Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Showing posts with label Pure Hacking. Show all posts
Showing posts with label Pure Hacking. Show all posts

Tuesday, November 1, 2011

Side Jacking - Hack accounts on LAN or Wifi

Side jacking is the process of sniffing cookie information, then use these cookies against websites toget into the victim’s session. We use the term “sidejacking” to distinguish it from man-in-the-middle hijacking as in case of Cain and Abel. In Side jacking,the victim continues to use his/her session blissfully and he remains unaware of it that we are also in his/her account.  

In this tutorial , I will explain the process of side jacking using some tools while the main tools are : 


  • Hamster 
  • Ferret     
NOTE : Although signs such as additional e-mails in the ‘sent’ folders might give a clue.

Contents

  • Preparations
  • Starting Up
  • Using the console

Side Jacking with Hamster and Ferret

Hamster is our wizard.So we will start capturing the cookie and then using them to get into the victim's session. So starting with Hamster :

Part A : Preparations to Set UP for Attack

  • Download Hamster and Ferret tools.
  • These are command line tools means we can make them work using some instructions on command prompt ,but those who are afraid of command line, dont worry, u wont have to do much.
  • Unzip these into a directory which you can access easily e.g. C:\side-jacking
Note : There is one major problem with the Intel® PRO/Wireless 2200BG and some other intel adapters: it doesn’t do promiscuous mode. This means that unlike most other wifi adapters, you can’t use it for sidejacking. To get around this, you would need to buy a cheap USB wifi adapter (usually 1000 rs)
  • First of all to make sure that you’re at browser’s proxy to Hamster, which will be on port 3128. 
  • I will strongly recommend that DON’T use your normal browser, because Hamster will totally screws up the cookies in the browser. So must take the following three precautions ,which i took while using it :
  1. I used Internet Explorer for side jacking, as Firefox is my default browser
  2. Secondly I created a second account called “hamster” in my computer, and did the whole task from that account and then I deleted it.
  3. Next I used the alternate “profile” feature of Firefox to have two profiles running at the same time to feel easy.
I think you didn't get the third step, okay I am gonna explain it:
  • Firefox allows two profiles to be running at the same time. You can easily launch them from the command line as follows:
  • You will have to use these at c:\Program Files\Mozilla Firefox\ 
  • After using these commands, the following screen will popup
  • Click on create profile, give any name.. Next time u start Mozilla use that one for hamster. 
  • Now open your created profile in Firefox, go to the Tools / Options. Select the Advanced Tab and open Network Tab under it. 
  • Now Under connections click on settings. Now set up as following:

Set your proxy as shown and click ok.  

Part B. Starting Up

  • Now we have to run Ferret,so open command prompt 
NOTE : I will recommend to do Side Jacking In administrator mode.
  • Now goto ferret directory (C:\side-jacking) and type ferret-W.
  • Now choose your WiFi or LAN interface (u can try using the company names or try again) 
  • Now in command prompt type ferret.exe –i to start sniffing cookies e.g ferret -i 4 
NOTE : You might also want to capture packets at the same time: ferret.exe –i 4 sniffer.mode=most sniffer.directory=\pcaps
  • The advantage of sniffing packets at the same time is that you can later replay them through Ferret in order to generate a hamster.txt. The cookies last for a long time. 
  • To run a packet capture, do something like: ferret -r \pcaps\sniff-2007-08-04-eth.pcap 
  • Open another command prompt without closing the previous one ( Run as Administrator necessary) 
  • Go to hamster directory(C:\side-jacking)
  • Now type 'hamster' and enter to start hamster proxy. 
  • Now if you have already done the browser configuration as above move on to next part else set the browser proxy to 127.0.0.1 port 3128. 

Part C. Using it!!

  • Open your configure browser and go to http://hamster/ remember don't put . com or www in the name.
NOTE : If you get server not found, you didnt set proxy correctly or you didnt start hamster in cmd.
  • If you are doing everything correctly, you will get this :
  • As Ferret is running in the background, it will be updating this list. You’ll need to manually refresh it to see if any information has been added. 
  • In the right-hand window, you’ll get a list of targets. Most targets will have just the IP address. Some will have additional identifying information that Ferret finds. 
  • This identifying information is only names associated with the IP address, it’s not cookie information.
  • When you click on an IP address, you “clone” it. At this point, all the cookie are set for that IP address. 
Keep in Mind – A lot of problems people have is because they set the current IP address to something else, thereby erasing the cookies of a site they want to access.

  • Cloning an IP address by clicking on it will cause the window to the left to be filled in, as in the following example:
  • You have three options here. 
  1. You can view the raw cookies for this IP address (discussed below). 
  2. You can click on a URL that has a HIGHER probability of being Sidejacked. 
  3. Or you can choose from the URLs below, which have a lower probability of being Sidejacked.
  •  At this point, just click the URL. For example, I clicked on the http://slashdot.org URL in the above example, and the following window popped up:
  • The name “side jacking” in the mid-left of that screenshot is because I created a test account with the username of “side jacking”. This shows how I’ve successfully cloned the cookies to get to that Slashdot account. 
  • And here is the Facebook account:

FootNotes:

  • When things work well, its point-and-click. They don’t always work well. 
  • The first thing that sucks is you have to figure out which interface to sniff on and make sure that you have a proper wifi adapter. 
  • I recommend downloading Wireshark and make sure that you’ve got the packet sniffing working with that product before you start Ferret.For more help on Wireshark read How to Bypass Firewall using Wireshark .
  • Both Ferret and Hamster will crash or hang. You’ll be restarting the programs a lot. Right now, Ferret overwrites ‘hamster.txt’ every time it restarts, so if you’ve got a good session, make copies of it (or log to sniffer files, and recreate it).
  • The Hamster proxy is really slow. You’ll click on a link and have to wait patiently sometimes. Check the Hamster console window in order to see what’s going on.
  • Cloning sites is finicky. Sometimes you have to choose the right URL from the list, and choosing the wrong URL will cause the server to reset the cookies, locking you (and the original person) out from the account until a re-login. It takes practice to figure out what you can, and cannot, clone. 
  • Finally, when the original session cookies expire, you can’t clone them. This is rarely a problem in a live environment, but if you work from capture files, it becomes more difficult.
That is all you gotta know... Now u can try messing up your WiFi or LAN network, also works in some broadbands and internet connections.Comments and queries are welcome.
Thanks!

Credits : Hamster Creator himself  (I used his Help file along with my editing).....

Sunday, November 21, 2010

Find Free Porn Sites Passes

This summary is not available. Please click here to view the post.

Rapidshare Life Time Free Use Premium Account

UNLIMITED download/upload Its very easy to fool RapidShare server if your IP address is assigned by your ISP.
Just follow these simple steps:

Clean up IE or netscape or Firefox cookie( In this case the one that belong to rapidshare website)

On Command prompt (open MS-DOS)
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter

Or save these commands in a bat file and run it everytime you need to fool Rapidshare server. Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download/upload as many files as you want from their server.

another way, get proxies from the internet and apply to the browser.
some of proxies might not work though...

Note:
If you are on a LAN and behind a router (using NAT, for example)---this will not work.
If you use a fixed proxy--- this will not work.
If you have a fixed IP address from your ISP or college or employer or whatever -- this will not work.
If you happen to get the same IP address from your DHCP server because it's assigned to you -- this will not work
No waiting
THIS "cheat" for RAPIDSHARE DOWNLOADS eliminates the "WAITING" for the file. No more COUNTDOWNS. So heres what you do:

1. First, Find a rapidshare download.
2. Hit the FREE BUTTON, like always.
3. While your waiting for it to countdown, change the URL in the bar to:
Code:
java script:c(countdown = 0);
and hit ENTER or the GO button over and over. Eachtime you do so, it decreases 10-20 seconds. Few times and the link appears.
or you can simply do the code below ONCE
java script: for (i=0; i<30; i++) { c(); }



Wednesday, October 13, 2010

EBOMB : A deadly virus

This summary is not available. Please click here to view the post.

Friday, October 8, 2010

Depositfile gold trick

Hey guys today i'll told you how to use Depoistfile gold trick! !! You can download anything with gold account!

Depositfiles Gold account Trick 100% working.
  • step 1: Go to this link http://depositfiles.com/en/payment_sms_tariffs.php 
  • step 2: type this code : n5kit65v
  • step 3: click send....done
  • step 4: No need to change email or password or login.just use as it as. 
  • step 5: now Put any depositfile link and press enter...bang

Thursday, September 30, 2010

Find ADMIN page of sites


HERE I WILL TELL DAT HOW V CAN GET ADMIN PAGE OF MANY SITES.USING SOME TOOLS FOR DAT YEW NEED SUM STUFFS.

FOLLOW THESE INSTRUCTIONS


NOTE :: U HAVE TO DOWNLOAD BOTH D FILES

  •  ENTER THE WEBSITE U WANTED TO SCAN THEN HIT ENTER 
  • THEN ENTER D CODING OF D SITE 
  • IF U DONT KNO D CODING OF D SITE DEN TYPE ANY
  • DEN IT STARTS SCANNING D SITE 
  • WHEN D LOGIN PAGE IS FETCHED 
  • A SUCESS MESSAGE IS DISPLAYED


N NOW ITS OVER ..... Enjoy
 

Wednesday, September 29, 2010

[TUT] Hack Adsense & get unlimited Clicks

In our previous post ,I have discussed What is Adsense and How to Earn Online with Adsense and then I explained the method to Approve adsense account in few days.Now you will be capable of getting an adsense account ,Now the question arises how to make money from adsense.Herez a simple hack to get unlimited clicks. If You Are Thinking That This Hack Is About Getting The Passes Of The Adsense Accounts, Then You Are Wrong.This Is About How To Get Unlimited Impressions And Ads Clicks Without Working For Even A Second.Get traffic into your site, NOW! . No Extra Investment.

  • What do I have to do?
Nothing but keeps your computer ON.Okay. Let us start doing this. As I am a web master as well, I used to buy traffic from others in order to increase my website popularity. However, it doesn’t seem to be working well as it doesn’t do much on the search engine bit and most of them are either fake traffic or too expensive for me. But here, today, I am introducing you a BRAND NEW method that you should KNOW to increase traffic for your site. You don’t have to have any skill or experience, just follow my step you will walk into SUCCESS. You can do this to your site, or you can even SELL traffic to others.

