Information

The following is a guest post by email. This is the third part in a series of articles on his view of hacking. If you are interested in writing for CyberCROW, click Here. Otherwise, Enjoy.

Saturday, April 9, 2011

How to crack Hash method using HackCat Tools

There are two important types of Hash Encryption Methods.  They are MD5(Message digest 5),SHA1(Secure Hash Algorithm).  Here i'll give you a tool which will use to crack both hash function algorithms.  we can do offline cracking hashes (it means we don`t need an Internet connection that uses the hash databases that have been cracked before).

Download Hashcat Tool from here:
Hashcat tool can crack:
* MD5
* Md5 ($ pass. $ Salt)
* Md5 ($ salt. $ Pass)
* Md5 (md5 ($ pass))
* Md5 (md5 (md5 ($ pass)))
* Md5 (md5 ($ pass). $ Salt)
* Md5 (md5 ($ salt). $ Pass)
* Md5 ($ salt.md5 ($ pass))
* Md5 ($ salt. $ Pass. $ Salt)
* Md5 (md5 ($ salt). Md5 ($ pass))
* Md5 (md5 ($ pass). Md5 ($ salt))
* Md5 ($ salt.md5 ($ salt. $ Pass))
* Md5 ($ salt.md5 ($ pass. $ Salt))
* Md5 ($ username.0. $ Pass)
* Md5 (strtoupper (md5 ($ pass)))
* SHA1
* Sha1 ($ pass. $ Salt)
* Sha1 ($ salt. $ Pass)
* Sha1 (sha1 ($ pass))
* Sha1 (sha1 (sha1 ($ pass)))
* Sha1 (strtolower ($ username). $ Pass)
* MySQL
* MySQL4.1/MySQL5
* MD5 (WordPress)
* MD5 (PHPbb3)
* MD5 (Unix)
* SHA-1 (Base64)
* SSHA-1 (Base64)
* SHA-1 (Django)
* MD4
* NTLM
* Domain Cached credentials
* MD5 (CHAP)
* MSSQL

Attack Mode supported in this tool:
* Straight *
* Combination *
* Toggle-Case *
* Brute-Force
* Permutation


What should we do?

First, create a file with notepad:
[1] C:\temp\hash.txt and
[2] C:\ temp\results.txt ago
open the C:\ temp\hash.txt and fill with Hash you want to crack. picture as below
 For C:\temp\results.txt , do nothing and let it blank because the cracked hashes will be saved in here.

Run Hashcrack. and follow the steps below:

In this tutorial, the author uses brute-force mode, cracking technique with a combination of characters. Notice the image below:

Hash cat step
[-] In Hashfile column, click the folder icon (browse for hashfile) and open the C: \ temp \ hash.txt that you have previously made.
[-] In Brute force column, select mode and select the type of hash (we are trying to crack MD5 here)
[-] In the Password length, insert 1-14 (u may put about 20 oto 30) the longer the password length, the longer the cracking process.
[-] In bruteforce charset settings, you can fill with the desired character. eg abcdefghijklmnopqrstuvwxy z1234567890 or abcdefghijklmnopqrstuvwxy z1234567890 !@#$%^&*()_+
[-] In OUTFILE column, put a tick and specify the path in C:\temp\results.txt that you have previously made.
[-] Checklist OUTFILE Monitor and click I want to catch a Hash ..

Wait for the process of cracking (this tool directly run a CLI mode)

CLI MODE


you will find the results of the hash that has been successful on crack.
Result of Hash crack


How to Hide Keyloggers and Trojan with Binders?

Posted by glewoCROW 11:58 AM, under ,,,,, | No comments

Keyloggers and Trojan can be onlye exe file so victims may be easily find it is some other softwares.  Here is tutorial to bind the keylogger or trojan with the Image files(jpeg,gif) or movie files.

What is binder software?
 A Binder is a software used to bind or combine to or more files under one name and extension, The files to be binded can have any extension or icon, Its all up to you and you have the choice to select the name, icon and various attributes of binded file, The Binded files can be even worse when they are crypted, because Bintext would not be able to find it and at the same time it could also bypass antivirus detection then you are almost guaranteed to be infected


Popular Binders

Here are some of the popular binders used by hackers to hide keyloggers and Trojans:

Simple Binder


 
Simple binder is one of my favorite binders of all time, I give thumbs up to the maker "Nathan", Its so easy to use and even a script kiddie can easily use it to bind keylogger or backdoors with other files


Weekend Binder




Weekend Binder can be used to bind two or more files under one extension and icon, If the binded file contains an application, the application also runs along with the actual binded files .


How to detect Crypted Binded files?
 



As I told you before that if a trojan or keylogger is binded with a file and it's crypted in order to bypass antivirus detection then its very difficult to detect it, However there is a great piece of software called resource hacker which is really effective when it comes to keylogger protection, It detects whether the file is binded or not.


What is Port Scanner? what is the use?

Posted by glewoCROW 11:30 AM, under ,,,, | No comments


In my last post i gave you the list of best port scanner tools. In this post i will explain about port scanning process and use of port scanning.

Port Scanning:
Port scanning is the process of searching for active or opened ports in victim system. Just like a thief searching for gate opened house. Consider this scanning



Starting Scan.

Target Host: www.yourcompany.com or IP Address

TCP Port :7 (echo)
TCP Port :9 (discard)
TCP Port :13 (daytime)
TCP Port :19 (chargen)
TCP Port :21 (ftp)
TCP Port :23 (telnet)
TCP Port :25 (smtp)
TCP Port :37 (time)
TCP Port :53 (domain)
TCP Port :79 (finger)
TCP Port :80 (www)
TCP Port :110 (pop)
TCP Port :111 (sunrpc)
Finished.


It shows the active ports in that domain or ip address


What is the Use?
what we can do with these ports? we can communicate with the victim system remotely using those active ports. So we can get their data without their knowledge.(The thing is that you can theft their data).


Scanning for open ports is done in two ways.
  • Scan a single IP address for open ports:
    It just like a thief who searching for any opened gate in single house.
    In relation to scanning, the gate is port and house is IP address.
    We are searching for the active port in a single IP address
    Eg:
    searching for active ports only at 123.xx.xx.xx
  • Scan a range of IP address to find open ports:
    Scanning a range of IP address is like thief who searching for any opened gate in a street. In relation to scanning, the gate is ports and street is range of ip address

    Eg:
    searching active ports only at
    123.20.xx.xx to 123.30.xx.xx

Best Port Scanning Tools

Posted by glewoCROW 11:25 AM, under ,,,, | No comments


What is  port Scanning?
      You should understand what is port scanning Port scanning is the process of checking which port is opened and which ports are locked.  Just like a thief who searching for a gate opened house.

What is the Use?
   By finding which port is opened ,you can try to communicate with victim system remotely and access their data .   

Learn more about Port scanning.

EG:-

* 21: FTP
* 22: SSH
* 23: Telnet
* 53: Domain Name System
* 80: World Wide Web HTTP
* 119: Network News Transfer Protocol
* 443: HTTP over Transport Layer Security/Secure Sockets Layer
* 445: microsoft-ds, Server Message Block over TCP


If these ports are not secure a hacker can communicate with these ports and cause havoc
The list given below are some of the best port scanners
You can download from the links given below:
Nmap:
This tool developed by Fyodor is one of the best unix and windows based port scanners. This
advanced port scanner has a number of useful arguments that gives user a lot of control over the
process.
From:
Download:
Superscan
A Windows-only port scanner, pinger, and resolver SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.
From
Download

Angry IP Scanner
A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic
host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

From
Download

Unicornscan :
Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering
and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

From
Download

Simulate a distributed denial of service (DDOS) attack against a target server. T

Ddosim is a tool that can be used in a laboratory environment to simulate a distributed denial of service (DDOS) attack against a target server. The test will show the capacity of the server to handle application specific DDOS attacks. ddosim simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, ddosim starts the conversation with the listening application (e.g. HTTP server).


ddosim is written in C++ and runs on Linux. Its current functionalities include:

  • HTTP DDoS with valid requests
  • HTTP DDoS with invalid requests (similar to a DC++ attack)
  • SMTP DDoS
  • TCP connection flood on random port

In order to simulate such an attack in a lab environment we need to setup a network like this:




More Info :

What are the symptomps to find whether your system is infected or not?

Posted by glewoCROW 2:41 AM, under ,,,, | No comments


  • pc runs slower than usual.
  • Stops responding
  • computer crashes, and restarts every few minutes.
  • Applications on the computer do not work correctly.
  • Disks or disk drives are inaccessible.
  • Can't print items correctly.
  • Unusual error messages
  • Distorted menus and dialog boxes.
  • There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
  • An antivirus program is disabled for no reason. Additionally, the antivirus program can't be restarted.
  • An antivirus program can't be installed on the computer, or the antivirus program won't run.
  • Strange Icons
  • Strange sounds or music plays from the speakers unexpectedly.
  • Windows does not start even though you have not made any system changes or even though you have not installed or removed any programs.
  • There is frequent modem activity. If you have an external modem, you may notice the lights blinking frequently when the modem is not being used. You may be unknowingly supplying pirated software
  • Windows does not start because certain important system files are missing. Additionally, you receive an error message that lists the missing files
  • The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear.

How To remove the virus/Spyware/malware?

Posted by glewoCROW 2:36 AM, under ,, | No comments

Hi friends , today i am going to explain how to remove the
virus/spyware /malware from your system. If you suspect that your system is infected(symptoms for infected system) ,then you need take care about your system.



The best Internet security tool is our Kaspersky.

Download the Kaspersky Internet Security trial version from www.kaspersky.com
Install the Kaspersky Internet security, then do full scan. Wait for
scanning completion. After scanning completed ,it will show the list
of infected files, right click and select "Disinfect all".
 
It will remove all virus/spyware or any other malwares. Now your system is virus protected. 


  If you like to make your system more secure, buy the Kaspersky Internet security key and install in your trial version internet security. Now it will become genuine.
  Don't use any cracked version of Kaspersky Internet
security or cracked key.

How to Recover the Deleted or Corrupted Photos in Digital Cam?

Posted by glewoCROW 2:25 AM, under ,, | No comments


Disk internals screenshot
Imagine you are going to tour and take lots of photos in your Digital Camera.  Unfortunately, you erased the photos mistakenly or it is corrupted.[My girl friend did this stupid thing.  At that time i can not help her without knowing about this software.]  What can you do in this situation? are you going to cry ?  Don't worry  you can recover the deleted or corrupted software.  Even you delete,the files will still in your flash memory.  Here is the software named as "  Disk Internals Flash Recover", this will recover your files.  sounds good na?!!

How it works?
    When you connect your Digital Cam or flash memory with your computer, It is recognized as external Drive.   The software will scan the Flash memory and show every pictures which is recovered from Flash memory.

Features:
  •   Recovers CRW, CR2, RAW, TIFF, TIF
  •   Recovers Avi, wmv, asf, mpeg, mpg, mp1, m1v, mp2, m2v, m2a, vob, dat, mv, mov and other movie files.
  •   Recovers images and movies from hard-drives, external drives, cd, dvd, cameras and flash memory devices   such as SmartMedia , CompactFlash, Memory Stick, MicroDrive, xD Picture Card Flash Card, PC Card, Multimedia Card, Secure Digital Card, and many others.
  • Recovered Images can be burned to CD or DVD
  • Works under Microsoft® Windows® 95, 98, ME, NT, 2000, XP, 2003 Server 


Download

Download Widestep elite Keylogger 7.0 [Free]

Posted by glewoCROW 2:12 AM, under ,,,,, | No comments

You may need keylogger in this following situation:
  • you are a caring parent and need to know whom your kids are talking to or what websites they are visiting while you’re away
  • you are suspecting your spouse/ girlfriend or boyfriend in cheating.  
Key logger

You may need keylogger for any other reasons. Whatever, in this post i am going to give you the link to download the Elite Keylogger 7.0 tool.


While you installing this Keylogger in your system ,you will be asked to select mode(visible mode, invisible mode ). If you are New to the Keyloggers, then i suggest you the visible mode. Enter your decided password. Now you are ready to spy your or your spouse system. But do not forget your unhide word, as keylogger runs in stealth mode and you can’t see it until typing this word.

After the launch you will see the main window in which you can configure and set main parameters of monitoring.

Concerning the main features. With this keylogger you can view chats, instant messages, emails, Internet activity, absolutely all keystrokes, programs’ activity, all passwords and even Windows logon password, usernames and time they worked on your computer, desktop activity, clipboard and more.

Moreover, Elite keylogger takes screenshots of your desktop in a definite period of time. You can filter logs, save them or delete all of them. You can also receive all the logs via e-mail and send them to FTP and save them remotely. One of the new features added was possibility to send logs to USB drive once it is plugged in.

You can also choose the accounts and applications which have to be monitored. In case you want users to know that the computer is monitored – you can apply “Show monitoring warning on startup” option.

And what is the main advantage of a keylogger? Of course, its invisibility. While testing none of antiviruses detected this one small utility.

As you can see, the range of options this keylogger offers is rather wide. And if you need to get detailed information of all PC activity – this keylogger is just what you need.

Elite Keylogger is compatible with Win 2000/XP/Vista/7 x32 (64-bit edition is in development)

  http://rapidshare.com/files/436144310/Keylogger_7.0.rar
  http://hotfile.com/dl/89750114/95f2230/Keylogger_7.0.rar.html


A small Collection of Password Cracking Tools 2010

Posted by glewoCROW 2:08 AM, under ,, | No comments

Using these tools you can hack like Windows Admin password, pdf passwords, zip files passwords, document passwords, rar passwords,etc..

 This Password Hacking Kit Consists of following Password Hacking Breaking Tools:
  1. PDF Password Remover
  2. Windows XP Admin Password Remover
  3. Zip File Password Cracker.
  4. SQL Password Remover
  5. Microsoft Office Password Remover.
  6. Microsoft Windows Vista Password Remover.
  7. Rar File Password Cracker
  8. Windows Password Recovery Kit
  9. Password Changer.
  10. Distributed File Password Recovery..

How to Use it?

1. Download the Password Hacking
2. Extract the file and install it.
3. Files in trial version, you must be register for them and use it. ( all tools contain full serial keys and patches) 

Tool for Remove Spyware and Trojans

Posted by glewoCROW 1:54 AM, under ,,,, | No comments


Instant Spyware remover
Hi friends now i am going to introduce a new spyware and trojan detecting software.  It is best software.  I had one Trojan namely  "xkmq47.exe@ ".  When i install this sofware ,it founds this file.  But i had doubt "is this spyware software working correctly or showing important files as trojan?".  So i searched for the definiton of  " xkmq47.exe@ " in google search engine.  At the end of the result I found another spyware removal tool(in next post i will post about that tools after i use it).  Finally i came to one conclusion that this spyware removal tool is working perfectly.

I like to share that spyware removal tool with you.  Its name is "Instand Spyware Remover". 



Instant Spyware Remover is an award-winning advanced anti-virus/spyware software. It is able to effectively detect, remove and block malicious Spyware/Trojan/Malware/Virus and other potential security threats which slow down computer, create unwanted pop-up ads, change computer settings and steal personal information without your knowledge. It is the best tool that perfectly secure your computer and your privacy.


Instant Spyware Remover is able to remove and block Spyware/Trojan/Malware/Virus including but not limit to:
  • Adware
  • Annoyance
  • Browser Helper Object
  • Cracking Tool
  • Dialer
  • Downloader
  • Encryption Tool
  • Exploit
  • Rogue Security Software
  • FTP Server
  • Hijacker
  • Hostile ActiveX
  • Key Logger
  • Nuker
  • Password Cracker
  • Phreaking Tool
  • Proxy
  • SPAM Tool
  • Tracking Cookie
  • Trojan
  • Worm Creation Tool
  • Usage Tracks
  • P2P
  • Mail Bomber
  • Phreaking Tool
  • .....

Instant Spyware Remover Key Features:

  • Anti-Virus - Completely detect and remove Viruses,Trojan, worms, and other PC threat faster and easier.
  • Anti-Spyware - Remove and block spyware program effectively, secure all your online activities.
  • Real-Time Guard - Protects your PC from spyware, virus and other potential threats on a real-time basis.
  • In-depth Online Scan - Performs in-depth online scan which guarantees to dig out all the hidden Virus/spyware in your computer.
  • Forcible Removal - Forcibly and completely removes virus or spyware programs that can repeatedly generate themselves.
  • Internet Safeguard - One click of cleaning Internet tracks which ensures the security of all your online personal information
  • Health Report - By analyzing, Instant Spyware Remover will generate a report which shows the health status of every part of your PC system
  • Optimization Utilities - Instant Spyware Remover offers you a suite of useful tools including Startup Optimizer, Vulnerability Scanner, Registry repairer, Registry Backup etc which allows you to have a smarter PC management and better performance.
Why Choose Instant Spyware Remover?
  • Anti-virus, spyware all in one.
  • In-depth & powerful online Scan.
  • Automatic threat removal process.
  • Friendly interface and easy to use.
  • Complete threat removal guarantees.
  • 60 days money back guarantee.
  • Free 24 X 7 dedicated technical support.
  • Up-to-date threat database.
  • Frequent & free program update.
Free Download Here
   http://www.instantspywareremoval.com/InstantSpywareRemoval.html

Axcrypt Software-an encrypting software tool

Posted by glewoCROW 1:32 AM, under ,,, | No comments

Hi friends now you know about encryptions right ? if you don't know about encryption ,please read this article
Introduction to cryptography
Now you know the importance of encryption.  If you like to protect your documents using encryption, then here is the tool for you.  This is open source software.  So no need to worry about the key,it is completely free.

Features of Axcrypt :
The following are features that re
ally set it apart from all other file encryption tools, commercial as well as free:
  • Double-click to edit/view with any application.
  • Automatic re-encryption after modification.
  • Absolutely no user configuration necessary or possible before use.
  • Open source under GNU General Public License.
  • 7 languages in one executable distribution.
  • Extensive command-line interface for scripting and programming.

Other features

  • Windows 2000/2003/XP/Vista/2008/7 compatible.
  • AES encryption with 128-bit keys.
  • Edit an encrypted document directly with double-click.
  • Optional pass phrase cache - type pass phrases once per logon and/or reboot.
  • Automatic pass phrase validation before decryption or editing.
  • Key-File generation and support.
  • No options or user interface - easy to install and use.
  • Relatively light-weight, less than 1Mb download
  • Extensive command-line interface.
  • Server mode options.
  • Support for files larger than 4GB (on Windows NT/2K/XP or later).
  • Dynamic brute force counter measure - iterative key wrapping.
  • Integrates well with web based file sharing services.
  • Selective compression before encryption - faster downloads/uploads.
  • Retains original file name and information of an encrypted file.
  • Integrated shredder.
  • Shredding of all temporary and encrypted plaintext files.
  • Secure memory handling - no keys or data in the paging file.
  • Industry standard algorithms.
  • Data integrity verification - no undetected modification.
  • Unique data encryption keys used for every file and (re-)encryption.
  • Polyglot - currently speaks English, German, French, Spanish, Italian, Hungarian and Swedish.
  • Easy to add more languages - contact me (I'm especially looking for Nordic languages)!
  • Open source - no backdoors.
  • Private branding support for commercial or corporate versions.
  • It's FREE!

Read how to install and use the Axcrypt

How to use the Axcrypt for encryption?

Posted by glewoCROW 1:15 AM, under ,,,, | 2 comments

In my last i gave you details about Axcrypt.  In this post i am going to guide you how to encrypt the file using Axcrypt software.

Download the Axcrypt from here:


If the above link is not working then try this:



Install the Axcrypt.

After Installation:
Encryption:
Right click on the file or folder which you want to lock.
Select Axcrypt option.
Then select Encrypt.

Now enter the Password or Key whatever you call.
Click ok.

Now you can see the icon is changed for the file or folder.
In order to open or modify you need to enter the password.

Decryption:
Right click on the encrypted file or folder
Select Axcrypt option
Then Select Decrypt.
Now Enter the  Password to decrypt(password,which you gave while doing encryption).
That's all.

Screen Shot Tutorial For Reference:
This is un experienced users of windows. Here i will give the screen shot how to do it.
For Encryption:


For Decryption:



Introducing a new Task Manager for analysing process

Posted by glewoCROW 12:46 AM, under ,,,,, | No comments

Do you know what programs are processing in your pc?  You use Default task manager for seeing the list of Process.  In Default task manage it just show only the list of process and memory usage.   You may not know which one is system process,malware program,application program.  Some advanced users can analyze himself what process are going on.  He can end the process by right clicking on the process.  But this will stop the program at the moment only.  When he restart the system or after sometime,the process may continue.

To analyze the system program, detect the malware and stop the program i am going to introduce a new software "Security Windows Manager".



How did i find this software?
  Today i analyze the Task manager process.  At that time i suspect on one process.  so i searched in internet for definition of the program.  At the end i found  this wonderful security software.  I like to introduce to my visitors also.

The Security Task Manager detects unknown malware and rootkits hidden from your antivirus software.
Features:
  •  Show the Risk process at the top.
  • unique security risk rating 
  • free online scan with all known Antivirus engines
  • full directory path and file name
  • process description
  • CPU usage graph
  • embedded hidden functions (e.g. keyboard monitoring, browser supervision or manipulation)
  • process type (e.g. visible window, systray program, DLL, IE-plugin, startup service)
  • Move to quarantine the detected or suspected process
Screenshot: