Pages

Thursday, 16 June 2011

WEP Key Cracking Using Backtrack: Step by Step Tutorial


 A. SCOPE
This tutorial is intended for user’s with little or no experience with linux or wifi. The folks over
at remote-exploit have released “Backtrack” a tool which makes it ridiculously easy to access 
any network secured by WEP encryption. This tutorial aims to guide you through the process 
of using it effectively.

Required Tools

  • You will need a computer with a wireless adapter listed here
  • Download Backtrack and burn it’s image to a CD

B. OVERVIEW

BACKTRACK is a bootable live cd with a myriad of wireless and tcp/ip networking tools. 
This tutorial will only cover the included kismet and aircrack-ng suite of tools.

Friday, 10 June 2011

How to Crack Almost Any Windows user password

For Windows OS, Ophcrack is the tool of choice. It is a free Windows Password cracker based on Rainbow Tables. It has a GUI which makes it easier to run. The software can decipher passwords up to 14 characters in length in a quick 10 seconds.
 Ophcrack uses rainbow tables to guess the password. When a working one is encountered, it is presented to you, and you can simply log in with it. One would think this “guessing” takes a lot of time, but that’s just where the power of rainbow tables lies.
 


Step by Step Tutorial to Crack windows user password :

1.To use Ophcrack one needs to download the Ophcrack ISO (Live CD) and burn it to a CD (or load it via a USB drive).
 click here To Download Ophcrack
2.Run the Live CD by loading it in the tray and restarting the computer with the power switch.
3.Switch to the BIOS options and set the computer to boot from the CD Drive.
4.The computer boots up and reads the Ophcrack CD which then proceeds to break the password.
5.Use this password to log into the machine.

Thursday, 9 June 2011

How To Hack Gmail Password Using Gmail Hacker [TUTORIAL]


THIS POST IS FOR EDUCATIONAL PURPOSES ONLY.

This is a very awesome app and a great trick to hack someone’s gmail account – Gmail Hacker.!

This Gmail hacker is one of my favorite software to hack Gmail password. The only thing you have to do is to build your own Gmail Hacker and send this Gmail hacker to the victim. I’ve provided the link below for the download:

Gmail Hacker – Software to hack Gmail password :

1. First ensure that you have installed Microsoft .Net Framework. If not, then you can download it from here: Download .Net Framework

Wednesday, 8 June 2011

SQL Injection - Step By Step Tutorial


SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.

Step-by-Step tutorial for SQL Injection
Step 1:
Find a website that is vulnerable to the attack. This is the first step in SQLi and like every other hack attack is the most time consuming, and is the only time consuming step. Once you get through this, rest is a cake-walk. Now, let us all know what kind of pages are vulnerable to this attack. We are providing you with a few dorks (google strings to find vulnerable sites). Though at the end of this post, we'll provide a list of vulnerable sites.

Dorks:
"inurl:index.php?catid="
"inurl:news.php?catid="
"inurl:index.php?id="

How to use google for hacking

 1. Hacking Security Cameras
There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter

inurl:”viewerframe?mode=motion”

Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

2. Hacking Personal and Confidential Documents
Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.