Site Requirements

Site requirement in order to receive traffic:

  • Less than 100kb (Will show you how to check)
  • No Porn content included (On that page)
  • No Virus/Malware
  • No Fancy JavaScript (Those who slow the browser)

So how do I check my page size?

  • It is easy, open up your IE or FireFox. 
  • Press "Ctrl+S" or Files->Save As.
  • Choose FULL WEB PAGE. 
  • Save it anywhere you want and go to that location. 
  • Select the folder and the html page and Right click->Properties. 
  • Look at their disk size and make sure they are under 100KB otherwise it MAY NOT WORK

The Main Thing Starts Here

  • Get into Virtual Visit and register with them.Oh shit, they are in Chinese! Don’t worry, Just follow me.
  • When you enter the homepage, click on the highlighted link.
  • Then Follow This

  

  • Download the RAR File and Unrar it..


  • Now we have to set up your site in their index.

  • You are ALL DONE. Remember to run the software every time you turn your computer on and it wills GENERATE UNLIMITED TRAFFIC to your site. Thank you.
Tip :-  If you have two computer (on different IP), you can use the software with same username to increase traffic.

Enjoy!!!

Tuesday, September 21, 2010

Some cool Hotkeys to work like pro

1) Windows Hotkeys

  • Shift + F10 right-clicks.
  • Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
  • Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.
  • Win + Control + F: Open Find dialog. (Computers)
  • Win + U: Open Utility Manager.
  • Win + F1: Open Windows help.
  • Win + Pause: Open System Properties dialog.
  • Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.
  • Win + Shift + Tab: Cycle through taskbar buttons in reverse.
  • Alt + Tab: Display CoolSwitch. More commonly known as the AltTab dialog.
  • Alt + Shift + Tab: Display CoolSwitch; go in reverse.
  • Alt + Escape: Send active window to the bottom of the z-order.
  • Alt + Shift + Escape: Activate the window at the bottom of the z-order.
  • Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.
  • Shift while a CD is loading: Bypass AutoPlay.
  • Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (MicrosoftWindowsCurrentVersionRun)
  • Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.
  • Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.
  • Printscreen: Copy screenshot of current screen to clipboard.
  • Alt + Printscreen: Copy screenshot of current active window to clipboard.
  • Ctrl + Alt + Down Arrow: Invert screen. Untested on OSes other than XP.
  • Ctrl + Alt + Up Arrow: Undo inversion.
  • Win + B : Move focus to systray icons.

2) Generic

  • Ctrl + C or Ctrl + Insert: Copy.
  • Ctrl + X or Shift + Delete: Cut.
  • Ctrl + V or Shift + Insert: Paste/Move.
  • Ctrl + N: New... File, Tab, Entry, etc.
  • Ctrl + S: Save.
  • Ctrl + O: Open...
  • Ctrl + P: Print.
  • Ctrl + Z: Undo.
  • Ctrl + A: Select all.
  • Ctrl + F: Find...
  • Ctrl+W : to close the current window
  • Ctrl + F4: Close tab or child window.
  • F1: Open help.
  • F11: Toggle full screen mode.
  • Alt or F10: Activate menu bar.
  • Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
  • Escape: Remove focus from current control/menu, or close dialog box.

3) Generic Navigation


  • Tab: Forward one item.
  • Shift + Tab: Backward one item.
  • Ctrl + Tab: Cycle through tabs/child windows.
  • Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
  • Enter: If a button's selected, click it, otherwise, click default button.
  • Space: Toggle items such as radio buttons or checkboxes.
  • Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.
  • Ctrl + Left: Move cursor to the beginning of previous word.
  • Ctrl + Right: Move cursor to the beginning of next word.
  • Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in RichEdit controls.
  • Ctrl + Down: Move cursor to beginning of next paragraph.
  • Shift + Left: Highlight one character to the left.
  • Shift + Right: Highlight one character to the right.
  • Shift + Up: Highlight from current cursor position, to one line up.
  • Shift + Down: Highlight from current cursor position, to one line down.
  • Ctrl + Shift + Left: Highlight to beginning of previous word.
  • Ctrl + Shift + Right: Highlight to beginning of next word.
  • Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
  • Ctrl + Shift + Down: Highlight to beginning of next paragraph.
  • Home: Move cursor to top of a scrollable control.
  • End: Move cursor to bottom of a scrollable control.

4) Generic File Browser


  • Arrow Keys: Navigate.
  • Shift + Arrow Keys: Select multiple items.
  • Ctrl + Arrow Keys: Change focus without changing selection. "Focus" is the object that will run on Enter. Space toggles selection of the focused item.
  • (Letter): Select first found item that begins with (Letter).
  • BackSpace: Go up one level to the parent directory.
  • Alt + Left: Go back one folder.
  • Alt + Right: Go forward one folder.
  • Enter: Activate (Double-click) selected item(s).
  • Alt + Enter: View properties for selected item.
  • F2: Rename selected item(s).
  • Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longest item in each one.
  • Delete: Delete selected item(s).
  • Shift + Delete: Delete selected item(s); bypass Recycle Bin.
  • Ctrl while dragging item(s): Copy.
  • Ctrl + Shift while dragging item(s): Create shortcut(s).
  • In tree pane, if any:
  • Left: Collapse the current selection if expanded, or select the parent folder.
  • Right: Expand the current selection if collapsed, or select the first subfolder.
  • NumpadAsterisk: Expand currently selected directory and all subdirectories. No undo.
  • NumpadPlus: Expand currently selected directory.
  • NumpadMinus: Collapse currently selected directory.

