Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Showing posts with label Hacking Softwares. Show all posts
Showing posts with label Hacking Softwares. Show all posts

Thursday, October 13, 2011

How to Install BACKTRACK 5 and Manually Specify Partitions Using It

Hello guys ... how are ya ??? wat ??? i didnt hear you !!! .. sorry i cant get u .. comment below ...:D
U must have heard a name BACKTRACK , ( who m i kidding :P ). Anyway i was discussing with xeo to make a thread on backtrack ... he said it wud be awesome . I have been using backtrack 5 for a while and thought i should share with you guys...
well i am a learner so feel free to correct my mistakes :)
M not gonna say wat is backtrack :P ... in this post i'll show u a way to install backtrack 5 r1 on your pc , more on backtrack in later posts...

Download Backtrack 5 r1

  • First of all download backtrack 5 r1 .
  • Select specification according to your pc , and i am using gnome flavor so i wud recommend you that only cause i find it less complicated . select ISO or VMWARE .
  • ISO : If you want to make a dvd (plz plz do this) .
  • VMWARE : if you want to run it on vmware ( :-( ) .
>> select torrent , it wud be easy ...
anyway you know how to download a file :P .

Make a DVD

I will highly recommend you to make a DVD for it cause for hacking backtrack is great and you'll need it in future also . Suppose backtrack crashes .. then wat will you do ?? so make a DVD
burn it in 3x otherwise it wont work

Installing Backtrack 

After you made DVD , boot your PC with it and follow these steps:
  • Boot the live cd and select the first option as in the picture above
  • then a command line or shell will start
  • login with root as login id and toor as password . Ya toor is the default password :P
  • then to start GUI type startx and hit enter.
Now you must be in a GUI with a install.sh or something like that file in desktop, Run that.
It will start the installation procedure.
You must be asked to specify partition for installation . There are three way to do it
  1. By using entire disk : this will format your whole hard disk and install backtrack
  2. Automatically side by side : this option will create partitions automatically and will install backtrack along with other OS present in your system.
  3. Advanced : in this u have to it , this is a little tricky follow these steps below.

Manually Specifying Partitions

Follow these Steps :
  • Select Manual as the partition method.
  • In next window select any drive with free space
  • With the free space line selected, click on the Add button. 
  • In the new window, type memory of you RAM in the New partition size in megabytes field and select the swap area option from the Use as: drop down list. 
  • Click the OK button and, in a few seconds, you'll notice a "swap" line with the specified size.
  • With the "free space" line selected, click on the "Add" button. In the new window, select the "Primary" option, type a value between 10,000 and 50,000 (the memory u want backtrack to use) in the "New partition size in megabytes" field and select / as the "Mount point." 
  • Click the OK button and, in a few seconds, you'll notice an ext4 / line with the specified size.
  • With the "free space" line selected, click on the "Add" button. In the new window, select mount option as boot and allocate it a 150 mb or so memory. 
  • Now click the forward button to install it.

DONE

Now you must have doubts , feel free to ask.
I'll continue this only if u show interest , i have some really cool stuffs on backtrack. so plz comment on the post. A comment from you too is required xeo .

HOPE THIS WAS INFORMATIVE FOR YOU , THANK YOU.

Copyright © 2011. All rights reserved by “Kumar Sourav" and "xeo hacker"

Monday, February 14, 2011

Record Your Skype Calls With CallGraph Skype Recorder

CallGraph Skype Recorder is a free application for recording Skype calls. No matter how long the conversation, this program will record as long as you are connected. With this application, you just have to focus on communicating with the other party and the application will take care of everything else.

It offers a small interface that’s easily managed. You will first be prompted to connect the application with Skype. It takes five simple steps to get connected, and users are guided throughout the way. The application icon in the System Tray will display a green tick when it is properly configured with Skype. If you still don’t see the green tick, you should try restarting Skype. Once the application is connected with Skype, you can start making calls. The application will start recording as soon as the conversation starts. You will be prompted when the recording starts and finishes.

call graph

For advanced configurations, right-click on the application and select Configuration. Under these settings, you can specify the location of the recorded files. You can choose to record the files as MP3 or WAV. Other audio options, such as Channels, Sampling Rate and Bit Rate can also be specified. You can also decide if you want to record calls automatically or manually.

call graph configuration
It offers a simpler interface and is more easily managed than other Skype recording tools we’ve tested. Like other similar applications, this tool also has to be connected with Skype before recording can be initiated.
This application supports Windows XP, Windows Vista and Windows 7. Testing was carried out on Windows 7 x86 system.


Friday, February 4, 2011

AthTek NetWalk – Network Monitoring, Packet Sniffing & Analysis

AthTek NetWalk Personal Edition is a robust application to help in the administration of all kinds of networks. It is particularly useful for new network administrators who wish to gain in depth knowledge about network infrastructure and management. AthTek NetWalk contains graphical representations of the network with the use of advanced packet sniffing, to help project the network state in statistical and graphical format.

After installation, you will be prompted to select a network adapter to view stats from. You can also enable capturing packets in promiscuous mode by checking the relevant checkbox. Chose an adapter and hit Ok.
Select Adapter

This will represent the overview of the network stats in a graphical user interface. This includes a monitoring dashboard, top MAC hosts pie chart, top IP hosts chart, and layered summary of application, net/transport and physical layers.
AthTek NetWalk - Microsoft

You can either click on any of the categories of the layered summary of application, net/transport and physical layers or select the Layered View option from the top left corner of the main interface (below the Overview tab below Monitoring). The layered view can be utilized to view information regarding DNS name resolution, HTTP – World Wide Web, QQ – Technet IM, ICMP Analysis, MAC hosts, VLAN, SMTP, Telnet and much more.
Layered view

You can also chose the Events option below layered View to analyze network integrity and see a map of the network via the Matrix Map option (below Events).
Matrix Map

Graphs
To see a graphical representation of the network state click on the Graphs tab (below Matrix Map). From here, you can view current utilization, application layer protocol packets, ping requests and replies, TCP vs UDP, ARP requests and replies, broadcast vs multicast total, DNS (successful and failed queries), packet size distribution and TCP SYNs, Fins and RSTs.
AthTek NetWalk is a comprehensive network infrastructure analysis tool which helps in managing, maintaining and troubleshooting all kinds of networks. It works on Windows XP, Windows Vista, Windows 7 and Windows Server 2008.
Download AthTek NetWalk Personal Edition (Free Edition)

Thursday, February 3, 2011

Block Website Within Defined Time Range In Chrome

face
Google Chrome users looking for a simple way to block websites can try Website Blocker. It is intended to set users focus straight on work by allowing them to block those frequently used websites which act as a catalyst in loosing focus. You can use it to prevent kids from opening websites which contain explicit adult content, chat rooms, etc. One interesting aspect is that you can apply a time limit for keeping websites completely in-accessible in office timings. You can for instance block Facebook in work hours by specifying 0800-1700, so you can keep focus on work instead of socializing in defined span of time.

After the extension is installed, you need to enter the website URL with a time range to block the accessibility. It provides some samples which you can modify to instantly block a list of websites. The time limit and block function can be enabled/disabled from Basic Settings. Once you have listed all the URLs with time ranges, verify by accessing the blocked webpage.If it’s still accessible, restart the browser and clear the cache.
When the blocked page is accessed, it shows default message “Can’t access to this page”. However, you can change this message from Options page.
option 2
The extension is in experimental stages yet works fine without showing any problems. Nonetheless, we feel that it’d have been great if password protection was provided.

Website Blocker extension for Google Chrome

Monday, January 31, 2011

Ninite Easy PC setup

Install multiple apps at once without toolbars or clicking Next using Ninite .

