Showing posts with label hacking tools. Show all posts
Showing posts with label hacking tools. Show all posts

Aug 20, 2013

Hack Ethernet ADSL Router and Router Hacking




Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.

Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords.
Here is how you can do it.

Before perform this action you need the following tool.

Now follow these Steps :

Step 1. Go to http://www.whatismyip.com/. Once the page is loaded you will find your IP address. Note it down.

Step 2. Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.

Step 3. Suppose your IP is 123.237.233.134, you can set the range something as 123.237.232.0 to 123.237.234.255 so that there exists atleast 300-400 IP addresses in the range.

Step 4. Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.


 Step 5. Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.



Step 6. Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.

Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below.




If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?
 
By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.
 
WARNING: All the information is just for education purpose only.Please don't use this information for illegal purpose.
 
Our motto is only that you can secure yourself from these types of attack . Always Change your default user name & password..
 

May 2, 2013

Hack the HAcker: BIN text









Bin Text is basically a text extractor software used to extract text from application or any file. It can extract email ID and password from applications like Hotmail Hacker and Gmail Hacker. Step by Step usage and tutorial is below:

2. Unzip the downloaded Bin Text software in a separate folder.
3. Open Bin Text and browse for the location where you have kept the Gmail Hacker.exe file that you have created. Now Hit Go.
4. Bin Text will scan the whole file and display all the extracted text from Gmail Hacker.exe file.
5. Now scroll down till you find email address and password as I have shown in the screen shot above.

This means that if your friend or someone else has given you this Gmail hacker software and told you that this software can hack email accounts and if you feel suspicious of him, you can easily hack his email account password. Enjoy hacking the hacker!!!

Download here:
http://www.mediafire.com/download.php?xna2noo1nhc6c8a

Mar 21, 2013

Yahoo Hacking Tools


Yahoo Hacking Tools

Most of the books and stuff at this site use rar, You need to extract the files before you can use it.To download all tools , It's Better you install Internet Download Manager to make your computer download the file faster, all the files is zipped by Winrar. Install both the software before you download the files.

Any tools that use and relevance with yahoo accessories will be available to make up your fun in your daily ..... get download the tools for free by click the title name of the tools

Password Decrypter2k v1.0
RevelationV2.zip
Yahoo Avatar Hack.rar
Yahoo Crazy Talk.rar
Yahoo Delete me.rar
Yahoo Magic Avatar.rar
Yahoo Message Archive Decoder.rar
Yahoo Monitor.rar
Yahoo New Sounds.rar
Yahoo On - Of.rar
Yahoo Rapid Make Mail.rar
Yahoo Spy.rar
Yahoo Webcam Acces.rar
Yahoo Winamp.rar

How to detect that a keylogger is installed on a computer or not


Key loggers are software that traces the key strokes on your computer.NOW a days key loggers are mainly used for hacking.So it is IMPORTANT to protect your data from keylogger. It is done in such a way that a person using the computer is unaware of the fact that a key logger is installed on a particular PC.

How does  keyloggers enters your computer ?

There are several ways in which a key logger 

can get into your computer either it is directly installed or it is indirectly transferred to your computer. Most of the time, this malicious file enters a computer when the user downloads an infected application like movies, music or other software applications.

So how to get rid of  keyloggers that is installed on a computer

1. Use updated antivirus and anti spyware
Some of the good anti viruses have capability to detect key loggers. So you should update your antiviruses regularly so that it gets updated for new keyloggers.
2. Use Anti keyloggers
There are anti keyloggers available that will make the task easy for you in finding a keyloggers. Use these softwares if you think there is a high possibility of keyloggers on a computer. The anti keyloggers that i will suggest you is Cyberhawk. Even  Kasperky does a good job in this area too. Also check anti-spy.info. More examples:
·                                http://www.microsoft.com/athome/security/spyware/software/default.mspx
·                                 http://www.lavasoftusa.com/software/adaware/
·                                 http://security.kolla.de/
·                                 http://www.clamwin.com
3. Search for keyloggers yourself
Keyloggers have the capability that they hide them self from the user but are active in the background. There are some shortcuts that are used to see them live on screen
For example : Ctrl + Alt + X or Ctrl + Alt + Wondows Key + X or desktopshark  etc.
4. Use special tools
KL-Detector
Freeware on demand keylogger scanner.
SnoopFree
Freeware antikeylogger that block hook based keyloggers as well as screen captures.For Windows XP.
PSMAntiKeyLogger
PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.
I Hate Keyloggers
Freeware antikeylogger that block hook based keyloggers. For Windows 2000 and XP.

Mail bomber


EMAIL BOMBER WITH LINKS:-
 
password -hackingguide
 and need all bomber so download here;
http://www.filecrop.com/mail-bomber-hack.html