5) Accessibility


  • Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys must be enabled.
  • Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. High Contrast must be enabled.
  • Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys must be enabled.
  • NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must be enabled.
  • Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.
  • 6.) Microsoft Natural Keyboard with IntelliType Software Installed
  • Win + L: Log off Windows.
  • Win + P: Open Print Manager.
  • Win + C: Open control panel.
  • Win + V: Open clipboard.
  • Win + K: Open keyboard properties.
  • Win + I: Open mouse properties.
  • Win + A: Open Accessibility properties.
  • Win + Space: Displays the list of Microsoft IntelliType shortcut keys.
  • Win + S: Toggle CapsLock on and off.

6) Remote Desktop Connection Navigation


  • Ctrl + Alt + End: Open the NT Security dialog.
  • Alt + PageUp: Switch between programs.
  • Alt + PageDown: Switch between programs in reverse.
  • Alt + Insert: Cycle through the programs in most recently used order.
  • Alt + Home: Display start menu.
  • Ctrl + Alt + Break: Switch the client computer between a window and a full screen.
  • Alt + Delete: Display the Windows menu.
  • Ctrl + Alt + NumpadMinus: Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt + PrintScreen on a local computer.
  • Ctrl + Alt + NumpadPlus: Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PrintScreen on a local computer.

7) Mozilla Firefox Shortcuts


  • Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.
  • Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.
  • Ctrl + (1-9): Switch to tab corresponding to number.
  • Ctrl + N: New window.
  • Ctrl + T: New tab.
  • Ctrl + L or Alt + D or F6: Switch focus to location bar.
  • Ctrl + Enter: Open location in new tab.
  • Shift + Enter: Open location in new window.
  • Ctrl + K or Ctrl + E: Switch focus to search bar.
  • Ctrl + O: Open a local file.
  • Ctrl + W: Close tab, or window if there's only one tab open.
  • Ctrl + Shift + W: Close window.
  • Ctrl + S: Save page as a local file.
  • Ctrl + P: Print page.
  • Ctrl + F or F3: Open find toolbar.
  • Ctrl + G or F3: Find next...
  • Ctrl + Shift + G or Shift + F3: Find previous...
  • Ctrl + B or Ctrl + I: Open Bookmarks sidebar.
  • Ctrl + H: Open History sidebar.
  • Escape: Stop loading page.
  • Ctrl + R or F5: Reload current page.
  • Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.
  • Ctrl + U: View page source.
  • Ctrl + D: Bookmark current page.
  • Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.
  • Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.
  • Ctrl + Numpad0 or Ctrl + 0: Set text size to default.
  • Alt + Left or Backspace: Back.
  • Alt + Right or Shift + Backspace: Forward.
  • Alt + Home: Open home page.
  • Ctrl + M: Open new message in integrated mail client.
  • Ctrl + J: Open Downloads dialog.
  • F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.
  • Shift + F6: Switch to previous frame.
  • Apostrophe ('): Find link as you type.
  • Slash (/): Find text as you type.

8) GMail


  • Note: Must have "keyboard shortcuts" on in settings.
  • C: Compose new message.
  • Shift + C: Open new window to compose new message.
  • Slash (/): Switch focus to search box.
  • K: Switch focus to the next most recent email. Enter or "O" opens focused email.
  • J: Switch focus to the next oldest email.
  • N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.
  • P: Switch focus to the previous message.
  • U: Takes you back to the inbox and checks for new mail.
  • Y: Various actions depending on current view:
  • Has no effect in "Sent" and "All Mail" views.
  • Inbox: Archive email or message.
  • Starred: Unstar email or message.
  • Spam: Unmark as spam and move back to "Inbox."
  • Trash: Move back to "Inbox."
  • Any label: Remove the label.
  • X: "Check" an email. Various actions can be performed against all checked emails.
  • S: "Star" an email. Identical to the more familiar term, "flagging."
  • R: Reply to the email.
  • A: Reply to all recipients of the email.
  • F: Forward an email.
  • Shift + R: Reply to the email in a new window.
  • Shift + A: Reply to all recipients of the email in a new window.
  • Shift + F: Forward an email in a new window.
  • Shift + 1 (!): Mark an email as spam and remove it from the inbox.
  • G then I: Switch to "Inbox" view.
  • G then S: Switch to "Starred" view.
  • G then A: Switch to "All Mail" view.
  • G then C: Switch to "Contacts" view.
  • G then S: Switch to "Drafts" view.

9) List of F1-F9 Key Commands for the Command Prompt


  • F1 / right arrow: Repeats the letters of the last command line, one by one.
  • F2: Displays a dialog asking user to "enter the char to copy up to" of the last command line
  • F3: Repeats the last command line
  • F4: Displays a dialog asking user to "enter the char to delete up to" of the last command line
  • F5: Goes back one command line
  • F6: Enters the traditional CTRL+Z (^z)
  • F7: Displays a menu with the command line history
  • F8: Cycles back through previous command lines (beginning with most recent)
  • F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.
  • Alt+Enter: toggle fullScreen mode.
  • up/down: scroll thru/repeat previous entries
  • Esc: delete line
  • Note: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence.

Tuesday, June 15, 2010

Get any co.cc domain free ( hack co.cc )

Just Go to

http://co.cc

And search for the domain you want, Then if you have
to pay it will look like this:

http://www.co.cc/regist/domain_find.php?...DRL&m=cGF5

now take the: &m=cGF5 out so it looks like this:

http://www.co.cc/regist/domain_find.php?d=a2tr&s=SDRL

There you go... you hacked them!


Hack Passwords Using USB Very Fast


hi friends... I just came across this toll... and i would like to share this with u all...

here u go...

USB Steals Pc Passwords
Tweaked USB that steals every passwords including licences.

Instructions:
1.Decompress the archive and put all the files located in the folder "COPY"into a USB.
2.now run the file "hideh.bat"(this makes the files totaly hiden which can not be seen even using show hide option).
3.now delete the fie "hideh.bat"

----------------------------------------
-------
-----------NOW UR READY FOR WORK-----------
----------------------------------------
-------
Wht Next??---Simple
just plug the USB drive into victims pc open up wait for 4 sec and done...


----------------------------------------
------
-----------HOW TO SEE THE DATA?------------
----------------------------------------
------

When u decompressed the archive it created folder named "USBThief_Modified_by_NEO"
go in it
there will b file "showh.bat"
just copy it to usb and double click on it
now refresh
and u will see the all folders in USB
open "IMNeoWorld"
done,,,there u r .. got it??
---------------------------------
-------
---- FEATURE ------------
----------------------------
-----

Visited Links List
Internet Explorer Cache List
Internet Explorer Passwords List
Instant Messengers Accounts List
Installed Windows Updates List
Mozilla Cache List
Cookies List
Mozilla History List
Instant Messengers Accounts List
Search Queries List
Adapters Report
Network Passwords List
TCP/UDP Ports List
Product Key List
Protected Storage Passwords List
PST Passwords List
Startup Programs List
Video Cache List


Sunday, May 23, 2010

Hack websites using Auto SQL I Helper

In the recent posts we have seen the hacking of a site using manual SQL injection,which is essential to know the basics of SQL.Now we are going to check advanced SQL INJECTION.


At the begening "SQLIHelperV.2.7" is a tool that will hack vulnerable websites using SQL injection. You don't have to spend hours and hours trying to find your way in a website and trying hundreds of combinations and codes to hack a website.
This tool will do it all by itself. You only have to tell her what do and where to look.


Lets start.
first you need to find the potential website that you think it might be possible to hack it. Remember that some websites are simply unhackable.


After you find your website ( better to end with "article.php?id=[number]" ) example: "http://encycl.anthropology.ru/article.php?id=1&quot;




Check if your website can be hacked by trying to go this address :
http://www.domain.com/article.php?id=&amp;amp;#39;1 <------ notice the ' before the number 1.


you should get this message:


Query failedYou have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'1 ORDER BY lastname' at line 1 SELECT * FROM person_old WHERE id=\'1 ORDER BY lastname


This mean that this website can be hacked because you get an error.


Now open your SQL I Helper V.2.7
and write the link :
http://www.domain.com/article.php?id=1 <---- without the '


and press the inject button.


Now you should wait until the tool finish searching for columns . Time may vary depending on your connection speed , your pc speed , and the number of columns in the website.


Make sure that the website support union otherwise the injection won't work.


Now select any element from the "database name" box and press the "Get tables" button ,


then select any element from the "table name" box and press the "Get columns" button


then select any elements you want from the "columns name" box and press "Dump Now"


After clicking "Dump Now" , u will see some hashes


Now copy the hash on a peace of paper and go to this website:


http://www.md5crack.com/


enter the hash and press the button "Crack that hash baby!" and you should get the source of the hash.

Online Sites Helpful for SQL Injection

In the last post we have seen how to Hack an Online Site using SQL Injection and then Some Latest Commands for SQL Injection.Now we are going to see some sites which will help in SQL Injection and help us to find the vulnerable sites and also the number of columns ,tables etc.

1) SQL Vulnerability Finder

  • You can find whether the site iz vulnerable for SQL Injection or not through this link
Link : http://sql.wehostsite.com/

2) SQL vulnerability finder script

After finding whether the site is vulnerable or not,just enter the vulnerable site url in the below link and it will return you the following :
  • Order by
  • Selection Id
  • Version
  • Database name

SQL commands [useful for Injection]

In the last post we have seen how to Hack an Online Site using SQL Injection. This technique is quite easy to use and i think its best technique but it is not applicable on new sites using cpanel. As you have understand the whole technique now i am introducing some useful commands related to SQL injection :