1. Pick your favorite software .
2. Click "Get Installer" and run it.
3. You're done!  

No Toolbars
Ninite says "No" to toolbars
and other junk.
    No Clicking Ninite automates installers offscreen.
    32 and 64-bit Ninite installs the best version of an app for your PC.
    International Ninite installs apps in your PC's language.
    Fast No manual labor means installs finish quickly.
    And More Ninite Pro has even more features.
    CLICK HERE to enjoy the site.

Sunday, January 30, 2011

Windows password cracker tool - Ophcrack

What is ophcrack?

Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.

Features:

  • Runs on Windows, Linux/Unix, Mac OS X, ...
  • Cracks LM and NTLM hashes.
  • Free tables available for Windows XP and Vista.
  • Brute-force module for simple passwords.
  • Audit mode and CSV export.
  • Real-time graphs to analyze the passwords.
  • LiveCD available to simplify the cracking.
  • Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.
  • Free and open source software (GPL).

Sunday, November 21, 2010

Mobile phone spy software

You can now easily find out who your partner, business associates, and friends have been in contact with. Whether you are suspicious of an affair, or would just like information that will help progress your career, you can now do all of the following using your mobile phone, and the person you are targeting will not suspect a thing. Guaranteed!
Ultimate Bluetooth Mobile Phone Spy Software Edition 2008 will work on All mobile devices that are bluetooth enabled. Not just phones but also laptops, computers, etc. YOU WILL RECEIVE SEPERATE SOFTWARE FOR OLD MODELS AND NEW MODELS (INCLUDING SYMBIAN PHONES). No need to list compatible phones - this works on ALL phones!


Not just 1 program but an entire suite that will work on old phones, new phones, smart phones, java phones - on absolutely all of them!
  • VIEW CONTACTS LIST
  • READ TEXT MESSAGES (SMS)
  • VIEW CALLS MADE / CALLS RECIEVED
  • SET THE TARGET PHONE TO CALL YOU WHENEVER IT MAKES OR RECEIVES A CALL
  • VIEW PHOTOS

MANY MORE FUNCTIONS

ALL THE ABOVE INFORMATION CAN EASILY BE DOWNLOADED TO YOUR PHONE

MAKE CALLS VIA THE PHONE YOU HAVE TARGETED
NO RANGE LIMITATION - SPY FROM ANYWHERE!
Once the target phone has been remotely set you do not need to be in Bluetooth range to listen to calls.

There is no trace or logging of your phone's details on the target phone
That means: THEY WILL NEVER KNOW



Download:
2008 version:

http://hotfile.com/dl/33832004/8465ad9/Ultimate_Bluetooth_Mobile_Phone_Spy_Software_Edition.rar.html

2010 version:

http://hotfile.com/dl/52746687/8ff4fb2/Ultimate.Bluetooth.2010.rar.html



Saturday, October 23, 2010

Test Your Anti-virus Program

You have an anti-virus program. How can you test that it works?

This is a good question and it is wise to familiarize yourself with how your anti-virus software behaves when it detects a virus, before it really happens. One quick way to do this is to use the EICAR Anti-Virus Test File. This is a test file that will cause no damage to your system and still allow you to test if anti-virus tool is awake.

Here are some steps:

1. Open a text editor (e.g. Notepad)

2. Enter the following text in it:

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

3. Save the file as EICAR.COM on your desktop.

4. Open DOS and try to execute this .COM file (or simply double-click the file on Desktop)

If your anti-virus software is working properly, it will warn you that a virus has been detected when you attempt to run the .COM file.

To be double-sure, zip this file, and then try double-clicking on the ZIP file to see if your AV tool recognized viruses inside ZIP files. You can also send this file to yourself as an attachment, just to verify if your AV tool has command of email cleanliness.



 

Best proxy ever!!!

Best proxy ever!!! Password protected!!!
1) Go to www.sefreak.com

2) The "Scholar Experience" crap is REAL, it really has an academic portal
3) Click on the hidden lock icon in the upper right
4) User: student
5) Pass: random1
6) Click explorer

Friday, October 8, 2010

Unlock the password protected memory card

I have seen such a case when one my friend forgot the password of his memory card of his mobile phone and he have some very important data in the memory card which he want to recover, he tried almost everything then he lost hope and then asked the mobile phone company to find the way to recover the data from the memory card.

But you don’t worry if you are having the same problem…as now there is a much simple and easy way out.


Requirement: You need a file explorer like FExplorer


How to Unlock MMC card:
=====================

1) Insert card into your phone but don’t access it through phone.
2) Run FExplorer in the mobile and Open the path C:system.
3) You will find a file called mmcstore ,rename the file mmcstore.txt
4) Copy that file(mmcstore.txt) to your pc and open that file in notepad.
5) You will find your password in that file.

Enjoy .....

Thursday, September 30, 2010

Find ADMIN page of sites


HERE I WILL TELL DAT HOW V CAN GET ADMIN PAGE OF MANY SITES.USING SOME TOOLS FOR DAT YEW NEED SUM STUFFS.

FOLLOW THESE INSTRUCTIONS


NOTE :: U HAVE TO DOWNLOAD BOTH D FILES

  •  ENTER THE WEBSITE U WANTED TO SCAN THEN HIT ENTER 
  • THEN ENTER D CODING OF D SITE 
  • IF U DONT KNO D CODING OF D SITE DEN TYPE ANY
  • DEN IT STARTS SCANNING D SITE 
  • WHEN D LOGIN PAGE IS FETCHED 
  • A SUCESS MESSAGE IS DISPLAYED


N NOW ITS OVER ..... Enjoy
 

Tuesday, June 15, 2010

Remotely Control a Computer using UltraVNC

UltraVNC is an easy to use software that can display the screen of another computer (via internet or network) on your own screen.This Computer Tool allows you to use your mouse and keyboard to control the other PC remotely. It means that you can work on a remote computer, as if you were sitting in front of it, right from your current location.

If you provide computer support,you can easy access your customer´s computers from anywhere in the world and resolve helpdesk issues remotely !

Your customers don´t have to pre-install software or execute complex procedures to get remote helpdesk support. UltraVNC allows you to remotely control a computer over any TCP/IP connection.

UltraVNC emulates the destination computer to make it look as if you were in front of it.

Note : Allow trusted person to use ultraVNC on your computer as after allowing he can get anything out of your computer.

Sunday, May 23, 2010

Hack websites using Auto SQL I Helper

In the recent posts we have seen the hacking of a site using manual SQL injection,which is essential to know the basics of SQL.Now we are going to check advanced SQL INJECTION.


At the begening "SQLIHelperV.2.7" is a tool that will hack vulnerable websites using SQL injection. You don't have to spend hours and hours trying to find your way in a website and trying hundreds of combinations and codes to hack a website.
This tool will do it all by itself. You only have to tell her what do and where to look.


Lets start.
first you need to find the potential website that you think it might be possible to hack it. Remember that some websites are simply unhackable.


After you find your website ( better to end with "article.php?id=[number]" ) example: "http://encycl.anthropology.ru/article.php?id=1"




Check if your website can be hacked by trying to go this address :
http://www.domain.com/article.php?id=&amp;amp;#39;1 <------ notice the ' before the number 1.


you should get this message:


Query failedYou have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'1 ORDER BY lastname' at line 1 SELECT * FROM person_old WHERE id=\'1 ORDER BY lastname


This mean that this website can be hacked because you get an error.


Now open your SQL I Helper V.2.7
and write the link :
http://www.domain.com/article.php?id=1 <---- without the '


and press the inject button.


Now you should wait until the tool finish searching for columns . Time may vary depending on your connection speed , your pc speed , and the number of columns in the website.


Make sure that the website support union otherwise the injection won't work.


Now select any element from the "database name" box and press the "Get tables" button ,


then select any element from the "table name" box and press the "Get columns" button


then select any elements you want from the "columns name" box and press "Dump Now"


After clicking "Dump Now" , u will see some hashes


Now copy the hash on a peace of paper and go to this website:


http://www.md5crack.com/


enter the hash and press the button "Crack that hash baby!" and you should get the source of the hash.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers