Welcome back ! Feel free to look around. If you like what you read, mention us in your post or link to this site. Hope to see you again

Thursday 1 March 2018

Follow Hackers Spot
\



If you are keen on locating the IP address of the person sending you messages that are keeping you troubled, here’s how you can track them down. Scroll through the following lines and find information that is useful to you....







Tracing Someone’s IP Address
Tracing IP Address on a Blog
Most of the blog and online journals provide you the facility of tracking the IP addresses of people who seem to be dicey and risky for you. Particularly, when you have been receiving continuous nasty comments or endless love messages, finding out the person behind such annoying situations becomes essentially important. Go to the setting or preference option under your blog account. You will notice an option stating about informing you the IP address of people commenting on your blog. Once this option has been checked in, you will be notified about a person making a comment in your blog through a small notice indicating that you are trying to track the IP address. If a visitor leaves a comment in your blog, you will be able to view the IP address of that person below his/her name or username.
Tracing IP Address in Gmail
If it’s a person in Gmail whom you wish to track down, then you probably will find this task easy and enjoying. All you need to do is log in to your account and open the message you wish to investigate. Reach to the place where date and time of the message are displayed. You will find an arrow on the right of the “reply” button. Click on the arrow and select “show original” from the dropdown menu. A new tab will open up on your screen with information about the sender and the message in HTML format. Locate the line beginning with “Received: from” in the first ten lines of the text. At the end of this line, you will notice numbers in brackets which is the IP address of the sender.
Tracing IP Address in Other Mail Programs
Just like Gmail, other mail programs follow the same procedure for finding the IP address of the sender, though with slight differences in some programs. Say for instance, in Yahoo, open the message you want to track and move to the extreme right bottom of the message that reads “select message encoding” with a dropdown menu. Next to this is a “full headers” link. Click on the link and you will be able to view a full header displaying “X-Originating-IP” showing the IP address of the sender. For Hotmail, open your account and click on the check box of the message to be decoded. Right click on the box and select “view message source” from the pop-up menu. Similar to Gmail, locate the “Received: from” line and you will find the sender’s IP address at the end of the line in brackets.
Tracing when More Than One IP Addresses are Listed
If you find more than one IP addresses listed under the message, the message is likely to be routed before it reached your inbox. In such a case, you can locate the original sender’s IP address by the address listed at the end of all the IP addresses.
Now that you know how to track anyone’s IP address, you can catch that person red-handed and stop any messages from being received further. Good luck!
Follow Hackers Spot

Before we see what SQL Injection is. We should know what SQL and Database are. You Can Get this in my previous post here :- link.

Now , Heres the STep by step Guide for " Sql Injection ".
Step 1: Finding Vulnerable Website:
Remmember, Google Uncle is always a Hackers friend. We can find the Vulnerable websites using Dork list. Google dork is searching for vulnerable websites using the google searching tricks. There is lot of tricks to search in google. But we are going to use "inurl:" command for finding the vulnerable websites.

Some Examples:
inurl:index.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:pageid=
inurlrofile_view.php?id=
inurl:category.php?id=
inurl:publications.php?id

How to use Google Dork?
Type one of the above command and paste in the Google search box & hit enter.
You will get list of web sites.
You need to check the vulnerability.So Start from the first website.

Step 2: Checking the Vulnerability:
Now we should check the vulnerability of websites. In order to check the vulnerability ,add the single quotes( ' ) at the end of the url and hit enter. (No space between the number and single quotes)

eg:- http://www.abc.com/index.php?id=2'

If the page remains in same page or showing that page not found or showing some other webpages. Then it is not vulnerable.

If it showing any errors which is related to sql query,then it is vulnerable.
eg:- You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1

Step 3: Finding Number of columns:
Now we have found the website is vulnerable. Next step is to find the number of columns in the table.
For that replace the single quotes(') with "order by n" statement.
p/s:- n are the numbers 1,2,3,4,,5,6,...n. Until you get the error like "unknown column ".

eg:- http://www.victimsite.com/index.php?id=705 order by 1,2,3,4,,5,6,7,8,9

You get an error like" Unknown Column no.(1,2,3..) in order clause ".
eg :-
Unknown Column 9 in order clause

if you get the error while trying the number,then no of column is "x-1"
i.e If you get an error at 9 then the no. is 9-1 = " 8 "
Sometime the above may not work. So, at that time add the "--" at the end of the statement.
For eg: http://www.victimsite.com/index.php?id=705 order by 1,2,3,4,,5,6,7,8,9--

Step 4: Displaying the Vulnerable columns:
Using "union select columns_sequence" we can find the vulnerable part of the table. Replace the "order by " with this statement. And change the id value to negative(i mean id=-2,must change,but in some website may work without changing).

Replace the columns_sequence with the no from 1 to x-1(number of columns) separated with commas(,).
if the number of columns is 4 ,then the query is as follow: http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,3,4,5,6,7,8--
It will show some numbers in the page whixh is less then the x no. i.e here 8.



Follow Hackers Spot
NetBIOS
NetBIOS stands for Network Basic Input Output System. It allows your LAN or WAN to share drives, folders, files and printers. Gaining access to a computer through NetBIOS is very simple and easy. The only thing required is for the target machine to have file and printer sharing enabled and to have port 139 open. Below I will show you an example of what a hacker would do to gain access to a Windows machine through NetBIOS.
1. First the hacker would search for a target. A common tool used by hackers is Angry IP Scanner . Download and install it.

2. Next the hacker would insert the IP range he would like to scan. If the hacker was connected to a WLAN (Wireless Local Area Network) he would scan the local computers like I have shown below.
3. Since the hacker’s goal is to gain access to a system through NetBIOS, which runs on port 139, he will choose to scan each found host for that port. Click the downward arrow on the right and check the Scan ports box. A popup will come up asking you if you would like to select a new port. Click YES.


4. Type in the port number 139 into the first box and click OK.

5. Click start. The program will begin scanning and when it’s complete a box with the results will come up.

6. As you can see 224 Ips were scanned. Out of those only one was alive and luckily it has port 139 open.

7. Open the Command Prompt by going to Start -> Run -> Type in cmd -> <ENTER> .
8. Now the hacker would run the “nbtstat –a TargetIPaddress” this will tell us if the target has file and printing enabled. Without it, this attack is not possible.

9. In the above image DAVIDS-MACHINE is the name of the target computer. If you look to the right of it you will see the number <20>. This means that file and printer sharing is enabled. If there was no <20> then you could not go any further and would have to find a new target.
10. Next the hacker would run the command “net view \\TargetIPaddress”. This command will display any shared drives, folders, files or printers. If nothing comes up, you won’t be able to gain access to anything since there is nothing being shared. In my case, I got the following:
11. In my example, I have two printers shared and one disk named SharedDocs. The hacker would be able to take control of my printers and view everything in my SharedDocs disk.
12. To gain access to my SharedDocs disk, the hacker would have to map out the drive onto his computer. If successful, the hacker will have all the contents of my drive on his computer.
13. To map out my drive onto his computer the hacker would use the command “net use G: \\TargetIPaddress\DriveName”. So in my case I would run the command “net use G:\\192.168.1.101\SharedDocs”. You can use any letter in place of G:\\. This just tells the computer what to name the drive on your computer.
14. What’s this? Looks like I already have a drive G. To avoid this problem, go to My Computer where it will show all of your current Drives. To fix this simply change the letter G to a nonexistent drive letter.

15. Once the command is completed successfully, go to My Computer and you should see a new drive under Network Drives. Double clicking it brings up all of the targets documents.

Intro. to Rats, Keylogger's , Malwares..etc.

Follow Hackers Spot


Hy Friends to day i will be writing about  Malware Programs.....I will introduce you here with all topics related to that so that you dont have any problem in reading and understanding the things discussed here...
Malware
Malware has been a problem for ages, Malware is short form of malicious software. A Malware is basically a program designed to infect a computer system without owner being informed.
Types of Malware
Malware exists in many forms, below mentioned are some of the common types of malware
1. Trojan Horse – Trojan virus or Trojan horse is one of the most common types of malware, Trojan virus is mostly used to control the victims computer rather than infecting or destroying files on victims computer. A Trojan horse once installed into victims computer can give a hacker complete access to your computer. Trojans are one of the most dangerous forms of malware.
2. Computer Viruses – A computer virus a malicious program which is mostly developed to infect a computer, once it infects a computer it replicates or reproduces itself. A virus is just like a parasite and it needs another host to attach to in order to infect a computer
3. Worms – Worms are almost similar to computer viruses the only difference unlike computer viruses they do not require another host to attach to in order to infect a computer. Once a worm infects a computer it replicates itself. Computer worms are major threats to large networks.
4. Keyloggers - A Keylogger is a hardware or software device which monitors every keystroke, screen shots, chats etc typed on the
Copyright 2011 Rafay baloch | http://rafayhackingarticles.blogspot.com Page 10
computer. A keylogger program does not require physical access to the user's computer. Any person with a basic knowledge of computer can use keylogger
5. RATS – RAT is the short of “Remote Administration Tool” and is indeed one of the most dangerous types of malware. It’s very similar to a Trojan. Once a RAT is installed in a computer the attacker can do almost anything on the remote computer such as installing a keylogger, shutting down a computer, infecting files etc.
6. Adware – Adware is the short form of Advertisement-supported software. Adware’s are commonly designed to display advertisements on your computers. However some of these adwares may contain harmful viruses and spying programs which can bring your computer system to knees.
So these are the most common types of malware, the next chapter will explain you all about keyloggers.
Copyright 2011 Rafay baloch | http://rafayhackingarticles.blogspot.com Page 11
Keyloggers
Keyloggers can be classified into two main types:
1. Hardware Keylogger
2. Software Keylogger



This is where software keyloggers come into play, Software keyloggers can also be classified into two types:
1. Local Keylogger
2. Remote Keylogger
Local Keylogger
Local Keyloggers are used to monitor local computers (May be your own Pc), they are very easy to install and are completely undetectable and it’s really hard to figure out once a keylogger is installed on a computer because usually keyloggers hide themselves from taskmanager, Windows Registry etc. Whenever you want to see logs, screenshots etc you just need to press a hotkey which (ex. Shift+Ctrl+F10).
There are hundreds of keyloggers available now days but some of them are userfriendly and are actually capable to hide themselves once they are installed, some of the Popular Local Keyloggers are:
1. Spyagent
2. AllSpy Keylogger
3. Refog keylogger

AVS Video Converter v6.2.3.314

Follow Hackers Spot

Best Hardware Keyloggers To Hack Passwords – PS2, USB, WiFi!

Follow Hackers Spot



Just like Software Keyloggers Hardware keyloggers also captures each keystroke the user types but requires you to be present at victims place. There are many advantages of using Hardware keylogger over Software keylogger, some of them are: Hardware keyloggers does not need system access for installation, Invulnerable to security scanners, Stores over a billion keystrokes because of the Fact That they Posses Internal memory of upto 2GB. Also they are easy to use and 100% safe to USE. Because there is nothing installed on the hard drive, it is undetectable by all anti-spy and eraser software.

Also Read: Sniper Spy – Best software Keylogger with Remote Spying Technology!

Features of hardware Keyloggers:

  • Installs in 5 seconds, simply plug it in and Can be installed even if the computer is switched off.
  • Can be installed without logging into the computer and Data inside device is encrypted
  • Device is invisible to software running on the host PC, so it is Undetectable by virus scanners.
  • Works on any operating system – Windows, Macintosh or Linux.
  • Superior backup -If the operating system crashes, the data inside the keylogger is still safe

-How Hardware Keylogger Can help you ?


For Hackers:
• Hackers can use this to hack into Facebook, Twitter or any email Account of friends and Relatives.


For Employers:
• Monitor employee productivity, chats, websites visited
• Detect unauthorized access attempts, Backup typed text


For Parents and Spouse:
• Observe websites visited By your Child and activities on Web.
• Allows you to monitor Cheating Spouse’s activities on Web.


