HACKING
RSS

Hide your Virus in a Picture File [New Method]

Items Needed:
Any Icon Changer
A Binder
A Brain


1) Create your virus. We shall call it 'server1.exe' for now.
Icon:

2) Get any picture file you want to distribute.

3) Bind the 'server1.exe' and your picture file with any binder, we'll call the binded file 'virus1.exe'.
Icon:

3.5) I reccomend Easy Binder 2.0, which comes with a bytes adder and a icon extractor, aswell as some really good packing options. I've uploaded it, virus free, to:Press here for free download< This will be caught by your AV as "Binder/Kit". It is not a virus, it is a binder than is not undectable. If you don't wish to use it, that's fine, find your own.


4) Be sure you have 'Hide common extensions' unchecked in your Folder Options.
Icon:

5) Change the 'virus1.exe' to '%Picturename%.jpeg - %Email/Web Address%.com'. For example, we'll call it 'HPIC_119.jpeg - test@test.com'.
Icon:
.com works the same as .exe, except fewer people actually know that's what it really is.

6) If you plan on distributing your virus via MSN, please skip to 7. If you plan on distributing your virus via file upload sites, please skip to 8.

6.5) I reccomend Icon Extractor V3.8 FULL with Serial, that can be downloaded from HERE

Serials:
Name: Johny Khan
CODE:
HP4ANyamVnhPkJUTTsOx2CdPhAyLTMSZiXxkNERW
KAwkZC+a6+sTipI7MMPyhJam0jdUttMT4Ebo9USN
o9IcmHB9FGrgYIeDPhW7WujYCM1s/bpe7hzoE5tj
RKphe5N1gew6I1BDJ37EMijaO+x0ROUw/YUbXOjv
V1ZeSKDFqlo=

Icon:


7) You will now need to change the icon from that ugly box. Find the picture you added to the file, and make it an icon. How? Find one of the various online Picture to Icon converters. Once your picture is a .ico, use your Icon Changer program to change the icon of the file to the .ico you just made from the picture. When you send it to people on MSN, it will show a small box of the picture inside.

Icon:

8) You will not need to change the icon from that ugly box. Using your Icon Changer program, find the .jpeg icon, and change the ugly box to the .jpeg icon.
Icon:


9) Conclusion. Your file will now look like a legit picture to 9/10 people. Some people do know that .com is an extension, but the average computer user will not see any difference, and will download it without hesitation.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to Hack E-Mail Account Password - Email Hacking Software



Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.

How to Hack Email Account Passwords Using ProRat?

1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "*****". IF YOU NEED PASSWORD , CONTACT
"arulethicalhacker@gmail.com"

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.


As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

Do you have questions, comments, or suggestions? Feel free to post a comment!

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Password Cracking



In this post I’ll show you real process behind cracking password. This will be introduction to the couple method of password cracking : guessing , brute force attack and dictionary attack .
Here I will cracking something simple and legal , it’s PDF file. If you have PDF and you forget the password
it’s legal to use password cracking software to retrieved.

1) Guessing

It’s the easiest way to gain access . Here are few guessing tips:
Try common passwords , go to the link whatsmypass.com

So first try numeric counting up to the number 9 . You can try any of combination from passwords on that page , you’ll be suprised how often that actually work.
Name combination (ex. markhunt,mhunt,etc)
Personal likes(ex. bands,songs,sports,movie charactes, etc.)
Combine these tips (ex. jazzjoe,eojzza)
Try adding numbers at the end , such as the number 1 or an important year.

If the person that created password is not technically then after trying this few tips , your probably guess his password. But if that not work you’ll need to move to something more advance.
This advance usually use specific cracking software .

Password Cracking Using Software

In this case I’ll use pdf cracking software . Download windows free pdf unlocker from this link appnimi.com



PDF unlocker envols two password cracking method called brute force and dictionary attack .
First select PDF that you want to crack and select the destination for the cracked version of it.
You’ll see two option for minimal and maximal length of password.


Dictionary Attack
Very common password cracking attack
Will find the password if it is an actual word
Scans through a word file until it finds the correct password
With this program you can create and use own dictionary list , but if you browse through installation
directory you’ll see one has been already install with this program.


If this attack fail the you should use brute force attack .


Brute Force Attack
Uses a list of all possible characters

Systematically cycles through all the characters unitil the password is found
This program offer sufix and prefix fields in case you know how the password begins and ends

Hopefully this post not only taught you the science of password cracking , but also how to make yours more secure

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Computer Pranks | Fake Facebook Virus



In this tutorial I will show you how to make a Facebook virus using simple commands on notepad. .This willmake the victim think they have got a virus when they click on an icon such as Internet Explorer .


1) Open notepad

2) Type this in :

@echo off
msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!

PAUSE
shutdown -r -t 300 -c " SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED !!! PLEASE WAIT ..........."



3)Save as Internet Explorer .bat


4)Right click on Internet Explorer .bat and click Create Shortcut


5)Right click on shorcut and click Properties.


6)Click Change Icon


7) Choose Internet Explorer icon or similar , click OK , then click Apply


8)Delete real shortcut and replace it with fake . When victim click on it , he will get warning messages that looks like this:





After five minutes windows will restart , that is all. This is totally harmless and will give you a laugh. Enjoy !

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Home HTTP Server – How to create one



In this tutorial we will see how to create an HTTP server. A web server is software installed on a computer that allows other computers to access specific files on that computer/server. There are many reasons to create your own home servers. For example: file sharing, so you can download files from your home computer from anywhere or you can create a web site on own server etc. Simply said It works like this; You choose a directory on your computer , in that directory add folders, files like music,video and etc. When you put the IP address of your computer the in web browser you can see all the files from that folder and you candownload those files. Let’s now create a server(HTTP server!) using Apache(a server client):





1. You must have:
Broadband internet connection always on
Windows on your computer

2. Create a folder on your disc , in this example I created a folder on E:\my server
3. Download apache_2.2.10-win32-x86-no_ssl.msi and install it, set parameters( for localhost type something like a myserver.com(doesn’t really matter), also type your email address in field “Administrator@ Email Address” ) as shown below, choose where you want to install it.



Enter email address where you want to receive tutorials when we post them! It’s free!







4..When you install Apache , go to directory where you installed it (p.e. “C:\Program Files\Apache Software Foundation\Apache2.2\conf”) , here you will find a httpd file.
Open that file with notepad.





After this will appear notepad with long and complicated code, don´t worry, you must change just 3 things.

5. In notepad file find #DocumentRoot “C:/Program Files/Apache Group/Apache2/htdocs” and replace with#DocumentRoot “E:\my server”. Also find #<Directory “C:/Program Files/Apache Group/Apache2/htdocs” and replace with <Directory “E:\my server”. E:\my server is folder where you put files which will appear on your server. In this example I created that folder on local disc E:. You can create your folder in any other place, but then type that path here. Find #AllowOverride None and change to AllowOverride All.









After this, save file like httpd.conf.



6. Type in web addresses http://localhost/ or your IP Address, you should see something like this





Every files you put in folder , which we created in step 2 , will be shown on http://localhost/

7. If you want access own server from other computers. You must forward a port in the router we’re using. The port we need to forward is port number 80. Why? Because by default it’s the port used for HTTP. Port forwarding actually means opening a tunnel through the router so that the router wouldn’t reject the connections that are trying to connect to it. How to port-forward? With every router it’s different. Here are theinstructions for every one of them. You must also turn off you firewall.

That is all. Enjoy your home server. If you have questions, post them in the comments area.

Note: Creating home server is risky,when you open port, there is a possibility to have someone a breach in your computer .Before you start, make sure your computer has all the latest patches and security updates, and that you’ve done a thorough spyware and virus scan. This tutorial is only for advanced users

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Transform your Windows XP in to Windows 7

If you are using Windows XP and want to experience Windows 7 without installing then here is Seven Remix XP transformation pack to transform Windows XP to Windows 7.With this simple app you can make your XP look like Windows 7 in just few clicks. It supports Windows XP, Windows 2003, Windows Media Center Edition and some other flavors of XP. Will work with only 32 bit edition of Windows.
Just download it and install .
Download Seven Remix XP and transform your windows xp .

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

On Screen Keyboard







On screen keyboard is one of the coolest windows features that displays a virtual keyboard on the computer screen that allows people with mobility impairments to type data by using a pointing device or joystick..


To use it go to start-> run and type osk



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Use Keyboard As Mouse



When mouse isn’t working properly , this trick can be very helpful. To activate mouse keys all you do is press Alt+Left shift key + NumLock and click OK or press enter .





Use the Numerical pad for controlling the mouse pointer.
5 is for click.
+ is for double click
- for right click.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

HACK YOUR FRIENDS INTERNET PASSWORD


Learn How To Hack
This is Really Amazing. I was moving through my Browser's settings and found the file where all the passwords are stored. I was really shocked that it allowed me to have a look at all the Username and Password which I had asked my computer to remember which also included my Internet Username and Password. But this is only possible in Mozila Firefox.

To Hack your friends Password you only need even less than a minute and you can have a quick look at your friends Usernames and Passwords.

Just follow the following steps:
  1. Open Mozila Firefox
  2. Goto Tools -> Options
  3. In that goto Privacy -> Passwords.
  4. There you will find View Saved Passwords Button Click on it.
  5. It will show you a list of websites with the usernames. To get the Passwords Click on Show Passwords Button.
  6. Now To get the Internet Password Just see for any IP address in the website column this is the Ip address of that computer and Username and Pass is what you want.
  7. You can get pass of any account just look for the site name whose password you want to hack and on the right side you will get the Username and Password

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Project - Trojan in Java



1.0 TroJava
Well folks given that some are secured to Java (I see very few post and there are tutorials), and I think it's because many think that this language is for enterprise-level software y7o very seriously ... Well in this project want to show that we can create our RAT, Virus and other "malwaritos" so as we do with VB or C / C ++...
Java is a programming language object-oriented high level so it will be very easy to program in it, plus is so multi-platform "virus for all" xD ...
Well first things first, and ask what we do and the order in which we will do:
1. Planning of what we do.
1.1 Platform (SO)
1.2 Type of execution
1.3 Software to use
2. Execution of the planning
2.1 Creating a shell
2.2 Creating and understanding the Sockets
Mini 2.3 Java chat
3. Creation of TroJava
3.1 "Configure" our chat
3.2 Create the inverse
3.3 Connect the mini-projects
3.4 Applying fixes
4. Creating Interfaces
4.1 APPLICABILITY visual themes
5. Share to the Community
Buan as we planned what we will carry out the project now include all (including me) are just "starting" with java, and I mean that we will explain everything step by step, no one understands things up which made them, so thank we use something called Comments in Java and any derivative of C / C + + are done with / / or / * * / (for comments mucahas lines) ...
All clear?, Which as we start:
1. Planning
1.1 Platform (OS): Well folks this election is very simple, we said that java is multiplatform but equally some commands code changes depending on the OS, so we choose an OS (Which is going to attack), bone where it will run the trojan xD and logical choice, we will run on Window $ OS (initially), and the client on the other hand if you are going multiplatform or able to manipulate the machine from any OS (that has java installed obviously) ...From here we will use the following names, Core and Runner, that I may better understand the core of the Trojan will be the "evil" for calling him somehow, and the Runner who will send orders to the Core, I do not Client and Server call to avoid confusion, since the beginning will make a direct connection but end up with connection insurance Invesa and get confused ... but later understand why not to worry ...
1.2 Type of execution: The first type will ejcucion console mode, it will be very nice xD besides that also learn a bit of it, which teaches us this method of july and I'm sure Trojan "Dominate the world! JAJAJAAJAJ ¬ ¬ "xD ... naaa but if you learn a lot ...
1.3 Software used: Well here if each person's choice, at the risk of being told "easy" or any other denomination I personally use Netbeans 7.0.1, pc can use who want ... I recommend this and / or the eclipse are the best IDE I've seen although many also say that JCreator is very good I have not tried.
Good to leave here for now, I will prepare some things for later and then expect to see enthusiasm from all the "Javer" xD, for this proyevto, I can say in advance that can be read on the following Guides Greetings ...

http://zarza.usal.es/ ~ fgarcia/doc/tuto2/V_2.htm




http://www.dlsi.ua.es/asignaturas/sid/JSockets.pdf

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

[Tutorial] How to Make a Network Cable

[These images are resizable . Click on the image to view large size]



As some know I am currently studying Civil Engineering with specialization in Telecommunications Electronics, as an essential part of telecommunications,networks are.

In a practical laboratory, we showed and we were asked us to make a network cable, which gave us all the tools to create one and then test its operation.

Well, today I bring the realization of such a laboratory so that everyone knows how itmakes cable network from scratch.


What We Need?
UTP Cable (Cable In this lab we will use Category 5e)
Two RJ45 connectors
Crimp Tool (especially for the creation of network cables or telephone cables)
pliers}
Ethernet Tester (Optional)
How We Do It?



We begin by collecting some of the implements.

In this case you can see 1 meter Cat 5e UTP cable, the 2 RJ45 connectors, theCrimp (which looks like a pair of pliers) and the network cable tester.





In this case, used Crimp brings a knife to strip the cable to the normed distance of 1.7 cm. by Ethernet cable standards outlined by the ITU and the IEEE.


Here you look at the internal cables which will help us create our connection.





Here we see two types of provisions for internal cables which are neatly inside theRJ45 connector.

We have two rules for cable connectors. T568A and T568B.

Now there are two types of connections. The parallel connection is used to make connections between PC-switch, PC-HUB, etc..

The crossover is used to make PC-PC connections, Switch-Switch, HUB, HUB, etc.

Parallel connection is made using the T568A wiring diagram in the originalconnector and the connector end T568A or T568B on the original connector and the connector end T568B.





Cross connection is made using the T568A wiring diagram in the initial and T568Bconnector on the end connector, or vice versa.





Now something very important is the distribution of pins on the RJ45 connector. In thediagram above shows the distribution of them.





Now with a lot of calm, ordered the cables and put them into the RJ45 connector.





Put the connector, with the care that the cable does not get out of it, in the space provided for it in the Crimp.





And tight. This will make the pin fall so they touch the wire and create a connectionbetween the wire rope and pin RJ45 connector.

Repeat the process for the terminal connector depending on the configuration required.





Finally, if we have a cable tester, plug it in and do the testing.







We see the green light and the message "PASS" for our connection has beensuccessful and therefore the cable is ready for use.

This we have done our cable network ready to be used for the purpose they want.

Well with that I say goodbye, I hope you liked it.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS