Thursday, 19 July 2012

How to Use Ravan for Password Cracking?

In my previous article, i explained about the Ravan Tool.  Now let us see how to use the Ravan for cracking passwords.


Requriments:
Lot of Friends :
Ravan is Distributed password cracking method. So you will need lot of friends who have Pc with Internet connection. The speed of cracking will increase based on the number of pc contribute in the cracking.

How to use Ravan?

Step1:
  • Go to http://www.andlabs.org/tools/ravan.html
  • Enter the value of the hash that must be cracked
  • Enter the value of the salt, if it is not a salted hash then leave it blank
  • Enter the charset. Only these characters will be use in the brute force attack
  • Select the hashing algorithm (MD5, SHA1, SHA256, SHA512)
  • Select the position of the salt. (clear-text+salt or salt+clear-text)
  • Hit ‘Submit Hash’
Step 2:
 If hash is successfully submitted, it would return a URL.  Now you just need to send this URL to all your friends and ask them to click the start button.

    The main page manages the cracking so it must not be closed or the cracking would fail.

That is it. Once your friends click start they would be doing pieces of the work and submitting results back. 


The main page would constantly monitor the progress of the cracking process and manage it across all the workers. You would be able to see the stats throughout the process, once the hash is cracked the clear-text value is displayed


Ravan an JavaScript based Distributed Password cracking



You want to crack a hash but your system speed is low?! No need to worry..! Here is solution for you , "Distributed Password Cracking". Let me introduce a new tool called "Ravan" developed by LavaKumar.

About Ravan:
Ravan is a JavaScript based Distributed Computing system that can perform brute force attacks on salted hashes by distributing the task across several browsers. It makes use of HTML5 WebWorkers to start background JavaScript threads in the browsers of the workers, each worker computes a part of the hash cracking activity. Ravan now supports MD5,SHA1,SHA256,SHA512 hashes.

How it works?
Ravan has three components:

Master:
The hash, salt, hashing algorithm, position of the salt (before or after salt) and the charset are submitted by the user. These are submitted to the web backend and it returns a ‘hash id’ which is unique to every submitted hash. It also supplies a ‘worker url’ specific to this hash that must be sent to potential workers.
Once the hash is submitted the master creates arrays of slots (each array contains 5 slots), this is submitted to the web backend. Each slot represents a small part of the keyspace, this is how the entire activity is broken down in to multiple tiny tasks. A single slot represents 1 million combinations.
The master constantly polls the web backend to check on the progress of the cracking process. As the existing list of slots is completed by the workers the master allots more slots. When a worker cracks the hash and returns the clear-text value the master confirm this and then signals all workers to stop cracking.

Web Backend:
The web backend acts as a proxy between the master and the workers. It does not perform any actual computation but validates the data submitted by both the parties and passes information between them.

Worker:
The worker performs the actual hard work of cracking the hashes. Each hash has a unique worker URL and this page explicitly asks for the user permission before the cracking process is started. Once the user accepts and clicks ‘Start’ the worker polls the web backend for available slots, the web backend returns an array of slots from its database. The worker cracks each slot and sends the result to the web backend. After completing all the slots it polls the web backend for more slots.

Here is the tool:
click here

Tutorial: How to use Ravan Tool?

Monday, 18 June 2012

How To Hack Wireless Networks Passwords With Packet Sniff


What is Packet Sniffing?

Today I am going to make an article on wireless hacking and cracking, as everyone wants to crack their neighbours wireless passwords. So, in this article i will show you some of the interesting steps to get any wireless network password. There are many steps for cracking a Wep password but this step would be better than others and easy. This Method is known as Packet data sniffing for this I would be using Wireshark for cracking packet sniffing. It is an act of capturing packets of a targeted network. Once you will gain access the network, you can also crack the whole privacy info of the network such as description, conversation, username, passwords. Now lets start the basics of cracking a wireless password network.

Learn Basic How To Hack any Wi-Fi Network Through Network Rehacker Tool



So Guys In this tutorial I will tell you the basic of how to hack any Wi-Fi router or network in your area. Majority of People wants their neighbour Wi-fi connection but are tired from cracking the security password. Today I will show you how to hack the wifi network. There is a Software for cracking Wi-fi Networks.

What is a Wi-Fi network?
Wifi network is a wireless network used mostly for local area purpose.
It is a Secured Network which allows the computer to access the Internet without any cable or wire.

