Blogger Widgets

Wednesday, 25 July 2012

Invite All of Your Friends in One Minute ON FACEBOOK

.:Invite All of Your Friends in One Minute:.
  1-Copy the Code that Given below in the end in GREEN Color.

2-Now, Click on "Suggest to Friends" under Profile Pic.

3-When Friend list Open, Paste this Code in Address Bar & Hit 
ENTER Key, All of your friends will be selected Automatically, Now Click on " Send invitation".Here is Friends Invitation Code
   
------- >(  javascript:fs.select_all();  )<-------

Hack email accounts using google+pics { BY HARI}

Requirements:
Google Dorks
Code:
ext:sql intext:@hotmail.com intext:e10adc3949ba59abbe56e057f20f883e
Code:
ext:sql intext:"INSERT INTO" intext:@hotmail.com intext:password
Code:
ext:sql intext:@hotmail.com intext:password

Online hash cracker
http://www.h4ckforu.com/md5/

Ok lets begin:
Lets go to [URL="http://www.google.com/"]http://www.google.com/[/URL] and paste one of our dorks
[URL="http://img820.imageshack.us/img820/6850/97397719.jpg"][/URL][URL="http://img820.imageshack.us/img820/6850/97397719.jpg"]
http://img820.imageshack.us/img820/6850/97397719.jpg

Select one of displayed pages,as you see we now have a bunch of email accounts+ hashes
[URL="http://img842.imageshack.us/img842/2601/81283776.jpg"][/URL][URL="http://img842.imageshack.us/img842/2601/81283776.jpg"]

http://img842.imageshack.us/img842/2601/81283776.jpg

I selected a random account
"zhaokailun92@yahoo.com.cn"
d2491b289b6be1fd0bb0c8d60e053d3d
[URL="http://img823.imageshack.us/img823/8707/53326337.jpg"][/URL][URL="http://img823.imageshack.us/img823/8707/53326337.jpg"]

http://img823.imageshack.us/img823/8707/53326337.jpg

As you see we just hacked our fist account:
Email:zhaokailun92@yahoo.com.cn
Password:19920707
Its very easy,have fun and enjoy unlimited accounts

[Guide] Close any Facebook account in 24 hours {BY HARI}


Close FaceBook account(s)



Just Follow the steps:
Step 1 - Go to this url:
http://www.facebook.com/help/contact.php...m=deceased

So this is the Url we will use to Report our slave. This Form allows you to report a deceased person (someone who is dead).

Step 2 - Complete the Fields:

Explain:
Full Name: Your Victims Full name(Name last name)
Date of birth: Go at his profile and click at Info tab and get his date of birth.
Account Email Addresses: Do the same thing, go to his profile and click on info tab and get his email addresses.
Networks: Again,go to his profile and click on Info tab and get his networks, copy them and paste in the form.
Web address of profile you would like to report: Just go to his profile and copy the link in the address bar.
Relationship to this person: To make more believable select Immediate Family.
Requested Action: Remove Profile
Proof Of Death: This is the hardest part of this form. Now to make a proof of a death just Google in your language a "Death Certificate" or "Certificate of a Death". It doesn't matters from what country you are, just use this Italian certificate and open up photoshop or whatever Image
Editor and just write in a blank field:
Annunciamo il morte di [name goes here]. Save your image to desktop and upload it in one of the Image
Free Hosting like: http://imageshack.us
And it's done ;)... Italian Death Certificate:
Additional Information: Write what you want, just write that you are in his/her family and you would like to close his/her Facebook account because you won't like that when he is dead, his Facebook is opened.

Step 3 - Click on Submit and then a message will appear:
Your injury was submitted at Facebook Team .. So the meaning is that one of the mod's of Facebook will review your report and will do the right decision. It works in most of the times. I closed a few ones.
 
FOR MORE HACKS AND TRICKS VISIT AND LIKE US:

