11 and Step 12 retrieves the different DNS servers of hackingloops.
Step 16 shows our destination..

The above was meaning now lets explain whole process in a go....
First of all my system reverse DNS the IP address of Hackingloops which is found to be 209.85.175.121,Now since i haven't mentioned any specific hop count so by default it considers maximum value as 30 hops. Now my system contacts to IANA service ( RIPE, ARIN, APNIC, LACNIC, AfriNIC) requesting the response from IANA to get the translated address.  After a successful query to IANA service it returns the response back to my local system(192.168.***.***) . In between my system also get response from my ISP which is tata teleservices. Now after a successful acknowledgement our system contacts to Google server(72.14.222.166 and 72.14.232.93) which in return returns the DNS server names( for hackingloops and then google confirms the response and returns back the actual web page.


That's all my friends, I hope you all now understands what is trace route.

IF you have any queries or questions ask me in form of comments.

Pen drive and portable USB hard disks are nowdays become a common method to transfer data between systems. But do you know that you can use any application directly from your pen drive or portable USB hard disk just by connecting your Pen drive to the any PC or laptop. Ahha you all are still in confusion, what actually i am talking about, so lets have better view.

Suppose you gone to your friends or simply college and there you want to use Microsoft excel or any other application but that is not installed on that system. Then what happen you got stuck and your work got halted there but if you have portable application for that which you can keep in your pen drive or portable hard disk and use it where ever you want then you will never face situations like above. But now you all will be thinking we need a lot of portable applications for that, right... yes are thinking in right way but Lupo pensuite has done that for us. Why don't we keep everything in our pocket and use it whenever , wherever we need the application. What it has done, it has kept all the daily use and critical applications in one portable installation which consist of all daily use applications like:
  • WEB BROWSERS
  • E-MAIL CLIENTS
  • MESSENGERS
  • P2P CLIENTS
  • WEB SERVERS
  • DOWNLOAD MANAGERS
  • FEED READERS
  • REMOTE CONTROL
  • BOOKMARKS MANAGERS:
  • FTP/SSH CLIENTS
  • PORTABLE WIKI
  • LINK CHECKER
  • PROXY SERVER
  • VIDEO PLAYERS
  • AUDIO PLAYERS
  • MEDIA EDITORS
  • MEDIA CONVERTERS
  • CD/DVD RIPPERS
  • TAG EDITORS
  • STREAM MANAGERS
  • CD/DVD BURNERS
  • VIDEO CAPTURE
  • IPOD MANAGERS
  • MEDIA INFO
  • MEDIA CATALOGERS
  • CD/DVD TOOLS
  • TEXT TO SPEECH
  • MEDIA CENTER
  • IMAGE VIEWERS
  • IMAGE EDITORS
  • GRAPHICS EDITORS
  • SCREEN CAPTURE
  • SCREEN ZOOMERS
  • ICON/CURSOR EDITORS
  • IMAGE PROCESSING
  • ALBUM CREATORS
  • COVER CREATOR
  • SYSTEM MANAGERS
  • SYSTEM INFORMATION
  • NETWORK TOOLS
  • MONITORING/TESTING TOOLS
  • PROGRAM LAUNCHERS
  • STARTUP MANAGERS
  • SCHEDULING MANAGERS
  • TWEAKERS
  • REGISTY TOOLS
  • DISK DEFRAG
  • VIRTUAL DESKTOP
  • UNINSTALL TOOLS
  • CLIPBOARD TOOLS
  • MOUSE/KEYBOARD TOOLS
  • FOLDER/WINDOW TOOLS
  • SHELL TOOLS
  • FILE ASSOCIATIONS
  • DEVICE TOOLS
  • DESKTOP TOOLS
  • PARTITION MANAGERS
  • MALWARE DETECTION
  • DISK/REGISTRY CLEANERS
  • ENCRYPTING
  • PASSWORD MANAGERS
  • FILE RECOVERY
  • SECURE DELETION
  • INTEGRITY CHECKERS
  • UNLOCKING TOOLS
  • Office SUITES
  • WORD PROCESSORS
  • SPREADSHEETS
  • TEXT EDITORS
  • PDF/TEXT READERS
  • PDF TOOLS
  • ORGANIZERS
  • PROJECT MANAGERS
  • FINANCIAL TOOLS
  • PUBLISHING
  • POST-IT
  • DIAGRAMMING
  • TEXT PROCESSING
  • FILE MANAGERS
  • FILE ARCHIVERS
  • FILE RENAMERS
  • FILE LISTERS
  • FILE SPLITTERS
  • BACKUP TOOLS
  • SYNCHRONIZERS
  • SEARCH/REPLACE TOOLS:
  • DUPLICATE FINDERS
  • FOLDER COMPARISON
  • FILE COPIERS
  • FONT MANAGERS
  • ATTRIBUTE TOOLS
  • DISK SIZE TOOLS
  • INSTALLER BUILDERS
  • DATABASE TOOLS
  • PROGRAMMING TOOLS
  • HEX EDITORS
  • EMULATORS
  • MATHEMATICS
  • UNIT CONVERTERS
  • ASTRONOMY
  • GENEALOGY
  • MUSIC TOOLS
  • DIDACTIC TOOLS
  • GAMES
  • LOGIC/PUZZLES
The list is little small but when you listen this installers size then you will be more shocked its only 200MB pen drive suite. Basically its a virtual OS that run from your pendrive and contains the all the applications that you need in day to day life...:P contains more than that..
pen drive tips and tricks
Lupo pen suite snapshot


Also you can add more and more portable application to your pensuite. That's the beauty of Lupo pensuite. So no need to worry while going to other's PC or system that he might have this software or not, keep everything in your pocket friends and enjoy the flavor of portability.

How to use Lupo Pensuite to use all applications from pen drive?

1. Download the Lupo Pensuite.
pen drive tips and tricks, portable applications
Best Pendrive suite ever

2. Install the Pen drive suite into you pendrive or portable USB hardisk.
3. Now go anywhere and just start exe to open the suite.
4. Select the application and use it directly from your pen drive.
5. That's all friends.

I hope you all liked it. If you have any queries ask me in form of comments...
Thanks for reading...
Many HackingLoops and other internet users has reported me a problem that they are Not able to Install any Antivirus on their computer or Laptop. Most users informed me that their system is infected by viruses and they are not able to remove the viruses or keyloggers from their system as their antivirus is not downloading any new updates and also they are not able to install any new antivirus or other security related software's. So friends, i come up with the solution or fix of the above mentioned problem. Let's first understand the concept why this type of problem generally arises, as we are not normal users, we are Geeks and Elite Ethical Hackers and for us learning new things is always the key to success.

fix viruses manually, fix not able to install antivirus
Fix Not able to install Antivirus problem

Nowadays viruses not only infect the exe(executables) files or dll(dynamic link library) files but Hackers who code viruses became more smart and they started concatenating and modifying the configuration files of windows like ini files, host files, log files etc. Now what they do they add their own configurations to your system files which make your system vulnerable to hackers, so that they can exploit it easily. Recently hackers have started modifying the host filein windows. Host file is actually used to map any ip address with website name. Host file is also used to block any website, so that user or any application cannot access that website. Forblocking any website, what hackers do is that they map localhost IP addess with any website. Hence, whenever user or any application tries to access any website, it translates website IP address to localhost address which is usually 127.0.0.1 . This technique is known as back looping. Back Looping means your web browser will search the particular website address into your localhost and when it doesn't find it there( off course it will not find it) its shows page not found. So what hackers do, they add all the antivirus websites and their update servers tohost file and bind their IP address with localhost IP(i.e. 127.0.0.1), so when your antivirus tries to update or install, it doesn't find the antivirus server and hence update fails. So friends how to fix this issue or problem. Here are the steps to fix the "Not able to install any Antivirus" or "Not able to update antivirus" problem.

Steps to Fix Not able to Install Any Antivirus or Update Antivirus:
1. Disconnect the internet.

2. Open the host file at below location:
C:\Windows\System32\drivers\etc
For windows XP, you can directly open host file with notepad and edit it.

For windows vista or windows 7, first of all you need to provide the file editing rights or privileges to edit host file. This can be done by right clicking on host file and going to security tab and their you will see one advance tab. 
In that window, you will see users(useraccount name), select the users and click on change permission now again select the users and double click on it.
And there just click on the Full Control checkbox and then click on apply. Now you will be able to edit the host file in the windows 7 or vista.

3. Now when your system is infected, you will see some website names mapped against the IP address 127.0.0.1 , what this is doing is that blocking you and your system applications to access these websites.

4. Now to fix not able to install any antivirus or install antivirus updates problem, you need to remove all the entries from the host file.

5. Entries can be removed by two ways:
a. Just by deleting everything from host file.
b. Simply putting # in front of the 127.0.0.1 on each line. This will comment that part. So it will not execute.

6. Now just save the host file and you are done.

7. Now install your antivirus or try to update your antivirus. It will work.

8. That's all my friends. Now after installing antivirus just run the scan and remove all the viruses.
Note: This problem actually occurs due to W32/sality worm and new keyloggers or trojans.

I hope you all have enjoyed the article and able to understand the new concept.
If you have any doubts or queries ask in form of comments.
All of us know that windows operating system is the most used operating system in the world. Its not because of its Easy and Simple Graphical user Interface but because of its intense features that it incorporates to make the user day to day life simpler. Today's trick is also related to that fact only, today we will learn how we can create our own RUN command's that can directly execute your program and other applications.  It is a simple and easy method of accessing programs quickly. If you happen to want to make a shortcut to an application your own way, guess what, you can make easy 7 steps. Just follow the instructions and you are through...

Latest windows XP | Windows 7 tricks
Windows Tips n Tricks

How to Create your own RUN command in Windows?

Stepwise creation of RUN commands:
Step 1: Go to “Start,” “Run,” (told you we use it a lot) and type regedit.

Step 2: Navigate to the following:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Apps Path
Step 3: Create a new folder/key under Apps Path. (Right-Click Apps Path and click “New,” “Key.”)

Step 4: Title the new folder/key the name of the application, e.g. firefox.exe.

Step 5: Right-Click the default string value (the thing automatically created in your new folder) and click Modify.

Step 6: Change the value to the path of the executable you are attempting to run. E.g. C:\Program Files\Mozilla Firefox\firefox.exe.

Step 7: Create a new “String Value” by right-clicking under the default value (the thing we just edited) and select “New,” “String Value.” Name it Path and enter the value as the same path you previously entered.

create your own run command

Step 8: Done! Now, all you need to do is go to “Start,” “Run,” and type the name of yourcommand.

That's all my friends, if you have any queries ask me in form of comments.
Hello friends, in my previous post i have explained how to fix not able to install any antivirusor unable to update any antivirus problem. Today i will teach you how to disable the Autorun on windows 7 in less than 2 minutes. This will make your system or PC more secure against the Trojan and virus attacks. Your system will not get infected until you by yourself executes its exe(executable) file by yourself. As i always had a bad habit of explaining the things with underlying concept, i will follow the same today too. So friends lets have a brief overview how it works.

disable autorun, turn off autoplay
How to Disable autorun in windows 7
What is Autorun? Is it similar to autoplay? Are they really same, can we use them interchangeably, if yes why and if not why not? I know most of users doesn't know the difference between autoplay and autorun. But after reading this article you will be able to distinguish between both terms. First lets start with similarities, both autoplay and autorun are terms coined by Microsoft and specially for windows platform. Both comes in picture whenever a user connects or mounts a new drive on his/her laptop or PC. Autorun and autoplay are actually configuration files which contains the list of commands that decides what action your Operating system should take when you connects or mounts a new media or drive on your system.
AutoPlay is a feature introduced in Windows XP which examines removable media and devices and, based on content such as pictures, music or video files, launches an appropriate application to play or display the content. But the autorun is little bit different.
AutoRun is actually a feature of Windows Explorer service(actually of the shell32 dll), which enables media and devices to launch programs by use of command listed in a file called autorun.inf, stored in the root directory of the medium. Suppose you want to execute the contents of a folder in this case root directly is your folder. Similarly you can extend the thought.
Have you guys ever tried to understand or noticed what happens when we double clicks on any executable file or set up file(which is also a executable). Hmm.... Let me guess, most of times never. Aha... OK.. i explain the background as you will not going to find this valuable information anywhere on internet except HackingLoops or some content copiers (:P who copies my articles). Whenever a user double clicks on any executable file, a set of instructions are executed in background, these instructions are written in autorun.inf files which tells our operating system that which program has to be executed when user double clicks the exe file. 
Ahhahh.... i think you still have little confusion... k little more background. There is one more underlying concept which is actually known as Batch programs, batch program are nothing just these are the programs which are running at back end without users awareness. And which file schedules them, which files decides which file has to be executed when first is completed... Guess... hmm.... Its autorun itself. So friends now i think you are able to understand what actually is autorun. 

The autorun.inf is much similar to .ini files, containing information and the commands as key = "value" pairs. These keys specifies the below mentioned things:
  • The name and the location of a program to call when the medium is inserted (the "AutoRun task").
  • The name of a file that contains an icon that represents the medium in Explorer (instead of the standard drive icon).
  • Commands for the menu that appears when the user right-clicks the drive icon.
  • The default command that runs when the user double-clicks the drive icon.
  • Settings that alter AutoPlay detection routines or search parameters.
  • Settings that indicate the presence of drivers.
Autorun makes the viruses or Trojans to execute on your system without your interaction. Hackers write viruses and add their virus execution codes in autorun.inf files which automatically starts executing as soon as you attaches your device to your Laptop or PC. Device can be anything like CD, DVD, Blue Ray, Pen Drive , USB hard disk etc. Autorun is actually a open door to attack your system which makes the hackers work quite easier in spreading their viruses and Trojans.

So friends, how to disable autorun or autoplay in windows 7. This is also quite easier if you know things how they actually work and now you can also estimates the dangers that how much dangerous a simple autorun can be. As hacker i am using this from long time, just to automate my programs (:P batch programs).
I have made a video tutorial for you guys which will explain you all possible ways to turn off or disable autoplay in windows 7. So friends watch the video and give your feedback. If you like it, just a simple thanks as comment can do the magic. So be magician and i will continuously keep teaching you the magical tricks. Enjoy and learn:


I hope you all enjoyed it... :P At least the music..:D