Learn about bypassing computer or server security features to learn about how computer settings and philters work, and useful tips on new programs, tweaks, and easy tricks unknown to most people.

WARNING: This blog is for EDUCATIONAL PURPOSES ONLY. I am making this site for the use of identifying popular and un-popular security flaws in servers and to help people be more responsible with their computers.

Home      Help Section    Chat group    Video Tutorials      Downloads

Thursday, June 14, 2012

bl4ck1ist Hacker Panel

Version 1 of bl4ck1ist Hacker Panel is finally finished. The program contains many hacking tools, (Nmap, Wireshark, HOIC 2.1, Putty, TOR Browser, Cain and Abel, Brutus, Angry IP Scanner, My custom temporary keylogger and IP Tracer, and Konboot) all installed into one program. They all work without installing each one. It also comes with python, and there is a bug where the program might not open automatically with python, if it doesn't, just go into Program Files/The Hacker Panel and right click "The Hacker.py" and press open with python from the python27 folder. The GUI is very simple because this is only version 1 so the actual interface is the last thing I'm worrying about, because it took a while to get programs like Cain and Abel to work without custom installation, and tweaking the installation to not mess anything up. The download is available in the Downloads section of the website. Anyway, here is a screenshot:
If you have any suggestions, bugs, or comments please either comment on this post or email us at youcangethrough@gmail.com Thanks, bl4ck1ist

Monday, May 28, 2012

How to open full screen command prompt in Windows Vista or 7.


Windows Command Prompt. The terminal that 90% of hacker newbies use to make themselves look cool in front of their friends. Although it is not actually that useful for hacking, it still has features which were not implemented into the Windows Vista and 7 GUI's (Graphical User Interfaces.) So now for the english part :D.
This will be a step-by-step guide on how to open cmd full screen on Windows Vista or 7.

Step 1: Go into command prompt.
(If you don't know how to do this then please take a beginning computers class or read a book)

Step 2: Right click on the Tool Bar like this:
















Step 3: Click properties, and in the menu, check "Quick Edit Mode"


























Step 4: Now press OK and type in wmic in the command prompt.







Step 5: After you have done this you can now drag the edges of the cmd window to be as big as you would like or fullscreen.
Note: You still cannot get a windowless version, so you can only make it fullscreen to a point.

Step 6: IMPORTANT: Before you close out the command prompt window, right click the toolbar again, select properties, and turn off Quick Edit Mode. Now close out the window and re-open it. Make sure you are opening it from the same shortcut, or else you will not be opening the one you just edited.

Now you should have a full screen command prompt. I hope this helped, and if you have any questions throw me a comment. Also remember to request posts by commenting or emailing youcangethrough@gmail.com

Thanks,
Admin

Tuesday, May 22, 2012

How to find and track someones IP address

How to use simple methods to get and find the location of somebodies IP
(internet protocol address)


WARNING: This post is strictly for educational purposes only. Tracking somebodies IP address is illegal and can seriously scare somebody. I am not responsible for anything you might do with this information, for the purpose of this tutorial is to show you how easily you can be tracked by being gullible on the internet.


Okay, so now that you have read the warning, here is how it's done, in a step-by-step process.

Step 1: Download my simple toolkit below containing an IP Tracer and a text file containing a URL.
Click HERE


Step 2: Open up the IP Tracer and the ipget text file. In the ipget file, there is a link. At the end of the link it says pic_id=, so after it put a long number, like pic_id=2947293. Now copy the entire URL. So you should have https://ayra.ch/temp_page/picture_upload.asp?pic_id=2947293, except with your number at the end instead of mine.

Step 4: Now you would need a victim. Since we are not doing this to an actual person we will use a proxy, (proxies are explained in this link to disguise are IP through one browser window while it remains the same on another. To do this, go to proxify.com, and in the URL box paste the link. What should come up is a white screen with the message "Picture has ben deleted." This is a fake error message to trick the victim into thinking the picture was deleted, when really the link just copied his IP.

Step 5: Now, you can close out that window, and open a new one. Type the same URL into it. What should come up is this:
This Ip that it shows is your IP address through the proxy, which is fake. But since most people don't use proxies while browsing, this would show you their real IP.

Step 6: To look up their IP, you can either use the button that is displayed, or you can be cool and use my IP tracer that came in the ZIP file. To use that just open up IP Tracer and type in the IP when prompted. It will then open up a map with the IP's location pinned to it, and it will show you all retrievable information.

Thanks for reading, and I hope it helped. Also, feel free to visit my YouTube channel bl4ck1ist.
Also, don't forget to request How To posts to learn how to do something that you want to find out. Tell your friends and everyone to visit this site too if you like it.
Thanks,
bl4ck1ist

Saturday, May 19, 2012

How to Use a Proxy

Proxies are the most popular and convenient way to remain anonymous on the web. It is used by even the most tech savvy users to not show their IP address. So I'm now going to give you a lesson on how to use them. The first thing you have to know is the proxy website, first of all. So I'll give you the URL http://www.proxify.com/
So that makes step 1,

Step 1: Go to Proxify or proxy of your choice.

Step 2: Select your options. This is what the options do. (There is also a picture below)
Remove all cookies: Prevents websites from storing cookies (click to read about cookies) on your computer.
Remove all scripts: Prevents website from showing scripts (disables javascript). In other words, if you check it you can't play games or watch youtube or any videos. This is done so that the website can't do anything unwanted to your computer through javascript, since most viruses come from it.
Remove ads: Just removes advertisements, simple as that. If you are questioning what ads are take a begginers computer class :)
Hide refferer information: (click for more info) Dis-allows the website to see what redirected you to theirs. Useful if you don't want something to know what website you were on when you clicked the link to theirs.
Text only: Only shows you text on all website visited through the proxy. In other words, no pictures, games, videos, or colorful stuff :)
Show URL entry form: (locked, you cannot disable this function) Shows you the URL on the address bar.
Remove Page Titles: (locked) Doesn't allow you to show the title of the page on your browser tab.
Minimize Caching: (locked) Pretty much useless. When selected, it will prevent caching of any resource recieved.
Hide useragent: Doesn't allow websites to view your browser information or system info.
Hex encode URL's: Hides what URL you went to from the computer basically. This is useful when trying to get through a firewall at work or school (educational purposes only).
Step 3: Now you can search whatever you want with the selected options. You are now immune to web filters also. Your IP is also hidden, so most people will not be able to find your real one. Be aware that if your on a computer which has a firewall that block proxify.com, use one of the other thousands of proxies online. Or just search them on this link: http://www.newestproxies.com/
Now, if you want to install Tor, you can browse anonymously through the browser that comes with it. With Tor it is even harder to track your IP address and you can browse freely without having to type in URL's to the proxy.

Notes: 
Going through a proxy does not guarantee your IP is untrackable. Many professionals can easily track an IP through a proxy. If you are concerned about being completely untrackable, try going through multiple proxies. You can do this by typing in the URL of another proxy into the first one.

When using a proxy, you cannot use Flash Player for security reasons. This is mainly because you can be tracked through your proxies while using flash.

If you enjoyed this post or it helped you out, please consider putting the add on our sidebar onto your site by clicking copy widget code. Thanks,
Admin

Wednesday, May 16, 2012

How to access blocked Local Disk C:

Local Disk C. The Directory for windows. With access to this you can view important files like Users, System32, Program Files, and more. Although it is easy to block the file and set it as administrator only, there all still links built into Windows that will allow you to view the Local Disk. Doing this is actually a simple two step process.

Step 1: Click on any program on your desktop.

Step 2: Right click, and press "Open File Location"

That's it, your in. Windows isn't always as smart as it's made out to be.
-Admin

How to open cmd when it is blocked.

On many systems and servers, administrators block the command prompt. Doing this can work for many, but there are always other ways of getting to something on a computer. Here is an easy step by step guide on how to open the cmd on a blocked computer.

Step 1: Find a place where you want to store your new command prompt. Like a folder, your desktop, your network directory, or wherever you would like.

2: Open up notepad and type in: command

3: Then go to File>Save As and type in cmd.bat as the name, and in the drop down box where it says text file, click it and select All File Types. Then press save.

Now when you open the file it will give you a fully featured command prompt. This should work on all systems and servers.
Thanks,
Admin


Tuesday, May 15, 2012

Welcome to Bypass it Now!

This blog will be about the different methods of getting around computer and internet restrictions at work or school, and finding and fixing bugs in the system. We will discuss how to do things like: access the blocked command prompt, create a god mode folder, use proxies, make batch files, and more. If you have any requests on posts, email us at youcangethrough@gmail.com!
Thanks,
Admin