Showing posts with label attack. Show all posts
Showing posts with label attack. Show all posts

Hacking Router Passwords Using a Dictionary Attack

In one of my previous post i told you about the Basics of Password cracking  In this tutorial i will teach you how to crack a Router password by using a dictionary attack  .



What is a Dictionary Attack ?

An attack that tries all  the phrases or words in a dictionary, trying to crack a password or key .A dictionary password cracker simply takes a list of dictionary words, and one at a time encrypts them to see if they encrypt to the one way hash from the system. If the hashes are equal, the password is considered cracked, and the word tried from the dictionary list is the password.

Can I make my Own Dictionary for Cracking ?

Yes you can make your own dictionary .There are plenty of world list generators which creates different types of words you can store the words generated by  the word list generator according to your needs  in a note pad and create  your own dictionary try googling them

What are the tools used for a Dictionary attack ?

There are many tools used for a dictionary attack you can refer my post on  Different Password Cracking Tools   But in this tutorial i will teach you how to crack router passwords using  Hydra  you can download the latest version of hydra from Here

Hacking Router  Passwords Using a Dictionary Attack

I will be using hydra which is installed in backtrack if you don't have Backtrack .Its ok you can do the same  by installing  Hydra - windows version
                                                     
For HQ version click Here


video


Disadvantages of  a Dictionary attack

The password should be there in the dictionary your using or this attack will fail
so always use a good dictionary for this attack . Logs will be created on PC or the router
your hacking so always use a proxy .

Read more ...

Acunetix Web Vulnerability Scanner (WVS)

Acunetix Web Vulnerability Scanner (WVS) is designed to audit web site security.



There is a free *nix based version as well as a Windows based version which ranges in price from a free trial to thousands of dollars.

// WVS contains a suite of tools designed to assist penetration testers in auditing web sites and also has the ability to output an easy to read summary for clients. What really sets this particular scanner apart from others is their proprietary AcuSensor Technology. By installing the AcuSensor Technology on the target system prior to scanning, one is able to decrease the number of false positives, identify more vulnerabilities, and accurately determine the vulnerable code. This works with closed source applications as well as open source. WVS will definitely work without AcuSensor, but, it is incredibly more accurate when this module is properly deployed on the target system.

// Composition of Acunetix Web Vulnerability Scanner:
Site Crawler - used to map a web site by following links and gathering information in a similar fashion to search engine web crawlers.
Target Finder - used to identify http/https servers from a given IP range.
Domain Scanner - used to enumerate additional sub-domains for use as potential targets.
Blind SQL Injector - automates the process of extracting database information through SQL injection.
HTTP Editor - for constructing custom HTTP/HTTPS requests in order to analyze responses.
HTTP Sniffer - HTTP proxy that allows logging, intercepting, and modifying HTTP/HTTPS traffic on the fly.
HTTP Fuzzer - allows fuzzing of request parameters or headers. Useful for determining buffer overflows or input validation errors.
Auth Tester - tool for performing dictionary based attacks against basic HTTP, NTLM, and form based authentication.

// WVS is capable of detecting a number of vulnerabilities including, but not limited to, the following:
Cross Site Scripting
Code Execution
SQL Injection
File Creation
Cookie Manipulation
CRLF Injection
Cross Frame Scripting
Directory Traversal
Email Injection
File Inclusion
Path Disclosure
PHP Code Injection
LDAP Injection
Remote XSL Inclusion
URL Redirection
XPath Injection
Source Code Disclosure
It also utilizes the GHDB (Google Hacking Database).
This is one of those very useful tools that penetration testers should seriously consider purchasing as it helps greatly when auditing web sites and servers and creating detailed reports for customers.


Read more ...

AATools

"Essential Security Diagnostic Tool for Everyone Who Wishes to Protect His Computer and The Data It Contains"

Have you been port scanned lately? Completely ignoring network security is not smart and ignorance isn't exactly bliss. If you access the Internet via a cable modem, DSL, or even a dial-up connection, someone is always knocking on your virtual front door, giving your system the once-over.
Whether you dial-up your ISP or have an "always on" cable modem, the first item on your agenda needs to be finding a secure firewall to protect your computer. Some firewalls are better than others, but you should never trust clever advertising claiming that a cheap firewall will completely protect your data. Once you have decided on a firewall, be it a hardware or software solution, testing the security of that firewall is essential, and AATools is just a testing utility that verifies the integrity of your security and firewall functions.
Advanced Administrative Tools (AATools) investigates and gathers information about your computer, network status, and service availability. That is a layman’s way of saying it performs an inspection on everything vital to network security as it pertains to the protection of your computer, including the utilization of tools to check open ports, proxies, email lists, Internet applications, and general system information.
Useful for system administrators, service personnel or anyone who simply wants to know more about their PC and its connections to the network or Internet, audit your network security.
– ZDNet/Hotfiles.com
AATools includes:
  • Port Scanner with an internal database of ports (officially assigned, unofficially used, or currently affected by network Trojan programs) that analyzes hosts and different services that have been started on them. Its comprehensive scanning engine gathers information about the services, threads, etc. The AATools Port Scanner accurately determines active ports/services using TCP/UDP port interrogation.
  • Proxy Analyzer that tests lists of proxies and/or verifies a list of addresses on present proxy servers. It provides the most detailed information about the proxy itself, including, its headers, locations etc.
  • RBL Locator (RealTime BlackList Locator) designed to quickly search for an IP address in DNS-Based spam databases. RBL Locator checks an IP address against the most known blacklists. It helps you determine if you're listed as a "bad actor" within any of the shared blacklists.
  • Trace Route that shows you the path that a packet sent from your machine to some other machine on the network takes as it hops from router to router. It will show you the IP address and the actual name of each router, line-by-line.
  • Email Verifier – your unique solution for the "message delivery error". You don't need to disturb your clients and friends anymore to verify whether their e-mail addresses are still valid or not. Email Verifier connects directly to their SMTP server and checks it for you. Nothing is sent to the recipient.
  • Links Analyzer – a new state-of-the-art utility that scans your URLs and IE Favorites and notifies you if a link has been changed or has become invalid. It also acts as a navigation tool and makes it very easy to find what you are looking for eliminating the need to search inside folders.
  • Network Monitor that shows you an extremely large amount of supplementary information about your outbound and inbound network connections. Plus, the AATools Network Monitor maps open ports to the owning application (for Windows NT/2000/XP only). It is useful in diagnosing networks and monitoring your computer's network connections.
  • Process Monitor that provides you the information about the processes and applications loaded into your PC's memory, including sniffers and hooks.
  • Whois, a useful network information utility that allows you find all the available information about IP addresses, host names, location, NSP name, administrator and technical support contact information of any Internet address.
  • System Info that collects and displays your system configuration information. Support technicians require specific information about your computer when they are troubleshooting your configuration. You can use the System Info tool to quickly find the data they need to resolve your system problem.
  • Resource Viewer intended for viewing the resources of executable files (with the .exe and .dll extension). It displays comprehensive information about program resources including dialogs, icons, strings and more. Resource Viewer can also be used to save resources of any selected module on your hard disk.
  • Registry Cleaner that cleans up unnecessary registry entries in your registry and helps increase your computer performance, speed up the operation system loading and reduce the number of failures.
System Requirements
* Windows 2000/XP/Vista/7 (32-bit)
* Internet connection or TCP/IP enabled LAN.
* Internet Explorer 5.5 or higher.

Download Now :
Advanced Administrative Tools
Version: 5.92
For Windows 2000/XP/Vista/7 (32-bit)
* No Mac or Linux version available
Read more ...

Trojan Sub7

If you haven't heard of Sub7, I suggest you leave now, find out what it is, then come back. Stop wasting my time. If you think you have the skilled mind for it, stick around, and I will introduce you to one of the many essential tools hackers have ready at all times.

Origin

Sub7 was invented in the late 1980's by a legend known as Mobman. Mobman wanted to make the basic tasks of a hacker easily accessable and easy to implement. I'm not sure what exactly he programmed it in, but it was probably something extremely difficult and involved, like Visual Basic or A+. I read up on Mobman, no one knows of his whereabouts and some even claim that he is dead (real hackers know better). Either way, we can all thank Mobman for this great program.

What it is

Sub7 is a R.A.T (Remote Administration Tool) that basically has two parts: a client, and a server. After you have the server installed on another machine, or trick another person into installing the server on their machine, you can use the client to connect to them through network protocols and routes. After you're connected to them, the client provides you with a series of hacking tools and features to use on your victim. Which, obviously, is the goal of any hacker.
Sub7 has made this easy, but the only hard part is having the server installed on the other machine. You can see the official Sub7 website for tactics on how to accomplish this.


Screenshot of the Sub7 client window



Features

Sub7 is well-known for it's wide selection of elite tools and features. Listed below are just a few that come to mind:
  • Keylogger
  • Uploader
  • Server
  • Customized skins
  • Hide cursor
  • Client
  • CDROM close/open
  • Hide cursor
  • IP Pinging
  • Name lookup/revolution
  • Change the appearance of icon

Availability

Sub7 was banned by the United Nations in 1995, but I consulted my many underground resources and found it for you. The last version that was made was Sub7 Legends, and is available for download here. This file is extremely rare, and was very hard to find. I had to download it through KaZaA.
Again, as with many things found on this site, the creator of this site is NOT responsible for anything you do with the knowledge or tools found within the site. Everything here is for educational purposes only. If you do not agree, leave now.
Read more ...

CallerIP

Similar to Caller ID for your telephone, CallerIP shows you who is connecting to your system at any time.
# Plot all connections
This feature enables you to have CallerIP plot all the connections on the world map. This in turn allows for easy and quick analysis of where connections made to/from your machine reside.
# New look table
The new look table includes gradient fills. This means the color of the row in the table depends on the threat of the connection. If the connection being made to your machine is harmless then the gradient will be green. Another quick an easy way to identify the threat of a connection.
# Condensed CallerIP
CallerIP now allows you to minimize it to a very small and detailed dialog box. The small window gives you everything you need to know but stays in the background.
# Realtime monitoring instantly identifies suspect activity and spyware
CallerIP monitors all connections to and from your system and actively scans ports for possible back doors that allow unauthorized access.
# Identifies the country of origin for all connections
A connection to/from a high-risk country is a key indicator of suspect activity and could likely be someone looking to steal your confidential information or compromise your system. CallerIP shows you the country location of connections so you can identify suspect activity and protect your information.
# Network Provider reporting with abuse reporting information
See the contact and abuse reporting information for the company providing internet access for an IP address or website, so you can easily report hackers or Internet abuse.
# Worldwide Whois reports
CallerIP Pro queries worldwide databases to report the up-to-date registration information for the 'owner' of an IP address or domain. Information includes name, address, phone and email contact information.
# Detailed log of connection history with search options
Each connection or attempted connection is automatically logged, with search capabilities for quick lookups of past connection activity.
Advanced Features
# The Advanced Edition includes all the standard features plus:
# CallerIP Server
Allows you to monitor your machine from a remote location. You can view the Caller History and Current Callers list in a browser window from anywhere in the world. Keep tabs on your home PC from the office of vice versa. No need to worry about your PC being connected to without your permission. The ultimate in PC security. Screenshot.
# Improved logging technique
Searching large log files is literally hundreds of times faster than before. Find any IP or connection in lightning quick time.
Automated alerts of high-risk connections
Instant notifications for high risk or suspect connections are provided by email, pop-up window, or color-coded reports. And customizable alerts enable you to see an alarms for a connection by type (incoming/outgoing), country of origin, IP address, port or process name.


Read more ...

Facebook -game Hacks

In this tutorial i will show you how to hack How fast you click? game in facebook by Dll injection




What is DLL injection ?
In computer programming, DLL injection is a technique used to run code within the address space of another process by forcing it to load a dynamic-link library. DLL injection is often used by third-party developers to influence the behavior of a program in a way its authors did not anticipate or intend  




Follow the steps to hack How fast You can click ?


1. Download cheat engine from Here
2. Open how fast you can  click game in your browser


3. Select process to open as shown 


4. Selct you browser In my case it is firefox

5. Start the game 
6. Now select enable speed hack from cheat engine and set the timer to zero 


7. Thats it you can see the timer freezed 

8. After clicking you can disable  speed hack and post your score on your wall




Note:- You can use the same hack for other games like pinball and minesweeper
Read more ...

Cracking WEP Using Backtrack - WiFi Hacking

In my previous article WiFi Hacking Part 1, i wrote about the necessary tools and stuff  that you require for WiFi Hacking .If you have not read the article, please go through it before reading this one

In this article i will explain how you can crack wireless network's WEP key using Backtrack in six easy steps



WiFi Hacking Part 2 


I believe all my blog readers have read the previous article WiFi Hacking Part 1, and know what are the tools and stuff that you require for WiFi hacking

Commonly Used Terms :- 

  • WEP - Wired Equivalency Privacy, it is a security protocol for Wi-Fi networks
  • Access Point (AP)- A wireless router
  • MAC Address - Media Access Control address, a unique id assigned to wireless adapters and routers .It comes in hexadecimal format (ie 00:15:eR:21:a3:63)
  • BSSID - Access Point’s MAC address
  • ESSID - Access Point’s Broadcast name

Cracking WEP Using Backtrack 


Step -1 Booting Backtrack

Boot your copy of Backtrack from your USB drive (refer my article on how to make a bootable Backtrack USB ),Once booted you will be prompted for the login details, enter usename as "root" and password as "toor", finally enter "startx " to start backtrack .Now once you have logged in, launch a new konsole terminal by clicking the konsole terminal icon which is there on the task bar .Now plug in your Wifi usb card and type in the following commands in the terminal as shown
ifconfig wlan0 up

where wlan0 is the name of the wireless card ,it can be different .To see all wireless cards connected to your system simply type" iwconfig "

Step -2 Putting your WiFi card on Monitor Mode

The purpose of this step is to put your card into what is called monitor mode. Monitor mode is the mode whereby your card can listen to every packet in the air ,It is similar to a Promiscuous mode which is used for packet sniffing in a LAN .You can put your card into Monitor mode by entering the following commands in a terminal
airmon-ng  start (your interface)

Example :- airmon-ng  start wlan0

Now a new interface mon0 or ath0 will be created , You can see the new interface is in monitor mode by entering "iwconfig" as shown


Step -3  Monitor the air for WiFI connections 


Now after putting the card in monitor mode you will need to monitor the air for available wireless networks (WiFi connections)around  you , For this you'll have to use a tool called "airodump" .

So you can start monitoring the air with airodump by enter the following commands
airodump-ng  mon0

where mon0 is the new interface which we created in the previous step
Bssid shows the mac address of the AP, CH shows the channel in which AP is broadcasted and Essid shows the name broadcasted by the AP, Cipher shows the encryption type ,

Stop the process by pressing  "ctrl +c " and select your target  ,Since i am only cracking WEP  i will take "johny" as my target from now on

Step -4 Capturing Data with Airodump 

Now to crack the WEP key you'll have to capture the targets data into a file, To do this we use airodump tool again, but with some additional switches to target a specific AP and channel. Most importantly, you should restrict monitoring to a single channel to speed up data collection, otherwise the wireless card has to alternate between all channels .You can restrict the capture by giving in the following commands
airodump-ng mon0 --bssid -c (channel ) -w (file name to save )
As my target is broadcasted in channel 2 and has bssid  "98:fc:11:c9:14:22" ,I give in the following commands and save the captured data as "johnywep"
airodump-ng   mon0 --bssid  98:fc:11:c9:14:22   -c 2  -w  johnywep
Do not close this terminal (run the other commends simultaneously in an another terminal)


Step -5 Using Airepaly to Speed up the cracking  

You will have to capture at least 25,000 data packets to crack WEP .This can be done in two ways, The first one would be a (passive attack ) wait for a client to connect to the AP and then start capturing the data packets but this method is very slow, it can take days or even weeks to capture that many data packets

The second method would be an (active attack )this method is fast and only takes minutes to generate and inject that many packets .

In an active attack  you'll have do a Fake authentication (connect) with the  AP ,then you'll have to generate and inject data packets.This can be done very easily by using a tool called "airepaly"

So you can do a Fake authentication with the AP using airepaly by entering the following commands in a new terminal
airepaly-ng - 1  3  -a (bssid fo the target )  (interface)

In my case i enter the following

airepaly-ng -1 3  -a 98:fc:11:c9:14:22 mon0 

After doing a fake auth ,now its time to generate and inject Arp (data )packets . To this you'll have to open a terminal simultaneously and enter the following commands
airepaly-ng 3  -b (bssid of target)  -h ( address of your card (mon0))   (interface)

In my case i enter
airepaly-ng 3  -b 98:fc:11:c9:14:22   -h 00:c0:ca:50:f8:32 mon0
If this step was successful  you'll see Lot of data packets in the airodump capture ( step 4  ) as shown


Wait till it reaches at least 25000 packets , best would be to wait till it reaches around 80,000 to 90,000 packets .Its simple more the data packets  less the time to crack .once you captured enough number of packets, close all the process's by pressing "Ctrl +c" or by simply clicking the into mark which is there on the terminal

Strep -6 Cracking WEP  key using Aircrack 

Now its time crack the WEP key from the captured data, we use Aircrack to achieve this

Enter the following commands to crack the WEP key
aircrack-ng  (name of the captured file (step 4) )

In my case i enter 

aircrack-ng johnywep-0.1-cap
With in a few minutes Aircrak will crack the WEP key as shown


Voila you have successfully  cracked the WEP key in Six simple steps

Hope you enjoyed the post, For further doubts and clarifications please pass your comments 


Read more ...

Facebook - Farm Ville Secrets Revealed

If you’ve ever been on Facebook, you have very likely heard of the game Farmville. The internet gaming phenomenon has swept away the time of millions of users, and become a beloved time passer by those who have been captivated by it. It can be the most fascinating game, but frustrating as you begin to watch your progress slow.

As a result, hundreds of books with secrets have been released to help users maximize their experience. There are some of these books that offer basic tips which are easily researched on the internet, while some offer step by step instructions to actual success.  Farm ville Secrets: The Best Kept Secrets Revealed is one of the latter books.
                                    
                                          Farm Ville Secrets
What Makes Farmville Secrets So Great?
What you will find out when you play Farmville Secrets is that the guide is so comprehensive even if you’ve never played the game you can easily learn it. There is a whole section directing the user valuable tips to starting their first farm, including what crops to grow, and which investments will pay off, while others will simply waste your funds.
After the quick introduction, it begins to knock out the tips that are going to get you leveled up faster and complete the ribbons with minimal effort on your part. Soon you will be able to have all the best items available in Farmville in the smallest time frame possible. No matter what item you are looking for, there is a simple and inexpensive way to obtain it, with this guide you will find out exactly how it is done.


For those who don’t want to spend money through the game’s pay based system, the guide also offers you information on what in game tasks you can do to receive big Farmville bucks, along with coins to use in the normal marketplace. There’s no more wasting your hard earned money on getting items that you can easily get for free with a few easy tricks. Best of all, several of the tips can be repeated with ease.

What Sort Of Tips Will I Get?

There are tips on how to breeze through even the most difficult to obtain ribbons. While some books offer you expensive solutions to each of these, you will find the best and most effective means of obtaining each ribbon, and alternative means as well.

Overall the guide is well written, direct and flows as it explains every process you need to know to continue your Farmville experience. Not only will you receive this information, but you will learn how to get hard to find game items, as well as mastering the art of getting more than one. In fact, you can obtain the three villas that have become a popular addition to many high level farms.


No matter if you are new to the Farmville experience, or are a long time veteran there are plenty of tips and tricks to be obtained from Farmville Secrets, and provide you with hours of additional game play. Experience all the best the game has to offer, thanks to this book.
Source Myneed.org


You can download the Book From the Following Link 
Read more ...

Netbios Hacking - A Network hack

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.



STEP-BY-STEP NETBIOS HACKING PROCEDURE

1.Open command prompt

2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).

Example: C:>net view \59.43.45.212

The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here “59.43.45.212? is an IP address of remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP address in it’s place.If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address.

3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios command which makes it possible to hack remote drives or printers.

Example-1:
C:>net use D: \59.43.45.212F
Example-2:
C:>net use G: \59.43.45.212SharedDocs
Example-3:

C:>net use I: \59.43.45.212Myprint

NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.

NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT

F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer.These are displayed after giving “net use” command. “59.43.45.212? is the IP address of remote
computer that you want to hack.

4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.
[ad code=1 align=center]
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system.You can access filesfolders quickly through “Command Prompt”.

NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address.
Read more ...

Hack passwords with Cain and Abel

In this post i will show you how to crack  local password with cain and abel 

First download cain and abel from "http://www.oxid.it/cain.html" and install it on your system.

Make sure that you have disabled the antivirus/firewall running on your system before installing and throughout this process.

The most effective tecnique  used here is  Brute-Force

 Brute-Force - As this techniques takes more time to complete, the attacker prefer this technique  only when there is a hope that the password contain same type of characters or may be two. i.e only loweralpha, only alpha, only numeric or may be loweralpha-numeric, also it should contain less than 7 characters. Otherwise it takes more time to crack password, which may be the mixture of all types of characters along with special symbols.
The step-by-step explaination for this technique is given below-

1)
 Open the tool "Cain and Abel"   



2) Go into the category "Cracker"      it displays all sub-categories under "Cracker"

     in    left panel.



3) Select "LM & NTLM Hashes" from left panel and then click on      symbol, you will be greeted by   

    a window as shown.



4) Check "import hashes from local system" and then click "Next". This shows all the active accounts on local system like administrator, guest, etc. along with LM and NT hashed values of their respective passwords, as shown below.



5) Right clicking on any username shows all available options using which we can crack it's password.



6) Here we select "Brute-Force Attack" and then "NTLM Hashes", since windows uses NTLM hashes  
    to store local users' passwords.

7) You will be greeted by a window where you can modify properties for brute-force attack such as 

     password length, character set, etc.



8)
 Click on "Start" button.

9)
 On completion it will reveal the exact password.


  



I hope you like this post. For further doubts and clarifications please pass your comments.
Read more ...

Crack Password with Brutus App

Brutus is one of the fastest, most flexible remote password crackers you can get your hands on – it’s also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 370,000 downloads. Development continues so new releases will be available in the near future.

Brutus was written originally to check routers etc. for default and common passwords.

Features

Brutus version AET2 is the current release and includes the following authentication types :

  • HTTP (Basic Authentication)
  • HTTP (HTML Form/CGI)
  • POP3
  • FTP
  • SMB
  • Telnet
Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples.

The current release includes the following functionality :
  • Multi-stage authentication engine
  • 60 simultaneous target connections
  • No username, single username and multiple username modes
  • Password list, combo (user/password) list and configurable brute force modes
  • Highly customisable authentication sequences
  • Load and resume position
  • Import and Export custom authentication types as BAD files seamlessly
  • SOCKS proxy support for all authentication types
  • User and password list generation and manipulation functionality
  • HTML Form interpretation for HTML Form/CGI authentication types
  • Error handling and recovery capability inc. resume after crash/failure.
You can download it here:


Brutus AET2
Read more ...

Hackers Use European Storm to Spread E-Mail Attack

A massive malware attack spread throughout the world Thursday and Friday by teasing e-mail recipients to open infected messages supposedly about European wind storms. The attackers use of the subject line "230 dead as storm batters Europe" was an effective way to lure careless computer users into opening mail infected with the "Storm Worm" virus.



"Storm Worm" is the name that seems to have stuck for a massive malware Webroot AntiSpyware 30-Day Free Trial. Click here. attack that spread Thursday and Friday by teasing e-mail E-Mail Marketing Software - Free Trial. Click Here. recipients to open infected messages supposedly about European wind storms.


The attackers use of the subject line "230 dead as storm batters Europe" was an effective way to lure careless computer users into opening mail infected with the Small.DAM Trojan. Fierce winds were battering Europe simultaneously with the release of the messages.


The Trojan was launched when users clicked on attachments to the messages that said "Full Clip.exe," "Full Story.exe," "Read More.exe" and "Video.exe."
Different Variations


However, the perpetrators also sent similarly infected, but differently titled, messages to thousands of other inboxes. These messages titillated readers into clicking the attachments by suggesting they would see videos of U.S. Secretary of State Condoleeza Rice kicking German Chancellor Angela Merkel which, unlike the storm, did not actually happen.


Others offered information or video pertaining to "British Muslims Genocide," "Naked teens attack home director" and "A killer at 11, he's free at 21 and kill again!"


The interesting part of the attack was the creativity and timing, according to Graham Cluley, senior technology consultant for Sophos Latest News about Sophos. "Everyone is concentrating on the storm angle of it, which is only one headline of course," he said. "That was topical in Europe, where we've had some very, very bad weather. But another worthwhile thing to consider is the way they were trying to use humor to get people to open the mail as well."


Many people enjoy reading jokes or weird news tidbits sent by e-mail, Cluley noted. "People who receive that and think they got a video attached to the e-mail might think, 'That sounds funny. I might just click on it to have a look.' This is taking advantage of the way people share jokes and videos. It's not just the news aspect of it. There is all sorts of social engineering going on here."
Topical Messages Enhance Effectiveness


The attack shows that hackers are staying abreast of world news. The European storm message was "created and launched literally as the storm raged," according to Helsinki, Finland-based security company F-Secure Latest News about F-Secure.


The attack was powerful and widespread but, apparently, short-lived, F-Secure's Chief Research Officer Mikko Hypponen told TechNewsWorld.


"This is over," he added. "They stopped the attack. Whoever sent this isn't doing it anymore. Looking at the rate of e-mails being sent, we believe they were targeting European users and it was a nine-hour window starting [Thursday] night and finishing at about 10 a.m. [Friday morning]."


The storm-related message was apparently meant to be awaiting users in the morning, according to Hypponen.


"The people woke up and saw news about a massive storm," he explained. "They went to work and found an e-mail about the storm in their inboxes. Of course it's going to work much better than the usual attack. They gained access to probably tens of thousands of computers in Europe."
Zombie Network


The hackers, before the Thursday-through-Friday attack, had already gained control of thousands of PCs by prior malware infection, Hypponen noted. "They instructed those computers to do this 10-hour spam run. They had a very large [zombie] network See the HP StorageWorks All-in-One Storage System. Click here.. Now it's much larger."


The "huge attack" might have worked too well, in a sense, suggested Sophos' Cluley. "The fact that this is making headlines actually works against the hackers" because so many people and antivirus companies are now aware of the incident, thanks to its creative and "colorful" nature.
Read more ...

How To Hack Websites Using Phishing Method

Phishing is the other most commonly used trick to hack passwords. This method involves the use of Fake Login Pages whose look and feel are almost identical to that of legitimate websites. Fake login pages are created by many hackers which appear exactly as Gmail ,Photobucke, facebook, Yahoo login pages and similar

Once you enter your login details on such a fake login page, they are actually stolen away by the hacker.
Here are the best step by step tutorials that explains how to hack websites using phishing method.
1) How To Hack Facebook – explains how to hack facebook account with fake login page
2)How To Hack Facebook Accounts | Video Tutorial
3)How To Hack Gmail - part 1
4) How To Hack Gmail - part 2
5)How To Hack A Photobucket Account
6) How To Hack Yahoo Password

How To Hack Websites Using Remote Spying Software
Once installed on the remote PC you wish, you only need to login to your own personal remote spying account to view all recorded data of the remote PC and to control target PC’ with remote access . Here are the best tutorials from hackspc.com that explains how to hack websites using remote spying software
1)How To Use Sniperspy To Hack Passwords
2) How To Hack A Computer

How To Hack Websites Using Social Engineering Method
Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking and fooling other people to break normal security procedures.
How To Hack Hotmail
Read more ...
Powered by Blogger