Share |
--- Welcome To Sky Net - The Organization of Hackers ---

Friday, August 26, 2011

The Best Operating System for Hackers


The Best Operating System for Hackers 
Before i post this, i was posted the link download of Back Track 5There are a couple of things that are essential to any hacker’s walk of life. To name a few, there’s the ubiquitous flash drive for data transfer. You have the crossover cable for even faster data transfer. There’s the Wi-Fi antenna for high gain and strong amplification. Possibly, you might find a video capture card in the computer. Of course, there’s the ubiquitous laptop and desktop computer. But what software is on these computers? Undoubtedly, you will find at least two operating systems, most often Windows and Linux. But with Linux, there are several different distributions. Is there a specific one? With hackers and crackers, there is only one Linux distort out there. It is called Backtrack.

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.

Password Hacking Methods - Part I

Password Hacking
Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing:- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Bermain dengan Google


Have Fun With Google


Hello friends there is some trick for you.
STEP#1 Go to google.com
STEP#2 Type in google "google sphere".
STEP#3 Click on "I'm Feeling Lucky".
STEP#4 Move your cursor.
You can also try it with typing "google gravity" on google.

IN INDONESIA :
Pertama buka Google.com / Google.co.id
Kedua Ketik "Google Sphere" di kolom pencarian
Ketiga Klik "Saya sedang beruntung"
Keempat Gerakkan mouse mu dan lihat lah
Anda juga bisa mengetikkan "Google Gravity"

Best 8 Crypters Download



8 Software Crypers terbaik
CRYPTERS! Download
  • GRINGOCRYPT
  • COOD'S CRYPTER
  • UD CRYPTER
  • FLYCRYPTER
  • CARBON CRYPTER
  • BRM CRYPTER
  • ANOTHER CRYPTER
  • NUFCRULE3_CRYPTER

Setting Backdoor in Windows | Command Prompt On Logon Screen

Lets assume that you have just cracked victim's windows password.  or simply got access to his windows for some time.Can you make some changes in windows so that you could access the windows again even if victim changes the password ?? or Can you make any changes in your own windows so that you could access it anytime even if anybody sets/changes password ?
Simply Can we set a backdoor in windows ?
Yes we can :) .
Backdoor actually means maintaining access.
okay lets do one thing first. Open your command prompt (run as administrator in win 7/vista).

Type the following command :

Syntax : net user account.name *
Example: net user administrator *
and hit enter. Set any password for that account.





Hopefully your new password must have been set. did you notice one thing ? It didn't ask you to confirm old password. Now suppose if anyhow we manage to access command prompt at logon screen (without logging in), we can easily change/clear password.  
Okay lets move on.

GOOGLE DORK FOR SQLI INJECTION

you can find vuln. site and you are ready to Sql injection.
PHP DORK
THIS IS THE LISTinurl:(0x3a,version
inurl@version,0x3a,databse)
inurl:(user,0x3a,pass)
inurl:+union+select+ from
inurl:+union+select+ pass
inurl:+union+select+ SHOP
inurl:+union+select+ admin
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=

SQL Injection | Step by Step deface website

[IF U ARE INDONESIAN PEOPLE OR OTHER , USE THE TRANSLATE TOOLS ON THE RIGHT SIDE]
What is SQL injection ?

SQL stands for Structured Query Language. It is very high level language,I mean close to humans.
Like SELECT,INSERT,DELETE,UPDATE queries are used to select,add data,delete data,update data
respectively.SQL is used to
design the databses. The information is stored in databses.
SQL injection is the vulnerability occuring in database layer of application which allow attacker to see
the contents stored in database. This vulnerabilty occures when the user's input is not filtered or
improperly filtered.Example the webpages links in format 
www.anything.com/something.php?something=something, example 
www.tartanarmy.com/news/news.php?id=130.
Here we are passing 130 to database and it returns the results accordingly. Lets attach a single quote at the end (') that is
www.tartanarmy.com/news/news.php?id=130'
and we got an error on the screen because it included the single quote (') while processing the results. It assures us that it didn't filter our input and is vulnerable to attack.



Some basics-:
Every database server has databases on it. Every database has tables in it, tables have columns in it and finally data is stored in columns.