HACKING TOOLS
Category: IT,Computer,Technology,Programming Free PDF
Tag: Security
Description
ABSTRACT In this paper, I would like to put some of my knowledge
in hacking. The paper talks about many of the hacking
tools and strategies existing today and covers mainly
the following: Certified Ethical Hacking Course,
Stealers, Keyloggers, Trojans, Web Downloaders,
Sending the patch to the victim, Fake pages pages, Some other sites fake pages, Using anonymous email,
Hacking remote computer, Scanners, Email read
notification and finding the email address of email
sender, Checking Yahoo and MSN block and delete,
Opening the webcam without the person permission,
Email read notification and finding the ip address of
email sender, Using anonymous proxy, Finding
information about remote system, Using anonymous
proxy, The credit card hacking, Scanning the website
with vulnerability security scanners and getting the
suitable exploits, Some exam ples attacking websites and using the exploits. for hacking emails, Some other sites
fake Keywords : Certified ethical hacking, Trojans, Fake pages, Scanners, Hacking web sites.
1. INTRODUCTION In this paper, I would like to put some of my knowledge
in hacking. The paper talks about many of the hacking
tools and strategies existing today and covers mainly
the following: Certified Ethical Hacking Course,
Stealers, Keyloggers, Trojans, Web Downloaders,
Sending the patch to the victim, Fake pages for hacking
emails, Some other sites fake pages, Some other sites
fake pages, Using anonymous email, Hacking remote
computer, Scanners, Email read notification and finding
the email address of email sender, Checking Yahoo and
MSN block and delete, Opening the webcam without
the person permission, Email read notification and
finding the ip address of email sender, Using
anonymous proxy, Finding information about remote
system, Using anonymous proxy, The credit card
hacking, Scanning the website with vulnerability
security scanners and getting the suitable exploits,
Some examples attacking websites and using the
exploits.
Note, all the internet links, especially under the site
www.2shared.com, we working when the paper is
written, but the files maybe removed from the server
later, so you can download any of the mentioned tool by
searching for it in google.
2. CERTIFIED ETHICAL HACKING
COURSE. There is an important course in Hacking, called
Certified Ethical Hacking. I advice you to go through it.
The course covers the following modules
Module I: Introduction to Ethical Hacking
Module II: Footprinting
Module III: Scanning
Module IV: Enumeration
Module V: System Hacking
Module VI: Trojans and Backdoors
Module VII: Sniffers
Module VIII: Denial of Service
Module IX: Social Engineering
Module X: Session Hijacking
Module XI: Hacking Web Servers
Module XII: Web Application Vulnerabilities
Module XIII: Web Based Password Cracking
Techniques
Module XIV: SQL Injection
Module XV: Hacking Wireless Networks
Module XVI: Viruses
Module XVII: Physical Security
Module XVIII: Linux Hacking
Module XIX: Evading IDS, Firewalls and Honey pots
Module XX: Buffer Overflows
Module XXI: Cryptography
Module XXII: Penetration Testing
The course covers a lot of important lessons and
tools regarding hacking. You can find the course material in the web site
http://www.hackerz.ir/tools/ceh
http://www.hackerz.ir/tools
http://www.hackerz.ir/e-books
http://www.alm3refh.com/vb/t14377.html
There is also a good book to teach you how to hack the websites, called sites under attack.
3. STEALERS There are some of programs that steal the passwords
and important information from the computer and send
them to your predefined em ail address, and those are called stealers. I tried ProAgentV1.2 and HermanAgent
v1.0.rar and I found they are good, to notify you with
the information. You can download them from
http://www.trojanfrance.com/ index.php?dir=Stealer/ Through the stealer editor you will create the server
file, you shall configure it to notify you to your email
address. ProAgent can bind it with another file and
change the icon for it, and what I think it encrypts it
also. But with the Herman agent you will need to use
some other jointer to bind it with the created server and
change the icon for the created server. You can use
microjointer or any suitable program from
http://www.trojanfrance.com/index.php?dir=Binders/
4. KEYLOGGERS These are tools that can log whatever the victim writes
and send information to some email address. I just
tested IRAQSPY Keylogger and SC-KeyLog v2.24.exe
and I found them are fine. You can find a lot of
KeyLoggers in
http://www.trojanfrance.com/index.php?dir=KeyLogger
s/
Regarding IRAQSPY Keylogger can be found in
http://www.speedyshare.com/227662558.html
You shall configure the key logger to notify you to
your email address. Then you will need to use some
jointer to bind the created server with some file and
change the icon for it. You can use microjointer or any suitable program from
http://www.trojanfrance.com/index.php?dir=Binders/
5. TROJANS These are programs to totally spy whatever being done in the victim computer. In most programs, you will need
to create the server after co nfiguring it to operate in some port address, and notify you in your email address
or other ways, mostly exists Proconnective notification
which support reverse connection, Mail notification,
ICQ pager notification, CGI notification. When the
server is executed in the re mote computer it will notify you through email the name and local IP address of the
victim computer and the status of the server each time
the victim is online, information.
