This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

WEP Cracking, FBI Style( In Just 3 Minutes ) !

Okay, before we begin, I give you Hungry Hacker´s fun facts on WEP.


FUN FACTS:


-WEP stands for Wired Equivalent Privacy

-WEP is used to secure wireless networks from eavesdroppers

-WEP usually takes hours to crack


WEP has always been a long and tedious job, untill recently, when two FBI agents demonstrated how it´s possible to crack WEP in under 4 minutes (3 to be exact).


Here is how they did it:


1. Run Kismet to find your target network. Get the SSID and the channel.

2. Run Airodump and start capturing data.

3. With Aireplay, start replaying a packet on the target network. (You can find a ‘good packet’ by looking at the BSSID MAC on Kismet and comparing it to the captured packet’s BSSID MAC).

4. Watch as Airodump goes crazy with new IVs. Thanks to Aireplay.

5. Stop Airodump when you have about 1,000 IVs.

6. Run Aircrack on the captured file.

7. You should see the WEP key infront of you now.


PROGRAMS USED:


-Kismet


Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.

It is designed for Linux.


You can download it at www.kismetwireless.net

A windows version can be downloaded at http://www.renderlab.net/projects/wrt54g/kiswin.html


-Aircrack (Includes Airodump, Aireplay, Aircrack and optional Airdecap for decrypting WEP/WPA capture files)


Aircrack is the 802.11 WEP and WPA-PSK keys cracking program that can recover this keys once enough encrypted packets have been captured with airodump.


Airdecap is used to decrypt WEP/WPA capture files.


Airmon can be used to configure the wireless card.


Aireplay is used to inject frames.


Airodump is used for packet capturing of raw 802.11 frames and is particularly suitable for collecting WEP IVs (initialization vectors) for the intent of using them with aircrack-ng.


Download the whole suit at www.aircrack-ng.org


Av fun and enjoy,

-Hungry Hacker

Mobile can be a Life Saver

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do with it: -


(1) EMERGENCY : The Emergency Number worldwide for **Mobile** is 112. If you find yourself out of coverage area of your mobile network and there is an emergency, Dial 112 And the mobile will search any existing network to establish the emergency number for you, And interestingly this number 112 can be dialed even if the keypad is locked. ** Try it out .**


(2) Have you locked your keys in the car? Does you car have remote keys? : This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call Someone at home on their cell phone from your cell phone. Hold your cell phone about afoot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone fro having to drive your keys to you. Distance is no object. You could be hundreds of miles away, And if you can reach someone who has the other “remote” for your car, you can unlock the doors (or the trunk).


(3) Hidden battery Power : Imagine your cell battery is very low, you are expecting an important call and you don’t have a charger. Nokia instrument comes with are serve battery. To activate, press the keys *3370# Your cell will restart with this reserve and the instrument will show a 50% ncrease in battery. This reserve will get charged when you charge your cell next time


(4) How to disable a STOLEN mobile phone? : To check your Mobile phone’s serial number, key in the following digits on your phone: * # 0 6 # A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won’t get your phone back, but at least you know that

whoever stole it can’t use/sell it either.


(5) Be careful while using your mobile phone : When you try to call someone through mobile phone, don’t put your mobile closer to your ears until the recipient answers. Because directly after dialing, the mobile phone would use it’s maximum signaling power, which is: 2 watts = 33 dbi, Please Be Careful, Message as received (Save your brain) Please use left ear while using cell (mobile), because if you use the right one it will affect brain directly. This is a true fact from Apollo medical team.

Remote Operating System Detection

Now a days we invite the so called victim to a webpage/blog and with the help of a free web traker servive get all his details as in browser/operating system and other details but still i would like to share the traditional method as well.


Detecting OS (operating system) is another most important step towards hacking into a system. We can even say that after tracing the IP of the system it is the most prior thing that should be done to get the root on a system cause without having knowledge about the OS running by the target system you cannot execute any system commands on the target system and thus your mission wont be accomplished. In here I have figure out the basics of detecting OS remotely without having physical access to the system. There are various method of detecting OS like by trace routing the victim’s IP , by pinging the IP , by using telnet and also by using a terminal. But from my research I have concluded that detecting OS through ping or tracerout is the most simplest but effective way of determining the operating system running in the remote computer without having physical access to the system. Since my aim of writing articles is to make things clear for beginners and intermediate so I will explain remote os detecting through ping method which is very easy to understand even for peoples totally new to computers.. yeah yeah.. I know you call them newbies..right ?


REMOTE OS DETECTION USING PING METHOD


What is PING and what is its utility ?


Ping is an MSDOS utility provided for windows version of DOS and for Unix and operating systems having UNIX as the core kernel. It runs in dos box in windows and directly in UNIX platform. In this manual I will give more stress on the MSDOS version of ping.


Ping is an utility used for sending and receiving packets of data to a target system using its IP and thus from the outputs you can figure out many information about the target system.

In remote os detection we are mainly concerned with the TTL values of the received data packets.


Note: When you send or receive a file over the internet it is not send at once. Instead it is broken down at the source system and these broken fragments of data know as data packets are send through the internet and these data packets are gathered together by the target system according to an algorithm constructed by the source system.

For example if I send a picture of size 400 KB to my girl friend (hey girls out there remember I don’t yet have a gf in reality) then what actually happens is that my system breaks the data into data packets, say the file of 400 KB has been broken down into 4 data packets each having a size of 100 KB and having a name. These data packets are assigned a code known as the TTL value of the data packets by my operating system. Then these data packets are gathered and the original file is formed from these data packets at the target system.


Example:


C:\windows>ping/?


Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]

[-r count] [-s count] [[-j host-list] | [-k host-list]]

[-w timeout] target_name


Options:

-t Ping the specified host until stopped.

To see statistics and continue - type Control-Break;

-a Resolve addresses to hostnames.

-n count Number of echo requests to send.

-l size Send buffer size.

-f Set Don’t Fragment flag in packet.

-i TTL Time To Live.

-v TOS Type Of Service.

-r count Record route for count hops.

-s count Timestamp for count hops.

-j host-list Loose source route along host-list.

-k host-list Strict source route along host-list.

-w timeout Timeout in milliseconds to wait for each reply.

Breaking the Restrictions of the Administrator

Hello Friends many of you have come with this problem of hacking the Administrator in Windows XP. So her is the Solution to your problem. This works on Win 2000 & Win XP.


This can be used to gain access to the website you want to for free, and how you can gain access to ‘control panel’, and the various other tools of Windows that may have been blocked from your grasp like ‘regedit’ by the administrator. IT can be used in schools & colleges..


When u are at the log on screen, type in your username and password. Now When you hit enter, and it comes up with the next screen, the rectangle one, immediatly pull out the network cable i.e. the cable wire.


Now you can log on without any restrictions because when the cable is pulled off then it does not download any settings from the server. Now you have access to control panel, & all the other features which had been blocked BUT there will be no network access. But that’s cool because now we can access ‘Internet options’,

click in the ‘connections’ tab click the LAN settings, click the proxy settings, and in the little white box at the bottom we can specify websites that bypass the proxy server (eg www.yahoo.com) Now once you have changed the settings to what you wish, apply them and restart the computer. Now get someone else to log onto it because if you log in it will load the cached settings from your previous log in, then after the other person logs in, everyone that logs in after them included themselves will have the internet settings you specified.


Its only an ‘Unplugging technique’ to gain access to a comp. locked by the administrator.


Now you can gain access to msconfig, regedit, command etc disable the virus scanner, or to install a trojan or a virus according to u’re will..


XP HOME ADVANCED FILE PERMISSIONS.!!


Access *Advance file Permissions* on NTFS file systems for XP Home simply by booting into *Safe Mode*, rt-clicking any file or folder, and navigating to the *Security tab*. This gives the user the ability to allow or deny read, write, execute, read & write, display contents, full-control, iheritance, and take ownership permissions, with many more options available to apply to different users and groups stored on the computer. Well, you don’t have to do this in *Safe Mode* (XP Home). Although it is a little less intuitive, you can simply go to your command prompt - Start>All Programs>Accessories>Command Prompt. Now type “cacls” in the window (without the quotes). This gives you the ability to add, remove or modify file permissions on files and folders through the command prompt. Type “cacls /?” for help on different options and variables. You do not need to be in safe mode to use this so it makes it a little quicker than using the safe mode security tab GUI. Remember - this only applies to NTFS. Here also is a very useful link to find a lot of extras and tweaks straight from the horse’s mouth - the Microsoft Resource Center. You will find a lot of very useful web-based extra’s here, most of them left unknowing to the general public - such as, “Online Crash Analysis” - a site that looks like Windows Update but you can upload your crash “dump logs” (when you get those system or application crash error reports). Microsoft will then analyze the log file and tell you some more info about WHY the system crashed (ie. faulty hardware/software/conflicts, etc).


Now lets c how to open restricted site on college servers

Hungry Hacker recommends : http://unblockall.net/



  • Bypass any filters from work or school and access your favorite community and entertainment sites

  • Enjoy a fast and reliable connection. Our dedicated machines have 1Gbps connection and 2 quad processors

  • Chat with your friends from work

  • Watch videos on Youtube

  • Login into Myspace, Facebook and all the popular community sites without losing the proxy

  • No traffic redirection

  • No PopUp and Annoying Ads!


To use our service, simply type the address of the web site which you want to open in the field above and hit GO. This will automatically lead you to the destination page. With our service you are guaranteed to be able to login and operatate normally.


PLEASE DROP IN YOUR COMMENTS BELOW

Top 10 Windows Hacking Tools

This is the Collection of Best Windows Hacking Tools:


1. Cain & Abel - Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.


2. SuperScan - SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.


3. GFI LANguard Network Security Scanner - GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!


4. Retina - Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.


5. SamSpade - SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.


6. N-Stealth - N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.


7. Solarwinds - Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.


8. Achilles - The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly. Due to a cyber squatter, Achilles is no longer online at its original home of www.Digizen-Security.com…OOPS!


9. CookieDigger - CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.


10. Netcat (The Network SwissArmy Knife) - Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.

How to make Keygens?

Attention : This Article is Only for Real Geeks

Disclaimer :
I take no responsibility of the usage of this information.

This tutorial, is for educational knowledge ONLY.




How to make key generators?


Introduction

Hi there, in this tutorial, I intend to teach you how to make a pretty

simple keygen, of a program called W3Filer 32 V1.1.3.

W3Filer is a pretty good web downloader…

I guess some of you might know the program.

I`ll assume you know:

A. How to use debugger (in this case, SoftIce).

B. How to crack, generally (finding protection routines,patching them,etc…).

C. How to use Disassembler (This knowledge can help).

D. Assembly.

E. How to code in Turbo Pascal ™.


Tools you`ll need:


A. SoftIce 3.00/01 or newer.

B. WD32Asm. (Not a must).

C. The program W3Filer V1.13 (if not provided in this package), can be found in

www.windows95.com I believe.

D. Turbo Pascal (ANY version).



Well, enough blah blah, let’s go cracking…


Run W3Filer 32.

A nag screen pops, and , demands registration (Hmm, this sux ;-)) Now,

We notice this program has some kind of serial number (Mine is 873977046),

Let’s keep the serial in mind, I bet we`ll meet it again while we’re on

the debugger.

Well, now, let’s put your name and a dummy reg code…

set a BP on GetDlgItemTextA, and, press OK.

Top 10 Linux Hacking Tools

This is a Cool Collection of Top Ten Linux Hacking Tools.


1. nmap - Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.


2. Nikto - Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).


3. THC-Amap - Amap is a next-generation tool for assistingnetwork penetration testing. It performs fast and reliable application protocol detection, independant on the TCP/UDP port they are being bound to.


4. Ethereal - Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product.


5. THC-Hydra - Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.



6. Metasploit Framework - The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. This project initially started off as a portable network game and has evolved into a powerful tool for penetration testing, exploit development, and vulnerability research.


7. John the Ripper - John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.


8. Nessus - Nessus is the world’s most popular vulnerability scanner used in over 75,000 organisations world-wide. Many of the world’s largest organisations are realising significant cost savings by using Nessus to audit business-critical enterprise devices and applications.


9. IRPAS - Internetwork Routing Protocol Attack Suite - Routing protocols are by definition protocols, which are used by routers to communicate with each other about ways to deliver routed protocols, such as IP. While many improvements have been done to the host security since the early days of the Internet, the core of this network still uses unauthenticated services for critical communication.


10. Rainbowcrack - RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called “rainbow table”.