Showing posts with label How To. Show all posts
Showing posts with label How To. Show all posts

How To Jailbroken iOS 4.3.2 Already Using PwnageTool

The just released iOS 4.3.2 firmware update for iPhone 4, iPad and iPod touch 3G/4G has been successfully jailbroken using custom PwnageTool bundles. The jailbreak though is tethered only for now, which means that you will have to boot it into jailbroken state every time you reboot.

Cydia running on iOS 4.3.2, iPhone 4 (GSM)

Support for iPhone 3GS and iPod touches is on the way ! Simply follow the instructions posted below to jailbreak iOS 4.3.2 on iPhone 4 using a combination of our very own PwnageTool bundle for iPhone 4, PwnageTool 4.3, and tetheredboot utility.

Here’s what you will need:
  • PwnageTool 4.3
  • iOS 4.3.2 firmware
  • iTunes 10.2.1
  • Mac OS X
  • PwnageTool bundle for iOS 4.3.2
  • tetheredboot utility
Note:
  • There is no unlock for the new baseband on iOS 4.3.2. If your iPhone relies on a carrier unlock, DO NOT update to stock iOS 4.3.2.
  • iPad 2 users on iOS 4.3 should stay away from iOS 4.3.2 until further confirmation.
  • Cydia is fully working on iOS 4.3.2
  • It is a semi-tethered jailbreak.
  • Your baseband will not be upgraded during restore process.
  • Hacktivation is supported.
Modifying PwnageTool
Step 1: Download PwnageTool bundle for your version of iOS device. Extract the .zip folder, in there you will find a .bundle file, for this guide, we are using iPhone 4 bundle iPhone3,1_4.3.2_8H7.bundle. Move this file to your desktop.

Step 2: Download PwnageTool 4.3 and copy it to /Applications directory. Right click, and then click on “Show Package Contents” as shown in the screenshot below.


Step 3: Navigate to Contents/Resources/FirmwareBundles/ and paste iPhone3,1_4.3.2_8H7.bundle file in this location.


Building iOS 4.3.2 Custom Firmware
Step 4: Download iOS 4.3.2 firmware. Move this file to your desktop.

Step 5: Start PwnageTool in “Expert mode” and select your device:


Step 6: Browse for iOS 4.3.2 firmware for your device as shown in the screenshot below:


Step 7: Now select “Build” to start creating custom 4.3.2 firmware file:


Step 8: PwnageTool will now create the custom .ipsw file for your iPhone which will be jailbroken.


Step 9: Now follow the following steps to enter DFU mode using PwnageTool:
  • Hold Power and Home buttons for 10 seconds
  • Now release the Power button but continue holding the Home button for 10 more seconds
  • You device should now be in DFU mode

Restore iOS 4.3.2 Custom Firmware Using iTunes
Step 10: Start iTunes, click on your iOS device icon from the sidebar in iTunes. Now press and hold left “alt” (option) button on Mac, or Left “Shift” button if you are on Windows on the keyboard and then click on “Restore” (Not “Update” or “Check for Update”) button in the iTunes and then release this button.

This will make iTunes prompt you to select the location for your custom firmware 4.3.2 file. Select the required custom .ipsw file that you created above, and click on “Open”.

Step 11: Now sit back and enjoy as iTunes does the rest for you. This will involve a series of automated steps. Be patient at this stage and don’t do anything silly. Just wait while iTunes installs the new firmware 4.3.2 on your iOS device. Your iOS device screen at this point will be showing a progress bar indicating installation progress. After the installation is done, your iOS device will be jailbroken on iOS 4.3.2.

Booting in Tethered Mode
Last but not the least, since there is no untethered jailbreak for iOS 4.3.2 yet, we will have to boot it into a tethered jailbroken state. To do this, we will make use of a utility named “tetheredboot” as shown in the steps below.

Step 12: Download tetheredboot.zip utility for Mac OS X and extract the .zip file.

Step 13: First, we will need two files from the custom iOS 4.3.2 firmware namely: kernelcache.release.n90 and iBSS.n90ap.RELEASE.dfu. To do this, make a copy of your custom iOS 4.3.2 file that you created above, change the extension of this file from .ipsw to .zip, and then extract this .zip file.

Now copy kernelcache.release.n90 file, and then copy iBSS.n90ap.RELEASE.dfu files which are found under /Firmware/dfu/.

Move all these files, and tetheredboot utility to a new folder named “tetheredboot” on the desktop as shown in the screenshot below.


Step 14: Turn off your iOS device, and start Terminal on OS X and run the following commands:
sudo -s

enter your administrator password, then:


/Users/TaimurAsad/Desktop/tetheredboot/tetheredboot
/Users/TaimurAsad/Desktop/tetheredboot/iBSS.n90ap.RELEASE.dfu
/Users/TaimurAsad/Desktop/tetheredboot/kernelcache.release.n90


You will have to of course replace “TaimurAsad” with the name of the directory on your computer.

now press enter.

NOTE: If the above fails, try ‘tetheredboot -i ibss -k kernel’ instead of ‘tetheredboot ibss kernel’:


/Users/TaimurAsad/Desktop/tetheredboot/tetheredboot –i
/Users/TaimurAsad/Desktop/tetheredboot/iBSS.n90ap.RELEASE.dfu -k
/Users/TaimurAsad/Desktop/tetheredboot/kernelcache.release.n90


Tip: Simply drag and drop in Terminal – tetheredboot file, then iBSS file and then kernelcache.release file.

