Posts

Hacking From Android Phones, Made Easy With (Anti) Android Network Tool Kit

Image
Android Network Toolkit  (ANTI) is an amazing android application. You could bring all the hacking tools on PC to your Android  smartphone . Using this app is as simple as pushing a few buttons H ow Anti Works ? Anti  will map your network, scan for active devices and vulnerabilities, and will  display the information accordingly, Green led signals an ' Active device ', Yellow led signals " Available ports ", and Red led signals " Vulnerability found ". Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how you can exploit/fix each one of them. S can   - This will scan the selected target for open ports and  vulnerabilities , also allowing the user to select a specific scanning script for a more  advanced/targeted scan. S py  - This will ' sniff ' images transferred to/from the selecte...

Phishing attacks with Google Docs

Image
Security researchers at Sophos labs found some phishing scams using Google Docs to steal Google account login details. Google Docs is the free service by Google which allow users to create online forms. These are the few scams which are hitting users inbox and asking for login credentials. In the first example, email asks users to confirm their account to prevent service bloackage. The message reads: Confirm your e-mail account please enter your Mailbox Details by clicking the link below: [LINK] Failure to provide details correctly will result to immediate closure of your mailbox account from our database. Links points to a Google Docs form which is a phishing page to steal users' login details. See the snapshot of the form below: See the phishing page which asks for users' passwords. Gmail account password is really very important as it is linked to various of your Google Service. This is gonna hit you badly. So you must know how to protect yourself from these kind o...

Brutus Password Cracker -Tutorial

Image
B rutus  is a well known password cracking  program .With Brutus you can either carry out a    brute force   attack or a  dictionary attack  to crack passwords for  HTTP, FTP, POP3, Telnet, SMB (Netbios), Netbus,  Brutus is one of the fastest, most flexible remote password crackers you can get your hands on Features :- Brutus version AET2 is the current release and includes the following authentication types HTTP (Basic Authentication) HTTP (HTML Form/CGI) POP3 FTP SMB Telnet Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples. The current release includes the following functionality : Multi-stage authentication engine 60 simultaneous target connections No username, single username and multiple username modes Password list, combo (user/password) list and configurable brute force modes Highly...

How to hack password using pendrive

Image
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.  MessenPass :  Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. Mail PassView :  Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), ...

How to download torrent file using IDM

Image
I have been busy with my book so its getting tough to find out time for something new. But I will keep you posted with some new posts soon. Lets come back to today's post. 1. First of all , you have to download the torrent file(.torrent) which you want to download. 2. Then just go to the website  www.torcache.net  and upload the torrent file that you have just downloaded and click on the cache! button 3. This will give you a new torrent file . You just have to copy the link of the new torrent file from the opened window. 4. Then go to the website  www.torrific.com  and create an account there(in case you don’t have) and login to your account. Then paste the address of the new torrent obtained in step 3 and click on Get button. 5. Now you will get the list of available files present in that torrent file. Then click on the initiate bittorrent transmission button. This will give the full option to download the file. Just click on any link and ...

How to enable right click on websites

Image
How to enable right click on any website [Google Chrome] Go to setting Under the privacy tab, you will see a button named “Contente  settings ” Select It and   Disable   the java script from there by selecting “Do not allow any site to run java scripts”. Press Done How to enable right click on any website [Mozilla Firefox] Go to Tools-> Options Go to “Content” tab in   settings Uncheck   the box saying “Enable Javascript” Click OK How to enable right click on any website [Internet Explorer] Go to Tools->Internet options Go to “Security” tab from there Under the section scripting, Select  Disable  and press OK Warning :- Please take it under notice that as long as the java script is disabled, some functions on some websites will not work. So make sure you turn back on the java script after you get what you want.

How To Steal Facebook Session Cookies And Hijack An Account?

Image
How To Steal Facebook Session Cookies And Hijack An Account?  An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account. If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account. In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark. Step 1 -  First of all download wireshark from the official website and install it. Step 2 -  Next open up wireshark click on analyze and then click on interfaces. Step 3 -  Next ch...