130.132.236.91:1127
173.2.234.51:1120
173.48.93.3:1933
173.59.2.116:1777
173.77.250.97:1351
173.80.6.227:1815
18.125.1.205:1955
207.144.227.84:1225
220.162.14.114:1080
221.1.65.21:1080
24.131.126.30:1896
24.131.126.30:21421
24.187.50.50:1614
24.210.33.87:1201
24.210.33.87:4577
24.23.66.9:1142
24.60.53.96:17459
24.61.25.123:1861
24.62.113.210:1161
58.221.247.3:6543
60.191.232.59:1080
64.60.249.69:1080
66.165.177.131:18613
66.165.177.139:4495
67.164.169.103:39907
67.167.251.137:1396
68.115.170.182:1052
68.52.169.63:1734
68.81.200.72:1073
68.98.139.59:1545
69.124.162.46:1277
69.195.207.231:26083
69.42.126.105:48615
71.178.181.45:1929
71.195.57.169:7329
71.199.234.98:27289
71.203.196.6:1385
71.207.171.138:1296
71.236.32.222:1613
71.238.32.52:1143
71.241.146.196:1252
71.61.90.137:1685
72.178.5.71:1616
72.218.188.57:1879
75.138.144.140:1908
75.68.98.107:1276
75.76.136.38:1174
76.113.51.30:20657
76.18.213.15:1582
76.87.29.175:1380
76.99.247.27:1452
8.7.216.138:1080
80.91.193.221:55558
81.82.88.140:34261
96.237.109.123:1116
96.253.123.85:1866
96.27.95.201:24475
98.222.126.111:1063
98.229.168.162:1569
98.229.213.149:29335
98.254.20.226:1424
108.16.17.98:1355
108.20.70.3:1885
130.132.236.91:1127
130.132.46.156:1143
173.168.147.2:36351
173.48.16.6:1192
173.48.93.3:1933
173.49.226.204:1931
173.58.158.27:1551
173.69.141.70:1727
174.108.120.102:8710
174.45.197.99:17469
174.61.26.193:29211
184.59.128.84:6623
207.237.65.3:1307
218.93.210.3:1080
221.2.112.131:1080
24.0.82.254:12107
24.12.210.139:1904
24.127.62.24:56777
24.13.125.182:2003
24.185.0.8:1117
24.185.38.78:1889
24.188.33.224:1236
24.214.171.155:1971
24.47.4.209:1214
24.6.195.194:1644
24.62.112.140:1922
24.90.251.159:1914
59.52.26.195:1080
60.191.232.59:1080
64.33.235.75:42375
65.117.128.202:1080
65.15.241.134:1080
67.186.160.34:1760
67.191.205.202:1794
67.253.215.250:1399
67.81.56.122:1680
68.118.93.247:1950
68.179.152.31:1022
68.197.184.216:1644
68.38.127.74:1708
68.43.88.207:1502
68.80.165.202:1323
68.81.200.72:1073
69.140.128.106:1988
69.195.207.232:5569
69.42.126.104:55255
69.42.126.106:6703
71.137.242.80:53309
71.167.112.163:1607
71.182.143.191:1031
71.203.196.6:1385
71.238.40.97:6997
74.107.93.24:1050
74.139.5.211:1429
74.89.157.112:1454
74.97.48.228:1887
75.129.146.145:1147
75.65.212.37:9649
75.65.99.107:14745
75.76.136.38:1174
76.115.177.184:1644
93.167.245.178:9100
96.224.219.84:1507
96.237.109.123:1116
96.237.176.37:1343
96.238.25.150:2017
96.244.41.214:1644
96.244.5.196:1421
96.27.95.201:1791
98.207.75.152:53251
Happy New Year
vip socks daily update 21-07-2011
9415 htttp daily update 21-07-2011
110.16.3.12:9415
110.182.85.67:9415
110.204.28.149:9415
110.253.61.142:9415
110.254.4.17:9415
111.165.148.193:9415
111.165.228.92:9415
111.240.30.9:9415
111.254.1.36:9415
111.255.103.41:9415
112.239.54.87:9415
113.224.178.113:9415
113.228.227.223:9415
113.232.209.134:9415
113.254.22.251:9415
113.255.173.184:9415
113.3.125.220:9415
113.4.253.205:9415
113.56.150.9:9415
114.44.142.77:9415
114.91.191.253:9415
114.92.132.123:9415
114.96.40.41:9415
115.208.158.189:9415
116.113.151.222:9415
116.217.7.209:9415
116.49.63.99:9415
116.5.95.53:9415
118.160.18.1:9415
119.108.185.35:9415
119.109.127.181:9415
119.109.34.27:9415
119.109.45.130:9415
119.115.199.3:9415
119.119.227.78:9415
119.185.67.178:9415
120.4.181.60:9415
121.19.114.140:9415
122.123.161.34:9415
122.140.113.220:9415
122.237.35.133:9415
122.51.73.146:9415
122.66.77.179:9415
122.84.35.102:9415
122.85.173.127:9415
122.87.100.233:9415
123.113.107.56:9415
123.115.183.229:9415
123.119.167.62:9415
123.123.196.187:9415
123.123.49.21:9415
123.139.206.226:9415
123.179.178.63:9415
123.185.165.79:9415
123.185.235.3:9415
123.187.157.103:9415
123.191.18.7:9415
123.68.151.254:9415
124.128.127.41:9415
125.113.37.193:9415
125.31.237.227:9415
180.152.97.72:9415
203.218.175.54:9415
218.59.193.212:9415
219.128.72.121:9415
220.131.42.219:9415
221.11.15.244:9415
221.205.242.162:9415
221.207.175.44:9415
221.216.250.159:9415
58.255.233.195:9415
58.33.9.138:9415
58.41.142.90:9415
59.113.69.106:9415
59.117.125.197:9415
61.216.16.229:9415
61.58.66.27:9415
9415 http vip daily 20-07-2011
111.126.81.253:9415
111.167.15.147:9415
111.167.159.96:9415
111.193.189.54:9415
112.227.98.145:9415
113.118.229.21:9415
113.13.198.129:9415
113.252.72.170:9415
113.7.240.13:9415
114.243.100.169:9415
114.41.29.240:9415
114.92.94.74:9415
115.152.138.189:9415
116.217.10.48:9415
116.227.84.10:9415
116.238.69.97:9415
116.27.101.21:9415
116.5.99.71:9415
117.33.138.59:9415
117.68.38.158:9415
118.116.80.137:9415
118.166.171.47:9415
118.170.122.106:9415
118.212.121.110:9415
118.73.142.242:9415
118.81.96.85:9415
119.0.132.115:9415
119.115.181.7:9415
119.115.251.83:9415
119.128.164.2:9415
119.131.181.212:9415
119.176.71.192:9415
119.185.162.223:9415
119.48.173.190:9415
120.2.205.99:9415
121.16.50.3:9415
121.27.133.195:9415
121.56.124.114:9415
121.9.45.127:9415
122.118.76.55:9415
122.122.218.71:9415
122.126.160.206:9415
122.136.145.253:9415
122.137.43.205:9415
122.237.205.213:9415
122.67.138.166:9415
122.71.230.121:9415
122.81.168.132:9415
122.82.121.217:9415
122.84.105.154:9415
122.84.42.232:9415
122.85.246.29:9415
123.110.0.210:9415
123.113.37.36:9415
123.118.158.111:9415
123.121.236.20:9415
123.121.3.87:9415
123.149.228.86:9415
123.240.73.6:9415
123.69.42.236:9415
123.69.83.38:9415
123.84.126.184:9415
123.85.35.142:9415
123.91.193.173:9415
123.91.42.10:9415
123.92.104.126:9415
124.128.126.100:9415
124.64.3.109:9415
125.121.74.137:9415
125.225.32.242:9415
125.233.150.164:9415
180.94.180.210:9415
218.103.155.102:9415
218.168.221.141:9415
218.250.85.21:9415
218.67.215.82:9415
219.73.21.152:9415
219.77.70.138:9415
219.77.72.164:9415
220.246.182.215:9415
221.174.234.160:9415
221.219.16.121:9415
58.152.128.167:9415
58.240.14.116:9415
58.34.65.51:9415
59.34.153.162:9415
59.53.6.24:9415
61.140.145.35:9415
61.145.27.236:9415
61.179.71.139:9415
61.216.5.2:9415
61.228.244.101:9415
61.231.180.190:9415
80 8080 port http vip update 20-07-2011
109.104.89.117:80
109.104.89.118:80
109.123.75.192:80
109.230.245.167:80
109.235.49.143:80
110.138.184.164:80
110.138.208.7:80
110.74.222.35:80
111.171.217.166:80
111.68.125.154:80
114.130.28.82:80
114.255.171.231:80
114.30.47.10:80
115.124.75.38:80
115.236.98.109:80
115.85.71.178:80
116.205.127.43:80
118.129.154.47:80
118.219.55.138:80
118.96.151.110:80
118.96.94.45:80
118.97.191.66:80
118.97.193.58:80
118.97.42.162:80
118.98.168.83:80
118.98.31.5:80
119.110.87.218:80
119.161.238.90:80
119.235.53.130:80
119.235.53.131:80
120.136.21.131:80
120.29.157.46:80
121.204.0.2:80
122.116.40.253:80
122.155.13.17:80
122.155.13.18:80
122.155.13.20:80
122.155.13.78:80
122.193.109.114:80
122.193.109.118:80
122.193.109.119:80
122.193.109.120:80
122.225.98.230:80
122.48.31.73:80
122.48.31.74:80
122.48.31.75:80
122.48.31.76:80
122.48.31.77:80
122.70.153.17:80
122.72.0.25:80
122.72.1.131:80
122.72.10.201:80
122.72.10.204:80
122.72.12.86:80
122.72.12.87:80
122.72.12.88:80
122.72.12.89:80
122.72.12.90:80
122.72.20.218:80
122.72.20.222:80
122.72.20.223:80
122.72.20.224:80
122.72.21.145:80
122.72.21.151:80
122.72.24.23:80
122.72.24.24:80
122.72.25.46:80
122.72.25.73:80
122.72.26.199:80
122.72.26.208:80
122.72.28.10:80
122.72.28.19:80
122.72.33.138:80
122.72.33.139:80
123.125.156.92:80
124.14.10.104:80
124.193.109.13:80
124.193.109.14:80
124.193.109.15:80
124.193.109.16:80
124.193.109.17:80
125.161.162.3:80
125.162.92.234:80
125.163.192.184:80
125.163.49.230:80
125.210.188.36:80
134.37.254.27:80
141.2.205.2:80
159.148.29.156:80
159.226.251.180:80
161.149.40.47:80
161.74.11.25:80
164.125.32.36:80
173.203.56.151:80
173.203.57.81:80
174.129.191.255:80
174.142.125.161:80
178.162.191.75:80
178.32.97.209:80
180.241.88.203:80
180.241.98.153:80
180.243.183.239:80
180.247.4.194:80
182.23.48.106:80
182.48.43.12:80
184.72.4.146:80
184.73.120.223:80
187.103.44.56:80
203.122.223.237:80
205.129.191.162:80
209.88.88.40:80
211.75.91.10:80
217.219.115.138:80
63.236.72.238:80
67.192.253.140:80
67.202.36.245:80
69.94.104.141:80
101.50.17.25:8080
103.3.47.34:8080
103.3.47.36:8080
109.121.200.93:8080
109.205.115.234:8080
110.136.110.227:8080
110.136.148.199:8080
110.136.203.215:8080
110.136.222.101:8080
110.136.238.24:8080
110.137.36.179:8080
110.137.40.102:8080
110.137.84.26:8080
110.138.109.182:8080
110.138.181.207:8080
110.138.194.153:8080
110.138.208.7:8080
110.138.51.76:8080
110.139.100.247:8080
110.139.205.145:8080
110.139.57.63:8080
110.74.222.35:8080
111.67.75.242:8080
111.68.100.8:8080
114.129.100.33:8080
114.129.100.45:8080
114.129.100.46:8080
114.129.100.51:8080
114.129.100.52:8080
114.129.100.55:8080
114.129.100.5:8080
114.129.100.74:8080
114.129.100.77:8080
114.129.100.80:8080
114.129.100.86:8080
114.129.100.99:8080
114.129.97.101:8080
114.129.97.102:8080
114.129.97.109:8080
114.129.97.110:8080
114.129.97.116:8080
114.129.97.123:8080
114.129.97.136:8080
114.129.97.223:8080
114.129.97.229:8080
114.129.97.237:8080
114.129.97.253:8080
114.129.97.49:8080
114.129.97.51:8080
114.129.97.54:8080
114.129.97.61:8080
114.129.97.62:8080
114.129.97.64:8080
114.129.97.66:8080
114.129.97.70:8080
114.129.97.89:8080
114.129.98.108:8080
114.129.98.10:8080
114.129.98.113:8080
114.129.98.120:8080
114.129.98.122:8080
114.129.98.132:8080
114.129.98.138:8080
114.129.98.141:8080
114.129.98.142:8080
114.129.98.145:8080
114.129.98.146:8080
114.129.98.153:8080
114.129.98.158:8080
114.129.98.159:8080
114.129.98.160:8080
114.129.98.165:8080
114.129.98.16:8080
114.129.98.177:8080
114.129.98.180:8080
114.129.98.195:8080
114.129.98.198:8080
114.129.98.199:8080
114.129.98.19:8080
114.129.98.203:8080
114.129.98.208:8080
114.129.98.211:8080
114.129.98.212:8080
114.129.98.216:8080
114.129.98.221:8080
114.129.98.222:8080
114.129.98.223:8080
114.129.98.224:8080
114.129.98.226:8080
114.129.98.231:8080
114.129.98.232:8080
114.129.98.235:8080
114.129.98.236:8080
114.129.98.237:8080
114.129.98.239:8080
114.129.98.241:8080
114.129.98.243:8080
114.129.98.251:8080
114.129.98.26:8080
114.129.98.27:8080
114.129.98.37:8080
114.129.98.39:8080
114.129.98.41:8080
114.129.98.45:8080
114.129.98.49:8080
114.129.98.53:8080
114.129.98.54:8080
114.129.98.59:8080
114.129.98.73:8080
114.129.98.74:8080
114.129.98.77:8080
114.129.98.84:8080
114.129.98.85:8080
114.129.98.87:8080
114.129.98.88:8080
114.129.98.90:8080
114.129.98.91:8080
114.129.98.93:8080
114.129.98.96:8080
114.129.99.101:8080
114.129.99.104:8080
114.129.99.105:8080
114.129.99.107:8080
114.129.99.108:8080
114.129.99.110:8080
114.129.99.115:8080
114.129.99.11:8080
114.129.99.121:8080
114.129.99.125:8080
114.129.99.131:8080
114.129.99.134:8080
114.129.99.148:8080
114.129.99.152:8080
114.129.99.153:8080
114.129.99.156:8080
114.129.99.164:8080
114.129.99.171:8080
114.129.99.172:8080
114.129.99.173:8080
114.129.99.176:8080
114.129.99.192:8080
114.129.99.195:8080
114.129.99.204:8080
114.129.99.20:8080
114.129.99.210:8080
114.129.99.215:8080
