Saturday, May 3, 2014

How To Hack Remote Computer Using Ip Address[Telnet]



1.Confirm the computer you want to hack.
2.trace their IP address.
3.Make sure that IP address is online
4.Scan for open ports
5.Check for vulnerable ports
6.access through the port
7.Brute-force username and password
Now
First, getting the IP address of Slave.
To get the IP address of the Slave website, ping for it in command prompt.
For example,
ping http://www.google.com
will fetch the IP address of


Code: 
http://www.google.com

Posted Image

This is how we can get the IP address of the victims website.

One of the widely used method to detect IP address of your friend is by chatting with him.

Now you got the IP address

If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.

Use Advanced Port Scanner to scan all open and vulnerable ports.

Posted Image
Now you’ve IP address and open port address of the Slave, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.

Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection. 


Posted Image


You’ll be asked to input login information.
Posted Image

you can use some brute-forcing tools 


BruteForce Tools

Brutus is one of the fastest, most flexible remote password crackers you can get your hands on - it's also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more.
Platform: Windows

Code:

THC-Hydra
This tool allows for rapid dictionary attacks against network login systems, including FTP, POP3, IMAP, Netbios, Telnet, HTTP Auth, LDAP NNTP, VNC, ICQ, Socks5, PCNFS, and more. It includes SSL support and is apparently now part of Nessus.

Code:
http://www.hoobie.net/brutus/

TSGrinder

TSGrinder is the first production Terminal Server brute force tool. The main idea here is that the Administrator account, since it cannot be locked out for local logons, can be brute forced. And having an encrypted channel to the TS logon process sure helps to keep IDS from catching the attempts. It is a "dictionary" based attack tool, but it does have some interesting features like "l337" conversion, and supports multiple attack windows from a single dictionary file. It supports multiple password attempts in the same connection, and allows you to specify how many times to try a username/password combination within a particular connection. 
Platform: Windows


Code: 
http://www.thc.org/releases.php

Thanks!Tutorial For Educational Purposes Only!

How to hack into a Website Database and take files


How to hack into a Website Database and take files. [with Pics] 
What will you need?
  • You need basic computer skills such as making new folders.
  • You Need a dos called Wget You can download from HERE
  • You need to have administrative privileges on your computer.

The Tutorial
Step 1: Download Wget from HERE
and put it on the root of your operating system, most people have "C" So go there and make a new folder called wget NO CAPS. Inside only put the dos. (btw the dos doesn't open I will show you how to use it)

Step 2: Open Cmd
In XP go to run and put CMD or command.com
In vista/7 Search for CMD and right click open as Administrator.
[Image: step2e.png]

Step 3: In Cmd put "cd C:\wget" No quotes and if your main drive is not C put it as your main drive.
Image has been scaled down 4% (700x378). Click this bar to view original image (729x393). Click image to open in new window.
[Image: step3gj.png]


Step 4: Post this command "wget -r -A.jpg" (Don't press enter) See how it says .jpg, you can make it the extension your trying to get. Right now it would take any file with the extension .jpg and download it. If you changed the command to wget -r -A.html it would get all the html files ect.
Image has been scaled down 4% (700x378). Click this bar to view original image (729x393). Click image to open in new window.
[Image: step4y.png]


Step 5: Now after that you can space once and put the website or link/server you want to take from. It will check for safety and certificates if you don't want it too because its a hassle you can put this. --no-check-certificate. So after you put the first command you space you put this then you space again and post the website/link/server and port if you want to get specific. 

Step 6: Now you're set! Just press enter and watch the magic happen. You can open another cmd and do another file extension at the same time.
[Image: step5b.png]

Step 7: Now just go to the wget folder on C and open it. There should be a new folder of the website in there. Click on it and thats the files.
[Image: step6o.png]

How To Scan Vulnerabilities Using Backtrack:-


In this tutorial I will use a program in BackTrack called UniScan.
it's very easy to use, but very good in scanning.
 First of all, open your
terminal and type this command: cd /pentest/web/uniscan &&
./uniscan.pl
Something like this will be printed on your terminal.
 Now all we haveto do is follow the instructions.
 First of all we need a target to scan,
I've chose one already and I will use it in my pictures.
To start the scan, first you have to check the options which you want
to use in your scan.
# HOW TO USE OPTIONS:
Check the letter beside your option, and include it after the URL like
this:
./uniscan.pl -u http://www.website.com/ -b -q -d -w or put them all
together. ./uniscan.pl -u http://www.website.com/ -bqdw
This will start your scan with all the different options you included.
NOTE:- NEVER FORGET THE FORWARD SLASH AT THE END OF THE
LINK IN THE COMMEND!!
Now the scan will start, and the terminal will look something like this:
This scan will scan for vulnerabilities like SQL-i / LFI / RFI and so on.
It also searches for Webshells, backdoors, PHP info disclosure, Emails,
and much more.
Here are some examples: PHP.info() disclosure: External Links/Hosts:
Source Code disclosure: Dynamic Scan, Vulnerability Identification:
This program can also get all the sites in a server, and then you will be
able to scan all of them.
To do that, run this command: ./uniscan.pl -i "ip:127.0.0.1" Change
127.0.0.1 to your target server. All the websites will be stored in
"sites.txt" in the same directory.
Now to scan those sites in the list, run this command: ./uniscan.pl -f
sites.txt -bqwd You can change the options to whatever you want.
Thats it guys

How to Create Windows 8 Boot-able Pen drive:

Step 1 :Download Windows 7 USB/DVD download tool and install it.



This tool is available for free from Microsoft Corporation as well so you can get it from there too. Despite its name, this tool works with Windows 8 ISOs as well. You can use this tool for any version of Windows.
Step 2:After downloading and installing the tool, Run it , now you need to Browse and give the path where the ISO  file is located in your computer.
Step 3:Now select whether you want to create a bootable DVD for windows or you want it to be abootable pendrive. Here you need to select USB device because you want to make bootable pendrive.
Step 4: Browse and select the pendrive which you want to make bootable. Make sure that the pendrive has atleast 4 gb free . Now click on Begin Copying.


Step 5:

Once you begin copying , the tool will start creating bootable Windows 8 USB installer flash drive using theWindows 8 iso. Let this process complete , lastly when you see the message “Bootable USB Device created successfully”, you can restart your PC and boot from the USB drive.
Hope this tutorial will help you to Create Windows 8 Bootable Pendrive .

How to Crack a Wpa2-Psk Password with Windows?


How to Crack a Wpa2-Psk Password with Windows
How to Crack a Wpa2-Psk Password with Windows :-
It,s very common question on the internet to How to hack a Facebook account password and how to hack a WiFi password. Even if you search on YouTube you will find a lots of tutorial to How to hack a WiFi password using backtrack. However, backtrack OS is not most handy OS for normal users. yesterday my one Facebook friend Lovito Tsuqu Kiho ask me to how to hack WiFi using commview using aircrack-ng.
Today i am going to show you how to a crack a Wp2-psk password with windows machine.
Software Requirement for this lab :-
1. CommView for Wifi ( Download)
2. Elcomsoft Wireless Security Auditor (Download)
Presently i am connected with my own wifi network Virusfound and i want to hack the password of Ultimate that is secured with Wpa2-psk encryption.
commaview6
First you need to be capture the Wpa2, four-way handsake with CommView.
Open commView and click on the Start option
commaview
then click on the captureoption to start the capture
commaview1
now it will show you all available AP, Now click on the Tools > Select theNode Reassoication option ( if Node Rassociation is not working , then use WiFi Alfa card )
commaview2
now select your target APin the Send a deauthentication requestfrom this AP option. it will show you all available client option.
commaview3
now click on the Send Now option to send the packet for 4-way authentication. wait for some time so it will capture the packet.
commaview4
now click on the Save option and choose your file formatCommview Capture Files (*.ncf)
commaview5
you capture work is done.
Now open Elcomsoft Wireless Security Auditor to crack your wifi password.
Click on the Import Data tab > select the Import CommViewLog option.
commaview7
now it will show you information about AP and Multiple Handshake selection information. Click on Ok.
commaview8
now click on the Start attackoption and select theDictionary Attackoption. However you have other attack options are also available.
commaview9
now within minutes it will found your password and it will show you the password.
commaview10
Enjoy Wifi Hacking with Windows machine.
commaview11

This video will help you in packet capture.

Note :- This tutorial is for education purpose only.
Hope you like my post.How to Crack a Wpa2-Psk Password with Windows. Please Share with othe

How to Check Original Installation Date of Windows


Many a times we want to know more and more about our System, What if a Friend of yours asks you some Questions about your PC and you fail to answer it, You may be Curious to Know the Original Installation Date of Windows. We all want to know when our windows was First Installed, How many months or Years have passed since you are chugging without Refreshing your System.

The Process to know the Original Installation Date of your Windows is Very Quick and Simple, Stay with me, read on and i will tell you how to do it Step by Step.
Steps to Check Original Installation Date of Windows




Steps to Check Original Installation Date of Windows




Step 1: Hold Windows key and Press R key to open Run, Type CMD and hit enter to Open up Command Prompt.

Step 2: Type systeminfo.exe in Command Prompt and Hit Enter.

Step 3: Just wait a Few Seconds to Gather all the Data , Boom- You will Get all the info of your System in just a few seconds including the Original Installation Date which we are looking for.






Step 4: With this Command you Get all the Necessary info about your System but If you Just want to know the date on which your windows was Installed on your System then type this Command systeminfo | find /i “install date










You can see its showing that i have installed my windows last month as i had to Refresh my Windows, its pretty much Accurate.
Thats it guys, in this tutorial we saw how to check our system info including the Windows Installation Date. If you have any trouble related to this article, have a go and Speak your mind in Comment box.

How to compile Reaver under Ubuntu 12.04 (and aircrack-ng)

This is a quick how-to compile and install Reaver under Ubuntu 12.04
Steps:
  1. download source
  2. install required libraries and tools
  3. download and build aircrack-ng
  4. compile and install
  5. run =)

Download Source

First you need to download the latest source from http://code.google.com/p/reaver-wps/
wget http://reaver-wps.googlecode.com/files/reaver-1.4.tar.gz
Extract the tarball
tar -xzvf reaver-1.4.tar.gz

Install Required Libraries and Tools

Before you can build Reaver you need pcaplib and later on aircrack-ng (iw) to run Reaver
sudo apt-get install libpcap-dev sqlite3 libsqlite3-dev libpcap0.8-dev

Compile and Install

Build Reaver
cd reaver-1.4
cd src
./configure
make
Install Reaver
sudo make install

Download aircrack-ng source and build it

Since Ubuntu 12.04 aircrack-ng is not longer in the repository but you can still download it from source and compile it. It’s only one little tweak that need to be done since it will not build without the following errors.
johan@ubuntu-lab:~/aircrack-ng-1.1$ make
make -C src all
make[1]: Entering directory `/home/johan/aircrack-ng-1.1/src’
make -C osdep
make[2]: Entering directory `/home/johan/aircrack-ng-1.1/src/osdep’
Building for Linux
make[3]: Entering directory `/home/johan/aircrack-ng-1.1/src/osdep’
gcc -g -W -Wall -Werror -O3 -D_FILE_OFFSET_BITS=64 -D_REVISION=0  -fPIC -I..    -c -o osdep.o osdep.c
gcc -g -W -Wall -Werror -O3 -D_FILE_OFFSET_BITS=64 -D_REVISION=0  -fPIC -I..    -c -o network.o network.c
gcc -g -W -Wall -Werror -O3 -D_FILE_OFFSET_BITS=64 -D_REVISION=0  -fPIC -I..    -c -o linux.o linux.c
linux.c: In function ‘is_ndiswrapper’:
linux.c:165:17: error: variable ‘unused’ set but not used [-Werror=unused-but-set-variable]
linux.c: In function ‘linux_set_rate’:
linux.c:334:22: error: variable ‘unused’ set but not used [-Werror=unused-but-set-variable]
linux.c: In function ‘linux_set_channel’:
linux.c:807:22: error: variable ‘unused’ set but not used [-Werror=unused-but-set-variable]
linux.c: In function ‘linux_set_freq’:
linux.c:896:22: error: variable ‘unused’ set but not used [-Werror=unused-but-set-variable]
linux.c: In function ‘set_monitor’:
linux.c:1022:22: error: variable ‘unused’ set but not used [-Werror=unused-but-set-variable]
linux.c: In function ‘do_linux_open’:
linux.c:1366:12: error: variable ‘unused_str’ set but not used [-Werror=unused-but-set-variable]
linux.c:1352:15: error: variable ‘unused’ set but not used [-Werror=unused-but-set-variable]
linux.c: In function ‘get_battery_state’:
linux.c:1982:35: error: variable ‘current’ set but not used [-Werror=unused-but-set-variable]
cc1: all warnings being treated as errors
make[3]: *** [linux.o] Error 1
make[3]: Leaving directory `/home/johan/aircrack-ng-1.1/src/osdep’
make[2]: *** [all] Error 2
make[2]: Leaving directory `/home/johan/aircrack-ng-1.1/src/osdep’
make[1]: *** [osd] Error 2
make[1]: Leaving directory `/home/johan/aircrack-ng-1.1/src’
make: *** [all] Error 2
This is how to build aircrack-ng under Ubuntu 12.04
sudo apt-get install build-essential
sudo apt-get install libssl-dev
wget http://download.aircrack-ng.org/aircrack-ng-1.1.tar.gz
tar -zxvf aircrack-ng-1.1.tar.gz
cd aircrack-ng-1.1
Edit common.mak with vi as example
vi common.mak
Find the following row
CFLAGS          ?= -g -W -Wall -Werror -O3
Remove “-Werror” so that it looks like this
CFLAGS          ?= -g -W -Wall -O3
Save the file, build and install
make
sudo make install

Run

Reaver is now installed and ready to use. You will first need to put the wifi adapter info monitor mode before you can start and the most easiest way is to use airmon-ng (part of aircrack-ng) that you just installed.
First put your adapter info monitor mode, in my case it’s wlan0
sudo airmon-ng start wlan0
Run Reaver
sudo reaver -i mon0 -b 00:00:00:00:00:00
Replace MAC 00:00:00:00:00:00 with the actual AP:s MAC address to crack