Popular Post

7 Must Have Tools For Every Hacker

By : Unknown

7 Must Have Tools For Every Hacker

Its been a while since I have posted about some hacking tools and with increasing number of emails asking me to do an  7 Must Have Tools For Every Hackerarticle on it, I finally decided to cover it up.Hacking tools are developed by some really good coders out there to ease out many complex tasks which have to be done manually and took painstakingly great deal of time and effort.All these tools provided here are free of cost,are tried hands on and are being actively developed by community,and if not,their alternatives are provided.To summarize it up, these are the 7 must have tools for every hacker out there.

1. Nmap
I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to Nmap rapidly scan large networks, although it works fine against single hosts.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use,and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a "map" of the network.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.Can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results.

Download Nmap

2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
Download Nessus

3. Wireshark
Wireshark is a GTK+-based  Wiresharknetwork protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! .
Download Wireshark

4. Cain and Abel
The swiss knife of hacking tools..Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
Download Cain and Abel

5. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with  Kismetany wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon
Download Kismet

6. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a NetStumbler nice interface, good for the basics of war-driving. NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
  1. Verify that your network is set up the way you intended.
  2. Find locations with poor coverage in your WLAN.
  3. Detect other networks that may be causing interference on your network.
  4. Detect unauthorized rogue access points in your workplace.
  5. Help aim directional antennas for long-haul WLAN links.
  6. Use it recreationally for WarDriving.
Download NetStumbler

7. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan. If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
Download Superscan

Alternatively, you can try Angry IP Scanner which is a pretty good replacement for 
some of  download links have been deleted ....but can be founded on torrentz,4shared 
i
Tag : ,

Session Hijacking Tool 'Droidsheep' - Download and tutorial

By : Unknown

Session Hijacking Tool 'Droidsheep' 

session hijacking www.hackyshacky.com www.hackyshacky.com

Session Hijacking refers to an attack in which a hacker temporarily hijacks the ongoing session of the user and he is able to see what the user is doing on his mobile,computer be it accessing facebook,gmail or any other site.
P.S.- Rooted Android is required .
Steps of using :
1.Open the app.
2.Check "ARP-Spoofing" and "Genreic Mode".
3.Click on Start.
4.In some time you will start getting various sessions on the same network of wifi.Click on then see what the person is doing.

Top 10 Ways to Hack Facebook Accounts

By : Unknown

Top 10 Ways to Hack Facebook Accounts


Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers have , I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2013, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the top 10 methods how hackers can hack facebook accounts.

10 Ways How Hackers Can Hack Facebook Accounts

So here are the top 10 methods which have been the most popular in 2012:

1. Facebook Phishing 




Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.
2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealers 



Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful.
4. Session Hijacking




Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's.

5. Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.
6. Mobile Phone Hacking



Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.
7. DNS Spoofing 


If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.

8. USB Hacking 

Usb password stealer
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser, I have also posted related to this attack which you can read by accessing the link below:
  • How to make Your Pen-drive (USB) a Password Stealer
9. Man In the Middle Attacks


If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article,
10. Botnets 


Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.
Tag : , ,

What is Backtrack & How to Use it?

By : Unknown

What is Backtrack & How to Use it?

hackingtweaks.com backtrack
Hello readers! This is the very first article of a series of articles which I'll be posting on one of the Best tools used in hacking - "Backtrack". I hope you enjoy reading. Do show your support by commenting and subscribing by mail for Backtrack and other updates for free!
       
Backtrack is Linux Based Penetration Testing Operating system which provides many inbuilt tools which are used for vulnerability assessment, exploitation and penetration testing. Apart from using metasploit framework on backtrack there is a complete series of "Exploitation Tools". The tools in Backtrack are divided into following broad categories :
  • Information Gathering
  • Vulnerability Assessment
  • Exploitation Tools
  • Privilege Escalation
  • Maintaining Access
  • Reverse Engineering
  • RFID Tools
  • Stress testing
  • Forensics
  • Reporting Tools
  • Services
  • Miscellaneous
Download it from torrent or 4shared 
if want link comment or contact me....
By : Unknown

How to Hack Facebook Accounts with Backtrack 5


Step 1 : Open set Tool in Backtrack 5 : To open it follow the step shown above .


Step 2 : Time to set the Website Attack Vectors : Below Menu   enter your choice : 2.Website Attack Vectors and press Enter .


Step 3 : Select your Attacking Method , Here i choose 
3. Credential Harvester Attack Method.


Step 4 : Select Attack Vectors :write  2. Site Cloner and press enter as shown in the image . 

Step 5: Enter the Url: To make a clone to facebook login page I entered https://www.facebook.com and press enter . As I press enter it will automatically generate a clone page .


Step 6 : To continue the process you have to put * sign and press enter.


