Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Tuesday, March 23, 2010

How to implement an ARP poisoning attack


Skill level:Intermediate                                Sucess rate:60%
The ARP poisoning attack:
The concept behind this is simple. ARP is the protocol that maintains network devices tables up-to-date by associating an IP address with a MAC address. The problem with ARP is that it doesn’t really care about who answered, it will gladly update the tables from whoever says so. Most of the time, it won’t even ask. So the idea behind the attack, is to send the client an ARP answer saying “hey, I’m the gateway, send stuff to me” and a second ARP answer to the real gateway saying “hey there, I’m this guy, send me his stuff”. Then you just have to relay the packets between the victim and the gateway.Those schemas are more simply to understand
In Linux, the rerouting can be done using the following iptables commands:
iptables -t nat -A PREROUTING -i  -p tcp –dport  -j REDIRECT –to-port 
iptables -t nat -D PREROUTING -i  -p tcp –dport  -j REDIRECT –to-port 








ARP Spoofing/poising Animation

The attacker is constently sending false ARP messages to the victim causing it to update its ARP table. When you ready to send Ping, watch closley where the ping goes.





How to implement an ARP poisoning attack?








What you will need:







Now onto how to do this:
1) Download and install cain and able.
2) Set your laptop up and steal an ethernet connection from a nearby computer on the network. Plug the Ethernet cable in. You are now connected. With no restrictions on what you can run.
3) Start cain and able.
4) Now click on the sniffer tab. Now notice the two symbols – the one that looks the same as the one on the sniffer tab and the one that looks like a nuclear sign.
5) Mouse over them and they will tell you that one starts the sniffer and the other starts arp poisoning.
6) Now click on configure -> click on the arp tab and make sure that you are using your real ip and mac address, if you don’t you wont get any hosts or be able to arp poision.
7) Now start the sniffer and press the blue plus sign. This will let you scan for hosts in your subnet.
8) Now go back to configure and select use a spoofed ip and mac address. Now type an ip from your sub net but the last bit must be numbers that are unused so the network doesn’t get confused.
9) Select all the hosts you find and right click and go resolve host name. Now try to find the router, it will usually stand out easily. The router probably wont have a name as well as being a different brand from everything else and have a really low or really high ip address so you should spot it easily.
10) Now click on the arp tab at the bottom of the sniffer window. Click on the top table part and click the blue plus sign again. This brings up a window that allows you to select the ip addresses that you want to arp poison the first one you select should be the router and in the second box select any computers you want to listen to.
11) Click ok. Click the start arp button. You are now listening between the router and as many computers as you selected.
12) Watch as the routed packets role in. Select the password tab at the bottom of the screen and watch the passwords appear.
13) Any password hashes can be sent to the cracker and broken form there but that isn’t going to be covered in this article. I am sure you can work that out or may be I shall post it later.

Monday, March 1, 2010

Free Demonoid Invitation Codes

I was requested from many of my blog readers to prodive them with Demonoid invitation codes so in this article i will give you some of Free Demonoid Invitation Codes


What is Demonoid?
Demonoid is a BitTorrent tracker web site. It was created in anonymity by a Croatian developer known on the Internet as Deimos. It is considered a semi-public torrent tracking service as only users invited to the service by other users can sign up and use the site. Once registered, you can browse, search and download torrents to use in a program that supports them. Currently, Demonoid hosts more than 250,000 torrents in a variety of categories. There is something for everyone at Demonoid and taking advantage of the site is a great way to find some amazing torrents.








Free Demonoid Invitation Codes:


x3vbhzcouy
g3zy453f4
srix1gtvri
3ewnubic5vz
4bu9ksba6yj
r1u3rxfd82n
fs30bew9eq
b8gr8w5f3
tz6t998ulr
ycd1zued
oizyviwv
7w6eownv0
s15zxpid9uoo
u8is4ulxm
bqg0c50luq
pqpwn6ty3

How to hack a remote Computer with telnet

This article is posted on request of Mr Sehaj Mathur who is one of my blog readers,Telnet is a service gives the users to access a host and perform as if they were working, If you call yourself a Hacker you must be able to do telnet.It can be done in many ways, be careful not to try from your home because a tons of hackers have been busted for doing this,I recommend you reading my article on 15 tips on How to Survive as a Hacker to protect yourself from being caught while HackingWell there are many methods to hack with telnet but i will tell you about two simplest method to hack with telnet:


Hack a remote computer with telnet Method 1:

Before looking at this method to Hack with telnet you must know that what are ports?There are two kinds of ports-Physical(HardWare) and Virtual(Software)You may be thinking of ports to be the slots behind your CPU to whichy ou connect your Mouse or Keyboard or your monitor. These sockets are called physical ports .We are here interested in only virtual ports.It is nothing physical but it is kind of a virtual pipe through which information can go in and out of the computer. 

A particular computer can have a large number of ports. All ports are numbered .Now at each port a particular service is running. A software which runs on a port is called service . For interchanging different kinds of information different ports are used. A typical list shows the various ports

Ping : 7
Systat : 11
Time : 13
NetStat : 15
SSH : 22
Telnet : 23
SMTP : 25
Whois : 43
Finger : 79
HTTP : 80
POP : 110


Method 2


You can connect to a remote computer at a particular port. When you are connected to that port then you can interchange information related to that particular port only. Ports can be open or closed. If a particular port of a computer is closed then you can not connect to that computer
on that port. Generally most of the computers have atleast 5 or 6 ports open


First goto run and type telnet:





hack a remote computer

Hack a computer

Once the Telnet windows pops up click on Connect->RemoteSystem then in the host name type the host i.e. the IP address of the remote computer or the website you want to connect to . Then in the Port select the port you want to connect to . You can only connect to ports which are open on the host computer.Almost always leave the TermType to vt100.We use vt100 as it is compatible with most monitors . 

Then click connect and you will be connected to the remote machine in some time. The syntax of the telnet command from DOS prompt is C:\>telnet.
By default port is taken as 23. Scroll down and read more about ports

The first thing you have to do if you want to hack with Telnet, is find your local Telnet phone number.This can be done many ways. One way that always works, is to call up your local computer store, tel them that you recently purchased The Source or something like that, but that you lost the sheet that has the phone no. written on it.They'll tell it to you. (People who work in computer stores usualy aren't very smart
about that sort of thing.)

Call the number with your computer. Once the connection is established,
press twice. the computer will display "TERMINAL=" Type again. The computer will then display an at sign: "" Type in the access code here.:below are some access codes listed

(But please don't misuse it)
------------------------------------------------------------------------
Telemail
--------
To use the Telemail feature of Telenet, type mail at the "" prompt.
User id's are usually the first initial of the user's first name, plus
the last name.
eg- William gates= Wgates


-------------------------------------------------------------------------
C 20120 - VM 370 ONLINE
C 20124N- NEW YORK TIME INFORMATION SERVICE
C 20125 - NJIT ELECTRONIC INFORMATION
C 20130
C 20133
C 20138
C 20148
C 20154
C 20165
C 20166
C 20167 - WARNER COMPUTER SYSTEMS
C 20168 - WARNER COMPUTER SYSTEMS
C 20171
C 20182 - BANKERS TRUST CUSTOMER SERVICE
C 20184
C 20222
C 20225 - COMSHARE "COMMANDER II"
C 20246
C 20247 - GSD TIMESHARING
C 20270 - GSD TIMESHARING
C 202124- GENERAL MOTORS WARREN
C 202133
C 202138- (TYPE .HELP *)
C 202139- (TYPE .HELP *)
C 202140- (TYPE .HELP *)
C 202143
C 202144- (TYPE .HELP *)
C 202148
C 202149
C 202175 - HONEYWELL
C 202222 - GM PARTS
C 202229 - PRIMENET
C 20321 - WYLBUR
C 21221 - PRIMENET
C 21224 - PRIMENET
C 21225 - INTERACTIVE MARKET SYSTEMS
C 21226 - INTERACTIVE MARKET SYSTEMS
C 21228 - BURROUGHS NYC DATA CENTER
C 21229 - LANDART SYSTEMS
C 21231 - E.F.HUTTON
C 21233 - UNIVAC 1100
C 21247
C 21248
C 21252
C 21253 - VM/370 ONLINE
C 21256 - CITIBANK CASH MANAGER
C 21264 - CITICASH MANAGER INTERNATIONAL
C 21265 - CITICASH MANAGER INTERNATIONAL
C 21269
C 21281 - BANKERS TRUST CUSTOMER SERVICE
C 21284 - DATAMOR TIME SHARING
C 21288 - S-K WDC SYSTEM 1/ONLINE
C 212136 - (TYPE NEW/TSC)
C 212141
C 212142
C 212151 - CITICASH MANAGER INTERNATIONAL
C 212152
C 21255 - PRIMENET
C 21256 - PRIMENET
C 212160 - TELSTAT SIGMA 6
C 212167 - RSTS V.7.0-07
C 212168 - RSTS V.7.0-07
C 212171
C 212172
C 21284 - DATAMOR TIME SHARING
C 21325 - PRIMENET
C 21335 - MARKETRON RESEARCH AND SALES
C 21336 - MARKETRON RESEARCH AND SALES
C 21341
C 21360
C 21365
C 21366
C 213170 - DIALOG
C 21370 - XCC-WEST SYSTEM X2
C 21371 - XCC-WEST SYSTEM X3
C 21372 - XCC-WEST SYSTEM X3
C 21373 - XCC-WEST SYSTEM X1
C 21375 - XCC-WEST SYSTEM X2
C 21379 - INTERACTIVE SYSTEM/ONE
C 21384
C 21385
C 21386 - IAS PROGRAM DEVELOPMENT SYSTEM
C 21388
C 213105
C 21520 - TPF&C ONLINE
C 21534 - PRIMENET
C 21538
C 21722
C 21725
C 21726 - U OF I COMPUTING SERVICES
C 30121 - NASA RECON
C 30124 - SOURCE SYSTEM 10
C 30126 - DISTRIBUTIVE NETWORK
C 30128 - SOURCE SYSTEM 13
C 30134 - INTERACTIVE(GAITHERSBURG)
C 30135
C 30136
C 30138 - SOURCE SYSTEM 11
C 30147 - SOURCE SYSTEM 12
C 30148 - SOURCE SYSTEM 15
C 30149 - SOURCE SYSTEM 14
C 30320 - COMPUTER SHARING SERVICES
C 30330 - COMPUTER SHARING SERVICES
C 30335
C 30337 - PRIMENET
C 30339 - PRIMENET
C 30340 - PRIMENET
C 303125
C 30520
C 30522
C 30531
C 30532 - C.S.I. TIMESHARING SERVICE
C 30523 - C.S.I. TIMESHARING SERVICE
C 31231 - C.I.C. TIMESHARING
C 31232
C 31235
C 31236
C 31240
C 31247
C 31248
C 31249
C 31250
C 31254
C 31279
C 31289
C 312124
C 312127
C 31325
C 31327
C 31340 - ADP NETWORK
C 31341 - ADP NETWORK
C 31345 - PRIMENET
C 31359 - GENERAL MOTORS WARREN
C 31360 - GENERAL MOTORS WARREN
C 31361 - GM PARTS
C 31363 - VM/370 ONLINE
C 31370 - GM DECSYSTEM-20 TIMESHARING
C 31422
C 31423
C 31424 - MCAUTO VM/370 ONLINE
C 31425 - MCAUTO VM/370 ONLINE
C 31426
C 31432
C 31435 - PRIMENET
C 31444
C 31726 - RSTS V06C-04
C 40420
C 40434
C 40822
C 41520 - DIALOG
C 41527 - STANFORD IBM-3033A
C 41548 - DIALOG
C 41556
C 41560
C 41561
C 41562
C 41567
C 41580 - HARPER GROUP INFORMATION NETWORK
C 41587 - BUSSIPLEXER
C 51632
C 51633
C 51634
C 51638
C 51646
C 51647 - VM/370 ONLINE
C 51729
C 60320 - DARTMOUTH COLLEGE COMPUTING
C 60322
C 60324
C 60328
C 60331
C 60720
C 60942
C 60945
C 61114
C 61115
C 61118
C 61120
C 61221
C 61724
C 61735 - (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK CONTROL
C 61748 - PRIMENET
C 61750 - PRIMENET
C 61760 - (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK CONTROL
C 61766 - PRIMENET
C 61767 - PRIMENET
C 61770 - NDC-SYSTEM#
C 61774
C 61776 - NDC-SYSTEM#
C 61777 - NDC-SYSTEM#
C 61778 - PRIMENET
C 617120
C 617121
C 617124
C 617125
C 617127
C 617133
C 617135 - VM/370 ONLINE
C 61737 - VM/370 ONLINE
C 617138 - MASSACHUSETTS INSTITUE OF
C 617139 - MASSACHUSETTS INSTITUE OF
C 617140 - VM/370 ONLINE
C 617151
C 617152
C 617159
C 61763
C 61769 - (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK
C 61770 - BPL-INFORONICS
C 617171 - INTERACT LINE
C 617177 - ERT ENVIRONET
C 617178
C 617179 - ERT ENVIRONET
C 61780 - (TYPE HELP)
C 71424 - GLOBAL DATA TIMESHARING
C 71431 - (TYPE HELP)
C 71620 - UNION CARBIDE
C 80331
C 80423 - CONTROL DATA INTERCOM
C 80424 - CONTROL DATA INTERCOM
C 80426 - BABCOCK AND WILCOX
C 81623
C 81625 - UNINET
C 81626 - UNINET
C 90995D - TELENET NEWS SERVICE
C 91930
C 91931
C 91933 C 91934




