Saturday, January 24, 2015

[EXLOITS] DNS Hijacking

DNS Hijacking with 000webhost and Afraid
Required:
  • 000webhost account
  • Afraid.org account
Steps: 000Webhost -Login to your account. -At List of your Domains , click on Go to CPanel
-Scroll down and click on File Manager
-Upload your deface script as index.php into the public_html folder
-Do not forget to delete .htaccess and default.php
Afraid.Org
-Once you have login, click on Subdomain and Add a subdomain
-You will see a form, choose Many many more available
-Now click on Shared Domain Registry
-You will see a lot of domain. You can pick any site as target, or search for specific target such as .gov,.edu and more.
-After that, you will get Add a subdomain form. Fill the form as below and save.
-If success, you will see something like this
000webhost
-Go to Parked Domain
-Paste your target in the textbox and click on Park Domain
-That's all! Now go to your target URL and check if it's defaced. It needs a few minutes to make changes. If the site still not available, try another. :)

Read more ...>>

AnonymoX 2.4.6 Pre-Cracked [Ads Removed]

AnonymoX 2.4.6 AnonymoX is an initiative for anonymization on the internet. The aim is to restore the user’s right of anonymity in the web. Most websites monitor the behaviour of their users, giving the websites hosts the ability to analyze the general user behaviour and create detailed user profiles, which often times are sold to third parties.
A threat for freedom of speech on the internet manifests in the repression through federal or private organizations. More and more governments censor websites with the excuse of child safety, copyright infringement or the fight against terrorism and thereby limit the freedom of speech. Also blocking users based on their origin with GeoIP-Blocks is applied often, for example at Media platforms.
With anonymoX you are able to bypass many kinds of blocks by jelling a virtual Identity in another Country with only a few mouse clicks
Features
  • change your IP-Address (to one provided by us)
  • browse the www anonymously
  • visit blocked/censored websites
  • bypass GeoIp-Blocks: appear to originate from another country
  • set seperate anonymization settings for each website
  • delete cookies, show your public ip, change browser id
How to Crack? 1-Click the menu button New Fx Menu , click help Help-29 and select Troubleshooting Information. The Troubleshooting Information tab will open. 2-Under the Application Basics section, click on "Show Folder". A window with your profile files will open. 3-Close Firefox if its running 4-Open the folder named "extensions" 5-Open "client@anonymox.net.xpi" with WinRAR or 7Zip 6-Click on folder "modules" 7-Open "ui.js" with Notepad/Notepad++ 8-Find for this line:
ui.showAdBox();
9-Replace with this line
ui.hideAdBoxIfOpen();
10-Run Firefox and enjoy adless AnonymoX :D *Please make sure you already installed AnonymoX on your Firefox -
Read more ...>>

Thursday, August 30, 2012

Remote password hacking software - sniperspy


SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s! This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel! This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!





1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes



4. Records any Password (Email, Login, Instant Messenger etc.)



5. Remote Monitor Entire IM Conversations so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall




No physical access to your remote PC is needed to install the spy software. Once installed you can view the screen LIVE and browse the file system from anywhere anytime. You can also view chats, websites, keystrokes in any language and more, with screenshots.

This software remotely installs to your computer through email. Unlike the other remote spy titles on the market, SniperSpy is fully and completely compatible with any firewall including Windows XP, Windows Vista and add-on firewalls.

The program then records user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login. You can access the LIVE control panel within your secure online account.

Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. If you can't get to your computer and are worried about the Internet safety or habits of those using it, then you NEED SniperSpy.


This high-tech spy software will allow you to see exactly what your teenager is doing in MySpace and elsewhere in real time. It will also allow you to monitor any employee who uses the company computer(s).

SniperSpy Mac Review: What Is It & What Does It Do?

SniperSpy Mac is the only software that enables you to secretly watch your Macintosh like a TV! SniperSpy Mac offers you the ability to monitor activities online in real time. Your logs are safely stored in your secure Internet account which is accessible only by you. You can check logs using any web browser. You can login anytime from any location to view results without needing access to the Mac. The activities recorded are each described below. All logs can be printed for actual physical evidence!



Once you install to your Mac, SniperSpy will begin recording a wide range of Internet and Mac activities. These activities are uploaded to your private control panel. The activities recorded are each described below. All activities include a date/time stamp.

Unlike some other remote monitoring software, SniperSpy’s control panel uses a https connection for secure viewing. It also offers you the power to view graphical representations of data captured and a jpg picture of the screen however often you’d like. The screenshot is shrunk to fit your screen, or you can zoom in at full size to read the text. Store up to 100 of these screenshots inside your account.


