Tuesday, 25 December 2012

Cracking a password of Router with Hydra

        Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a shell or proxy so they can forward their traffic anonymously through you when committing other dirty deeds.
        If you keep your wireless router at the defaults, then hackers can control your firewalls, what ports are forwarded, and more.

         Now we're going to attack our routers. The default IP/URL to reach it at will be 192.168.1.1, so test that address in a browser to confirm it. If you get a dialog box, you've reached your router. This is running HTTP basic authentication.

1.cmd: xhydra


2.Enter 192.168.1.1 as your target.
3.Use http-get as the method.
4.Port 80.


5.Pick a word list saved on your computer.

6.Click start!

Game is over 
---------------------------------------------
login:admin
password:password
----------------------------------------------

Monday, 10 December 2012

Email hacking using metasploit (remotly)

video

demo of  Email hacking using metasploit (remotly) on www.youtube.com
--------------------------------------------------------------------------
https://www.youtube.com/watch?v=PsHVg_-LCrc
--------------------------------------------------------------------------

Rootkit with sourse code

           A rootkit is a stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer .The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware.
             Rootkit installation can be automated, or an attacker can install it once they've obtained root or Administrator access. Obtaining this access is a result of direct attack on a system (i.e. exploiting a known vulnerability, password (either by cracking, privilege escalation, or social engineering). Once installed it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.
Rootkit detection is difficult because a rootkit may be able to subvert the software that is intended to find it. Detection methods include using an alternative and trusted operating system, behavioral-based methods, signature scanning, difference scanning, and memory dump analysis. Removal can be complicated or practically impossible, especially in cases where the rootkit resides in the kernel; reinstallation of the operating system may be the only available solution to the problem. When dealing with firmware rootkits, removal may require hardware replacement, or specialized equipment.

Rootkits with source code 
-------------------------------
1.n00bkit
2.Agony
3.DarkFire
4.Turtle
5.Jynx-Kit-Pub
6.Rootkit-source 
-------------------------------

Communication between 2 hackers

Communication between 2 hackers using the 'invisible secret 4' software

1.Email communication between two hackers.
2.Data recovery after DOD standard data format used by PGP and others