Hope you liked the post,Pass the comments

Free Kasperspy 2010 antivirus license


As you know that kasperspky antivirus is the leading antivirus software now days,Kaspersky Lab offers a number of award-winning computer security solutions for the home computer, including antivirus and mobile security software.
A long time ago i wrote an article on How to use kasperspy with out license key,Most of readers requested me to provide them with Free kasperspky antivirus license keys,SO in this article i will provide you with Free kaspersky antivirus license key for 180 days


MSN China, in collaboration with Kaspersky, is offering a free Kaspersky Antivirus 2010 license activation code to users. Just follow the three simple steps below to get your free Kaspersky activation key.
1. Visit the KAV 2010 giveaway page and press the big orange button.
2. Enter your Windows Live login information and sign in.
3. Copy the key and use it to activate your Kaspersky Antivirus 2010.





Leave a comment if you have lost your way

Free Hacking Tools essential For every Hacker

A Hacking tool is a program which helps you in Hacking making it easier for you,Gone are those days when you have to do every thing manually,now a days Hacking tools have made work easier for you,Below i am posting some of Hacking tools essential for every Hacker out there to make the work alot easier,these tools are also actually a Kind of Security tools but it on you how you use them.

Free Essential Hacking tools For every Hacker


IP-Tools offers many TCP/IP utilities in one program. This award-winning Free Hacking tool can work under Windows 98/ME, Windows NT 4.0, Windows 2000/XP/2003, Windows Vista and is indispensable for anyone who uses the Internet or Intranet.
It includes the following utilities 
  • Local Info – examines the local host and shows info about processor, memory, Winsock data, etc. 
  • Name Scanner – scans all hostnames within a range of IP addresses
  • Port Scanner – scans network(s) for active TCP based services 
  • Ping Scanner – pings a remote hosts over the network 
  • Telnet – telnet client 
  • HTTP – HTTP client 
  • IP-Monitor – shows network traffic in real time & many more 
  • IP TOOLS has almost all the utilities built into it.So there is no need to use seperate tools for every indivisual process of hacking such as Port scanning,Whois scanning,IP monitor etc.It’s like a hacking tool kit which has all the necessary tools for hacking.
Cain and Abel (sometimes called simply "Cain") is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.I have made a tutorial on Hack a Computer with Cain and able.


Brutus is a remote online password cracker for windows, good for HTTP,POP3,FTP,SMB,Telnet and lots others.. it's also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page. Development continues so new releases will be available in the near future. Brutus was written originally to help me check routers etc. for default and common passwords.
A very nice Hacking tools.Its general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. It cracks hashes with rainbow tables,Some of its features are :
  1. Full time-memory tradeoff tool suites, including rainbow table generation, sort, conversion and lookup
  2. Support rainbow table of any hash algorithm
  3. Support rainbow table of any charset
  4. Support rainbow table in raw file format (.rt) and compact file format (.rtc)
  5. Computation on multi-core processor support
  6. Computation on GPU (via NVIDIA CUDA technology) support
  7. Computation on multi-GPU (via NVIDIA CUDA technology) support
  8. Runs on Windows XP 32-bit, Windows Vista 32-bit and Windows 7 32-bit
  9. Command line and graphics user interface
  • LC5 (LophtCrack) :
Windows password auditing and recovery application L0phtCrack or LC5 attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, then re-acquired by the original L0pht guys and reborn as LC6 in 2009.
A powerful, flexible, and fast multi-platform password hash cracker John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find HERE


Hope you liked the collection of Hacking tools i will be adding more soon.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers