Friday, 14 November 2014

Hack Remote Computers using EXTREME RAT

Hack Remote Computers using EXTREME RAT FULL  Method


What is RAT?

RAT is commonly known as REMOTE ADMINISTRATION TOOL. We can control a remote pc right from our computer using these RATs.

In one of my previous articles, i have explained about  team viewer which can be treated as legal. In this article i am going to show you how you can hack remote computers using RATs that are commonly known as illegal ones.


Things you require

1) EXTREME RAT

This is the RAT you are going to use. You can get it from HERE

2) No-ip.biz  account

As our IP-Address is dynamic(in general), we need to make it static.

3) DUC client

We can automatically update our dynamic IP-Adress, by installing DUC client.

4) VPN (If you are behind a router)

We must enable our router to allow us to connect to a remote PC. So we need to port forward.
Instead of port forwarding we use a VPN(Virtual Private Network).
You can use Proxpn.

Procedure:

Step 1:


First you need to create an account in www.no-ip.com

Step 2:

After creating an account, login with your account and create a host. You can do this by just following the steps.

Goto this link, and login. Then follow the steps as shown in the picture.


Finally click “Create Host”.


Step 3: Setting up your server.

Open the xtreme.exe file you have downloaded.



By default, the language is Portuguese. So you can change it into English as shown in the figure below.




Now goto FIile->create server. It is shown in the figure below.




When you are done, it opens a new window and then select the “+” symbol as shown in the following figure.


Then it opens a new window and you can give any name you want as your profile name.
 
In my case it is “profile1”.


After this, you need to give your no-ip domain name by selecting the option “add dns”. This can be done by clicking the ”+”  symbol next to your profile name.
Fill this as “yourhost.no-ip.biz:81


Now click on “install options” and uncheck the two options as shown in the figure and then click on “create server” option which is the last one in the figure. You can follow these steps from the following figure.


Then simply click the tick mark which is green in color and save your server file. You are done.
 
Now  upload this server file on any file hosting site and prompt  your victim to download it. Or  you can send it via email. When he clicks it, your client will connect to his system as shown below. 


Now you will access all his files right from your computer. I have added a screen shot of how it looks like.


Legal disclaimer: 

Using RATs on remote systems without their permission is illegal. This article is for educational purpose only. Dont do anything illegal. I will not be held responsible for that.





Thursday, 13 November 2014

Hacking Friends PC Using Neptune

Hacking Friends PC Using Neptune Full Method


Key logger are the set of codes which can be used to record the keystrokes of Victim's PC by directly stealing the input from Kernel. In this tutorial we will show you how to make an Keylogger file using a revolutionary software PROJECT NEPTUNE V1.78 keylogger which is available as both freeware & shareware.(Before starting this procedure disable your antivirus  for best results)





 Software required:

*Neptune keylogger(Download link)

Step 1:Download this keylogger from the Download link above.

Step 2: open Project Neptune v1.78 from the downloaded files.


 Step 3: In email settings enter your email id in “ENTER EMAIL TO SEND KEYSTROKE LOGS”(this id should be your fake id since generally email service providers recognize them as spam and delete them in 7 days)

Step 4: Provide your password in “SENDING EMAIL ACCOUNTS PASSWORD”

Step 5: provide your same email ID or different ID where you want to receive (ex:science404error@gmail.com)



Also if you have known about FTP and have a FTP account you can use that too.

Step 6 (optional): If you want to disable mouse clicking /Internet explorer/Registry commands/Run dialog box/Task manger you can do that through going to “SYSTEM WIDE “ tab and checking the necessary check boxes. You can also prevent user from accessing specific websites (ex :any online scanners)



Step 7: In Installation tab you can specify the directory where your key logger is going to RUN on your friends PC .It is best to select “system Files Folder-C:\windows\system32”


Step 8(optional): Using “EXTRA OPTIONS” tab you can display an fake error messages like “Disable Antivirus for best performance”. Also using this tab we can destroy our own key logger files after certain period of time.


During execution the error message will be displayed as


Step 9: The most important step in this process is server creation which needs bit logic .Go to “Server creation”  tab on server settings type the required description, Company, Copyright for ex

*Description: windows security alert
*Company: Microsoft
*Copyright: Microsoft Corporation

You can provide anything but it must be doubtless in regarding because these details will be displayed at task manager during execution

Step 10: Next on “server generation” provide any name to your key logger file (ex:iexplorer.exe) on “SET SERVER NAME’S PROCESS AS”



Step 11: Click on “GENERATE NEW SERVER” and save it to desired location.whoa ! you created an keylogger now send that file to victim.


NOTE: these .exe files are easily detectable and cannot be send by gmail, for this purpose try to compile it with any of other games or word documents and send it to your victim.
If you have any clarifications comment on these post and we will try to solve it at best






Tuesday, 11 November 2014

Hacking Website Using Havij Sql

Hacking Website Using Havij Sql





Now Lets start---->                        
Things you will need -->

 1. Havij SQL injection Tool, download it from

2. A sql vunerable site, I am taking this site 
http://toyonorte.com.co/catalogo_nuevos_...e.php?id=2 as an example.


Checking for sql vulnerability --->

Here i am taking http://toyonorte.com.co/catalogo_nuevos_detalle.php?id=2 as an example. 


Now to check is this site vulnerable to sql, I will simply add ' after the site url

like this http://toyonorte.com.co/catalogo_nuevos_detalle.php?id=2'

and i get this error on the site

You have an error in 
your SQL syntax; check the manual that corresponds to your MySQL server 
version for the right syntax to use near '\'' at line 1 

It means that site is vulnerable to sql injection.
Exploiting the vulnerable site ---> 

1. Open Havij and paste site url in target field and hit enter
2. Now wait for Havij to get all the databases of the website.

3. Now click on available databse of site and click on Get Tables like i am gonna select 535480_toyonorte of my site like in image.


4. By clicking Get Tables Havij will look after the tables available in the database.
5. Now after the 
scanning Havij will get all tables, now the main work start , you have 
to check it there table available named as admin, users and something 
similar to these words like i get usuario in my website and select it and click on Get Columns. Like in pic given below.



6. Now after clicking Get Columns havij will get all the columns available in users table.
7. In my case i found diffrent columns like id, login, pass an many more.
8. Now select the columns and click on Get Data like in pic given below.


9. Now havij will look after the data available in columns login and password i.e admin username and passowrd like i get 

username --> admin password--> 21232f297a57a5a743894a0e4a801fc3 (in encrypted form)

Like in image below


10. Now after i get 
username and password there is a problem that passowrd i s encrypted in 
mdm language , so we have to crack it .

11. To crack encrypted password just copy password click on MD5 tab in havij and paste the encrypted password in MD5 hash field and hit start.Now havij will try to crack the password. Like i cracked in image given below.


12. Now i get Password cracked as admin.

13. Now we will check for admin panel where we gonna login with username and passoword.



The Tutorial is Maked by Umair Abubakkar - Software Market DGK

In my case i found http://toyonorte.com.co/admin/ as admin panel, now open it in a web browser and login with username and password and now you are in admin panel.

Notes--->
1. Website hacking is illegal
2. Use proxy, tor, VPN for your security.







Amazing Ubuntu Styled Sidebar Dock

Amazing Ubuntu Styled Sidebar Dock

If you are a hardcore fan of Ubuntu then you must have known that a new responsive Ubuntu OS has been designed for mobile phones and is being released soon.The best feature of the Ubuntu OS is that it has a sidebar panel or dock which allows multitasking further easier.A good news is that the Android users can now add a customized Ubuntu styled sidebar dock in their mobile phones."Glove Box" is the application that will replicate the design of the dock which was developed by a member of XDA Developer. 


Adding Ubuntu Styled Sidebar Dock in Android :

Get the GloveBox application from the playstore link(Click Here) and install it. 

You won't see any changes on your mobile until you set the application shortcuts inside the "Bar Contents" .To do so open the Glovebox application and select Bar Contents. Add your favorite applications and come back to your homescreen. (You can avoid this but homescreen gives you good visibility) 


Slide the top left of your screen and you must see the added applications in the sidebar.Hold on to your finger and move it up and down to navigate through the applications.I'm sorry you can have upto 8 applications only in free version. 

To change the place on the screen to trigger the application you must select "Configuration" and then "Edit trigger area". 


Set the desired size on the screen to trigger the sidebar.Make sure you keep minimum sensitivity level else the panel wouldn't appear. 


You can select your favorite theme for the sidebar out of the available themes.Just click on your desired theme and it's automatically added. 



The sidebar panel can be opened on any active screens and will be helpful to perform multiple tasks on your powerful android phones. 





How To Use Any Trail Software Forever In Computer And Laptop

How To Use Any Trail Software Forever In Computer And Laptop


We all know that many of the free software functions for a limited period of time and after the time period gets expired they they stop working and displaying to purchase the software. But we all want to use software for free.so just watch below.

First of all we should understand that how this software works. When we install software's for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.

We know that what you are thinking in this case, just change the date and time manually but this will not solve the problem.For this there is a program called RunAsData


RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn't change the current system date and time of your computer, but it only injects the date/time that you specify into the desired application.

RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, Wn7, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY:

You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.

  • 1. Note down the date and time, when you install the software for the first time. 
  • 2. Once the trial period expires, you must always run the software using RunAsDate. 
  • 3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work. 
  • 4. It is better and safe to inject the date of the last day in the trial period.