WIFI HACKER :-
1) download and install the software.
2) Select the networks you want to hack 
3) Press Crack Button
That's it ! So Now  You can enjoy using Internet for free. You can download this program from Here

ProRats V1.9 : Hack Victim's Computer Spy Your Enemy Remotely


ProRat is a Microsoft Windows based virus named trojan horse, commonly known as a RAT (Remote Administration Tool). ProRat usually opens a port on the computer which allows the client to perform many different operations and destruction on the server. As I have posted different articles upon Networks and Windows. So, today I am going to make an article on ProRats. Before Starting the steps i would like to show you some of the best features of ProRat. You can download this program from here. You can hack your friends or victims facebook accounts, paypal, yahoo, hotmail. It kinda keylogger which records all the happening of a targeted computer. But remember use it with your own risk.



How to Prevent Your Private Data From Password Cracking Attacks


There are many of thing you can do to prevent NetBIOS from cracking passwords attacks and to keep the privacy of your computer secured. In this Article, i would like to show you some of the quick ways in which you can keep the privacy of your computer safe. As many antivirus software doesn't alerts you from cracking attacks.
So, this is why I am going to teach you how to get secured from hackers when using Internet.


How Can I Prevent My Personal Data From Hackers?

1) Goto Start - Control Panel - Network Connections.
2) Double Click on your current active connection, in my case it is wireless network connection 2.
3) Right Click and go to properties.
4) If file & Printer sharing is active, then deselect it.

INCREASE Utorrent Download Speed


After a long time, I am posting a new article on uTorrent speed hack. In our Country India, we have a decent 3 Mb download speed but upload speed is half then that of downloading. There is a perfect bug to increase/boost downloading-uploading speed of uTorrent. A professional way mostly used by trackers and hackers. So today, I will show you some of the quick and legal steps! this method is known as ratio speed hack do it with your own risk.

Fud Crypters


Crypters are very useful softwares which usually used for hiding infections such as Trojans, Malwares, Spywares etc. It basically allow users to crypt the code of their programs. Well for sending keyloggers and Rats, fud crypters would be the best for spying your enemy. Many times hacker get busts due to firewall protections, antivirus and antiloggers, but this thing will bind your trojan into a harmless program.  

Anti KEYLOGGING


Keyloggers have been a major problems nowadays as once they get installed or launched, the hacker can get each and every private information and data, I have written many articles on Keyloggers and Spywares but today i am going to make another article on how to protect your computer from keyloggers and spywares. Zemana Antilogger is the best program for detecting trojans, malwares and viruses. Normal antivirus doesn't detects it due to binding, scripting, hexing, crypting ways mostly used by professional hackers, but zemana could reach through window's registry for investigation of a spyware.

How to Hack Facebook Accounts : Hijacking and Stealing Cookies Session 2012


Hello Everyone, I have recently posted many tutorials on facebook hacking like phishing and others. Today i am going to show you a quick and easy method for hijacking someones account for free or you can say a free access. In this method you will learn how to hack someones facebook account for free. As everyone wants their victim/enemy password but are tired from cheap hacking method so this is why i have posted this tutorial for newbies and for those who are crazy in hacking.
First of all let me explain you the word Cookie?
Cookie is a HTTP cookie or a web, which is used for admin sensitive information access.
There are many various and different Programs which are used for stealing cookies but the best and the easiest is Wireshark.

How to Hack Websites By Dictionary Attacks


How to Hack Websites Through Dictionary Attacks : Reverse Engineering

What is a Dictionary Attack?

It is when a list of dictionary words are used for cracking a password database. It is commonly used for hacking social media websites ond others. Some strong passwords aren't cracked by this method but 70% of them can be hacker by using dictionary attack. So guys in this lesson I will teach you, how to crack/hack website  passwords of your victims by using this cool method, As I have posted many different hacking articles on facebook and others but this method could also be used to hack websites.So, for hacking someones website through dictionary attacks I would like to use Brutus software which is the best for hacking and cracking passwords. You can Download it.



HACK FACEBOK,GMAIL,AOL,PAYPAL ACCOUNTS


Hack Accounts By Ardamax Keylogger!

Step1. Download the Ardamax keylogger From here.
Password =  @hackaholic

Step2. Install it on your drive after installation goto tray icon - click - Registration Code will be in the downloaded folder.
Step3. The Screen will be displayed with many of the options, select them all as shown below.

