100% Free Free Free Download No Hide Charges No Sign up No virus Daily Update Blogger Templates
Showing posts with label Network Tricks. Show all posts
Showing posts with label Network Tricks. Show all posts

Tuesday, October 23, 2012

Bypass Websense or Cyberoam


Hello Friends, today i am going to explain you How to hack cyberoam websense and all other security firewalls that college, institutions, offices use to block websites at their respective places. Most of my users have asked me about that how to access blocked websites in their college and offices, i have explained this earlier also but those loopholes are now fixed and those methods to hack cyberoam and websense doesn't work effectively now and also hacking through proxy is quite tedious task as we have to search for working proxy websites which in itself is a very tedious task, and these doesn't work always. But the method that i will explain today is really awesome and doesn't require much task and thus its quite easy and the most important its 100% working. So friends read on for detailed hack....

For hacking Cyberoam or Websense you must know How cyberoam and websense works? If you know how they works then you can easily find flaws in that and hack it very easily.

Cyberoam is a 8 layer hardware firewall that offers stateful and deep packet inspection for network and web applications and user based identity security. Thus the firewall is quite secured. Now how we can hack that 8 layer security its the main important question here, as i have mentioned above that main working and blocking of any website or application by cyberoam is basically done at deep packet inspection step, now here the flaw in any security firewall lies, also in case of cyberoam and websense too. They block all websites by parsing their content and if their content contains the restricted keywords then they block that websites. They also use category blocking which also works on same concept. The flaw is with websites that uses SSL feature, the websites that contains SSL lock i.e. the websites that uses https are not blocked by them. They have to block these websites manually which is a very hectic task and believe me nobody blocks them.

So the proxy websites that uses https i.e. SSL proxies are also not blocked by these websites.

Only those proxies are blocked which are known or being heavily used. But the tool that i give you create SSL proxies by itself that means its proxies cannot be blocked. So friends this tool rocks.
Things that we need to hack cyberoam, websense and any such such hardware firewall:

1. TOR browser ( a anonymous web browser like Mozilla which has inbuilt proxy finder that bypasses the websites easily that are being blocked by cyberoam or websense).

2. A USB or pendrive ( where you will keep the portable version of TOR browser)

3. If USB drives are disabled we will use different drive for its installation. (also portable version of TOR can be executed from any place).
Steps to hack Cyberoam:

1. Download the TOR web browser.

To download TOR browser: CLICK HERE

2. Now install the TOR web browser. In case of portable version it will extract.

For Installation and usage Instructions visit here: CLICK HERE

3. Now open the TOR browser and start surfing your favorite website like facebook, orkut, gmail ..everything at you office....
4. That's all the hack. I hope you all have liked it.
For such hacks keep visiting...and subscribe our posts, if you don't wanna miss any such hack....Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

How To Port Forward (Router & Modem Style)

No comments:
What Is Portforwarding?

Port forwarding is necessary for using different tools, Such as RATs and uTorrent and so on. Please follow this guide on How To Port Forward and you'll have your port forwarded :)!

Today i'll teach you how to port forward through the router & modem. (Not with PFConfig :) )

Lets Start!

Start off by going to: Start -> Run -> CMD -> And Type IPCONFIG
[Image: FASDASD.png]

Now Copy That "Standard Gateway // Default Gateway" IP And Type It Into Your Webbrowser & Log in.
[Image: IP_2.png]

My username is Root - nothing. The router // modem accounts usually are theese:

Admin -
Admin - Admin
Admin - Password
Admin - User
Admin - Root
Admin - Custom Password, Check underneath your router for it! ;)

Root - Admin
Root -
Root - Password
Root - Root
Root - Password
Root - Custom Password. Check underneath ;)

User - Root
User -
User - Admin
User - Password
User - User
User - Custom Pass.

And so on.

Once you're logged in, Go to the "port forwarding" or in this case, "Virtual Server"

[Image: Ip_3.png]

[Image: DASDSAD.png]

Virtual Server: Enable / Disable.
Local IP: Found In IPConfig, As IP Adress.
Start Port: The Port You Want To Forward, Start Port.
End Port: The Port You Want To Forward, End Port.
Protocol: TCP & UDP or BOTH
Remark: The Name Of The Wished Forwarded Program.

And When You've Saved The Settings, Go To Canyouseeme.org And Type Your Port In There, And If It Says

[Image: Ip_5.png]

Then You've Succeded Your Port Forwarding.

If It Says

[Image: Ip_6.png]

You've Failed. Then I Advice You To Take A Look At Portforward.com And Look For Your Router Or Modem, Once You Find It They Have A Port Forward Tutorial There.
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Hacking Routers - FREE ADSL

No comments:
Hacking ADSL Routers for free accounts

Most of the people never change their default passwords no matter what it is, they don't change them because they think that they are safe. In this tutorial I'll show you one of the ways how to use this mistake and get free ADSL/Wireless (If wireless router is used) accounts and enjoy in unlimited downloads.

First we will download the necessary tools:

1.) XPass
2.) Angry IP Scanner v3.0.4 Beta
3.) If you don't have Java installed, download and install it here: JAVA

You will also need to have version 8 OR older of Internet Explorer.

Ok so let's start with getting the job done:

1.) Go to WhatIsMyIp
and check your IP address, let's say that your current (ADSL providers usually give you dynamic IP's) IP is, you will change the last two groups of numbers.

2.) Open Angry IP scanner it will look like this:

[Image: pic1hr.png]

Now where it says IP range in the first input field we'll enter our IP address (but we'll change the last two-or three digits, in this case there are two to zero) so it will be like this:

And in the second input field we will enter the IP with changed last two groups of numbers so it actually has something to scan, we'll change it to:

And before we click scan we need to set some options so it only shows us alive hosts:

Click Tools and then click preferences:

[Image: pic2q.png]

Then under the under the ports tab under Port Selection type 80 'cos we will be interested in hosts with port 80 opened:

[Image: pic3hi.png]

And on the display tab choose "Hosts with open ports only":

[Image: pic4e.png]

Then click OK to save the preferences and click start:

[Image: pic5f.png]

After few seconds or minutes you should see your first IP addresses:

[Image: pic6c.png]

Now just select one of the IP addresses and open it with INTERNET EXPLORER!!!

It will ask you for a login credentials:

[Image: pic7kh.png]

Now here comes the mistake people often make, default username and password, in this case it was admin:admin but you can look for default router passwords and usernames, so when I logged in it looked like this:

[Image: pic8.png]

Now for most of the routers (atleast the ones I had exp. with) you can find username in plain text and password covered with *'s when setting up a new connection, so just look for something that says connection wizard or connection setup, and follow the steps till you find the username and password as mentioned.

So why did we use Internet Explorer for this??

Because XPass works only with IE, we couldn't figure the pass out if we used Firefox or Chrome or Opera.

And now when we have the page where username and pass. are just open XPass click on the X sign and drag it over the *'s and you will have this:

[Image: pic9v.png]

And password in this case is: 854179 

Continue doing this with different IP's that Angry IP Scanner detects till you have enough accounts to fulfill your download needs.

Hope you liked the tutorial. 

Dont forget to comment :))
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Hack Any Computer With An ip [MetaSploit]

No comments:

Hello everybody! I am here to show you this magical tool called Metasploit that allows you to hack ANYunpatched computer with only it's IP. Lets begin...

1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.

2.) You need PostgrSQL for your database. Download here:http://www.postgresql.org/. Make sure you use all the defaults or Metasploit woun't work!

3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...

[Image: pgadmin.bmp]

4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this:

[Image: metasploit.bmp]

5.)Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't wory, this is normal.

6.)Type db_host to make sure you are connected correctally.

7.)Now type this:


Make sure you put the ip of the computer you are trying to hack in the place of

7.) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...

8.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.

9.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

sessions -i ExploitNumber


The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Cyber Ghost VPN,Your Private Network

Most aren’t aware of the traces they leave behind every time they use the Internet. These traces can often be used to uncover confidential information about their work and private life, and it is these traces that search engines and web portal providers collect and systematically analyze for marketing purposes.

(Surf anonym - fast and easy with Cyberghost VPN) 
Governments and industry are also very keen on tracking people’s Internet activities—who is connected with whom and who is downloading which files when. This online amassing of personal data can have undesirable consequences for millions of Internet users. 
Fortunately, CyberGhost VPN gives users a way to surf anonymously and keep their private information from the eyes of others. CyberGhost VPN software provides you with an anonymous IP address and automatically encrypts transmissions between your computer and the web.

Its good working Server,even i use this execellent VPN server for anonymous surf Enjoy Guys
Download Software Here
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Monday, October 22, 2012

How to Spoofing IP Addresses

No comments:

This Tutorial Is Only For Educational Purposes.
Learn how to create custom IP packets Using tool RafaleX and Engage Packet Builder
[Image: 1.JPG]The RafaleX application allows for the creation of custom IP packets. The packet is very customizable and allows for the spoofing of the IP, setting the flags, number of packets, and so forth. RafaleX is becoming hard to locate on the Internet as it appears it is now called Engage Packet Builder.

The RafaleX application is an excellent way to “spoof” custom packets. Attackers can place a valid IP address as the source of the packet and the target will have to attempt to respond to the spoofed address. By sending hundreds of thousands of packets in this manner, an attacker can create a Denial of Service attack against a target.

