- - - - - - - - - - - - - - - please read - - - - - - - - - - - - - - - -

This blogs is not responsible for any wrong post, informations visible and legible. Other posted must be first published and originated by other.

Monday, June 28, 2010

hacker ' Software

Its content is based on I have known, produced, searched and the other is done and posted by other websites and that is credited to original posted and make it.










This is the first lesson in the world hack. Further you can find and learn the elemntare things to know every hacker beginner! Although there are some things you know not complicated, they are very useful and I am sure that you will use and further ahead in your hacker! Any hacker tools!
Here I describe the arsenal of a hacker, even if it's beginner! I think these tools will be useful in further!
- Brute Force
- Port Scanner
- Security scanner
- Joiner
- Mail Bomber
- Breaking Windows passwords
- View passwords
- Trojan
- Keylogger
- Hiding IP (proxy / socks)
So we start on row ...
Brute Force
Brute Force - Uses passwords to downloading e-mail, ftp-servers and others ... There are several types of brute force programs, giving them more common functions. When using brute force connections to less than 56 kb that is dial-up download passwords can be very long ... and when using ADSL, fiber optics or satellite descarea takes place much faster, in turn eat the more traffic. The optimal solution is to download the password through the lists of passwords. Hacker draw up a text file in which passwords are located all possible target, the program connects to the server and pointed to choose the start line of the fillet text passwords with passwords (list). Deasemnea these lists of passwords can be primitive, that is when urmaeaza as the ab-abc-ABCD-ABCD ... up to a length of 10-30 GB! Also with dictionaries or lists of passwords, as they say in May, is more difficult to nimereasca and password, but it is very effective! If the attack takes place on an e-mail, it is necessary to point brute force the server data entry. Eg if we want to break postal address - e-mail server of the data entry will be: pop.hacksome.md. And if not break e-mail address but www.hacksome.md site, then you have to show program brute force ftp-server of this site: Brute Force ftp.hacksome.md programs still have many useful features like password if you know the person is 5 caractrere the first letter is L, then you can use the password after downloading mask: L ####. Among the best programs are Brute Force: AET2 Brutus, wwwHack and others. For example, today more email service programs have brute force, hackers created especially for them!
Port Scanner
Programs that scan a range of IPs with an open port indicated is called port scanners. If the scanner will find an IP address with that port open, it will be added in your list also, there is only scanners intervals ip addresses. Where to use these scanners? Sometimes creators will include a Trojan scanner port their creations. This is because the server heap (fillet must stay in the target computer) in reaching your sacrifice, open a port in system, whereby the customer receives commands (hackers). For those who still do not know: if you know which port is lagatura with our wall, with ports scanner wondering after every computer IP address if the port is open or not. When the scanner finds addresses to open the port means that the computer that already sit in a heap of our sin is we can connect to it! Among the best scanners and the alpha Essentional Net Tools and a simple but very useful - Angry IP / Port Scanner.
Security Scanner
All the Internet there are two main types of websites: static [html] and dynamic [php]. If the pages are written in html page where the content does not matter to ordinary users and always remain unchanged - static. Pages dynamic process data received from users, that is if you can think to express. Hence we conclude that static pages can not be any security holes. These holes exist only in dynamic pages. The most widespread vulnerabilities are XSS. To find security holes, using scanners securiatii. The best time to be XSpider and Shadow Security Scanner.
Joiner
In English, means to unite join, connect. Joiner is a program which enables to join or glue several fillets in a single file system have changed the icon. Thus, using hacker Joiner can paste a server with a heap of useful file system inmine of its target. In turn, or when launching the target program that thinks it is useful to automatically launch and wall ... Through Joiner you can join in a file up to 255 fillets! Joiner is a minus - it can be detected by antivirus. The problem can be solved if you buy a private Joiner because joinerele public are not so good!
Mail Bomber
This type of program is to bombard the e-mail .. that is sending several hundreds or even thousands of letters to a postal address! Bomber mail programs are used widely by spameri. Thus, when sending too many letters (can reach hundreds of thousands and thousands!), Post the target can not process information venita suddenly and in large quantities, so the error or even delete this address. I personally against spamerilor! But if you will need, you can use Ganja Spammer or any other .. Only in exceptional cases!
Breaking Windows passwords
I think the best programs for handling passwords are PasswordsPro, MD5Inside, PWLInside, SAMInside. All these programs are produced by InsidePro. But to invelege better, I read a little to write about them.
SAMInside - a program to break fillets SAM. Windows 2K/XP, all passwords are kept in windows \ system32 \ config, and is called SAM and SYSTEM - without extension. To copy them to decipher them, you need dos or another .. To begin to figure out, you need copies of them. Later they open with SAM Inside indicated descifrarii way and wait. Soon you will read the password!
PWL Inside - is practically the same as the previous program, only that is used to decode fillets from Windows 95/98, where passwords are fillet with a. Pwl Windows directory.
MD5Inside - with its passwords can decode MD5-hash that is used in many systems of authorization. After decipher the password hash you have time. For example, in forums such Invision Power Board hash contained in cookies. More about cookies read on our website.
PasswordsPro - is a very powerful tool for working with passwords. Are all functions MD5Inside, generates hash, passwords can view what is under the stars ***. It is very useful for any hacker!
View password
If you what your colleague has the password, it is very easy to learn. When you are in hospitality at it, send to make a coffee, and you in this time, remove programs that shows all the passwords from messengere, mail and more! I think that magic?)) It consists in the fact that for more convenience, was made after approval your password is saved in the browser, icq, messenger or mail. This vulnerability is a pretty big! There are many programs that show all types of passwords saved in your computer. To view the passwords of Internet Explorer and Outlook Express, use PSPV program. For TheBat - TheBat PasswordViewer for ICQ / Trillian / Miranda and others - Advanced Instant Messenger Password Recovery or AIMPR. Thus, without any problems to put hands on passwords!
Trojan
Here I come to you and more interesting. This type of program hack, was so called because it works like famous Trojan horse. Once inside the target computer, couch and sit there quietly. He does absolutely nothing if you do not receive the command from the creator or (hacker who sent). But he gets terribly when it starts to come hacker commands from the network (LAN) or Internet! It can send all your passwords hackers if it receives the order or work with your fillets or register. I understand the idea that it can have very high although all have different ways! Most popular today are Trojan: Pinch, Xinch, a311 and many others ...
Keylogger
Keylogger is a spy of the keyboard. It records all keyboard and push them into a file. When the connection to the Internet, this file is sent to hacker or save them in there somewhere on your hard disk. It is an ideal tool if you want to know what type your friend via icq or messenger.
Proxy
If you do something not legal, I do not think you want to leave your real IP address .. then you find you easily. But those did so in case? There are so-called proxy servers and socks servers. The trick is that this proxy you change your ip real. I mean, you connect to the proxy server, and all orders do not go directly to that site but the first proxy server, which fulfills the order and send you only the result here! Thus, leaving the proxy server is working for you, and you stay anonymous! Also, if you have your ip address banned by prozy come without problems! In general, if you have problems because of IP address, use the proxy and everything is solved! Good programs to work with the proxy are: A4proxy, ProxySwitcher.
 

0 comments: