Archive for July 2011


INTRODUCTION :Many Windows users here are struggling to hack WiFi networks because most of the tutorials are based on BackTrack and other Linux Tools .

Im just sharing the method to Crack WiFi networks using WEP security protocol . The WEP is a very vuarable to attacks and can be cracked 
easily . 
It takes about 5-6 hours if the password is weak a high signal of the WiFi network you are going to hack and you have sometimes 10-12 for more complicated passwords and if the WiFi signal of the Network is weak .
The time taken also changes if the WiFi network you are going to hack has many other clients already accessing it .

You will be using two tools .
1.Commview for WiFi :
You will use this tool for capturing the packets sent and recieved through the Access Point you are going to hack .
The more packets you capture the better chances of cracking the password .
You will need more than 1,00,000 minium packets to crack the password .
The packets will be captured in the .ncp format . 
You will use this tool to convert the .ncp to .cap .

NOTE : Some WiFi cards are supported by Commview only in Windows 7 so i suggest you install Win 7 in ur Virtual Machine if ur card isnt supported .

2.Aircrack-Ng GUI :
You will use this tool to crack the password of the Access Point using the .cap files you obtained from the Commview application .

NOTE : You need to run this as administrator .

I have provided links for both the software below .

Download Links :

These are the links to the official website of the tools .
Some Anti Viruses might detect Aircrack as a virus . It is a false positive .

1.Aircrack-NG GUI 
Get it from here :

2.Commview for Wifi 
Get it from here :


STEP 1 :1.Install CommView for WiFi . It doesnt matter whether you install it in VoIP mode or Standard mode . I used VoIP .
It automatically installs the necessary drivers . Allow it to install . 

NOTE : You will not be able to connect to any Network using WiFi when using CommView .

STEP 2 :2.Click on the PLAY ICON in the Left First .

[Image: 1hjh.png]

STEP 3 (Choosing the Network (a) ) : A new window should pop up now . 
Click on the START SCANNING button .

[Image: 2tit.png]

STEP 4 (Choosing the Network (b) ) :Click on the WiFi network you want to hack in the Right Coulumn and Click on CAPTURE.
NOTE : This tutorial is only for WEP protected networks .

[Image: 3.png]

STEP 5 (Capturing the Packets) :The windows should close now and you should see that CommView has started Capturing Packets .

[Image: 4.png]

STEP 6 (Saving the Packets ) :Now that the Packets are getting captured you need to Save them.
Click on Settings->Options->Memory Usage
Change Maximum Packets in buffer to 20000

[Image: 9gyg.png]

Click on the LOGGING Tab .
In the Maximum Directory Size : 2000
Average Log File Size : 20

[Image: 7.png]
Now CommView will automatically Start Saving packets in the .ncp format at a size of 20MB each in the specified directory .

STEP 7 ( Concatenating the Logs ) :Since you are capturing a lot of logs you will need to concatenate them into once file .
To do this go to Logging and click on CONCATENATE LOGS 
Choose all the files that have been saved in your specified folder and Concatenate them .

Now you will have one .ncf file .

STEP 8 (Converting .ncf to .cap ) :Now that you have one file with all the packets you need to Convert it into .cap file for AIRCRACK to crack .
Click on File->Log Viewer->Load Commview Logs-> Choose the .ncf file 
Now File->Export->Wireshark/TCP dump format .


Aircrack Part :

Now for the Second Part Cracking this is very simple .

Just open the Aircrack Folder->Bin->Aircrack-ng GUI.exe

Choose the .cap file and you should be able to do the others .

If you have any questions or having problems post a thread il reply .

This is a simple tutorial . There is more advance using the rules and stuff but I havnt used it yet . This worked for me . Hope you found it useful .

Took a lot of time . Please leave your feedback.

Happy Hacking !

This article was originally Published on :,
i am just spreading the word and take no credit for writing this article!
Tuesday, July 26, 2011
Posted by Anonymous


Sharecash Downloader v1


[Image: FJ45c.png]

Using Instructions:

1. Run the file.
2. Enter the mirrored link of Sharecash like , ,etc.
3. Click Navigate button.
4. After almost a minute, click download and it would prompt you something like below if you did everything right:

[Image: DtTpl.png]


The survey for the download is nothing compared to what you gonna use for all further downloads & my work put upon it, any leechers would be banned/reported if found doing so, you are not allowed to share it in any way without my permissions.

Virus Scan:

Monday, July 25, 2011
Posted by Anonymous

How to Hack Facebook, Myspace, Tagged, Orkut, Hotmail, Gmail.

Well this is the question in every bodies mind that how can we hack a email account or How do others do it. When I started reading about Hacking I also search about this question and search for the Soft wares that can do it for me but there was nothing that work. Then comes the websites like that claim to hack 98% of facebook accounts for only 140 euros. But that is a BIG FRAUD. So question comes to mind How do we Hack the Accounts.

In real there are 5 ways to hack any account and they all work but there are not easy and not 100% efficient but with time you can master them all. The ways Are

1): Key logging
2): Phising
3): Brute force
4): Social Engineering (I call it Hacking the human ;) )
5): Guessing the Security Password.

I will Post a detailed Articles about all these ways soon but summaries are as following.

KEYLOGGING: Keylogging is the way in which you sent a Keylogger remotely or install it on a computer to which you have Physical access. Keylogger is a Program that note down every thing a user write on a computer and some Keyloggers also capture the Pictures of the screen. SO with this way you can Know the Password that the user write.

Phising: Phising is the way in which a person is tricked to go to a Fake website exactly like the real one (e.g. Facebook). And if that person enter the password then the password is stored in the website that the Hackers can get. This way works very well with Stupids ;)

Brute Force: Brute force is the way of hacking in which software try every possible password. This way is 100% accurate but it can take millions of years to complete. So it is complete failure most of times.

Social Engineering: This way is really efficient with your friend whome you can trick to tell you the sensitive information like asking them to accept a keylogger an trick the to tell you their security Question’s answer.

Guessing the Security Password: This way can be the easiest or most difficult. But if you know the person then you can easily answer the question
Saturday, July 23, 2011
Posted by Anonymous

How To Use A Keylogger Inside Metasploit Using Meterpreter?

Well, I have made lots of posts on keyloggingindeed I have dedicated a whole book to this topic "An Introduction To keyloggers, RATS And Malware" which is available as a free download, Now If you are a regular reader of this blog thechances are very less that you might not know about keyloggers as I have written about it over and over agai. However in this post I will guide you simple ways to use a keylogger inside Meteasploit once you have opened up a meterpreter session with victims computer.  For those of you who don't know what metasploit is kindly refer the post "Metasploit For Beginners Explained"

What is a Meterpreter?

Basically a meterpeter is a simple type of interface which helps us in compltety automating the exploitation process. If you would like to learn furthur about meterpreter kindly do a google search.


  • Metasploit Framework
  • BackTrack 5
  • A Meterpreter session opened on a box
How To Use A Keylogger Inside Metasploit Using Meterpreter?

In this case I am using metasploit framework from backtrack 5, Backtrack 5 is an awesome linux distro which is specially dedicated to hackers and penetration testers, I have used Social Engineering Toolkit to utilize a browser autopwn in order to open up a meterpreter session on the victims computer.

Step 1 -  Before we start the keylogger and start capturing logs, we would need to migrate explorer.exe process as we don't want the our exploit to get closed, In order to migrate the process we would need the PID of the process, In order to get the PID type "PS" on the command line.

Step 2 - Once you know the exact process PID type "Migrate" command along with with the PID so incase if the PID is 1372, you will type "Migrate 1372"

Step 3 - Now just type "Keyscan_start" to start the keylogger.

Step 4 - Now just sit back and relax, In order to harvest keystores all you need to do is type the "Keyscan_dump" command.

This article is originally written by Rafay Baloch and he blogs at . To know more about him see this:
Thursday, July 21, 2011
Posted by Anonymous

10 Most Popular Torrent Sites.

1The Pirate Bay (Alexa Rank: 76 / Compete Rank: 412 / Last year #1)

2. Torrent (Alexa Rank: 164 / Compete Rank: 927 / Last year #2)

3. IsoHunt (Alexa Rank: 194 / Compete Rank: 2,154 / Last year #3)

4. KickassTorrents (Alexa Rank: 289 / Compete Rank: 897 / Last year #11)

5. BTjunkie (Alexa Rank: 299 / Compete Rank: 987 / Last year #5)

6. (Alexa Rank: 465 / Compete Rank: 1,647 / Last year #20)

7. (Alexa Rank: 519 / Compete Rank: 2,208 / Last year #9)

8. (Alexa Rank: 736 / Compete Rank: 1,119 / Last year #7)

9. TorrentReactor (Alexa Rank: 1,088 / Compete Rank: 1,972 / Last year #6)

10. (Alexa Rank: 1,160 / Compete Rank: 7,127 / Last year #na)

Tuesday, July 19, 2011
Posted by Anonymous

3 Best Torrent Sites!

The Following are the best Torrent Sites!

1: The Pirate Bay (

The Pirate Bay (commonly abbreviated TPB) is a Swedish website that provides magnet links. It bills itself as "The world's most resilient bittorrent site"and as of 6 July 2011 is ranked as the 88th most popular website in the world and 16th in Sweden by Alexa Internet and has over 4 million registered users. According to the Los Angeles Times, The Pirate Bay is "one of the world's largest facilitators of illegal downloading" and "the most visible member of a burgeoning international anti-copyright or pro-piracy movement". (Wikipedia)

2: Demonoid (

Demonoid is a website and BitTorrent tracker created by an anonymous Serb known only by the pseudonyms "Deimos" and "Zajson". The website indexes torrents uploaded by its members. was ranked the 502nd most popular website overall in December 2010, according to Alexa.Demonoid's torrent tracker had an estimated three million peers in September 2007.The site had over 252,427 torrents indexed as of May 3, 2009 (torrents uploaded prior to August 4, 2005 were removed to free server resources). (Wikipedia)

3: isoHunt (

isoHunt is a BitTorrent index with over 1.7 million torrents in its database and 20 million peers from indexed torrents. With 7.4 million unique visitors as of May 2006, isoHunt is one of the most popular BitTorrent search engines. Thousands of torrents are added to and deleted from it every day. Users of isoHunt perform over 40 million unique searches per month. On October 19, 2008, isoHunt passed the 1 petabyte mark for torrents indexed globally. The site is the third most popular BitTorrent site as of 2008. According to isoHunt, the total amount of shared content was more than 10.01 petabytes as of November 22, 2009.
Monday, July 18, 2011
Posted by Anonymous

Get Free Google plus (+) invitation here!

Well if you people are tired up of seeing that same message that Google + is still not public, then I have a solution. You can get the invitation for free.
All you have to do is to like my facebook page and post your email on it's wall and you will get invitation within 12 hours!
My Facebook Page:
Posted by Anonymous
Tag :

Browser Based Hacking Framework - Mantra Security Toolkit 0.6.1 Released

Mantra is a collection of free and open source tools integrated into a web browser, which can become handy for students, penetration testers, web application developers,security professionals etc. It is portable, ready-to-run, compact and follows the true spirit of free and open source software.

The software is intended to be lite, flexible, portable and user friendly with a nice graphical user interface. You can carry it in memory cards, flash drives, CD/DVDs, etc. It can be run natively on Linux, Windows and Mac platforms. It can also be installed on to your system within minutes. Mantra is absolutely free of cost and takes no time for you to set up.

Mantra can be very helpful in performing all the five phases of attacks including reconnaissance, scanning and enumeration, gaining access, escalation of privileges, maintaining access, and covering tracks. Apart from that it also contains a set of tools targeted for web developers and code debuggers which makes it handy for both offensive security and defensive security related tasks.
Project Goals
  • Create an ecosystem for hackers based on browser
  • To bring the attention of security people to the potential of a browser based security platform
  • Provide easy to use and portable platform for demonstrating common web based attacks( read training )
  • To associate with other security tools/products to make a better environment.
You can download Mantra 0.6.1 here:
Linux 32-bit – Mantra Security Toolkit – Gandiva.tar.bz2
Windows – OWASP Mantra Security Toolkit – Gandiva.exe
Or read more here.
Saturday, July 16, 2011
Posted by Anonymous

How to : Download free Videos from Megavideo.

Recently i was watching some Tv Dramas on Megavideo and wondered if i could download the. There is built-in option for download of videos in Megavideo but that is only for Premium Users. So i found a way to download the videos for free.
The website that is used to download the Videos for free is . The procedure to download the Videos is simple. All you have to do is give link and then  click "Begin Download" Button.

Video Tutorial
Wednesday, July 13, 2011
Posted by Anonymous

Popular Post


- Copyright © _.:Learn To Hack:._ :: Hacking Tutorials :: Warez -Metrominimalist- Powered by Blogger - Designed by Johanes Djogan -