100% Free Free Free Download No Hide Charges No Sign up No virus Daily Update Blogger Templates
Showing posts with label Hacking Tool. Show all posts
Showing posts with label Hacking Tool. Show all posts

Tuesday, October 23, 2012

Hack Any Computer With An ip [MetaSploit]

No comments:

Hello everybody! I am here to show you this magical tool called Metasploit that allows you to hack ANYunpatched computer with only it's IP. Lets begin...

1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.

2.) You need PostgrSQL for your database. Download here:http://www.postgresql.org/. Make sure you use all the defaults or Metasploit woun't work!

3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...

[Image: pgadmin.bmp]

4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this:

[Image: metasploit.bmp]

5.)Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't wory, this is normal.

6.)Type db_host to make sure you are connected correctally.

7.)Now type this:


Make sure you put the ip of the computer you are trying to hack in the place of

7.) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...

8.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.

9.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

sessions -i ExploitNumber


The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Online Penetration Testing Tools [Private]


Word Press
Remote Code Execution , BruteForce via IP , Theme ScaNne via IP , Theme ScaNne , Site Extracte. Joomla
Turbo Brute Force , Token ScaNe Server, ScaNner Site Extracte,
vB SQL[4.0.x =>4.1.3] , vB Brut Force [Proxy] 
SQL Server ScaNne, SQL Target ScanNer, SQL Dork ScaNne, SQL Injection Helpe,r Admin Finder. LFI 
LFI Server ScaNner, LFI ToOl'z Kit, LFI Inject Shell, LFI File Dumper.
Other Tools    
Whois Multiple Service, WHMCS LFI Exploit, Multiple CMS ScaNner, Server ScaNn3r CMS,
Server Dork Sc4nN3r, Exploit Finder, Script'z Finder ,Shell Finder ,Users Finder Via IP, Zone-H Poster, Crypte / Decrypte, Decrypte ToOl'z.

To use all This Go to http://www.s3c-l4b.com/ 
Shell Name
Langage Shell
Shell Pic
Include Txt
Download Zip
r57 Pro Shell
Sa-H4x0r Shell
WSO Dz Shell
Madspot Shell
SQL_Cmd3 ToOl'z
Saudi Shell
WebAdmin Shell
Syrian7 Shell
PHP Backdoor
TurkBlackHat ToOl'z
Security Labs Shell
PHP Smylink
WebRoot Multi ToOl'z
SoQor Shell
SymLink Pro
Domain & User & Sym
Python Shelles
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Downloading from ShitCash - without filling any thing!

No comments:

This has a pretty good succeeding rate.

- FireFox
- GreaseMonkey

So it works pretty easy, actually.

1. You just open your ShitCash page.

2. Choose an offer.

3. Press Ctrl + Shift + F and its all filled in with random stuff.

4. Now, submit the form, and your download unlocks most of the time.

Optional 5. If doesn't, clean your cookies, I recommend using this add-on:
and start at step 1.

Need a link to test it on?
Use this one:
http://adf.ly/6ZosDo Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Hacking into computers {NetBIOS Hacking with pictures}

No comments:

NetBIOS Hacking
-What is it?-
Net BIOS Hacking is the art of hacking into someone else’s computer through your computer. Net BIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

-How can this be of use to me?-
Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

-What do I need?-
Windows OS
Cain and Abel (http://www.oxid.it/)
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Step 1, Finding the target.]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross

Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.

It should begin to scan

Then IP’s, computer names, and mac addresses will show up.
Now remember the IP address of the computer you are going to be breaking into.
If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
During the next step we will begin our trial and error.

++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Part 2, Trial and Error]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++

Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.
I am only doing this to avoid confusion.
Let’s get back to the hacking.
Type in “ping (IP address of the target).” For example in this tutorial, “ping”
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private information):

If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.

++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Part 3, Gathering the Information.]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++

Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a”

This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.

Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.

The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.

The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.

The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup

++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Step 4, Breaking In]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++

Finally it’s time.
By now we know: that our target is online, our target has file sharing, and our target’s computer name.
So it’s time to break in.
We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\”

We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.

All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different

As you can see, for my hack I have already used “K,” so I used “G” instead.
You may also do the same for multiple hacks.
If it worked, it will say “The command completed successfully.”
If not, you will have to go retrace you steps.
Now open up “my computer” under the start menu, and your newly created network drive should be there.

Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
If you are just doing this to hack something, then go explore it and have some well deserved fun!

Congratulations! You’re DONE!

-Commands used in this tutorial:
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)

Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Hack Websites With Havij 1.06 - Advanced SQL Injection Tool

No comments:

Havij-----Version 1.06Copyright © 2009By r3dm0v3 3dm0v3[4t]yahoo[.]comPlease tell me your offers and report bugs.Check for updates!Licence-------This program is free software. I hope it be useful for you.This software is provided "as is" without warranties.Feel free to share and distribute it anywhere but please keep the files original!What's New?------------Oracle database-MsAccess database-Find Admin-Proxy support-Filtering enabled-update/delete/insert-Group_concat for mysql-New look-User agent header-Load cookie from page-Analyze method made better (specially for mysql)-Many bugs fixed.Features--------Data Bases: MsSQL 2000/2005 with error, MsSQL 2000/2005 no error, MySQL, Oracle, MsAccessFind admin pageGetting InformationGetting Tables, Columns, DataCommand Executation (mssql only)Reading Files (mysql only)insert/update/delete dataProxy supportGuessing tables and columns in mysql<5Fast getting tables and columns for mysql.Checking different injection syntaxes.Changing http headersBypass illegal union.Avoid using strings.
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Monday, October 22, 2012

Default Best Collection Of Shells

No comments:

....................................................................................................... ..................................................................................................................
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Tuesday, September 11, 2012


No comments:
Reverting generally means reversing an action or undoing the changes. Here in our case, reverting would be more of reversing the action.

For this we will need a keylogger server using ftp. It can be found on warez sites, youtube etc. You basically need the following things:

Keylogger, passstealer
Cain and Abel .. GET IT HERE
Virtual machine, Sandbox (so you don't get infected, and what if the hacker is using better protocol that would be epic fail).

Getting Started:

Execute the keylogger on your virtual machine.

Now run Cain and Abel and do the following things as per stated order.

Wait for sometime and then check back the passwords area.

As you can see the keylogger used ftp protocol to transfer the logs. Ftp protocol isn't very safe since it doesn't encrypt the data. Anyways you should see the IP address where your PC is sending packets. And also the username and password. This might not work if the server is using other protocol like http, smtp, etc. you'll most probably get junk values in user and pass box if those protocols are used.

So i open the ipaddress

Guess what its our very own drivehq.com =D. Now login using ftp password that we got from the sniffer and get going. I would recommend to steal the logs quietly like a ninja, so you can get others logs as well. Of course you can change the pass if you want but it won't send any further logs.

Do you have questions, comments, or suggestions? Feel free to PM me ..

Most of hacker use ftp account to get key stroke recorded from slave computer likehttp://www.drivehq.com and many more

Assume hacker have install a key logger to u r pc now how to trace that hacker( when the keylogger is installed in your computer and it is sending key strokes it have to log in ftp account as the hacker has program it)
Now u r thinking how to trace???
here is some great tool like wireshark you can download from HERE
wireshark is an network monitoring tool which monitor what is going in you network

NOw hacker have install log file in your pc and u want to hack hacker
1) Open wireshark chose your network and start monitoring your network
wireshark will show you you all ftp, http, udp, tcp and all type of connected to your computer)

2) Hacker has set particulate time after this particular time key stroke will be send to his ftp account it will be maximum 10 min so wait 10 min

3) Hacker is using ftp account so filter it type ftp and hit enter.

4) Now you will see that the key loger is sending key stroke to ftp account and you will see all information even u will see the user name and ftp password and many thing else.

Read More!

Friday, September 7, 2012

7 Free Windows Password Recovery Tools


Windows password recovery tools are used to recover, or reset lost user and administrator passwords used to log on to Windows operating systems.
Password recovery tools are often called "password cracker" tools because they are sometimes used to "crack" passwords by hackers. Legally cracking or unlocking your own Windows password is certainly a legitimate practice!
Note: Using a Windows password recovery program is just one of several ways to find a lost Windows password.
Important: Please read my Windows Password Recovery Programs FAQ for more information. I also have an easy-to-read comparison of these programs too that might help.
Need to Crack a Different Kind of Password? See my list of free password crackers for free programs to crack PDF files, Word & Excel documents, RAR & ZIP archives, and more.
Here are the top 7 free Windows password recovery programs available. I also keep a list ofpremium Windows password recovery tools.

1. Ophcrack

Ophcrack Version 3.3.1 - LiveCD Version 2.3.1
The Ophcrack Windows password cracker is by far the best free Windows password recovery tool available. It's fast and easy enough for a first time Windows password cracker with a basic knowledge of Windows.
With Ophcrack, you don't need any access to Windows to be able to recover your lost passwords. Simply visit the site, download the freeISO image, burn it to a CD and boot from the CD. The Ophcrack program starts, locates the Windows user accounts, and proceeds to recover (crack) the passwords - all automatically.
In a test on a Windows 7 PC, Ophcrack recovered the 10-character password to my administrator account in 40 seconds. Ophcrack supports Windows 7, Windows Vista, and Windows XP.
Ophcrack v3.4.0 Review and Free Download

 PC Login Now2. Offline NT Password & Registry Editor

Download Offline NT Password & Registry Editor Password Recovery
Offline NT Password & Registry Editor works differently than most password recovery programs in that it erases your Windows password instead of recovering it. You can think of it as more of a Windows password reset tool.
Like Ophcrack, you boot to a burned CD created with the Offline NT Password & Registry Editor ISO file. After running the program, you can log in to your Windows account without entering a password at all.
If you like this "password deleting" strategy then I highly recommend this program. Offline NT Password & Registry Editor works basically the same way as PC Login Now, listed below.
I tried Offline NT Password & Registry Editor on a Windows 7 PC and it reset the password immediately without problem. It should work equally well with Windows 7, Windows Vista, Windows 2000, and Windows NT. It should also work with 64-bit versions of these operating systems.
Offline NT Password & Registry Editor Review and Free Download
PC Login Now Free Password Recovery Software
PC Login Now is one of the better free Windows password recovery programs I've tested... even though it doesn't actually recoverpasswords.
Instead of discovering and displaying your current Windows password, PC Login Now deletes it, allowing you to access Windows without a password, after which you can create a new one.
PC Login Now works just like the free and popular Offline NT Password & Registry Editor (listed above) only it's much easier to use.
The trade-off with PC Login Now over Offline NT Password & Registry Editor is that PC Login Now causes Windows to detect a possible hard drive problem on the first reboot after deleting the password. I've never seen nor heard of a problem actually happening but it's still a little bothersome.
In a test on a Windows 7 PC, PC Login Now deleted the 15-character password to my user account instantly. PC Login Now supports Windows 7, Windows Vista, and Windows XP.
PC Login Now v2.0.1 Review & Free Download

4. Kon-Boot

Download Kon-Boot 1.0
Kon-Boot is yet another free password reset program, much likeONTP&RE and PC Login Now. Just burn the program to a disc, boot to it, and you're off.
Kon-Boot works differently than the two password reset tools above, so if you have problems using them, give Kon-Boot a try. It's very, very easy to use and probably the fastest password reset, and certainly password recovery, tool available.
Unfortunately, Kon-Boot 1.0 does not work with 64-bit versions of Windows.
I used Kon-Boot v1.0 to successfully delete the password on a Windows Vista PC and then also on a Windows XP PC. Kon-Boot is reported to also reset Windows 7 passwords but I was not able to make it work on two different Windows 7 PCs.
Kon-Boot v1.0 Review & Free Download

5. Cain & Abel

Cain & Abel Password Cracker
Cain & Abel is a free, fast and effective Windows password recovery tool.
Unlike Ophcrack and other popular Windows password hacking programs, Cain & Abel requires access to Windows under an administrator account. Due to this fact, Cain & Abel is a valuable resource to recover passwords to accounts other than the one you're using.
Add that to the fact that Cain & Abel is a bit more complicated to use than other password recovery apps and you have what is, in my book, a pretty advanced tool. Check it out if you think it might be useful to you.
Cain & Abel was able to recover the 10-character password to the Windows XP "Administrator" account in ten seconds. I couldn't get it to work properly Windows Vista. One user said it works great with Windows 7.
Cain & Abel v4.9.36 Review and Free Download

