Archive for the ‘Uncategorized’ Category

Please Rob Me


Please Rob Me is a website that lists updates on Twitter and Foursquare from people who are telling they world that they are not at home. The goal of the website is to raise awareness of the risks of posting these kinds of updates.

Hey, do you have a Twitter account? Have you ever noticed those messages in which people tell you where they are? Pretty annoying, eh. Well, they’re actually also potentially pretty dangerous. We’re about to tell you why.

Don’t get us wrong, we love the whole location-aware thing. The information is very interesting and can be used to create some pretty awesome applications. However, the way in which people are stimulated to participate in sharing this information, is less awesome. Services like Foursquare allow you to fulfill some primeval urge to colonize the planet. A part of that is letting everyone know you own that specific spot. You get to tell where you are and if you’re there first, it’s yours. O, and of course there’s badges..


The danger is publicly telling people where you are. This is because it leaves one place you’re definitely not… home. So here we are; on one end we’re leaving lights on when we’re going on a holiday, and on the other we’re telling everybody on the internet we’re not home. It gets even worse if you have “friends” who want to colonize your house. That means they have to enter your address, to tell everyone where they are. Your address.. on the internet.. Now you know what to do when people reach for their phone as soon as they enter your home. That’s right, slap them across the face.

The goal of this website is to raise some awareness on this issue and have people think about how they use services like Foursquare, Brightkite, Google Buzz etc. Because all this site is, is a dressed up Twitter search page. Everybody can get this information.

How to Open a Mobile Phone Using Super Bluetooth

How to open your friends mobile phone and make calls/send SMS using the mobile phone. In this article I will show you how to open mobile phone with simple software called Super Bluetooth  v.1.8. This is a new version of Super Bluetooth for conventional and mobile-based simbian. If you do not know what is a Super Bluetooth , this program through MDM can be used to control other people’s mobile phone. You can control and read information from remote phone via bluetooth or infra, call from phone, read messages & contacts, change profile, restart phone, etc.

Once connected to a another phone via bluetooth you can:

  • read his messages
  • read his contacts
  • change profile
  • play his ringtone even if phone is on silent
  • play his songs(in his phone)
  • restart the phone
  • switch off the phone
  • restore factory settings
  • change ringing volume
  • And here comes the best, “Call from his phone” it includes all call functions like hold etc.
  • And much much more …

How to install:

  1. Download the Super Bluetooth
  2. Unzip the file and send it to your mobile phone.
  3. Install the software in your mobile phone.
  4. Inquire new devices through the software.
  5. When connecting devices use a code 0000
Super Bluetooth 

With the program you can do things on the other phone such as:
- read SMS messages
- read contacts
- change profile
- play ringtone (even if phone is on silent)
- play songs
- restart the phone
- turn off the phone
- restore factory settings
- change ringing volume
- call from the other phone (it includes all call functions like hold etc.)

1.) When connecting devices use the code 0000
2.) At start of programm on smartphones do not forget to turn on bluetooth before start of the application
3.) You have to download the file with Firefox, because Internet Explorer makes it a .zip file. If you don't want to download Firefox, you have to change the extension of the file from ".zip" to ".jar".

If you downloaded the file as a ".zip" file, here is explained how to change it to a ".jar" file:
With Windows:
1. Go to Start - Computer
2. In the menubar, go to: Tools - Folder Options... (With Windows Vista, you have to push the "Alt" key before you can see the "Tools" menu)
3. Go to "View", and than deselect the mark from "Hide extentions for known file types".
4. Then search for your "" file. Now change the last part from ".zip" to ".jar", and confirm it.
5. Now you can send it to your phone and open it.

Installation instructions for a Sony Ericsson using a USB cable:
1. Connect your phone with your computer.
2. It mounts as a disk.
3. Drag the file that you have just downloaded (SuperBluetooth_v108.jar) to /MSSEMC/Media files/other/ on that disk (=your phone).
4. Disconnect the USB cable from your phone.
5. Go to the folder "Other" on your phone.
6. There is the application. Select it and click "Install".
7. The program is installed on the place you specified. Most likely it's the Applications folder.

