Thursday, May 7, 2020

Cracking Zip Password Files

Cracking Zip Password Files


What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com. FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).

FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC. FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a
character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to
bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist
is, the more chances you have to crack the password. Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in
minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".
We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack. If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.
Now that we've gone through all the theoretical stuff, let's get to the actual commands.


Bruteforce

The command line you'll need to use for using brute force is: fzc -mb -nzFile.zip -lChr Lenght -cType of chars Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)
For Chr Lenght you can use 4 kind of switches...
-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght
32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a
live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3
to passwords with 32 chars of lenght, almost like the last option...
For the Type of chars we have 5 switches they are:
-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers

Example:

If you want to find a password with lowercase and numbers by brute force you would just do something like:
fzc -mb -nzTest.zip -l4-7 -ca1
This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and
lowercase.


*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try
lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because
you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start
with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars
and numbers.



Wordlist


Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too. To start a wordlist attak you'll do something like. fzc -mwMode number -nzFile.zip -nwWordlist
Where:
Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path. You can add other switches to that line like -fLine where you define in which line will FZC start reading, and
the -lChar Length where it will just be read the words in that char length, the switche works like in
bruteforce mode.
So if you something like
fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+
FZC would just start reading at line 50 and would just read with length >= to 9.
Example:
If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3,
and you wanted FZC to start reading at line 50 you would do:
fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50



Resuming



Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is
running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the
current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in
what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:
fzc -mr
And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's
gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume
you'll type
fzc -mw3 -nzfile.zip -nwwordlist.txt -f100
Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.
Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to
read the files that come with the program


DISCLAIMER : No Copyright Infringement Intended, All Rights Reserved to the Actual Owner.

This content has been shared under Educational And Non-Profit Purposes Only.

Free Microsoft Free VPS

How To Get Free Microsoft Free VPS For 24/7 (1 Months)
Private Method

1. Make a cloud account here at https://azure.microsoft.com/en-us/features/azure-portal/

2. Create a Virtual Machine with Windows or Linux and make sure to select a low spect(2 cpus, 4gig ram etc) so your free credits last.

3. Once you've set up your specs and user/password, deploy the VM in cloud.

4. Once the VM has been created, go to the info menu and select the Connect option (RDP is the best option)

5. Wait for windows to load, start twitch on a browser and hop on a stream with "Drops"; select the lowest resolution possible and also remove the "Low Latency" option in the stream settings.

6. Check every couple of hours that your VM is still working properly.

7. After some time, you'll receive a key given that you have run that stream for a lot of hours. Ms will ask for your CC to verify this account and give you 170 $ worth of free credits for 31 days.After your trial ends, you can still use their "Always Free" services which are limited.

DISCLAIMER : No Copyright Infringement Intended, All Rights Reserved to the Actual Owner.

This content has been shared under Educational And Non-Profit Purposes Only.

Wednesday, May 6, 2020

Get Nord Vpn Free For 3Yrs

 Get Nord Vpn Free For 3Yrs

Steps ::
Step 1 - Connect To Sweden Through Any Vpn

Step 2 - Go To https://nordvpn.com

Step 3 - Scroll Down And Click On 3 Year Plan

Step 4 - For Email Use Temp Mail

Step 5 - Select "Direct Debit" And Select Germany As Country..

Step 6 - Get Every Information From https://fake-it.ws/

Step 7 - Scroll And Get IBAN Number..

Step 8 - After Filling Everything Click Confirm Ad Then U Will Recieve An Email..

Step 9 - Open The Email And Confirm It..

Step 10 - Set Pswd And Login To nordvpn.com..

Boom U Got Nord For 3 Yrs.. Private❤️

Copy With Credits Else Get Ready To Be Fucked..😁

DISCLAIMER : No Copyright Infringement Intended, All Rights Reserved to the Actual Owner.

This content has been shared under Educational And Non-Profit Purposes Only.

BYPASS YOUTUBE AGE CONFIRMATION PROCESS:-


METHOD 1

 Staying on YouTube If you want to stay on the official YouTube site, you can just remove the 'watch?' in the URL
and replace the '=' sign with a '/'.

For example:

youtube.com/watch?v=1223445

...becomes...

youtube.com/v/1223445

This bypasses the restriction and lets you go straight to watching the video without the age confirmation.


METHOD 2

GOING OFF YOUTUBE If you don't mind being redirected to a different site, you can instead add "nsfw" in front of YouTube in the URL.

youtube.com/watch?v=1223445

...becomes...

nsfwyoutube.com/watch?v=1223445

This takes you to a site dedicated, as the name suggests, to letting you watch YouTube's NSFW side to your heart's content. Dont miss a single post hit
like,share and feel free to
ask any computer related problems....!!!

DISCLAIMER : No Copyright Infringement Intended, All Rights Reserved to the Actual Owner.

This content has been shared under Educational And Non-Profit Purposes Only.

Make Money Online

1. Cost Per Click ( CPC )
This method is based on earning from click on ads published on your site, web pages, forum or any apps. I have already discuss about cpc in my article about ads. If you want to learn more in details about cpc must read my article about ways to make money from ads.

The following best cost per click networks which offers best rates for every click are

Google Adsense:- It one of biggest and popular trusted network by everyone. Google Adsense Offers Highest CPC
and CPM rates. But its earning is totally depend on your visitors location and CTR also. It not so easy to get approval of adsense.

Media.net:- This is new network form by partnership of yahoo and bing with media.net. It is good competitor of
adsense. It offers good CPC rates as compare to others.

Chitika:- It is also most popular network for CPC. It also offers best revenue from ads but slightly lesser  than Adsense

Infolinks:- It is one the best program for text based ads. It offers good revenue for In-text link ads and for other banner ads also.

Bidvertiser:- It is also relative good as compare to others but its is lesser as compare to above programs.
But Still it is best one.


2. Cost Per Mile ( CPM )

This method is based on earning from every impression made on ads published on your website or blogs. For every 1000 unique impression you will earn money. But difficult task is to choose best network which offers  best rates. It is also known as CPM method.

Some best CPM networks are

Tribalfusion
BrustMedia
BuysellAds
Valueclickmedia
VibrantMedia
Adpepper
Cpxinteractive
MadadsMedia


3. Sell Affiliates Products

Affiliates marketing is commission based program. Means for every successful sale made buy you. Then you will earn commission. In my recent article i discuss about Bigrock affiliates program which offers commission for every sale of domains and hosting plans. If you want to learn more about affiliates then i suggest you read in more detail about affiliates program.

Here are following Best affiliates which offers good commission

Google Affiliates
ClickBank
Commission Junction
E-junkie
Amazon Affiliates
eBay Affiliates
DigiResult
FreeLancer


4. Cost Per Action ( CPA )

In this method you will earn money for every successful action done by user which required on that spot. It is just like an affiliates but in this network if their ads about filling any details or subscribing email service or any other . If someone fill details required by ads then you will earn for every successful action.

ClickBooth
Peerfly
CPAWay
MaxBounty
CPALead
NeverBlue
Mgcash


5. Earn From Uploading

Their are many programs which based on download program. But in last few years their are many report about increasing spam in these types of programs. It means for every successful download of your file will get earn. some programs are on premium based but some offers free service. Some trusted download networks are

ShareCash.org
CashFile.org
Uploadables


6. Write For Other Sites

If you are interested in writing online then this is best to make money . If have knowledge about any specific topic or field. Then the best way is to write articles for other services or you can also hire yourself to write for other blogs who want any author for their blogs. Below Given are Some networks which gave you money to write for them

PayPerPost
Social Spark
Sponsored Review
RevewMe
Payu2Blog


7. Complete Online Surveys

This is one of the effective and easiest way for everyone who want to make money online because it don't required any web knowledge or technical skills. In this network you have to fill the accurate information for every question ask on survey. This is best way to make side earning for working 2,3 hours on internet.
Some Best survey programs are

MySurvey
Dollersurvey
SurveyMonkey
SurveySpot
Myview
ClearvoiceSurvey
Toluna
GlobalTestMarket


8. Online Projects / Freelance

It is freelancer job means like data entry jobs. Their are many programs in which you can apply your application or as per rule. Then you have to complete specific project and task. For every successful
completing project you will get earn. Their are many programs which are based on freelancer services. Some Networks which are based on freelancing are below

Microworkers
Elance
Fiverr
Odesk
BreakStudio
ConstantContent


9. Selling Products which you own

It is also an effective to way to make money online if you have any product and service which you feel that
peoples likes to buy. You can also put your product on online auction which is best idea to earn more. You can also design any product which you own. you can also sell some services or plans online to get earn.

Amazon
eBay
Quikr
OLX
Sell.com
Gazelle.com


10. Selling Products which you don't own

It just like an affiliates marketing selling any product which you don't owns but you can sell them of any direct advertiser or by using any network. You can also sell spaces on your website or blog for displaying ads
of any product. Which help to earn money for every product sale.

Amazon Associates
ebay
Shirtcity
CafePress


Above Mentions are 10 different ways to start working online. I try to cover more topics as much as possibles.I hope all the above methods are clear and helpful for everyone to make bright future online you have to do work hark. Their are many other networks related to above categories but i publish those which i feel simplest
and best.

Happy Earning..

DISCLAIMER : No Copyright Infringement Intended, All Rights Reserved to the Actual Owner.

This content has been shared under Educational And Non-Profit Purposes Only.

4 Ways To Be Anonymous Online

Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one
and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online!
----------------------------------
1. Using Proxies
A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the
Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP
address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker
won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is
banned. To know more about proxies les me know above this post and I will post a full tutotial about it.


2. Using Tor
Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing
the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic
through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's
location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if
you need it


3. SSH Tunneling
SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to
tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net
without being monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know
if you would like to read: SSH tunneling guide.


4. Using VPN
Virtual Private Network. Basically it’s a private network which lets users to connect to other users or remote
sites using a public network usually internet. It uses “virtual” connections routed through the Internet from
the company’s private network to the remote site or employee instead of physical connections. In short, it is
private network constructed within a public network infrastructure, such as the global Internet. The Biggest
difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of
security

DISCLAIMER : No Copyright Infringement Intended, All Rights Reserved to the Actual Owner.

This content has been shared under Educational And Non-Profit Purposes Only.

How to Rip TM Dynamic Flash Templates

What you need:
-Sample dynamic flash template from TM website
-Sothink SWF Decompiler
-Macromedia Flash
-Yourself

1. browse or search your favorite dynamic flash template in TM website. If you got one... click the "view"
link and new window will open with dynamic flash.. loading...

2. If the movie fully loaded, click View -> Source in your browser to bring the source code of the current
page and in the source code, search for "IFRAME" and you will see the iframe page. In this example were going
to try the 7045 dynamic template. get the URL(ex.
http://images.templatemonster.com/screenshots/7000/7045.html) then paste it to your browser... easy eh? wait!
dont be to excited... erase the .html and change it to swf then press enter then you'll see the flash movie
again icon_smile.gif.

3. copy the URL and download that SWF file.. use your favorite download manager.. mine I used flashget
icon_smile.gif NOTE: dont close the browser we may need that later on.

4. open your Sothink SWF decompiler... click "Quick Open" then browse where you download your SWF/movie file.
Click Export FLA to export your SWF to FLA, in short, save it as FLA icon_smile.gif

5. Open your Macromedia FLash and open the saved FLA file. press Control+Enter or publish the file... then
wallah! the output window will come up with "Error opening URL blah blah blah..." dont panic, that error will
help you where to get the remaining files.

6. Copy the first error, example: "7045_main.html" then go back to your browser and replace the 7045.swf to
7045_main.html press enter and you'll see a lot of text... nonsense text icon_lol.gif that text are your
contents...

NOTE: when you save the remaining files dont forget to save with underscore sign (_) in the front on the file
without the TM item number (e.g. 7045) if it is html save it as "_main.html" and same with the image save it
as "_works1.jpg" save them where you save the FLA and SWF files. Continue browsing the file inside Flash
application so you can track the remaining files... do the same until you finish downloading all the remaining
the files.


DISCLAIMER : No Copyright Infringement Intended, All Rights Reserved to the Actual Owner.

This content has been shared under Educational And Non-Profit Purposes Only.