Tuesday, 19 June 2012

CREATE YOUR OWN KEYLOGGER USING C++


   Hi guys, today I am going to talk about creating a keylogger for free using C++.I am going to introduce to the C++ Spyware code. It is going to be very fun.  You can install this spyware in your college/school  or in your friend system, and get their username and passwords.  This is very simple hacking trick when compared to phishing web page. 
Disadvantage of Phishing Web page:
you have to upload phishing web page to web hosting.  But only few website won't detect the phishing webpage.
website url is different. Easy to detect that we are hacking.


Advantage of Spyware-keylogger:
Very simple and easy method.
Victim can't detect that we are hacking.


How to create Keylogger using Visual C++?
Requirements:
Dev C++.
Download it from here: http://www.bloodshed.net/
Knowledge about Visual C++ (need, if you are going to develop the code).
Steps:
Install dev C++ in your system and open the dev C++ compiler.
Go to File->New->Source File.
You can see a blank works space will be there in window.
Now copy the below keylogger code into the blank work space.

Sunday, 17 June 2012

Net-bios Hacking





THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.



STEP-BY-STEP NETBIOS HACKING PROCEDURE

1.Open command prompt

2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN IP TOOLS"(SOFTWARE BY ENTERING RANGE OF IP ADDRESSES.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME.)

Example: C:\>net view \\219.64.55.112

The above is an example for operation using command prompt. “net view” is one of the netbios command to view the shared resources of the remote computer. Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios. You have to substitute a vlaid IP address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If not an error message is displayed. So repeat the procedure 2 with a different IP address.

HACKING USING METASPLOIT




Here I will give a general description on how to hack a PC and steal credentials


But remember, this is only for educational purpose and hence damaging any victim’s computer is at your own risk.


Note: The hacker can be traceable and hence additional techniques are required to make yourself safe!


So here goes the requirements and the procedure to hack into a PC.








Requirements:


Metasploit (Available at metasploit.org)
Nmap (Port scanner available at nmap.org)
Debian  Linux OS (Learn more)
IP of the victim’s computer.
Introduction to attack:


Nmap is a port scanner used to scan a computer to locate the open ports. The ports are the path for the information that we need to steal. For a normal computer usually 30-40 ports are kept open.To find the number of ports open on your computer open command prompt (Start>Command prompt) and type netstat -ano and hit enter,  you will get a list of open ports in your computer. You need to have a basic knowledge on ports and port numbers to perform this attack.


Using a tool such as Metasploit we can spoof into the PC and steal the information from the corresponding port using commands. Learn to use Metasploit at http://www.metasploit.com/learn-more/how-do-i-use-it/.


We use Linux because it is the best OS for hackers. And you must know to use terminal on Linux, since we perform this attack on command lines.