We Are Anonymous..!

Baner

Saturday, 27 September 2014

Hacking Tools

No comments :

HACKING TOOLS 

Names Of Some Tools Use In Professional Hacking or Computer Hacking
  • Hide Your Ip
  • Nmap
  • Net Cat
  • Password Variator
  • Access Pass View

Hide Your Ip:


Hide your ip is the first and basic rule in hacking.Because you are not the only one who is learning how to hack.So for your security you have to hide your IP ADDRESS.Ip address is a gate way of every computer.You want to hack somebody's computer you have to know his ip address.i will tell you in my next How to get someone's ip address.In this post i will tell you the basics.




Nmap:




Nmap is a very powerful Hacking Tool.It is a professional tool for Hacking...There are two type of ports in a server or computer  first type is physical ports and second visual ports..Physical ports used for data transfer or usb etc..But the visual ports are the small gate ways in a server or computer from where data goes in or out.To Hack a computer or server you need to pass through a visual port but Server or computer will not give you the permission to pass.Now here Nmap will help you to pass through.Nmap find's a free visual port on a server or computer to fit in and pass through easyily...This type of professional Hacking is illegal so be careful.
  • (Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) used to discover hosts and services on a computer network, thus creating a "map" of the network )
Nmap features include :
  • Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.
  • Port scanning – Enumerating the open ports on target hosts.
  • Version detection – Interrogating network services on remote devices to determine application name and version number.
  • OS detection – Determining the operating system and hardware characteristics of network devices.
  • Scriptable interaction with the target – using Nmap Scripting Engine (NSE) and Lua programming language.
Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.
Typical uses of Nmap:
  • Auditing the security of a device or firewall by identifying the network connections which can be made to, or through it.
  • Identifying open ports on a target host in preparation for auditing.
  • Network inventory, network mapping, maintenance and asset management.
  • Auditing the security of a network by identifying new servers.
  • Generating traffic to hosts on a network.

Basic commands working in Nmap

  • For target specifications:
nmap <targets' URL's or IP's with spaces between them (can also use CIDR notation)>
e.g. : scanme.nmap.org, gnu.org/24, 192.168.0.1; 10.0.0-255.1-254 (The command is nmap scanme.nmap.org
and similar)
  • For OS detection:
nmap -O <target domain or IP address>
  • For version detection:
nmap -sV <target domain or IP address>
  • For configuring response timings (-T0 to -T5 :increasing in aggressiveness):
nmap -T0 -sV -O <target domain or IP address>
  • For SYN-stealth scanning by sending TCP packets with the SYN flag set:
nmap -sS -p <port of target> <IP address of target>

NET CAT:


Netcat is a computer networking service for reading from and writing to network connections using TCP or UDP. Netcat is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts.Net cat is very interesting and awesome networking service.Net cat is a base in Hacking.It works like an head quarter.Some features of Net Cat are listed.
  • Outbound or inbound connections, TCP or UDP, to or from any ports
  • Full DNS forward/reverse checking, with appropriate warnings
  • Ability to use any local source port
  • Ability to use any locally-configured network source address
  • Built-in port-scanning capabilities, with randomization
  • Built-in loose source-routing capability
  • Can read command line arguments from standard input
  • Slow-send mode, one line every N seconds
  • Hex dump of transmitted and received data
  • Optional ability to let another program service establish connections
  • Optional telnet-options responder
Featured tunneling mode which permits user-defined tunneling, e.g., UDP or TCP, with the possibility of specifying all network parameters (source port/interface, listening port/interface, and the remote host allowed to connect to the tunnel).

  CLICK HERE TO DOWNLOAD NET CAT MANUAL!!

Opening a raw connection to port 25 (like SMTP)

nc mail.server.net 25

Setting up a one-shot webserver on port 8080 to present the content of a file

{ echo -ne "HTTP/1.0 200 OK\r\nContent-Length: $(wc -c <some.file)\r\n\r\n"; cat some.file; } | nc -l 8080
The file can then be accessed via a web browser under http://servername:8080/. Netcat only serves the file once to the first client that connects and then exits, it also provides the content length for browsers that expect it. (This should work fine in a LAN, but probably may fail with any kind of firewall between.).

