Posts

Showing posts with the label hacker

Installing John The ripper on Linux machine

John the ripper is undoubtedly one of the best password cracking tool. People have been experiencing some problems with installing it. So here we bring out a tutorial on how to install the famous password cracker on a Linux machine. This is the method to install and use john the ripper in fedora/ubuntu (and many other linux as well).. 1) Download john the ripper software http://www.ziddu.com/download/6365223/jo...ar.gz.html 2) Extract it and then copy the text from http://www.openwall.com/lists/john-users/2009/09/02/3 3) Save the copy text in john folder with john.patch. 4) Open terminal and go to john folder cd Desktop/john-1.7.3.1 5) Now we have to patch our john software with following command patch -Np1 -i john.patch 6) go to src folder cd src 7) run this command make linux-x86-sse2 8) cd .. and goto run folder cd run. 9) Run this commmand ./unshadow /etc/passwd /etc/shadow > filename 10) Finally run this command to crack password ./john filename and here you have the ripper run...

Hacking tools that every hacker must have

We(hackiteasy.com) present another list of the must hacking tools every hacker must have. These toolsmake the life of a hacker much easier and every n00b must first learn how to use these tools first. AIRCRACK Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks. Site URL: http://www.aircrack-ng.org/ BackTrack BackTrack is a A Linux Distribution focused on penetration testing. Site URL: http://www.bactrack-linux.org BarsWF BarsWF is the worlds fastest md5 bruteforcing password cracker, just in case you didn't already know. It combines using your computers processor with you graphics cards GPU for computing the largest amount of hashes as quickly...

Hack computer in your LAN (Windows)

Image
Easily Hack A Windows password.. Click Here! Here we hack a PC somwhere in our LAN. This is a simple trick that uses open port to gain access to the target computer.The Lan hacking technique uses port 139 for the hack. On a LAN mostly the port 139 would remain open. Today,I will write about hacking computer inside the LAN network. This technique will be taking advantage of Port 139. Most of the time,Port 139 will be opened. First of all,I will do a port scanning at the target computer which is 192.168.40.128. This computer is inside my LAN network. I will scan it using Nmap. I get the result and it shows Port 139 is opened up for me. Now you will need both of these tools: ** USER2SID & SID2USER ** NetBios Auditing Tool You can get both of them on the Internet. After you get both of them,put them in the C:\ directory. Easily Hack A Windows password.. Click Here!     You now need to create a null session to the target computer. Now open the Command Prompt and browse to the ...

10 best hacking tools for Linux

Image
Linux is a hacker’s dream computer operating system. It supports tons of tools and utilities for cracking passwords, scanning network vulnerabilities, and detecting possible intrusions. I have here a collection of 10 of the besthacking and security software tools for Linux. Please always keep in mind that these tools are not meant to harm, but to protect. 1.   John the Ripper John the Ripper   is a free password cracking software tool initially developed for the UNIX operating system. It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-base...

The world's top 5 criminal hackers

The Black Hat Hackers - CriminalsThese hackers are the ones that you've seen in shackles arrested for cybercrimes when they were just getting out of puberty. Some have done it for financial gain others just for fun. 1. Kevin Mitnick. Mitnick is perhaps synonymous with Hacker. The Department of Justice still refers to him as "the most wanted computer criminal in United States history." His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime. Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation's computer network and stealing software. Mitnick then embarked on a two and a half year coast to coast hacking spree. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked int...

The Top ten hacking techniques of 2009

Hackers are always on the go to crack the internet and find new hacking techniques an hacks. So here we have compiled a list of the best 10 hacks from 2009 that we felt are worth knowing by the internet techies around the world. . Top Ten Web Hacking Techniques of 2009! 1. Creating a rogue CA certificate Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger 2. HTTP Parameter Pollution (HPP) Luca Carettoni, Stefano diPaola 3. Flickr's API Signature Forgery Vulnerability (MD5 extension attack) Thai Duong and Juliano Rizzo 4. Cross-domain search timing Chris Evans 5. Slowloris HTTP DoS Robert Hansen, (additional credit for earlier discovery to Adrian Ilarion Ciobanu & Ivan Ristic - “Programming Model Attacks” section of Apache Security for describing the attack, but did not produce a tool) 6. Microsoft IIS 0-Day Vulnerability Parsing Files (semi‐colon bug) Soroush Dalili 7. Exploiting unexploitable XSS Stephen...

Bluetooth Hacking Software for your mobile-

Image
Everyone of you who owns a mobile must be aware of bluetooth and might know the possible things that can be done with bluetooth hacking. So here we give you a bunch of bluetooth hacking software that would let you do a lot more than you are supposed to. Just see the list and install these software on your bluetooth enabled mobiles and have fun... 1. MagicBlueHack v. 1.0 Freeware 2008 May 26 / 2009 Feb 17 6.68 (61 votes) MagicBlueHack is a Mobile Hacking software.By using this Software on your mobile you can access another Bluetooth mobile such as make Call(Free), Send SMS(Free), Read Phone Book and Read SMS Inbox from another Mobile without notifying the owner... ...