JAVA SCRIPT TO HACK PASSWORD


JAVA SCRIPT TO reveal PASSWORDS!!


    It s a old trick wil work in old version of Internet Explorer

You see password in '' *********** '' form and want to decrypt it into it's original word form, to do that all you have to do is just copy and paste this script in your url box.

javascript: alert(document.getElementById('Passwd').value);

As you can see the image here, the password i typed  ''yoyo!'' and then i pasted the script in url box(address bar) and pressed enter, so the password showed up!

note :use INTERNET EXPLORER ONLY for this script ! 

Read more

Backtrack commands tutorial

How to Login in BackTrack
Once the installation of BackTrack is done, the default username and password required to log in are root / toor

How to Open GUI Environment BackTrack
After you are logged in you can start the GUI Environment by issuing the startx command

How to check IP address
root@bt:~# ifconfig

How to Setup IP Address Manually
root@bt:~# ifconfig eth0 192.168.1.8
root@bt:~# route add default gw 192.168.1.1
root@bt:~# echo nameserver 192.168.1.1 > /etc/resolv.conf

How to Change the Root Password
root@bt:~# passwd Enter new UNIX password: {enter your new password here}
Retype new UNIX password: {enter your new password again}
passwd: password updated successfully

How to start services
root@bt:~# /etc/init.d/openvpn start
Starting Virtual private network daemon(s)…
root@bt:~# /etc/init.d/openvpn stop

How to check kernel version
Use the uname -a as show below

Common Apt Commands
apt-get install <package> Downloads <package> and all of its dependencies, and installs or upgrades them.
apt-get remove [--purge] <package> Removes <package> and any packages that depend on it. –purge specifies that packages should be purged.
apt-get update Updates packages listings from the repo, should be run at least once a week.
apt-get upgrade Upgrades all currently installed packages with those updates available from the repo. should be run once a week.
apt-get dist-upgrade [-u] Similar to apt-get upgrade, except that dist-upgrade will install or remove packages to satisfy dependencies.
apt-cache search <pattern> Searches packages and descriptions for <pattern>.
apt-cache show <package> Shows the full description of <package>.
apt-cache showpkg <package> Shows a lot more detail about <package>, and its relationships to other packages.
man apt Will give you more info on these commands as well as many that are in less common usage.

Common dpkg commands
dpkg -i <package.deb> Installs a package file; one that you downloaded manually, for example.
dpkg -c <package.deb> Lists the contents of <package.deb> a .deb file.
dpkg -I <package.deb> Extracts package information from <package.deb> a .deb file.
dpkg -r <package> Removes an installed package named <package>
dpkg -P <package> Purges an installed package named <package>. The difference between remove and purge is that while remove only deletes data and executables, purge also deletes all configuration files in addition.
dpkg -L <package> Gives a listing of all the files installed by <package>. See also dpkg -c for checking the contents of a .deb file.
dpkg -s <package> Shows information on the installed package <package>. See also apt-cache show for viewing package information in the Debian archive and dpkg -I for viewing package information extracted from a .deb file.
dpkg-reconfigure <package> Reconfigures an installed package.
Read more

Tutorial to Install TOR ON WINDOWS 7


INSTALL TOR on WINDOWS 7

The Vidalia Bundle for Windows contains Tor, Vidalia (a GUI for Tor), Torbutton (a plugin for Mozilla Firefox), and Polipo (a web proxy) packaged into one bundle, with the four applications pre-configured to work together. Download either the stable or the experimental version of the Vidalia Bundle.
tor installer splash page
If you have previously installed Tor, Vidalia, or Polipo you can deselect whichever components you do not need to install in the dialog shown below.
select components to install
After you have completed the installer, the components you selected will automatically be started for you.
Tor comes configured as a client by default. It uses a built-in default configuration file, and most people won't need to change any of the settings. Tor is now installed.
After installing Tor and Polipo, you need to configure your applications to use them. The first step is to set up web browsing.
You should use Tor with Firefox and Torbutton, for best safety. The bundle installs the Torbutton plugin for you. Restart your Firefox, and you're all set:

If you plan to run Firefox on a different computer than Tor, see the FAQ entry for running Tor on a different computer.
To Torify other applications that support HTTP proxies, just point them at Polipo (that is, localhost port 8118). To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you can point your application directly at Tor (localhost port 9050), but see this FAQ entry for why this may be dangerous. For applications that support neither SOCKS nor HTTP, take a look at SocksCap or FreeCap. (FreeCap is free software; SocksCap is proprietary.)
Check to see that Vidalia is running. Vidalia uses a small green onion to indicate Tor is running or a dark onion with a red "X" when Tor is not running. You can start or stop Tor by right-clicking on Vidalia's icon in your system tray and selecting "Start" or "Stop" from the menu as shown below:
Vidalia Tray Icon
Next, you should try using your browser with Tor and make sure that your IP address is being anonymized. Click on the Tor detector and see whether it thinks you're using Tor or not. 
If you have a personal firewall that limits your computer's ability to connect to itself, be sure to allow connections from your local applications to local port 8118 and port 9050. If your firewall blocks outgoing connections, punch a hole so it can connect to at least TCP ports 80 and 443.


Download here
Read more

Metasploit Pro 4.5.0

Metasploit Pro 4.5.0 Release - Penetration Testing Software 






Metasploit Pro 4.5.0 delivers completely new capabilities for running full-featured social engineering campaigns as well as significant improvements to the web application scanner. Metasploit Pro users can run sophisticated social engineering campaigns leveraging techniques like phishing and USB drops, watch results in real-time, and present reports containing clear risk analysis and remediation advice for the human attack surface. 

Metasploit 4.5.0 includes 95 new exploits, 72 new auxiliary modules, and 13 new post modules over the 4.4.0 release, for a grand total of 180 new modules, all of which are detailed below. In addition, 56 reported bugs were resolved between 4.4.0 and 4.5.0. 


Modules that are new since the 2012112801 update (the last update in the 4.4.0 line) includes modules targeting the Tectia SSH server, Metasploit, Nessus, Eaton NSM, Nexpose, Microsoft Windows, SIP, Adobe Indesign, Apple Quicktime, BlazeVideo, and Ektron. They are listed immediately below. 


The update for 4.4.0 to 4.5.0 will be published shortly after the release of the 4.5.0 installer, and these release notes will be updated to reflect that update's availability.




Download here



Read more

WinZip full version


Make WINZIP FULL VERSION


hackingtweaks.com


Here is a simple hack to make WinZIP full version to end it's 40 day trail. Follow these steps :

     1.Download this tool called "Resource Hacker" from here.
     2.Install resource hacker and open it.Go to File > Open > Give path of WinRAR.exe file (In most cases it's :C:\Program Files (x86)\WinRAR).     
   
hackingtweaks.com
                                                                                                                                            
     3.Now go to Dialogue and select "Reminder" after expanding Dialogue pane.
     4.Right click on the number inside the "Reminder" and select " Delete Resource".
hackingtweaks.com
               
     5.Now save the changes and save the new file with name "WinRAR" at
some other location apart from C:\Program Files (x86)\WinRAR .
     6.Copy the newly made WinRAR file and paste is at C:\Program Files (x86)\WinRAR folder.
hackingtweaks.com
            
   7.Now restart the system and your WinRAR will no more give that 40 days left pop up !

Read more

Bind an .EXE File to Any File

Bind an .EXE File to Any File without

software

 

Many readers have been asking me how to hide their virus, keylogger, or any .exe file inside a .mp3, .png, etc. file. Here i am going to show you how to hide a virus within a normal media file. In this example we will be hiding a virus inside what appears to be a normal image file. It should work on .mp3, .wav, or any other file, probably even .iso's, never tried that though.

How to Bind an .EXE File to a .PNG File?

1. First, you need to put your virus and a picture in a folder.

2. Right click on the server, click properties.

3. Click the 'Hidden' Option

After that you don't have to worry about the .exe, unless you need to FUD it or something.


4. Now, what you need to do is click properties on the image.

5. Click the change button for what it opens with and choose your server (you have to find it).


6. Now thats all you really have to do, the rest of what you do is up to you.

7. But this isn't very effective, just simple and easy. The only way this will work is one of 2 things.

The person is very stupid, and sees the .exe because his PC shows hidden files, or he/she have the option, 'do not shot hidden files' in control panel/folder options selected.


Now this is what the finished project should look like to normal users:


Now the user will open the picture, see it, and not care anymore. Also, it says the picture is 12 KB, but in reality, the hidden .exe adds to the folder size.


Read more

I-ZxBot and Tutorial


Use I-ZxBot and Control Your Victims




This video explains everything :




Download here







Read more

C Program Without a Main Function






Have you ever wondered how to write a C program without a main function? Can a C program execute with a main function? Is it possible to do that?
Well, the answer is YES! There can be a C program without a main function. Here is the source code of the program without a main function:
#include<stdio.h>
#define decode(s,t,u,m,p,e,d) m##s##u##t
#define begin decode(a,n,i,m,a,t,e) int begin()
{
printf(” hello “);
}


The above program runs perfectly fine even without a main function. But how? What’s the logic behind it? How can we have a C program working without a main function. Read on to find out the answer…
Here, we are using a preprocessor directive called #define with arguments to give an impression that the program runs without the main function. However, in reality it runs with a hidden main function in it.
NOTE: A Preprocessor is program which processes the source code before compilation.
The ‘##‘ operator is called the token pasting or token merging operator. That is, we can merge two or more characters with it. Now, look at the 2nd line of program:
#define decode(s,t,u,m,p,e,d) m##s##u##t
What is the preprocessor doing here? The macro decode(s,t,u,m,p,e,d) is being expanded as “msut” (The ## operator merges m, s, u and t into msut). The logic is, when you pass (s,t,u,m,p,e,d) as argument it merges the 4th, 1st, 3rd and the 2nd characters (tokens).
Now, look at the third line of the program:
#define begin decode(a,n,i,m,a,t,e)

Here the preprocessor replaces the macro “begin” with the expansion decode(a,n,i,m,a,t,e). According to the macro definition in the previous line, the argument must be expanded so that the 4th, 1st, 3rd and the 2nd characters must be merged. In the argument (a,n,i,m,a,t,e) 4th, 1st, 3rd and the 2nd characters are ‘m’, ‘a’, ‘i’ and ‘n’.
So the third line “int begin” is replaced by “int main” by the preprocessor before the program is passed on to the compiler. That’s it.
The bottom line is that, there can never exist a C program without a main function. Here, we are just playing a gimmick that makes us believe that the program runs without the main, but there actually exists a hidden main function in the program. Here, we are using the proprocessor directive to intelligently replace the word “begin” by “main”. In simple words: int begin = int main.
Read more

Booters and Shell collection


Collection Of Booters and Shells


 [Image: bootersandshells.jpg]


Virus Scan :


Download here

Read more

File Extension Spoofer & Pumper


File Extension Spoofer and File Pumper
















This is an amazing program that will change the extension on your files and allow you to pump the size on them. This tool was designed by The Rat Crew..








Download here
Read more

CyberGate RAT COMPLETE TUTORIAL

CyberGate RAT Setup TUTORIAL



CyberGate Features:

- Reverse connection Remote Administration Tool.
- BaseCode64, Xor, RC4 and AES traffic encryption (depends on features, etc … 

- Language support
- View options
- Multi port support
- Remote connection search option
- Injection option to create new servers
- Anti debugging options to create new server
- Startup methods option to create new server
- Password protection method to create new server
- Optional binder option to create new server
- Icon changer option to create new server
- Delayed execution option to create new server
- Customizable installation folder and file name to create new server
- Ftp logs support
- Automatic DNS updater
- Multi profiles builder
- UAC (Vista and Seven protection) bypass on server
Keylogger option
- Password recovery tool (browser, msn, windows …)
- Very light stub (~280kb)
- Chat feature
- File manager
Registry editor
- Services manager
- Windows manager
- Processes manager
- Clipboard manager
- Socks 4/5 Proxy
Http Proxy
- Mass features
- Installed programs manager
- Remote desktop (with capture)
- Remote webcam view (with capture)
- Capture audio
- Remote download and execute
- DOS prompt
- Send message boxes
- Control desktop items (taskbar, icon, start menu)
- Active ports list
- Server control (update, disconnect, restart)
- Remote open HTTP URL
- Send file and execute
- CD Open and Close
- Reverse Mouse Option
- Remote Power Options (Shutdown, Restart, etc …)
- Remote Mouse Lock
- Remote Keyboard Lock
- Remote Icons Hide/show
Remote Start Hide/show
Group support (connections can be organized in groups)
- Several function that can be performed from group panel
- URL visiter (with hidden feature)
- VBscript console
- Multi-user keylogger/file search
- Local file erases tool (erase files beyond recovery)
- Local startup manager tool
- Startup manager
- Programs assist
- Connection log incorporated in the client GUI
- CyberGate has task managers for client and server on connecting
- Task logs
- Add Notes for your connections if you want
- Multiple tabs in the client making your life easier (connections tab, group panel tab, client tasks tab, etc …)
- Automatically map ports if your router supports uPnP
- GeoIP server tracking for accurate remote computer localization tracking
- Easy search function on password recovery tool
- Thumbnails view on file manager allowing display all images of a remote folder
- Lock station 
- Webloader (a webdownloader with 3.5 Kb)
- Windows OS bit system (x32/x64)
- Recoded webcam capture
- Recoded password recovery
- Run remote files as admin


Setup Instructions :

Open Up Cybergate..