Latest Sql Injection Commands

  • ABORT -- abort the current transaction
  • ALTER DATABASE -- change a database
  • ALTER GROUP -- add users to a group or remove users from a group
  • ALTER TABLE -- change the definition of a table
  • ALTER TRIGGER -- change the definition of a trigger
  • ALTER USER -- change a database user account
  • ANALYZE -- collect statistics about a database
  • BEGIN -- start a transaction block
  • CHECKPOINT -- force a transaction log checkpoint
  • CLOSE -- close a cursor
  • CLUSTER -- cluster a table according to an index
  • COMMENT -- define or change the comment of an object
  • COMMIT -- commit the current transaction
  • COPY -- copy data between files and tables
  • CREATE AGGREGATE -- define a new aggregate function
  • CREATE CAST -- define a user-defined cast
  • CREATE CONSTRAINT TRIGGER -- define a new constraint trigger
  • CREATE CONVERSION -- define a user-defined conversion
  • CREATE DATABASE -- create a new database
  • CREATE DOMAIN -- define a new domain
  • CREATE FUNCTION -- define a new function
  • CREATE GROUP -- define a new user group
  • CREATE INDEX -- define a new index
  • CREATE LANGUAGE -- define a new procedural language CREATE OPERATOR -- define a new operator
  • CREATE OPERATOR CLASS -- define a new operator class for indexes
  • CREATE RULE -- define a new rewrite rule
  • CREATE SCHEMA -- define a new schema
  • CREATE SEQUENCE -- define a new sequence generator
  • CREATE TABLE -- define a new table
  • CREATE TABLE AS -- create a new table from the results of a query
  • CREATE TRIGGER -- define a new trigger
  • CREATE TYPE -- define a new data type
  • CREATE USER -- define a new database user account
  • CREATE VIEW -- define a new view
  • DEALLOCATE -- remove a prepared query
  • DECLARE -- define a cursor
  • DELETE -- delete rows of a table
  • DROP AGGREGATE -- remove a user-defined aggregate function
  • DROP CAST -- remove a user-defined cast
  • DROP CONVERSION -- remove a user-defined conversion
  • DROP DATABASE -- remove a database
  • DROP DOMAIN -- remove a user-defined domain
  • DROP FUNCTION -- remove a user-defined function
  • DROP GROUP -- remove a user group
  • DROP INDEX -- remove an index
  • DROP LANGUAGE -- remove a user-   DROP TYPE -- remove a user-defined data type
  • DROP USER -- remove a database user account
  • DROP VIEW -- remove a view
  • END -- commit the current transaction
  • EXECUTE -- execute a prepared query
  • EXPLAIN -- show the execution plan of a statement
  • FETCH -- retrieve rows from a table using a cursor
  • GRANT -- define access privileges
  • INSERT -- create new rows in a table
  • LISTEN -- listen for a notification
  • LOAD -- load or reload a shared library file
  • LOCK -- explicitly lock a table
  • MOVE -- position a cursor on a specified row of a table
  • NOTIFY -- generate a notification
  • PREPARE -- create a prepared query
  • REINDEX -- rebuild corrupted indexes
  • RESET -- restore the value of a run-time parameter to a default value
  • REVOKE -- remove access privileges
  • ROLLBACK -- abort the current transaction
  • SELECT -- retrieve rows from a table or view
  • SELECT INTO -- create a new table from the results of a query
  • SET -- change a run-time parameter
  • SET CONSTRAINTS -- set the constraint mode of the current transaction
  • SET SESSION AUTHORIZATION -- set the session user identifier and the current user identifier of the current session
  • SET TRANSACTION -- set the characteristics of the current transaction
  • SHOW -- show the value of a run-time parameter
  • START TRANSACTION -- start a transaction block
  • TRUNCATE -- empty a table
  • UNLISTEN -- stop listening for a notification
  • UPDATE -- update rows of a table
  • VACUUM -- garbage-collect and optionally analyze a database 
Here you can check some Online Sites helpful for SQL Injection .

where saved passwords are stored

it will help u wen u gain acess in someones pc or u using a system or friend or enemy and u want to know his/her passwords ..........


Enjoy!


# Internet Explorer 4.00 - 6.00: The passwords are stored in a secret location in the Registry known as the "Protected Storage".
The base key of the Protected Storage is located under the following key:
"HKEY_CURRENT_USER\Software\Microso
ft\Protected Storage System Provider".
You can browse the above key in the Registry Editor (RegEdit), but you won't be able to watch the passwords, because they are encrypted.
Also, this key cannot easily moved from one computer to another, like you do with regular Registry keys.


# Internet Explorer 7.00 - 8.00: The new versions of Internet Explorer stores the passwords in 2 different locations.
AutoComplete passwords are stored in the Registry under HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\Storage2.
HTTP Authentication passwords are stored in the Credentials file under Documents and Settings\Application Data\Microsoft\Credentials , together with login passwords of LAN computers and other passwords. 
# Firefox: The passwords are stored in one of the following filenames: signons.txt, signons2.txt, and signons3.txt (depends on Firefox version)
These password files are located inside the profile folder of Firefox, in [Windows Profile]\Application Data\Mozilla\Firefox\Profiles\[Profile Name]
Also, key3.db, located in the same folder, is used for encryption/decription of the passwords.


# Google Chrome Web browser: The passwords are stored in [Windows Profile]\Local Settings\Application Data\Google\Chrome\User Data\Default\Web Data
(This filename is SQLite database which contains encrypted passwords and other stuff)




# Opera: The passwords are stored in wand.dat filename, located under [Windows Profile]\Application Data\Opera\Opera\profile




# Outlook Express (All Versions): The POP3/SMTP/IMAP passwords Outlook Express are also stored in the Protected Storage, like the passwords of old versions of Internet Explorer.  

# Outlook Express (All Versions): The POP3/SMTP/IMAP passwords Outlook Express are also stored in the Protected Storage, like the passwords of old versions of Internet Explorer.


# Outlook 2002-2008: All new versions of Outlook store the passwords in the same Registry key of the account settings.
The accounts are stored in the Registry under HKEY_CURRENT_USER\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\[Profile Name]\9375CFF0413111d3B88A00104B2A6676\[
Account Index]
If you use Outlook to connect an account on Exchange server, the password is stored in the Credentials file, together with login passwords of LAN computers.


# Windows Live Mail: All account settings, including the encrypted passwords, are stored in [Windows Profile]\Local Settings\Application Data\Microsoft\Windows Live Mail\[Account Name]
The account filename is an xml file with .oeaccount extension.


# ThunderBird: The password file is located under [Windows Profile]\Application Data\Thunderbird\Profiles\[Profile Name]
You should search a filename with .s extension.
# Google Talk: All account settings, including the encrypted passwords, are stored in the Registry under HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts\[Account Name]


# Google Desktop: Email passwords are stored in the Registry under HKEY_CURRENT_USER\Software\Google\Google Desktop\Mailboxes\[Account Name]


# MSN/Windows Messenger version 6.x and below: The passwords are stored in one of the following locations:


1. Registry Key: HKEY_CURRENT_USER\Software\Microsoft\MSNMessenger
2. Registry Key: HKEY_CURRENT_USER\Software\Microsoft\MessengerService
3. In the Credentials file, with entry named as "Passport.Net\\*". (Only when the OS is XP or more)


# MSN Messenger version 7.x: The passwords are stored under HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds\[Account Name] 
# Windows Live Messenger version 8.x/9.x: The passwords are stored in the Credentials file, with entry name begins with "WindowsLive:name=".


# Yahoo Messenger 6.x: The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager
("EOptions string" value)


# Yahoo Messenger 7.5 or later: The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager - "ETS" value.
The value stored in "ETS" value cannot be recovered back to the original password.


# AIM Pro: The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\AIM\AIMPRO\[A
ccount Name]


# AIM 6.x: The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords


# ICQ Lite 4.x/5.x/2003: The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\Mirabilis\ICQ\NewOwners\[ICQ Number]
(MainLocation value)


# ICQ 6.x: The password hash is stored in [Windows Profile]\Application Data\ICQ\[User Name]\Owner.mdb (Access Database)
(The password hash cannot be recovered back to the original password)


# Digsby: The main password of Digsby is stored in [Windows Profile]\Application Data\Digsby\digsby.dat
All other passwords are stored in Digsby servers.


# PaltalkScene: The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\Paltalk\[Account Name].

Saturday, May 22, 2010

Hack email thru Brute force

Here is a tutorial how to hack email ids thru brute force,its not so much efficient process because it takes a lot of time .... anyhow i thought to share it with u guys atleast it will give u some knowledge
1.Download Brutus Force from: http://www.hoobie.net/brutus/brutus-download.html

2.Excract on desktop and lets start/ ok run it

3. To hack email in target bar write:
pop.mail.yahoo.com

4.Type most be: POP3

5.Put connections to 60 and timeout to 60

6.Make sure you check a ''Single User''

7.Then when you check that to single user write in that bar you victims yahoo acc ID / explanation .. like googleboy@yahoo.com his ID will be googleboy .. write that

8.Password mod put on: ''Brute Force''

9.Then click ''Range''(a new window will pop up)

10. Then make sure you put ''Min Lenght'' 6 and ''Max Lenght'' to 16

11.Then put custom range .. there will be default Abcd.. etc and some numbers ..

12.Click OK

And for end click Start .. thats all .. now wait for the process to complete.
If you have any question then post in comments.

63 collection of Keyloggers

1 007 Keylogger Spy Software 3.873
2 Active Key Logger 2.4
3 Activity Keylogger 1.80.21
4 Activity Logger 3.7.2132
5 ActMon Computer Monitoring 5.20
6 Actual Spy 2.8
7 Advanced Invisible Keylogger v1.9
8 Advanced Keylogger 1.8
9 Ardamax Keylogger 2.9
10 BlazingTools Perfect Keylogger 1.68
11 Blazingtools Remote Logger v2.3
12 Data Doctor KeyLogger Advance v3.0.1.5
32 Local Keylogger Pro 3.1
14 ExploreAnywhere Keylogger Pro 1.7.8
15 Family Cyber Alert 4.06
16 Family Keylogger 2.80
17 Firewall bypass Keylogger 1.5
18 Free Keylogger 2.53
19 Ghost Keylogger 3.80
20 Golden Eye 4.5
21 Golden KeyLogger 1.32
22 Handy Keylogger 3.24 build 032
23 Home Keylogger 1.77
24 Inside Keylogger 4.1
25 iOpus Starr PC and Internet Monitor 3.23
26 iSpyNow v2.0
27 KeyScrambler 1.3.2
28 Keystroke Spy 1.10
29 KGB Keylogger 4.2
30 KGB Spy 3.84
31 LastBit Absolute Key Logger 2.5.283
32 Metakodix Stealth Keylogger 1.1.0
33 Network Event Viewer v6.0.0.42
34 OverSpy v2.5
35 PC Activity Monitor Professional 7.6.3
36 PC Spy Keylogger 2.3 build 0313
37 PC Weasel 2.5
38 Personal PC Spy v1.9.5
39 Power Spy 6.10
40 Powered Keylogger v2.2.1.1920
41 Quick Keylogger 2.1


Mirror Link 1 Mirror Link 2


Hack someone's passwords


Ardamax Keylogger 2.9 is good, but not as good as Ardamax Keylogger 2.8, reason being is because on Ardamax Keylogger 2.9, when your victim clicks the file, it comes up saying "This will install Ardamax monitoring tool, do you wish to continue?", where as if you use Ardamax 2.8, it will just infect they're PC when they click it, nothing comes up, it'll just auto-install.


A- Getting Ardamax and Registering it.


1. Get Ardamax 2.8 or 2.9 (I HIGHLY recommend 2.8):
Ardamax Keylogger 2.8-http://www.filetransit.com/go.php?id=13459-4-1
Ardamax Keylogger 2.9-http://rapidshare.com/files/151005680/setup_akl2.zip.html


2. Once downloaded, you'll see a little note-pad icon in your desk-top icon bar thing (bottom right of your screen), now right-hand
click it and click 'Enter registration key...', now type in this where it says registration name and under it where it says
registration key:
Name: Membros
Key: CKPIUQDMITNVNRI
Once done click 'Ok' and you should get a pop-up saying 'Registration key accepted. Thanks for registering'


B- the Keylogger Engine.


1. Now your going to make the Keylogger Engine (The thing you send out over msn or whatever). Click 'Remote Installation...', now,


click 'next' until you get to Appearences (it might come up straight away for Ardamax 2.9, but I can't be asked checking).


2. now your at Appearences, click 'Additional components:' and un-tick 'Log Viewer' then click 'Next'.


3. now you should be at 'Invisibility', make sure all the boxes are ticked, then click 'Next'.


4. Now you should be at 'Security', now, click 'Enable' and put your password (it can be any password you like, make it something easy


so you can remember). Once done, make sure all the boxes are ticked and click 'Next'.


5. Now you should be at 'Web Update', just click 'Next' when your here.


6. Ok, you should now be at 'Options', this all depends on you, if you want your Keylogger to be a secret on your computer so your


family know you ain't been up to anything naughty, then tick 'Start in hidden mode' and click 'Next'
(Remember, if in future you want to make a new Keylogger Engine, then press: CTRL + SHIFT + ALT + H at the same time.


7. Ok, now you should be at 'Control', click the box that says 'Send logs every', now make it so it sends logs every 30 minutes, then


where it says Delivery, un-tick 'Email' and tick 'FTP', leave the 'Include' bit as it is, now un-tick the box where it says 'Send only


if log size exceeds', once thats done,


8. Now you should be at 'FTP', ok, creat a free account at DriveHQ.com, then make sure your at 'Online Storage', then make a new
folder called: Logs
(this is where the logs are sent to when you keylogg someone)
Now on your FTP on Ardamax Keylogger, where it says 'FTP Host:', put this: http://ftp.drivehq.com
Now where it says 'Remote Folder:', put this: Logs
Now where it says 'Userame:' and 'Password:', put your DriveHQ username and password
Once done, do NOT change your DriveHQ password or rename/delete the folder called 'Logs', if you do, the logs will not come through.


9. You should now be at 'Control', make sure all the boxes are 'ticked' then click 'Next'.


10. Where it says 'Screen Shots', adjust them as you like, but I recommend every 2 hours and full screen, once done click 'Next'.


11. Now you should be at 'Destination', now you have to choose where you put your Keylogger Engine, where it says 'Keylogger egine
path:', click 'browse' and choose where you want to put your Keylogger Engine (I suggest 'My Documents').
Now un-tick 'Open the folder containing the keylogger engine' (this should stop you from logging yourself) and then choose the Icon
you want for the keylogger engine, choose one and then click 'Next' then 'Finish'.
Watch the video on how to do all this here


C- Binding the Keylogger Engine with another file.


1. Download the Binding Tool:
Easy Binder 2.0----http://rapidshare.com/files/151005958/Easy_Binder.zip.html


2. Open it and then click the little green '+' image in the bottom left corner, then it should browse your files, go to 'My Documents'
(or where-ever you put the Keylogger Engine) and then click the file called 'Install'.


3. Do the same again but don't add the Keylogger Engine (Install), add a picture or something.


4. You need to get a .ico image, this is easy, just go to http://www.chami.com/html-kit/services/favicon/ and upload the Image you
want to be converted to .ico, once its done, click 'download'.


5. On the Binder, click 'Settings' and then where it says 'Select An Icon', click the '...' image and then browse your files, where it
says 'Files of type', scroll down and select 'All Files [*.*]', then select your .ico image which you just made like so;


6. Now on the Easy Binder, where it says 'Set Output File', click the '...' button and then put it where you want your binded files to
be saved (I recommend My Documents so you don't forget), put the name you want on the file and then click 'Save'.


Video link for this tutorial


D- Spread Through HTML

You can also spread it by HTML attck
the server file of your trojan you will have to upload it on some webhosting and then change the link of the server file in the code and then save this code as "index.html" and then upload it to the same host.

All done, now everytime someone opens that webpage they would be infected with your trojan's server



http://tinypaste.com/6b4b3

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers