Selasa, 14 Agustus 2012

How To Use Dll Hijack Exploit

The exploit is simply a error in the programming These exploit are at the sites and programs is caused by a error in any programming language For example, sites that have been programmed by PHP You may find in them many of the mistakes being exploited To discover this you must to learn php :) it's not easy But there are several sites Discover a lot of exploit And set them free like exploit-db.com .



Generally in this topic we will talk about  Dll Hijack Exploit this type has spread dramatically in the programs It is also easy to use

First, what is Dll :
Simply that one file contains a large number of important functions to complete the work of  the program There are two types :
The first in the form of libraries as it is called dynamic link libraries Of operating systems which is the same which are present in this path ( WindowsDirectory%/system32%/) It is containing functions that help the program to call on other functions The other type of these libraries, which are be coming with the same program

What is Dll Hijacking :
DLL Hijacking is an attack that exploits the way some Windows applications search and load DLLs that they need and use. Most Windows applications will not use a fully qualified path to load any required DLLs. A bad guy can place a DLL for a known program in a location that is searched before the real DLL's location almost guarantee that the malicious DLL is loaded, resulting in whatever code the attacker wants to run running! When programs are not written to specify the exact location of a required DLL, Windows will search for the DLL by name in a specific order.

This type of exploit will help you to hack your victim easily by injecting the program And choose the path of the server that will not see the victim ( Server must be attached with the program files ) Hundreds of dll hijack exploit Are discovered daily in popular programs With an explanation of how to use Exploit-Db.Com

This simple explanation of how discover  Dll Hijacking (The manual methods) :





Download :


Download dev c++ from the site official :) 


You can easily change the path of calculator with your server


Enjoy !!! 

New Exploit In Internet Explorer 8 Browser

New Exploit In Internet Explorer 8 Browser Infect Windows 7 / XP  systems

This exploit enables you to apply some codes To penetrate the users easily ,And this is the compiler error of memory corruption in the presence of weakness in dealing with the elements, control, and introduction to the browser and of course the exploit skip the protections DEP / ASLR  And targeting systems XP / 7 So far there is no updates to eliminate the exploit

This Exploit has become available in the Metasploit  project

Generally This is the exploit : http://pastebin.com/VmZNrzgw

Enjoy !!!

Gartland1 Email Bomber

Gartland1 email bomber lets you bomb any email address sent from any email address with no login or smtp its fast and easy to use :)

Video of the programmer :
 
Download :

NCC Cracker - Yahoo Crackers !

Now there are many yahoo crackers  Enables you to crack the password easily

Tools that will need :



How to use NCC Cracker :

after load the id names text file in cracker.. start button will not enable.
to enable start button, need to add 1 more name by pressing on + button like this...
add any name you like, just at least 1 name
after add it , start button will be enabled.
 
  Download :


Download Xtreme Mail Bomber

Download :


Or

What is Crypter

Crypter is  software to  Bypass Security used to hide our viruses, RATs or any keylogger from antiviruses so that they are not detected and deleted by antiviruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus They typically look on the binary instructions and dependencies that are declared by the software. If their combination is risky then the heuristic alarm will be triggered.



How does a FUD crypter work?
The cryptor takes the Origial binary file of your exe and applies many encryptions on it then stores it on the ''end of file'' (EOF) ,.. so that a new encrypted executable file is created. In computing, EOF is a condition where no more data can be read from a data source.

Below is a simple diagram on FUD encryption;

As you can see from the above illustration, the new .exe file (encrypted) file can not be detected by antivirus be its Original code has been scrambled by the FUD crypter. When executed, the new .exe file decrypts its binary code into small portions of data at a time and injects them into another already existing process or it drops the code into multiple chunks in alternative data streams (rarely scanned by antivirus software) then executes it as a .txt or mp3 file.

Why Most FUD Crypters dont Work?
As a FUD crypter becomes popular, it also gains too much attention from Antivirus companies. The Antivirus software will be updated regulary and may include new detection mechanism that will easily detect any encryptions made by the crypter.

Where to Test whether your crypter is FUD or not?
If you want to test wheather your crypter is FUD or not, go to  http://scanner.novirusthanks.org and dont forget to check the box ''Do not distribut the sample''

Note:-Do not test your crypter on http://virustotal.com as it distributes the samples and your crypter will not remain FUD if you scan with virustotal.

Where to get a free FUD crypter?

its hard to find a 100% FUD crypter, because of the constant update in antivirus detection mechanisms. But just incase you get your hands on a latest FUD crypter If you followed FreeHackTools.Com you will find the best

O-Crypt3r-V1.0


Of course, the program features a new and integrated and The result CLEAN :)
Firstly Before running the program go to  O~Crypt3r V1.0\ocx  and open Registrator is a Codejock Software Registrator and registre It is necessary to run the program .

Before building Open :


This video has been explained by the programmer :


Download : 


Smart Crypt Server Version : 1.0

Picture of a test server before the change and examined after the change

Download : 

LordPE the encrypter

LordPE is a tool e.g. for system programmers which is able to edit/view many parts of PE (Portable Executable) files, dump them from memory, optimize them, validate, analyze, edit,...
And so on your server will be encrypted.


How it work ?
Just drag and drop your server into the software
After a moment a small window appears as shown in the picture below


Video To understand the concept better

 


Download:


Mediafire

Encrypt your server from most antivirus

Hello everybody

After many inquiries from Dear viewers about how to encrypt servers

We decided to offer you an easy way and very effective at the same time.
Let us leave the video speaks .


Program used : Pc Guard

Cobra Crypter v1.0

Programmed By Abelz-Hacker
Programming language : visual basic 2012.Net


Tested On Cybergate + Bifrost
Download : 

Download Fly Crypter 2.6 - AUSG 1.4

Programmed By BUNN
Programming language : Visual Basic 6.0



Download :

Download SIkandar's crypter V8 Cracked

Basic information:
Sikandar's crypter is the longest running crypter sold on HackForums.net and is one of the best programs ever sold. The crypter has two parts, one which enables you to crypt a file having no dependancies(C++ stub) and the other giving you an option to crypt your files using a managed(.Net) stub. So, the dependancy of the output file is based on your choice whether to choose a native compilation or managed compilation. There is a mini crypter which comes free with this amazing product.


Features:
You can find the outline of features here. You can read the whole list later below.
         [] 7 encryption methods.
         [] 'Native' and 'Managed' compilation.
         [] Unique stub generator. (Built-in)
         [] File binder. (Any extension)
         [] 20 Antis.
         [] 7 process killers.
         [] Portable executable nuke. (Obfuscation methods)
         [] 13 website blockers.
         [] Add to start-up.
         [] Start-up persistence.
         [] Execution persistence.
         [] Mutex generation.
         [] Output code generator.
         [] Assembly information generator.
         [] File cloner.
         [] Message box.
         [] Cure infection.
         [] Scan4you scanner. (Built-in)
         [] Downloader
         [] Webpage loader.
         [] Spreaders. (Omegle, WinRAR and LAN)
         [] Custom data storage. (Resource string or Resource Library)
         [] Save/Load settings automatically.
Also notice that the options will be based on the type of compilation you choose.

For more info Go To : http://sicklabs.info

How To Use : 

Download Private Crepter Mediafire

In Fact there is 2 Crepter he first has been programmed By Visual Basic The second is the best has been programmed By VB.Net

Scan Results : http://myavscan.net/result.php?scan=NDU2Njcz

Note : will not remain FUD if you scan again and remeber Crerpter VB.Net Has better results

Download Facebook Hacker V1.0 A Keylogging Software

This tool is extremely easy to connect and use. All you have to do is give an email address and a password where the stolen information is to deliver. Can’t be easier than that.

Just type in the email address and password and then click on the build button. A new “SERVER.EXE” file will be created and most of the work is already done. Now the big part comes. Just send this file to the victim. Rename it, change the icon and make it more presentable so that the victim opens it for sure.

As soon as the victim opens the file, Server.exe will get all the passwords saved and facebook account credentials and will give them to you. To avoid detection, the facebook Hacker will also look for all the processes related to a security suite and kill them upon detection. The most important thing this software does is it kills all the security suite detecting it.

Download :


Hotmail Hacking Bruteforce

Guess Hotmail Password Easily a brute-force attack,  is a strategy that can, in theory, be used against any encrypted data.Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier. It involves systematically checking all possible keys until the correct key is found. In the worst case, this would involve traversing the entire search space.

Download Video : Mediafire

Cara Hack Email Yahoo 2012


Cara Hack Email Yahoo 2012 - Menggunakan keylogger adalah  Cara Hack Email Yahoo 2012  termudah untuk hack password Yahoo. keylogger adalah program kecil yang mencatat setiap keystroke(termasuk password) yang diketik pengguna pada keyboard komputer tertentu's. keylogger juga disebut sebagai program mata-mata atau perangkat lunak mata-mata. Untuk menggunakannya, Anda tidak perlu memiliki pengetahuan khusus. Siapapun yang memiliki pengetahuan dasar tentang komputer harus dapat menginstal dan menggunakan perangkat lunak ini. Dengan pengalaman saya, saya sarankan dua keyloggers berikut sebagai yang terbaik untuk hacking password Yahoo. 

1. SniperSpy (Tested) 

2. WinSpy (Tested) 

Saya tidak punya akses fisik ke komputer target, apakah saya masih dapat menggunakan SniperSpy? 
Ya, Anda bisa! Karena baik SniperSpy dan WinSpy menawarkan Fitur, adalah mungkin untuk jarak jauh menginstal keylogger pada komputer target. Namun, hal itu juga akan bekerja pada komputer lokal. 

Bagaimana menggunakan SniperSpy? 

1. Setelah Anda men-download, Anda akan dapat membuat modul instalasi. Anda perlu email modul ini ke remote user sebagai lampiran. 

2. Ketika remote user menjalankan modul ini, maka akan mendapatkan terinstal diam-diam dan proses pemantauan akan dimulai. Adalah tombol yang ditangkap dan upload ke server SniperSpy terus menerus. 

3. Anda dapat login ke rekening online SniperSpy Anda (Anda mendapatkan ini setelah pembelian) untuk melihat log yang berisi password. 

CATATAN: Jika Anda memiliki akses fisik ke komputer target, Anda dapat menginstal modul sendiri tanpa perlu ke email sebagai lampiran.

menu2


header


menu