The Art of Brute Forcing { BY HARI }

Introduction
If you are new to brute forcing, then this article is great for you. Even if you have a pretty good understanding of brute forcing, this may still be new knowledge for you in some aspects. There have been a couple articles released on brute forcing. One was extremely huge, which would more then likely confuse the end user rather then help them benefit from it. You will notice on my site Global Brute Forcer and FTP Brute Forcer and may have no understand what they mean. You might know what they do, steal passwords, but don’t understand the whole theory and past of brute forcing, so lets get started.
Brute Forcings Past
Now, I am no expert on the past of brute forcing, but I know what it has been used for, even before computers. People were guessing other peoples information long ago. They could be trying various information over and over again until they are on the dot, which would be a brute force method in computer terms. Even a lot of governments agencies and such whose main goal are to decrypt and decipher various coded passwords use brute force methods for one of there approaches. The fact that they probably have super computers to do there dirty work or just really powerful ones in general, it would not take long to decrypt a password, depending on its level of encryption. Using brute force is so powerful, people always say things like “brute force is weak,” as if you are some computer god and can snap your finger and its done. Well, I hate to break it to you, but brute forcing is one of the first methods approached to getting passwords, whether its Windows or Unix/Linux accounts, or a type of service which requires authentication such as FTP, SMB, SMTP, etc. and the best approach would be a brute force attack.
Methods of Brute Force
There are various methods of brute forcing out there. It is not just limited to trying all possible character combinations. A lot of people think that dictionary attacks are not brute forcing. You are wrong, they do not categorize that as a separate attack. The whole idea came from brute force, there for it is held in that category. Think about it, you are loading a list of words, attempting each word as the password to the user account. You would be doing the same thing with all possible char combos. Just going at a faster approach by trying the easily known passwords before really going all out. The method is a time consuming process, depending on how strong the password is you are trying to steal. If you are really true to wanting a password, chances are you could be waiting years to get it. This account would obviously have changed some how over time, if you are ever successful in getting it, which I will not say you ever will be.
Attacking with brute force method over the internet really takes some skills. No, it does not take skill if the password was just something like 1234, it must go beyond this. You must analyze your target and do some research on them. Sometimes, you can end up with being able to guess there passwords or make up your own custom dictionary lists and run them which you created by learning more about the person. In some cases, the password has to do with there username, family, or even pieces from there web site. Other cases the passwords would need an approach of using all possible char combinations. Doing this type of attack online is not really a good idea, considering that it would take years to complete and you are trying so many requests the server would eventually kick you off.
Brute forcing can go beyond just password guessing. You can use brute force for many other goodies. For instance, you want some valid accounts on a server? Simple, use brute force methods to try various usernames over and over again, looking for the correct strings sent back the server to determine if the username is valid. I added this option to Global Brute Force, which if you know how to write a definition file writing additional information to be able to use Account Scanner should not be hard. Maybe you want to discover various folders on peoples web site? Such as Discover does. Use the brute force attack method. Load a dictionary list, start scanning the domains, all sorts of goodies could be popping up all over the place that you never knew about. So, brute forcing is a great method in the security world and is a must to understand.
I will now provide you with some examples of the brute force process, maybe it will help you understand better, maybe not. The format used is that of like using FTP to connect through the URL bar (ftp://username:password@server.com). So, it goes Username : Password.
These examples show the way it works against a server, whether its http, ftp, or even SMB. The same principle can be used against whatever you are using it for. Not just against servers.
Dictionary Attacks
The passwords are reading from the file C:\WordList.txt as shown in the brackets.
Connection to Server => Authentication Login => Sends Required Strings => Username:Sackface(C:\WordList.txt)
Connection to Server => Authentication Login => Sends Required Strings => Username:Sammy(C:\WordList.txt)
Connection to Server => Authentication Login => Sends Required Strings => Username:Susan(C:\WordList.txt)
Connection to Server => Authentication Login => Sends Required Strings => Username:Suicide(C:\WordList.txt)
Servers Response => If Invalid Password => Brute Force loops to next password
Servers Response => If Valid Password => Brute Force method stops, and logs found passwords.
All Possible Character Combinations
This method works about the same, just uses all possible character combos.
Connection to Server => Authentication Login => Sends Required Strings => Username:aaaa
Connection to Server => Authentication Login => Sends Required Strings => Username:aaab
Connection to Server => Authentication Login => Sends Required Strings => Username:aaac
Connection to Server => Authentication Login => Sends Required Strings => Username:aaad
Servers Response => If Invalid Password => Brute Force loops to next password
Servers Response => If Valid Password => Brute Force method stops, and logs found passwords.
It will continuously try all possible character combinations for the password, as seen, trying all possible character combos for aaaa, which would take quite a long time to generate all of them, considering every possible character, including ASCII chars.
How Can I protect myself or my servers from this?
There are a few methods that you could go about protection yourself and your servers. Use long passwords, in the twenties or teens, including no words, just numbers, letters and ASCII chars. This will be one of the hardest passwords to guess, considering it would take years to come to such a lengthy password and have to generate all of those characters. Also, never give your real e-mail address that you register accounts with on your site, this could prove to be useful for others to enumerate information about you. Now, if you are hosting a server and you are afraid of brute force attacks being used against your servers, there are some things you can do to stop it. I would recommend using an account block method. If someone is trying to guess over and over the password, simply have the account disable itself, so that no matter what IP address hits the accounts, it will be locked for your protection. If you are experiencing just brute force attacks from one certain IP address then create a banning system. If a user from a specific IP address is attempting hundreds of passwords to a certain account or even thousands, have it completely ban there IP address. You can either ban them for good, or just for a day or two. A good way to stop brute forcers is to use some type of encrypted login, such as HTTPS which would just show encrypted text back when a user tries to login and sniff the data to create a brute force attack with. Sometimes using a persons E-Mail address as the login can prove more affective since they are so much harder to “guess” then a simple username such as Administrator anything of that nature. I have seen logins that even once you have the password to the account, it will give you steps before actually entering, maybe asking for your secret questions or even a social security number. This proves to be very affective also. NEVER use passwords that relate to your phone number, CC, SSN, or anything of that type. That should help you prevent most brute forcers from being unsuccessful.
Conclusion
This may have been a smaller article, but it gets down to the point of brute forcing. You should have a solid understanding of how it works, what its used for and more. If anyone was to ask any suggestions for brute forcing, I would simply tell them to know there target. At least take time to enumerate information and do some social engineering that could possibly lead to his password. If you wish, you can jump right in and start attacking with brute force methods. Just remember, that could be time consuming, but then again, either way could end you up in the dumps! Just please, before you go dissing on brute force, realize how important it is for security assessment scanning. If you could of not figured this out for yourself of how important it is, I really hope you are a newbie or just learning.

The Truth Behind Hackers

What is the FALSE view on a hacker and hacking?
A hacker or hacking can be fit into many categories, depending on the personal view. When you read a dictionary for the word hacking, you see something like “Malicious internet users; breaking into a pc without permissions.” None of these do I agree on. People use the world hacker and hacking for fear. “I am a hacker, I will hack you, fear me.” The words are so abused, it is pathetic. The people who write definition about hackers and hacking do not understand deeply the true meaning, but just what they hear about. Hacking is not to be used to abuse, nor is the word hacker. I hate hearing people say they hack, especially on yahoo, where its full of these idiots. They do not understand enough about hacking or hackers to even claim they fit in.
What is the TRUE view on a hacker and hacking?
The true meaning of hacker is someone who wants to learn. They want to expand there knowledge, learn how things work so they can get around things that block them. Hacking is a method of getting around these obstacles. A good way of putting this is Security Analysis. These people are hackers, they know hacking and the ethics behind them. They do not abuse, cause havoc, or try to make others fear them. They help, teach, and even learn. A hacker is like a Guru in the computer area, mentoring and teaching the people who listen to his wise words. They learn what’s wrong with there systems, and patch it.
So your PC is getting fucked up? What do you call those type of people? If you are calling them a hacker, you are totally wrong. This people are what is called a “cracker.” These are the ones who should be feared. When I hear people say “I’m a hacker, cracker blah” I think to myself, what an idiot, he is just using cracker as someone who brute forces yahoo names or whatever it is he brute forces. You need to get those two things straight.
Crackers and Cracking
Cracking does not just evolve around breaking algorithms, passwords and such. A cracker is also known to be a very malicious user, once they have cracked your passwords, they will break and enter and wreak as much havoc as possible. People think that cracking is just the art of stealing passwords, which in a way, they are some what correct, but those type believe that a hacker is someone who breaks into PCs. I give credit to the crackers who break encryption codes and such, but I do not give credit to the ones who abuse there powers and ruin other peoples life’s through various methods. I think this is probably the strongest subject that someone could argue about. But, this is my view and more then likely yours, if you have knowledge in these areas.
White Hat, Gray Hat, Black Hat hackers
Ok, I would love to stress the fact that this is the stupidest thing to ever hit the net. Categorizing a hacker into these areas. If you read the above and actually understood what I have just told you, you would know that there are two categories. A hacker and a cracker. One is malicious the other is not. So, hackers can abuse there powers, if called for, but it will be for the best of whatever is going on ( child pron sites etc ). So, I do not care if you do not agree there, but if you know your hacking ethics you will agree and some day come to the understanding.
Trojan Hacking
I do not even know why I called it Trojan Hacking, but it looked better then just Trojans. You might be saying to yourself “Fuck, my CR-ROM is opening, my monitor is being shut off, I AM BEING HACKED!” Well, think again. If this was done correctly, by either a hacker or a cracker, he or she does not have the power to do such things, if he’s doing it through true methods. People who use Trojans to destroy and steal, are not called a hacker or a cracker. These type of people have no understanding of how things work and whets really going on. They just know the “Enter IP Address”, “Click Here To Download / Upload File.” They are called lamers or script kiddies.
Trojans CAN be of useful to a hacker or a cracker. Why I say this is because once the machine has been consumed, either from a buffer overflow or just a common exploit which leads to root access, can actually have use of a Trojan. When you are inside a pc through true vulnerability methods, you know that you have extreme limitations of what you can do or see. So, your solution to all of this, simply upload a Trojan to there PC, execute it remotely ( depending on the OS they are using ) and then connect, and you have 4 times more options. These are hardly ever used, because they are just usually sent from a little social engineering and them bam, they are in. People who actually get in without a Trojan, never even think of using a Trojan, because they will think so less of one in the first place, which is 100% fine.
Script Kiddies and Lamers
Well, I figured since I mentioned these type of people in one of the paragraphs, I would tell you my view on these people also. The basic meaning behind a script kiddy, is that of one who does not understand or care to understand. They will use programs they didn’t write or claim they wrote, but really, have no understanding what’s so ever. They never learn, they never care to learn, they just sit in the same area of knowledge they have always been in. Lamers are much like script kiddies, but can be taken far more serious because of threats and such. They use words to scare people, they try to act like they know it all. Everything they say is plain out LAME. They bitch about anything and try to tell people how they are wrong. I have had arguments about simple 9x based commands, such as deltree, which a certain someone was telling me that it would work on any operating system. He kept telling me to place it in a batch file and run it and watch it format my drive. Obviously we can clearly see, this person has no common knowledge with operating systems, but yet he tries to tell how it really is, in order to make him look like god. Typical example of a lamer. Never listen to people you do not know, because they could be a script kiddies stealing source codes or lamers acting like they know it all.. Take that warning ahead of time, before they get to you.
Conclusion
I am writing this for all of the readers, whether they are elite in the computer area, or are just a typical reader wanting to learn. Once you have read this, you should be able to point out the people who are fake. Never believe someone who instantly speaks up and says “I hack, program, crack.” These are the definite ones who would fit under script kiddies and lamers. People who keep quite, but will help you and open up to you, so you can clearly see what they know, are the ones to believe. NEVER believe someone without proof! ( Screenshots, examples etc. ).
Thanks you for reading this…. It is finally over… I think… well, yes.. =)

Windows Formatting Guide (BY HARI)