The Perfect Keylogger


On my Facebook page  or anyone’s Facebook page or blog or in any hacking group everyone keep asking  about hacking Facebook, Gmail , yahoo etc. accounts.
Hacking is not easy and you can’t hack Facebook server or database to steal some ones password. It can be done only from client side means the if Facebook user is dumb enough to click on any link and can enter his email id or password without re-checking the web address, we can use phishing. Similar with the case of keyloggers if you send someone a link of file/mp3/pic/video/etc containing keylogger, it will work only when  victim click the link, download the file and run it at least for once .
Also there are many ways to hack any accounts. You can use forgot my password hack which helps hacking most of the friends password because they have silly security questions which are easily guessed. But there are many people who are not that stupid or it could be possible you don’t have any information about them. Then what will you do??
 Sending a remote keylogger is good option. Here i am introducing you to ‘Perfect Keylogger’ which a very good and works in stealth mode .
But Perfect Keylogger is not available for free so i did a little googling and got a free download link. After downloading it, i uploaded it on my own account of file sharing. At the end of this post i have given the  link to download.

Sunday, 17 June 2012

BRUTE FORCE





Hello , The topic of this article is "Brute Force".In this article i will explain the meaning of bruteforce and will provide some top Brute force softwares to download.Lets Strat....

 Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies. Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence. Brute force is considered to be an infallible, although time-consuming, approach.

Crackers are sometimes used in an organization to test network security, although their more common use is for malicious attacks. Some variations, such as L0phtcrack from L0pht Heavy Industries, start by making assumptions, based on knowledge of common or organization-centered practices and then apply brute force to crack the rest of the data. L0phtcrack uses brute force to crack Windows NT passwords from a workstation. PC Magazine reported that a system administrator who used the program from a Windows 95 terminal with no administrative privileges, was able to uncover 85 percent of office passwords within twenty minutes.

Yo

How to Break Window 7 Password the very Easiest Way 4 u


Have you ever forgot your Windows 7 Password? This tutorial will show you how to break Windows 7 Password.

Start your computer and enter into Bios Setup. Change your boot preferences to boot from CD /DVD.
Insert your windows Bootable CD and select the “Repair your computer” option from the lower left-hand corner.

Easily Reset Windows Settings to Default State with RefreshPC





On my quest in searching for a tool or software that can actually restore deleted services that belongs to Windows and not just simply restoring the startup settings, I found a tool called RefreshPC which claims to

Web Monitoring + Security Sofware for you PC.



KEYLOGGERS



refog box1.1s REFOG Keylogger   Look after your family members

REFOG KEYLOGGER

Computers can be useful tools for entertainment, education and communication but in the misguided keeping they can be parlous. Children can interact with online predators. Teenagers can supply improper info on their ethnic networking profiles. Spouses can attain romanticistic connections with members of the opposite sex.
But with REFOG

HACK THE FACEBOOK ACCOUNT PASSWORD WITH KEYLOGGERS

Hacking Facebook account is very easy and just requires not more than 10 minutes of work. Don't worry i will also tell you how to protect your facebook account or passwords from such hacks and hackers. But for this you must know how hackers hack your facebook account. So first i teach you how to hack facebook account remotely and then i will tell how to protect yourself from this.

So guys lets start hacking Facebook account or passwords....


Steps to hack Facebook account using Keylogger:

1. Creating the Keylogger Server to hack Facebook passwords.
2. Extracting the Icon from installer.
3. Bind the keylogger server with any software setup.
4. How to spread your keylogger or send it to your friends to hack their Facebook accounts or passwords.


Step 1. Creating the Keylogger Server

1. Download the keylogger.
Download


HOW TO BLOCK WEBSITE IN U R PC?





 Hello Frnds Here is a one more stuff for you by which you can block a particular website on any computer by just editing a file like you want to block facebook on your frnd’s laptop or computer so you can block that site and your frnd never will able to open that website until he/she installs a fresh copy of window.

Bogus Facebook Application Spreading Malware all Over the world.





Third-party Android markets have traditionally been the main source of infection since the Android boom, as they are less strict than the genuine Play when it comes to bouncing malware.

How to crash small websites using RDOS | DOS tutorial





DOS TUTORIAL 
How to crash small websites using RDOS


Have you ever wanted to DOS attack on a website. Here I am going to write about a tool which is really helpful but it wouldn't be effective on big servers. 


NOTE: Please do not try to this tutorial to harm any other's website.
I will not be responsible in any case. If you are not agree, please leave this website without reading further tutorial

You need:

1.    Port Scanner Download Here
2.   rDOS Download Here
3.   Ip Hiding tool Download Here





1: First of all you want that hide i.p tool it is for your safety so open it and if u want to use internet so use internet explorer and Mozilla don’t use chrome its not recommended if you don’t want to download so u wanna hide your identity manually so you can see here

ADDING BACKDOOR IN HACKED FACEBOOK ACCOUNTS


Here is a way how some hackers retain the hacked facebook accounts even after the target changes the password or the hacker himself returns it to the target.
Many of the facebook users are unaware that there is a alternative way to log in the facebook account by linking a alternate email account to it. Not the default email id which you use regularly to log in by typing the email id and password but a different email id. So when you are logged in this alternate email id and open the facebook website it directly logs in your facebook account without even asking the password. If you did not get the concept here is a example. Imagine that your regular email id is "regular@gmail.com" and you add a alternate email id "alternate@gmail.com" in account setting. Now when you are logged in "alternate@gmail.com"
and open facebook website it redirects you and directly opens your facebook account. So here the is procedure how you can add this alternate email id as a backdoor.


STEP 1) Open your facebook account and go to account settings.


STEP 2) In the settings tab you will see a option "Email" click on "change" and add a new contact email which is to be the backdoor.

PHISHING TUTORIAL FOR BEGINNERS


PHISHING TUTORIAL FOR BEGINNERS


PHISHING is a hacking method in which the attacker sends a email or link. clicking on which will take you to a site which looks exactly the same as the site you use like facebook, orkut, gmail etc. where you will be told to provide your information and bingo! you are hacked and the best part is after that you will be redirected to the original website and some common reason like network or server problem will be shown, so you wont even come to know that you were hacked.

here is a tutorial about how you can try phishing and have some fun.

STEP 1) First you must sign for a free webhosting service like www.byethost.com
And register your subdomain. After registration you will have a subdomain like www.yourname.byethost.com (Please select the name of the website wisely and please don't add the name of the website whose phishing page you are making eg. if you are making phishing page of Facebook then pls don't add the word Facebook in the name of the phishing as this website are easily detected and block.)

STEP 2) Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs".

HOW TO BYPASS RESTRICTION ON COLLEGE NETWORK


Proxy To Bypass Restrictions On College Network

Seeing the amount of time and bandwidth students waste on social networking sites and torrent downloads. Most of the colleges (at-least in India) have blocked access to such sites on their network. The effectiveness of this restrictive measures depend upon the system used by the college to place this restrictions. Now most of this systems can be easily bypassed by using some simple trick or procedure. But some colleges employ professional system to place the restrictions. Bypassing them can be a real headache. But here is a proxy service which you can use to even bypass this professional systems. Frankly i didn't try it, but one of my friend was facing the restrictions on his college Wi-Fi, especially for torrent downloads. Now he had the options to use other bypassing tricks but it would not work for him because he was compelled to use his student login details to connect to the internet and he feared that if the authorities came across his bypassing he would be permenately blocked from the network. But when he used the below proxy service according to him the proxy bypassed the whole login procedure and directly connected to the internet.

WHAT IS PHISHING?








Phishing is a method by which a Hacker send a look like original web page or any form by which he can get your personal information , passwords, financial information and even many more and we don’t know about phishing so we fill the information for example if you want password of gmail of a victim you can send him/her a fake page of gmail look like the original victim will just see the graphical interface that yes it’s a gmail but victim is  totally wrong
  victim never see the address bar and use his/her original username & password to get access to gmail bt when he hit enter after filling username& password then victim will not access the gmail that attempt will be refused and we will get victim’s password.

Various Types of Email Account Hacking




Various Types of Email Hacking

Now, we will show you and teach you how many types of Email hacking are there because everybody wants to get the secrets of friends, girlfriends or partner and for this you search on Google and find out the ways of account hacking , facebook hacking and we have seen that’s some of the site even provide software for hacking and cracking the passwords of Email. First of all Note this there is no Software  in this world that can hack email passwords by entering Email , So Here are some ways of Hacking Email Accounts :-


Hack Facebook, Gmail, Yahoo, Msn, Aol and many more types of Passwords with All in One Software.


A 100% Working Trick is here Just Enter your Email Account Usename & Password Don’t Worry It is safe the Keylogger use your password to send the keystrokes & logs files to your email id which u will fill here.(please fill only valdi email id & password otherwise you will not get the victim’s logs)






nrelate