114.129.99.223:8080
114.129.99.226:8080
114.129.99.23:8080
114.129.99.247:8080
114.129.99.24:8080
114.129.99.250:8080
114.129.99.254:8080
114.129.99.35:8080
114.129.99.36:8080
114.129.99.39:8080
114.129.99.41:8080
114.129.99.47:8080
114.129.99.63:8080
114.129.99.72:8080
114.129.99.76:8080
114.129.99.77:8080
114.129.99.82:8080
114.129.99.83:8080
114.129.99.86:8080
114.129.99.96:8080
115.127.15.44:8080
115.178.50.237:8080
115.248.167.188:8080
116.205.127.43:8080
116.90.173.6:8080
116.90.209.237:8080
116.90.236.242:8080
117.102.101.219:8080
117.103.49.251:8080
117.141.33.26:8080
117.74.123.18:8080
117.74.123.45:8080
118.112.185.71:8080
118.174.16.195:8080
118.96.101.220:8080
118.96.117.55:8080
118.96.135.49:8080
118.96.137.14:8080
118.96.140.182:8080
118.96.145.30:8080
118.96.151.110:8080
118.96.151.231:8080
118.96.211.24:8080
118.96.217.109:8080
118.96.230.11:8080
118.96.30.11:8080
118.96.30.52:8080
118.96.55.125:8080
118.96.78.16:8080
118.96.78.19:8080
118.96.94.36:8080
118.97.164.78:8080
118.97.18.250:8080
118.97.191.250:8080
118.97.191.66:8080
118.97.193.58:8080
118.97.208.186:8080
118.97.208.194:8080
118.97.237.109:8080
118.97.40.242:8080
118.97.42.162:8080
118.97.79.122:8080
118.97.81.100:8080
118.97.97.236:8080
118.98.162.5:8080
118.98.168.83:8080
118.98.172.140:8080
118.98.212.18:8080
118.98.232.132:8080
118.98.31.5:8080
118.98.35.251:8080
119.160.223.117:8080
119.40.100.253:8080
119.40.100.33:8080
119.40.100.97:8080
119.47.93.58:8080
121.166.88.14:8080
122.129.114.25:8080
122.129.114.28:8080
122.184.133.212:8080
122.233.68.80:8080
122.248.0.75:8080
122.248.244.16:8080
123.231.246.156:8080
123.49.62.45:8080
124.106.152.69:8080
124.225.55.30:8080
124.225.57.10:8080
124.81.97.168:8080
125.160.92.65:8080
125.161.162.3:8080
125.161.186.113:8080
125.161.244.241:8080
125.162.144.26:8080
125.162.252.16:8080
125.163.117.181:8080
125.163.164.160:8080
125.163.186.37:8080
125.163.239.222:8080
125.163.244.109:8080
125.163.248.171:8080
125.164.113.86:8080
125.164.72.200:8080
125.165.165.200:8080
125.165.179.62:8080
125.165.186.216:8080
125.167.192.110:8080
125.167.193.20:8080
125.167.26.83:8080
125.167.50.190:8080
125.40.181.151:8080
125.40.181.247:8080
125.64.92.23:8080
134.37.254.27:8080
149.156.83.197:8080
149.156.83.198:8080
156.17.2.230:8080
156.17.3.244:8080
159.148.10.210:8080
159.148.22.153:8080
159.148.29.156:8080
163.152.133.22:8080
173.190.112.146:8080
173.203.102.80:8080
173.203.83.161:8080
174.120.158.114:8080
174.120.158.115:8080
174.143.207.233:8080
175.100.114.170:8080
175.111.89.16:8080
178.213.33.129:8080
178.218.225.232:8080
180.149.95.210:8080
180.178.108.78:8080
180.241.118.180:8080
180.241.121.138:8080
180.241.88.203:8080
180.242.60.17:8080
180.243.237.184:8080
180.244.248.61:8080
180.245.238.85:8080
180.246.114.165:8080
180.246.178.5:8080
180.246.184.172:8080
180.246.225.122:8080
180.247.118.163:8080
180.247.123.12:8080
180.247.170.128:8080
180.247.174.96:8080
180.247.4.194:8080
180.247.54.111:8080
180.247.55.146:8080
180.249.187.173:8080
182.16.240.97:8080
182.23.48.106:8080
182.253.4.42:8080
184.72.16.76:8080
184.72.53.115:8080
184.73.131.27:8080
186.225.44.69:8080
186.24.13.125:8080
187.6.85.33:8080
189.47.194.196:8080
190.147.197.35:8080
190.205.21.11:8080
190.95.198.58:8080
201.25.100.210:8080
202.51.120.195:8080
203.172.138.38:8080
68.68.40.143:8080
85.195.186.73:8080
87.197.1.186:8080
gold socks daily update 20-07-2011
72.183.42.26:8351
76.77.238.7:10507
174.53.167.106:8063
75.69.16.209:1393
71.226.201.127:1554
24.115.115.58:1406
24.29.93.32:1596
67.173.242.251:27191
24.191.9.71:46005
72.214.55.109:1077
24.54.168.82:8275
68.205.35.159:58687
68.202.157.25:5287
109.230.128.179:1080
67.191.239.117:4319
217.199.134.54:1080
24.26.5.252:16697
195.117.61.211:1080
98.229.104.252:1380
187.111.223.10:1080
76.22.161.202:3099
96.233.155.98:1882
96.237.109.123:1116
174.97.183.159:1908
76.17.127.179:1029
174.134.225.231:2019
68.117.201.50:5938
24.210.215.93:5959
68.33.120.196:8261
99.237.18.132:1652
68.38.198.119:22063
67.162.153.139:1815
218.61.76.158:1080
24.187.252.6:1049
66.165.177.134:44311
98.233.192.125:37929
61.178.127.140:1080
76.99.88.12:8506
98.119.112.188:1519
201.234.133.62:1080
75.68.16.88:1408
123.237.164.219:1080
67.253.215.250:1399
75.69.10.59:1861
75.34.174.123:8679
98.244.141.225:11121
173.3.236.104:1933
187.115.148.61:1080
174.106.70.79:44901
69.47.140.221:93
98.219.62.230:28504
68.196.115.39:2865
78.245.212.231:21511
65.25.11.218:6873
67.43.243.6:14619
187.4.205.153:1080
184.57.194.47:1916
108.15.122.8:1568
66.57.94.67:5635
93.113.113.114:62345
68.45.30.145:8323
173.70.29.138:1258
76.124.16.187:1123
66.169.160.63:1109
71.71.237.129:1108
71.63.176.94:28147
68.58.62.155:1752
96.27.95.201:1791
67.84.123.207:1760
24.126.165.8:1935
69.243.25.219:1908
65.25.11.218:1768
108.2.119.37:1914
173.27.188.88:1743
69.47.48.28:1186
98.200.72.55:3803
67.252.64.10:1046
72.200.30.55:3920
186.112.83.147:1080
67.80.7.13:14357
18.154.0.173:17473
75.65.99.107:14745
69.124.162.46:1277
64.33.235.75:38601
71.62.65.163:2010
173.68.112.45:1515
96.237.245.241:1856
213.76.167.117:1080
202.164.47.250:1080
98.218.78.186:11041
66.31.83.96:1994
123.49.50.114:1080
96.27.95.201:29719
114.113.228.201:1080
68.80.165.202:1323
68.52.118.147:1630
115.252.73.120:1080
69.135.189.164:1652
75.139.39.111:1702
130.132.236.91:1127
109.230.216.23:1080
114.113.228.199:1080
114.38.12.181:8355
76.77.238.7:10507
24.29.93.32:1596
67.253.157.194:7659