What exactly is formatting and why is it necessary?
Formatting is the method of whipping your hard drive clean of previously installed / stored data. Do not think that the data is completely removed when formatting, because in fact its not. But, we do not need to cover this. When you format, you do lose everything that was previously installed, so if you have important documents, back them up!.
There are various reasons that formatting is necessary.  Some may be because your computer is lagging horribly and sound and such just start failing, you have to run all sorts of tools to tweak it and ran diagnostics, but it’s just not cutting it. You want it back to stock performance and everything to work correctly, so you just say screw it and reformat it. Various viruses and worms can wreak havoc and are not able to be rid of unless you format your pc. Sometimes it’s necessary to completely delete the partition and re-create it, then format. As stated previously, there are methods that the more advanced users may do to dig up past data, usually just file names, but that is more then enough to tell what was previously on your hard drive disk.
What is required for formatting?
I will show you some of the tools that you should have when reformatting. This may vary, depending on what file system you have and what operating systems been previously installed.
- Win9X Boot Disk
This is used to boot up your PC into DOS for various formatting operations. The situations call for different measures. Sometimes a boot disk is a must.
- Restore CD
A restore cd comes with your new computers. They have the factory settings, drivers, OS and everything you need for your PC to be put to its factory settings. Some users may have lost this or never got one, so I will cover some optional solutions.
- Windows Operating System ( OS )
You may have bought or even burnt a copy of a windows operating system. This does not mean that your computer will install 100% complete without any problems, this is simply the basic foundation for a newly installed OS. You may be required to supply drivers and such. Read later on about this.
What if I do not have a restore or windows operating system cd?
If you are lacking everything that you need, please do not try to reformat. With that being said, let me tell you what should be done if you are supplied with efficient tools necessary for a reinstall. If you do not have a restore cd, but you have a copy of the Windows OS, then there are various steps you should take for a successful install. First, determine your PC brand, which could be Hewlett Packard, Gateway, E-Machine etc. Once you have figured this out, simply determine the model. I know that Compaq and HP have an auto-detection system to determine the settings for you, if you have this type of machine, others might too just make sure to check there official web site and look for Downloads or Support. With a manufactured pc you should be able to give them a call and request a new restore cd, depending on how old the computer is.
If you can not figure out your model and make try using the msinfo32 (start—> run—> msinfo32) or a utility called Sisoft Sandra Pro to detect your model and make for you. This is also handy if you have a custom built pc which has no restore cds created for it. Use Sisoft to determine all of your hardware settings and the type that’s installed, and then use it on http://www.google.com to search for the drivers you need. You must search for drivers that are designed for the exact operating system you are installing or they will be incompatible! Mainly, with an older computer, if you are installing Windows 95/98/ME then you SHOULD download all drivers ahead of time. If you have Windows XP and are installing it on an older system then the Plug and Play should pickup most of the settings for you, so needing drivers downloaded ahead of time would not be needed. If the drivers are something like video driver then you should download updated ones from the default manufacturer because MS only supplies you with the lowest quality drivers possible.
I have everything I need, what next?
Now, you must determine the operating system that is currently installed. If it is Windows XP then there are more steps that must be taken in order to format successfully from DOS. If you are on Windows 95/98/ME then the steps are a lot less struggling. If you wish to remove the partition completely and reformat it and previously had Win9X then do so, just follow the steps that are required for reformatting an XP system from DOS.
FIRST STEP FOR BOTH XP & 9X:
Determine if your copy of the restore/windows cd is bootable, or your computer is setup to boot from CD at startup. Simply place the CD in the CD-Rom, reboot your computer and see if it tries to read the cd before starting windows. If, instead it reads something like the A: drive first, then you must change the boot-up sequence to CD-Rom first. This method varies by the type of motherboard you have. To enter your BIOS to change the settings use either F1 or Del. These are the two mostly used ways of entering, if that’s not doing it, it should say what key to press to enter bios setup. Look for the option Boot, they should be presented like Floppy Disk; Removable Devices, CD-Rom, Hard Drive etc. If its an older motherboard, they are identified totally different, you will have to look up the sequences online. Once you have changed these and place CD-Rom at the top by usually using the + and - keys on the number pad to your right, save the settings and reboot. If it does not pickup the CD-Rom and ask you for various operations, then the CD is not bootable, which is where a boot disk comes in. If the CD is not bootable, make sure to set the boot first priority to Removable Devices or Floppy Disk.
Any asterisk that is provided means the steps are used in conjunction with each other.
Restore CD’s
1) Place the Restore CD into the CD-Rom once you have determined that its bootable
2) You will be given a list of various options for restoring. Make sure you choose something like Clean Restore, they should provide descriptions of each.
3) Just follow the required steps for installation, its all self-explanatory with a restore CD.
4) If the Restore CD does not provide any means of a clean install, just a over ride of the current windows install, follow the below methods up to format it.
Booting From a Floppy **
1) Grab yourself a bootable floppy disk at http://www.bootdisk.com designed for Win9X. Any will work just as long as it provides access to DOS and CD-Rom activity.
2) Provide a 1.44MB floppy disk that is not needed and install the boot disk files to it.
3) Place the floppy disk in the floppy drive and restart.
4) Once its reading the floppy a menu will come up and ask if you wish to boot with CD-Rom support, choose the option to boot into this mode.
Windows 9X Non-Bootable CD(**)
1) You will be given a command line interface, depending on what your default drive letter is, it would look something like C:>, if its A:> simply type in C: and hit enter.
2) Simply issue the command format C: where C: would be the default letter of the drive. It will ask you for confirmation, just type Y.
3) The formatting phase will start, it could take a while depending on the size of the hard drive.
4) Once finished, it will prompt you for a volume name, which simply is what the hard drives label will be, its not necessary but you may enter something if you wish.
5) Now, you will be dropped back into a C:> prompt. Enter in the Win9X CD to the CD-Rom.
6) You must now drop into the CD-Rom drive to issue commands from it. To do this simply type in D: or whatever drive letter has been assigned to the CD-Rom
7) Once it shows up as D:> type in Setup and the setup phase will initialize, just follow the simple steps and you will make it.
Windows 9X Bootable CD
If the CD is bootable, then you will be given similar options that a floppy boot disk would provide. Make sure to startup into DOS with CD-Rom support. Do not startup from hard drive or this will just load your current OS. Just use the above methods once you have chose to startup into DOS. Then follow the required steps provided when you are in the command prompt.
NOTE: Be sure that you have the correct drivers for your machines specifications or you will come across a lot of driver problems.
Windows 2K/XP Non-Bootable CD w/ Win9X Boot Disk (**)
1) Once you have got the DOS prompt in front of you issue the fdisk command
2) You will be asked “Do you wish to enable large disk support?” type in Y. This simply allocated all the possible space for large sized hard drives.
3) We must determine the type of file system you have. Choose the option “Display partition information”
4) Look under the tab labeled “Type” if it is FAT32 then it will be a DOS partition, if its NTFS then its a Non-DOS partition.
5) Hit Esc to go back to the first options
- If it was NTFS choose the option “Delete Non- DOS Partition” which is option 3.
- If it was FAT32 choose “Delete Primary DOS Partition” which is option 1
5) Next you will be asked to enter the number of the partition, which is will probably be 1, unless you have two hdd installed. If you are not sure which one is which, the default selected partition will be the one your windows is installed on, so choose that one.
6) It will ask you for the volume label, if there is even one entered, them type it in as it should be typed.
7) Now, it will ask you if you are sure you want to delete this partition, type Yes.
8) It will now tell you that the partition has been deleted, hit Esc to continue.
9) You have the list of options at your view again. Choose “Create DOS Partition or Logical Drive”.
10) Now choose “Create Primary Dos Partition”
11) It will now ask you if you wish to enable the full size of the HDD for that partition and make it active, choose Yes.
12) It will create the partition, it might take a little while, but not long. Once this is done, it will ask you to restart your computer.
13) Restart with the boot disk inserted, get back into DOS Prompt and now type in format C:
14) Once its done formatting and you have optionally entered a volume name, enter the Win2k/XP CD into the CD-Rom.
15) Browse to the assigned CD-Rom drive letter by simply typing D: where D would be the drive letter
16) Now type in the following: “cd i386” and it should drop you into something like D:/I386
17) Now type in “winnt” and the setup phase should startup, just follow the required steps.
Windows 2K/XP Bootable CD
1) When you startup with the CD entered, it should say “Press any key to boot from cd” or similar.
2) It will load all the necessary files to give you a graphical users interface for the setup, instead of a DOS based environment.
3) It will ask you if you wish to install Windows XP to press Enter, so do so.
4) Now comes the license agreement, simply press F8 to move on.
5) You will see your partitions, choose the one you wish to install 2K/XP to then press Enter
NOTE: If you wish to delete the current partition and recreate it, then simply press D, Enter, then L to the next given screens then choose this as the partition you wish to format and install.
6) Now you will get a list of options to to format the file system. Choose “Format the partition using the NTFS file system”
7) Now it will format and copy the required files to startup the setup once you reboot. A warning will popup telling you its about to reboot.
8) Let it reboot and do not press any keys and wait for it to reboot, the Windows XP logo will show up and then initiate the rest of the setup

You should print this out so you may refer to it when needed.

FOR MORE HACKS AND TRICKS VISIT AND LIKE US :

Introduction to SQL Injection( BY HARI)

his article will cover the basics of what SQL Injection is and how it works under the hood. Most people act as if they know SQL Injection just because they can simply use a vulnerability in PHP-Nuke by pasting it in the Address Bar and bam it’s done. It’s not that easy to discover, once discovered it’s a lot easier to use, which is what people mostly do—use already discovered SQL Injections.

What is SQL?
SQL stands for Structured Query Language. It has been around for ages and is designed to work with all programming languages, if not there will be an optional function to simulate what SQL can do. The basic function of SQL is to give full control over databases. With SQL you can call on what is known as a “statement” which will allow you to execute instructions that would do things ranging from displaying just users from a table, or adding new users / passwords / descriptions into a table or DB in general.
Example Scenario:
Let’s say you have an Access Database that contains a table called TblUsers. Each Column contains information on that user, let’s say, it would contain Username, Password, Hash, Email. You want to be able to just show the username and password from the Access DB using SQL Statements. You would do the following:
SELECT Username,Password FROM TblUsers
This would specifically “select” the Username and Password (always seperated by the delimiter “,”) “from” the table you wish to pull the information from, which was TblUsers. Then, you would simply execute your SQL Statement and have it dump to whatever you are displaying the information in (listview, text file, html file etc.).
So, as you can see, SQL is a very handy. That’s just a simple example of what it’s used for. You can also use basic commands like INSERT which would allow you to INSERT information into Columns. Which is where a lot of the vulnerabilities come into play with SQL Injection.
What is SQL Injection? (Example based off PHP scripts)
SQL Injection is a method of injecting data into a remote Table or other sorts of Databases that are managed by SQL Statements. It is not just limited to injecting information. You can also use it to pull back and display valuable information, even using the common statements above, given the correct scenario. A lot of times, SQL Injection is as simple as re-arranging a PHP scripts post information and adding things like “admin=1” etc. which normally would be a hidden function only used for when creating administrators.
A lot of times web logins that you see, which have a section for entering a Username / Password will be querying an SQL Statement that will be used to verify and validate that you are truly a registered user in the database. You could inject SQL commands into the query, sending your own crafted username and password. The limits are endless to the types of information you could be injecting.Let’s look at some prime examples of vulnerabilities in PHP Nuke (they will be out dated, but you will get the idea).
modules.php?name=Downloads&d_op=viewdownload&cid=2%20UNION%20select%20counter,%20aid,%20pwd%20FROM%20nuke_authors%20—”;
Lets cross examine this old vulnerability. At first you see the basic PHP script which are the prime targets for a lot of attacks. They requested a basic page, but after the &cid=2 they executed an SQL Statement, which if the script is not coded to deny SQL statements you can use almost any query on the vulnerable script.
Now, you see that they ran UNION Select Counter,aid,pwd FROM nuke_authors—
UNION is a common statement that allows you to execute two SQL queries together and dump the information all into the same output. After that they use the basic example that I showed you, but notice the “—”? This is a common method used to bypass login credentials. When you execute “—” it’s going to automatically ignore any errors that would otherwise be displayed.
So, the output would be dumping the information from the colums onto the web site.

Conclusion
If you’re wanting to test your own creations for SQL Injection, I recommend getting an SQL book or file that has all of the possible SQL Statements and attacking your own modules with common statements. If you’re wanting a more in-depth set of examples, which would teach you a lot more then what I did, I just gave you the foundation, now yuou must take it that next step and learn on your own, check out SecurityFocus Article.
This article is not huge, but it should give you a basic understanding of SQL Injection and SQL in general. This way when you hear someone bragging about how they attacked a site with SQL Injection and all they could show you is what they injected, but not how they got that information, you know right away the truth about them 


FOR MORE HACKS AND TRICKS VISIT AND LIKE US :
           WWW.FACEBOOK.COM/HARIHACKS

Chat with your friends through MS-DOS IN LAN BY HARI


 
1. All you need is your friends IP address and your Command Prompt.

2. Open your notepad and write tis code as it is.................. I would prefer you to copy this !

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3. Now save this as "Messenger.Bat".

4. Open this file (.bat file)over to Command Prompt and press enter!

5. You would then see some thing like this:

MESSENGER
User:

6. After "User" type the IP address of the computer you want to contact.

7. Before you press "Enter" it should look like this:

MESSENGER
User: IP_Address
Message: Hi, How are you ?


But never forget to enable messenger service.
To enable messenger service, go to control panel then click on administrative tools
now click on services and find messenger services then it may be set in manual, not start it.

That's it.

You have to enable that service both in your n your friend.

It may be working in Win XP ......... for other it may be not working....ok if all u need to run it in win 7 den i will find some another way.
 
FOR MORE HACKS AND TRICKS VISIT AND LIKE US :    WWW.FACEBOOK.COM/HARIHACKS

Bypass Paypal payment to get some ebooks and scripts for free BY HARI

Just add the following in bookmark, or copy/paste it.
Code:
javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);

When you are visiting a page using a paypal button, just click the bookmark or paste the code in the URL bar of your navigator.

If it works, you will be redirected to the download page
Else, try another site (or buy it )

It works with :
Chrome [X]
Firefox [X]
IE [?] (anyone can test it?)
Opera [X]
Safari [X]

A link the script works on : http://www.ptcexpert.com
If you find another link, please share

Premium Accounts { 16 Download Sites } BY HARI

Following are the list of usernames and passwords of the premium accounts for Best downloads sites.
…!! ENJOY !!…
!!…100% Working Accounts…!!


1.) www.divxcrawler.com {download movies fastly}
Username : divx273
Password : 8342729
2.) www.butterflydownloadnetwork.com {movies, music, Pc Games, Tv shows}
Username : cinemanetwork20
Password : butterfly20
3.) www.downloadprofessional.com {movies,Pc softwares, Pc Games, Tv shows}
Username : lo886Ees
Password : zAgt88er
4.) www.sharingzone.net {movies, Pc softwares, Pc Games}
Username : LODMQYHX
Password : 375021402
Receipt : 4T5W89RD
5.) www.unlimitedgamedownloads.com {movies, Pc Games, psp softwares}
Username : ga20me
Password : ke01feb
6.) www.watchdirect.tv {movies, music, Pc Games, online Tv}
Username : cinemanetwork20
Password : butterfly20
7.) www.fullreleasez.com {Greatly Every thing}
Username : Af872HskL
Password : XjsdH28N
8.) www.fulldownloads.us {Greatly Every thing}
Username : Af872HskL
Password : XjsdH28N
9.) www.pirateaccess.com {Every thing}
Username : yourfrienddalat@gmail.com
Password : CHh5LKPI
Username : xxx_heel_xxx@yahoo.com
Password : MJY0BUY
Username : i_l0ve_u_786@yahoo.com
Password : rYvLgPrt
Username : mubashar_siddique@yahoo.com
Password : F9Gzgwb5
10.) www.warezquality.com {Every thing}
Username : ageg2020
Password : z8fsDfg3
11.) wwww.warezreleases.com {All Stuff}
Username : HnRPxKQz
Password : a59KBV7
Username : a25bipZP
Password : 1TeVnoJb
Username : SHYyJfWU
Password : P4K20uO
12.) www.fulldownloadaccess.com {All Stuff}
Username : mpuv3y
Password : umvpy3x
13.) www.alphaload.com {All Stuff}
Username : AL3429352
Password : ykbcKTNS
Username : AL3429355
Password : RCHAbhKM
Username : AL3429350
Password : gMZNFcyS
Username : AL3429351
Password : cTAkWAxc
Username : AL3429352
Password : ykbcKTNS
14) www.gamedownloadnow.com {All Stuff}
Username : ga20me
Password : ke01feb
15.) www.unlimiteddownloadcenter.com {All Stuff}
Username : cu20me
Password : ke01feb
16.) www.tvadvanced.com {online Tv}
Username : mv03dl
Password : frmvdl