-Key Cobra – Best Hardware Keylogger Manufacturer!


Key Cobra is one of the Best Company in the industry and Provide Best Hardware Keyloggers at reasonable Price. compatible with all three operating systems windows, Linux and Mac OS. All Key Cobra keyloggers posses Advanced text menu for viewing recorded data, includes Net Detective, Phrase Search, Key Filtering, Unplug Counter and more.

Current Promo - Order ANY KeyCobra Hardware Keylogger & Receive 2 Gifts
#1
USB Download Accelerator
#2
Invisible PC Keylogger Pro For Free!

Key Cobra Provides 3 types of hardware Keyloggers:

PS2 Hardware Keylogger


ps2 grey md Best Hardware Keyloggers To Hack PasswordsThe most advanced PS/2 hardware keylogger available on the market. This keystroke recorder comes in a standard version – 4MB memory capacity, 2,000,000 keystrokes (over 1,000 pages of text), and a Venom version 2 billion keystrokes (over 1 million pages of text), organized into an advanced flash FAT file system. This hardware keylogger features a text menu with loads of options for analyzing recorded data.
Know More about PS2 Hardware Keylogger

Best USB Keylogger


Best USB  Hardware Keyloggers To Hack PasswordsNew Keycobra USB Keyloggers are the world’s smallest & smartest USB keylogger that can store over a billion keystrokes and organizes everything into an advanced flash FAT file system. Switching into Flash Drive mode allows for super fast data retrieval and download. There is no software or drivers rerquired and is completely transparent from computer operation. KeyCobra USB keylogger works on USB keyboards for PC and MAC computers.
Know More about USB Keylogger

New WiFi Keylogger

wifi_keylogger Best Hardware Keyloggers To Hack PasswordsKeyCobra Provides world’s smallest and smartest Wifi hardware keylogger! This wireless wifi keylogger is packed with state-of-the-art electronics: two powerful processors, a full TCP/IP stack, a WLAN transceiver, and 2 Gigabytes of memory. It features remote access over the Internet. This wireless keylogger will connect to a local Wi-Fi Access Point, and send E-mails containing recorded keystroke data. You can also connect to the keylogger at any time over TCP/IP and view the captured log. All this is a device less than 2 inches (5 cm) long and Supports All Types of Keyboards.
Know More about WiFi Keylogger


SniperSpy Keylogger – Best Remote Spy Software for Windows & Mac

Follow Hackers Spot

Unlike other remote Spy Softwares, SniperSpy allows you to remotely watch your victims computer like a television! Watch what happens on the screen LIVE!. The program then records user activities and sends the data to your online account. No physical access to your remote PC is needed. The software also saves screen shots along with text logs of chats, web sites, keystrokes in any language and more. That means you can Remotely Spy on your children, employees or Spouse. SniperSpy is fully and completely compatible with any firewall including Windows XP, Windows Vista and add-on firewalls.
Download SniperSpy for Free
The word Remote tells that you can install this Software Remotely on any PC via email or any other means. ie No physical access to your remote PC is needed to install the spy software. Once installed The program then records user activities and sends the data to your online account. The Data Includes chat Conversations, visited websites, usernames, passwords, keystrokes and more, with screenshots. You can also view the screen LIVE and browse the file system from anywhere anytime.

-What You can do with SniperSpy?

  • View the Screen LIVE including LIVE Keystrokes
  • Browse the File System and Download Remote Files
  • View / Kill Processes or Launch an Application
  • View Browser History and Launch a URL
  • View System Information and Locations on a Map
  • Send Message to User or Logoff User
  • Restart or Shutdown PC
  • Freeze/Unfreeze Mouse and Run Screensaver
Also See: Best Hardware Keyloggers To Hack Passwords – PS2, USB, WiFi!

-Why Do I need This Software?