Checking if UDP ports (-u) 80-90 are open on 192.168.0.1 using zero mode I/O (-z)

nc -vzu 192.168.0.1 80-90
Note that UDP tests will always show as "open". The -uz argument is useless.

Test if UDP port is open: simple UDP server and client

This test is useful, if you have shell access to the server that should be tested, but you do not know whether there is a firewall blocking a specific UDP port on the server.
On the listening host, i.e. on the server whose port needs to be checked, do the following:
nc -ul 7000
On the sending host, do the following – note that servname is the hostname of the listening host:
nc -u servname 7000
If text typed on the sending host (type something and hit enter) is displayed also on the listening host, then the UDP port 7000 is open. If it is not open, you will get an error such as "Connection refused".
There is a caveat. On some machines, IPv6 may be the default IP version to use by netcat. Thus, the host specified by the hostname is contacted using IPv6, and the user might not know about this. Ports may appear closed in the test, even though they would be open when using IPv4. This can be difficult to notice and may cause the false impression that the port is blocked, while it is actually open. You can force the use of IPv4 by using adding -4 to the options of the nc commands.

Pipe via UDP (-u) with a wait time (-w) of 1 second to 'loggerhost' on port 514

echo '<0>message' | nc -w 1 -u loggerhost 514

Port scanning

An uncommon use of netcat is port scanning. Netcat is not considered the best tool for this job, but it can be sufficient (a more advanced tool is nmap)
nc -v -n -z -w 1 192.168.1.2 1-1000
The "-n" parameter here prevents DNS lookup, "-z" makes nc not receive any data from the server, and "-w 1" makes the connection timeout after 1 second of inactivity.

Proxying

Another useful behaviour is using netcat as a proxy. Both ports and hosts can be redirected. Look at this example:
nc -l 12345 | nc www.google.com 80
Port 12345 represents the request
This starts a nc server on port 12345 and all the connections get redirected to google.com:80. If a web browser makes a request to nc, the request will be sent to google but the response will not be sent to the web browser. That is because pipes are unidirectional. This can be worked around with a named pipe to redirect theinput and output.
mkfifo backpipe
nc -l 12345 0<backpipe | nc www.google.com 80 1>backpipe
The "-c" option may also be used with the 'ncat' implementation:
ncat -l 12345 -c 'nc www.google.com 80'
Using a named pipe is a more reliable method because using "-c" option provides only a one-shot proxy.
Another useful feature is to proxy SSL connections. This way, the traffic can not be viewed in wire sniffing applications such as wireshark. This can be accomplished on UNIXes by utilizing mkfifonetcat, and openssl.
mkfifo tmp
mkfifo tmp2
nc -l 8080 -k > tmp < tmp2 &
while [ 1 ]
do
 openssl s_client -connect www.google.com:443 -quiet < tmp > tmp2
done

Making any process a server

netcat can be used to make any process a network server. It can listen on a port and pipe the input it receives to that process.
The -e option spawns the executable with its input and output redirected via network socket.
For example, it is possible to expose a bourne shell process to remote computers.
To do so, on a computer A with IP 192.168.1.2, run this command:
 nc -l -p 1234 -e /bin/sh
Then, from any other computer on the same network, one could run this nc command:
 nc 192.168.1.2 1234
 ls -las
And the output one would see might be like this:
 total 4288
 4 drwxr-xr-x 15 imsovain users 4096 2009-02-17 07:47 .
 4 drwxr-xr-x  4 imsovain users 4096 2009-01-18 21:22 ..
 8 -rw-------  1 imsovain users 8192 2009-02-16 19:30 .bash_history
 4 -rw-r--r--  1 imsovain users  220 2009-01-18 21:04 .bash_logout
 ...
In this way, the -e option can be used to create a rudimentary backdoor. Some administrators perceive this as a risk, and thus do not allow netcat on a computer.

