Posts

Showing posts from May, 2011

NetworkActiv Port Scanner

Image
NetworkActiv Port Scanner is a network exploration and administration tool that allows you to scan and explore internal LANs and external WANs. Because of the versatility and choosable operating modes available in NetworkActiv Port Scanner, it may be used by experienced network administrators as well as by novices. NetworkActiv Port Scanner provides all the basic features that you'd expect in an advanced network scanner, but also provides many additional features and technologies, some of which being completely unique to this scanner. NetworkActiv Port Scanner provides scanning performance simply not found in other Windows based network scanners, but one will need to actually try it to understand just how fast a network scan can be. Features : TCP connect() port scanner (standard TCP port scanner). TCP SYN port scanner (auxiliary TCP port scanner). UDP port scanner with automatic speed control. UDP subnet port scanner. Ping scanning of subnets

Mach 7- Remote Spy keylogger (hack tools)

Image
The Best Keylogger And Screen Capture Tool On The Web Today! Mach7 Remote Spy KeyLogger is a key logger and stealth surveillance tool that is ideal for protecting and keeping watch over your children and loved ones while they use the computer. Mach7 is perfect for surveillance of employees to keep them productive at work. Don't lose money from hours chatting or gaming on their work computer. You'll know exactly how they spend their time so you get your money's worth. The Mach 7 Software logs keys pressed and takes screen captures like a spy. It’s like having a manager watch over employees or trusting babysitter watching over your children. You can even leave it unhidden and keep a record of everything you do on the computer. You’ll never lose the information in your files again because Mach7 will keep a record of all your keystrokes and take screen shots of everything yo

How to block a website in your pc

How To Block Websites Without Software, block websites Steps: 1] Browse C:\WINDOWS\system32\drivers\etc 2] Find the file named "HOSTS" 3] Open it in notepad 4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable. 5] Done! -So- 127.0.0.1 localhost 127.0.0.2 www.blockedsite.com --> www.blockedsite .com is now unaccessable<-- For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before. IE: 127.0.0.3 www.blablabla.com   127.0.0.4 www.blablabla.com 127.0.0.5 www.blablabla.com

How To Shutdown Other Computer at your Network

Image
How To ShutDown Other Computers, At School, Library,College Or Anywere Else where you and Them Share The Same Internet Connection. How it works, because you and the other computers are on the same Server connection, you get as much access to their pc as them with their username and password, but for this you do not need to exploit them, all we have to do is scan for their Domain/PC Name, this did work on other computers around the world but not no more. What You Need: Just a Computer Running Windows, & CMD, if your admin has blocked CMD from being ran, then please do the Following: Then save the file as, CMD.bat on your desktop, and run it, and it should run like normal.  You also need, a connection to the internet, and make sure that others around  Tutorial: Okay So Once you have got CMD open, please do the following:  Type @Echo Off And press Enter: Then CLS and press enter: Then Type Color b and press enter: This is not vital but makes the Windows

how to hack a Website Using Havij tools

Image
First Lets Download our Tool: Download havij 1.10 Now, Find a sqli infected site . Here i found a vulnerable site http://www.hypetrading.com/productinfo.php?id=285 Now Let’s start Open havij and copy and paste infected link as shown in figure Now click in the “Analyze” Then It shows some messages there….Be alert on it and be show patience for sometime to find it’s vulernable and type of injection and if db server is mysql and it will find database name.Then after get it’s database is name like xxxx_xxxx Then Move to another operation to find tables by clicking “tables” as figure shown.Now click “Get tables” Then wait some time if needed After founded the tables ,you can see there will be “users” Put mark on it and click in the ” get columns ” tab as shown in figure In that Just put mark username and password and click “Get data” Bingo Got now id and pass that may be admin… The pass will get as md5 you can crack it also using this tool as shown in figure…

How to Create Your Own Phisher to Hack Any Website Account Password

Image
Learn how to hack any website account password | Phishing Creator Tool Previously i’ve posted how to hack websites using phishing, like eBay, Gmail and Facebook. Here i want to show you how to make a phishing page using a Phishing Creator – Super Phisher and get account information for various websites from many people. Тhis is the easyest and also a very effectively way to make a phisher and hack any website account password. Here are some features of Super Phisher: Fastest phisher maker tool ever Makes phisher for almost any site Useful for users who dont knows HTML, PHP coding No manual work except entering URL of website, for which u want to make phisher Fully automated tool Small in size. Instant access to phishers you created. For example i will show you how to make a phishing site of Lockerz.com. Here is a step by step guide to hack any website account password using phishing creator tool: 1. First of all download Super Phisher here. 2. In “Super Phishe

