Posts

Hacking From Android Phones, Made Easy With (Anti) Android Network Tool Kit

Image
Android Network Toolkit  (ANTI) is an amazing android application. You could bring all the hacking tools on PC to your Android  smartphone . Using this app is as simple as pushing a few buttons H ow Anti Works ? Anti  will map your network, scan for active devices and vulnerabilities, and will  display the information accordingly, Green led signals an ' Active device ', Yellow led signals " Available ports ", and Red led signals " Vulnerability found ". Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how you can exploit/fix each one of them. S can   - This will scan the selected target for open ports and  vulnerabilities , also allowing the user to select a specific scanning script for a more  advanced/targeted scan. S py  - This will ' sniff ' images transferred to/from the selected d

Phishing attacks with Google Docs

Image
Security researchers at Sophos labs found some phishing scams using Google Docs to steal Google account login details. Google Docs is the free service by Google which allow users to create online forms. These are the few scams which are hitting users inbox and asking for login credentials. In the first example, email asks users to confirm their account to prevent service bloackage. The message reads: Confirm your e-mail account please enter your Mailbox Details by clicking the link below: [LINK] Failure to provide details correctly will result to immediate closure of your mailbox account from our database. Links points to a Google Docs form which is a phishing page to steal users' login details. See the snapshot of the form below: See the phishing page which asks for users' passwords. Gmail account password is really very important as it is linked to various of your Google Service. This is gonna hit you badly. So you must know how to protect yourself from these kind o

Brutus Password Cracker -Tutorial

Image
B rutus  is a well known password cracking  program .With Brutus you can either carry out a    brute force   attack or a  dictionary attack  to crack passwords for  HTTP, FTP, POP3, Telnet, SMB (Netbios), Netbus,  Brutus is one of the fastest, most flexible remote password crackers you can get your hands on Features :- Brutus version AET2 is the current release and includes the following authentication types HTTP (Basic Authentication) HTTP (HTML Form/CGI) POP3 FTP SMB Telnet Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples. The current release includes the following functionality : Multi-stage authentication engine 60 simultaneous target connections No username, single username and multiple username modes Password list, combo (user/password) list and configurable brute force modes Highly customisable authentication sequences Load

How to hack password using pendrive

Image
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.  MessenPass :  Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. Mail PassView :  Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3,

How to download torrent file using IDM

Image
I have been busy with my book so its getting tough to find out time for something new. But I will keep you posted with some new posts soon. Lets come back to today's post. 1. First of all , you have to download the torrent file(.torrent) which you want to download. 2. Then just go to the website  www.torcache.net  and upload the torrent file that you have just downloaded and click on the cache! button 3. This will give you a new torrent file . You just have to copy the link of the new torrent file from the opened window. 4. Then go to the website  www.torrific.com  and create an account there(in case you don’t have) and login to your account. Then paste the address of the new torrent obtained in step 3 and click on Get button. 5. Now you will get the list of available files present in that torrent file. Then click on the initiate bittorrent transmission button. This will give the full option to download the file. Just click on any link and you can see the

How to enable right click on websites

Image
How to enable right click on any website [Google Chrome] Go to setting Under the privacy tab, you will see a button named “Contente  settings ” Select It and   Disable   the java script from there by selecting “Do not allow any site to run java scripts”. Press Done How to enable right click on any website [Mozilla Firefox] Go to Tools-> Options Go to “Content” tab in   settings Uncheck   the box saying “Enable Javascript” Click OK How to enable right click on any website [Internet Explorer] Go to Tools->Internet options Go to “Security” tab from there Under the section scripting, Select  Disable  and press OK Warning :- Please take it under notice that as long as the java script is disabled, some functions on some websites will not work. So make sure you turn back on the java script after you get what you want.

How To Steal Facebook Session Cookies And Hijack An Account?

Image
How To Steal Facebook Session Cookies And Hijack An Account?  An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account. If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account. In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark. Step 1 -  First of all download wireshark from the official website and install it. Step 2 -  Next open up wireshark click on analyze and then click on interfaces. Step 3 -  Next choose the appropriate interface and clic

How To Unlock Password of Android Phone And Tablet

Image
How To Unlock Password of  Android Phone And Tablet: 1.First of all Power Off your device. 2.After this just press Up Volume Key and hold it. 3.Now press the power button and hold it. 4.It will start a secret terminal.  5.You can use home button for go up and down. 6.You can use option DELETE ALL USER DATA. 7.It will take some time, and problem is solved. Warning :- if u use this trick then the data of your mobile will be lost 

Admin Loggin finder

Image
Download Admin login finder

Skype call recorder

Image
Callnote Premium Call Recorder Record your Skype video and audio calls. Easy to use for your Skype video and audio interviews, conferences, podcasts, or family VoIP calls. Evaer - excellent Skype video & audio recorder features: Capture original Skype video and audio data to record with high quality. Support single video call and group video calls. Directly record Skype video calls to your hard disk with side-by-side or separate mode. Record separate MP3 audio file in the video calls is optional. Choose the video compressor by your requirement. Automatic chat reply. Easy to use with friendly UI. goto this url http://shop.skype.com/apps/Call-recording-audio-video/Callnote-Premium-Call-Recorder.html

Shutdown Friend's compute while chating

Image
It can be the coolest thing to do with you friends while chatting. There is no Limitation on the messenger but the messenger should provide the file transfer service to send the following Program. STEP 1) right-click on any folder goto -> New -> Shortcut. STEP 2) Type in shortcut %windir%\system32\shutdown.exe -s -t 120 -c "The 31HA0w Virus Have invaded your Computer. And it is deleting your files"  STEP 3) right-click the shortcut goto -> Properties -> Choose Icon. Now choose any icon of your choice. STEP 4) Compress the file in ZIP and sent it to your friend while chatting and ask him to run it

GMail Phishing Page

Image
In this Tutorial I will show you how to set up Gmail Phishing site, step by step with pictures. Step 1:  The First Step in Making the site is to regester an account at  http://www.000webhost.com/order.php  (if you have account than you can skip first 2 steps) Step 2:  Now Goto your email account that you gave and confirm your account with confirmation link Step 3:  Now Download this  FILE  ( http://www.filesonic.com/file/4165336855/Gmail-Phishing-site.zip  ) . Step 4:  Now Goto  http://members.000webhost.com/  and Log into your account. Step 5:  Now when you are logged into your account click on the  Go to Cpanel   in front of your domain that you had registered, and then Go to  File Manager  under  Files and log into it. .  Step 6:  Now Click on the  Public_html. Step 7:  Now click on the  Upload  button, choose the file under the  Archives  that you have downloaded, to be uploaded. Step 7:  Now any one who visits your site would be taken

SSL Strip on gmail

Image
What is SSL Strip? SSL strip is a software that is used to sniff the data over HTTP and HTTP S. The sniffer read all the data in a network with is send between a user and the Router but no a days SSH or "HTTPS" have made it very difficult to get useful data (Like Facebook Password of your friend in same wifi network). So here is a tools that can even intercept the data over HTTP and HTTPS. Running sslstrip Flip your machine into forwarding mode. (echo "1" > /proc/sys/net/ipv4/ip_forward) Setup iptables to redirect HTTP traffic to sslstrip. (iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port <listenPort>) Run sslstrip. (sslstrip.py -l <listenPort>) Run arpspoof to convince a network they should send their traffic to you. (arpspoof -i <interface> -t <targetIP> <gatewayIP>) That should do it. How do this work? First, arpspoof convinces a host that our MAC address is the router’s MAC addres

Bypass youtube 18+ age verification without login

Image
Sometime YouTube ask you to sign in for your age verification to watch 18+ videos. So i will make new simple YouTube trick   to watch adult or 18+ YouTube videos without signing In. 1. First get the  Url  of video you want to watch. As shown below.           http://www.youtube.com/watch?v= 79wNhCbsH1Y   2. Then  cop y the Video Id. For above link video Id is   79wNhCbsH1Y 3. Now paste the Video Id in the link given below.        http://www.youtube.com/v/ VideoId ?fs=1 4.  Replace  VideoId   with the Id you copied in   Step 2 5. Now the url will become as shown below.         http://www.youtube.com/v/ 79wNhCbsH1Y ?fs=1 copy it and past this url to show youtube video without sign in   copy it and past this url to show youtube video without sign in   Enjoy it