Showing posts with label Cracking. Show all posts
Showing posts with label Cracking. Show all posts

Tuesday, May 31, 2011

NETTOOLS - AWESOME PACKAGE OF CRAZY HACKING TOOLS - DOWNLOAD

DOWNLOAD HERE:
http://www.mediafire.com/download.php?unujzogm3jd
http://users.telenet.be/ahmadi/nettools.htm

This program also called Powertools, becouse its a great program with lots of hacks but also other handy tools like: .bat to .exe / Tr4nsl4t3 / password protection / and things like that!
1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)

Tuesday, May 24, 2011

RECOVERING OR HACKING GOOGLE ACCOUNT PASSWORD USING GOOGLE PASSWORD DECRYPTER

It shows how to use GooglePasswordDecryptor to instantly recover the Google Password from popular web browsers & messengers using both GUI & Command-Line interface.


FCRACKZIP - FREE ZIP PASSWORD CRACKER - DOWNLOAD

Fcrackzip searches each zipfile given for encrypted files and tries to guess the password.

Methods used by FCrackZip:
  • ZIP password Basics
  • Brute Force Mode
  • Dictionary Mode
  • CP Mask
How to use FCrackZip:
  1. fcrackzip -c a -p aaaaaa sample.zipchecks the encrypted files in sample.zip for all lowercase 6 character passwords (aaaaaa ... abaaba ... zzzzzz).
  2. fcrackzip -method cpmask -charset A -init AAAA test.ppmchecks the obscured image test.ppm for all four character passwords. -TP fcrackzip -D -p passwords.txt sample.zip check for every password listed in the file passwords.txt.
Download fcrackzip from here: Download

Wednesday, May 18, 2011

CAIN & ABEL V4.9.39 - PASSWORD RECOVERY TOOLS FOR WINDOWS

Cain & abel is a password recovery tool for Microsoft Operating Systems.It allows easy recovery of various kind of passwords by sniffing the network,carcking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks,recording VoIP Conversations,decoding scrambled passwords,recovering wireless network keys,revealing passwords boxes,uncovering cached passwords and analyzing routing protocols.
Features:
  • Proxy support for Cain's Certificate Collector.
  • The ability to specify custo, proxy authentication credentials for Certificate Collector.
  • Proxy HTTPS Man-in-the-Middle Sniffer (TCP port 8080).
  • HTTP,APR-HTTPS and APR-ProxyHTTPS sniffer filters are now separated.
  • OpenSSL library upgrade to version 0.9.8q
  • winpcap library upgarde to version 4.1.2
Download from here: Download

MOSCRACK - A MULTIFARIOUS ON-DEMAND SYATEMS CRACKER

Things are eventually moving into the clouds. So are cracking services too. An example is the WPA Cracker as a SaaS service. Now, we have another alternative – MOSCRACK a multifarious on-demand systems cracker.

Moscrack is a Perl application designed to facilitate cracking WPA keys on a cluster of computers. This is accomplished with Mosix clustering software and/or simple ssh connectivity. Cluster nodes can run any Unix variant (including Cygwin). This means that you can run Moscrack even on Windows operating systems! Currently it has only been used with Mosix (clustering software) and SSH nodes. It works by reading a word list from STDIN or a file, breaking it into chunks and passing those chunks off to separate processes that run in parallel. The parallel processes can then execute on different nodes in your cluster. All results are checked (to a degree) and recorded on your master node. Logging, error handling, etc… are all handled for you. Moscrack is designed to be run for long periods of time (days/weeks/etc.). It’s current feature list states:

    * Based on Aircrack-NG
    * CUDA is untested but may be possible
    * Easily supports a large number of nodes
    * Designed to run for long periods of time
    * Doesn’t exit on errors/failures when possible
    * Supports mixed OS/protocol configurations
    * Effectively handles mixed fast and slow nodes
    * Effectively handles mixed fast and slow links
    * Forked design
    * Architecture independent
    * Uses standard protocols and utilities
    * Supports Mosix
    * Supports all popular operating systems as processing nodes
    * Node prioritization based on speed
    * Online configuration of nodes list
    * Failed/bad node throttling
    * Reprocessing of data on error
    * Automatic performance tuning
    * Does not require an agent on nodes
    * Very verbose, doesn’t hide anything
    * Logs key to file if found
    * Logs output from nodes on error
    * Includes a friendly status viewer (mosctop)
    * Includes an optional basic X11 GUI

Moscrack contains an experimental GUI that hasn’t been used/tested very much. It has been tested on the following operating systems:

    * Ubuntu Linux 10.10 x86 64bit & 32bit
    * CentOS Linux 5.5 x86 32bit
    * FreeBSD 8.1 x86 64bit
    * Windows Vista Business 64bit w/Cygwin 1.7.7-1
    * Mac OS X 10.5.6 (iPC OSx86)
    * Solaris Express 11 x64
    * iPhone 3g iOS 3.2.1 (Jailbroken)

Oh yes! You read it perfectly alright! It DOES work on an iPhone! Okay, it also needs a bit of a setup overhead. Details of the same can be read here. Since it supports a distributed nature, things could be difficult to handle. That’s why, Moscrack also includes a separate tool for monitoring it’s activity. It’s called – Moscrack Monitoring Tool, that displays data in a fashion similar to Unix “top”, thus the name “mosctop“. It also needs a few Perl libraries, that can be found in the read me document.


Download moscrack from here: Download

WOPHCRACK - AN OPHCRACK WEB INTERFACE

Rainbow tables are really useful when cracking password hashes. One Disadvantage of these tables is their size which can get up to tens and even hundreds of gigs. Making use of these rainbow tables is even difficult as it takes quiet a long time to go through all of the content of the table.Hence, there are tools like Ophcrack for Windows that help us crack windows passwords with rainbow tables.

We really liked the Offensive security Crackpot online hash cracker and thought it would be really nice to have a web interface for our rainbow tables that we could access from anywhere without having to carry them with us!


Download wophcrack from here: Download

Tuesday, May 17, 2011

HACK THE GAME - LEARN HACKING WITH IT

Hack The Game is a small size and free game which will let you enjoy the real world of hacking. It gives you DOS environment to play which will make you feel that you are really hacking something. It is also having lots of sounds for typing and several warning announcement which makes the gaming experience more realistic.


Download HACK THE GAME

After downloading, just start it, select your language and input any ID you may like. You will find many missions in this game, briefing of each mission will be available in your inbox. The mail itself includes several hints and processes on how to hack. You can also check Settings to turn off the sounds and warning messages etc.

The best thing is that no installation is needed to run this game and it is totally safe to play as it utilizes local files which in game play acts as a remote files. So, you just don not need to worry about your security. If you are having doubt about it, then just play it offline.... Enjoy

Saturday, May 14, 2011

TRUECRYPT - FILE ENCRYPTION SOFTWARE

You can get the latest version of TrueCrypt (Which is version 7.0a) from here.

Once you download the .exe file and open it, you will be asked to agree with the lisence (which no one cares to read). on the next page of the wizard, you will be asked whether to install or extract. Let me explain, if you are planning on encryption a drive or your boot partition, or if you are planning on using TrueCrypt solely on your computer then choose the install option. If you are instead planning on using this tool on-the-go or on your flash drive then choose the extract option which will allow you to use this software anywhere and everywhere using the truecrypt.exe file.


Once the installation is done, do the following to make an encrypted virtual space for storing all your sensitive data:

1. After clicking the TrueCrypt icon, the main window should appear. Click the Create Volume button.


2. You will be taken to the Volume Creation Wizard. In this step you need to choose where you wish the truecrypt volume to be created. A truecrypt volume can reside in a file, which is also called container, in a partition or drive. In this tutorial we will choose the first option and create a TrueCrypt volume within a file. as the option is already selected, just click next.



 3. In the next step, you will be asked whether to create a standard or hidden TrueCrypt volume. for more information on the hidden TrueCrypt volume, just select the 'more info' link on the wizard window. for now, lets just create a standard volume



4. Next step, you choose the location. note that it will be similar to any normal file (except for the fact that it can only be opened by TrueCrypt) so please remember that your truecrypt volume can be moved or deleted. You will also need to choose a file name for your volume after choosing the location. the screenshots for both the steps are provided below:



Once the location is sorted, you will be asked to choose the size of your volume, the encryption scheme, a password and also the format of your volume. Choose the ones appropriate for you. Here are the screenshots:





Once you click format, you are finally done! you will be greeted with a pop up windows that says that your volume has been created.

Now all you got to do is go back to the main TrueCrypt window, select any one of the provided drives, click on the select file button and select your volume and then hit Mount. You will be asked for your password, once you input that you can go to My Computer and find your TrueCrypt volume sitting there along side your C: and D: drive. you can just move all your sensitive files to your TrueCrypt volume and once done, select Unmount from the TrueCrypt main window.

HOW TO CRACK PASSWORDS IN WINDOWS VISTA

Boot to Win RE
Click Command Prompt option..then type the following command:
C:
CD Windows\system32
ren cmd.exe cmd.old
ren magnify.exe cmd.exe
ren cmd.old magnify.exe
Then Restart your computer
Click on the Easy of the Access centre on the left side bottom à Choose Magnify option à then.. Command prompt opens up
Type: net user administrator /active:yes
Restart the computer
Login on the administrator account and then using User Account page remove the password for the other account.
Search for Magnify.exe in start search and then click on it
Command prompt opens up!
Type: net user administrator /active:no
Restart the computer again!
This will disable the administrator account.
Boot to winRE
Type the following:
C:
CD Windows\system32
ren magnify.exe cmd.old
ren cmd.exe magnify.exe
ren cmd.old cmd.exe
exit
Restart the computer and then the system logs on to the User account without asking for the password provided there is only one user account.

PENTBOX SECURITY SUITE - V1.4

PenTBox is a Security Suite with programs like Password Crackers, Denial of Service testing tools like DoS and DDoS, Secure Password Generators, Honeypots and much more. Destined to test security and stability of networks.

Tools included in PenTBox

Base64 encoder y decoder,
Digest for MD5,
SHA1,
SHA256 and SHA512,
Port scanner,
TCP DoS,
TCP AutoDoS,
SYN DoS,
Honeypot,
L33t Sp3@k Converter  

PenTBox is programmed in Ruby so ruby is required, and oriented to GNU/Linux systems compatible with Windows, MacOS and more.

Tutorial for PenTBox

1.Download PentBox and un tar
2. We are using windows box , simply run exe and choose from three options.
3. And your ready to attack  or audit. Nothing much to think or relay on.
Download PentBox Here

Pentbox is simple yet powerful .Feature i liked most is simple honeypot...

ALL IN ONE HACKING SOFTWARE TOOL PACK

CRACKING - COMPLETE TUTORIAL

We will have a very basic and simple approach. We will use a disassemble and an assembler.

Disassemble is the process that will let us to view the "asm" source code of the

dissembled file.
Assembler - is the process that will allow us to make changes to the code.

The most classic disassemble is W32Dasm, download it here:

CODE

http://foff.astalavista.ms/downloads/W32Dasm_8.93.zip

The best assembler is HIEW32, download it here:

CODE

http://foff.astalavista.ms/downloads/Hiew726w.zip


Download the file that we will crack here:

CODE

http://foff.astalavista.ms/downloads/cim_crackme.zip

Unzip everything and we are ready to start!!!


Step1.


Run the file "cim_crackme.exe", we see there two empty boxes. Name and Serial like many

shareware software. Put there your name and any serial number then click on "Check"
button. We will receive this message: "This is not a valid serial......" Write this
message down, don't make errors. Just write the message without the quotes and the dots of course then close everything.

Step2.


Run W32Dasm disassemble, on the menu bar open the first menu "Disassemble" the "Open

file to disassemble". Browse to our target "cim_crackme.exe" then disassemble. You now
should see a lot of code on your screen

Go at the search menu of W32Dasm and click on "Find Text", put in the search box the text

string we did memorize somewhere: "this is not a valid serial" (without the quotes).

:


*Referenced by (U)nconditional or ©onditional Jump at Address:

|:004010D7

You should record the address you see: 004010D7 (is very important)


Now, go up once more until you find the address you just recorded,


The arrow number 1 show who is addresses group located. In the circle is the address we

were looking for. The address and all the row is selected by the green bar too! I hope
everything is clear enough! As you see, there is an other arrow, "arrow 2" that indicates
"JNE". What does "JNE" mean???

JNE - Jump if not equal

JE - Jump if equal

When we enter a fake serial number, it jumps. Hmmm, we should reverse it. The reverse of

"JNE" is "JE". If we do this, the program will accept any serial number as a real one!!!

But how do we edit it???


Using an assembler of course


Our mission now is to reverse "JNE" to "JE" at the address: "004010D7".


Step3.


Now send a desktop icon of HIEW32 then drag and drop "cim_crackme.exe" over it. You should

see some crap code, now press F4 from the keyboard then choose decode from the selection.

Now, return to HIEW and press F5 from keyboard then enter the address we recorded above

but don't forget to add a dot before the address and to remove the zeros before the
address number. Enter it like this: ".4010D7" (without the quotes of course) then hit
ENTER. After this you will land in the exact address where we will do the reversing.
Notice this line carefully:

.004010D7: 7516 jne .0004010EF


We should change the bytes here. Without moving the selection from "75" press F3 from

keyboard then hit the right arrow of the keyboard directional keys one time, be sure to
have the cursor under the number "5". Carefully press the number 4 from the keyboard. The
number will change from "7516" to "7416". Carefully press F9 from keyboard to save our
changes and F10 to exit at all! We are done!!!

Now check that everything is ok, run "cim_crackme.exe" that you just cracked and put you

name and any serial number...