You can find a lot of Trojans in
http://www.trojanfrance.com/index.php?dir=Trojans/
I just worked with Optix and Prorat, which are
widely used. The IP received is the local IP address. I
got problem with notification with Subseven Gold. So I
leave it to your own trial.
6. WEB DOWNLOADERS Some of the hackers prefer instead of binding big size
of the patch with an image file, which will become
suspicious to the victim, they prefer to bind the image
file with downloader server which downloads the patch from some site
For example, you can configure the downloader to
download the patch from
http://members.lycos.co.uk/newuserxyz/mypics.zip
Then the created downloader server can be binded
with any file. and sent to th e victim. There are a lot of downloaders in
http://www.trojanfrance.com/index.php?dir=WebDownl
oaders/
7. SENDING THE PATCH TO THE
VICTIM Now after the server is creat ed and binded with another file and you changed the icon for it, you can send it to
the victim. As the email systems don t allow attaching
exe files to be sent, you can put it in some site for file
sharing, the best of them x www.2shared.com x http://www.speedyshare.com/
x ttp://www.4shared.com/
x www.tripod.lycos.co.uk
x http://rapidshare.com
x http://www.zshare.net For example, you can look at my created servers in
http://members.lycos.co.uk/newuserxyz/mypics.zip
here are four patched in mypics.zip: ProAgent agent,
Herman agent, IRAQSPY Keylogger, and SC-KeyLog.
You can use http://notlong.com for encrypting any file
8. FAKE PAGES FOR HACKING
EMAILS Another way to hack the email, is to use fake pages,
and ask your victim to logon through the fake page by
some trick, which is programmed to send the user email
and password to your email address. There are some programs that can create yahoo and hotmail and gmail
fake pages. For example, Bazoka and W@B Shark v.1
can be used. Bazoka v.3 is used to develop fake msn
messenger. Most of such programs exist in
http://www.khayma.com/koonooz/programs.html.
Another easier way is to look for existing fake yahoo
and hotmail pages designed by the others other, and
change the email address in the page source code to
your email address. The best of what I found during my
search for yahoo and hotmail fake pages, You can
download them from here and change the email address
http://www.2shared.com/file /3309191/469bf976/email- fake-pages.html
9. SOME OTHER SITES FAKE PAGES There are a lot of fake pages for other sites. For
example, here is the fake pages for Paypal, Bank of
Oklahoma, Chase, Deutsche Bank, Epass, Fake hotmail
login, Hi5, Bank of Israel, Online Banking, Western
Union, usa.visa.com, America Online Billing Center,
Ebay.com. Just change the email address in the source html code to your email address
http://www.2shared.com/f ile/3309071/d9dabecf/fake- pages.html
10. USING ANONYMOUS EMAIL You need to send to the victim an email address with
your files or links. It is always better to send
anonymous email so your Ip address can't be tracked,. There are some programs to send anonymous email, and
I succeeded to use them to send email to my email in
webmail.gov.ps, but I could not use them to send email
to Yahoo or Hothmail as it seems they have security
restrictions. Such programs are, Kaboom2 and grade. You can download them from
http://www.2shared.com/file /3217179/c020d1ec/anony mousemail.html
There are some sites that you can send through the anonymous emails, i.e.,
http://cyberatlantis.com/anonymous_email.php
www.sendanonymousemail.net
http://www.willselfdestruc t.com/secure/submit http://www.sharpmail.co.uk/
0 comments:
Post a Comment