Port Forwarding or Port Mapping

On Linux, NetCat can be used for port forwarding. Below are nine different ways to do port forwarding in NetCat (-c switch not supported though - these work with the 'ncat' incarnation of netcat):
nc -l -p port1 -c ' nc -l -p port2'
nc -l -p port1 -c ' nc host2 port2'
nc -l -p port1 -c ' nc -u -l -p port2'
nc -l -p port1 -c ' nc -u host2 port2'
nc host1 port1 -c ' nc host2 port2'
nc host1 port1 -c ' nc -u -l -p port2'
nc host1 port1 -c ' nc -u host2 port2'
nc -u -l -p port1 -c ' nc -u -l -p port2'
nc -u -l -p port1 -c ' nc -u host2 port2'
Example, see Proxying Netcat#Proxying

Ports and reimplementations

The original version of netcat was a Unix program. The last version (1.10) was released in March 1996.
There are several implementations on POSIX systems, including rewrites from scratch like GNU netcat or OpenBSD netcat, the latter of which supports IPv6. The OpenBSD version has been ported to the FreeBSD base and Windows/Cygwin as well. Mac OS X users can use MacPorts to install a netcat variant. There is also a Microsoft Windows version of netcat available.
Known ports for embedded systems includes versions for the Windows CE (named "Netcat 4 wince") or for the iPhone.
BusyBox includes by default a lightweight version of netcat.
Solaris 11 includes netcat implementation based on OpenBSD netcat.
Socat is a more complex variant of netcat. It is larger and more flexible and has more options that must be configured for a given task.
Cryptcat is a version of netcat with integrated transport encryption capabilities.
In the middle of 2005, Nmap announced another netcat incarnation called Ncat. It features new possibilities such as "Connection Brokering", TCP/UDP Redirection, SOCKS4 client and server support, ability to "Chain" Ncat processes, HTTP CONNECT proxying (and proxy chaining), SSL connect/listen support and IP address/connection filtering. Like Nmap, Ncat is cross-platform.
On some systems, modified versions or similar netcat utilities go by the command name(s) ncncatpnetcatsocatsocksocketsbd.



PASSWORD VARIATOR:


Password Variator is software that works like brute force .You give him some character of other computer's password and it will show you the maximum possible passwords ...its a slow way of Hacking. it can only be use when you know some part of password of other computer..
Often users run into a problem with their passwords because original password was mistyped. Password Variator will help you in this situation.
Just enter the password and Password Variator will build a file with all possible variations, typos and mistypes inside. Then you can use that file as a dictionary in your password recovery program.
You can use Password Variator with any password recovery software that supports dictionary attack.
Password Variator emulates following typos:1. missed char (for example: sample -> smple)2. duplicated char (for example: sample -> saample)3. extra char (for example: sample -> sqample).4. wrong order (for example: sample -> sampel)5. wrong case (for example: sample -> SAMPLE or Sample -> SAmple)Password Variator can emulate single, double and triple typos.

ACCESS PASS VIEW:


An Old Way Of Hacking...
This utility reveals the database password of every password-protected mdb file that created with Microsoft Access 95/97/2000/XP or with Jet Database Engine 3.0/4.0 .
It can be very useful if you forgot your Access Database password and you want to recover it.
* In Access 2000/XP files, this utility cannot recover passwords that contains more than 18 characters.
* This utility shows only the main database password. It cannot recover the user-level passwords. 
Versions History
================
19/04/02 Version 1.12: Added command-line and drag & drop support.
18/02/02 Version 1.11: Added more file types to the list: mda files, mde files and all files.
31/01/02 Version 1.1 : Added support for Access 2000/XP files.
15/02/00 Version 1.0 : First release. Shows passwords of Microsoft Access 95/97 files. 
Using Access PassView
=====================
Using the Access PassView utility is very simple. it doesn't need any installation process or additional DLL files. 
You can run the "accesspv.exe" file from any directory you want, and start to work.
In order to get the password from your mdb file, click the "Get Password" button, select the mdb file and the password will be shown in the main text box.

There are also 2 alternative ways for getting the password of mdb file:
1. Drag & Drop: You can get the password of your mdb file by dragging it from the explorer window into the Access PassView window.  
2. Command-line: You can get the password of your mdb file by adding the filename as command-line parameter. 
   For example:
   accesspv.exe c:\access\mymdb.mdb

Keep coming to our website for more knowledge!!!



No comments :

Post a Comment