81.30.211.114:1080
112.104.99.177:8601
217.199.131.33:1080
218.93.210.3:1080
68.228.182.191:1801
213.105.94.105:16438
18.125.1.205:1955
218.56.21.226:1080
173.28.37.102:2921
174.100.174.71:12263
67.80.40.253:1131
66.191.153.48:6621
69.207.66.90:13473
68.33.72.178:1117
71.238.40.97:3647
71.8.42.26:1283
75.128.113.209:33409
75.138.144.140:1908
98.233.253.15:1768
98.240.8.255:4765
211.239.121.249:38203
68.113.124.184:4463
123.49.61.1:1080
69.124.155.29:19739
108.21.75.105:1454
75.131.174.235:1278
75.144.161.121:1503
98.228.213.163:43287
24.61.183.75:6989
76.108.68.185:1674
75.64.83.106:35597
66.190.175.239:9414
199.45.30.236:1031
68.34.216.153:14005
81.82.88.140:18519
88.191.133.82:443
217.150.52.37:1080
96.244.41.214:1644
71.140.65.219:6208
66.165.177.139:4495
174.62.116.255:1878
61.177.248.202:1080
98.242.182.176:5581
76.125.30.66:8999
220.224.239.44:1080
24.13.68.48:7948
173.70.133.69:1288
68.53.245.189:1166
173.19.42.15:1842
174.96.168.52:1690
69.76.145.50:7268
76.112.246.144:8109
24.0.82.254:4739
98.121.184.48:1073
97.78.127.45:28497
24.145.227.32:1612
76.118.208.59:1823
72.178.5.71:1616
160.36.72.211:2018
173.28.37.102:2921
46.146.121.133:8924
71.45.137.194:9181
114.47.194.8:8352
121.243.243.118:1080
76.118.118.160:1033
98.119.112.188:32713
79.119.221.107:8375
114.113.228.200:1080
24.61.25.123:1861
69.42.126.107:17639
71.8.42.26:1283
173.52.207.2:1280
24.30.7.103:1065
173.200.197.130:1744
24.9.251.130:7561
96.8.216.65:1197
123.237.101.133:1080
24.151.214.94:1651
98.229.244.222:7093
71.239.90.116:1775
174.108.120.102:11701
195.210.8.102:1080
67.167.251.137:1396
173.16.13.75:1380
74.89.38.132:29921
89.222.154.227:1080
70.182.89.90:6407
80.91.193.221:55558
74.98.176.183:1478
75.128.113.209:33409
174.62.179.133:1864
98.222.126.111:1063
72.183.42.26:8351
65.29.245.28:22532
202.103.106.19:1080
206.51.138.67:1047
71.123.131.35:1738
98.197.16.118:18885
173.57.131.119:6021
61.144.222.49:1863
71.201.32.182:36357
98.190.54.66:1908
75.183.53.90:34693
71.195.57.169:36233
64.5.73.171:9559
174.48.243.182:1936
24.92.76.175:1281
76.122.35.58:47783
96.3.5.40:11351
202.202.240.236:1080
207.237.65.3:1307
68.36.212.47:46255
70.115.240.206:1940
75.134.182.223:1849
24.103.47.48:1244
98.217.76.59:1311
99.194.133.68:1073
98.113.39.38:1936
92.126.105.176:8925
71.61.90.137:1685
24.17.72.27:26745
74.111.230.217:1143
114.113.228.198:1080
189.76.212.158:1080
24.94.248.189:59124
222.168.34.180:1080
96.237.235.104:2021
76.171.86.96:8517
68.117.163.251:5503
201.234.133.41:1080
68.194.167.132:35027
67.158.5.214:1022
98.162.163.146:2086
94.180.68.12:11558
98.117.44.114:1660
68.39.114.52:1190
71.226.201.127:1554
24.173.169.126:1800
68.33.167.65:47903
96.239.59.46:1336
24.9.170.64:7359
173.174.251.89:9615
71.207.150.224:2775
98.197.104.4:1830
72.189.156.11:11481
60.191.232.59:1080
24.62.112.140:1922
69.244.11.134:53269
71.226.136.82:1408
98.67.238.135:11024
74.193.153.13:8212
98.229.168.162:1569
69.244.213.58:58129
76.99.247.27:1452
67.80.40.253:1131
69.112.188.164:4177
174.100.174.71:12263
94.192.40.199:1055
71.225.76.252:1830
174.50.52.54:1127
75.64.57.44:48741
70.183.0.158:1414
80.98.175.191:22929
68.49.253.245:1591
76.19.88.85:27832
98.199.30.85:1408
66.165.177.138:9469
72.186.121.158:1936
24.184.216.133:38363
24.8.116.178:45299
96.253.93.138:1131
72.178.234.84:4167
173.77.250.97:1351
68.179.152.31:1022
207.102.11.254:1080
59.99.229.39:1080
74.64.22.58:8225
76.173.147.89:3173
72.24.227.79:6520
77.126.48.206:8162
114.113.228.204:1080
71.90.115.222:1158
67.186.160.34:1760
218.93.193.27:1080
84.22.61.33:1081
72.188.209.137:1911
173.24.181.157:1346
71.235.107.207:1296
96.253.123.85:1866
75.132.194.55:1643
61.190.16.190:1080
71.238.40.97:3647
96.237.176.37:1343
24.92.199.185:1299
174.61.26.193:9185
71.172.28.218:1171
68.38.223.237:36375
74.123.17.23:48223
71.41.74.158:1739
68.98.139.59:1545
72.88.222.175:1463
68.53.174.60:4710
195.69.109.226:1080
98.231.208.255:1815
121.22.20.202:1080
72.45.3.152:1276
66.165.177.133:35083
68.40.230.100:1925
69.143.243.200:1736
202.4.155.234:1080
174.53.167.106:8063
69.138.144.20:12673
174.60.56.113:1863
76.168.79.12:17975
173.165.66.75:5837
131.247.19.133:11839
24.54.168.82:8275
109.184.151.106:8907
66.229.78.246:8125
195.117.121.2:1080
24.32.136.104:1764
68.203.31.62:1962
76.95.107.27:40505
195.205.171.48:1080
216.145.80.234:1456
69.195.207.231:26083
69.141.96.255:1296
174.45.197.99:6327
41.236.175.94:1080
24.47.4.209:1214
78.128.85.11:44231
68.50.219.100:1640
91.124.55.137:8362
209.190.77.173:1080
69.153.170.93:1893
76.87.29.175:1380
24.78.114.214:16948
82.8.254.30:7645
12.187.94.81:7913
68.82.128.169:1797
68.198.31.197:1597
222.188.10.1:1080
74.139.5.211:1429
98.233.253.15:1768
98.217.94.90:49603
62.75.187.214:10080
64.120.166.23:1080
68.235.155.130:26053
24.9.251.130:1429
75.129.146.145:1147
24.100.29.201:22353
65.31.74.245:1627
96.238.25.150:2017
67.197.126.73:1748
68.180.22.73:1951
99.194.93.130:49235
174.109.52.196:1413
71.63.120.11:35739
76.189.44.95:5044
67.86.188.218:1779
69.42.126.102:29393
70.15.97.76:1483
67.248.199.113:1815
75.99.7.69:36255
66.219.17.34:10080
64.13.68.166:7827
195.117.121.9:1080
74.123.17.23:1396
97.87.137.255:54359
76.95.31.33:6517
193.93.49.174:73
173.174.167.113:21001
174.62.91.88:2017
217.115.112.39:1080
71.249.188.193:1207
190.3.82.146:1080
221.2.144.135:1080
95.56.93.253:8906
188.16.14.162:8367
71.182.143.191:1031
69.86.153.170:16211
98.212.102.97:16985
68.81.200.72:1073
80.90.162.179:1080
69.253.125.48:1937
61.32.222.13:1080
68.52.169.63:1734
68.199.162.220:7973
74.70.14.214:49701
174.0.162.205:8915
130.132.46.156:1143
109.75.194.83:8370
24.130.184.220:7161
74.248.201.117:40815
24.160.8.228:1271
67.249.104.173:1783
24.45.114.68:1234
69.22.6.79:47071
69.195.207.234:22149
175.123.72.96:11080
173.48.93.3:1933
174.58.25.6:9127
70.161.236.15:4540
71.59.34.234:18903
24.44.195.215:1369
99.91.170.243:1986
173.25.175.25:28167
200.32.112.11:1080
63.229.189.211:30737
71.175.108.103:1107
24.185.119.214:1383
98.230.136.222:1404
65.32.56.224:1873
123.236.191.174:1080
114.113.228.202:1080
69.120.219.89:36945
24.21.186.30:29157
69.207.66.90:13473
68.43.34.57:1940
76.97.76.195:13593
108.28.74.239:1932
222.74.200.2:1080
24.44.206.33:1959
114.113.228.203:1080
75.65.0.31:10204
66.168.130.60:1446
70.102.163.27:32375
67.167.89.121:5271
65.34.69.244:1361
184.35.25.251:1434
69.115.139.14:1061
121.192.32.221:1080
173.53.68.238:1269
72.178.234.84:5731
69.181.42.19:10449
68.82.88.195:2020
208.68.188.24:2000
72.178.5.71:14753
212.75.141.100:1080
98.254.20.226:1424
109.185.166.114:1080
173.192.90.214:14440
68.101.224.129:7761
69.140.83.190:1323
92.126.61.130:8620
69.250.129.208:1879
109.126.48.128:8624
68.81.200.72:39193
124.125.91.14:1080
76.107.2.158:5953
76.122.108.3:1742
68.238.240.121:1904
119.36.138.131:1080
72.200.63.7:5163
58.56.45.120:1080
68.33.144.38:1580
70.119.33.14:1159
174.108.29.179:1850
98.169.193.3:35051
46.146.52.38:8627
91.90.120.40:1080
111.242.11.50:8353
24.12.210.139:1904
70.176.166.223:35575
24.12.107.42:21367
202.109.133.181:1080
Facebook Password Cracker Hack Facebook Account Using Keylogger
Facebook Password Cracker | Hack Facebook Account Using Keylogger
The first line of defense for many computers is a password. Although passwords restrict access to a computer, they're the weakest link in any security system. The most secure passwords are lengthy, consisting of random characters, but most people tend to choose simple, easy-to-remember passwords and use the same password for several different systems.
Also visit here:
* Facebook Phishing Attack Not Working: Facebook Hacking is More Difficult
* How hack Facebook accounts passwords using Phishing Attack - click here
* How hack Twitter accounts passwords using Phishing Attack- click here
* Hack Gmail: How to Hack Gmail Account Password Using PRORAT Trojan & Phishing Attack- CLICK HERE
* STOP Facebook Hacking: Hacking Facebook Passwords Accounts is no More Easy for Hackers
* How to Hack Gmail Password: Gmail Hacking: Hack Gmail Password: Hack Gmail Account: Gmail Hack
* Hack Facebook Passwords | How to Hack Facebook Password | Hacking Facebook Passwords
* Create Fake login page: Download Fake login page for Gmail, Facebook & Twitter
* Facebook Password Hacking Software: Download Trojans & Keyloggers
* Hack Gmail: How to Hack Gmail Account Password Using PRORAT Trojan & Phishing Attack
When a computer requires a password, but you don't know what that password may be, you have several options:
* Steal a valid password
* Guess the password
* Discover the password with a brute-force attack
Stealing a password
If you can get physical access to a computer, the easiest way to steal a password is by shoulder surfing-peeking over someone's shoulder as they type in a password. If that option isn't available, poke around the person's desk. Most people find passwords hard to remember, so they often write them down and store them where they can easily find them, like next to their monitor or inside their desk drawer.
Still can't find that pesky password? Try one of these methods:
* keystroke logger
* desktop-monitoring program
* remote desktop-monitoring program
* password-recovery program
Note - All of these programs require that you have access to the victim's computer so you can install or run the programs without the user's knowledge.
Using a keystroke recorder or logger
Keystroke recorders or loggers record everything a person types, and either sends their typing to a monitoring computer or saves it to a file. The simplest keystroke loggers record anything a user types which can include incriminating email messages, credit card numbers, and passwords. When the user leaves the target computer, you can remove the keystroke logging program from their machine and retrieve the logging file that contains the password and anything else they typed. The more advanced keystroke loggers can email the log file of a user's keystrokes to you so you can monitor their activities from another location.
To avoid detection, keystroke loggers run in stealth mode, which means that they hide their presence from the user, although they can still be spotted if you know what and where to look. Unless someone suspects that someone has planted a keystroke logger on their computer, chances are good they will never look for, let alone find, a keystroke logger hidden in stealth mode.
To avoid giving away their presence at all, some keystroke loggers are available as hardware devices that plug in between the computer and the keyboard. Such hardware keystroke loggers can be spotted easily just by looking at the back of the computer, but their presence is completely invisible to any software running on that computer. Best of all, unlike their software equivalents that only work under specific operating systems, hardware keystroke loggers work with any operating system running on that computer, such as FreeBSD, Linux, Windows XP, or OS/2.
Some popular hardware keystroke loggers include KeyGhost (http://www.keyghost.com), Hardware KeyLogger (http://www.amecisco.com), and KEYKatcher (http://www.tbotech.com/key-katcher.htm). To find a software keystroke logger, visit Keylogger.org (http://www.keylogger.org), which rates the different keystroke loggers by their features and ease of use.
Spying with a desktop-monitoring program
More powerful than keystroke loggers are desktop-monitoring programs. Like a computer surveillance camera, desktop-monitoring programs secretly record the programs a person uses, how long the person uses each program, the websites viewed, and every keystroke the user types. To show you what a user might be doing, some desktop-monitoring programs can periodically capture the contents of the screen or secretly turn on a webcam to record the person sitting in front of the computer.
Many desktop-monitoring programs can store days of recordings, and some can be set to record at specifically designated times, when certain applications are run, or when a user logs on to the Internet.
To find a desktop-monitoring program, visit Computer Monitoring Software http://www.computer-monitoring.com or try these programs:
1. AppsTraka http://appstraka.hypermart.net
2. Desktop Surveillance http://www.omniquad.com
3. iSpyNOW http://www.ispynow.com
4. Net Vizor NetVizor Network Monitoring Software
5. Spector http://www.spectorsoft.com
6. SpyBuddy http://www.agent-spy.com
7. WinWhatWhere Investigator http://www.winwhatwhere.com
8. WinGuardian http://www.webroot.com
Remotely viewing another computer's desktop
Desktop-monitoring programs are useful if you have regular access to the computer you want to watch. But if you don't, you can use a remote desktop-monitoring program instead. Just install a program such as Q-Peek (http://www.qpeek.com), Spector (http://www.netbus.org), or PC Spy (http://www.softdd.com) on the computer you want to monitor. Then, anything anyone types, views, or manipulates on that computer will appear live on your computer's screen.
Using a password-recovery program
Because typing a password over and over again to access a program can be a nuisance, many programs let you store passwords directly in the program, hidden behind a string of asterisks. Because people often forget these passwords and then can't access their programs or files, password-recovery programs have been developed to retrieve these lost or forgotten passwords. You can, of course, also use these programs to retrieve other people's passwords.
There are many commercial and free versions of password-recovery programs, such as these:
1. iOpus Password Recovery XP http://www.iopus.com
2. Passware Kit http://www.lostpassword.com
3. Peek-a-boo http://www.corteksoft.com
4. Revelation http://www.snadboy.com
Besides blocking access to a program, passwords can also block access to files, like WordPerfect documents or Microsoft Excel spreadsheets.
1. AccessData http://www.accessdata.com
2. Alpine Snow http://www.alpinesnow.com
3. Crak Software http://www.crak.com
4. ElcomSoft http://www.elcomsoft.com
5. Password Crackers http://www.pwcrack.com
6. Passware http://www.lostpassword.com
Guess a password with a dictionary attack
Most people choose easy-to-remember passwords, which means the odds that someone will choose an ordinary word for a password are extremely high. To find passwords that use ordinary words, hackers have created special password-cracking programs that use dictionary files (sometimes called word lists), which contain actors' names, names of popular cartoon characters, popular rock bands, Star Trek jargon, common male and female names, technology-related words, and other common words found in most dictionaries.
The password-cracking program takes a word from the dictionary file and tries this word as a password to access a computer. If the first word isn't the right password, the password-cracking program tries another word from its dictionary list until it either finds the right password or runs out of words. If the password works, you have access to the program you want. Of course, if it runs out of words in its dictionary file, you can try another dictionary file until you find a valid password or run out of dictionary files. If a password is an ordinary word, it's only a matter of time before a dictionary attack will uncover it.
To increase the odds of uncovering a password, some password-cracking programs will not only try every word in a dictionary file, but also subtle variations of each word, such as spelling the word backwards or adding different numbers on the end. So even though a password like SNOOPY12 won't be found in an ordinary dictionary file, the password-cracking program can still uncover this password by manipulating each word in its dictionary file.
For an example of a dictionary attack tool sold commercially for people to test the security of their networks, visit SolarWinds (http://solarwinds.net). For one of the largest collections of word lists, visit the Wordlist Project (http://wordlists.securityon.net), which offers word lists in various languages, including English, Spanish, Japanese, and Russian.
Brute-force password attacks
Dictionary attacks can find ordinary words or variations of words, but sometimes a password may consist of random characters. In these cases, the only solution is to use a brute-force attack.
As the name implies, a brute-force attack is like prying a password out of a computer by smashing it with a sledgehammer. Instead of trying common words that most people use as passwords, the brute-force method simply tries every possible combination of characters in varying lengths. So, if someone's password is as obscure as NI8$FQ2, a brute-force attack will find that password (and every other password on that computer) eventually.
Brute-force attacks are especially popular when cracking Unix systems, because most Unix systems store the list of account names and passwords in the /etc/passwd file. To provide a small degree of security, Unix encrypts each person's password using an encryption algorithm (also called a hash function), usually using the Data Encryption Standard (DES).
To gain access to Unix computers, hackers simply copy the /etc/passwd file to their own computer so that they can run a dictionary or brute-force attack on that file at their convenience, without risk of being spotted. With a copy of the passwd file on their own computer, hackers can take as much time as they need until either the dictionary or brute-force attack succeeds. Once it finds just one password, the hacker can use that password to gain access to that unlucky person's account.
To find password-cracking programs that use word-list or brute-force attacks, visit these sites:
1. BlackCode http://www.blackcode.com
2. AntiOnline http://www.antionline.com
3. New Order http://neworder.box.sk
OTHER USEFUL LINK RELATED TO THIS POST:
How to hack a PC or remote system using Trojan & Backdoor
Tools & Softwares for Trojans and Backdoors
Trojans and Backdoors - 4 :Modes of Transmission
Download Free FSCRACK: GUI for John the Ripper password cracker
Top 10 Password Crackers
Password guessing attacks- Can be carried out manually or via automated tools
Web Based Password Cracking Techniques
Keystroke Loggers: KEYLOGGERS - If all other attempts to sniff out domain privileges fail, then keystroke logger is the solution
Hacking Tool: John the Ripper
Password Types- Passwords can be categorized into various types based on their composition
Automatic Password Cracking Algorithm
Manual Password Cracking Algorithm
Password Sniffing
The first line of defense for many computers is a password. Although passwords restrict access to a computer, they're the weakest link in any security system. The most secure passwords are lengthy, consisting of random characters, but most people tend to choose simple, easy-to-remember passwords and use the same password for several different systems.
