Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Aug 20, 2013

100% FUD CRYPTER FOR INCREASING THE CHANCE OF HACKING EMAIL


What is FUD Crypter and how to use it to Bypass antivirus detection for RATs and viruses

I have already written about Keyloggers in my previous articles, like Azure AIO Keylogger, Star Tools, Ref Stealer and many other keyloggers previously to hack e-mail account passwords. I have mentioned about antiviruses detecting keyloggers as hacking softwares (viruses) and hence, hacker has to use Crypters to avoid antivirus detection for keyloggers. Here i'll tell you something more about Crypters - hacking software for bypassing antivirus detections.

What is Crypter?

As said above, Crypter is free software used to hide our viruses, keyloggers or any RAT tool from antiviruses so that they are not detected and deleted by antiviruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus work by splitting source code of application and then search for certain string within source code. If antivirus detects any certain malicious strings, it either stops scan or deletes the file as virus from system.

What does Crypter do?

Crypter simply assigns hidden values to each individual code within source code. Thus, the source code becomes hidden. Hence, our sent crypted trojan and virus bypass antivirus detection and our purpose of hacking them is fulfilled without any AV hindrance. Not only does this crypter hide source code, it will unpack the encryption once the program is executed.

What is FUD?

FUD is acronym for Fully UnDetectable. With increased use of Crypters to bypass antiviruses, AV became more advanced and started including crypter definitions to even detect crypter strings within code. So, use of crypter to hide Ardamax keylogger and RATs became more complicated as nowadays, no publicly available crypter is FUD.

So, if you crypt RATs with publicly available crypters, they are bound to be detected by antiviruses. This is because most FUD crypters remain "FUD" for maximum of one or two days after their public release. To obtain FUD crypters, you have to either search for it in hackingforums or make one (which is somewhat tedius.. I am working on this).


NOW COME TO MAIN PART OF THIS POST

first of all disable your antivirus as it would delete this precious crypter

Download FUD Crypter
 for Free


1. Free recommend :- use our 100% fud crypter to hide virus created from antivirus to make virus undetectable and hack email passwords.

2. Run Blackout Crypter.exe application to see this:



3. Now, select AES or RC4 as your needs. I have selected AES over here. Hit on "Select a stub" and browse to Stub Package folder. Select AES or RC4 stub you want. Here, I have used "Stub 9" from AES folder. The difference between AES and RC4 Encryption System is that AES is the most secure and RC4 is fastest!

4. Hit on "Select a file" and select the server file you want to make undetectable from antiviruses. You can get important hacking keyloggers from my site click here to get it to create a server.exe file. Now, hit on Crypt it and you will get "Crypted.exe" file created in current directory (in "Blackout Crypter" folder).

5. Features of Blackout Crypter:
  • 100% FUD - No AntiVirus will detect your file!
  • 100% FREE
  • AES and RC4 Encryption System
  • 256-Bit Password - Amazingly secure your file
  • Destroy Antivirus - When ran, all antiviruses will be KILLED and DELETED, and then your virus will be ran. All this is done SILENTLY.
  • Scantime and Runtime (After AntiVirus kill) FUD (AntiVirus will be destroyed before running your encrypted file)
  • Supports every damn .exe file on the net!
  • EOF Support - Works with Cybergate.
6. Virus Scan Result:

As the virus scan result shows, Kbw-Logger was 10/21 detectable to antiviruses. But, after crypting it with Blackout Crypter, this detection rate dropped to 1/21.


7. This crypter package contains 12 stubs. So, even if one stub becomes detectable, try out another one. I have personally tried this one and found useful to hack Hotmail password. If you have any problem in using this FUD Crypter to make server undetectable to antivirus, please mention it in comments.


Very Important:
 Do not scan these tools on VirusTotal. Use http://scanner.novirusthanks.org/and also check the "Do not distribute the sample" option.



So guys, this is all about crypter. Hope you found this post useful.

