Friday, March 4, 2011

HACKING TOOLS

HACKING TOOLS

Category: IT,Computer,Technology,Programming Free PDF
Tag: Security
Description


ABSTRACT In this paper, I would like to put some of my knowledge

in hacking. The paper talks about many of the hacking

tools and strategies existing today and covers mainly

the following: Certified Ethical Hacking Course,

Stealers, Keyloggers, Trojans, Web Downloaders,

Sending the patch to the victim, Fake pages pages, Some other sites fake pages, Using anonymous email,

Hacking remote computer, Scanners, Email read

notification and finding the email address of email

sender, Checking Yahoo and MSN block and delete,

Opening the webcam without the person permission,

Email read notification and finding the ip address of

email sender, Using anonymous proxy, Finding

information about remote system, Using anonymous

proxy, The credit card hacking, Scanning the website

with vulnerability security scanners and getting the

suitable exploits, Some exam ples attacking websites and using the exploits. for hacking emails, Some other sites

fake Keywords : Certified ethical hacking, Trojans, Fake pages, Scanners, Hacking web sites.

1. INTRODUCTION In this paper, I would like to put some of my knowledge

in hacking. The paper talks about many of the hacking

tools and strategies existing today and covers mainly

the following: Certified Ethical Hacking Course,

Stealers, Keyloggers, Trojans, Web Downloaders,

Sending the patch to the victim, Fake pages for hacking

emails, Some other sites fake pages, Some other sites

fake pages, Using anonymous email, Hacking remote

computer, Scanners, Email read notification and finding

the email address of email sender, Checking Yahoo and

MSN block and delete, Opening the webcam without

the person permission, Email read notification and

finding the ip address of email sender, Using

anonymous proxy, Finding information about remote

system, Using anonymous proxy, The credit card

hacking, Scanning the website with vulnerability

security scanners and getting the suitable exploits,

Some examples attacking websites and using the

exploits.

Note, all the internet links, especially under the site

www.2shared.com, we working when the paper is

written, but the files maybe removed from the server

later, so you can download any of the mentioned tool by

searching for it in google.

2. CERTIFIED ETHICAL HACKING

COURSE. There is an important course in Hacking, called

Certified Ethical Hacking. I advice you to go through it.

The course covers the following modules

Module I: Introduction to Ethical Hacking

Module II: Footprinting

Module III: Scanning

Module IV: Enumeration

Module V: System Hacking

Module VI: Trojans and Backdoors

Module VII: Sniffers

Module VIII: Denial of Service

Module IX: Social Engineering

Module X: Session Hijacking

Module XI: Hacking Web Servers

Module XII: Web Application Vulnerabilities

Module XIII: Web Based Password Cracking

Techniques

Module XIV: SQL Injection

Module XV: Hacking Wireless Networks

Module XVI: Viruses

Module XVII: Physical Security

Module XVIII: Linux Hacking

Module XIX: Evading IDS, Firewalls and Honey pots

Module XX: Buffer Overflows

Module XXI: Cryptography

Module XXII: Penetration Testing

The course covers a lot of important lessons and

tools regarding hacking. You can find the course material in the web site

http://www.hackerz.ir/tools/ceh

http://www.hackerz.ir/tools

http://www.hackerz.ir/e-books

http://www.alm3refh.com/vb/t14377.html

There is also a good book to teach you how to hack the websites, called sites under attack.

3. STEALERS There are some of programs that steal the passwords

and important information from the computer and send

them to your predefined em ail address, and those are called stealers. I tried ProAgentV1.2 and HermanAgent

v1.0.rar and I found they are good, to notify you with

the information. You can download them from

http://www.trojanfrance.com/ index.php?dir=Stealer/ Through the stealer editor you will create the server

file, you shall configure it to notify you to your email

address. ProAgent can bind it with another file and

change the icon for it, and what I think it encrypts it

also. But with the Herman agent you will need to use

some other jointer to bind it with the created server and

change the icon for the created server. You can use

microjointer or any suitable program from

http://www.trojanfrance.com/index.php?dir=Binders/

4. KEYLOGGERS These are tools that can log whatever the victim writes

and send information to some email address. I just

tested IRAQSPY Keylogger and SC-KeyLog v2.24.exe

and I found them are fine. You can find a lot of

KeyLoggers in

http://www.trojanfrance.com/index.php?dir=KeyLogger

s/

Regarding IRAQSPY Keylogger can be found in

http://www.speedyshare.com/227662558.html

You shall configure the key logger to notify you to

your email address. Then you will need to use some

jointer to bind the created server with some file and

change the icon for it. You can use microjointer or any suitable program from

http://www.trojanfrance.com/index.php?dir=Binders/

5. TROJANS These are programs to totally spy whatever being done in the victim computer. In most programs, you will need

to create the server after co nfiguring it to operate in some port address, and notify you in your email address

or other ways, mostly exists Proconnective notification

which support reverse connection, Mail notification,

ICQ pager notification, CGI notification. When the

server is executed in the re mote computer it will notify you through email the name and local IP address of the

victim computer and the status of the server each time

the victim is online, information.

You can find a lot of Trojans in

http://www.trojanfrance.com/index.php?dir=Trojans/

I just worked with Optix and Prorat, which are

widely used. The IP received is the local IP address. I

got problem with notification with Subseven Gold. So I

leave it to your own trial.

6. WEB DOWNLOADERS Some of the hackers prefer instead of binding big size

of the patch with an image file, which will become

suspicious to the victim, they prefer to bind the image

file with downloader server which downloads the patch from some site

For example, you can configure the downloader to

download the patch from

http://members.lycos.co.uk/newuserxyz/mypics.zip

Then the created downloader server can be binded

with any file. and sent to th e victim. There are a lot of downloaders in

http://www.trojanfrance.com/index.php?dir=WebDownl

oaders/

7. SENDING THE PATCH TO THE

VICTIM Now after the server is creat ed and binded with another file and you changed the icon for it, you can send it to

the victim. As the email systems don t allow attaching

exe files to be sent, you can put it in some site for file

sharing, the best of them x www.2shared.com x http://www.speedyshare.com/

x ttp://www.4shared.com/

x www.tripod.lycos.co.uk

x http://rapidshare.com

x http://www.zshare.net For example, you can look at my created servers in

http://members.lycos.co.uk/newuserxyz/mypics.zip

here are four patched in mypics.zip: ProAgent agent,

Herman agent, IRAQSPY Keylogger, and SC-KeyLog.

You can use http://notlong.com for encrypting any file

8. FAKE PAGES FOR HACKING

EMAILS Another way to hack the email, is to use fake pages,

and ask your victim to logon through the fake page by

some trick, which is programmed to send the user email

and password to your email address. There are some programs that can create yahoo and hotmail and gmail

fake pages. For example, Bazoka and W@B Shark v.1

can be used. Bazoka v.3 is used to develop fake msn

messenger. Most of such programs exist in

http://www.khayma.com/koonooz/programs.html.

Another easier way is to look for existing fake yahoo

and hotmail pages designed by the others other, and

change the email address in the page source code to

your email address. The best of what I found during my

search for yahoo and hotmail fake pages, You can

download them from here and change the email address

http://www.2shared.com/file /3309191/469bf976/email- fake-pages.html

9. SOME OTHER SITES FAKE PAGES There are a lot of fake pages for other sites. For

example, here is the fake pages for Paypal, Bank of

Oklahoma, Chase, Deutsche Bank, Epass, Fake hotmail

login, Hi5, Bank of Israel, Online Banking, Western

Union, usa.visa.com, America Online Billing Center,

Ebay.com. Just change the email address in the source html code to your email address

http://www.2shared.com/f ile/3309071/d9dabecf/fake- pages.html

10. USING ANONYMOUS EMAIL You need to send to the victim an email address with

your files or links. It is always better to send

anonymous email so your Ip address can't be tracked,. There are some programs to send anonymous email, and

I succeeded to use them to send email to my email in

webmail.gov.ps, but I could not use them to send email

to Yahoo or Hothmail as it seems they have security

restrictions. Such programs are, Kaboom2 and grade. You can download them from

http://www.2shared.com/file /3217179/c020d1ec/anony mousemail.html

There are some sites that you can send through the anonymous emails, i.e.,

http://cyberatlantis.com/anonymous_email.php

www.sendanonymousemail.net

http://www.willselfdestruc t.com/secure/submit http://www.sharpmail.co.uk/
Share:

0 comments: