this shows how hackers hack   remotly which is 90% undetectable
In this tutorial you will learn how to hack a computer any where in the world. Ok well not anywhere obviously things like the military and the goverment will have very high security so you definately wont be able 2 hack them using this method. I hope not aniways =.
A Major Notice If you are behind a router you will need to port forward your router. To do this you can use a DMS. Its hard to explain as every router has a different interface ( homepage that has a different layout ) so i suggest you go to google and search portforward.com. It will teach you how to port forward your router there.
Ok to begin with you will need these three tools
Daemon Crypt -
Pc Guard -
Yuri Rat -
Ok now that you have these three tools your 1st step will be to open up Yuri Rat and then click on server build
You should now have the following the screen
In this screen I want you to put your IP address into the DNS/IP section.
To get IP Address go to Start > Run > Type CMD and hit enter. When the black box appears type in IPCONFIG. You will then have your IP Address
Port: You Can Leave As Default (-7898-)
Assigned Name: Doesn’t effect how the server will work its just to keep you more organized so if you wanted to hack your friend “JOE” and specifically make this server for him then you may want to type something like “JOES TROJAN”.
Server Install Name: You should leave this as default as I myself don’t know what the difference is as every server you make is named server when it is 1st created anyway. Do not change it as it may make problems but I am not sure.
Ok as you can see there are more settings on the right hand side. I am going to recommend you settings for different purposes
To Hack A Friend For Fun: Uncheck Everything Unless You Want To Do Optional
(OPTIONAL) Melt Server - Your server will disappear into another folder
(OPTIONAL) Custom Icon if you want to make it more believable or something then get an icon of super Mario or something you get my drift
To Find Out Valuable Information: Check Everything
Ok Now You Are Finished Click Build
Your server will then be saved to your C: or Hard Drive which ever you know it as. Now we are going to make the server about 90% Undetectable. Only once has one of my servers been detected by an anti virus and I think it was a Norton not sure which version. Ive scanned more then once with Kasper Sky & Symantec Anti Virus and every time they said its clean so lets begin
Open Up Daemon Crypt
Select Your File by clicking browse and going to the folder your server is in. If you have not moved it, it will most likely be in C:
So Now You Have This
Click On Crypt and then you can close Daemon Tools
Now Install Your Pc Guard for Win32
When you open it you should get this
Ok you have to do basically the same thing as what you did with daemon tools. Click Browse and then find your server so that you have this
You then want to click on the General Settings and put these settings
Ok now you want to go to customization and make sure nothing is ticked
For the last step you want to click the protection methods tab and set it to plain. And then click on protect
Your server is now undetectable =)
Ok so now we have our server and everything is ready to go. Only thing now is to do some social engineering. Basically just lie to your friend/victim and tell them that it is a harmless file. If you do not know anything about your victim talk 2 him for like 3 days find out what he likes. Then lets say he likes football and naked women XD. say to him its a funny game where you play a 5minute 2D football match and if you win a sexc girl comes up on the screen and strips or something along them lines. Im not to good at social engineering. You could even say to your friend/victim that it is a patch for a game that you know that they have and it adds on extra things. The Server is now on there computer and they have double clicked it. If you checked the melt server option then the server will basically evaporate into their computer. They say hey its not working you say hey thats strange it works on my comp. Ahh fuck it i cant b bothered 2 send it again..
Ok so now you have the server running on there comp and it has opened up the default port for you to connect to.
Once again open Yuri Rat and click on listen. Yuri rat will then listen for your online servers that you have gave to people running on the default port 7898. If the person who you sent the rat to is not online you cant connect. When the server you sent out to your friend/victim a balloon notification will pop up. Note that yuri rat should still be listening for the servers. The server will show up in yuri rat. You right click and press connect. And there you go. you are now successfully connected to your victim
Ok now without uploading plug ins from yuri rat to your friends/victims computer you will only be able to do limited things with the program which are Download files from there comp & put files from your comp onto their comp.
When you are connected click on plug ins and them upload all of them.
You will then have access to keyloggers, screen capture and muc more. If you get stuck click on the help button and it wil tel you more aout plug ins
This tutorial tells you how to make a Trojan, Virus, Keylogger, or anything that would be found harmful, NOT. This tutorial explains how to make all files look %100 clean (become clean and be %100 UNDETECTABLE from ALL ANTIVIRUSES!!!!! ALL!!!!!)
Ready? GO!
First, get your trojan, virus or keylogger, or server or w/e you plan on using to become undetectable, and get it ready. Fix it up, create it, whatever.
My personal favorite
keylogger: Ardamax Keylogger
Remote Administration Tool (Must not have a router): Poisin Ivy
Google is your friend.
Now that you have your trojan, virus or keylogger or w/e harmful ready, its time to make it UNDETECED!
1. Download Software Passport (Armadillo) by Silicon Realms. This is THE best binder out there I know of, it makes everything %100 UNDETECTABLE BY ALL ANTIVIRUSES (including Norton, Kaspersky, Avast, etc)… The direct link to dl the program is here:
Code:
http://nct.digitalriver.com/fulfill/0161.001
There is a form to fill out information, so put in your real email address, and then you’ll recieve a download link in your email (it might be in Spam, Junk mail section so beware.)
2. Once you download the program, install it.
3. Once installed, you open it up and see this:
This is the program. Now that you have it open, you might be confused on what the hell to do, right? Well, this is what you do!
1. Download this pre-made settings. These settings are pre-made by me so you won’t be confused. Everything is working.
DOWNLOAD THIS FOR THE PRE-MADE SETTINGS:
Code:
http://rapidshare.com/files/236672890/projects.arm
DOWNLOAD THIS FOR THE BACKUP (You need this in the same location as the projects.arm file) YOU NEED THIS FILE ALSO!
Code:
http://rapidshare.com/files/236673031/projects.Stats
Now, when you download these files, and you put them in the SAME FOLDER (or same location), open Software Passport again and click Load Existing Project (top left).
Where it says “Files to Protect” (if theres stuff there, delete it):
Add the files you want to make %100 UNDETECTABLE!!
Now, once done, go to the bottom right and click “Build Project”. A bunch of windows will come up, just click Yes and OK.
Now, once its created, they are %100 undetectable. Go to
Code:
virustotal.com
to scan it with every Antivirus, and they wont find ANYTHING!
„It takes a long time to learn simplicity.“
Sniifing with Cain and Abel
What is Cain & Able ?
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. (taken from their website)
Download Link :- http://oxid.netsons.org/download/ca_setup.exe (sometimes the link doesn’t work)
Softpedia link :- > here <
This tutorial is meant for sniffing only there are a lot other things you can do with cain as mentioned above
How to sniff with CAIN
Step 1:- Install Cain and Launch it
Step 2:- Click on Sniffer tab
Step 3:- Activate the sniffer by clicking 2nd icon (seems like micro chip — tooltip says Start/Stop Sniffer) from the left on top bar
Step 4:- Click on blue coloured Plus icon to scan for MAC address on LAN or simply right click ->scan MAC address
Step 5:- Click OK on the next window that comes -> CAIN is told to scan all the host in our subnet
Step 6:- Click on APR tab at the bottom
Step 7: Now Click on the Plus sign again at the top to add Computers to sniff on . A windows will pop up . In that windows . Select the router/gateway of your lan on the left side and the computer you want to sniff on the right side. Mostly the gateway is the one with ending octet 1 eg. 10.10.10.1 or 10.129.71.1 as in my case. Ususally last no. is 1
Step 8:- Now you’ll see the computers are added to the list. Click on 3rd icon from the left on the top which is like has a biohazard sign . You’ll see something like this
Step 9:- Step back and relax and let cain do its work you’ll see passwords rolling in passwords tab.(click it to enter password)
well its 3 in the morning and i don’t think anyone else is online besides me so this picture does’t show you any passwords
Suggestions and Feedbacks are appreciated
A step-by-step guide to successfully creating a deployment package, sending it, and receiving information using Ardamax Keylogger. Now, in this guide, I only use one method of recieving information, and that’s an FTP. I also do not protect the files. Any suggestions and comments are appreciated. Let’s begin.
Head on over to:
CODE
http://www.ardamax.com/keylogger/
And scroll to the bottom. Download the free trial.
After downloading, open the program and install it. Simple enough, right? After installing, go to wherever you installed it at, and open it. It should open at the bottom right corner of your screen, down by the time. If not, press ctrl+shift+alt+h. Now, leave that alone.
Next, go to:
CODE
http://www.theserials.com/serial/serial_ardamax.html
Download the appropriate serial.
Now, open it, and it should give you a name and a jumble of letters and numbers.
A step-by-step guide to successfully creating a deployment package, sending it, and receiving information using Ardamax Keylogger. Now, in this guide, I only use one method of recieving information, and that’s an FTP. I also do not protect the files. Any suggestions and comments are appreciated. Let’s begin.
Head on over to:
CODE
http://www.ardamax.com/keylogger/
And scroll to the bottom. Download the free trial.
After downloading, open the program and install it. Simple enough, right? After installing, go to wherever you installed it at, and open it. It should open at the bottom right corner of your screen, down by the time. If not, press ctrl+shift+alt+h. Now, leave that alone.
Next, go to:
CODE
http://www.theserials.com/serial/serial_ardamax.html
Download the appropriate serial.
Now, open it, and it should give you a name and a jumble of letters and numbers.
A step-by-step guide to successfully creating a deployment package, sending it, and receiving information using Ardamax Keylogger. Now, in this guide, I only use one method of recieving information, and that’s an FTP. I also do not protect the files. Any suggestions and comments are appreciated. Let’s begin.
Head on over to:
CODE
http://www.ardamax.com/keylogger/
And scroll to the bottom. Download the free trial.
After downloading, open the program and install it. Simple enough, right? After installing, go to wherever you installed it at, and open it. It should open at the bottom right corner of your screen, down by the time. If not, press ctrl+shift+alt+h. Now, leave that alone.
Next, go to:
CODE
http://www.theserials.com/serial/serial_ardamax.html
Download the appropriate serial.
Now, open it, and it should give you a name and a jumble of letters and numbers.
Go back to the Ardamax icon at the bottom right, and right-click it.
Click the “Enter Registration Key” button.
Use your serial/crack to unlock the full version. Congratulations, you are now ready to make your first deployment package.
~NOTE~
If you want to attach the keylogger to an existing file, go ahead and place that on your desktop.
~NOTE~
Again, right click the icon at the bottom-right.
Click “Remote Installation”.
Click next.
Now, if you want to attach your keylogger to an existing file, tick the box that says “Append keylogger engine to..” etc etc.
If you tick it, click Browse, and select the file.
If not, continue down. The installation folder on target computer needs to remain Windows System Folder for added security, so leave it be.
Add any additional components you would like. I just leave mine as “log viewer” since all I grab are passwords from games.
From this point, click next.
Now, this part is self explanatory. I tick all of the boxes, as to hide it from everything visible, otherwise they can just see it and be like “Wtf”, uninstall, etc.
Can’t have that, now can we?
Click next.
For Security, do what you want. I leave all of it as-is and click next again.
Now, untick the “Check for updates” box, else it will check for updates on their computer and they will know that they are bugged.
Click next.
Tick the “Start in hidden mode” box, and leave the “Run on windows startup” as-is.
You may pick a date to self destruct, if you like. Sounds noisy, right? It simply removes itself on selected date. If not, leave it alone, and it will never self destruct.
Click next.
Tick the “Send logs every..” box, and choose how frequently you would like to recieve information that has been sent.
Select ‘FTP’ and de-select everything else as a delivery method.
You may choose what you want to see. I take out screenshots. Causes lag for me.
Leave log format alone.
You may choose to send logs if it exceeds a certain size, or if you want it to send no matter what, untick the box, which is what I do.
Continue on! (next.)
Now the fun part. -_-.
Head on over to:
CODE
http://phpnet.us/
Make an account, etc etc.
Save your FTP Account name and password. You’ll need it in a moment.
This site will be the site that holds all information recieved by the keylogger.
When you’re done, scroll down a bit.
Under “FTP Accounts”, click “File Manager”.
Near the top, click the “New Dir” button, and create a directory by any name you want. My favorite is “lolbeans”.
Now, hold that thought. Bring the keylogger back.
In Ftp Host, put in:
ftp.phpnet.us
In “Remote Folder”, put in the new directory’s name you made. So, in this scenario, “lolbeans” without the “’s.
Fill in your Username and Password.
I leave Passive Mode checked because I’m not sure what it does, rofl. :[
Leave port alone as well. It’s default.
Now to make sure everything is correctly done, click test. It should tell you it all went through. And to double check, you can refresh your open window. Click your “lolbeans” directory and there should be a test file in it.
Click next, if you’re still alive.
Tick anything and everything you want.
Next.
If you selected screenshots to be enabled, pick how you want them delivered. Click next. If not, ignore this step.
Browse where you want the keylogger to be placed. You can also change the icon, which is nifty. If you’re apologizing to a bitch ex girlfriend/boyfriend of yours, you can change the icon to a notepad and name it “Apology”, and they fall for it.
Next.
This screen will go over with you everything that you have chosen. Make sure it’s all correct.
Click Finish.
Now, if you appended the keylogger to something, you’re going to need to put the “install” (feel free to rename it so it’s not so obvious) and appended file into a .zip or .rar file.
If not, you have the simple “Install” on your desktop. Also, feel free to rename it to something like “Apology” or “OMFGFunnypicture!!!.jpg”
Upload the file or .rar/.zip somewhere, and let your target download it. They will double click it, and on their end, nothing will happen, but secretly, they have been keylogged.
Check your FTP Directory that you made as frequently as you told it to send logs, and you’ll have everything you need.
Feel free to test it out on yourself.
The powerful chip at the heart of Sony’s PlayStation gaming console has been used to crack passwords faster than ever before.
Security researcher Nick Breese used a PS3 to crack supposedly strong eight-character passwords in hours.
Typically, previous attempts to crack such passwords took days to get the same result.
Eight-character passwords are used to protect PDF and Zip files as well as those produced by Microsoft Office.
The work to turn the PS3 into a password cracker was carried out by Nick Breese, who works for Auckland-based Security Assessment.
The Cell processor at the heart of the PS3 is the key to speeding up the time it takes to crack a password.
In a presentation given at the Kiwicon security conference in mid-November, Mr Breese said a powerful Intel chip could crank through 10-15 million cycles per second.
The architecture of the Cell processor meant it could speed through 1.4 billion cycles per second. This speed boost was possible because each Cell chip had several processing cores - each one of which could be effectively trying passwords at the same time.
This was important when attempting “brute force” attacks that go through all possible combinations for a password.
Speaking to the Sydney Morning Herald, Mr Breese said although the PS3 could be used to crack eight-character passwords featuring letters and numbers, stronger encryption systems - such as those used to safeguard web transactions - remained safe.
Mr Breese’s research comes soon after work by Russian company Elcomsoft to use graphics cards to speed up password cracking.
I’m board so im going to post some this up ..
ok 1st of your going to need website hosting to do this, if you all ready have some then your set if not try looking at
www.0php.com
http://www.free-webhosts.com/free-php-webhosting.php
you can find free hosting there ok now..
open up a new notepad call it ” iplogs.txt “
Upload it where eva you want this i.p logger on your server now change the permissions of that txt file to 777 so that the php script can read, write, execute the txt file
ok then now it is time for the coding part
save it as anythink you want.php
ok 1st off i would like to say the 2nd last line can be edit for example :
PRINT(”Your Ip was logged how im going to hack you
“);
or what eva you want to write but the that show there i.p address on the page Smiley
ok upload it to the same spot as the iplogs.txt file and bamm your ready to go
type in the url of the .php and it will log this info to the text file
how change the permissions of that txt file to 777 “
Use an FTP program such as FileZilla, you can right click on the file and you can the permissions
is some common hacking techniques used by some hacker out there..
This is for educational purpose only, this hack works with unpatched version of Windows 2000/NT/XP. (only works if the shared drive that has no password set by administrator)
Step 1:
-Get a IP (range) scanner.
-Scan the victim’s ip on TCP/IP port 1XX (i put some XX in the port number so as di cya magaya for actual testing)
Most port scanners (nmap being the most prominent example) correctly
report ports as either open, closed or filtered.
“Mahirap” o hard to find some open port open these days because of firewall (sa patched windows)enable that will either “filtered or closed” ang port if u used ip scanner..
What is filtered or closed port?
Use an analogy of the cops coming to your place and looking for you. Having a filtered port is like them knocking on the door, and you saying “I’m not here”. Having a closed port is like them knocking on the door, and no one answering. With a filtered port, you know there is an active system behind that port.
As far as from a security standpoint, to most hackers, when they see closed they don’t think of a firewall, they think the service is just not running. When I see filtered, and its a port I want to get to, I instantly think, oh, ok, is there some backdoor I can punch thru the firewall? Can I DOS the firewall? Can I remotely administer the firewall?
Step 1.1
-Open a dos prompt
-Do this by going to start/run
-Type cmd
When you are already in DOS command prompt type
-NMAP -v -p 159 77.106.2.1-110 (example target ip range)
-when you got an open port proceed to step 2
Step 2
This is what you need to type down:
Replace 255.255.255.255 with the victims IP address.
c:windows>nbtstat -a 255.255.255.255
If you see this your in:
Step 3
type down:
c:windows>net view \255.255.255. 255
Step 4
type down:
c:windows>net use x: \255.255.255. 255SYSVOL
(you can replace x: by anything letter you want but not your own drive
letters.)
Note:SYSVOL is the name of the shared harddrive.
If the command is successful we will get the confirmation.
The command was completed successfullly.
Bingo your inside the system now..
You can now execute any dos command e.g. x:dir
(you will experience a lag in the system since it is a remote computer)
Now open windows explorer or just double click on the My Computer icon
on your desktop and you will see a new network drive X:> . Now your are a
hacker.
This tutorial is warning for those who have old os like unpatched XP,NT,2000..always protect ur system..upgrade ur o system.. ..protect ur port specially port 139..Remember Hacking other`s comp is stealing..