Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Tuesday, May 1, 2012

Check if your computer is infected or not using Backtrack [VIDEO]

Hey guys how you been ?
Hope everything allright :D

well here is another tutorial you might enjoy .. give it a try

VIDEO





For download links of those tools visit : http://www.pwnscar.in/2012/04/check-if-your-computer-is-infected-or.html



Stay Tuned !!
Thanks :)

Sunday, April 15, 2012

Scanning websites with Vulnerability master.

Hey guys... in this post m giving u a video which is made by Danial shaikh. He used a tool called Vulnerability Master to scan the web and very successfully scanned it! Enjoy


video



Thats all for this post.

Stay tuned ! And thank you !

Monday, April 2, 2012

Effective DoS /DDoS with slowloris


Effective DoS/DDoS with slowloris .


Hey guys how you been ? well if u ask about me ... i'll say " hahahaha.. " :D
anyway in this post i'll explain how to use slowloris.pl for DoS or DDoS attacks. Slowloris is very effective in DoS.

VIDEO











slowloris download



You can download slowloris.pl from HERE.



Hope you guys enjoyed it . Thanks for watching .
Stay Tuned !!!
(comment and like plz )


 Copyright © 2012. All rights reserved by “Kumar Sourav"


Wednesday, March 28, 2012

Command Prompt Tricks+Hacks Premier | part 1





Hey guys how you been ? Hope you rockin it ;-)
Its been requested to make post on Command prompt commands , usage and other tricks. So i'll cover this part in parts .
Anyway if you want to know how to get IP then i have already posted on that , here is the link

>>Get IP of remote PC


Basic commands


  • dir : it lists all the files and directory in current location
  • cd : it takes the control to specified path. eg- suppose you are at c:\> and you type command cd users\public then it'll take you to c:\Users\Public>
  • cd.. : it takes you one directory back
  • systeminfo : it gives you all the information like processor,speed,hotfixes,RAM,hard-disk etc
  • md  : it makes a folder of a name which u have to specify. eg md hello
  • color : sets the color of command prompt and its text
  • echo : it displays the message 
  • echo message >> name.txt : it saves the message you have written to a file ,in this case , name.txt. 

SHUTDOWN


you can use command shutdown with various parameter . eg >>shutdown /s

  • /l : it loggs you off
  • /s : it shutdowns the computer
  • /r : restarts the computer
  • /a : it aborts the shutdown. suppose you have used shutdown /s . it'll shutdown the computer in less then a minute and within that minute if you use shutdown /a then the shutdown process will be aborted
  • /p : turn offs the computer without any delay
  • /h : it hibernates the computer 
  • /s /c message : this combination shutdowns the computer with a message which you have to specify
  • /m : it is used to shutdown a remote computer but for that you have to know the login ID and Password of remote computer :-)

SPECAIL COMMANDS

THERE ARE TWO COMMANDS WHICH ARE HELPFUL IN EVERY SITUATION
  • HELP : THIS DISPLAYS ALL THE COMMANDS YOU CAN USE
  • command /? : this is used to get the information about the specified command . suppose you want to know about md then you have to type md /?  and it'll display the information about that command.


These are very basic commands remember these . In next post i'll start batch file programming.  batch files are really interesting :-)


Hope you enjoyed this .. thanks for reading :)
Stay Tuned !!!
(comment and like plz )


" Copyright © 2012. All rights reserved by “Kumar Sourav"

Thursday, March 15, 2012

BackTrack 5: Using Metasploit to Hack computers





BackTrack 5 : using Metasploit


Hey guys , how u been. Long time since i posted . anyway m back with new tutorials :)
some day ago smarty ujjwal suggested me that i should make videos with explanation by myself instead of putting songs . So thanks to ujjwal and here i am with my first video on how to hack PC on your LAN with metasploit.   Although i used xp cause this is for education purpose. Anyway , you'll the idea on how to use metasploit.


 i dont want you guys to be a script kiddie and use watever u see , i want you to do a little research and make a better hacker :)

Video







Guys plz comment and share and like .... thanks
Stay Tuned !!!!

SUBSCRIBE TO MY CHANNEL FOLKS :)


Copyright © 2012. All rights reserved by “Kumar Sourav" & "xeo hacker

Thursday, February 23, 2012

BackTrack 5: DoS attack simplified and improved [with video] !


Hey guys . how you been ! ?
Well m posting after many days .. sorry for the delay
NOW XEO IS ALSO BACK WITH HIS ORIGINAL IDENTITY i.e ZAIN :D

Any way in this tutorial m gonna show you how to exploit IPv6 using BackTrack 5. Internet is going to use IPv6 very soon but it has a big security hole . its not well knows exploit but m gonna show u anyway.


WAT HAPPENS IN IPv6


Ok wat happens in IPv6 . If you using IPv6 then when you connect to your network the router broadcasts its addresses and your computer joins one of them . wat if we flood the no. of IP addresses . so lets see.

this vuln still works even if the victim isnt using IPv6 but he/she has a system with IPv6 feature enabled ( which is enabled by default in windows systems !


VIDEO




Commands Used


cd /usr/local/bin
./fake_router6 eth0 fff:c0::/64
./flood_router6 eth0




Guys plz comment and share and like .... thanks
Stay Tuned !!!!


Copyright © 2012. All rights reserved by “Kumar Sourav" & "xeo hacker

Saturday, January 28, 2012

Apache server in BackTrack 5R1 : how to host.[with video]

Hey guys . How you been ?
Have you ever hosted files in free web hosting servers like my3gb or x10hosting etc. For what you use them ?
answer may be >> For Phising >>for cookie stealing >>for IP logging etc etc.
sometimes they block your ID . So why dont you create your own server in your own computer . here is the video which explains how to do that using backTrack 5 R1.

Commands Used

  • apache2ctl start
  • mcopy  
  • apache2ctl stop
  • apache2ctl restart

Video



Guys plz comment and share and like .... thanks
Stay Tuned !!!!


Copyright © 2011. All rights reserved by “Kumar Sourav" & "xeo hacker

Thursday, January 19, 2012

BACKTRACK 5 R1 : using w3af to scan website for vulns.




Hey guys , you might be disappointed from HWS because its been a long since we made any tutorial.
Actually Xeo is busy with his projects and me , well m having my SEMESTERS .
okay , i get many queries regarding how to hack a website .So first step should be gathering information and second step must be finding vulnerability in that site so that you can exploit that vulnerability to gain access.

FOR EDUCATIONAL PURPOSE ONLY !

If you using BackTrack then it'll be much easier for you cause in BT w3af is already installed so lets get started !

For BackTrack users


Go to Application > BackTrack > Exploitation > Web Exploitation tools => w3af gui .
Click on w3af gui , a window will apear and there is your w3af.



For Windows


You have to install in manually if you using windows .
You can download it from HERE
When download is completed extract it and you'll find the installation file there. Install it

Using w3af


Now its time to use w3af , its pretty easy. When you start w3af you'll see a window like :


There is a Target text field , you have to enter the URL of the target website there . Below that there is a Plugin and Active tabs . After entering the URL of the website , you have to select the Scan type by selecting those plugins . More plugin you select , more will be the time to scan.

Select the Scan type and press the play button above .

Getting the results


When the scan is running or finished , you'll see a window like :


Can you see the lower right corner , there are 3 pointers with some signs and with numbers 2 0 0 . Those are vulnerabilities no. . If you get numbers on 2nd pointer then you'll have a high rate of success.


Now go to Results . There you'll find the result of the scan .
Above window is Exploits window , if you see anything on middle panel then the site is more vulnerable. Now when you have the vulnerabilities , you can exploit that according to your choice .

Guys plz comment and share and like .... thanks
Stay Tuned !!!!


Copyright © 2011. All rights reserved by “Kumar Sourav" & "xeo hacker

Saturday, December 24, 2011

Must know things in HACKING


Hey guys , how you doing ? hope everything is alryt ! :)
Well some of my friends like ujjwal ;-) asked me about port numbers , IPs , and all those basics . So i thought it would be good if  i post a tutorial on these things .
I'll be explaining these things in brief .

INTRO


So here i start . I'll be explaining about IPs , Port numbers , port scanners , IP scanners , whois and archive.org in brief .
Because in network or web-hacking these are most fundamental and most essential information you are gonna use .


IP


IP is short form of Internet Protocol. Like we all have unique address and u can say phone numbers , every computer connected to any network , that might be internet or any private network , must have its own unique IP.

We track any computer through its IP only . There are two types of IP
  • Static ip - these types of IPs are generally assigned to organizations , like your college or university may have static IP.
  • Dynamic IP - these type of IP are assigned to private users like us . Dynamic IPs keep on changing.
To know about how to find IP of anyone check my tutorial on How to know the IP of your friend .


Port numbers

Port numbers are virtual ports on your computer on which different services are running . like when you browse internet , http - protocol for website browsing , uses port 80 .
When hacking a particular computer on any network , after IP address , port number is the most important thing you need to know . If our desired port is opened , we can exploit that according to our choice . Ports can be closed using firewalls.

Suppose someone says that some website's FTP password is this . now what he mean is , FTP : file transfer protocol , by which you can manage your files on a server via any ftp client , or via your command prompt or terminal , can be used using this password.
Now you must know how to use ftp via your command window. you use ftp command in both linux and window to get it done here is an example :
ftp www..com (23) //23 is optional as default port for ftp is 23

IP and Port scanners


There are lot of tools to know the computers which are connected to a particular network by scanning the network by any of these tools. You just have to give the IP range you want to scan for. I am listing some of the scanners below , these scanners shows you open PORTS too.
  • Angry IP scanner
  • LAN scanner
  • Advanced IP scanner
Just google them to download .


whois


First step in  a mannered website hacking is footprinting or information gathering.
whois is a very popular service used by hackers to get information about whatever website they going to hack.
How to use whois:
simple, just search google for whois , then go to any site and enter the website address there. It will show you details of the website . some usefull links are :
  • http://www.whois.com/
  • http://who.is/
  • http://www.whois.net/


archive.org


This is fun :) .
Go to www.archive.org and put any website address there and then click on TAKE ME BACK button . It will show you the history of that site , like when it was published and the dates when it was modified , how it looked back then. this is also a very good step in footprinting .

