Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Thursday, November 20, 2008

Hacking yahoo/gmail and other email accounts

The most frequent questions asked by many people especially in a chat room is How To Hack Yahoo Password or any other email account.So you as the reader are most likely reading this because you want to break into somebody's email account.Here are some of the tricks that can be used to track an email password.

THINGS YOU SHOULD KNOW BEFORE PROCEEDING

There is no program that will crack the password of victim's account.There exist many password hacking programs which claims to do this,but unfortunately people using these kind of programs will only end up in frustration.None of these programs work since services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts.Another thing you must know if you ask this question in any "hacker" chat room/channel, you hear that you have to email some address and in any way you give up your password in the process, in attempt to crack others password.So DO NOT BELEIVE THIS.

TWO WAYS OF HACKING METHODS THAT YOU CAN TRY

IF YOU HAVE ACCESS TO VICTIM'S COMPUTER

If you have physical access to victim's computer then it's definitely possible to crack his password.This can easily be done by just installing a keylogger.

What is a keylogger? A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard.

A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim's password.OK we can crack passwords using a keylogger but these are the questions that arise in our mind now!

1.Where is the keylogger program available?

A keylogger program is widely available on the internet.some of them are listed below

Powered Keylogger
Advanced keylogger
Elite Keylogger
Handy Keylogger
Quick Keylogger

Oops i think the above list is enough.There exists hundreds of such keyloggers available on the net.These are software keyloggers.There are also hardware Keyloggers available which can be directly attached to computer and can be used to sniff valuable data.These programs are none other than spyware! So use it @ your own risk.

2.How to install it?

You can install these keyloggers just as any other program but these things you must keep in mind.While installing,it asks you for a secret password and a hot key to enable it.This is because after installing the keylogger program is completely hidden and the victim can no way identify it.Keylogger is hidden from control panel,Program files,Start menu,Task manager so that it becomes completely invisible but runs in background monitoring the user activities.

3.Once installed how to get password from it?

The hacker can open the keylogger program by just pressing the hot keys(which is set during installation) and enter the password.Now it shows the logs containing every keystroke of the user,where it was pressed,at what time,including screenshots of the activities.

Some keyloggers also has a built in SMTP server.So once you install the keylogger on victim's computer you can just sit back in our place and receive the logs via email

4.Which keylogger program is the best?

According to me Elite Keylogger and Powered keylogger are the best.You can also read the features and side by side comparisions of them and select the best that suites your needs.

IF YOU DO NOT HAVE ACCESS TO VICTIM'S COMPUTER

Ofcourse the above method can only be employed if you can access victims computer.But what to do if we do not have access.In this case there exists many Remote Administration Tools commonly known as RATs available on net.Just try googling and you can get one.


OTHER WAYS OF HACKING PASSWORD

The other most commonly used trick to sniff password is using Fake Login Pages.
This is where many people get cheated.A Fake Login page is a page that appears exactly as a Login page but once we enter our password there ,we end up loosing it.

Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get an error "Page cannot be displayed".Many times we ignore this but finally we loose our valuable data.

Keyloggers (Keystroke Loggers)

Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.

There are two types of keystroke loggers:

1. Software based and
2. Hardware based.


Spy ware: Spector (http://www.spector.com/)



  • Spector is a spy ware and it will record everything anyone does on the internet.
  • Spector automatically takes hundreds of snapshots every hour, very much like a surveillance camera. With spector, you will be able to see exactly what your surveillance targets have been doing online and offline.
  • Spector works by taking a snapshot of whatever is on your computer screen and saves it away in a hidden location on your computer's hard drive.

Hacking Tool: eBlaster (http://www.spector.com/)
    eBlaster
  • eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.
  • eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.
  • Within seconds of them sending or receiving an email, you will receive your own copy of that email.

Hacking Tool: (Hardware Keylogger) (http://www.keyghost.com)Hardware Keylogger



  • The Hardware Key Logger is a tiny hardware device that can be attached in between a keyboard and a computer.
  • It keeps a record of all key strokes typed on the keyboard. The recording process is totally transparent to the end user.

Essential Hacking Tools For Every Hacker

Here is a list of all the essential hacking tools that every hacker should possess.Here in this post I will give details of different Hacking/Security tools and utilities along with the download links.I have also divided these tools into their respective categories for ease of understanding.

NETWORK SCANNERS AND TCP/IP UTILITIES

1. IP TOOLS

IP-Tools offers many TCP/IP utilities in one program. This award-winning program can work under Windows 98/ME, Windows NT 4.0, Windows 2000/XP/2003, Windows Vista and is indispensable for anyone who uses the Internet or Intranet.

It includes the following utilities


  • Local Info - examines the local host and shows info about processor, memory, Winsock data, etc.
  • Name Scanner - scans all hostnames within a range of IP addresses
  • Port Scanner - scans network(s) for active TCP based services
  • Ping Scanner - pings a remote hosts over the network
  • Telnet - telnet client
  • HTTP - HTTP client
  • IP-Monitor - shows network traffic in real time & many more
IP TOOLS has almost all the utilities built into it.So there is no need to use seperate tools for every indivisual process of hacking such as Port scanning,Whois scanning,IP monitor etc.It's like a hacking tool kit which has all the necessary tools for hacking.
Download IP Tools Here


2. NMAP
Nmap is a similar hacking/security tool as IP Tools which offer slightly different set of features.Unlike IP Tools Nmap is a freeware.It is designed to rapidly scan large networks, although it works fine against single hosts.Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available
Download Nmap Here


PASSWORD CRACKERS
1. LC4 (For Windows Password Recovery)
LC4 is the award-winning password auditing and recovery application, L0phtCrack. It provides two critical capabilities to Windows network administrators:
  • LC4 helps administrators secure Windows-authenticated networks through comprehensive auditing of Windows NT and Windows 2000 user account passwords.
  • LC4 recovers Windows user account passwords to streamline migration of users to another authentication system or to access accounts whose passwords are lost.
Donload LC4 Here

2. SAMINSIDE (For Windows Password Recovery)
SAMInside is designated for the recovery of Windows NT/2000/XP/2003/Vista user passwords.
The following are some of the highlighting features of Saminside.
  • The program doesn't require installation.It can be directly run from CD,Disk or Pendrive.
  • Includes over 10 types of data import and 6 types of password attack
  1. Brute-force attack
  2. Distributed attack
  3. Mask attack
  4. Dictionary attack
  5. Hybrid attack
  6. Pre-calculated tables attack
  • Run's very fast since the program is completely written in assembler.
As far as my opinion is concerned both LC4 and SAMINSIDE are powerful password crackers for cracking Windows Passwords.However LC4 has slightly upper hand over Saminside.I recommend LC4 for advanced users but Saminside is more suitable for novice users.
You Can Get Saminside From Here

3. MESSENPASS (For Instant Messenger Password Recovery)
Messenpass is a password recovery tool for instant messengers.It can be used to recover the lost passwords of yahoo messenger or windows messenger.It is too easy to use this tool.Just double-click this tool and it reveals the username and passwords that are stored in the system.
Download MessenPass Here


REMOTE ADMINISTRATION TOOLS (RAT)
RADMIN
Radmin (Remote Administrator) is the world famous, award winning secure remote control software and remote access software which enables you to work on a remote computer in real time as if you were using its own keyboard and mouse.
Radmin has the following features.
  • Access and control your home and office computer remotely from anywhere
  • Perform systems administration remotely
  • Provide Help Desk (remote support) functions for remote users
  • Work from home remotely
  • Manage small, medium, and large networks remotely
  • Organize online presentations and conferences
  • Share your desktop
  • Teach and monitor students' activities remotely
I have used Radmin personally and recommend this software to everyone.It works great!
Download Radmin Here
Most of the above tools are shareware which means that you have to pay for them.But they are really worth for their money.Most of the time freewares offer limited functionality/features than the sharewares and hence I recommend them to my visitors.But still you can get 99% of all the softwares for free (cracked versions) on the internet and if u search on this site itself you will find almost all of the above mentioned softwares free :)

Radmin Remote Administrator 3.2 - a nice hacking software




Remote Administrator is the fastest remote control software. You see
the remote computer screen displayed either in a window or full
screen on your computer monitor. All mouse and keyboard functions are
transferred to the remote computer. You can work with the remote
computer as if you are sitting in front of it. According to our tests
and our users feedback Remote Administrator outperforms all other
remote controls in the speed of work.


System Requirements
nothing special

What's new
Support for Windows Vista SP1; Support for Windows Server 2008; Faster speed and smooth performance; Left-hand mouse support; Support for 27 languages.





download: http://rapidshare.com/files/141494291/Radmin__Remote.Administrator__3.2.rar
mirror: http://rapidshare.com/files/162064523/Radmin__Remote.Administrator__3.2_www.balkanw.org.rar

Tuesday, October 21, 2008

online MD5 crackers

http://www.md5lookup.com/
http://md5.rednoize.com
http://nz.md5.crysm.net
http://us.md5.crysm.net
http://www.xmd5.org
http://gdataonline.com
http://www.hashchecker.com
http://passcracking.ru
http://www.milw0rm.com/md5
http://plain-text.info
http://www.securitystats.com/tools/hashcrack.php
http://www.schwett.com/md5/
http://passcrack.spb.ru/ ->sha1
http://shm.pl/md5/
http://www.und0it.com/
http://www.neeao.com/md5/
http://md5.benramsey.com/
http://www.md5decrypt.com/
http://md5.khrone.pl/
http://www.csthis.com/md5/index.php
http://www.securitystats.com/tools/hashcrack.php ->sha1
http://www.md5decrypter.com/
http://www.md5encryption.com/ ->sha1
http://www.md5database.net/
http://md5.xpzone.de/
http://www.milw0rm.com/md5/info.php
http://md5.geeks.li/
http://www.hashreverse.com/ ->sha1
http://www.cmd5.com/english.aspx
http://www.md5.altervista.org/
http://md5.overclock.ch/biz/index.php?p=md5crack&l=en
http://alimamed.pp.ru/md5/
http://md5crack.it-helpnet.de/index.php?op=add
http://cijfer.hua.fi/
http://shm.hard-core.pl/md5/
http://www.mmkey.com/md5/HOME.ASP
http://www.thepanicroom.org/index.php?view=cracker
http://rainbowtables.net/services/results.php ->sha1
http://rainbowcrack.com/ ->sha1
http://www.securitydb.org/cracker/
http://passwordsecuritycenter.com/in...roducts_ id=7
http://0ptix.co.nr/md5
https://www.astalavista.net/?cmd=rainbowtables
http://ice.breaker.free.fr/
http://www.md5this.com
http://www.shalookup.com/ ->sha1

lm Only:
http://sys9five.ath.cx:8080/hak5rtables/
http://lasecwww.epfl.ch/~oechslin/projects/ophcrack/
some more links
http://linardy.com/md5.php
http://www.gdataonline.com/seekhash.php
http://www.md5-db.com/
https://www.w4ck1ng.com/cracker/
http://search.cpan.org/~blwood/Digest-MD5-Reverse-1.3/
http://www.hashchecker.com/index.php?_sls=search_hash
http://www.milw0rm.com/md5/
http://www.mmkey.com/md5/
http://www.rainbowcrack-online.com/
http://www.securitydb.org/cracker/
http://www.securitystats.com/tools/hashcrack.php
http://schwett.com/md5/
http://www.und0it.com/
http://www.md5.org.cn/index_en.htm
http://www.xmd5.org/index_en.htm
http://www.tmto.org
http://md5.rednoize.com/
http://nz.md5.crysm.net/
http://us.md5.crysm.net/
http://gdataonline.com/seekhash.php
http://passcracking.ru/
http://shm.pl/md5/
http://www.neeao.com/md5/
http://md5.benramsey.com/
http://www.md5decrypt.com/
http://md5.khrone.pl/
http://www.csthis.com/md5/index.php
http://www.md5decrypter.com/
http://www.md5encryption.com/
http://www.md5database.net/
http://md5.xpzone.de/
http://www.hashreverse.com/
http://alimamed.pp.ru/md5/
http://md5crack.it-helpnet.de/index.php?op=add
http://shm.hard-core.pl/md5/
http://rainbowcrack.com/
http://passwordsecuritycenter.com/index.php?main_page=product_info&cPath=3&products_id=7
https://www.astalavista.net/?cmd=rainbowtables
http://ice.breaker.free.fr/
http://www.md5this.com/
http://hackerscity.free.fr/
http://md5.allfact.info/
http://bokehman.com/cracker/
http://www.tydal.nu/article/md5-crack/
http://passcracking.com/
http://ivdb.org/search/md5/
http://md5.netsons.org/
http://md5.c.la/
http://www.md5-db.com/index.php
http://md5.idiobase.de/
http://md5search.deerme.org/
http://sha1search.com/

Tuesday, October 7, 2008

Wireless Hack Toolz (2008)


Tools included
* NetStumbler-0.4.0: wireless access point identifier - listens for SSIDs


and sends beacons as probes searching for access points.



* Kismet-2005-08-R: wireless sniffer and monitor - passively monitors wireless traffic

and sorts data to identify SSIDs, MAC addresses, channels and connection speeds.



* Wellenreiter-v1.9: WLAN discovery tool - uses brute force to identify low traffic

access points; hides your real MAC address; integrates with GPS.



* WEP-0.1.0: Unix based-pearl aplication encryption breaker - *****s 802.11 WEP

encryption keys using the latest discovered weakness of RC4 key scheduling.



* Airsnort-0.2.7e: encryption breaker - passively monitoring transmissions,

computing the encryption key when enough packets have been gathered.



* Wepwedgie-0.1.0-alpha: for toolkit that determines 802.11 WEP keystreams

and injects traffic with known keystreams in order to ***** WEP in minutes.



* Hotspotter-0.4: Wireless client attacking too.
 
download:
http://rapidshare.com/files/127357312/WHT.rar
 
password:
bluemoon

Big Hack Pack 2008

APP LisT :


AddrView

AnonFTP

AOL new

AppToService

arpinject

aspack21

Astaroth Joiner v2

atk-2.1

BankOfAmerica

bios_pass_remover

BlasterW32

blue

bmpripper

brutus

Cable Modem Sniffer

CapKeys_DIGITAL

CASXM138

CAYZODQF

CGI Founder v1.043

cgis4

CGISscan

cia10

cports

craagle

Crackftp

CreditCardGjenerator

Davs_TR_REtail

DDL Sites

DeepUnFreez

DrVBS

eBay

EESBinder

egold

E-mail Cracker

ezDataBase_Defacer

F.B.I - Binder

FTP Brute Forcer

ftpbr

~Censored~ Mail Bomber 2.3

G00B3RS_phpBB_exploit_pack

genxe-beta-0.9.0

Google_Hacker_1.2

grinder1.1

Hack FLASH Template

Hack MY Space

Hack Photoshop CS2

HackersAssistant

HackTheGame

hck

hlboom

Hook Tool Box

Hotmail Email Hacker

Hotmail HAcker Gold

Hotmail ScamPage

HotmailHack

HSBC-US

hydra-4.6-win

iecv

IP2

ipnetinfo

john-17w

Key Changer

Key_Logger

Legion NetBios Scanner v2.1

Mail Boomb_2.0 YAHOO

MIDNITEmassacre

MooreR Port Scanner

MSN Flooder 2.0

MSN Messenger Account Cracker v2.0

MSNLoader

NET BIOS Scaner

NetBIOS Name Scanner

NetResView

NFO Maker 1.0

Nimda

nkedb

nolimitcracker

NTPacker

nts

NullAddFrontend

On-Off MSN

OS Update Hack

P0kes WormGen 2.0

panther

PayPal

PCAnyPass

Php Nuke Hacker v11.0

phpBB Annihilator

phpbb attack

phpbb bruteforcer

PhpBB pass extractor

phpBB_DoS

phpbb_spammer

phpBBAttacker

phpBBAttacker

phpBBcracker

PhpBuGScan

~censored~

PhpNuke_bypass

Ping & Nukes

Port Listener XP

pqwak2

procexp

ProMo

ProxyPro

Pure phpBB Email harvester

rainbowcrack-1.2-src win-lin

Remote Shut Down

ResHacker

Rocket

rpc

RpcScan101

Sasser

SendMailer

Server 2003 Keygen

Server Killer

showpassv10

sitedigger2

smbat-win32bin-1.0.4

SMBdie

smbproxy-win32bin-1.0.0

Source Checker

source codes

sprut

SQLScan v1.0

Stealth - HTTP Scanner v1.0 build 23

super

SuperScan4

tftpd32.273

thunter

TinaSoft KILL

traceroute

UC.Forum Spam

udpflood

Ultra Dos

USBank

Visa Spam

Warez Sites

Web Cracker 2.0

WebCracker 4.0

whoistd

Win XP Activator

WindowHide

Windows XP Corperate Keygen

Windows XP KeyGen

Windows XP Product Key Changer

Windows XP Product Key Checker

Windows XP Product Key Viewer

WindowsAdminpasswordHack

wwwhack

xpass

xplizer

Yahoo Password

yahooUltraCracker

zehir
 
download:
http://rapidshare.com/files/150603204/UltraH4cker.rar

Monday, September 15, 2008

How to make ALL Trojan/Virus/Keylogger UNDETECTABLE

the method is very common and may be found on may sites.
the methods works fine

This tutorial tells you how to make a Trojan, Virus, Keylogger, or anything that would be found harmful, NOT. This tutorial explains how to make all files look %100 clean (become clean and be %100 UNDETECTABLE from ALL ANTIVIRUSES!!!!! ALL!!!!!)Ready? GO!First, get your trojan, virus or keylogger, or server or w/e you plan on using to become undetectable, and get it ready. Fix it up, create it, whatever. My personal favorite
keylogger: Ardamax Keylogger
Remote Administration Tool (Must not have a router): Poisin Ivy
Google is your friend.
Now that you have your trojan, virus or keylogger or w/e harmful ready, its time to make it UNDETECED!
1. Download Software Passport (Armadillo) by Silicon Realms. This is THE best binder out there I know of, it makes everything %100 UNDETECTABLE BY ALL ANTIVIRUSES (including Norton, Kaspersky, Avast, etc)… The direct link to dl the program is here:
Code:
http://nct.digitalriver.com/fulfill/0161.001
There is a form to fill out information, so put in your real email address, and then you’ll recieve a download link in your email (it might be in Spam, Junk mail section so beware.)
2. Once you download the program, install it.

3. Once installed, you open it up and see this:
Code:
http://img339.imageshack.us/img339/6…assportzh3.jpg
This is the program. Now that you have it open, you might be confused on what the hell to do, right? Well, this is what you do!
1. Download this pre-made settings. These settings are pre-made by me so you won’t be confused. Everything is working.
DOWNLOAD THIS FOR THE PRE-MADE SETTINGS:
Code:
http://rapidshare.com/files/8749860/projects.arm.html
DOWNLOAD THIS FOR THE BACKUP (You need this in the same location as the projects.arm file) YOU NEED THIS FILE ALSO!
Code:
http://rapidshare.com/files/8750048/projects.Stats.html
Now, when you download these files, and you put them in the SAME FOLDER (or same location), open Software Passport again and click Load Existing Project (top left).
Where it says “Files to Protect” (if theres stuff there, delete it):
Add the files you want to make %100 UNDETECTABLE!!
Now, once done, go to the bottom right and click “Build Project”. A bunch of windows will come up, just click Yes and OK.
Now, once its created, they are %100 undetectable. Go to
Code:
virustotal.com
to scan it with every Antivirus, and they wont find ANYTHING!


„It takes a long time to learn simplicity.“

USB Password Stealer

Tweaked USB that steals every passwords including licences.
Instructions
1.Decompress the archive and put all the files located in the folder “USBThief”into a USB.
2.Insert the USB in your victim’s computer.
3.View folder “dump” to see the passwords.
Download
Password: www.dl4all.com

Page hits flooder

This post is Originally written by myself only. i posted this long back on OUG and Hacking and Virus writing.
This small program can flood ur page hits.
but you have to dedicate one browser for it.. like internet explorer
method:
make a batch file with these lines
@echo off
:1
start C:\Progra~1\Intern~1\iexplore.exe “http://yoursite.com
ping -n 10 127.0.0.1 >nul
taskkill.exe /im iexplore.exe
goto 1

depending upon your net speed u may increase the 10 secs time wait
with 10 sec time u may have 360 hits in an hour
with 5 sec time u may have 720 hits in an hour

Recent Comments