Saturday, December 18, 2010

Phishing All In one

Note- This is only for educational purpose.Do it on you own responsibility


you want to hack the facebook account of anyone , then to hack account u make a fake page of facebook which looks like the original one but is attached to your site .... u send this page to your friend saying anything like "hey new version of facebook,check the hidden pics of girls " . Now he must try to login on it . once he typed his pass and click login,he will redirect to the original facebook and his id and pass which he typed on the fake page will come to your online account . He even doesnt know that he has been hacked

How to do phishing :
===============

How to create fake webpage in order 2 get da victim pass.

The Following File Includes Most Of The Famous Sites Fake Pages.First download it

eBay
Facebook
Gmail
Hi5
AIM
Hotmail
Yahoo
My Space
Paypal
FLV
Photo Bucket
Rapidshare
Runescape

download files from here
http://www.MegaShare.com/2836840
password is hack
INSTRUCTIONS:
=============

** Suppose you want to hack facebook account then open faceboook folder.Each Folder Contains 4 Files -

1) Index.html - clone of facebook login page

2) Run.php - processing php file joins 1 community and stores login details

3) One Gif image

4) ld.txt - where login details will be saved

** Now upload these three files (except image file ) to a free webhost site with PHP installed.

** Send the site link of index.html to the victim and when he login on it the password comes to Id.txt

Enjoy.

Thursday, December 2, 2010

Hide and run exe using notepad

How to hide and run any executable exe using notepad



steps
open your command prompt
suppose i have a portable exe resides on c drive then
C:\>ren abc.exe abc.txt

once above command rename the abc.exe to abc.txt


if someone tries to open this file it wont launch in proper manner

if u wanna launch this exe using notepad follow below command
C:\>start abc.txt
the application will be launching eve u can check in taskmanager that the process does abc.txt not abc.exe

Coming soon .......................

Hi All reader

I will post what is phishing and RAT in my next post...



If any clearification & suggestion about my posts please drop me a mail.

crackmindd717@gmail.com

Change the Default Administrator Password on Wireless Access Points and Routers

Nearly all wireless access points and routers allow an administrator to manage their WiFi network through a special administrative account. This account provides complete "superuser" access to the device's configuration utilities with a special username and password.
Manufacturers set both the account username and password at the factory. The username is often simply the word admin or administrator. The password is typically empty (blank), the words "admin," "public," or "password," or some other simple word.

To improve the security of a Wi-Fi network, you should change the administrative password on your wireless access point or router immediately when installing the unit. The default passwords for popular models of wireless network gear are well-known to hackers and often posted on the Internet. Most devices do not allow the administrative username to be changed, but if yours does, seriously consider changing this name as well.

Finally, to maintain home network security in the future, continue changing this administrative password regularly, not just one time. Many experts recommend changing passwords every 30 to 90 days. Use words that would be very difficult for others to guess



So what next................
visit this website to get default user name and password for all wifi product
http://www.phenoelit-us.org/dpl/dpl.html
or
www.defaultpassword.com


Securing your Wireless Network

Secure Your LAN
LAN Security Threats
LAN Security Tools

Wireless Networking Security

These days wireless networking products are so ubiquitous and inexpensive that just about anyone can set up a WLAN in a matter of minutes with less than $100 worth of equipment. This widespread use of wireless networks means that there may be dozens of potential network intruders lurking within range of your home or office WLAN.



What can I do?


Most WLAN hardware has gotten easy enough to set up that many users simply plug it in and start using the network without giving much thought to security. Nevertheless, taking a few extra minutes to configure the security features of your wireless router or access point is time well spent. Here are some of the things you can do to protect your wireless network:

1) Secure your wireless router or access point administration interface
Almost all routers and access points have an administrator password that's needed to log into the device and modify any configuration settings. Most devices use a weak default password like "password" or the manufacturer's name, and some don't have a default password at all. As soon as you set up a new WLAN router or access point, your first step should be to change the default password to something else. You may not use this password very often, so be sure to write it down in a safe place so you can refer to it if needed. Without it, the only way to access the router or access point may be to reset it to factory default settings which will wipe away any configuration changes you've made.

