BackTrack 5

BackTrack 5

 

  The highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.


General Information :
  • Developer: BackTrack Linux
  • License/Price: GPL / FREE
  • Version: BackTrack 5,R1,R2,R3

Download link  BackTrack 5,R1,R2,R3

Top 10 Facebook profile hacking techniques!

Top 10 Facebook profile hacking techniques!

1. Phishing

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim login through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

2. Keylogging

Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealer's

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.

DOS Attacks and Free DOS Attacking Tools


DOS Attacks and Free DOS Attacking Tools

The denial of service (DOS) attack is one of the most powerful attacks used by hackers to harm a company or organization. Don’t confuse a DOS attack with DOS, the disc operating system developed by Microsoft. This attack is one of most dangerous cyber attacks. It causes service outages and the loss of millions, depending on the duration of attack. In past few years, the use of the attack has increased due to the availability of free tools. This tool can be blocked easily by having a good firewall. But a widespread and clever DOS attack can bypass most of the restrictions. In this post, we will see more about the DOS attack, its variants, and the tools that are used to perform the attack. We will also see how to prevent this attack and how not to be the part of this attack.

What Is a Denial of Service Attack?

A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able to handle the requests of legitimate users.

In general, there are two forms of the DOS attack. The first form is on that can crash a server. The second form of DOS attack only floods a service.


DDOS or Distributed Denial of Service Attack

This is the complicated but powerful version of DOS attack in which many attacking systems are involved. In DDOS attacks, many computers start performing DOS attacks on the same target server. As the DOS attack is distributed over large group of computers, it is known as a distributed denial of service attack.

How To Hack Wi-Fi WPA/WPA2 Password With Backtrack 5 .

How To Hack Wi-Fi WPA/WPA2 Password With Backtrack 5 .


certain things to be followed..such as creating virtual machine!!!running in your OS if you have windows..!!



                 
  •  press enter......go on



HOW TO HACK FACEBOOK / EMAIL PASSWORDS USING USB/PEN DRIVE

HOW TO HACK FACEBOOK / EMAIL PASSWORDS USING USB/PEN DRIVE


Hey guys welcome back  , one of my friends asked me about "How to hack passwords using USB/Pen Drive" , today I will show you how to hack Passwords using an USB Pen Drive.
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windowsmessenger etc.




Along with these, Windows also stores passwords of Outlook Express, SMTP, POP,
FTP accounts and auto-complete passwords of many browsers like IE and Firefox.
There exists many tools for recovering these passswords from their stored places.
Using these tools and an USB pendrive you can create your own rootkit to hack
passwords from your friend’s/college Computer.

We need the following tools to create our rootkit:

MessenPass : Recovers the passwords of most popular Instant Messenger programs:
MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL
Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

INTERNET DOWNLOAD MANAGER FULL VERSION + CRACK (6.19.1)


INTERNET DOWNLOAD MANAGER FULL VERSION + CRACK (6.19.1)

internet download manager 6.19.1 cracked
internet download manager (idm)


DOWNLOAD FROM HERE [ Idm 6.19.1 ]
Internet Download Manager can help you accelerate your downloads. It works by creating various threats so that multiple sections (up to 16) of the same file can be downloaded at the same time. In addition, it lets you pause and resume your downloads, an action that is not always available from regular procedures.

The application features an intuitive interface, in which several categories arranged in a tree-like fashion. Moreover, various skins are downloadable to adapt the program’s appearance to your liking.

Hacking a website using SQL injection:Full method with Pics

Hacking a website using SQL injection:Full method with Pics

Today i am gonna show you how to hack a website using sql injection.To find SQL vulnerable sites refer to this post.
 
Now Lets start---->
Things you will need -->
1. Havij SQL injection Tool, download it from here(Run as Administrator)
2. A sql vunerable site, I am taking this site http://toyonorte.com.co/catalogo_nuevos_detalle.php?id=2 as an example.
3. A very important thing i.e mind.
Checking for sql vulnerability --->
Here i am taking http://toyonorte.com.co/catalogo_nuevos_detalle.php?id=2 as an example. 
Now to check is this site vulnerable to sql, I will simply add ' after the site url
like this http://toyonorte.com.co/catalogo_nuevos_detalle.php?id=2'
and i get this error on the site
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1
It means that site is vulnerable to sql injection.
Exploiting the vulnerable site ---> 
1. Open Havij and paste site url in target field and hit enter
.
2. Now wait for Havij to get all the databases of the website.

3. Now click on available databse of site and click on Get Tables like i am gonna select 535480_toyonorte of my site like in image.


4. By clicking Get Tables Havij will look after the tables available in the database.

Superscan 4.0

Superscan 4.0




 
 
Superscan 4 by Foundstone is a very useful program to find open ports in the target IP address.
You may consider it as alternative for "NMap" (Netwok Mapper), but NMap is still the best.

Other than port scanning, Superscan 4 has may more tools:
Hostname/IP Lookup

Ping