Thursday, 23 May 2013

HACK ANY gmail,yahoo,facebook and more




What Do We Need
#Backtrack 5
#Access To Victim PC
#Brain That works.

Step 1 :
Go To -> Social Engineering Attacks -> Website Attack Vendors -> Credential Harvester Attack Method.

Step 2 :
We now have the option to use a web template that will create a generic website for you, we can import any webpage to use, or you can clone any existing website and use that. Mine attack is targeted to gather the credits of Google Mail,so i'll Select number 1, “Web Templates”

Step 3 :
As you can see in the picture above, SET comes with templates for several popular programs. Once you select one of the templates, I'll chose number 2 – “Gmail”, you will be given a short message about username and password form fields, just hit “return”. SET has now created a fake website using the template that you chose, and prepare to harvest any credentials that are entered on the fake website.Now That Is Some Ninja Stuff .

Step 4 :
Now you need to make the victim click on this Page and make him enter his details.You need Creativity for this, You can embed this on your website or spoof the victim to the fake page,Use your imagination.


NEW : How To Protect Against This Attack :
Due to the complaints that say "you are evil or bad", now i'll tell you how to protect against the attack listed above,See i'm not that evil .

Now What the victim is seeing is an Gmail login screen,Bu if you just look up in the address bar,you will see the IP address ,NOT the www.gmail.com address,Also if you use internet explorer or some modern browser,It'll show an Certificate warning,.Also you can use that IP displayed on the fake page to hack the hacker,Choice is your.


^^^ What the Victim See's after the attack is commenced.
So i'll love to see your feedback's/suggestions in the comment section below

HIDE your IP address


Real Hide science permits you to surf anonymously, keep your science address
hidden, shield your personal data against hackers and supply full encoding of your on-line activity, all with an easy click of a button.
Download fully free Real Hide informatics four.3.0.2 Full Version. area unit you aware that your informatics address is exposed each time you visit a website? does one grasp that a lot of websites and hackers use your informatics address to watch your home address and alternative personal information?

Real Hide informatics permits you to surf anonymously, keep your informatics address hidden, shield your personal info against hackers and supply full encoding of your on-line activity, all with an easy click of a button.

Key Features:
• simply Conceal Your informatics Address
• Anonymous internet aquatics
• Advanced Application Support
• shield Your Identity and Stop Hackers
• Un-ban Yourself From Forums, Blogs, Etc...
• forestall websites from chase your on-line activities
• Quickly delete all web somebody and FireFox cookies
• mechanically clear your cookies when your informatics changes

1) install app
2) copy cracked .exe from cracked folder to install dir (C:\Program Files\RealHideIP)


DOWNLOAD IT FROM

5 characters are enough to crash a system


A fork bomb for crashing system is a smallest writable virus as it contains on 5 Characters. Fork
bombs count as wabbits: they typically do not spread as worms or viruses.

The concept behind the fork bomb: the processes recursively fork until a denial of service or a crash occurs. Fork Bomb creates a large number of processes very quickly and break the limitation of processes that can run on a system. It's dead simple: A program just replicate itself, which again replicate itself and so on until all resources are exhausted.


A fork bomb generally creates two instances at startup, further each of created processes creates two instances and so on…The processes recursively fork; this “forks” the processor and jamm it completely until a crash occurs. It use forks to do system crash, so its called Fork Bomb.


See, How to create it:


1. Fork Bomb for windows:
Write the following code in notepad and save it with bat extension say fork.bat

%0|%0
Once anyone will do double click on this bat file, his system will jamm.


2. Fork Bomb for linux/Unix:
:(){ :|:& };:

HACK ANY LAN NETWORK just follow these steps:
using ETTERCAP:

Introduction To Man-In-The-Middle Attacks -

Man in the middle attacks (Or Janus Attacks) is known as eavesdropping in the computer world.In these attacks,the attackers makes a fake bridge connections with the victims and relays message so they think that the connection is working the way it is supposed to work.

Introduction To ETTERCAP -
Ettercap,short for Ethernet Capture,Is an open source app that creates an fake connection to your victim and the router,captures and send's data to its destination.It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.

Installing ETTERCAP -
For Debian (Linux) based editions -
Debian based editions (Ubuntu,backtrack,etc) can install Ettercap by using these steps -
1-Open Your Terminal.
2-Type- sudo apt-get install ettercap-gtk ettercap-common
3 -When you have installed it, type on the terminal: sudo gedit /etc/etter.conf

4 - Look for something like "iptables" and delete the #.
5 -It Should look like :
redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport".

For Windows based editions -
1-Get the installer from Here
2 -Install it by using the on-screen steps.

Setting Up ETTERCAP -
1 - Run the application.
2 - Click "Sniff -Unified Sniffing",then choose the network from the drop-down list you want to attack.
3 - Once you have chosen the interface the something like this will open:

4 - Now go to - “Hosts->Scan for Host",now it will scan the network for other computers.
5 - When completed,click on "Hosts-> Host List",it will show up the available computers.
6 - Now select the computer you want to attack (example 192.168.0.5) as TARGET 1,And the ip of router (example 192.168.0.1) as TARGET 2.
7 - Now go to "MITM -> Arp Poisoning,and select the “Sniff Remote Connection” and click “ok”.
8 - Click "Start" and choose "Start Sniffing".

How Could the Attacker use this data -
The captured data can be easily used for sniffing password for Google Facebook,yahoo etc and they can also use it as a monitoring device,and see what kind of porn you like

NOTE : ETTERCAP can cause instability of network and the windows version is not too much stable, Restart the router in order to regain stability.

CRACK ANY WIFI (WEP,WPA,WPA2)



If you are living nearby someones WiFi hotspot and every time your laptop search for connection its showing up but you don't have passwords. Or you just Need to steal someones WPA/WPA2 Wi-Fi hotspot key or passwords. Don't get worried...

In this tutorial I will show How to hack a WPA/WPA2 Wi-Ficonnection by means of a bootable USB.
Things you should need:

1. A USB pen drive.

2. beini.iso file. [Download it from HERE].


3. UNetbootin software to make your USB drive boot-able. [Download for Windows, Linux or Mac]

Some few steps you should to do ( WEP):

1. Write beini.iso on your USB by UNetbootin. Set everything according to this image bellow.


2. After finishing restart your PC and boot it from your USB.

3. If you were successful to boot up then you should see something like this. Click Minidwep-gtk.



4. Click OK.



5. Now Minipwep-gtk program will open. Hit Scan.






6. Select a wireless network(should have Clint) from the list. And click Lunch to start creaking process.



7. Sometimes its take a while according to your victim connections IVS value and password strength. So Wait.



8. If it found a password, it should appear like this.





9. To creak WPA/WPA2 follow this image instruction.





Let me know if you have done it successfully or you have any complicity.

access facebook with out internet

FACEBOOK FREE BROWING WITHOUT INTERNET FRIENDS DONT TOPUP YOUR MOBILE WITH NET BALANCE ITS FREE EVEN WORK ON BLACK AND WHITE MOBILE




You can browse facebook even if you are in a remote location, with no internet connection and that too free!!

Just dial *325# and you will have to give your username and password via text. Then you will receive a menu and browse facebook for free.

For fb chat - *325*33#

For status juggler- *325*75#

This is basically a USSD code which is which is run by 'Fonetwish''.