Also visit here:
* Facebook Phishing Attack Not Working: Facebook Hacking is More Difficult
* How hack Facebook accounts passwords using Phishing Attack - click here
* How hack Twitter accounts passwords using Phishing Attack- click here
* Hack Gmail: How to Hack Gmail Account Password Using PRORAT Trojan & Phishing Attack- CLICK HERE
* STOP Facebook Hacking: Hacking Facebook Passwords Accounts is no More Easy for Hackers
* How to Hack Gmail Password: Gmail Hacking: Hack Gmail Password: Hack Gmail Account: Gmail Hack
* Hack Facebook Passwords | How to Hack Facebook Password | Hacking Facebook Passwords
* Create Fake login page: Download Fake login page for Gmail, Facebook & Twitter
* Facebook Password Hacking Software: Download Trojans & Keyloggers
* Hack Gmail: How to Hack Gmail Account Password Using PRORAT Trojan & Phishing Attack
When a computer requires a password, but you don't know what that password may be, you have several options:
* Steal a valid password
* Guess the password
* Discover the password with a brute-force attack
Stealing a password
If you can get physical access to a computer, the easiest way to steal a password is by shoulder surfing-peeking over someone's shoulder as they type in a password. If that option isn't available, poke around the person's desk. Most people find passwords hard to remember, so they often write them down and store them where they can easily find them, like next to their monitor or inside their desk drawer.
Still can't find that pesky password? Try one of these methods:
* keystroke logger
* desktop-monitoring program
* remote desktop-monitoring program
* password-recovery program
Note - All of these programs require that you have access to the victim's computer so you can install or run the programs without the user's knowledge.
Using a keystroke recorder or logger
Keystroke recorders or loggers record everything a person types, and either sends their typing to a monitoring computer or saves it to a file. The simplest keystroke loggers record anything a user types which can include incriminating email messages, credit card numbers, and passwords. When the user leaves the target computer, you can remove the keystroke logging program from their machine and retrieve the logging file that contains the password and anything else they typed. The more advanced keystroke loggers can email the log file of a user's keystrokes to you so you can monitor their activities from another location.
To avoid detection, keystroke loggers run in stealth mode, which means that they hide their presence from the user, although they can still be spotted if you know what and where to look. Unless someone suspects that someone has planted a keystroke logger on their computer, chances are good they will never look for, let alone find, a keystroke logger hidden in stealth mode.
To avoid giving away their presence at all, some keystroke loggers are available as hardware devices that plug in between the computer and the keyboard. Such hardware keystroke loggers can be spotted easily just by looking at the back of the computer, but their presence is completely invisible to any software running on that computer. Best of all, unlike their software equivalents that only work under specific operating systems, hardware keystroke loggers work with any operating system running on that computer, such as FreeBSD, Linux, Windows XP, or OS/2.
Some popular hardware keystroke loggers include KeyGhost (http://www.keyghost.com), Hardware KeyLogger (http://www.amecisco.com), and KEYKatcher (http://www.tbotech.com/key-katcher.htm). To find a software keystroke logger, visit Keylogger.org (http://www.keylogger.org), which rates the different keystroke loggers by their features and ease of use.
Spying with a desktop-monitoring program
More powerful than keystroke loggers are desktop-monitoring programs. Like a computer surveillance camera, desktop-monitoring programs secretly record the programs a person uses, how long the person uses each program, the websites viewed, and every keystroke the user types. To show you what a user might be doing, some desktop-monitoring programs can periodically capture the contents of the screen or secretly turn on a webcam to record the person sitting in front of the computer.
Many desktop-monitoring programs can store days of recordings, and some can be set to record at specifically designated times, when certain applications are run, or when a user logs on to the Internet.
To find a desktop-monitoring program, visit Computer Monitoring Software http://www.computer-monitoring.com or try these programs:
1. AppsTraka http://appstraka.hypermart.net
2. Desktop Surveillance http://www.omniquad.com
3. iSpyNOW http://www.ispynow.com
4. Net Vizor NetVizor Network Monitoring Software
5. Spector http://www.spectorsoft.com
6. SpyBuddy http://www.agent-spy.com
7. WinWhatWhere Investigator http://www.winwhatwhere.com
8. WinGuardian http://www.webroot.com
Remotely viewing another computer's desktop
Desktop-monitoring programs are useful if you have regular access to the computer you want to watch. But if you don't, you can use a remote desktop-monitoring program instead. Just install a program such as Q-Peek (http://www.qpeek.com), Spector (http://www.netbus.org), or PC Spy (http://www.softdd.com) on the computer you want to monitor. Then, anything anyone types, views, or manipulates on that computer will appear live on your computer's screen.
Using a password-recovery program
Because typing a password over and over again to access a program can be a nuisance, many programs let you store passwords directly in the program, hidden behind a string of asterisks. Because people often forget these passwords and then can't access their programs or files, password-recovery programs have been developed to retrieve these lost or forgotten passwords. You can, of course, also use these programs to retrieve other people's passwords.
There are many commercial and free versions of password-recovery programs, such as these:
1. iOpus Password Recovery XP http://www.iopus.com
2. Passware Kit http://www.lostpassword.com
3. Peek-a-boo http://www.corteksoft.com
4. Revelation http://www.snadboy.com
Besides blocking access to a program, passwords can also block access to files, like WordPerfect documents or Microsoft Excel spreadsheets.
1. AccessData http://www.accessdata.com
2. Alpine Snow http://www.alpinesnow.com
3. Crak Software http://www.crak.com
4. ElcomSoft http://www.elcomsoft.com
5. Password Crackers http://www.pwcrack.com
6. Passware http://www.lostpassword.com
Guess a password with a dictionary attack
Most people choose easy-to-remember passwords, which means the odds that someone will choose an ordinary word for a password are extremely high. To find passwords that use ordinary words, hackers have created special password-cracking programs that use dictionary files (sometimes called word lists), which contain actors' names, names of popular cartoon characters, popular rock bands, Star Trek jargon, common male and female names, technology-related words, and other common words found in most dictionaries.
The password-cracking program takes a word from the dictionary file and tries this word as a password to access a computer. If the first word isn't the right password, the password-cracking program tries another word from its dictionary list until it either finds the right password or runs out of words. If the password works, you have access to the program you want. Of course, if it runs out of words in its dictionary file, you can try another dictionary file until you find a valid password or run out of dictionary files. If a password is an ordinary word, it's only a matter of time before a dictionary attack will uncover it.
To increase the odds of uncovering a password, some password-cracking programs will not only try every word in a dictionary file, but also subtle variations of each word, such as spelling the word backwards or adding different numbers on the end. So even though a password like SNOOPY12 won't be found in an ordinary dictionary file, the password-cracking program can still uncover this password by manipulating each word in its dictionary file.
For an example of a dictionary attack tool sold commercially for people to test the security of their networks, visit SolarWinds (http://solarwinds.net). For one of the largest collections of word lists, visit the Wordlist Project (http://wordlists.securityon.net), which offers word lists in various languages, including English, Spanish, Japanese, and Russian.
Brute-force password attacks
Dictionary attacks can find ordinary words or variations of words, but sometimes a password may consist of random characters. In these cases, the only solution is to use a brute-force attack.
As the name implies, a brute-force attack is like prying a password out of a computer by smashing it with a sledgehammer. Instead of trying common words that most people use as passwords, the brute-force method simply tries every possible combination of characters in varying lengths. So, if someone's password is as obscure as NI8$FQ2, a brute-force attack will find that password (and every other password on that computer) eventually.
Brute-force attacks are especially popular when cracking Unix systems, because most Unix systems store the list of account names and passwords in the /etc/passwd file. To provide a small degree of security, Unix encrypts each person's password using an encryption algorithm (also called a hash function), usually using the Data Encryption Standard (DES).