Change the language to English:
If the software starts with the language "Slovencina", you can change it to English on this way:
1.If you start the application for the first time you see "Nastavenia" in the title.
2. Go a bit down until you see "Jazyk".
3. Click choose.
4. Select "English".
5. Click "More".
6. Click "Spat".
7. Now the program is in English.

Ransomware, a lucrative online crime, expands in the U.S.

Kidnappers used to make ransom notes with letters cut out of magazines.  Now, notes simply pop up on your computer screen, except the hostage is your PC. In the past year, hundreds of thousands of people across the world have switched on their computers to find distressing messages alerting them that they no longer have access to their PCs or any of the files on them.  The messages claim to be from the Federal Bureau of Investigation, some 20 other law enforcement agencies across the globe or, most recently, Anonymous, a shadowy group of hackers.  The computer users are told that the only way to get their machines back is to pay a steep fine.And, curiously, it’s working.  The scheme is making more than $5 million a year, according to computer security experts who are tracking them.  The scourge dates to 2009 in Eastern Europe.  Three years later, with business booming, the perpetrators have moved west.  Security experts say that there are now more than 16 gangs of sophisticated criminals extorting millions from victims across Europe.

New scam

The threat, known as ransomware, recently hit the United States.  Some gangs have abandoned previously lucrative schemes, like fake antivirus scams and banking trojans, to focus on ransomware full time.  Essentially online extortion, ransomware involves infecting a user’s computer with a virus that locks it.  The attackers demand money before the computer will be unlocked, but once the money is paid, they rarely unlock it.  In the vast majority of cases, victims do not regain access to their computer unless they hire a computer technician to remove the virus manually.  And even then, they risk losing all files and data because the best way to remove the virus is to wipe the computer clean.  It may be hard to fathom why anyone would agree to fork over hundreds of dollars to a demanding stranger, but security researchers estimate that 2.9 percent of compromised computer owners take the bait and pay. That, they say, is an extremely conservative estimate. In some countries, the payout rate has been as high as 15 percent. That people do fall for it is a testament to criminals’ increasingly targeted and inventive methods. Early variations of ransomware locked computers, displayed images of pornography and, in Russian, demanded a fee — often more than $400 — to have it removed. Current variants are more targeted and toy with victims’ consciences. Researchers say criminals now use victims’ Internet addresses to customize ransom notes in their native tongue.

Fake FBI messages

Instead of pornographic images, criminals flash messages from local law enforcement agencies accusing them of visiting illegal pornography, gambling or piracy sites and demand they pay a fine to unlock their computer. Victims in the United States see messages in English purporting to be from the FBI or Justice Department.  In the Netherlands, people get a similar message, in Dutch, from the local police. (Some Irish variations even demand money in Gaelic.) The latest variants speak to victims through recorded audio messages that tell users that if they do not pay within 48 hours, they will face criminal charges.  Some even show footage from a computer’s webcam to give the illusion that law enforcement is watching.  The messages often demand that victims buy a preloaded debit card that can be purchased at a local drugstore — and enter the PIN. That way it’s impossible for victims to cancel the transaction once it becomes clear that criminals have no intention of unlocking their PC.  The hunt is on to find these gangs.  Researchers at Symantec said they had identified 16 ransomware gangs.  They tracked one gang that tried to infect more than 500,000 PCs over an 18-day period.  But even if researchers can track their Internet addresses, catching and convicting those responsible can be difficult.  It requires cooperation among global law enforcement, and such criminals are skilled at destroying evidence.