2) Don't broadcast your SSID
Most WLAN access points and routers automatically (and continually) broadcast the network's name, or SSID (Service Set IDentifier). This makes setting up wireless clients extremely convenient since you can locate a WLAN without having to know what it's called, but it will also make your WLAN visible to any wireless systems within range of it. Turning off SSID broadcast for your network makes it invisible to your neighbors and passers-by (though it will still be detectible by WLAN "sniffers").

3)Enable WPA encryption instead of WEP
802.11's WEP (Wired Equivalency Privacy) encryption has well-known weaknesses that make it relatively easy for a determined user with the right equipment to crack the encryption and access the wireless network. A better way to protect your WLAN is with WPA (Wi-Fi Protected Access). WPA provides much better protection and is also easier to use, since your password characters aren't limited to 0-9 and A-F as they are with WEP. WPA support is built into Windows XP (with the latest Service Pack) and virtually all modern wireless hardware and operating systems. A more recent version, WPA2, is found in newer hardware and provides even stronger encryption, but you'll probably need to download an XP patch in order to use it.

4) Remember that WEP is better than nothing
If you find that some of your wireless devices only support WEP encryption (this is often the case with non-PC devices like media players, PDAs, and DVRs), avoid the temptation to skip encryption entirely because in spite of it's flaws, using WEP is still far superior to having no encryption at all. If you do use WEP, don't use an encryption key that's easy to guess like a string of the same or consecutive numbers. Also, although it can be a pain, WEP users should change encryption keys often-- preferably every week. See this page if you need help getting WEP to work.

5) Use MAC filtering for access control
Unlike IP addresses, MAC addresses are unique to specific network adapters, so by turning on MAC filtering you can limit network access to only your systems (or those you know about). In order to use MAC filtering you need to find (and enter into the router or AP) the 12-character MAC address of every system that will connect to the network, so it can be inconvenient to set up, especially if you have a lot of wireless clients or if your clients change a lot. MAC addresses can be "spoofed" (imitated) by a knowledgable person, so while it's not a guarantee of security, it does add another hurdle for potential intruders to jump.

6) Reduce your WLAN transmitter power
You won't find this feature on all wireless routers and access points, but some allow you lower the power of your WLAN transmitter and thus reduce the range of the signal. Although it's usually impossible to fine-tune a signal so precisely that it won't leak outside your home or business, with some trial-and-error you can often limit how far outside your premises the signal reaches, minimizing the opportunity for outsiders to access your WLAN.

7) Disable remote administration

Most WLAN routers have the ability to be remotely administered via the Internet. Ideally, you should use this feature only if it lets you define a specific IP address or limited range of addresses that will be able to access the router. Otherwise, almost anyone anywhere could potentially find and access your router. As a rule, unless you absolutely need this capability, it's best to keep remote administration turned off. (It's usually turned off by default, but it's always a good idea to check.)

default passwords

Contribute to the default password list. Add your own experience. Manufactor: Product: ... contact at defaultpassword dot com

www.defaultpassword.com


This is a best website for newbies who would like to get default password for diff kind of Manufacture.......................

Tor Project: Anonymity Online

A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

http://www.torproject.org/
visit this site and download the version base on ur operating system.
It's free once your download this setup, you don't have to install it just need to extract it and start the exe. it's a portable application ,without no virus

Note:- This is educational purpose,I am not responsible for any harm,use it on your own responsibility.................

SQL injection

SQL injection is a technique to maliciously exploit applications that use client-supplied data in SQL statements. Attackers trick the SQL engine into executing unintended commands by supplying specially crafted string input, thereby gaining unauthorized access to a database in order to view or manipulate restricted data.

SQL injection techniques may differ, but they all exploit a single vulnerability in the application


I would like you can shoot below link to know SQL Injection with some example.this is educational purpose.

http://st-curriculum.oracle.com/tutorial/SQLInjection/index.htm