Thursday, 16 July 2015

Top 5 wifi hacking tools free download for windows and linux

1#wireshark

wireshark is wifi hacking tools which hack wifi by analyzing network protocol.user can receive packets and analyze them by using wireshark .it can b use in windows and linux .this tool is helpful in wifi hacking you can free download this tool from below


click here to download

2#aircrack

aircrack is use to hack wep and wpa passwords .this tool is know more powerful in linux .but it also works in windows .before using this tool make sure wireless can inject packets .you can free download this tool from below 

click here to download

3#airjack

airjack is a network protocoks injecter this tool is use to crack wifi password and also use to dos attack on a wireless network ,free download this tool from link given below

click here to download

4#airsnort 

airsnort is useful in decrypting wep password download it from  given link

click here to download

5#cain and abel

cain and abel is use to hack wifi password by using bruteforce attack 
you can watch video how to use cain and abel:  watch video
and also download it from below

click here to download

Monday, 13 July 2015

HACK FACEBOOK ACCOUNT WITH NABTAB ATTACK USING BACKTRACK5

HACK ANY FB ACCOUNT



Hack FB Account with nab-tab attack 100% working
Hack FB Account with nab-tab attack 100% working from Basit khan on Vimeo.

How to hack wifi with cain and abel step by step video

FREE DOWNLOAD CAIN AND ABEL AND HACK WIFI

WATCH VIDEO HOW TO HACK WIFI STEP BY STEP AND DOWNLOAD CAIN AND ABEL 



wifi hacking from Basit khan on Vimeo.

how to hack any pc with prorat step by step and free download prorat

FREE DOWNLOAD PRORAT

  WHAT IS PRO RAT??

pro rat is a remote adminastartion tool .pro rat opens a port on infected computer and allows the client to hack computer

HOW TO HACK WITH PRORAT??


1# FIRST DOWNLOAD AND RUN PRO RAT FROM LINK GIVEN BELOW 

CLICK HERE TO FREE DOWNLOAD PRORAT



BEFORE YOU RUN IT MAKE SURE ANTI-VIRUS IS DISABLE

2#CLICK ON CREATE BUTTON TO CREATE SERVER
3# PUT IP ADDRESS BY CLICKING IN IP BOX
4# OPEN NOTIFICATIONS HERE TYPE YOUR EMAIL IN WHICH YOU WANT TO RECEIVE DATA 
5# click on general setting enter port number
enter server password
you can also give fake error  message 
when your victim install server he/she get this fake error
6# click on bind with file option at the ri8 side bar you can bind it with any file you want to send to your victim then it will more possible that victim install it
7# then click on server extensions here click on EXE then click on  server icon and select any icon this will show on your victim pc when he /she try to install server 
8# click on create server at the bottom and finally you create your server  
you can rename this file as you want and then send it ti victim and asked him to install :D

9# when victim install this file his pc fully hacked by you can do much thing and you have control like this is your own pc and its look like this




XSS attacking pdf book free download

MAIN TOPICS OF BOOK


1# INTRODUCTION 

History of XXS
Web application security

2#Attacking methods

History stealing
Intranet Hacking
XXS Defacement

3#Advanced XXS Attacks

DNS Pinning 
MHTML
Hacking JSON

4# XSS Exploited 

XXS vs. Firefox Password Manager
XXSing Firefox extension


5# Exploit Framework 

ATTACK API
BEeF
CAL9000

Free download loic ddos attacker for websites

LOIC FREE DOWNLOAD TO DDOS ANY SITE

 HOW TO USE :

download and run loic from link given below


click here to download





this tool is ddos attacker for websites use to down any site by sending http or ftp request 

enter url or ip of you target site 
then select setting as i selected in pic

it take much time to ddos

How to format write protected usb with hp usb disk tool

HOW TO FORMAT WRITE PROTECTED USB :

when we plug of our usb when we are writing data on our usb like copy or install some thing or making our usb bootable  it will be  write protected and when we want to format it show an error that usb is write protected or usb is read-only memory 


 1# download usbdisktool from link given below 

CLICK HERE TO DOWNLOAD


2# SELECT YOUR USB  DISK 
3# CLICK ON QUICK FORMAT
4# CLICK ON  START BUTTON

after that your usb is formated  

c++ for hackers pdf book free download

in this book:

* basic        *typecasting     *loops       *classes
*functions    *pointers  *binary trees  
* arrays and much more....

in this book you can learn c++ for hacking .there are 20 lesson which are very use full 

you can download it from below

CLICK HERE TO FREE DOWNLOAD PDF BOOK

Sunday, 12 July 2015

Free Download Cybergate With Hacking Tutorials Step By Step

FREE DOWNLOAD CYBER GATE

 WHAT IS CYBER GATE    AND ITS FEATURES :

cybergate is an RAT tool ,that help us to hack with remote administration connection to our target and also keylogger attack. we can hack desktop and webcam and files etc.

HOW TO USE :

1# DOWNLOAD CYBERGATE FROM LINK GIVEN BELOW 

CLICK HERE TO FREE DOWNLOAD



2# open cybergate and click on control center-start-option-select listening ports

3# know click on contorl center  goto builder and then click on create server 
4#make the user and press enter then you have something like this


5#press on dns and port and press delet
then click add to add connection

6#enter your local ip  click on ok 
change identification to remote and change password 
7#select same setting as i do..
in build server use google chrome passes and  upx and press create server
know you have RAT SERVER use this file to hack and send it to target

Free Download havij cracked for sql injection attack to hack websites

free download havij full cracked

what is havij??

havij is a web hacking tool that is use to hack sql vulnerable sites and you can download it from below 

CLICK HERE TO DOWNLOAD




1# download and install havij
2# go to google and  search google dorks


3#open any url and in the end of url type    '     and then press enter if you get a sql erroe thats mean the site is vulen for sql attack
4# open havij and paste url and click on analyze
5# it will start searching...
6# if it show this box then thats it
7#click on tables button and then click on column like admin and user or login to get info
then if it show username and password click on those column and press get data button.
then it shows username and password






Facebook Ethical hacking pdf book free download

hack facebook with tricks and tips

this book is for dummies and  new user .it guide how to hack facebook  with new tricks and tips and also guide to use many tools .

you can simply download it from link given below

CLICK HERE TO DOWNLOAD PDF BOOK

Saturday, 11 July 2015

installing linux in usb step by step with pics in easy way

rufus is the best tool use to make your usb bootable and alow us to install any linux in usb

how to install any linux in usb ???

1# go to link and dowload rufus and run it 

click here to download 

you must have 8 gb usb and linux downloaded in iso image file


then click on drive icon to upload iso image file from hard drive

click start button to start and click on ok

after that when done message shows in below thats it!!
know only you need to reboot your system and prees f2  to boot menu and select usb as a first drive to boot 
then save your setting and after that press f8 to start up the linux
you can also use virtualbox if you want to use linux and windows at a time 







easy way 2 install backtrack5 and kali-linux in android mobile or tab

why it is important to install backtack5 and kali-linux in android mobile phones and tab???

it is very important to install backtrack5 or linux in android mobile and tab becuase know a day linux users have to use linux every where , a linux user do not cary his pc to where he/she is going and it is needed to install linux in android devices.in this post i am going to show you how to install kali-linux and backtrack5 in android devices 


1# Installing and running kali-linux in android device

1# your device must  have busybox and it is rooted
2# then download and run androidvnc from google play store
3#download and install  linux deploy
4# 0nes you have all above things then start up linux deploy and press the arrow in right bottom corner to open preferences menu
5# from distribution  select kali-linux from the list of linux os
6#select external sd card to install you must have 16gb sd card
7#ones you have installation path select GUI to change screen height and width
8#ones all these steps completed then select install linux this take some time and it is lengthy
9# after installing go back to preferences and select reconfigure this will configure kali to your device
10#then hit start  and kali will start running
11#select android vnc viewer.select new conection ,select port 5900 and select color setting 24-bit after that select connect and kali will start up

note : after you close kali make sure you have close linux deploy ,busybox and android vnc becuse these take much bettry.


