Showing posts with label Tutorials. Show all posts
Showing posts with label Tutorials. Show all posts

Tuesday, 7 May 2013

Bind an .EXE File to Any File

Bind an .EXE File to Any File without
software

Many readers have been asking me how to hide their virus, keylogger, or any .exe file inside a .mp3, .png, etc. file. Here i am going to show you how to hide a virus within a normal media file. In this example we will be hiding a virus inside what appears to be a normal image file. It should work on .mp3, .wav, or any other file, probably even .iso's, never tried that though.

How to Bind an .EXE File to a .PNG File?

1. First, you need to put your virus and a picture in a folder.
2. Right click on the server, click properties.
3. Click the 'Hidden' Option

After that you don't have to worry about the .exe, unless you need to FUD it or something.
4. Now, what you need to do is click properties on the image.
5. Click the change button for what it opens with and choose your server (you have to find it).
6. Now thats all you really have to do, the rest of what you do is up to you.
7. But this isn't very effective, just simple and easy. The only way this will work is one of 2 things.

The person is very stupid, and sees the .exe because his PC shows hidden files, or he/she have the option, 'do not shot hidden files' in control panel/folder options selected.
Now this is what the finished project should look like to normal users:
Now the user will open the picture, see it, and not care anymore. Also, it says the picture is 12 KB, but in reality, the hidden .exe adds to the folder size.





Monday, 6 May 2013

Tutorial to Install TOR ON WINDOWS 7

INSTALL TOR on WINDOWS 7

The Vidalia Bundle for Windows contains Tor, Vidalia (a GUI for Tor), Torbutton (a plugin for Mozilla Firefox), and Polipo (a web proxy) packaged into one bundle, with the four applications pre-configured to work together. Download either the stable or the experimental version of the Vidalia Bundle.
If you have previously installed Tor, Vidalia, or Polipo you can deselect whichever components you do not need to install in the dialog shown below.
After you have completed the installer, the components you selected will automatically be started for you.
Tor comes configured as a client by default. It uses a built-in default configuration file, and most people won't need to change any of the settings. Tor is now installed.
After installing Tor and Polipo, you need to configure your applications to use them. The first step is to set up web browsing.
You should use Tor with Firefox and Torbutton, for best safety. The bundle installs the Torbutton plugin for you. Restart your Firefox, and you're all set:

If you plan to run Firefox on a different computer than Tor, see the FAQ entry for running Tor on a different computer.

To Torify other applications that support HTTP proxies, just point them at Polipo (that is, localhost port 8118). To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you can point your application directly at Tor (localhost port 9050), but see this FAQ entry for why this may be dangerous. For applications that support neither SOCKS nor HTTP, take a look at SocksCap or FreeCap. (FreeCap is free software; SocksCap is proprietary.)
Check to see that Vidalia is running. Vidalia uses a small green onion to indicate Tor is running or a dark onion with a red "X" when Tor is not running. You can start or stop Tor by right-clicking on Vidalia's icon in your system tray and selecting "Start" or "Stop" from the menu as shown below:
Next, you should try using your browser with Tor and make sure that your IP address is being anonymized. Click on the Tor detector and see whether it thinks you're using Tor or not.
If you have a personal firewall that limits your computer's ability to connect to itself, be sure to allow connections from your local applications to local port 8118 and port 9050. If your firewall blocks outgoing connections, punch a hole so it can connect to at least TCP ports 80 and 443.Download Here


JAVA SCRIPT TO HACK PASSWORD

JAVA SCRIPT TO reveal PASSWORDS!!
 It s a old trick wil work in old version of Internet Explorer
You see password in '' *********** '' form and want to decrypt it into it's original word form, to do that all you have to do is just copy and paste this script in your url box.
javascript: alert(document.getElementById('Passwd').value);
As you can see the image here, the password i typed  ''yoyo!'' and then i pasted the script in url box(address bar) and pressed enter, so the password showed up!
note :use INTERNET EXPLORER ONLY for this script !

SSLsplit for man-in-the-middle attack

SSLsplit: Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encryptednetwork connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing.

SSLsplit supports plain TCP, plain SSL, HTTP and HTTPS connections over both
IPv4 and IPv6. For SSL and HTTPS connections, SSLsplit generates and signs
forged X509v3 certificates on-the-fly, based on the original server certificate
subject DN and subjectAltName extension. SSLsplit fully supports Server Name
Indication (SNI) and is able to work with RSA, DSA and ECDSA keys and DHE and
ECDHE cipher suites. SSLsplit can also use existing certificates of which the
private key is available, instead of generating forged ones. SSLsplit supports
NULL-prefix CN certificates and can deny OCSP requests in a generic way.


SSLsplit version 0.4.5 released on Nov 07, change logs are

- Add support for 2048 and 4096 bit Diffie-Hellman.
- Fix syslog error messages (issue #6).
- Fix threading issues in daemon mode (issue #5).
- Fix address family check in netfilter NAT lookup (issue #4).
- Fix build on recent glibc systems (issue #2).
- Minor code and build process improvements.Download Here

Sunday, 5 May 2013

DARKCOMET RAT

100% WORKING SERVER WITH DARKCOMET RAT



RAT or Remote Administration Tool is a tool which helps to administers the system of a person without physical access to the system.This tool is highly used by a hacker and is very efficient.If a hacker is able to get installed a server (which can easily be done) in victims system then entire system of the victim is with the hacker! He can check logs,take screenshots,browse your folders,disable your anti-virus and much more !


RAT is basically a Trojan which has two parts :


Client : It can be considered as King which plays with or manipulates with the server(slave) which he has made.


Server: It can be considered as a Slave which is installed on the host (remote).


So now I'll talk about  how to create a successful Server with one of the Best RAT's available, that is DarkComet (v5.1) which is coded in Delphi XE and Delphi 2007.


So here it goes :




1. Download DarkComet (v5.1 is what I'll use here,but the basic process is same for all version so don't worry)
   http://www.darkcomet-rat.com/
 
2.Now we will start building up the server.exe file.
   Click on the Blue Icon saying "DarkComet", go to "Server module" and choose ''Full editor" option.


You'll get something like this -
 

  Keep a security password if you want to.               
   Click on Random 4-5 times to generate new Mutex and see to it that Active FWB is checked.


2.Another column which you will see there is of PORT . DarkComet uses port 1604 so make sure it is open and forwarded.To know how to forward your port,visit http://portforward.com/ -here you will get all the information about how to forward your port for your type of Modem.

3.Keep the following setting in module startup -
 

 
You can also check ''persistence installation'' if you want to(i recommend it).


 4.Following setting are ideal for Module Shield -
 

 
5.After this all the options may vary from person to person as per your requirement but i recommend to Activate the Offline Keylogger .


6.Compress the server if you want and you are done,click on ''Build the Stub" and a process will take place in which you will be able to see the algorithms and your server.exe is made (name it as per your requirement but keep .EXE intact)
 

 
Your server is Built now ! :)


But now problem arises that how will you send the server to the victim over internet as .EXE files cannot be transferred via facebook,yahoo,gmail or other sites.


So here come crypters and binders into play !
 
Crypters - It is software which is used to crypt your server to make it FUD (Fully Undetectable )


Binders - A binder is software which pumps up the size of your RAT which is usually in Kb's to some Mb's!
You can do this by binding your RAT with some song ,image etc.