You should now see some code running in the Terminal window, at some point, it will ask you to enter DFU mode. Now follow the following steps to enter DFU mode:

  • Hold Power and Home buttons for 10 seconds
  • Now release the Power button but continue holding the Home button for 10 more seconds
  • You device should now be in DFU mode
Now wait for your device to boot, Terminal at this point will be showing “Exiting libpois0n” message. After a short while, your iPhone, iPad or iPod touch will be booted in a jailbroken tethered mode !
 
You may also like to check out:

How to Jailbreak iPhone 4.3.2 on Windows and Mac Using Redsn0w 0.9.6

If you don’t care about baseband upgrade, the current latest version of Redsn0w 0.9.6 can also jailbreak iOS 4.3.2 for both Windows and Mac users on iPhone 4, 3GS, iPad, and iPod touch 4G/3G.

But just like the PwnageTool jailbreak, Redsn0w 0.9.6 too is limited to tethered boot only, which means that you will have to boot your iOS device in tethered state on every reboot.


Cydia running on iOS 4.3.2, iPhone 4 (GSM)

NOTE: Those of you who rely on a carrier unlock MUST STAY AWAY from Redsn0w and stock iOS 4.3.2 firmware. Also, the patches for 4.3.2 are said to be broken on this version of Redsn0w. PwnageTool 4.3 with 4.3.2 PwnageTool bundles is the recommended way to go

How to jailbreak iOS 4.3.2 using Redsn0w on Windows and Mac:

Step 1: Download iOS 4.3.2 and iOS 4.3.1 (required by Redsn0w 0.9.6 for 4.3.2 jailbreak) for your version of iOS device.

Step 2: Update/Restore to iOS 4.3.2 firmware using the IPSW file you just downloaded via iTunes 10.2.1.

Step 3: Start Redsn0w and point it to the official iOS 4.3.1 firmware file (NOT iOS 4.3.2 file).


Step 4: Now select “Install Cydia” and click “Next”. Optionally (if available), you can also select any other option you like.

Step 5: Now make sure your device is both OFF and PLUGGED IN to the computer before you click “Next”.

At this stage you will be presented with a screen where you will be guided on how to enter DFU mode. Quickly hold “Power” button and then while holding the “Power” button, you will now have to hold “Home” button too. Now after few seconds release “Power” button but keep holding “Home” button until installation begins.

Step 6: Sit back and enjoy while Redsn0w does the rest for you. Once done, your iPhone, iPad or iPod touch will restart automatically and you will find it fully jailbroken on the latest iOS 4.3.2 firmware.

Step 7: Now from here onwards, whenever you want to do anything related to jailbreak like SSHing into your device, or running Cydia, you must first run your device in the so called “jailbroken state” on every reboot by using “Just boot tethered right now” option in Redsn0w.

Download iOS 4.3.1 for iPhone 4, 3GS, 3G, iPad, iPod touch 
Download iOS 4.3.2 for iPhone 4, 3GS, 3G, iPad, iPod touch 
Download Redsn0w 0.9.6rc12 for Windows 
Download Redsn0w 0.9.6rc12 for Mac 
Download iTunes 10.2.1 for Windows or Mac

How to Multiple login in yahoo Without Using any Software

You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps :
 
1.   Go to Start ----> Run . Type regedit, then enter .
2.  Navigate to HKEY_CURRENT_USER --------> Software ---> yahoo  --->pager---->Test
3.  On the right page , right-click and choose new Dword value .
4.  Rename it as Plural.
5.  Double click and assign a decimal value of 1.

Its done!!
Now close registry and restart yahoo messenger and try Multiple Login

How to download Facebook video


To download the Facebook, first you need to know the video URL for example : http://www.facebook.com/video/video.php?v=136338943065575 . below is the steps




  1. Copy the facebook video URL.
  2. Go to http://www.facebookvideodown.com/
  3. Paste the facebook video URL
  4. Click "Download this Video" then a new windows pop up.
  5. Right click the video and click "Save video as"

How to Hack any e-mail account password


Hack any e-mail account password

1) First of all Download ProRat

Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2) Open up the program. You should see the following:

 

3) Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".



 4) Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5 Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:



6) Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.



7) Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8) Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.


9) After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10) You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11) Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.



12) Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13) The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14) Below is an image of the victims task bar after the hacker clicks on Hide Start Button.


15) Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.



As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

Do you have questions, comments, or suggestions? Feel free to post a comment!

How to Secure Your Wireless Network From Hackers

The reason we secure a wireless network is to stop people from using the services of our network who don’t have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.

In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don’t secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:

1) Strategic antenna placement:

The first thing you have to do is to position the access point’s antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can’t obstruct its signals. Place it in a central location of the building.

2) Use WEP:

WEP stands for Wireless encryption protocol. It’s a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.

3) Change the SSID, disable the broadcast of SSID:

SSID stands for service set identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it’s attainable, hold back the broadcast of the SSID out over the antenna. It wont appear in the listing of offered networks, while being able to provide services as usual.

4) Disable DHCP:

By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.

5) Disable or modify SNMP settings:

Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

6) Utilize access lists:


For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.


Enjoy.......

LinkWithin

Related Posts Plugin for WordPress, Blogger...