FOR MORE HACKS AND TRICKS VISIT AND LIKE US ; 
WWW.FACEBOOK.COM/HARIHACKS

Download Free AVG 9.0 Build 663.1703 Pro (Full Version For 8 Years) BY HARI


 Download Free AVG 9.0 Build 663.1703 Pro Cracked
Anti-Virus, Anti-Spyware, Anti-Spam, LinkScanner & Firewall.Comprehensive protection for your computer! This award-winning product gives you unbeatable Internet security by protecting against viruses, spyware, hackers, spam and malicious websites. AVG Internet Security is a reliable and easy-to-use solution for home and small office users which is trusted by millions of users worldwide. Unique Internet security thanks to new technology - Only AVG gives you real-time protection against malicious websites thanks to our new LinkScanner technology. Comprehensive protection for Windows against all online threats from the world's most trusted security company. Use the Internet with confidence in your home or small office.

FEATURES:

All-in-one protection
• Anti-Virus: protection against viruses, worms and trojans
• Anti-Spyware: protection against spyware, adware and identity-theft
• Anti-Rootkit: protection against hidden threats (rootkits)
• Anti-Spam: filters out unwanted and fraudulent e-mails (anti-phishing)
• Web Shield & LinkScanner: protection against malicious websites
• Firewall: protection against hackers
• System Tools: for easy system management

Easy-to-use, automated protection
Real-time protection, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time:
• All files including documents, pictures and applications
• E-mails (all major email programs like MS Outlook and Thunderbird supported)
• Instant messaging and P2P communications
• File downloads and online transactions such as shopping and banking
• Search results and any other links you click on
Download:-

LINK 1:
http://hotfile.com/dl/72717637/479968c/avg.warezfeak04_9.0.730.exe.html
LINK 2:
http://www.fileserve.com/file/kTXgvfb


FOR MORE HACKS AND TRICKS VISIT AND LIKE US 
 WWW.FACEBOOK.COM/HARIHACKS

Platinum Hide IP 3.0.2.6 (Cracked)





Use Platinum Hide IP to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more.
Key Features
• Anonymize Your Web Surfing
Your real IP is hidden when you surf on the Internet, keeping your online activity from being tracked by others.
• Protect Your Identity
Anonymous web surfing enables you to prevent identity thieves from stealing your identity or other personal information, and keep your computer safe from hacker attacks or other risks.
• Choose IP Country and Check IP
Proxy lists of many countries are enabled and you decide to select one country from the Choose IP Country window. You can check the current IP address directly.
• Send Anonymous Emails
Send anonymous emails through any web based mail system such as Gmail, Hotmail, etc.
• Get Unbanned from Forums and Blocked Websites
Change your IP address and then you can get unbanned yourself from any forums or other blocked websites that have ever banned you from.

Download From Below Mirrors
FileSonic | KeepFile | Turbobit | 

FOR MORE HACKS AND TRICKS VISIT AND LIKE US :
WWW.FACEBOOK.COM/HARIHACKS

Download Office 2010 Activation and Conversion Kit


Download Office 2010 Activation and Conversion Kit


Whats New..
* Enchanced the GUI
* Improved the Activation Success ratio
* Improved script Behaviour


or


or

Mega Hackerz Pack

Well it consists of Cryptographers, Binders, IRC Bots, RATs, Key-loggers, Exe Tools (for reverse engineering), Network Tools, Wireless Tools, and More. The difference with this pack is I haven't listed 20 programs under each section. I have picked out the best programs (in my own opinion; you also have you're own opinion) so people new to hacking won't have to pick and choose which is good and which is not. These are all very excellent programs. 

Some FUD, ALL Clean, Some FP's.


NONE of these are infected, there are things called FP's (False Positives)

Crypters

666-Ioncore
Fly Crypter 2.2 + USG 0.6
Fly Crypter 2.3 + USG 0.7

Binders

bl0b binder + usg 0.3
p4r4d0x Binder

Keyloggers

Ardamax Keylogger 3.0 + Serial
Albertino Simple Keylogger

PW Stealers

Unlimited PW Stealer v0.4
Stupid Stealer v6

IRC Bots

IMBot-HF MOD
IMBotMod V4.1
NzM 3.0
RX-120-MSN-V3
Aspergillius
NESBot v5 Stripped
uNK Stripped

Remote Administration Tools

Cerberus
Poison Ivy 3.2
Spy-Net v2.6

Wireless Tools

Cain & Abel
Wireshark
Aircrack-ng

Network Tools

Blues Port Scanner
NetTools v5
Nmap 5.21 - Windows verion
Snort 2.8.5.3 - Windows verion

Web Hacking Tools

Admin Finder
XSS Scanner
MoHackz SQL Exploiter

Exe Tools

{smart assembly} Enterprise 4.1
BinText
Dis#
OllyDbg
Resource Hacker

Miscellaneous

Mess Mania v5.0
Ex-Downloader
Metasploit 3.3.3
Visual Basic 6 Portable
Xash Undetector

75 Fake Programs

Adobe Photoshop CS4 Key Gen
Akvis Key Generator
AnonT_2
AutoDesk 3ds Max KeyGen
Avast Key Generator
Avatar The Game Key Gen
AVG Internet Security 9.0 KeyGen
Avira Premium KeyGen
Batman Arkham Asylum Key Gen
BitDefender 2010 KeyGen
Camfrog Valid KeyGen
Call Of Duty: Moder Warfare 2 Multi Keygen
Convert X to DVD
Corelx
DDoSeR 3.6
DIRT2
Dreamweaver CS4 Key Gen
Emblem FUD Crypter
Fake Steam Keygen
Fallout
FarCry2 Multi-Keygen
FIFA 2010 Key Generator
Ghost Recon Multi-Keygen
Half-Life 2 Key Generator
Kaspersky Internet Security 2009 Key Gen
Kaspersky Key Generator 2010
KasKeygenRevised
Key Generator Harry potter
Leftdead
Lord Of Rings: The Return Of King Multi-Keygen
MSDN Admin Generator
MSN SpyBox Key Generator
Multi-Hacker
Modern Warefare 2 Online Patch
Nero 8 Ultra Edition KeyGen
Nero Keygen
Netflix Activator
Ninja Blade KeyGen
Norton 2010 Key Gen
Office Key Gen
Paltalk Hack Cam Mode
Panda Security 2010 Key Generator
Paypal Money Hack
Paypal Account Verifier
Perfect Hacker Orkut Version 1.0
Perfect MSN Hacker v 2.1
Plutoniums Fake Program
Poker hack
Pro Show Gold Key Generator
Robert Pettinson Themes Generator
Rogue Warrior Key Generator
Runscape Key Gen
Ruscape Trainer Hack God Mode
Sony Vegas 9.0 Pro KeyGen
Sound Forge 9 Keys
Sound Forge 10 Key Generator
Street Fighter IV KeyGen
SuperLite Anti-virus Fixed
TeamPROXi - Website Crasher
Teamviewer Patch
The Sims 3 Key Generator
Tibia
TV
TV Movie 5.0 Online
Vengeance Keylogger 1.0
VIP Adder
Virtual DJ All Versions Keygen
Webhack
Windows 7 Keygen
Windows 7 Serial Generator
Windows XP Key Generator
Windows Activator
World of Warcraft Account Hacker
Xbox Live Account Hacker
Youtube Hack Tool

Sry guys this was a big pack & i couldn't to separate for the klg,stealers,..etc to the specific sections..hope you will understand

Download link:http://www.mediafire.com/?tedow0jjemm
 
FOR MORE HACKS AND TRICKS : WWW.FACEBOOK.COM/HARIHACKS

The best and most favorite hacking tools - free

Nmap creator conducted the survey for 100 best hacking tools against followers of nmap-hackers mailing list. Approximately 3.243 users to vote for their most favorite tools. The list of 100 favorite hacker tools can be found in www.insecured.org

From the 100 tools, The following are the 10 most favorite tools that gets the most votes. These tools are a weapon that's considered absolutely necessary in hacking and security activities.
In the package contains the most necessary programs and utilities for the hackers ot crackers,
  1. Cain and Abel [sniffer]
  2. John the Ripper (powerful brootforce)
  3. NetStumbler [allows to define radius of action of network WiFi – in real time for the diagram it is possible to see size of a useful signal]
  4. Nmap[one of the best network scanner[
  5. Putty [a quite good telnet the client]
  6. SuperScan [powerful scanner TCP of ports, pinger and hostname resolver)
  7. Hping (allows to generate special ICMP/UDP/TCP packages and to look through answers ping a host in style of the usual utility ping]
  8. Lcp [audit and restoration of passwords ]
  9. Nikto [perl the scanner broken Web a server, with support SSL]
  10. Kismet [sniffer a wireless network 802.11 and the decoder of packages]

Download top 10 hacking tools
size: 23.66 MB
Passowrd : hacker.free-7.net


FOR MORE HACKS AND TRICKS : WWW.FACEBOOK.COM/HARIHACKS

Hacking Tool Tutorials - Anti-Hacker Toolkit

Hacking Tool Tutorials, There is one ebook that should be used as a reference. This ebook titled "Anti-Hacker Toolkit [Third Edition]". In this book are described in detail how to use more than 100 "hacking tools". The explanation is technically quite easy to be understood and followed. Explains how to attack, survival, and detect the attack and overcome them (Attack & Defense).

Anti-Hacker Toolkit provides complete tutorials on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. Completely revised to include the latest security tools, including wireless tools , New tips on how to configure the recent tools on Linux, Windows, and Mac OSX New case studies in each chapter

hacking tools tutorials ebook complete guide for newbieTable of Contents

Anti-Hacker Tool Kit, Third Edition
Introduction

Part I - Multifunctional Tools
Chapter 1 - Netcat and Cryptcat
Chapter 2 - The X Window System
Chapter 3 - Virtual Machines & Emulators
Part II - Tools for Auditing and Defending the Hosts
Chapter 4 - Port Scanners
Chapter 5 - Unix Enumeration Tools
Chapter 6 - Windows Enumeration Tools
Chapter 7 - Web Hacking Tools
Chapter 8 - Password Cracking / Brute-Force Tools
Chapter 9 - Host Hardening
Chapter 10 - Backdoors and Remote Access Tools
Chapter 11 - Simple Source Auditing Tools
Chapter 12 - Combination System Auditing Tools
Part III - Tools for Auditing and Defending Your Network
Chapter 13 - Firewalls
Chapter 14 - Network Reconnaissance Tools
Chapter 15 - Port Redirection
Chapter 16 - Sniffers
Chapter 17 - Wireless Tools
Chapter 18 - War Dialers
Chapter 19 - TCP/IP Stack Tools

Part IV - Tools for Computer Forensics and Incident Response
Chapter 20 - Creating a Bootable Environment and Live Response Tool Kit
Chapter 21 - Commercial Forensic Image Tool Kits
Chapter 22 - Open-Source Forensic Duplication Tool Kits
Chapter 23 - Tool Kits to Aid in Forensic Analysis
Chapter 24 - Tools to Aid in Internet Activity Reconstruction
Chapter 25 - Generalized Editors and Viewers
Chapter 26 - Reverse Engineering Binaries

Part V - Appendixes
Appendix A - Useful Charts and Diagrams
Appendix B - Command-line Reference
How to Use the CD
List of Figures
List of Tables
List of Sidebars

Download Hacking Tools - Tutorials

Disable Social Networks From Tracking You with The Priv3 Firefox Extension

In Earlier Post we Inform our readers about "Facebook track your cookies even after logout". Did you know that social networking sites like Facebook, Google+, and Twitter can track your visits to any web page that uses the familiar "Like", "Follow", or "+1" buttons, even if you do not actually click these buttons? If you care about privacy, you must have already installed privacy addons like Ghostery, Adblock Plus, but here’s a new addition to your privacy toolkit – Priv3.

Priv3 is different from addons like Ghostery. For example, Ghostery blocks social sharing buttons (+1, Like, Tweet buttons) and other social snippets (Facebook comments, Facebook connect) completely, so you may feel disconnected.

Priv3 protects your privacy by blocking trackers, but still shows social snippets like Facebook Comments, +1, like buttons so you don’t miss any content. Once you interact with the social snippet, it reloads the cookies and tracking starts again, so unless and until you interact with the snippet, the addon keeps blocking the trackers
One thing which is too disappointing for me is that Priv3 is only available for Firefox, so all I can do is wait for a Chrome version of it. If you’re a Firefox user, check it out and also tell us what you think of it.
 

Download The Priv3 Firefox Extension

FOR MORE HACKS AND TRICKS VISIT AND LIKE US : 
WWW.FACEBOOK.COM/HARIHACKS

MAKE A GAME USING C LANGUAGE GAME (TIC-TAC-TOE GAME )


just compile thsi program using turbo c compiler 

#include #include void
Board(); void PlayerX(); void PlayerO(); void
Player_win(); void check(); int
win=0,wrong_X=0,wrong_O=0,chk=0; char name_X[30]; char
name_O[30]; int pos_for_X[3][3]; int pos_for_O[3][3];
int pos_marked[3][3]; void main() { int i,ch,j; char
ans; /* clrscr(); printf(”\n\t\t\t\tTIC TAC TOE”);
printf(”\n\t\t\t\t”); for(i=1;i<=11;i++) {
delay(10000); printf(”*”); }*/ do { clrscr();
printf(”\n\t\t\t\tTIC TAC TOE”); printf(”\n\t\t\t\t”);
for(i=1;i<=11;i++) { delay(10000); printf(”*”); }
printf(”\n1.Start The Game”); printf(”\n2.Quit The
Game”); printf(”\nEnter your choice(1-2) : “);
scanf(”%d”,&ch); switch(ch) { case 1: chk=0; win=0;
for(i=1;i<=3;i++) { for(j=1;j<=3;j++) {
pos_for_X[j]=0; pos_for_O[j]=0;
pos_marked[j]=0; } } printf(”\n\n”); clrscr();
printf(”\nEnter the name of the player playing for
\’X\’: “); fflush(stdin); gets(name_X); printf(”\nEnter
the name of the player playing for \’O\’: “);
fflush(stdin); gets(name_O); Board(); for(;{
if(win==1) break; check(); if(chk==9) {
printf(”\n\t\t\tMATCH DRAWS!!”); printf(”\nPress any
key….”); break; } else chk=0; printf(”\nTURN FOR
%s:”,name_X); PlayerX(); do { if(wrong_X!=1) break;
wrong_X=0; printf(”\nTURN FOR %s:”,name_X); PlayerX();
}while(wrong_X==1); check(); if(chk==9) {
printf(”\n\t\t\tMATCH DRAWS”); printf(”\nPress any
key….”); break; } else chk=0; printf(”\nTURN FOR
%s:”,name_O); PlayerO(); do { if(wrong_O!=1) break;
wrong_O=0; printf(”\nTURN FOR %s:”,name_O); PlayerO();
}while(wrong_O==1); } Board(); if(win!=1) {
printf(”\n\t\t\tMATCH DRAWS!!”); printf(”\nPress any
key…….”); } getch(); break; case 2:
printf(”\n\n\n\t\t\tThank You For Playing The Game.”);
printf(”\n\t\t\t###############################”);
getch(); exit(1); break; } printf(”\nWant To Play(Y/N) ?
“); fflush(stdin); scanf(”%c”,&ans); }while(ans==’y’
|| ans==’Y'); } void Board() { int i,j; clrscr();
printf(”\n\t\t\t\tTIC TAC TOE BOARD”);
printf(”\n\t\t\t\t*****************”); printf(”\n\n\n”);
printf(”\n\t\t\t 1\t 2\t 3
); for(i=1;i<=3;i++) {
printf(”\n \t\t\t _____________________________”);
printf(”\n \t\t\tº\t º\t º\t º”);
printf(”\n\t\t%d\t”,i); for(j=1;j<=3;j++) {
if(pos_for_X[j]==1) { printf(” X”); printf(” “); }
else if(pos_for_O[j]==1) { printf(” O”); printf(” “);
} else { printf(” “); continue; } } printf(”\n\t\t\tº\t
º\t º\t º”); }
printf(”\n\t\t\t——————————”);
Player_win(); } void PlayerX() { int row,col; if(win==1)
return; printf(”\nEnter the row no. : “); fflush(stdin);
scanf(”%d”,&row); printf(”Enter the column no. : “);
fflush(stdin); scanf(”%d”,&col);
if(pos_marked[row][col]==1 || row3 ||
col3) { printf(”\nWRONG POSITION!! Press
any key…..”); wrong_X=1; getch(); Board(); } else {
pos_for_X[row][col]=1; pos_marked[row][col]=1; Board();
} } void PlayerO() { int row,col; if(win==1) return;
printf(”\nEnter the row no. : “); scanf(”%d”,&row);
printf(”Enter the column no. : “); scanf(”%d”,&col);
if(pos_marked[row][col]==1 || row3 ||
col3) { printf(”\nWRONG POSITION!! Press
any key….”); wrong_O=1; getch(); Board(); } else {
pos_for_O[row][col]=1; pos_marked[row][col]=1; Board();
} } void Player_win() { int i; for(i=1;i<=3;i++) {
if(pos_for_X[1]==1 && pos_for_X[2]==1
&& pos_for_X[3]==1) { win=1;
printf(”\n\nRESULT: %s wins!!”,name_X); printf(”\nPress
any key…………”); return; } } for(i=1;i<=3;i++)
{ if(pos_for_X[1]==1 && pos_for_X[2]==1
&& pos_for_X[3]==1) { win=1;
printf(”\n\nRESULT: %s wins!!”,name_X); printf(”\nPress
any key…………”); return; } } if(pos_for_X[1][1]==1
&& pos_for_X[2][2]==1 &&
pos_for_X[3][3]==1) { win=1; printf(”\n\nRESULTL: %s
wins!!”,name_X); printf(”\nPress any key……”);
return; } else if(pos_for_X[1][3]==1 &&
pos_for_X[2][2]==1 && pos_for_X[3][1]==1) {
win=1; printf(”\n\nRESULT: %s wins!!”,name_X);
printf(”\nPress any key…..”); return; }
for(i=1;i<=3;i++) { if(pos_for_O[1]==1 &&
pos_for_O[2]==1 && pos_for_O[3]==1) {
win=1; printf(”\n\nRESULT: %s wins!!”,name_O);
printf(”\nPress any key…..”); return; } }
for(i=1;i<=3;i++) { if(pos_for_O[1]==1 &&
pos_for_O[2]==1 && pos_for_O[3]==1) {
win=1; printf(”\n\nRESULT: %s wins!!”,name_O);
printf(”\nPress any key…..”); return; } }
if(pos_for_O[1][1]==1 && pos_for_O[2][2]==1
&& pos_for_O[3][3]==1) { win=1;
printf(”\n\nRESULT: %s wins!!”,name_O); printf(”\nPress
any key…..”); return; } else if(pos_for_O[1][3]==1
&& pos_for_O[2][2]==1 &&
pos_for_O[3][1]==1) { win=1; printf(”\n\nRESULT: %s
wins!!”,name_O); printf(”\nPress any key…..”); return;
} } void check() { int i,j; for(i=1;i<=3;i++) {
for(j=1;j<=3;j++) { if(pos_marked[j]==1) chk++;
else continue; } } }