Step 7 : Process will continue as shown in the image above .


Step 8: Open terminal and enter ifconfig command . It will shown your ip address . Now copy the ip address .



Step9 :Open Web Browser and  Paste the system ipaddress into Address bar and it will redirect to the facebook login page .
Now Enter your anything to check it will work or not . 
FOR EXAMPLE: Here I use 
Email : h4x00r
Password:hackingDNA.com

And Press Enter . Let see what happen on the Next step .


Step 10 : In step 7 the process start you remember now when you follow step 8 and step 9  ,then it will come up with  all the details of Username and Password . 

This is how we set a trap and hack victim facebook and password only on Backtrack 5

Backtrack 5 : Using Armitage For Hacking.

By : Unknown

Backtrack 5 : Using Armitage For Hacking.

Stealing Files,Downloading Keystrokes,Controlling Webcam from remote Locations,ETC by Armitage.
Armitage is an GUI Platform for Metaspoilt and in technical terms,it is a script-able red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework.It saves time and is very powerful in commencing Metaspoilt attacks.
So Now about our attack today : 

What Do We Need ?

Latest Metasploit framework.
Oracle Java 1.7
Preferably Internet on LAN
Brains and Patience.

Now Lets Us Start Our Hack Today.

Step 1 -Open armitage on Backtrack 5:

By Going To : Backtrack > Exploitation Tools > Network Exploitation Tools > Metasploit Framework > armitage.

Step 2 : Connect Armitage:

Click on the connect Button .

Step 3 : Connecting Armitage :

Now use the patience part,and stretch your legs,it takes some time to connect.

Step 4 :  Armitage Window :

It has 3 Panels -
Target Panel 
Module Panel
Tabs Panel 

Step 5 : Finding the alive host on the Network :

Now you will search for Host on you network,By Going to Hosts -> Nmap Scan -> Quick Scan (OS detect).This will perform a quick scan to detect the host and their operating systems and vulnerabilities.

Step 6 : Inputting The Scan Range :

Now You have to insert scan range,that is you LAN ip range,Most preferably it would start with 192.168.0.- or 10.0.0.-.NOTE : the ( - ) resembles the computers on LAN.
Start the Scan.

Step 7 : Scan Complete:

After the scan has completed,if their are any other PC's on your network on,then they would be visible in the Target Pane (the Big Black box on the upper right).

Step 8 : Finding Attacks :

Now the Fun Parts starts,Click on Attacks tab in your toolbar and select Find Attacks (Not hail mary,you might not be ready for that).Start the scan and wait till it completes.

Step 9 : Set the vulnerability :

Right Click on the Host icon (windows pc) -> Select attacks -> smb -> ms08_067_netapi  vulnerability . 
Now a window should pop,Click on the check-box that says "Use  a reverse connection" .
Start Attack

Step 10 : The Final Result :

So did the Host Icon Turn Red ? That Means YOU PASSED.

So You Did The Hacking Part Right,Now let us mess with the client.

Hack 1 - Opening Command Prompt :

Right click on the host -> Meterpreter1 ->Interact -> Command Shell 
Now You are In Their Command Prompt,You can now change,rename,delete,create files on their pc now.Search Google for some powerful windows commands.

Hack 2 - Start an KEYLOGGER :

Click on the Meterpreter2 -> Explore -> Log Keystrokes.
Now you will receive what the victim is typing.

Hack 3 - Take An Screen Shot :

Click on the Meterpreter2 -> Explore ->Screenshot.
Now you can see what is on their Facebook wall or Google mail accounts.

Hack 4 -Browse Files :

Right click -> Meterpreter2 -> Explore > Browse Files .
Now you can interact with all the files on victim PC via a GUI.

Hack 5 - Get in His Webcam (my favorite part).

Right click -> Meterpreter2 ->Explore -> Webcam shot
Catch that guy making out ,and have fun with him later.

hack Website with Basic HTML Coding

By : Unknown

hack Website with Basic HTML Coding

Edited by June, Chris Hadley, Max1508, Skycaptain95 and 59 others
If you have basic HTML and JavaScript knowledge, you may be able to access password protected websites. This article will give you an easy method to hack simple, less-secured websites of your choice simply through HTML. Use it responsibly.

Note: This basic method works only for websites with extremely low security barriers. Websites with robust security details will not be susceptible to this kind of simple attack
Steps
  1. Hack a Website with Basic HTML Coding Step 1.jpg
    1
    Open the site you want to hack. Provide wrong username/password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be prepared your experiment starts from here.

    2
    Right click anywhere on that error page =>> go to view source.
  2. Hack a Website with Basic HTML Coding Step 3.jpg
    3
    There you can see the HTML coding with JavaScript.• There you find somewhat like this....<_form action="...Login....">• Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=http://www.targetwebsite.com/login.......>")
  3. Hack a Website with Basic HTML Coding Step 4.jpg
    4
    Then delete the JavaScript from the above that validates your information in the server.(Do this very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information)
  4. Hack a Website with Basic HTML Coding Step 5.jpg
    5
    Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=password>" with "<_type=text>". See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write )
  5. Hack a Website with Basic HTML Coding Step 6.jpg
    6
    Just go to file => save as and save it anywhere in your hard disk with ext.html(e.g.: c:\chan.html)
  6. Hack a Website with Basic HTML Coding Step 7.jpg
    7
    Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.
  7. Hack a Website with Basic HTML Coding Step 8.jpg
    8
    Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.

Send self-destructing messages with Burn Note

By : Unknown

Send self-destructing messages with Burn Note

 
You can feel like a spy by e-mailing messages with Burn Note, which are then destroyed after your recipient opens them.

If you want to send sensitive or confidential information via e-mail without leaving a digital trail, or if you just want to feel like a spy, give Burn Note a try. You compose a message on the Burn Note site, which then gives you a link to send to your friend or double agent. When the recipient opens the Burn Note, a timer starts counting down before the message is destroyed
You don't need to create an account to send messages with Burn Note. Simply type in a message and hit Send. You'll be given a link to copy, which you can then e-mail. If you sign up for an account, you will receive confirmation when the note is opened.
 
There are a few options when sending a Burn Note that can make your message even more top secret. You can send your note to display as plain text or you can choose two options that make your message harder to copy or for prying eyes to see it. You can send it so that it appears as a series of short phrases, making it harder for someone to take a screenshot of your message. Or you can send it in spyglass mode, which blacks out the message, forcing the recipient to hold down the mouse button to view a small portion of the message.
You can also password protect a Burn Note; presumably, you would send along the password when you e-mailed the Burn Note link.
Spyglass mode.
By default, the self-destruct timer is set for 3 minutes, but you can set for any time you'd like. As soon as your recipient opens the message, the counter above the message begins counting down. When it hits zero, the message is deleted. The developer states on the FAQ page that "once a Burn Note has been viewed it is completely deleted from our servers and from the recipient's computer."
You can send messages without a timer; notes sent without a timer set will remain in existence until your recipient clicks the "Burn It!" button below the message, closes the browser window, or leaves the page. Also, all unread Burn Notes are deleted after 72 hours
Tag : ,

SEF (Social Engineering Framework) V 1.0 Features

By : Unknown
SEF (Social Engineering Framework) V 1.0 Features

You would say that today's topic is lame PHISHING but let me tell you that phishing is not so lame, it helps a lot (in anyways). And this topic is not just copying the source code of login page, no script work, nothing like this. It's a framework attack.

It’s a free and open source Social Engineering Framework (SCRIPT) that helps the phishing attacks and fake emails. and it’s includes phishing pages, fake email, fake email with file attachment and other stuff that helps you in Social Engineering Attack. The application is coded in PHP and it has a  very good interface that called Metro interface.

               





SEF (Social Engineering Framework) V 1.0 Features




Metro Interface
Coded in PHP 
User Friendly
All Modern Browser Supportable
Phishing With MySQL DataBase
Phishing Data arranged by MYSQL Databse.
Fake Email
Fake Email With Attachment Support
Fake Email With Boombing  [Avilable in Ver 2.0]
SEF Login Page

               


SEF  Forgot Password  Recovery

                                  


SEF  Dashboard

 
SEF  Phishing Links Page

            


  
SEF  Phishing  Data Page

            





SEF  Fake Email Basic Interface

          


SEF  Fake Email  Advanced Interface
       


                   
                                  
 Download : SEF v1.0
 
Now let me tell you how to configure it for Real Action


Step 1: First create the database named "sef".
        



         


Step 2: Now open the browser and upload the folder of SEN to the server.

Step 3 : Goto PhpMyAdmin and  Import sef.sql file. 
                 

  

Step 4: Select sef database and navigate to sef_mainuser table.
          


    


Step 5: change username and password row.

Step 6: Let's have a look at db.php file.
 
 
  

Step 7: Set base name, server name, username and passowrd 
For Example [000WebHost]
$base=" a3786786_sef ";
$server=”mysql1.000webhost.com”;
$user=" a3786786_sef ";
$pass="yourpass";


Step 8: Open the URL http://www.yoursite.com/



Step 9: Login with your creadintial.
 Enjoy or Have Fun.................
Tag : , ,
Top | Home | About | Write For Us | Contact | Privacy Policy | Term Of Use | Sitemap
Copyright © 2014 kuch.in All Rights Reserved. Designed by Ashacks Team