Gullible victims

Charlie Hurel, an independent security researcher based in France, was able to hack into one group’s computers to discover just how gullible their victims could be. On one day last month, the criminals’ accounting showed that they were able to infect 18,941 computers, 93 percent of all attempts.  Of those who received a ransom message that day, 15 percent paid.  In most cases, Hurel said, hackers demanded 100 euros, making their haul for one day’s work more than $400,000.  That is significantly more than hackers were making from fake antivirus schemes a few years ago, when so-called “scareware” was at its peak and criminals could make as much as $158,000 in one week. Scareware dropped significantly last year after a global clampdown by law enforcement and private security researchers. Internecine war between scareware gangs put the final nail in the coffin.  As Russian criminal networks started fighting for a smaller share of profits, they tried to take each other out with denial of service attacks. Now, security researchers are finding that some of the same criminals who closed down scareware operations as recently as a year ago are back deploying ransomware. “Things went quiet,” said Eric Chien, a researcher at Symantec who has been tracking ransomware scams.  “Now we are seeing a sudden ramp-up of ransomware using similar methods.”

Porn sites

Victims become infected in many ways.  In most cases, people visit compromised Web sites that download the program to their machines without so much as a click. Criminals have a penchant for infecting pornography sites because it makes their law enforcement threats more credible and because embarrassing people who were looking at pornography makes them more likely to pay.  Symantec’s researchers say there is also evidence that they are paying advertisers on sex-based sites to feature malicious links that download ransomware onto victims’ machines.  “As opposed to fooling you, criminals are now bullying users into paying them by pretending the cops are banging down their doors,” said Kevin Haley, Symantec’s director of security response.

How To View Hidden Directories In A Website Using Robots.txt

glider hacker emblem

How To View Hidden Directories In A Website Using Robots.txt

Many a times in hacking you need to know the web directories. But its hard to find it out as a server might contain uncountable no. of Directories in it.
But a major hole in this security is the Robots.txt
What is Robots.txt

Robot.txt is the file in the [ wwwroot ]of a server to define the Bots the Functionality on the website.

There are many Bots on the internet like the most famous are Google Search Engine BOT aka Google Spider , Yahoo Search Engine Bot and many others.
What robots.txt do is that it gives orders to the Bot on how to spider on the website….

Now you may ask what’s the use of Robots.txt file.
Well it is used by webmasters to add functionality to the upcoming bots on there website and also to hide the directories in the website and where the Bot should not go and spider.

Analyzing Robots.txt For Hacking Stuff

Well its really simple, the first question you would ask is Where is robots.txt Located ?
The answer is its in the [ WWWROOT ].

Don’t Understand till yet , its in the main Directory.
Lets take the example of Hacker The Dude Website ;)

Go Ahead and type it in the Address bar of your Browser then what do you see,


Do you see that , this is the Robots.txt for the Hacker the dude website Now lets first Analyze this Robots.txt

First Line :-
User-agent: Mediapartners-Google

This means that the above statements are given for the Google Search Engine Bot i.e. Google Spider.

Second Line :-

This mean that nothing is disallowed to the Google Bot, Remember these Orders are given to the Google bot only not other bots.

Third Line :-
User-agent: *

This means that now all the bots coming to the blog will follow these rules.note that previous rules were for only Google Bot.

Fourth Line :-
Disallow: /search

This means that all the bots will not spider the files under the directory /search in the following Blog.

Fifth Line :-

This is basically my blogs sitemap. Not very important.

Working Demo

Now lets test Robots.txt files of various well known websites.

1. Mine Favorite = Google !!


Now you would see some very useful links in it for example, in termas of the hacking its very useful to know more about our Victim.
Allow: /profiles
Disallow: /katrina?
Disallow: /tbproxy/

Hell, Google Knows Katrina Kaif :D


Now that you have seen the working demo and the uses and the read the whole article then you would be pretty sure on how we are going to find the vulnerability in a website without even first hacking it.

btw I Love Robos.txt

Welcome to

Return top

What is the

The is a website dedicated to alternative Hacker culture and underground technology. focus on black hat, news, software and developments in the insider world of hackers. HiddenSpider is about and for the rebels and anarchists of the new digital frontier.