6. LCP

LCP is yet another free password recovery software tool for Windows.
Like Cain & Abel, LCP is a standard Windows program you download from LCPSoft's website and install inside of Windows, meaning you'll need access to a user account on the computer.
LCP can be a little intimidating to those new to Windows password recovery tools so some prior knowledge is very helpful to avoid even bigger problems with your PC.
I haven't been able to get LCP to work for me. If you've successfully used LCP and would like to share your experiences, please let me know.

7. John The Ripper

John the Ripper is a very popular free password recovery tool that can be used to find Windows account passwords.
While the password recovery application itself is free, the wordlists used by John the Ripper to discover passwords do cost and are required for the software to work.
Note: I'm told there are free wordlist alternatives that work with John the Ripper which is why this Windows password recovery tool is still listed as free. However, I have not tested any of them.
John the Ripper is operated at the command line making it a password cracking tool reserved for the very advanced user.
If you have experience with John the Ripper that you would like to share, please let me know.

Windows Password Recovery Tools Aren't Necessary if You're Proactive!

These Windows password recovery tools are great if you need them, but there's a much easier way to access your account if you forget your password - a password reset disk!
How To Create a Password Reset Disk
A password reset disk is a special disk you can insert in your PC during the logon process that will allow you to change your Windows password without knowing your current password. You will need to create this disk before you lose access to your account!

Read More!

Reset Windows 7 and Windows 2008 R2 Administrator Password in Two Minutes


Warning:  You are allowed to use this tool only for password recovery and educational purpose. Do not use this tool for illegal purpose.
Windows 7 and Windows 2008 R2 server Operating Systems are the latest and more secured versions from Microsoft. If you are a system administrator dealing with MS products, you might have faced situations to open computers without knowing Windows administrator password. This post explains very simple step to resetWindows 7 and Windows 2008 R2 administrator password in two minutes. Earlier MS OS versions also work.
I used several methods, but this method is very easy and 100% worked with Windows 7 and 2008 R2 servers.  This is very quick, because it clears the administrator password straightaway.  There are some products available to find out admin password, which takes lot of time to find.

Spotmau Powersuite 2012 is the product you required to reset admin password. This is a paid premium product which will do many good things for good price. You can buy the product from here.
Download product in ISO format and write it in CD. It will be a bootable CD which takes around 170MB.
If you like to use Spotmau’s only password recovery tool, then here is the download link for it.  This is not like Powersuite will so many utilities, but this comes with password recovery/reset module only.

How to Reset Windows 7 and Windows 2008 R2 Administrator Password

1)      Boot Windows 7 or Windows 2008 R2 computer with Spotmau bootable CD.
2)      Select first option, Spotmau PowerSuite Bootcare.
3)      After loading completed, the below screen appears. Click on Password Kit option.
Reset Windows 7 Administrator Password
4)      Click on Admin/User password.
5)      It will pick Windows OS automatically; select the user account you want to clear password.
Reset Windows 2008 R2 Administrator Password
6)      Once selected the user, press Start button at right bottom. Press OK for confirmation.
7)      That’s it. It’s done. Following message confirms the admin password reset for Windows 7or R2 Server.
Reset Windows 2008 R2 Administrator Password
8.)      Close the program. Remove bootable CD and now boot from local hard disk. This will bringWindows 7 or R2 normal login screen. Select Administrator account and enter with blank password.
We did. It’s very simple and finished in less than two minutes.
Warning:  You are allowed to use this tool only for password recovery and educational purpose. Do not use this tool for illegal purpose.
So, don’t try to crack other systems with this CD. Use only to recover or reset admin password for your computers or the computers you are responsible. Let me know, if this useful for you.

Download Link for Windows 7 and Windows 2008 R2 Administrator Password Reset Tool

Read More!