7 Must Have Tools For Every Hacker
By : Unknown7 Must Have Tools For Every Hacker
Its been a while since I have posted about some hacking tools and with increasing number of emails asking me to do an
article
on it, I finally decided to cover it up.Hacking tools are developed by
some really good coders out there to ease out many complex tasks which
have to be done manually and took painstakingly great deal of time and
effort.All these tools provided here are free of cost,are tried hands on
and are being actively developed by community,and if not,their
alternatives are provided.To summarize it up, these are the 7 must have
tools for every hacker out there.
1. Nmap
I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to
rapidly scan large networks, although it works fine against single
hosts.Many systems and network administrators also find it useful for
tasks such as network inventory, managing service upgrade schedules, and
monitoring host or service uptime. Nmap uses raw IP packets in novel
ways to determine what hosts are available on the network, what services
(application name and version) those hosts are offering, what operating
systems (and OS versions) they are running, what type of packet
filters/firewalls are in use,and dozens of other characteristics. It may
be used to discover computers and services on a computer network, thus
creating a "map" of the network.Nmap
runs on most types of computers and both console and graphical versions
are available. Nmap is free and open source.Can be used by beginners
(-sT) or by pros alike (packet_trace). A very versatile tool, once you
fully understand the results.
2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.Nessus is the worlds
most
popular vulnerability scanner used in over 75,000 organizations
world-wide. Many of the worlds largest organizations are realizing
significant cost savings by using Nessus to audit business-critical
enterprise devices and applications.
3. Wireshark
Wireshark is a GTK+-based
network
protocol analyzer, or sniffer, that lets you capture and interactively
browse the contents of network frames. The goal of the project is to
create a commercial-quality analyzer for Unix and to give Wireshark
features that are missing from closed-source sniffers. Works great on
both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! .
4. Cain and Abel
The swiss knife of hacking tools..Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
5. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with
any
wireless card which supports raw monitoring (rfmon) mode, and can sniff
802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as
your card supports rfmon
6. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a
nice interface, good for the basics of war-driving. NetStumbler is a
tool for Windows that allows you to detect Wireless Local Area Networks
(WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
7. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan. If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
Alternatively, you can try Angry IP Scanner which is a pretty good replacement for
1. Nmap
I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to
Download Nmap
2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.Nessus is the worlds
Download Nessus
3. Wireshark
Wireshark is a GTK+-based
Download Wireshark
4. Cain and Abel
The swiss knife of hacking tools..Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
Download Cain and Abel
5. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with
Download Kismet
6. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a
- Verify that your network is set up the way you intended.
- Find locations with poor coverage in your WLAN.
- Detect other networks that may be causing interference on your network.
- Detect unauthorized rogue access points in your workplace.
- Help aim directional antennas for long-haul WLAN links.
- Use it recreationally for WarDriving.
Download NetStumbler
7. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan. If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
Download Superscan
Alternatively, you can try Angry IP Scanner which is a pretty good replacement for
some of download links have been deleted ....but can be founded on torrentz,4shared
i
Tag :
hacking,
Session Hijacking Tool 'Droidsheep' - Download and tutorial
By : UnknownSession Hijacking Tool 'Droidsheep'
Session Hijacking refers to an attack in which a hacker
temporarily hijacks the ongoing session of the user and he is able to
see what the user is doing on his mobile,computer be it accessing
facebook,gmail or any other site.
P.S.- Rooted Android is required .
Steps of using :
1.Open the app.
2.Check "ARP-Spoofing" and "Genreic Mode".
3.Click on Start.
4.In some time you will start getting various sessions on the same network of wifi.Click on then see what the person is doing.Tag :
hacking,
session hijacking,
Top 10 Ways to Hack Facebook Accounts
By : UnknownTop 10 Ways to Hack Facebook Accounts

Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers have , I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2013, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the top 10 methods how hackers can hack facebook accounts.
10 Ways How Hackers Can Hack Facebook Accounts
So here are the top 10 methods which have been the most popular in 2012:
1. Facebook Phishing
Phishing still is the most popular attack vector used for
hacking facebook accounts, There are variety of methods to carry out
phishing attack, In a simple phishing attacks a hacker creates a fake
login page which exactly looks like the real facebook page and then asks
the victim to login into that page, Once the victim logins through the
fake page the victims "Email Address" and "Password" is stored in to a
text file, The hacker then downloads the text file and get's his hands
on the victims credentials.
2. Keylogging
Keylogging, according to me is the easiest way to hack a
facebook password, Keylogging sometimes can be so dangerous that even a
person with good knowledge of computers can fall for it. A keylogger is
basically a small program which once is installed on victims computer
will record every thing which victim types on his/her computer. The logs
are then send back to the attacker by either FTP or directly to hackers
email address.
3. Stealers
Almost 80% percent people use
stored passwords in their browser to access the facebook, This is is
quite convenient but can sometimes be extremely dangerous, Stealers
are software's specially designed to capture the saved passwords stored
in the victims browser, Stealers once FUD can be extremely powerful.
Session Hijacking can be often
very dangerous if you are accessing Facebook on a http:// connection, In
a Session Hijacking attack a hacker steals the victims browser cookie
which is used to authenticate a user on a website and uses to it
to access victims account, Session hijacking is widely used on Lan's.
5. Sidejacking With Firesheep
Sidejacking attack went common
in late 2010, however it's still popular now a days, Firesheep is widely
used to carry out sidejacking attacks, Firesheep only works when the
attacker and victim is on the same wifi network. A sidejacking attack is
basically another name for http session hijacking, but it's more
targeted towards wifi users.
6. Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.
7. DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.
8. USB Hacking
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser, I have also posted related to this attack which you can read by accessing the link below:
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser, I have also posted related to this attack which you can read by accessing the link below:
- How to make Your Pen-drive (USB) a Password Stealer
9. Man In the Middle Attacks
If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article,
10. Botnets If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article,
Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.
What is Backtrack & How to Use it?
By : UnknownWhat is Backtrack & How to Use it?
Hello readers! This is the very first article of a series of articles which I'll be posting on one of the Best tools used in hacking - "Backtrack". I hope you enjoy reading. Do show your support by commenting and subscribing by mail for Backtrack and other updates for free!Backtrack is Linux Based Penetration Testing Operating system which provides many inbuilt tools which are used for vulnerability assessment, exploitation and penetration testing. Apart from using metasploit framework on backtrack there is a complete series of "Exploitation Tools". The tools in Backtrack are divided into following broad categories :
- Information Gathering
- Vulnerability Assessment
- Exploitation Tools
- Privilege Escalation
- Maintaining Access
- Reverse Engineering
- RFID Tools
- Stress testing
- Forensics
- Reporting Tools
- Services
- Miscellaneous
if want link comment or contact me....
By : Unknown
This is how we set a trap and hack victim facebook and password only on Backtrack 5
How to Hack Facebook Accounts with Backtrack 5
Step 1 : Open set Tool in Backtrack 5 : To open it follow the step shown above .
Step 2 : Time to set the Website Attack Vectors : Below Menu enter your choice : 2.Website Attack Vectors and press Enter .
Step 3 : Select your Attacking Method , Here i choose
3. Credential Harvester Attack Method.
Step 4 : Select Attack Vectors :write 2. Site Cloner and press enter as shown in the image .
Step 5: Enter the Url: To make a clone to facebook login page I entered https://www.facebook.com and press enter . As I press enter it will automatically generate a clone page .
Step 6 : To continue the process you have to put * sign and press enter.
Step 7 : Process will continue as shown in the image above .
Step 8: Open terminal and enter ifconfig command . It will shown your ip address . Now copy the ip address .
Step9 :Open Web Browser and Paste the system ipaddress into Address bar and it will redirect to the facebook login page .
Now Enter your anything to check it will work or not .
FOR EXAMPLE: Here I use
Email : h4x00r
Password:hackingDNA.com
And Press Enter . Let see what happen on the Next step .
Step 10 :
In step 7 the process start you remember now when you follow step 8 and
step 9 ,then it will come up with all the details of Username and
Password .
Backtrack 5 : Using Armitage For Hacking.
By : UnknownBacktrack 5 : Using Armitage For Hacking.
Stealing Files,Downloading Keystrokes,Controlling Webcam from remote Locations,ETC by Armitage.
Armitage is an GUI Platform for Metaspoilt and in technical terms,it is a script-able red team collaboration tool
for Metasploit that visualizes targets, recommends exploits, and
exposes the advanced post-exploitation features in the framework.It
saves time and is very powerful in commencing Metaspoilt attacks.
So Now about our attack today :
What Do We Need ?
Latest Metasploit framework.Oracle Java 1.7
Preferably Internet on LAN
Brains and Patience.
Now Lets Us Start Our Hack Today.
Step 1 -Open armitage on Backtrack 5:
By Going To : Backtrack > Exploitation Tools > Network Exploitation Tools > Metasploit Framework > armitage.
Step 2 : Connect Armitage:
Click on the connect Button .
Step 3 : Connecting Armitage :
Now use the patience part,and stretch your legs,it takes some time to connect.
Step 4 : Armitage Window :
It has 3 Panels -
Target Panel
Module Panel
Tabs Panel
Step 5 : Finding the alive host on the Network :
Now you will search for Host on you network,By Going to Hosts -> Nmap
Scan -> Quick Scan (OS detect).This will perform a quick scan to
detect the host and their operating systems and vulnerabilities.
Step 6 : Inputting The Scan Range :
Now You have to insert scan range,that is you LAN ip
range,Most preferably it would start with 192.168.0.- or 10.0.0.-.NOTE :
the ( - ) resembles the computers on LAN.
Start the Scan.