To gain access to Unix computers, hackers simply copy the /etc/passwd file to their own computer so that they can run a dictionary or brute-force attack on that file at their convenience, without risk of being spotted. With a copy of the passwd file on their own computer, hackers can take as much time as they need until either the dictionary or brute-force attack succeeds. Once it finds just one password, the hacker can use that password to gain access to that unlucky person's account.
To find password-cracking programs that use word-list or brute-force attacks, visit these sites:
1. BlackCode http://www.blackcode.com
2. AntiOnline http://www.antionline.com
3. New Order http://neworder.box.sk
OTHER USEFUL LINK RELATED TO THIS POST:
How to hack a PC or remote system using Trojan & Backdoor
Tools & Softwares for Trojans and Backdoors
Trojans and Backdoors - 4 :Modes of Transmission
Download Free FSCRACK: GUI for John the Ripper password cracker
Top 10 Password Crackers
Password guessing attacks- Can be carried out manually or via automated tools
Web Based Password Cracking Techniques
Keystroke Loggers: KEYLOGGERS - If all other attempts to sniff out domain privileges fail, then keystroke logger is the solution
Hacking Tool: John the Ripper
Password Types- Passwords can be categorized into various types based on their composition
Automatic Password Cracking Algorithm
Manual Password Cracking Algorithm
Password Sniffing
vip socks 5 daily update 20-07-2011
96.3.5.40:11351
98.242.182.176:5581
24.21.186.30:29157
69.207.27.72:1432
96.36.27.49:15493
68.38.198.119:22063
69.140.83.190:1323
68.116.187.242:1455
98.222.126.111:1063
96.238.7.203:1951
24.61.183.75:6989
67.85.76.215:1774
68.116.172.192:1346
207.237.65.3:1307
66.229.213.176:7585
71.238.40.97:3647
24.211.81.93:1557
69.125.133.92:1679
76.22.251.186:1400
131.247.19.133:11839
74.97.48.228:1887
75.127.113.113:443
69.195.207.231:26083
99.165.220.83:36681
75.131.46.172:1518
68.12.54.81:8147
98.244.109.41:1074
174.106.70.79:44901
69.42.126.103:43289
173.81.144.251:13208
68.33.146.212:44779
69.207.66.90:13473
71.167.112.163:1607
173.57.131.119:6021
68.81.225.194:10493
69.42.126.105:48615
24.126.165.8:1935
72.183.42.26:8351
24.210.118.62:1768
71.230.134.187:1798
24.16.196.237:9819
98.229.244.222:7093
76.17.127.179:1029
206.51.138.67:1047
97.78.127.45:28497
68.49.253.245:1591
71.45.137.194:9181
108.20.70.3:1885
24.185.0.8:1117
75.65.99.107:14745
173.59.2.116:1777
24.239.38.21:49149
72.188.209.137:1911
96.240.24.61:1169
66.11.119.118:1627
74.64.22.58:8225
98.254.20.226:1424
68.44.7.0:1924
66.165.177.134:44311
96.253.123.85:1866
68.114.94.161:1455
68.106.89.98:1623
173.28.37.102:1629
173.59.235.221:1095
98.117.44.114:1660
68.238.240.121:1904
98.28.210.133:1050
24.54.168.82:8275
76.94.233.87:1509
68.82.88.195:2020
67.167.89.121:1841
72.45.3.152:1276
69.112.188.164:1644
68.228.91.74:1346
68.234.173.213:44677
68.33.144.38:1580
68.33.167.65:47903
68.34.43.18:21219
68.36.212.47:46255
68.39.114.52:1190
68.40.230.100:1925
68.43.34.57:1940
68.46.195.152:1984
68.50.29.95:1896
68.51.25.75:1530
68.53.245.189:1166
68.57.214.175:1616
68.57.255.61:1900
68.63.82.130:1546
68.80.165.202:1323
68.80.83.134:5569
68.81.200.72:1073
68.82.128.169:1797
68.82.88.195:2020
68.84.170.15:1502
69.120.219.89:36945
69.122.239.44:1778
69.135.189.164:1652
69.138.144.20:12673
69.141.96.255:1296
69.143.243.200:1736
69.195.207.229:33663
69.195.207.231:26083
69.195.207.232:5569
69.195.207.235:11657
69.249.44.143:1134
69.250.132.8:10793
69.251.53.24:11184
69.251.80.176:37509
69.42.126.105:48615
69.42.126.106:6703
70.115.240.206:1940
70.183.0.158:1414
70.188.142.67:1221
71.137.242.80:53309
71.172.243.178:1828
71.175.108.103:1107
71.178.213.38:1387
67.186.160.34:1760
71.239.90.116:29821
76.99.247.27:1452
65.32.56.224:1873
68.98.139.59:1545
24.12.210.139:1904
68.43.34.57:1940
18.125.1.205:1955
62.75.145.245:9100
68.50.29.95:1896
24.61.25.123:1861
68.80.165.202:1323
71.178.36.35:1961
71.190.128.224:1328
71.190.201.77:1272
71.202.173.158:3009
71.205.225.215:2015
71.207.150.224:2775
71.226.136.82:1408
71.226.201.127:1554
71.234.232.63:57461
71.238.32.52:1143
71.238.40.97:3647
71.239.90.116:29821
71.41.74.158:1739
71.45.137.194:9181
71.60.8.210:1600
71.71.237.129:1108
71.90.115.222:1158
72.178.5.71:1616
72.186.121.158:1936
72.188.209.137:1911
72.200.135.197:1525
72.214.55.109:1077
72.24.227.79:6520
72.45.9.151:7738
72.78.245.16:1053
72.88.222.175:1463
74.103.180.136:1857
74.105.167.2:1321
74.105.229.71:1368
74.105.37.162:1888
74.107.93.24:1050
74.109.211.64:1564
74.111.39.154:1545
74.139.5.211:1429
74.193.236.128:1520
74.197.127.183:40923
74.64.22.58:8225
74.89.38.132:1064
74.97.48.228:1887
74.99.78.9:1454
75.110.67.187:16499
75.118.157.118:2004
75.128.113.209:33409
75.131.174.235:1278
75.131.46.172:1518
75.132.194.55:1643
75.138.144.140:1908
75.183.53.90:34693
75.34.174.123:8679
75.65.113.60:1330
75.65.99.107:14745
75.68.16.88:1408
75.69.16.209:1393
75.69.2.248:1431
75.76.86.92:1205
76.106.209.98:1493
76.117.220.192:1245
76.122.108.3:1742
76.124.235.99:1255
76.17.127.179:1029
76.25.67.139:1730
76.30.47.78:3195
76.94.233.87:1509
76.95.31.33:6517
76.99.243.184:1903
76.99.247.27:1452
96.237.109.123:1116
96.237.176.37:1343
96.237.235.104:2021
96.240.24.61:1169
96.241.19.63:1194
96.244.41.214:1644
96.244.5.196:1421
96.252.6.8:1305
96.253.93.138:1131
96.27.95.201:29719
96.36.27.49:15493
96.57.91.115:1811
97.87.137.255:54359
98.111.251.101:1585
98.114.148.173:1997
98.116.102.135:1166
98.116.123.98:1400
98.118.91.208:1366
98.119.112.188:1519
Subscribe to:
Posts (Atom)