Actual Screenshots – Like a surveillance camera pointed at the screen, the entire screen on the remote Mac is captured, showing all active programs, folders, or web pages. Screenshots of the actual desktop are captured, displaying whatever the user is doing on your remote Mac. There will be no hiding their activities from your eyes. Everything they saw you will see.

Keystrokes Typed – Every keystroke that they type while using your Mac will be recorded. Each record will show what was typed and which program or window it was typed. Concerned about what your child posts online? Recording all keystrokes will show you what they are typing while online, from online posts to passwords to website searches and instant messages.

Full Chat Conversations – Every IM chat conversation that occurs on your Mac will be recorded, showing both sides of the conversation and the usernames of those chatting. Concerned who your child or employee may be communicating with? You will now see any and all chat conversations that take place on your Mac, including the usernames of both parties.

Live Time Screen Viewer – Watch all the activity that occurs on your Mac live as it happens. Everything they do you will be able to watch them do live. Wondering what your child or employee is doing on your Mac? Watch what they do live as it happens. Every open window, website, or program will be displayed running in real-time.

Browse File System – Navigate through your remote Mac’s file system at any time to see what they might have saved or hidden on your Mac. Curious as to what might have been saved on your Mac? You can navigate through your Mac’s file system just as if you were in front of it. The user will never see anything.

And many more........

So what are you waiting for, Get your hands on the best Keylogger for Mac OS and Start Monitoring Victim Computer.

LIVE AND CONTROL FEATURES:-

  • Real Time Screen Viewer - SniperSpy allows you to watch the remote PC's screen like a television live in your browser.
  • Remote File Browser - Silently view the entire file system of the remote PC and download any file you wish.
  • View Active Processes - View a list of running processes on the remote PC. Kill any process you choose.
  • Launch Application or Web Address - Covertly launch any application or URL in the browser of the remote machine.
  • Send Message to User - Send a discreet "Message from Admin" alert to the user at anytime. They can even reply.
  • Reboot / Shutdown / Logoff - Remotely reboot or shutdown the PC or choose to logoff the current user from Windows.

ADDITIONAL FEATURES:-

  • Remotely Deployable - Allows you to install the software from any location using a simple file you easily create.
  • Locally Deployable - You can still install SniperSpy to a local computer. Simply run the exe module locally.
  • Optional Remote User Alert - You select whether or not the remote user will be notified that they are being monitored.
  • Anti Spyware Blocking - Forcibly block programs that could be a potential threat to SniperSpy's stealth operation.
  • Remote System Information - Retrieves system info such as CPU class, memory status, operating system and more.
  • Log Viewing Enhancements - Unlike the rest, SniperSpy breaks logs into pages and gives easy checkbox selection.
  • Searchable Logs - Are you worried about specific keywords? Type them into the search to search ALL logs!
  • User Filter - Log viewing screens can show results from all users or results from a specific user.
  • Remote Uninstall - When your spying project ends you can remove SniperSpy through the Online Control Panel.

SYSTEM REQUIREMENTS:-

  • Windows 2000, 2003, NT, XP, Vista & 7
  • Pentium or AMD 433mhz or Better Processor
  • 64MB RAM
  • A Standard Dial-up (56k) or High-Speed Internet Connection
  • DOWNLOAD

DOWNLOAD SNIPERSPY KEYLOGGER FOR MAC
DOWNLOAD SNIPERSPY KEYLOGGER FOR WINDOWS



1.Sniperspy is Fully compatible with windows OS

2.It can bypass firewall 

3.It has low antivirus detection rate

4.Sniperspy is recognized by CNN,BBC,CBS and other popular news network,Hence it is reputed and trustworthy

5. Provide Live Screen Viewer support.

Read more ...>>

HOW TO USE VIRUS NAK Detect Command Prompt (CMD)


start click start> type cmd> enter
2. type cd \ enter pastu type attrib> enter

IDENTIFY AFTER FILE TYPE YG ATTRIB VIRUS INFECTED

1. + s - means the file system (you will not "delete" files, except use cmd)
2. + h - means "hidden" (no "delete" t)
3. + r - means "read-only" files (meaning can not delete except use cmd)



Now, we set all the attributes so kene-s-h-r that can remove the virus. How caranyaa??
eg malware: autorun.inf

1. Type attrib-s-h-r autorun.inf (be sure to type in all at-s-h-r because we can not change the settings if you do not enter all attributes)
2. Type attrib again and check whether there is a change or not
3. If autorun.inf file attributes gone, you already can throw with type del autorun.inf
4. The same way you do in other malware. Just change the name only.


DONE!!
Read more ...>>

PRIVACY TOOLS TO BROWSE THE WEB ANONYMOUSLY

korang can gune Hide My Ass



- Hide ip for 
internet story-hide 
-hide identity online .. korang MSE korang url --->  http://www.hidemyass.com/ 2.Tor







3. Guadster




4. MegaProxy 



5. Fsurf




6. Privoxy




7. Online Anonymous Proxy



8. TryCatchMe




9. Heeky



10. Web4Proxy


Read more ...>>

Warning : Hackers Use Facebook Photo Email Notifications for Installing Malware


Cybercriminals have been sending new strain of malware via emails to Facebook users, encouraging them to view photos as an attachment. So for all Facebook users who totally rely on email alerts service to know when and what their friends do, are on risk of getting their computers infected with malware.

Scammers are sending out e-mails saying that someone has added a new photo of you to a Facebook album. The spam, which claims to come from the social networking giant, includes an attachment that installs malware on your computer. If you click on that attachment, It will downloads a ZIP file and if you open that ZIP file and click on files which are in that zip file, then that malware will get installed in you computer and it will enables hackers to gain control over Windows-operated PCs.


Facebook hacking


The e-mail subject is typically something along the lines of “Your friend added a new photo with you to the album” (though cybercriminals can easily alter it) and appears to come from an e-mail like “notification+kjdm-dj-hud_@facebookmail.com” (again, this can be changed). The attached file is named “New_Photo_With_You_on_Facebook_PHOTOID[random].zip” where “random” is a generated number.


Facebook hacking


Facebook hacking


Of course, above emails don't really come from Facebook team. Such emails are fake emails designed to trick or fool recipients into opening the attached file which contains a photo / image. But the attachment is not a image, its a malware which can hack you computer and allow hackers to gain control over your Windows computer. This malware was identified by security firm Sohpos as Troj/Agent-XNN.

But there are surely so many peoples in the world who could be duped into believing that they have been tagged by one of their friends in a photograph, and want to see if they look overweight, unattractive or simply fabulous.

So Facebook users should be aware by now that the social media site like facebook twitternever sends the pictures or files posted online as attachments via email. That’s why users are always advised to beware of such notifications.
Read more ...>>

website Hacking With Real SQL : Automatic SQL Injection Tool


REAL SQL was programmed by A Pakistani Hacker Adnan Anjum in REALBasic.

What is does is search through Google, using Google Dorks and tries each website for an SQL Injection Vulnerability and if it is successful it will return the vulnerable link to you! You can Easily Hack Vuln websites with Real SQL

See The Screen Shots Of Real SQL 

 Here is the search function and you can see it isGiving a vulnerable website 


 
The search is complete and there were Three  vulnerable websites found!



This is the save button making a .txt file of all the working links


 
Showing the contextual menu in the results box


password =  Logie
Download Details 

--------------------------------------------
name: Real SQL 
description: REAL Sql - V0.3 - Logie : Automatic SQL Injection Tool
 size: 1.01 MB
Read more ...>>

sql poison 1.1- sqli exploit scanner+search hunter+injection builder tool

http://itsecteam.com/pic/pic1.jpg

New Features:
"Look n Feel" is more attractive now.
Rich "Context Menu" items.
"Results" contain checkboxes to enable selection.
"Selected Dork" box is editable now for user convenience.
Built-in Browser for "Injection Builder" to check the impact of injection.
"Text Bucket" available for "Injection Builder" to save extra data.
"Insert Order By" button is added to "Injection Builder".
"Internet Browser" with Snapshot and HTML DOM Tree.

Bug Fixes:
It wont get stucked after pressing the stop button. Just a minor wait can occur which is okay.
Progress bar for "Crawler" has been fixed. It will show correct progress now.
Error on importing file is fixed now. You can import files from other directories as well.
"Searchqu" shows invalid results. It is fixed now.

Sql Poizon v1.1 - Sqli Exploit Scanner, Search Hunter, Injection Builder Tool

[Image: scannert.png]
[Image: crawler.png]
[Image: injectionbuilder.png]
[Image: browsere.png]
[Image: sqlerrorlist.png]
[Image: aboutdx.png]

Download:
[Image: injectionorange.png]Link
Read more ...>>

 

Sponsor

To Top Page Up Page Down To Bottom Auto Scroll Stop Scroll