Step 7 : Scan Complete:
After the scan has completed,if their are any other PC's on your network on,then they would be visible in the Target Pane (the Big Black box on the upper right).Step 8 : Finding Attacks :
Now the Fun Parts starts,Click on Attacks tab in your toolbar and select
Find Attacks (Not hail mary,you might not be ready for that).Start the
scan and wait till it completes.
Step 9 : Set the vulnerability :
Right Click on the Host icon (windows pc) -> Select attacks -> smb -> ms08_067_netapi vulnerability .
Now a window should pop,Click on the check-box that says "Use a reverse connection" .
Start Attack
Step 10 : The Final Result :
So did the Host Icon Turn Red ? That Means YOU PASSED.
So You Did The Hacking Part Right,Now let us mess with the client.
Hack 1 - Opening Command Prompt :
Right click on the host -> Meterpreter1 ->Interact -> Command Shell
Now You are In Their Command Prompt,You can now change,rename,delete,create files on their pc now.Search Google for some powerful windows commands.
Hack 2 - Start an KEYLOGGER :
Click on the Meterpreter2 -> Explore -> Log Keystrokes.
Now you will receive what the victim is typing.
Hack 3 - Take An Screen Shot :
Click on the Meterpreter2 -> Explore ->Screenshot.
Now you can see what is on their Facebook wall or Google mail accounts.
Hack 4 -Browse Files :
Right click -> Meterpreter2 -> Explore > Browse Files .
Now you can interact with all the files on victim PC via a GUI.
Hack 5 - Get in His Webcam (my favorite part).
Right click -> Meterpreter2 ->Explore -> Webcam shot
Catch that guy making out ,and have fun with him later.
hack Website with Basic HTML Coding
By : Unknownhack Website with Basic HTML Coding
Edited by June, Chris Hadley, Max1508, Skycaptain95 and 59 others
If you have basic HTML and JavaScript knowledge, you may be able to
access password protected websites. This article will give you an easy
method to hack simple, less-secured websites of your choice simply
through HTML. Use it responsibly.Note: This basic method works only for websites with extremely low security barriers. Websites with robust security details will not be susceptible to this kind of simple attack
Steps
-
1Open the site you want to hack. Provide wrong username/password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be prepared your experiment starts from here.2Right click anywhere on that error page =>> go to view source.
-
3There you can see the HTML coding with JavaScript.• There you find somewhat like this....<_form action="...Login....">• Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=http://www.targetwebsite.com/login.......>")
-
4Then delete the JavaScript from the above that validates your information in the server.(Do this very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information)
-
5Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=password>" with "<_type=text>". See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write )
-
6Just go to file => save as and save it anywhere in your hard disk with ext.html(e.g.: c:\chan.html)
-
7Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.
-
8Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.
Send self-destructing messages with Burn Note
By : UnknownSend self-destructing messages with Burn Note
If you want to send sensitive or confidential information via e-mail without leaving a digital trail, or if you just want to feel like a spy, give Burn Note a try. You compose a message on the Burn Note site, which then gives you a link to send to your friend or double agent. When the recipient opens the Burn Note, a timer starts counting down before the message is destroyed
You can also password protect a Burn Note; presumably, you would send along the password when you e-mailed the Burn Note link.
Spyglass mode.
Tag :
hacking,
SEF (Social Engineering Framework) V 1.0 Features
By : Unknown
SEF
(Social Engineering Framework) V 1.0 Features
You would say that today's topic is lame PHISHING but let me tell you that phishing is not so lame, it helps a lot (in anyways). And this topic is not just copying the source code of login page, no script work, nothing like this. It's a framework attack.
It’s a free and open source Social Engineering Framework
(SCRIPT) that helps the phishing attacks and fake emails. and it’s includes phishing
pages, fake email, fake email with file attachment and other stuff that helps
you in Social Engineering Attack. The application is coded in PHP and it has a very good interface that called Metro
interface.
SEF
(Social Engineering Framework) V 1.0 Features
Metro Interface
Coded in PHP
User Friendly
All Modern Browser Supportable
Phishing With MySQL DataBase
Phishing Data arranged by MYSQL Databse.
Fake Email
Fake Email With Attachment Support
Fake Email With Boombing [Avilable in Ver 2.0]
SEF
Login Page
SEF Forgot Password Recovery
SEF Dashboard
SEF Phishing Links Page
SEF Phishing Data Page
SEF Fake Email Basic Interface
SEF Fake Email Advanced Interface
Step 2: Now open the browser and upload the folder
of SEN to the server.
Step 3 : Goto PhpMyAdmin and Import sef.sql
file.
Step 4: Select sef database and navigate to sef_mainuser
table.
Step 5: change username and password row.
Step 6: Let's have a look at db.php file.
Step 7: Set base name, server name, username and
passowrd
For Example [000WebHost]
$base=" a3786786_sef ";
$server=”mysql1.000webhost.com”;
$user=" a3786786_sef ";
$pass="yourpass";
Step 8: Open the URL http://www.yoursite.com/
Step 9: Login with your creadintial.