For Partners: Do you Suspect that your Spouse is cheating on you AND you do not have hard evidence to prove it? Consider Installing SniperSpy, it not only gives you the Complete activity of your Spouse but also provides enough Screen shots and Chat history that can serve as the clear evidence against your Cheating Spouse
For Parents: Does your child spends most of their time before their computers? If your children spend time chatting or playing computer games, they can be approached by the strangers. In other words they are exposed to potentially Dangerous things like PORN, Gambling, Dating Strangers, etc. In this Case SniperSpy is the best solution to Monitor and control the Online Activity of your child.
For Employers: Do all your employees use their computer resources and Internet connection solely for your business? Do they work as hard as you? OR Do you suspect your employee’s productivity is lacking? You should consider installing This Remote Software that can serve as the best Employee Monitoring Software for Small business.
For Hackers: Are you looking for any easy way to hack into someones facebook or Myspace accounts ? or wanna control someones facebook account? SniperSpy can expose you all the Keystrokes entered by your victim including Usernames and Passwords for any websites.

-Control Panel ScreenShots:

- – - - - -

-How SniperSpy Works?

How sniperSpy works
  1. Once you Buy the Software, you will be instantly emailed your Username/Password and a link to download the Module Creator program. You will download this program to your local computer in order to create the module to send to your remote computer. Module Creator will create your .EXE file with name you selected. for ex: funny.exe, video.exe
  2. Second Step is to Send the exe file to your Remote PC via email. Once your Victim Runs the exe file on His PC, the Monitoring Begins. All the Activity data are then uploaded to the SniperSpy Server Continuously.
  3. The last Step is to Login to your SniperSpy Account. Here You will be able to view all the recorded activity including Screenshots, Keylogs, Chat history and many more. Logs are updated every six minutes. No matter where you are, you can log into your SniperSpy account from any Internet connection.

-Download your SniperSpy Copy Below:

Tuesday 18 December 2012

@^ Windows SHorcuts/!

Follow Hackers Spot

 

Welcome Visiters, this is Ankit Jaiswal with some intresting but old stuffs but with a gurantee that you will explore and will find it intresting.
 
It had been a long time from my blog but thanks to you all "Visiters". 
 
SO, now have something worthy - Here is the list of @26 hidden Windows shortcut which you may seldom use.!!!

To run any of these apps go to Start > Run and type the executable name () and press Enter.

1. Character Map (charmap.exe) - Very useful for finding unusual characters. 

2.  Disk Cleanup (cleanmgr.exe) – The usual Disc cleanup. 
3.  Clipboard Viewer (clipbrd.exe) - Views contents of Windows clipboard. 
4.  Dr Watson (drwtsn32.exe) - Troubleshooting tool,runs when windows crashes.
5.  DirectX diagnosis (dxdiag.exe) - Diagnose & test DirectX, video & sound cards.
6.  Private character editor (eudcedit.exe) - Allows creation or modification of characters.
7.  IExpress Wizard (iexpress.exe) - Create self-extracting / self-installing package. 
8.  Microsoft Synchronization Manager (mobsync.exe) - Appears to allow synchronization of files on the network for when working offline. Apparently undocumented.
9.  Windows Media Player 5.1(mplay32.exe) - Retro version of Media Player, very basic. 
10.ODBC Data Source Administrator (odbcad32.exe) – Database connection utility for support with external servers,create ODBC data sources,to administer remote databases or for supporting the ODBC database utility in Visual basic language. 
11. Object Packager (packager.exe) - To do with packaging objects for insertion in files, appears to have comprehensive help files. 
12. System Monitor (perfmon.exe) - Very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for budding uber-geeks only. 
13. Program Manager (progman.exe) - Legacy Windows 3.x desktop shell.
14.  Remote Access phone book (rasphone.exe) - Documentation is virtually non-existent.
15.  Registry Editor (regedt32.exe or regedit.exe) – For making custom changes or hacking theWindows Registry.
16.  Network shared folder wizard (shrpubw.exe) - Creates shared folders on network. 
17. 34 Copyright ©2009 Leo Impact Security Services Pvt LtdFile signature verification tool (sigverif.exe) - This tool will search the operating system and identify any unsigned device drivers installed on the system. It will also verify all signed device drivers. 
18. Volume Control (sndvol32.exe) - I've included this for those people that lose it from the System Notification area.
19.  System Configuration Editor (sysedit.exe) - Modify System.ini & Win.ini just like in Win98!
20.  Syskey (syskey.exe) - Secures XP Account database, use with care, it's virtuallyundocumented but it appears to encrypt all passwords, I'm not sure of the full implications. 
21. Microsoft Telnet Client (telnet.exe) – Built in telnet client which can be used to connect to servers to sent emails or to hack :) This is disabled in in vista but you can re-enable it by going to Control panel –> Programs and Features –> Click "Turn Windows features on or off" on left –> Scroll down and check "Telnet Client.
22.  Driver Verifier Manager (verifier.exe) - Seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented. 
23. Windows for Workgroups Chat (winchat.exe) - Appears to be an old NT utility to allow chat sessions over a LAN, help files available. 
25. System configuration (msconfig.exe) - Can use to control startup programs, make changes to startup of XP.
26.  Group Policy Editor (gpedit.msc) - Used to manage group policies, and permissions.Its an Administrator only tool.

THANKS for Visiting//!!

























Monday 26 March 2012

Hide Ip Address Using Online Proxies.

Follow Hackers Spot
Want to visit websites but without being traced out??Hack SItes ??
Use online proxies to hide ur originall Ip from being traced .
Now be anonymus using
Online Proxies.
Online proxy sites:-

1. www.hidemyass.com

2. www.anonymizer.ru

3. http://bind2.com/

४.http://www.free-web-proxy.de/
For more Go to google and searc Online Web proxy. You will get a pocket full of sites, Becoz गूगल इस ओउर फ्रेंड।

Cracking Windows Passwords (with OphCrack)

Follow Hackers Spot
Cracking Windows Passwords

To crack Windows XP and Windows Vista passwords, we will use the program called ophcrack. Ophcrack is a Windows only password cracker, and it uses rainbow tables to get the job done quickly. It cracks passwords for both Windows XP and Vista but it is more powerful on XP because Vista fixed the security hole that allowed XP to crack passwords easily. Windows uses a couple a couple types of hashes. One of them is the LM (Lan Manager) hash. If a password is longer than seven characters, then it is split into seven character chunks, made into all uppercase, and then hashed with the DES encryption. Because it is split into parts and made all uppercase, the total number of different password combinations goes down significantly, and makes it easier for hackers to crack the password. The Windows password hashes are stored in a couple places:

• In the C:\WINDOWS\system32\config directory where it is locked to all accounts but the system account which you don’t have access to.
• In the registry: HKEY_LOCAL_MACHINES where it is also locked for all users.

So you might be wondering, how can I get a copy of those hashes? There are a couple ways.

• Boot from a Linux live CD and copy the SAM file onto a USB or floppy disk.
• Use the PWDUMP program that comes with ophcrack to trick the registry into giving up the hashes.

..........................................................................................................................................................................
1. First download and install ophcrack. As you can see there are two versions. In this example we will be using the program itself in windows, so download the first option.
2. Once you have it downloaded, install it. When the option comes up to download rainbow tables, unclick them all and just install the program. It is better to download the rainbow tables separately.

3. Once it is installed, go to the ophcrack website and click on Tables in the navigation. This will display all the tables you can download. As you can see, the more characters covered, the bigger the table gets. Choose the correct table for your operating system.


4. In the example, I chose the largest possible free table. Next run ophcrack and click on tables. Select the table you downloaded and click Install to locate the file on your computer. Hit OK to continue.

5. Next we will be running PWDUMP to obtain the password hashes. Make sure all of your anti-virus and anti-spyware programs are disabled because most anti-virus programs mistake PWDUMP for a malicious program since it accesses the system files. If you don’t disable the anti-virus program PWDUMP will fail in retrieving the hashes.

6. Click Load and select Local SAM. This will load all the password hashes for all the users on your computer and display them.



7. Next click Crack and the program will begin to crack the password hashes.

8. Once the program finishes cracking, you should see a screen similar to the following:



9. As you can see, two out of three of my account passwords were cracked in a matter of a couple minutes.

• ANKIT : lolcats
• Hackers Spot: not found
• Akki: Christmas02.