Skip to main content

Posts

Showing posts with the label Security Tricks

Ardamax Keylogger Tutorial

I. Get Ardamax 2.8: Ardamax Keylogger is the coolest tool for monitoring user activity on a computer. It records all keystrokes into an encrypted log file. A log file contains information about the user working on the computer, the time of typesetting and the used application. You can view it any time you want with the help of a built-in viewer program. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited. Using this tool you will always know who used the computer, when he used it and for what purpose. Main keylogger features: Invisible mode ? the keylogger can be absolutely invisible for users. Nobody will be able to see it in the Start menu, in the list of the installed programs, in the Startup list, in the Task Manager and on the drive where it is installed. You can easily switch on/off this mode using shortcuts. Powerful Log Viewer ? you can view the log file visually. You can filter your records according to different criteria...

Hack Computers Inside LAN Network

Today,I will address about hacking computer central the LAN network. This address will be demography advantage of Anchorage 139. Most of the time,Port 139 will be opened. First of all,I will do a anchorage scanning at the ambition computer which is 192.168.40.128. This computer is central my LAN network. I will browse it application Nmap. I get the result and it shows Port 139 is opened up for me. Now you will need both of these tools: ** USER2SID & SID2USER ** NetBios Auditing Tool You can get both of them on the Internet. After you get both of them,put them in the C:\ directory. You now need to create a null session to the target computer. Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER. We will first using USER2SID to get the ID. We will test against the Guest account because Guest account is a built in account. After we get the ID,we need to do some modificati...

[tut] How to create Fake login page for any website

A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords. In my last post Facebook (Hacking) Fake Login Page/Fake Login Script ! i showed you to how to use fake login page of facebook.. But i was asked by many others that what about other sites, HOw would i create fake login page for other sites such as orkut, facebook ,myspace,gmail and etc So in this post i will show method to create Fake login page for desired site: How to create fake login page - Procedure? Now it's easy to build a Fake Login Pages without any knowledge of Programming Languages . One can use http://www.jotform.com to build the Sign Up page . {1} Open www.jotform.com and Sign Up. {2} then Login there with your newly registered account. {3} now click on ‘ Create your first form’. {4} Now delete all the pre-defined entries, just leave ‘Firs...

Hide Keyloggers and Trojans with Binders

You would have probably heard that never run a . exe file if you are not confirmed about the authenticity of the person who send you that particular file, The reason why you might have heard that because Trojans, Keylogger , Spywares and Adwares use .exe format by default So what do you think are you completely safe that you run untrusted MP3,JPEG files? The answer is no, Its because you never know that virus has came with which format, It can take any format, It could be in JPEG, It could be in MP3 and it could be in almost any Format, So in this article I will tell you how hackers hide Keyloggers,Trojans and other harmful viruses in other files   What is a Binder?  A Binder is a software used to bind or combine to or more files under one name and extension, The files to be binded can have any extension or icon, Its all up to you and you have the choice to select the name, icon and various attributes of binded file, The Binded files can be even worse when they are crypte...

Brute force attack

Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password .. but when? How long will it take? The two-character password will require 26*26=676 combinations. The number of possible combinations (and therefore required time) grows rapidly as the length of the password increases and this method quickly becomes useless. Do you ready to wait for two months while your 9-character password is cracked? What about one hundred years for an 11-character password? Besides the maximal length of the character set you should also specify the character set i.e. the list of characters that will be included in the combinations. The longer the character set is, the longer the required period of time is. Here is the problem: usually you have no idea of what characters are ...

Hack a website with denial of service attack

What is a Denial Of Service Attack? A denial of service attack   (DOS) is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources, so that no one can access it. If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine to accomplish a denial of service attack,this one of the most used method for website hacking Types of denial of service attacks There are several general categories of DoS attacks.Popularly, the attacks are divided into three classes: bandwidth attacks, protocol attacks l ogic attacks What is Distributed Denial of Service Attack? To hack a website An attacker launches the attack using several machines. In this case, an attacker breaks into several machines, or coordinates with several zombies to launch an attack against a target or network at the same time. This makes it difficult to detect because attacks originate from se...

Common methods to hack a website

Gone are the days when website hacking was a sophisticated art. Today any body can access through the Internet and start hacking your website. All that is needed is doing a search on google with keywords like “ how to hack website ”, “ hack into a website ”, “ Hacking a website ” etc. The following article is not an effort to teach you website hacking , but it has more to do with raising awareness on some common website hacking methods. The Simple SQL Injection Hack SQL Injection involves entering SQL code into web forms, eg. login fields, or into the browser address field, to access and manipulate the database behind the site, system or application.  When you enter text in the Username and Password fields of a login screen, the data you input is typically inserted into an SQL command. This command checks the data you've entered against the relevant table in the database. If your input matches table/row data, you're granted access (in the case of a login screen). If not, yo...

Facebook Hacking Using Firesheep

Firesheep Makes Facebook Hacking Easy Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly last 24 hours, With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account What is Session Hijacking? In a Http session hijacking attack an attacker steals victims cookies, Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook Google, Yahoo, Orkut, Flickr etc or any other email account How can a ...