Guys plz comment and share and like .... thanks
Stay Tuned !!!!


Copyright © 2011. All rights reserved by “Kumar Sourav" & "xeo hacker"




Tuesday, December 20, 2011

Setup a LAN on your virtual box with video


LAN on your PC


hey guys how u been ? hope everything's fine.

anyway what if you want to experiment or check some attacks and you dont have 2 computers ... well you can use virtual box to setup a lan there :D
its great. give it a try :)


VIDEO


guys like and subscribe the videos plz !



command used


ifconfig eth0 192.168.1.2 netmask 255.255.255.0

Guys plz comment and share and like .... thanks
Stay Tuned !!!!



Copyright © 2011. All rights reserved by “Kumar Sourav" & "xeo hacker"

Wednesday, November 9, 2011

BackTrack : Intro to the beast.

Hey guys how are you... Xeo Hacker suggested that it wud be better to discuss backtrack from very beginning. Although there are previously some posts on backtrack but m marking it as first post . here we go :

What is BackTrack

Although most of you know this still in case you dont , m writing about wat this is actually .
This is basically a Ubuntu/Linux based Operating System in Gnome as well as KDE flavours. BackTrack is named after an algorithm "backtracking" . This is made ,keeping digital forensics and penetration testing in mind.
Backtrack is originated from two earlier distribution who focused on penetration testing:
  • WHAX
  • Auditor Security Collection


whats so special about this  ???


You must have heard backtrack here n there . Why its so special in the field of hacking and why hackers are using it frequently ???
Is it necessary to use BT for hacking ???  These are some questions we'll be discussing here.

Why its so special !!!
It is special because of its pre-installed CLI and GUI tools for hacking ,mostly for penetration testing and digital forensics. It has a lot of inbuilt tools which helps u in a complete Security assesment ....

Is it necessary yo use BT in hacking ???
BT is not necessary but its highly recommended for hacking . If you wish to get benefits of backtrack without using BT then u have to install more than 200 tools . And if u r interested in hacking , why to suffer all these troubles , simply install backtrack.


Tools Included


As i said there are more than 200 inbuilt tools in bactrack , and i cant list all of them , but in backtrack tools are arranged in a very good manners .

BackTrack arranges tools into 12 categories:
  • Information Gathering
  • Vulnerability Assesment
  • Exploitation
  • Privilege Escalation 
  • Maintaining Access
  • Reverse Engineering
  • RFID tools
  • Stress Testing Tools
  • Forensics
  • Reporting tools
  • Services
  • Miscellaneous
Thats it.


Ok guys thats all for this post , will post very soon again.
Hope u enjoyed this post , thank you for reading .
Stay Tuned !

" Copyright © 2011. All rights reserved by “Kumar Sourav" & "xeo hacker" "

Thursday, October 27, 2011

How to use proxy easily in Backtrack 5

Hey guys how u been ??? hope u enjoying , huh !!!
There are a lot of ways to hide your identity , either by single proxy or by multiple proxies like TOR which Xeo Hacker explained in a recent post.

But if u have BackTrack then nothing to worry about you can use proxy very easily and u can use multilple proxies also.

Well its called proxychains ..


So lets get started

wat it does


Well proxychains is a inbuilt tool in backtrack to let u use proxy very easily. It uses proxy according to the configuration file , which we gonna config and it takes u to any address or url via multiple proxies.


proxychains intro



well actually there is a configuration (.conf) file in etc folder . its named proxychains.conf . This is the file where u will do all ur stuffs and u'll hide your identity just by typing a single command once you configure.

Go to terminal and type following command then hit enter
gedit /etc/proxychains.conf

Wat happened ??? there is a gedit window opened with some text in it ... its actually ur config file


Modes or types of proxychains


There are 3 modes of proxychains
  1. dynamic_chain:This uses the list of proxies in the same order as u placed
  2. strict_chain:almost similar to previous one except it will not work if it gets any dead proxy server
  3. random_chain:this is the best .. this chooses and uses proxies randomly

Configuration of the file


u have to open that file with root privilege to edit that file so first issue following command
sudo su
then issue this command
gedit /etc/proxychains.conf
now you have to follow these steps
  • comment out the mode u want to use









as u can see i have commented out random_chain by "//" .
  • now go to any proxy server list .. just google it .. i'll be using socks4 proxy servers so search on google .. then copy some IPs and their port no. and then  paste it where it says add proxy here . refer the pic at last i have added some IPs.

Now your configuration is done .....

How to use proxychains

to use proxychains just have to issue some commands as listed below.
proxyresolv [the site u want to open]

proxychains firefox [the site u want to open ]  (for firefox)


Hope you enjoyed this .. thanks for reading :)
Stay Tuned !!!
(comment and like plz )


" Copyright © 2011. All rights reserved by “Kumar Sourav" & "xeo hacker" "





Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers