Wednesday 16 May 2012

[TUT] Making a deface page [TUT]


We will do this in notepad. So open notepad.

First of we start off with our title.


Code:
<html>
<title> Hacked by V </title>

Then we should add something like a picture.

Code:
<center>
<img src="http://www.sociallyencrypted.net/images/g/se_logo_SH_w1_big_origclr_blue_texture.png"/>

Then we add our moving text.

Code:
<body onLoad="type_text()" ; bgColor=black text=#00FFFF>
<div style="width: 600px;height: 100px;" align="center">
<script language="Javascript">

To make our writing show it is important you do it in this format.

Code:
"Hello there, you can call me V",
"This is my deface page tutorial",
"I hope this tutorial is useful"

After every line we write you have to add the , for every new line. It is important you don't do it for your last line of text though.

After we have written all our text we use this piece of code.

Code:
);
);
var speed=100;
var index=0; text_pos=0;
var str_length=tl[0].length;
var contents, row;

function type_text()
{
contents='';
row=Math.max(0,index-40);
while(row<index)
contents += tl[row++] + '\r\n';
document.forms[0].elements[0].value = contents + tl[index].substring(0,text_pos) + "_";
if(text_pos++==str_length)
{
text_pos=0;
index++;
if(index!=tl.length)
{
str_length=tl[index].length;
setTimeout("type_text()",300);
}
} else
setTimeout("type_text()",speed);
}

Once we have done this we can close our script tags and we will have this so far.

Code:
<html>
<title>Hacked by V</title>
<center>
<img src="http://www.sociallyencrypted.net/images/g/se_logo_SH_w1_big_origclr_blue_texture.png"/>
<body onLoad="type_text()" ; bgColor=black text=#00FFFF>
<div style="width: 600px;height: 100px;" align="center">
<script language="Javascript">
var tl=new Array(
"Hello there, you can call me V",
"This my deface page tutorial",
"I hope this tutorial is useful"
);
var speed=100;
var index=0; text_pos=0;
var str_length=tl[0].length;
var contents, row;

function type_text()
{
contents='';
row=Math.max(0,index-40);
while(row<index)
contents += tl[row++] + '\r\n';
document.forms[0].elements[0].value = contents + tl[index].substring(0,text_pos) + "_";
if(text_pos++==str_length)
{
text_pos=0;
index++;
if(index!=tl.length)
{
str_length=tl[index].length;
setTimeout("type_text()",300);
}
} else
setTimeout("type_text()",speed);
}
</script>

Now we add our music to make it a little more interesting.

Code:
<p align="center">
<form><textarea style="width:400px; height:400px; border:0px solid gray; resize:none; background-color:black;color:red; outline:0; padding:50px; border-radius:30px; -webkit-box-shadow:0px 0px 20px 1px gray;" name="about" readonly="readonly"
wrap="soft"></textarea></form></p>
</div>
<br><br><br><br><br><br><br><br><br><br><br><br><br><br>
<center><font color=#00FFFF></font></center>
<center><font color=#00FFFF></font></center>
<embed src="http://www.youtube.com/v/8pybAiBOupw&feature=plcp&context=C327ab00UDOEgsToPDskLGfjUZBwtQyDiT-NOUqQ8i&autoplay=1" type="application/x-shockwave-flash" wmode="transparent" width="1" height="1"></embed>
</center>

Now for our finished piece we have.

Code:
<html>
<head>
<title>Hacked by V</title>
<center>
<img src="http://www.sociallyencrypted.net/images/g/se_logo_SH_w1_big_origclr_blue_texture.png"/>
<body onLoad="type_text()" ; bgColor=black text=#00FFFF>
<div style="width: 600px;height: 100px;" align="center">
<script language="Javascript">
var tl=new Array(
"Hello there, you can call me V",
"This is my deface page tutorial",
"I hope this tutorial is useful"
);
var speed=100;
var index=0; text_pos=0;
var str_length=tl[0].length;
var contents, row;

function type_text()
{
contents='';
row=Math.max(0,index-40);
while(row<index)
contents += tl[row++] + '\r\n';
document.forms[0].elements[0].value = contents + tl[index].substring(0,text_pos) + "_";
if(text_pos++==str_length)
{
text_pos=0;
index++;
if(index!=tl.length)
{
str_length=tl[index].length;
setTimeout("type_text()",300);
}
} else
setTimeout("type_text()",speed);
}
</script>
<p align="center">
<form><textarea style="width:400px; height:400px; border:0px solid gray; resize:none; background-color:black;color:red; outline:0; padding:50px; border-radius:30px; -webkit-box-shadow:0px 0px 20px 1px gray;" name="about" readonly="readonly"
wrap="soft"></textarea></form></p>
</div>
<br><br><br><br><br><br><br><br><br><br><br><br><br><br>
<center><font color=#00FFFF></font></center>
<center><font color=#00FFFF></font></center>
<embed src="http://www.youtube.com/v/8pybAiBOupw&feature=plcp&context=C327ab00UDOEgsToPDskLGfjUZBwtQyDiT-NOUqQ8i&autoplay=1" type="application/x-shockwave-flash" wmode="transparent" width="1" height="1"></embed>
</center>
</body>
</html>

Save it as .html and voila you have finished

Our finished piece. http://pastehtml.com/view/boom4o7vj.html

Thank you for reading my tutorial and good luck on making your deface page.
Read More

Thursday 10 May 2012

Brute Force Hotmail Accounts (live.com) ▄▀

I would like you all to test this and give me a feedback :)

Feature

-Brute force multiple windows live accounts at a time ! This is one of the greatest feature of this tool.

Screen Shot



[Image: 9.jpg]

Instructions

Open the pass.txt file and replace 123456 with you password list[you can add as much as password you want]

Open the email.txt file and replace all mails with your mails.[you can add as much account you want]

Open nBrute force v1.3 and click on start ! No. of threads must not be less than the no. of email & passwords provided.

[To close the program make sure you exit it from task bar]

Download

http://www.mediafire.com/?epxr3w73bb5cb5u

Post on this thread and I will PM you the password, do not PM me.

Virus Scan

File Info

Report date: 2012-03-11 16:20:43 (GMT 1)
File name: brute-hotmail-rar
File size: 31113 bytes
MD5 Hash: 34796a8f76b339a2f56826596d610e96
SHA1 Hash: f63682f66130fc31f9d1e0bf403027e6034f1d29
Detection rate: 0 on 9 (0%)
Status: CLEAN

Detections

Avast -
AVG -
Avira AntiVir -
ClamAV -
Comodo -
Emsisoft -
F-Prot -
Ikarus -
TrendMicro -

Scan report generated by
NoVirusThanks.org
Read More

Wednesday 9 May 2012

I will try to make this as noob friendly as possible, and explain everything as I go.

Step 1: The Email


[Image: RldN2p.png]

After you downloaded the program, open it up and you should see the builder. Input YOUR email username & password into the boxes. The reason we are doing this is because the keylogger will log INTO your email, then email yourself the logs. I recommend making a new email specifically for keylogging.

[Image: 1doho8.png]

Select what email provider you are using here. If you are using gmail, select the first provider, if you are using yahoo, select the second provider, if you are using hotmail or live, select the third option.
[Image: FXuN8y.png]

Input the subject of the message you will receive every time you receive a keylog. Most people put "Runescape Logger" or something similar.

[Image: BfqODP.png]

I recommend checking both of these boxes. The computer info will send the slave's IP address and their computer name. The screenshot will send a picture of the slave's screen whenever the log was sent.
[Image: vJK3FT.png]

This is the time in between the logs. I usually recommend 5-15 minutes.

At this point I suggest you click Test Email and make sure everything is working fine.

--


Step 2: The Icon

[Image: 900nct.png]
This is what the Icon of the output file will be. It will ONLY take in .ico's. If you do not have any, I suggest either downloading them online, or you can get some from this thread: http://www.hackforums.net/showthread.php?tid=1107879

Some anti-viruses will detect an icon if it has been used before for malware, so I recommend getting some more obscure icons that have not been used before. After you locate the .ico it should appear in the box located to the right of the browse button.

--


Step 3: Options

Click the Extra Options Tab at the top of the builder.

[Image: PaVLpK.png]

The add to startup option will make the slave file go on startup on the slave's computer, so whenever he reboots his computer, he will become keylogged again. The melt option will make the file go hidden when it is first run. I usually recommend that you check both of them.

[Image: 9ON8ZI.png]

This option will allow you to display an error message when the file is first run by the slave. Common messages are "This file is not compatible with your computer."

[Image: BrHaGi.png]

The Use Downloader function will download and execute a file on the first run of the slave file. You can do this if you want it to execute many different viruses, its a better alternative to binding. Make sure you put a direct link to the file.

The Website Visitor function will automatically visit the website on run. It will pop up in the default web browser.

[Image: 5QkH5b.png]

I strongly recommend that you check both of these functions. They will decrease the detection rate and make your logger more secure from whalers. I also recommend that you click Generate Key a few times to get a unique key. This is generating an encryption key to keep all of your information secure.

--


Step 4: Assembly

Now click on the Assembly & Build Tab.

[Image: PyQ23Y.png]

Click the "Randomly Generate" button. Now you can change the assembly to whatever you want it to say. For example, if you want to disguise this as a runescape product, you should change the company to "Jagex LTD." and the Product to "Runescape" and the Copyright to "Jagex LTD. All Rights Reserved". I do not suggest changing the version and File Version.

Below is an example:
[Image: aMYtM8.png]

[Image: GAdQLx.png]

This is a file pumper, it will increase the size of the output file. You should keep this at 0 unless you want to increase the size of your slave file.

--


Step 5: Build

[Image: sHtgMl.png]

Change the File Name to whatever you are disguising the file as, for example you can change it to "Runescape Pin Generator". Now click build. Wait a bit and it should give you the following message:

[Image: s8xnTP.png]

All you have to do now is go to the folder where your builder is located and you should notice your slave file. You can send it to all your friends now! Remember, to tell which anti-viruses detect your file ONLY use elementscanner.com. Do not use ANY other site.
Read More

Saturday 5 May 2012

[TUT] How to get free Steam Accounts [TUT]

Here is how to reverse hackers software and get access to all the accounts that hacker has scammed from users / viewers. Have you ever seen videos on Youtube where someone is advertising a special "Account Upgrader" or some "Free steam hack" software. And you simply just enter your users username and password and it will upgrade your account or give you free steams.

Well as you probably guessed this is a scam. But not all people know this, some people actually write their real username and passwords in these programs hoping that they'll get the upgrade or the free furniture.

What we are doing to day is hacking the hackers software and getting access to all his logs. This way we'll be able to see all the people that have entered their username and passwords into the hackers scamming program.

Requirements

PC/Linux
Youtube
Red Gate's .Net Reflector

1. To begin simply download Red Gate's .Net Reflector by clicking HERE

2. Now we need to find our slave. Go to Youtube and search for something like "Steam Account Upgrade", "Free Steam Games", "Free Habbo Furniture", "Free Habbo" etc.
Note: You do not want to find a video with 100 000 views since someone already has done this method on it. Instead try to find a video with 1000-500 views.

3.Here is a example of a good slave.


[Image: 56177528.png]

4. Download his/her software.
Note: Some people not only scam the user but also infect the file so be careful and scan it with Virustotal before opening the file.

5. Now drag the file into Red Gate's Decompiler.

[Image: steamxm.jpg]

6. Now search around for the username and password of the email address that it will send the accounts to.

[Image: themuf.jpg]

Now this email will contain hundreds or thousands of steam accounts depending on how many views and downloads the scammer got.
Many of these accounts don't contain anything but some do (I've found accounts with 10 games installed and also many accounts that have been empty).

You just gotta be patient and try all the accounts until you hit the jackpot. Enjoy this simple Tutorial to get Steam , Thanks for reading....
Read More

Thursday 3 May 2012

This tutorial can be used for any type of file including mp3,wmv,.rar,etc

[Image: hide-imp-files.gif]
Here is how it goes:

1. Open C: Drive and make a folder in it e.g. “hacks”. Put both the files i.e. the file that you want to hide and the image inside which you want to hide the file into this folder

[Image: hide-imp-files-1.gif]

2. Select both the files and make a compressed RAR archive e.g. “secret.rar” out of them

[Image: hide-imp-files-2.gif]

3. Open Run and type in “cmd” to open the Command Prompt. Now type “cd..” and press enter and repeat this once again. Type “cd sizlopedia” to open the folder (where “hacks” is the folder that I am using in this tutorial)

[Image: hide-imp-files-3.gif]

4. Type the command “copy /b maria.jpg + secret.rar safe.jpg” and press enter

[Image: hide-imp-files-4.gif]

5. The new picture safe.jpg is now the nested Picture file which has the hidden file saved inside it. Change its extension from .jpg to .rar anytime to access or extract the hidden file

[Image: hide-imp-files-41.gif]
Definitely cool and amazing trick.

Source:sizlopedia.com
Read More

PenTest and Virtual Hack lab

[Image: penetrationtesting.jpg]

This Thread will expose you to different types of physical and virtual computer systems for a various degrees of needs. If it were to be for testing protocol analyzers,scanners,intrusion detection systems,penetration tools (including ethical/non ethical tools),studying certification studies,to R.A.T.s. Let be for helping you with certain techniques,testing how a program or exploit may work,deploying new software or solutions,analyzing new Internet worms and threats or testing one’s own exploits,viruses,codes and observe the results before using them in a real situation.To understanding how to attack and or defend a system or network.Your imagination is the limit to what you can do with a Test Lab. This keeps one from damaging the real network and systems, so if anything does go wrong, one can begin from first principles, without any consequences.
A Test Lab is usually an isolated part of one’s network. It includes servers, clients and devices with their services, to simulate a complete working network. These computers and networks can be completely simulated ones or every single node of this Test Lab can be an actual machine.The objective of this thread is to help one design one’s own Test Lab, install the required operating systems and devices, install required services and begin working on them. This way one can perform tasks mention earlier. This also is being used to help myself in this field. To better understand and explore the possibility. I do hope, in the end, this becomes the one place people go to for Lab info.
Lets Begin!

Distros
I stopped on the Distro listing. I am sure you get the hint.

Just so it is understood,it is your knowledge that makes you who you are. Not the Distro,OS,or the tools. I believe the more knowledge and information related to this field, the greater discoveries are made. Learn how it works and operates,and you will find the answers.
Any of this tools can go on the OS of your desire. Everyone has a preference. Find what works for you.


Pentest Labs

[Image: ACr3n]
(graphics done by the Graphic God himself Cains)

Metasploit Unleashed Windows XP
Download Info Back-up
Windozer Fresh VM Install
(no services installed)
Click on me for list (Click to Hide)
[Image: UrkKC]
3.1 Link Down
95 Download
98 Download
2000 Professional Download
Millenium Edition Download
Home edition SP1 Will upload a new one in the future. Last one became down
XP Professional Download
XP Professional SP2 Download
Server 2003 Enterprise Edition Download

[Image: CZJWI]
10.6.6 Download

Virtual Routers and Switches

Cisco Nexus 1000V Download here

Vyatta Live Virtual CD Download here

Vyatta Live CD Download here

Vm Image Mac spoofing without tools Click here

I am always looking for more ideas. So please,if there is something I missed,let me know. I do hope that this has and will continue to expand your knowledge of Pentest Labs as it has with me and will continue too.
I will be posting more lists as I find them. Until then, it is your ideas I am looking forward too.

Portablegamemaster

This thread is spread amongst a few posts. Keep scrolling down[Image: downarrow.gif]

P.S This post is still under construction

A Thanks to everyone responsible for our new home

There maybe issues!! Mediafire IS CALLED TO TESTIFY IN THE NEXT 90 DAYS AND IT WILL OPEN DOORS. PRO FBI. (Posted on January 23ish 2012)
There may be problems with some of my downloads because of this shit. I will be renaming and reposting links in hopes to keep this up. If you have any better ideas,PM me. Until then,wish this thread luck.
Read More
CEX.io