Search:

Type: Posts; User: shakuni; Keyword(s):

Search: Search took 0.02 seconds.

  1. get geolocation via IP address in google maps, I created this

    Hi everybody

    Yesterday I created this application for a friend, which gets geolocation in google maps via IP address.
    Its here, http://apps.hackingtuts.com

    Although it is very trivial, still...
  2. cellphones!

    cellphones!
  3. How to get info about a person through his phone number

    Just what the title says?
    How to get info about a person through his phone number?
    And please don't answer that I should call him to ask myself.
    I need this info because of a bet with my friend...
  4. Replies
    1
    Views
    4,565

    Case Sensitive Search ?

    Is there any search engine that provide case sensitive searching. I am sure that google searches are not case sensitive.
  5. Replies
    1
    Views
    4,661

    Exotic Malware ?

    For my Malware Research I need samples of the following two kinds of Malware(description from Peter Szor's book). Please give me the names or samples of any of them,




    Thanks.
  6. Replies
    7
    Views
    6,109

    O.K. Charlie.

    O.K. Charlie.
  7. Thread: Pdf To Jpg/bmp

    by shakuni
    Replies
    4
    Views
    2,373

    Actually I am working on a new kind of...

    Actually I am working on a new kind of steganography tool. I can't give you the details of it now but I will post it when it is completed.


    I don't understand this.
  8. Replies
    7
    Views
    6,109

    Yes, "may be" then I can't determine your...

    Yes, "may be" then I can't determine your physical location.
    But I am trying to develop a tool that will find IP from physical location, something like reverse of traceroute. But now I realize that...
  9. Thread: Pdf To Jpg/bmp

    by shakuni
    Replies
    4
    Views
    2,373

    Pdf To Jpg/bmp

    I need to convert pdf to jpg and bmp for some purpose and I want to do it in assembly (or C/C++/ java). Obviously I will have to use some pdf pasing library/SDK. So do you guys know of any good one ?...
  10. Replies
    7
    Views
    6,109

    Geographical info to IP

    I know that the physical location of a computer can be easily determined if we know its IP address.
    What I want to get the is IPs from geographical information alone.
    for instance, I want to know...
  11. Replies
    8
    Views
    6,177

    Accessing "in Use" Files == ?

    How can I access the files that are in use by other processes using win32api ?

    Say there is this file called "locked.txt", which is in use by process A. Now how can I copy this file to another...
  12. Thread: Sources

    by shakuni
    Replies
    8
    Views
    7,307

    Just setup a honepot and you'll get everything...

    Just setup a honepot and you'll get everything that is in the wild.
    Enjoy!
  13. Replies
    1
    Views
    3,712

    Strange Ip Addresses

    My log file told me that a couple of exploits(LSASS and DCOM exploits) were tried on my system's one of the VM (windows xp2) from the following IPs

    10.8.240.93
    10.8.154.135

    But how is this...
  14. Replies
    2
    Views
    5,515

    Win32 Api Creation == ?

    While researching for my book ("Malware : Writing Malicious Code"), I came across this-

    Now my question is-

    How can I emulate an API, for example, How can I write code that'll manipulate...
  15. Replies
    2
    Views
    8,913

    yes it will, actually it just overwrites them....

    yes it will, actually it just overwrites them. But it won't effect the image if the string that is to be hidden is small.
  16. Replies
    2
    Views
    8,913

    Basic Image stegnographer v 0.1

    Basic Image stegnographer v 0.1

    The following source and explanation is a bit oversimplified. But I am still learning about steganography.

    A bitmap contains a header section(first 54 bytes) and...
  17. Thanks for suggestions. I have completed a...

    Thanks for suggestions.
    I have completed a potential chapter list and index of the book.
    I want to make virus writing so easy that it will not be "cool" anymore.The problem is that it will make...
  18. Replies
    6
    Views
    8,390

    injecting browser helper objects remotely =?

    Some system monitoring program gave me this message

    which means that it is executing the function whose name is c which is exported by jkhfd.dll

    I dissassembled the file(jkhfd.dll) and found...
  19. writing a book, "Malware-Writing Malicious Code".

    I read Mark Ludwig's "The Giant Black Book of computer viruses" a few years back. However it is obsolete now and there is no book to fill its place. Although there are good books on writing rootkits,...
  20. Replies
    26
    Views
    20,867

    What's the meaning of "donating" when they aren't...

    What's the meaning of "donating" when they aren't useful for anyone.I throw them in recycle bin.
  21. Replies
    18
    Views
    16,715

    but "a visible window and dialogue boxes" are not...

    but "a visible window and dialogue boxes" are not required to understand the working of some process.One can always start the process inside the kernel level debugger and monitor its behaviour.
  22. Replies
    18
    Views
    16,715

    Can't we get into this "system account" ?

    Can't we get into this "system account" ?
  23. Replies
    18
    Views
    16,715

    "Windows Automatic Update" or a backdoor

    I have four partitions on my computer, say c,d,e and f.Out of these windows is installed on c drive.
    And I have two users on my computer, one is admin and another is InternetUser.I have configured...
  24. Replies
    3
    Views
    4,560

    coding a pdf recovery software

    <history lesson>
    A few days ago I downloaded a book on cryptanalysis in pdf format, it was huge in terms of size (40 MB).
    After downloading it I found that I can't read it because it is corrupt. So...
Results 1 to 24 of 24