BackTrack 5 Revolution

As BackTrack 5 development rolls on full steam ahead, we’ve been getting numerous questions about the future release. We thought we’d publish a blog post with general information about BT5 for the impatient

ETHICAL HACKING COURSE

DEF CON 18 was a resounding success! With more contests, events, attendance and talks, this year's show was a fitting end to our years at the Riviera! We'd like to thank the Riv for working with and hosting us for 5 .

Hackers Heroes of the Computer Revolution

A classic reissued for the first time in trade paperback with a new afterword from the author this is the story of the true pioneers of the computer revolution--the young mavericks and renegades who hacked their way into.

Windows 7 All In One 33 in 1 Fully Activated

Windows 7 is the easiest, fastest, and most engaging version of Windows yet. Better ways to find and manage files, like Jump Lists and improved taskbar previews, help you speed through everyday tasks. Faster .

Backtrack Hacking full DVD Tutorials

Backtrack Hacking Full DVD Tutorials And Bonus Hacking video Size: 6.32 GB Network Hacking,Wireless Hacking,Phone Phreaking and mach more.

Friday, July 22, 2011

Account Cracking Tools

[Image: PkTtR.png]


Cracking Tools
[Image: fWi4F.png]


ProxyLeechers
[Image: iMeTf.png]


Proxycheckers
[Image: am5Hi.png]


WordLeeching
[Image: zA23h.png]


Combo editor
[Image: 7ScRb.png]


OCX Registrator
[Image: qJAvl.png]


Cookies makers
[Image: 32ECB.png]


Eset Virus scan
[Image: ZhEXK.png]

DOWNLOAD

Thursday, July 21, 2011

DarkComet - RAT v3.0.1 -TUTORIAL



1) Create a account at No-IP

2) Login and do this:

[Image: se47497o.jpg]


3)
[Image: ev5z9cez.jpg]
If you dont know how to get your IP, click here.

4) Download DarkComet

5)

[Image: 36ef6x3p.jpg]

6) Press "Edit Server" & "Server Module" and then just do everything I do.

[Image: zu4z3ov7.jpg]

7)

[Image: yujjn7cq.jpg]

8)

[Image: 65cdqbtb.jpg]

9)

[Image: if6uflqj.jpg]

10)

[Image: tqokag8r.jpg]
Press +Listen and add the port you want to listen to, it must be the same port you have added on picture 8, if you dont know how to port forward, just use the search button up there ;)

Now you can start to spread your server, if you are not sure how to do it correct or you just want to know the best way, use the search button.

Mobius Forensic Toolkit v0.5.8


Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tool.


Changelag

  • The Hive (registry viewer) features three new reports:email accounts, TCP/IP interfaces, and computer descriptions.
  • All registry reports can be exported as CSV and the user password report can be exported in a format suitable for John the Ripper as well.
  • Minor improvements were made


Installation
As root, type:
python setup.py install



Usage
Run mobius_bin.py.

Cerberus 1.03.4 Beta Tutorial

[Image: cerberusw.png]


1) 
Download Cerberus 1.03.4 Beta. 

Also, for those who aren't aware of this, if you right-click on a slave's thumbnail in the online server list and click 'Capture Desktop', you can click in that screen and register mouse clicks on their computer. I'm ashamed to admit this, but I only just realized that. :O

2) Browse to the Cerberus folder, and run Cerberus.exe as shown.
[Image: image1a.png]

3) The client window will be displayed. This is the main window which would be displaying a list of connections and their info, had you actually any victims online. Of course at the moment, it is empty. But when you do have victims, you would right-click on their name/icon to bring up a pop-up menu which would provide you with the option to do all sorts of fun stuff.
[Image: image2rl.png]

4) Click on the Options button at the lower left corner of the window. This brings up Program Options. You can choose to leave the password as it is, or make a new one. 
[Image: image3wa.png]
You have the option to enter 3 ports to listen to. If you don't know how to port forward ports, go search for a tutorial on port forwarding. Once you have your desired ports properly forwarded, enter them (a maximum of 3) into these fields. As you can see, I left the first field default (5150) and then set the second to my preferred port (8245). No, this number doesn't have a whole lot of meaning. Just make sure it is forwarded. Now click Save, and click on Options again. If you just advance to the next radio button, your changes might not be saved.

5) Skip down to the last radio button. (NOTE: If you have the No-IP DUC running, you can skip this step.)

In the username box, enter the email address you used to sign up at http://www.no-ip.com. If you don't have an IP registered there, go search for a tutorial on making a no-ip address then come back here once you have your account. 
In the password box, enter the password you used at http://www.no-ip.com.
[Image: image4gw.png]
Click Update, Save, then Exit.

6) Click the New button at the lower left, near the Options button.
This is where you start the creation of your server that you want your victims to click on.

Click the Basic Options button.
[Image: mainu.png]
Where I have entered kaidz account.no-ip.biz, you would replace with your own no-ip address that you registered that http://www.no-ip.com.
Click the + button to add it to the Address Book. This is the address your server will try to connect to (destination: YOU). The password must be the same used in Step (E). Connection port must be a properly forwarded port, and one of the possible 3 ports that your Cerberus client will be listening to.

7) Click the Server Installation radio button.
Set your options as I have. They don't need to be exact, except for the fact that Install Server must be checked.

The directory installation isn't very important, nor are the exact names you choose, but I would suggest you choose any directory besides Temporary Directory.
[Image: image6d.png]

8) Select the Boot Methods radio button. This is where you will configure how your server is started whenever their PC is restarted.
Set your options as mine (you can change 'WindowsUpdate' to what ever you want) and click the + button after Active Setup a few times.
[Image: image7o.png]

9) This is where you bind a file of your choice to be run whenever your server is clicked on. If you aren't interested in binding a file to your server, skip this step.
[Image: image8r.png]
Click the...button after file to select a file to be bound inside your server.

In most circumstances, if the file is something the user actually wants, you would set Execution to Shell Execute (Normal). However, if you don't want any signs of this second added file being visible to the slave, set it to Shell Execute (Hidden). Setting the Destination to anything other than Temporary Directory is preferable. Make sure that a check-box is checked besides each file you want included in the server.

10) Here are some miscellaneous options. I would recommend checking Keylogger Active, so it is easier for you to steal passwords as your slave logs-in to websites.
[Image: image9p.png]
Check Inject into Default Browser or select Process if you want your server to attempt to hide itself inside a running instance of the user-defined process ( I typed explorer, but if I wanted to inject into the Windows Explorer process I'm pretty sure that I should have typed Explorer.exe instead), and if it fails, it then injects itself into the slave's default browser. Among other things, this aids in preventing your server from being removed by an Anti-Virus program. Nothing is certain though, of course.

The Mutex is any value which uniquely identifies this certain build of your server. If another server with the same Mutex attempts to start, it will cancel because the same server will already be running. You can set the Mutex to whatever you like, or leave it alone.

11) Under the Create Server page ( you can ignore Display Message, Blacklist, and Overview as they aren't really relevant to this tutorial ), pick a name for your server (which of course you can rename whenever), and select its icon. If the icon you want isn't in the Cerberus\Icons directory, then it won't be available for selection from the Icons List. To select a different icon, click on the icon image itself to load another. Of course, Use icon must be checked.
[Image: image10v.png]
Compact Server with UPX indicates that you want your server to be compressed (in other words, reduced in file size) by the UPX freeware executable compressor. Optional.

Under the File Extension drop down menu, you must select either Application (*.exe) or Screen Saver (*.scr) if you want your selected icon to be displayed.

When you are done, click Create Server. 

The following window will pop-up:
[Image: image11pu.png]
A description of what this means is beyond the scope of this tutorial (actually, I'm just too lazy to explain it) so you can go ahead and click No.

Another dialog will inform you that your server was created, and where it is located (usually in the Cerberus folder). You now have your server!
[Image: image13.png]
Now, it is time to test it. One way of doing this is to run it on a spare computer that has access to the internet; in my case, I was was away from home so I didn't have this luxury. I just run the server myself, and if all goes as expected, my Cerberus will play this beast growling sound, and show a little balloon over it's taskbar icon, indicating that you have obtained a connection to a new slave!

12) You are done. Well, not quite. You need to spread your server in a way that will get potential victims into running it, but that is an entire class of its own in art of computer hacking. There are whole tutorials on that subject.

Once you are done making your server, make sure that you minimize the main Cerberus window so that it is reduced to an icon on the taskbar. This way you can always be listening for connections when a slave runs your server, and you will be notified every so often of the number of currently connected servers in the following manner:
[Image: image14q.png]

That is it ! Hope you enjoyed and understood tutorial.

Wednesday, July 20, 2011

Blackshades NET -Complete Tutorial [Port Forward->Setup->Connect]


Blackshades is the best RAT available in the Internet till now and it seems to be like many have problems using it,so here is a walk through:
DOWNLOAD Blackshades NET

Unit 1: Port Forwarding
Unit 2: Setting up Blackshades NET
Unit 3: Connecting to your slave
Unit 4: Special Features


Unit 1: Port Forwarding
First we need to port forward to send and recieve connections through Blackshades NET so follow these steps to forward your ports
Step 1: Go to your router's settings page,Its usually 10.0.0.1 or 192.168.1.1 after trying this into
your address bar of your web browser you will be asked for login settings,login to your router by typing the username and password.After loging in you will see this page

[Image: pf1.png]

Note:
These might not be applicable to all routers.If you find any difficulties please visit http://www.portforward.com
Setp 2: Now go to Port Forward settings(usually under Advanced settings) and then
click "Add Custom Service" and then type any name for it and then select service type as Both or TCP/UDP and starting port as "port number number",ending port as "port number".And the server ip address as your LAN IP(You can find by typing ip config in CMD.Its the ipv4 you need to type). For Blackshades we use 2 ports so forward 2 ports.

[Image: pf2.png]
Thats it,you are done with Port Forwarding :)

Unit 2: Setting up Blackshades NET


Step 1: Open client.exe to launch Blackshades NET and then you are automatically logged in to 
Blackshades Client 


Setp 2: Now click "Create Server" tab and right click in "profiles pane" and select "Create new" and enter a profile name for it and click ok.
Step 3: Type your No-IP or DynDNS address into the "IP/DNS" area
Note:To create a No-IP address goto No-IP.com and register an account there and select "Add Host" and create one.

[Image: noipe.png]

Step 4: Type the Ports that you forwarded.First port as "Port",second port as "Transfer Port"

Step 5: Name anything as your "Server ID",its just to identify the slave.You dont want to disturb
the "Encryption Key"!


Step 6: Enter the "File name" for the server that would be created.You can use "Hide File" feature if you want a silent execution of the server file.

Step 7: Select the "Install path" for the server to get installed,either "Application data" or "Temp
directory"

Step 8: Select the "Install mode" for the server whether to Install,Melt,Protect Process.Note:
(Optional step)

Step 9: You can set the "Delay" time for the connection between your client and the server here.

Step 10: Enter "HKCU" as something which appears like a system name,eg:WinNT and Use "Startup"
feature if you want to server to run each time the computer is restarted.Note:(Optional step)


Step 11:Generate "ActiveX" if you had selected "Startup" feature.Note: (Optional Step)
Step 12:Generate "Mutex" for the server by clicking "Generate"
Step 13: Click "Infect USB" if you want to infect the slave's USB with your virus,select "Compress with UPX" if you want to compress your server size.Select "Change Icon" if you want to change the icon.Select "Clone File Information" if you want to clone some file's information.Note:(Optional step)

Step 14: Click "Save" to save your profile information.Note:(Optional step)
Step 15: Click "Build" to create your server
[Image: builddy.png]
Thats it the server is now built...
Unit 3: Connecting to your slave

Step 1: The server file that has been generated should be ran on the slave's PC.You need to send the file to the slave with the server being crypted and binded or else the slave will find out that its a Virus.
Note: Crypting and Binding is an Optional step.
Step 2: Go to "Settings" tab and enter the two forwarded ports.First Port as "Connection Port" and Second Port as "Transfer Port".

Step 3: Click "Activate" buttons for both "Connection Port" and "Transfer Port"

Step 4: After activating the 2 ports you can test them by clicking on "Test Port" adjacent to the
"Activate" buttons if the ports are forwarded correctly.
[Image: connectiond.png]


Step 5: After doing all,goto "Connections" tab to view and control all your slave computers.[Image: connected.png]Thats all ! You are now connected with your slave PCs...

Unit 4: Special Features
This is a small guide explaining the Special and unique Features of Blackshades NET.

1)Asynchronus Mode:
Asynchronus mode is used for very holding large number of bots.
This mode does not connect all the bots to your computer at the same time which might cause instability but keeps the bots at stake.That is you wont be connected to all the bots at the same time but you can connect to specific bots whenever you want to and at the other time you keep them at stake.

Step 1: Goto "Settings" tab and select "Asynchronous Mode" and then the bots will connect in Asynchronous mode.
Step 2: To control a specific slave just select any function that you want to perform just as you do
normally and then Blackshades will ask you if you want to establish connection between the slave and your PC,select Ok.
[Image: asyncmode.png]Note: The connection time may take a while when doing this.

2)Station: The station feature in Blackshades is similar to the normal Server but it reduces the quality of the server.The usage of the Station is only when if you want to connect to someone's PC securely.That is,the slave cannot traceback that it is you who has RATted the slave.


Step 1: Create a Station just like you did when creating a server but just use different No-IP or
DynDns address as your "Master IP/DNS".Its better to use different "Mutex","HKLM" if you use both "Sever" and "Station"



Step 2: Set "Master port" as 80 and "Master Transfer Port as "3389" and "Bot Port" as the Fist Port that you forwarded and "Bot Transfer Port" as the Second Port that you forwarded.

Step 3: Click "Build" to create the Station
3)On-Join Feature: The On-Join Feature will basically execute the command that you have set whenever a specific bot or all bots connect to your Client.
The tasks that could be performed are:
i)Dload.Exec - Download and Execute -This will download and execute a file on the slave PC
ii)Update - This will update the server/station on the slave PC by replacing your previous file.
iii)Keylog - This will start Keylogging the slave's PC
iv)Password - This will steal all the passwords from the slave's PC
v)Visit site - This will make the slave PC to visit a site.
vi)Spread - This will start spreading your virus to the slave's USB,IM,WinRAR,etc
vii)Notify - Sound - This will alert you with a sound when connected to the slave's PC


Step 1: Go to "On-join" tab and sort out for which bots you want to use the On-Join feature by
specifying the "ID","WAN","Country","Version".Or use * to execute the task in all bots

Step 2: Select the prefered task from the "Task" drop down list.
Step 3:Click Add to add the fuction.You can add many functions.
4)Web Interface: The web interface is used if you want to control your victims using a phone,OS including and other than Windows whic are connected by LAN in a web interface.


Step 1: Goto the folder where you have installed Blackshades NET and then /data/web and there open users.txt and there you can add/remove with admin and guest privileges.eg:admin:bsnet:password.Save the document
Step 2: Goto "Settings" tab and under "Web Interface" Pane type a port and click "Activate" to start using the Web Interface

Step 3: By clicking Permissions you can adjust the guest permissions on controlling the bot.

Step 4: So now its activated,now you just need any device which needs to be connected with your computer in a LAN network
Step 5: Once your device is connected through LAN,goto web browser and type the LAN IP address of your PC suffixed with a colon then your port number for this.Example: 10.0.0.1:80
Step 6: Once you do that you get a login screen where you can login with your details and control your bots.

5)Market: The Blackshades Market is a inbuilt market to buy and sell installs/victims/bots safely without the fear of being bot killed or scammed.
Step 1: Go to "Market" tab and if you want to buy bots click "Continue" in "Buyers" panel and then
click proceed.


Step 2: Enter the direct link to your virus in "URL/Link to your bot"
Step 3: Select the seller from whom you want to buy and click "Next" and proceed after reading the
terms and conditions.

Step 4: If you want to become a seller click "Continue" in "Sellers" panel and set your price per 100 bots and give your contact email id and choose your minimum payout.

Step 5: Click Enroll to become a seller.

Ok so after reading this tutorial you should be able to use Blackshades effectively.
Thnx for reading the Tutorial.

Related Posts Plugin for WordPress, Blogger...

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More

Enter your email address:

Delivered by FeedBurner