2# how to install backtrack5 in android device

you need all these and you can get from google play store

1#linux installer 
2#zarchive
3#busybox
4#android vnc 
5# terminal emulator



1# open linux instaler and click on install guides then click on  download image to download backtrack5
2#open terminal emulator
3#and then open zarchive to extraxt image file into a root folder name as "backtrack5"
4#open linux installer and click on launch and select backtrack 5 where it is extraxtrd and click on start
5# in terminal emulator give all information 
6# start android vnc set up the same setting as i tell in installing kali
get your ip by open backtrack terminal in terminal emulator and run commend= ifconfig
and after that  in end select color 24-bit 
7# click on connect to run backtrack5

note: after using backtrack off all the apps your using for backtrack 



Wednesday, 8 July 2015

make-cheap-international-calls-with


1. Download Tring app from play store, use this link to download it.
2. Now install it in your android device and open it.
3. Once you open the app, it will ask your mobile number. Just enter your mobile number.
4. Now this app will make a call to verify whether you are using your own number or an alive number.
5. Now after verification, the app is ready to be used.
6. Open the app and start making calls. For testing, this app gives free credits of $0.5 also.

How to find an IP address of a fake Facebook user

Steps in finding an IP address of a fake Facebook user:

#1. Collect as much information about the fake profile as you can and identify all of the people who are connected to the profile. Make a list of connected people to this account who are your real life friends.

#2. Select any one of your close friend or relative on that list (select most trusted person). The person which you have selected will be doing all the job for you. If there is nobody you can trust on this list then ask any of your trusted friend to Befriend this fake profile user.

#3. Ask your Friend to start chatting with this fake user casually everyday. (Remember whatever you do should remain between you can your friend. do not let it spread among other close friends)

#4. Now Go to http://iptracking.geniushackers.com and fill in your valid email address and enter any name in the ‘Link Name’ field. Click Generate.

#5. In the next page you will get a unique link. Just copy this unique link that will look something like this one:

http://iptracking.geniushackers.com/friendship.php?linkid=0gds65g1s2dg169741f32428a9
#6. Next goto http://goo.gl and paste your ‘Unique URL’ (that is too long) in the text field and click shorten URL. You will get short URL that will look something like this: http://goo.gl/5WEils

#7. Ask your friend to send this shortened URL to the Fake profile user along with some nice message via chat such that he should click on that URL. Example message:

“Hey wassup? i found this really nice story, read here: http://goo.gl/5WEils
#8 As soon as the fake user clicks on that link, you will receive an email with a link to his System details. example details: 
Steps for Tracing fake profile user and catching the culprit:

Now that you have found out the IP address of the fake user, its time to know more about this fake user.

#9. Goto http://www.iptrackeronline.com and enter the ‘IP address’ of the fake user, click submit query.

#10. On the new page, scroll down a bit and you will get to see all the details like ISP, Area-code, Postal-code, etc. regarding his IP address along with a Map.

#11. Relate these details with the suspect. If you are not able to suspect anyone then approach your attorney or lawyer, he will file the necessary documents for the ISP to disclose the subscriber details for the IP address.

#12. If you are suspecting anyone but not sure if its him then repeat the steps 3 to 8 for this suspect. You can take help of the same friend and ask him to craft some different message accompanied by IP tracking link for this suspect.

#13. As soon as your suspect clicks this link, you will have his IP address. Now match his IP address with the IP address of the Fake user. If there is a match, well congrats!! you have successfully nabbed the culprit.

Hope this tutorial helps. If you have any questions regarding fake Facebook profiles

Friday, 31 October 2014

PC HACKING,How to break adminstrater pasword in xp



This method is little bit lengthy but working.
I give the sample method also after your response.

Steps:1
Place your Windows XP CD(Boot-able) in your CD-rom and start your computer.
2:
Keep your eye on the screen messages for booting to your CD.Typically, it will be “Press any key to boot from CD.”
3:
Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.
4:
When you get to the Welcome and Setup screen, press ENTER to Setup Windows.
5:
The Licensing Agreement comes next - Press F8 to accept it.
6:
The next screen is the Setup screen, which gives you the option to do a Repair.It should read something like “If one of the following Windows XP installations is damaged, Setup cantry to repair it.”
7:
Use the up and down arrow keys to select your XP instruction.
8:
Let the Repair run.Setup will now check your disks and then start copying files which can take several minutes.
9:
Shortly after the Copying Files stage, you will be required to reboot.(This will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”.)
10:
During the reboot, do not make the mistake of “pressing any key” to boot from the CD again!Setup will resume automatically with the standard billboard screens, and you will notice installing Windows is highlighted.
11:
Keep your eye on the lower left hand side of the screen, and when you see the Installing Devices progress bar, press SHIFT F10.This is the security hole! A command console will now open up giving you the potential for wide access to your system.
12:
At the prompt, type NUSRMGR.CPL and press Enter. Now you have just gained graphical access to your User Accounts in the Control Panel.
13:
Now simply pick the account you need to change and remove or change your password as you prefer.If you want to log on without having to enter your new password, you can type control userpasswords at the prompt and choose to log on:
The screen shot or uploded soon.
If this post helpful for you.

how to hack wifi

HOW TO HACK A WIFI NETWORK =>
Courtesy : Computer Expert
So.. Here’s how we do it..
1) First we need to scan for
available wireless networks.
Theres this great tool for
windows to do this.. called
“NetStumbler” or Kismet for
Windows and Linux and KisMac
for Mac
It’ll also show how the Wi-fi
network is secured..
The two most common
encryption types are:
1. WEP
2. WAP
WEP i.e Wire Equivalent Privacy
is not consideres as safe as WAP
i.e Wireless Application
Protocol.
WEPhave many flaws that
allows a hacker to crack a WEP
key easily.. whereas
WAPis currently the most
secure and best option to
secure a wi-fi network..
It can’t be easily cracked as WEP
because the only way to retreive
a WAP key is to use a brute-force
attack or dictionary atack.
Here I’ll tell you how to Crack
WEP
To crack WEP we will be using
Live Linux distribution called
BackTrack to crack WEP.
BackTrack have lots of
preinstalled softwares for this
very purpose..
Thetools we will be using on
Backtrack are:
Kismet – a wireless network
detector
airodump – captures packets
from a wireless router
aireplay – forges ARP requests
aircrack – decrypts the WEP keys
1. First of all we have to find a
wireless access point along with
its bssid, essid and channel
number. To do this we will run
kismet by opening up the
terminal and typing in kismet. It
may ask you for the appropriate
adapter which in my case is
ath0. You can see your device’s
name by typing in the command
iwconfig.
2.To be able to do some of the
later things, your wireless
adapter must be put into
monitor mode. Kismet
automatically does this and as
long as you keep it open, your
wireless adapter will stay in
monitor mode.
3. In kismet you will see the flags
Y/N/0. Each one stands for a
different type of encryption. In
our case we will be looking for
access points with the WEP
encryption. Y=WEP N=OPEN
0=OTHER(usually WAP).
4.Once you find an access point,
open a text document and paste
in the networks broadcast
name (essid), its mac address
(bssid) and its channel number.
To get the above information,
use the arrow keys to select an
access point and hit <ENTER> to
get more information about it.
5. The next step is to start
collecting data from the access
point with airodump. Open up a
new terminal and start
airodump by typing in the
command:
airodump-ng -c [channel#] -w
[filename] –bssid [bssid]
[device]
In the above command
airodump-ng starts the
program , the channel of your
access point goes after -c , the
file you wish to output the data
goes after -w , and the MAC
address of the access point goes
after –bssid. The command ends
with the device name. Make sure
to leave out the brackets.
6. Leave the above running and
open another terminal. Next we
will generate some fake packets
to the target access point so that
the speed of the data output will
increase. Put in the following
command:
aireplay-ng -1 0 -a [bssid] -h
00:11:22:33:44:55:66 -e [essid]
[device]
In the above command we are
using the airplay-ng program.
The -1 tells the program the
specific attack we wish to use
which in this case is fake
authentication with the access
point. The 0 cites the delay
between attacks, -a is the MAC
address of the target access
point, -h is your wireless
adapters MAC address, -e is the
name (essid) of the target
access point, and the command
ends with the your wireless
adapters device name.
7. Now, we will force the target
access point to send out a huge
amount of packets that we will
be able to take advantage of by
using them to attempt to crack
the WEP key. Once the following
command is executed, check
your airodump-ng terminal and
you should see the ARP packet
count to start to increase. The
command is:
aireplay-ng-3 -b [bssid] -h
00:11:22:33:44:5:66 [device]
In this command, the -3 tells the
program the specific type of
attack which in this case is
packet injection, -b is the MAC
address of the target access
point , -h is your wireless
adapters MAC address, and the
wireless adapter device name
goes at the end.
8. Once you have collected
around 50k-500k packets, you
may begin the attempt to break
the WEP key. The command to
begin the cracking process is:
aircrack-ng -a 1 -b [bssid] -n 128
[filename].ivs
In thiscommand the -a 1 forces
the program into the WEP attack
mode, the -b is the targets MAC
address, and the -n 128 tells the
program the WEP key length. If
you don’t know the -n , then
leave it out. This should crack the
WEP key within seconds. The
more packets you capture, the
bigger chance you have of
cracking the WEP key.

FB Hacking

HACK FACEBOOK OR ANY ACCOUNT BY PHISHING METHOD EASILY




Hack Facebook Or Any Account By Phishing Method Easily




Facebook has evolved into one of the hottest social networking website in the world. Here is a simple tutorial that you can use to hack your friend’s facebook password. Here i’m writting on hacking Facebbok password using Facebook Phisher.

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public 



Facebook Phisher 

Please Note: Phishing is legally offensive. I am not responsible for any action done by you.

Hacking Facebook password:

Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. I recommend the use of Phishing to hack facebook account since it is the easiest one.

1. First of all download from here:

http://www.mediafire.com/?1kjertebk6j3815

2. The downloaded file contains:

  • Index.html

  • write.php

If you want Fake login page of all the top sites then download it from here:-

4. Now, send this phisher link (index.html link) to your victim and make him login to his Facebook account using your sent Phisher.

5. Once he logs in to his Facebook account using Phisher, all his typed Facebook id and password is stored in “passes.txt”. This file is created in your webhost control panel as shown.

If you dont get passes.txt, try refreshing your page.Once you get passes.txt, you get Facebook password and can easily use it for hacking Facebook account.
6. Now, open passes.txt to get hacked Facebook id and password as shown.


Hope this tutorial was useful for you.

If you are creating the phisher in  http://www.000webhost.com then follow this tutorial:

Step 1: The First Step in Making the site is to regester an account at http://www.000webhost.com/order.php (if you have account than you can skip first 2 steps)
Step 2: Now Goto your email account that you gave and confirm your account with confirmation link

Step 3: Now download the phisher (http://www.mediafire.com/?klq1vak76bouzrw ) .

Step 4: Now Goto http://members.000webhost.com/ and Log into your account.


Step 5: Now when you are logged into your account click on the Go to Cpanel  in front of your domain that you had registered, and then Go to File Manager under Files and log into it.



Step 6: Now Click on the Public_html.


Step 7: Now click on the Upload button, choose the file under the Archives that you have downloaded, to be uploaded.


Step 7: Now any one who visits your site would be taken to the Fake Facebook Login Page. After they enter their Username and Password, they will be taken to another page that will show them error. So there is less chance that it will be detected.


NOTE::: To access the input data ( Usernames and Password ) Goto the Following Address:

http://www.yoursitesadress.p4o.net/lol.html

If I am not clear in any point Please ask me in comments below.
THE DOWNLOAD LINK TO facebook.zip is http://adf.ly/73Q4s
PS:> If www.p4o.net didn’t worked for you, you can use :
www.drivehq.com
www.yourfreehosting.net
www.esmartstart.com
=============================================================
The Input Data (Email and Password) will look like following:


UPDATE:
Now if you have successfully made the Phishing page(site) then you must know that on Facebook you cannot post it, mail it, or sent it in chat. e.g: www.yoursite.p4o.net. This is because Facebook dont allow the T35.com sites. So Solution to this problem is to use http://www.dot.tk for the URL hiding.
All you have to do is to Goto http://www.dot.tk , on the main page enter your Phishers address and get a domain for that. Like for www.myphisher.p4o.net you gets www.myphisher.tk. And facebook will allow you to post it
HOW TO FIND YOUR USERNAME?
Ok guys this is the most asked question of all so here is a simple answer, just look in the following picture of Admin Paned the red shaded area tells you the username of the website

Powered by Blogger.

Download