Now click Control Center - Start

Click Control Center - Options - Select Listening Ports And Do Following:

[Image: Cerberus_4.png]

Good, You Are Done With The Settings! Now, let's move on to the Virus Creation :).

Click Control Center - Builder - Create Server. Make a new User named Hacking. Press Ok.

[Image: Cybergate_5.png]

Mark the user "Hacker" And press Forward.

Now you should have something like this;

[Image: Cybergate_8.png]

Press 127.0.0.1 | Port 999 and press Delete..:

[Image: Cybergate_9.png]

After that, Click Add.

Now, A Box should pop up saying: 127.0.0.1:81. Like this:

[Image: Cybergate_11.png]

Instead of 127.0.0.1:81 change that to (your local ip)192.168.1.5:81


Now Change the
Identification: remote
Password: cybergate

To This:
Identification: CyberGate
Password: Computermaniac

Good! You are now done with that :). Let's move on to "Installation"

Use the Exact same settings as i do. :

[Image: Cybergate_15.png]

Good, We Skip Message. We Skip Keylogger. In the Anti Debug Have everything checked

In The Build Server: Use Google Chrome Passes and UPX.. (Makes the server smaller)

And press Create Server. Good, You do now have your RAT server complete!

If your RAT doesent work. check following things:

Non-Connecting RATs
  •  You have properly port-forwarded if using a router.
  •  The password in Listening Ports and the password your server uses are identical.
  •  You are Listening on the correct ports.
  •  Your Firewall is letting connections through on the port you're listening on.
  •  Your server is added to excluded files in your Antivirus and Firewall.
  •  Your server injects explorer.exe instead of the default browser.

How to port forward..

Go to Portforward.com and lookup your Router, there shall be a guide on how to port forward on it :). and if you are on a modem.. then you don't need to port forward.

Enter Start - Run . Command. Type ipconfig

The ip which is in the "Standard Gateway", That is your Router IP. 

Type that into your web browser. Log in, And Port forward port: 81



Download here

Read more

THC-HYDRA v6.4 PASSWORD CRACKER


THC-HYDRA v6.4 - Fast network logon cracker for LINUX!


THC-HYDRA v6.4

THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX.

Changelog for thc-hydra v6.4
Update SIP module to extract and use external IP addr return from server error to bypass NAT
Update SIP module to use SASL lib
Update email modules to check clear mode when TLS mode failed
Update Oracle Listener module to work with Oracle DB 9.2
Update LDAP module to support Windows 2008 active directory simple auth
Fix to the connection adaptation engine which would loose planned attempts
Fix make script for CentOS, reported by ya0wei
Print error when a service limits connections and few pairs have to be tested
Improved Mysql module to only init/close when needed
Added patch from the FreeBSD maintainers
Module usage help does not need a target to be specified anymore
configure script now honors /etc/ld.so.conf.d/ directory

Read more

Hack any IP Address

Hack any IP Address

Do you know what your IP address means? Are you aware that your IP address is exposed every time you visit a website? Many websites and hackers use IP address to monitor your geographic position and/or anything that might link to you and other personal information. Your IP address is your online identity. An IP address can be used by hackers to break into your computer, steal personal information, launch attacks that might completely distort your computer's system.

How to steal an IP address

You can now get anyone's IP address using a very simple and straight forward script. Just follow the instruction's below.

1. First you need to have a php enabled hosting site. Below is a list of free php hosting sites

2. Now create a php script using notepad on your computer. Simply copy and paste the script below into your notepad and save it as index.php.
<html>
<?php
$file = "code7.txt";
$f=fopen($file, 'a');
fwrite($f,$_SERVER['REMOTE_ADDR']."\n");
fclose($f);
?>
<p>File not found</p>
</body>
</html>

  
4. Now upload the two files (index.php and code7.txt) to your web hosting site (my3gb.com).

                          


5. The link to your php script that you need to send to your victim will therefore be....
                                     ''www.username.my3gb.com/index.php'' 
6. Once your victim clicks on the above url, he will be redirection to a page ''File not found'' while his IP address will be logged in the file ''code7.txt'' 

That is why it is highly advised to conseal your IP whenever you are surfing the net. This can be done with the help of IP hiding software like Easy-hide ip addressSuperhide IP address e.t.c

Apart from IP hiding software, you can also use free online annonymisers at..
 1. http://hidemyass.com   
 2. www.onlineanonymizer.com  


Read more