Do you have questions, comments, or suggestions? Feel free to post a comment!

Elite Keylogger Download

Elite Keylogger as your all-in-one PC surveillance solution! Elite Keylogger is the most stealth keyboard monitor and is completely undetectable even by most up-to-date anti-keyloggers and anti-spyware tools. You can be sure that it is the best software for: 


DOWNLOAD ELITE KEYLOGGER 4.7 LATEST 
AND GET FULL VERSION KEY FROM BELOW 
  • PC activity monitoring
  • E-mail capturing
  • Child safety
  • Passwords recording
  • User accounts monitoring
  • Applications history logging
  • Printed documents monitoring
  • etc
Most recent version: Elite Keylogger 4.8 [Build 112]
This version was released on 11th July 2010

Most recent changes:
  • Full Windows 7 compatibility (32-bit editions)
  • Email configuration wizard to help you get the recorded logs delivered to your mailbox
  • Full Unicode support
  • Large logs reading support: logs are loaded in portions to prove the smoothest experience
  • Logs can be e-mailed to any mailbox now: SMTP authentication support added
  • Totally undetectable to anti-viruses and anti-spyware
  • Improved filtering and remote delivery options
  • Passwords capturing mechanisms enhanced
  • Configuration options re-considered
  • Some enhancements in GUI and user interaction
  • New unhide mechanism: runelitekeylogger keyword is now replaced with 'unhide'
  • Special instrustions screen after installation
  • New stealth mechanisms to protect Elite Keylogger from anti-spyware tools
  • and more stability fixes and functionality improvements... 

      HOW TO GET KEY LOGS THROUGH EMAIL
         70% WORKING 30% NOT WORKING 



First, you need to specify the saving/sending interval in "Save/Send every" field. This parameter is counted in minutes. So this makes the least possible interval of 1 minute. After that, enable logs e-mailing by checking the following setting: Send logs to the following e-mail.

Now input the desired e-mail address to receive the logs to. It may be any e-mail at all. However, you need to know the SMTP server address of your mailbox. This ensures smooth delivery of the logs. For instance, for the time this user guide is created, Gmail's SMTP server is smtp.gmail.com. You can find this information in the documentation of your e-mail provider, ISP or admin.

You may change the SMTP port if you know that your SMTP server uses a different one. Input your SMTP server access name and password, usually these two equal your e-mail login name and password.

Now it's time to specify the subject of the letter with logs. Logs are e-mailed as attachments, the body of the letter will contain the instructions on reading them.

As soon as you receive the logs to your e-mail, please, copy them to the separate folder

  HOW TO GET KEY LOGS THROUGH FTP FREE
               80% WORKING 10% NOT WORKING 10% NEUTRAL      
             
At first, you need to specify the saving/sending interval in "Save/Send every" field. This parameter is counted in minutes. So this makes the smallest possible interval of 1 minute. After that, enable logs' sending to FTP by checking the following setting: Send logs to the following FTP server.

If you prefer to receive your logs to an FTP server, and read them later downloading them to another PC for viewing, simply tick the above checkbox. When you fill in the required fields (FTP server address, remote directory, login and password), please, use the "Check FTP server status" option to make sure everything is fine with the configuration.

   SIMPLE METHOD 
  1. FIRST CREATE YOUR FREE ACCOUNT ON WWW.DRIVEHQ.COM
  2. NOW IN "Send OR save logs to the following FTP server" USE            "    http://ftp.drivehq.com  "  or   " ftp.drivehq.com  "    without ("")               try both first which ever works use that 
  3. IN REMOTE DICTONARY USE  "     LOGS     "        without("")
  4. IN REMOTE LOGIN USE YOUR USERNAME OF DRIVEHQ.COM ACCOUNT
  5. IN REMOTE PASSWORD USE UR REAL PASSWORD OF THAT ACCOUNT
  6. CHECK STATUS                                                                                                                                         DOWNLOAD ELITE KEYLOGGER 4.7 LATEST    FULL VERSION KEY OF ELITE KEYLOGGER     
  7. HacksPC1
    000HWN-YV1AYQ-EQRRM4-4ATVYN-64KZ8R-H188PG-XKJ0E5-DE9913-499495-520F45-DE343F-04DFD1-157CCB

    HacksPC2
    000H21-M4GXU5-Z2RFTV-C7JPPE-G83K3C-2EWFAV-MZB9D5-6FE928-61DD4E-16FA4A-6926CE-BC65F1-FC1959

    HacksPC3
    000GXH-QURWY8-EQ3YMR-TU8MET-QB7YHC-GWUY6C-V0AZD0-13B099-F6C681-EE540C-10A36C-BDDB86-AFE24A

    HacksPC4
    000K2U-4RC1F9-UHJ9EU-N9QM60-DUY6BK-2F8KC2-DNKQ0E-89F58F-EF8BD3-F19A7F-2DAB1A-D30688-CBD70B

    HacksPC5
    0000T9-TJM0TM-KFG5W8-A7QC25-8X38XM-X4TZUZ-WTENZK-C7C483-9765D2-AABC3F-FE4406-A7ACB5-909664 

  8. ENJOY YOUR FREE KEYS
  9. PLS DO COMMENTS ON US WE HAVE BEEN WORKING FOR MORE THAN 3 MONTHS FOR THESE KEYS HELP US KEEP VISITING

DNN (DotNetNuke) Hacking

Hello Friends,

Today I will explain a new hacking technique known as DNN (DotNetNuke). I will show you how to hack a DNN website. Is it easy? Yes. It is easy compared to other hacking attacks such as SQL-Injection and Cross Site Scripting. I will teach you how to find your target and how to enter into the target website and upload your files.
DotNetNuke is an open source platform for building web sites based on Microsoft .NET technology. DotNetNuke is mainly provide Content Management System(CMS) for the personal websites.
Below are the easy steps to implement the attack:
  • First use a google dork to find the appropriate target.
inurl:”/portals/0″ site:.com
  • You can change com to your desired domain name like bd ph ae
  • Now search your website on the google after searching you will get many websites choose any one of it.
  • Its time to check the required vulnerability on the website just place this code after the web address.
Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx
  • For example if you got www.victim.com
  • Replace it www.victim.com/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx
  • If you will get this screen means this web is going to hack.
  • Now choose the third option “A File On Your Site” And than paste this java code on your address bar.
javascript:__doPostBack(‘ctlURL$cmdUpload’,”)
  • It will allow you to upload a files on this website you can upload text ~ swf ~ jpg ~ gif ~ pdf ~ Files.
  • After uploading files you can find your file on this address www.victim.com/portals/0/yourfile.extension
here extension is txt jpg swf etc.
  • In our case
www.victim.com/portals/0/b.txt

Security Camera Hacking



Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information. In this post I will show how to use Google Hacking to Hack into a Live Security Camera.


HACKING SECURITY CAMERAS




There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time.
So how do you find such cameras. Just google these following strings and select any result(Top 5 recommended) and you will gain access to the live camera which has full controls.

•inurl:”CgiStart?page=”
•inurl:”viewerframe?mode=motion”
•inurl:/view.shtml
•intitle:”Live View / – AXIS
•inurl:view/view.shtml
•inurl:ViewerFrame?Mode=
•inurl:ViewerFrame?Mode=Refresh
•inurl:axis-cgi/jpg
•inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
•inurl:view/indexFrame.shtml
•inurl:view/index.shtml
•inurl:view/view.shtml
•liveapplet
•intitle:”live view” intitle:axis
•intitle:liveapplet
•allintitle:”Network Camera NetworkCamera” (disconnected)
•intitle:axis intitle:”video server”
•intitle:liveapplet inurl:LvAppl
•intitle:”EvoCam” inurl:”webcam.html”
•intitle:”Live NetSnap Cam-Server feed”
•intitle:”Live View / – AXIS”
•intitle:”Live View / – AXIS 206M”
•intitle:”Live View / – AXIS 206W”
•intitle:”Live View / – AXIS 210?
•inurl:indexFrame.shtml Axis
•inurl:”MultiCameraFrame?Mode=Motion” (disconnected)
•intitle:start inurl:cgistart
•intitle:”WJ-NT104 Main Page”
•intitle:snc-z20 inurl:home/
•intitle:snc-cs3 inurl:home/
•intitle:snc-rz30 inurl:home/
•intitle:”sony network camera snc-p1?
•intitle:”sony network camera snc-m1?
•site:.viewnetcam.com -www.viewnetcam.com
•intitle:”Toshiba Network Camera” user login
•intitle:”netcam live image” (disconnected)
•intitle:”i-Catcher Console – Web Monitor”
•inurl:"viewerframe?mode="” “inurl:"multicameraframe?mode=
•"inurl:"viewerframe?mode=""
•inurl:"viewerframe?mode=" = fun
•inurl:multicameraframe?mode=motion
•code: inurl: view/shtml
•inurl:multicameraframe?mode=
•intext:"mobotix m1? intext:"open menu"
•webcam girl inurl:/view/index.shtml
•inurl:/view/index.shtml+msn
•inurl:"axis-cgi/mjpg" -girls
•"nurl;"viewerframe ?mode=refresh"
•allinurl: "viewerframe?mode=refresh"
•nurl "viewerframe?mode=refresh"
•inurl:”viewerframe?mode refresh”
•inurl:"viewerframe mode="
•inurl"viewerframe?moderefresh"
•inurl view indexframe.shtml
•inurl:/view/index.shtml adult
•multicameraframe?mode="
•inurl:/view/index.shtml msn
•inrul:view/index.shtml
•florida security camera hack
•inurl:multicameraframe?mode= webcams
•inurl:/view/index.shtml camara valencia
•inurl:”multicameraframe?mode=”
•inurl "viewerframe mode motion
•inurl:viewerframe?mode=motion + women
•inurl:”viewerframe?mode=” room
•inurl:view/index"shtml+girls
•inurl index.shtml
•inur:\view\index.shtml
•=>> inurl.view indexframe.shtml
•inurl:"viewerframe>mode:motion
•inurl:indexframe.shtml "axis video server"
•inurl:"viewerframe? mode=refresh"
•inurl "viewerframe mode refres


For Example use this query inurl:”viewerframe?mode=motion” and select any result.

Wow, you can see a live cam on your PC screen!!






As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.

Enjoy LiveCam Hacking !!!!!

Port Forwarding


What is Port Forwarding



In General Sense:

I'll first explain port forwarding in a general sense. Imagine your computer is a human and imagine one port as the mouth, and the data is the food. You can close or open your mouth (port) to eat that food (data) and transfer that food into another location in your body. Same goes for your ear (another port) where it recieves sound, and so on.
The use of port forwarding is to be able to transmit data from an outside world to your computer. This allows an external user to communicate with your computer via a specified port number. Normally you do not want to do this because it can leave your computer vulnerable to attacks but in special cases that you do need this, it will prove very useful.

In Technical sense:

Port forwarding or Port Mapping commonly refers to the change of destination address and/or port on the packet with subsequent regular routing in a network address translator gateway
 to reach a host within a masqueraded, typically private, network based on the port number on which it was received from the originating host. It may also refer to replaying the packet or stream through a secondary socket (e.g. like rinetd) to reach its intended destination.
The technique is used to permit communications by external hosts with services provided within a private local area network (LAN).


Purposes:

Port forwarding allows remote computers (e.g., public machines on the Internet) to connect to a specific computer within a private LAN.
Port forwarding can also be used within a single machine.
Port forwarding is necessary for a standalone computer if any of the following conditions are true:

*   The computer is using a shared IP address.
*   Internet Connection Sharing is enabled.
*   A router is being used with network address translation (NAT) enabled.
 
How is Port Forwarding Configured
 
Simple Port Forwarding
 
 
 
Simple Port Forwarding is a tool that makes it easier to manage the port forwarding settings in your router. You can add new port configurations manually or select from a range of pre-configured ports for many popular applications and apply the settings directly to your router configuration. The program interfaces with the web interface of your router and basically automates the process of navigating to the correct page and entering the values. It is compatible with a wide range of routers, including most Netgear, D-Link and Linksys models as well as some other manufacturers. Simple Port Forwarding also includes additional features that allows you to set a static IP address, test your port forwarding settings, manage Windows Firewall port exceptions and access to online help and guides.
 
 
You can Download SIMPLE PORT FORWARDING Tool 
 
 

Check if your PC is infected or not

A Simple Method to find out if your PC is infected or not:


  • Go to the Start Menu, open the 'Run' Tab
and type the system.ini , confirm by clicking OK.

  • A Window will open:

  1. If you have the following message:


  • It means that your PC is clean !!

  • But if you have this message with red stars, is means that the PC is infected.
  • It is therefore necessary to scan and disinfect your Computer or PC.

Seven Social Network Attacks for Network Hacking




Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.


This book (Seven Deadliest Social Network Attacks) identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, what are the risks of the attack, and how to defend against the attack. Seven attacks were chosen: denial of service, war dialing, penetration testing, protocol tunneling, spanning tree attacks, man-in-themiddle, and password replay.
These are not mutually exclusive; you can exploit the spanning tree protocol, for example, to launch a denial-of-service (DOS) attack. These were chosen because they help illustrate different aspects of network security; the principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data. 








The following skills are uncovered in this book

Chapter 1 (Denial of Service) :- Illustrates how even sophisticated networks can be crippled by a determined hacker with relatively few resources.

Chapter 2 (War Dialing) :- Illustrates how a hacker can circumvent the hardened security perimeter of a network to access “softer” targets.

Chapter 3 (Penetration Testing) :- Discusses the various tools and techniques used for penetration testing that are readily available to both the defenders and the attackers.

Chapter 4 (Protocol Tunneling) :- Presents a method for deliberately subverting your network perimeter to “tunnel” prohibited traffic into and out of your network.

Chapter 5 (Spanning Tree Attacks) :- Discusses the “layer 2” network responsible for knitting together your switches, routers, and other devices into a reliable network and illustrates one way in which to exploit the weak security of this layer.

Chapter 6 (Man-in-the-Middle) :- Discusses a very common attack pattern and just what an attacker can accomplish once he or she has inserted himself or herself into your data stream.

Chapter 7 (Password Replay) :- Focuses on the security of passwords and other static security measures and how an attacker can use various techniques to gain unauthorized access.

This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense. The authors chose the contents of this book because we believe that, underlying the attacks presented here, there are important principles of network security. The attacks are deadly because they exploit principles,assumptions, and practices that are true today and that we believe are likely to remain true for the foreseeable future.

Hack Ethernet ADSL Router and Router Hacking




Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.

Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords.
Here is how you can do it.

Before perform this action you need the following tool.

Now follow these Steps :

Step 1. Go to http://www.whatismyip.com/. Once the page is loaded you will find your IP address. Note it down.

Step 2. Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.

Step 3. Suppose your IP is 123.237.233.134, you can set the range something as 123.237.232.0 to 123.237.234.255 so that there exists atleast 300-400 IP addresses in the range.

Step 4. Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.


 Step 5. Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.



Step 6. Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.

Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below.




If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?
 
By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.
 
WARNING: All the information is just for education purpose only.Please don't use this information for illegal purpose.
 
Our motto is only that you can secure yourself from these types of attack . Always Change your default user name & password..
 

HAVIJ SQL Injection For Hacking

According to a survey the most common technique of hacking a website is SQL Injection. SQL Injection is a technique in which hacker insert SQL codes into web Forum to get Sensitive information like (User Name , Passwords) to access the site and Deface it. The traditional SQL injection method is quite difficult, but now a days there are many tools available online through which any script kiddie can use SQL Injection to deface a webite, because of these tools websites have became more vulnerable to these types of attacks.

One of the popular tools is Havij, Havij is an advanced SQL injection tool which makes SQL Injection very easy for you, Along with SQL injection it has a built in admin page finder which makes it very effective.



Warning - This article is only for education purposes, By reading this article you agree that RHA is not responsible in any way for any kind of damage caused by the information provided in this article.


Supported Databases With Havij

  • MsSQL 2000/2005 with error.
  • MsSQL 2000/2005 no error union based
  • MySQL union based
  • MySQL Blind
  • MySQL error based
  • MySQL time based
  • Oracle union based
  • MsAccess union based
  • Sybase (ASE)

Demonstration

Now i will Show you step by step the process of SQL injection.

Step1: Find SQL injection Vulnerability in tour site and insert the string (like http://www.target.com/index.asp?id=123) of it in Havij as show below.



Step3: Now click on the Analyse button as shown below.



Now if the your Server is Vulnerable the information about the target will appear and the columns will appear like shown in picture below:


Step4: Now click on the Tables button and then click Get Tables button from below column as shown below:


Step5: Now select the Tables with sensitive information and click Get Columns button.After that select the Username and Password Column to get the Username and Password and click on the Get Table button.

Countermeasures: 

Here are some of the countermeasures you can take to reduce the risk of SQL Injection

1.Renaming the admin page will make it difficult for a hacker to locate it

3.Use a Intrusion detection system and compose the signatures for popular SQL injection strings

4. One of the best method to protect your website against SQL Injection attacks is to disallow special characters in the admin form, though this will make your passwords more vulnerable to bruteforce attacks but you can implement a capcha to prevent these types of attack.


Exploit KIT


Blackhole Exploit kit 1.0.2 Download for free



After the public release of zesus code, now the code of BlackHole exploit is available for download. The blackhole exploit kit us commonly used for drive by download attack.A one-year BlackHole license costs around $1,500, a semi-annual one $1,000 and a quarterly one, $700. Another option is to rent it for 24 hours ($50), one week ($200), two weeks ($300), three weeks ($400) or four weeks ($500). But now it is available for free and link is available on many website on the internet.

This is really a bad new for those who purchased the license of his kit, but now it's freely available.
One highly touted feature of BlackHole toolkit is its TDS or Traffic Direction Script. While this is not an entirely new concept in attack toolkits the TDS included her is much more sophisticated and powerful than those in other kits.  


Download Here:
http://www.multiupload.com/ZTZPEA9L5Y

Aug 8, 2013

Can U Detect Who is Invisible On Yahoo ?Ethical Hacking

Friends, If your Friend remain invible from you…. and say that they dont come online……
Then they have to fear now coz there is a way by which u can find that they are online or not……. Now no need to ask from your friend that they came online or not…….
There r many sites which proclaims that they can track invisible user on yahoo…… But according to my personal experiance, they give wrong result many times…..
try thes web site
http://www.imvisible.info/
http://www.viprasys.org/scan/
http://www.yahoo-status.com/
http://www.ydetector.com/

May 2, 2013

India's Top Hackers

India well only five hackers we know, who really have good spot on google so here are these..

1. Rahul Dutt Awasthy

He is the one gye who having world's no 1 ethical hacking blog www.rahulhackingarticles.wetpaint.com on the internet with over 30,000 users all around the world. These days he is working in VIACOM 18 network and also pursuing his MBA from a foreign .
2.Ashik aka Hungry -hacker

Having his very good hacking website after Rahul Dutt Awasthy.Ashik Having good knowledge spots on many hacking and computer security issues. He is student of Nirma University, Ahmadabad. He has his website named as www.hungy-hackers.com.This boy have a very good taste of picking and writing computer security articles.
3. Rahul Tyagi

A little guy from Punjab appears first time on google with his ethical hacking website www.ethicalhacking.do.am .He is the one guy having really good skills in computer security. These days he is studying in Lovely Professional University pursuing his MCA and Brand Ambassador of TCIL-IT Chandigarh as Ethical Hacking Trainee.
4.Rafay Baloch

A guy which has lots of experience in Hacking/security.He currently a computer engineering student running a blog with over 1 lakh visitors per month ,http://rafayhackingarticles.blogspot.com. Great webiste please have atleast one look.

Add One Click Proxy On Google Chrome With Hide My Ass! Web Proxy


We use various proxy websites to hide or change our IP address. There are many popular web proxies available. 


Why use a web proxy?
1. Surf websites anonymously.
2. Hide and change your IP address (your 'online fingerprint').
3. Conceal your web browsing history.
4. SSL encryption for all websites.
5. Bypass web filters and geographic Internet blocks.




With Hide My Ass! Web Proxy Google Chrome extension, we can add one click proxy service to Google Chrome. This extension allows us to use proxy direct from the browser.
After installation, it adds a button in tool bar and opens a settings page. From the settings page, you select proxy site and server location. There are few more settings.















To use the proxy, click on the toolbar button. On click, it will open a pop up box asking for the URL which you want to access with the proxy. Enter the website URL and click on Proxy. Website will open with the help of the proxy website which you have selected in the settings page.

This service does not show any kind of irritating ads or pop ups which makes this service better than other this services. There are many servers in multiple countries and IP address to use.
This service works on all websites. So it is really a nice solution to web filters and geographic Internet blocks.
This service works good. I check it with WhatIsMyIP.com and saw the difference. WhatIsMyIP.com was unable to detect the proxy and was showing my IP different than i was using.
If you use proxy regularly, this extension is worth to install. 

HACK GMAIL ACCOUNTS





This software will hack Gmail accounts. All you need is a bit of social engineering. Just follow the steps below:

1. Extract the RAR archive in a separate folder.
2. Run Gmail Hacker Builder.exe file on your computer.
3. Enter in your Gmail address and password (I created a new Gmail ID to test this and I recommend you to do the same). Hit on Build. Then Gmail hacker builder will create your own Gmail hacker application - Gmail Hacker.exe file which you can use to hack gmail password.
4. Now, send this Gmail Hacker.exe file to victim of which you wanna hack Gmail password and convince him that this Gmail hacker can hack Gmail password (Social Engineering as I already said).
5. Ask him to run Gmail Hacker.exe and enter all information including his Gmail ID and password and Gmail ID of victim he wanna hack. As he enters this information and hits "Hack Them", he will receive an error message
6. You will receive an email in your account containing his password. Enjoy!!!

Download Here :

http://www.mediafire.com/download.php?kax9tzatbitjgxu

Mar 21, 2013

Yahoo Hacking Tools


Yahoo Hacking Tools

Most of the books and stuff at this site use rar, You need to extract the files before you can use it.To download all tools , It's Better you install Internet Download Manager to make your computer download the file faster, all the files is zipped by Winrar. Install both the software before you download the files.

Any tools that use and relevance with yahoo accessories will be available to make up your fun in your daily ..... get download the tools for free by click the title name of the tools

Password Decrypter2k v1.0
RevelationV2.zip
Yahoo Avatar Hack.rar
Yahoo Crazy Talk.rar
Yahoo Delete me.rar
Yahoo Magic Avatar.rar
Yahoo Message Archive Decoder.rar
Yahoo Monitor.rar
Yahoo New Sounds.rar
Yahoo On - Of.rar
Yahoo Rapid Make Mail.rar
Yahoo Spy.rar
Yahoo Webcam Acces.rar
Yahoo Winamp.rar