In this example, the Source IP of the packets to be sent is set to with the source address of port 123. According to Internet etiquette, this should never be able to route on the Internet as the 10.x.x.x range is reserved for Private addressing. Set the destination IP to the target address. In this example it is Set the Destination
port to port 21. The SYN and ACK flags were set for each packet.

*Note: The Ethernet communications process requires a three-way handshake:

SYN: Synchronize
SYN-ACK: Synchronize-Acknowledge
ACK: Acknowledge

When a computer receives an uninitiated SYN-ACK packet its response is to send a RST (Reset) packet.
[Image: 2.JPG]

The number of packets was set to 100. Click the Send button to send the packets to the target. The Status area at the bottom left of the application will tell you that the packets were sent.

[Image: 3.JPG]

The proof is below screen shot captured from packet capturing tool:
[Image: 4.JPG]
[Image: 5.JPG]

Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Friday, September 21, 2012

Download Torrent to direct download MUST SEE

No comments:

This tutorial is to teach you how to convert torrent download to direct http download. Its so simple. Just follow the steps carefully.
  • Visit a torrent site and search a torrent that you want to download.
  • Download .torrent file or just copy the magnet link.
  • Visit http://www.zbigz.com/.
  • Upload your downloaded .torrent file or paste the copied magnet link in zbigz.com
  • Hit enter or press Go.
  • Select/click Free.
  • Wait for some time, a message will appear "caching completed" and download button will be visible.
  • Click on Download. Select/click free again.
  • Now, download your file. If your file is compressed (zip, rar, etc), then you will get download immediately. But if not, then zbigz will first compress it and then it will give you download.

Please remember, downloading torrent this way will give you slow download speed and you may not able to resume your downloads. Its better to use utorrent for downloading a torrent. 

Enjoy. https://hackersunrise.blogsopt.in
Read More!

Hide Proxy Servers

No comments:

Proxy is nothing more than a server mirroring a webpage so you can see it without accessing the website itself. This has many advantages. First of all, you have increased privacy. Servers usually keep track of who visits them. Furthermore, it is possible to make a recopilation of all the websites that you have ever visited. When using a proxy nobody will ever know what you visit online. Proxies are capable of keeping you totally anonymous from hackers and logs.

Uses and benefits:
  • No one can trace you,
  • When you send an email, your ip also get sent with that email, proxy will prevent you,
  • Fast,
  • Error Free,
  • With so many features, like remove scripts, images, etc.
  • And a lot more.

    Some free and powerful proxies are:

    Its free and fast.
    *There are thousand of online proxy available on the interent, but we have just stated the best above.

Read More!

How to get free vps/dedicated/hosting or a site

No comments:


Visit this link: http://volumedrive.com/ and now you have to order something, for example i am ordering a vps now.
Enter fake information, but use valid paypal account and email address.


Dont click on order button now.
Go to tools (If you are using windows 7, then type ALT, now tool option will appear), click on tamper data.


Click on start tamper.


Dont use other site now otherwise you will get a lot of pop-up. After doing this tutorial you may start to browse any site again. You are free to do what is written in this tutorial, but dont do anything more. Follow any link of this tutorial as required. Now, click on order button.
Wait for a pop-up message, asking Tamper data?, click on tamper.
Change the amount to 0.01 and click on ok.


Close tamper data and wait for it. Login to your paypal account and enjoy your free vps.

Do it on your own risk. You may get in trouble, we will not take any responsibility for it.
Read More!

Gathering info about website

No comments:

As the name says, Gathering info about website, you can gather info about any website in just few clicks.
Just you need to visit a site i.e. http://www.domaintools.com.
Now, you have to enter the website url there and hit enter and it will give you the complete info about that website. There are hundreds of similar sites but we have just posted this because its best and correct. 

Here is the snapshot of domain tools, 

Read More!

Add Images to Google Earth

No comments:


As the name says, add your images to Google Earth, in just a few simple steps.
Yes, its so easy.

1.You must have the original image of the location or object.

First of all, visit this url www.panoramio.com
Then, signup there, a google account will work, because panoramio is a part of google.
Now, login and upload your images there, you can upload upto 10 images at a time, and then give title and description to each image.
After that, your images will not be published in Google Earth, you have to do an important work now.
These below steps are important to publish your images in google earth.

  • Open each image one by one.
  • You will find an option, "Map this image" on your right screen.
  • Click on it.
  • Search the place by typing keywords, like India gate, new delhi, etc.
  • It will show a map with india gate.
  • Place the marker where you wanna show your image in google earth.
  • And click on save.
  • All done from your part.
  • Now, google earth team will review these images and will approve/disapprove it.
  • Reviewing may take some time, normal time is 2 or 3 days.
  • And, if they approve it, your images will be published at Google Earth.

    Important Notes:
  • Your images will be published to Google Earth only if the Google Earth team approve it.
  • After approval your images may take few days to show in Google Earth, because panoramio takes some time to transfer images to Google Earth, the normal time of transfer after approval is 10 to 20 days.

    Things to remember:
  • Give suitable and perfect titles in english language.
  • Add a good description of each images.
  • MUST map it or your images will not be reviewed and selected.
Some Important status by panoramio and its meaning:

This photo is selected for Google Earth.
This status means your image has been selected for Google Earth, and will be published as soon as possible.
This photo has not yet been reviewed.
This status means your image is still waiting for approval by Google Earth Team.
This photo has not been selected for Google Earth.
This status means, your image has been disapproved, and wont be published at Google Earth.

Now, you know everything about adding images to google earth.
Read More!

Anti-iframe [Reject iframe call of your site]

No comments:

Do you want to block your site to be viewed in iframe by a site? Do you want to reject iframe call [<iframe src="www.yoursite.com"></iframe>]. Some hackers may use this trick for hacking purpose. And some may use/display your site content via iframe and can take benefits from your site. Well, with this tutorial you can block this misuse of this tutorial. We will do it by using javascript.

What is javascript?
JavaScript is a prototype-based scripting language that is dynamic, weakly typed and has first-class functions. It is a multi-paradigm language, supporting object-oriented, imperative, and functional programming styles.

It is a powerful language/tool in this internet world, almost everyone uses it. Billions of websites are using javascript including our site.
So, this method is seems to be 100% working [This method will not work if the user has disabled javascript in his browser, a very low chance]. The best of all is, it is compatible with any programming or basic language, including html, htm, shtml, php, asp, etc.


<script>if(self != top) { top.location = self.location; }</script>

Implementing/Adding the code in files other than .js:

Just copy the complete above code with script tag, dont edit it, and paste in your webpage anywhere you want. [After <head> Recommended].
Save it and its all done from your side.

Implementing/Adding the code .js file:

Remove script tag from the code, i.e. paste if(self != top) { top.location = self.location; } in .js [Javascript file] and then save it. 

Now, when someone will call your site via an iframe, it will get redirected to the called link. For exanmple, if i will call hackalone.com via an iframe [<iframe src="www.hackalone.com"><iframe>], i will get redirected to www.hackalone.com.

This will also prevent your site from many attacks as well.

Read More!

Tuesday, September 11, 2012


No comments:
Reverting generally means reversing an action or undoing the changes. Here in our case, reverting would be more of reversing the action.

For this we will need a keylogger server using ftp. It can be found on warez sites, youtube etc. You basically need the following things:

Keylogger, passstealer
Cain and Abel .. GET IT HERE
Virtual machine, Sandbox (so you don't get infected, and what if the hacker is using better protocol that would be epic fail).

Getting Started:

Execute the keylogger on your virtual machine.

Now run Cain and Abel and do the following things as per stated order.

Wait for sometime and then check back the passwords area.

As you can see the keylogger used ftp protocol to transfer the logs. Ftp protocol isn't very safe since it doesn't encrypt the data. Anyways you should see the IP address where your PC is sending packets. And also the username and password. This might not work if the server is using other protocol like http, smtp, etc. you'll most probably get junk values in user and pass box if those protocols are used.

So i open the ipaddress

Guess what its our very own drivehq.com =D. Now login using ftp password that we got from the sniffer and get going. I would recommend to steal the logs quietly like a ninja, so you can get others logs as well. Of course you can change the pass if you want but it won't send any further logs.

Do you have questions, comments, or suggestions? Feel free to PM me ..

Most of hacker use ftp account to get key stroke recorded from slave computer likehttp://www.drivehq.com and many more

Assume hacker have install a key logger to u r pc now how to trace that hacker( when the keylogger is installed in your computer and it is sending key strokes it have to log in ftp account as the hacker has program it)
Now u r thinking how to trace???
here is some great tool like wireshark you can download from HERE
wireshark is an network monitoring tool which monitor what is going in you network

NOw hacker have install log file in your pc and u want to hack hacker
1) Open wireshark chose your network and start monitoring your network
wireshark will show you you all ftp, http, udp, tcp and all type of connected to your computer)

2) Hacker has set particulate time after this particular time key stroke will be send to his ftp account it will be maximum 10 min so wait 10 min

3) Hacker is using ftp account so filter it type ftp and hit enter.

4) Now you will see that the key loger is sending key stroke to ftp account and you will see all information even u will see the user name and ftp password and many thing else.

Read More!