Easily Share Large Files Directly Pc 2 Pc Using WebBrowser Without Uploading Anywhere

Image
Easily Share Large Files Directly Pc 2 Pc Using WebBrowser Without Uploading Anywhere Easily Share Large Files Directly PC To PC Using Web Browser Without Uploading Anywhere go to http://www.filesovermiles.com/ FilesOverMiles is a tool for direct file sharing, fast and secure way to send files over the Internet. No setup or sign up and the file transfers are not stored anywhere. It will appeal to many professionals who want to share files securely and efficiently. Step 1 : Go to FilesOverMiles website. Click "Browse" and select the file to transfer. S tep 2 : As soon as you select the file, the site will generate an unique URL which you have to share with the user to want to send the file to. Step 3 (2nd User) : The PC on the receiving end of this file transfer must go this unique url which will show a download option from the file to be transferred PC to PC Note : The transfer file will continue to be available for download until the web page on

TCP/IP & UDP Attacks Introduction

Image
Hello, Lets explain " TCP/IP & UDP Attacks ", Most common and effective Web attacks...Lets Know abt its basic and types... TCP/IP Attacks 1.  TCP SYN or TCP ACK Flood Attack 2.  TCP Sequence Number Attack 3.  TCP/IP UDP attacks 1. ICMP Attacks 2. Smurf Attacks 3. ICMP Tunneling TCP  operates using synchronized connections. The synchronization is vulnerable to attack; this is probably the most common attack used today. The synchronization or handshake, process initiates a TCP connection. This handshake is particularly vulnerable to a DoS attack referred to as the TCP SYN Flood attack. The process is also susceptible to access and modification attacks, which are briefly explained in the following sections. TCP SYN or TCP ACK Flood Attack -   This attack is very common... The purpose of this attack is to deny service. The attack begins as a normal TCP connection: the client and the server exchange information in TCP packets. The TCP client continues t

REVEALING PASSWORD HIDDEN BEHIND ASTERISKS

Image
When you type a password in the password form while logging into any of your account the letters of the password are hidden behind asterisk, so that nobody can have a sneak peak at your password. But many times you may want to know whats behind the asterisks. Here are some methods to reveal the passwords behind asterisks. 1) Using Javascript Using a simple javascript you can reveal all passwords behind the asterisks, here is the procedure. 1) Open the webpage containing the login form with the password behind the asterisks.   2)   javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords on this page:\n\n" + s); else alert("No passwords in on this page.");})(); This method works on mostly all the browsers and all the websites like facebook,

Create fake Virus

This is an interesting tutorial in which we will create a fake “virus” which can shutdown, restart and log off your pc(Can also write a message and specify the countdown time). This is actually a faster way to turn off your pc, ’cause it doesn’t require clicking START>TURNOFF button etc…. 1Create shortcut,(Right click on your desktop and go to new -> shortcut ) 2)After this will appear window and that is where you type the code shutdown -s -t 300 -c "Your Message" There are few variants , this one will shutdown pc . To log of computer type shutdown -l -t 300 -c "your message" To restart computer type shutdown -r -t 300 -c " your message" The number after -t is the number of seconds countdown there will be before shutdown . After -c write own message , that will come up when shutdown box pops up

How to Solve Access Denied Deleting Files Folders

Image
To delete a file or folder but having Windows prompts a popup saying the file/folder is still in use is simply annoying. Cannot delete xxx: Access is denied. Make sure the disk is not full or write-protected and the file is not currently in use. This happens because the file may look fine to delete but it is still engaged with a particular Window application processes. Fauzi of cyperhackz cares enough to share his methods to deal with these annoying Windows issue. Fauzi has suggested 3 methods to force delete these files; via command prompt, safe mode and Unlocker application. Command prompt is the fastest solution to delete regardlessly of Window’s Access Denied message but it just can’t do its trick on deleting folder with multiple folders. Usually when such situation occurs, we wanna get it of the file fast, therefore I think safe mode will not be my choice. experiment , and a small experiment Unlocker solves the Access Denied Deleting nicely. I did a little experieme