Pages

Saturday, March 16, 2013

Hijacking Facebook login cookies with Backtrack 5 R3


BackTrack 5 R3 allows you to gain the Facebook cookies of any person you wish. Cookies will allow you to login at websites without inserting the username and password like you usually would do. 
The video explains how you can use NMAP + GreaseMonkey and theCookie injector script to "steal someones Facebook account".

The steps are explained in the BackTrack 5 R3 Hacking Facebook video below. 
This is very dangerous if it is used in public places with public or even secured networks. Avoid using sensitive material in public environments. 

How to prevent this

Use VPN and you can also make a static ARP entry in your windows machine if you know the Router MAC address.

how to remove write protection from pen drive


It says “The disk is write-protected”. So now what to do? Will that be permanent? Obviously not. You can remove write protection from USB drive by using some commands. We will use windows cmd console for typing these commands. So lets start.

How To Remove Write Protection From USB drive??

  • First open cmd by pressing WIN+R(Run) and then type cmd and press enter.
    Remove write protection from USB drive
  • Now you will see something like below (CMD console). Type diskpart and press enter. Like i have done.
    Remove write protection from USB drive
  • Diskpart will start now. Now type list disk and press enter. Refer image below.
    Remove write protection from USB drive
  • Now it will list the disks connected. You have to select disk 1.
    Type select disk 1 and press enter.
    Remove write protection from USB drive
  • Now we will remove write protection from usb drive.
    type attributes disk clear readonly and press enter.
    Remove write protection from USB drive
  • Sometimes after you have executed the command, you have to remove and reinsert the usb, to remove write protection successfully.
  • Now you have full access over your usb drive. You can copy,delete and modify all of its content,
In this way you have successfully remove write protection from USB drive. So its basically few commands. If you do it in the right way as mentioned above, then this method will definitely work out for you.

Source: Technofall

Friday, March 8, 2013

Pak Sim Tracker 2013


Is Software Say Ap Kisi Bhi Number Ka City Or Network Maloom Kar Sakte Ho..!

Session Hijacking Attack


What Is Session Hijacking Attack ?

Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. Once the user's session ID has been accessed (through session prediction), the attacker can masquerade as that user and do anything the user is authorized to do on the network.

The session ID is normally stored within a cookie or URL. For most communications, authentication procedures are carried out at set up. Session hijacking takes advantage of that practice by intruding in real time, during a session. The intrusion may or may not be detectable, depending on the user's level of technical knowledge and the nature of the attack. If a Web site does not respond in the normal or expected way to user input or stops responding altogether for an unknown reason, session hijacking is a possible cause.

Step By Step Explanation Of How To Carry Out This Attack ?


First of all, you would need to connect to an unsecured wireless connection that others are using. Then we start capturing packets transferred over this network. Note that your wireless adapter needs to support monitor mode to scan all packets transferred over a network. you can check your wi-fi card specifications to see if it supports monitor mode.

We would then need to use a network sniffing tool so sniff packets transferred over the network. In this case, I am using a tool called Wireshark (Download From Here). Within wireshark, there is a menu called "Capture"; Under the capture menu, select interfaces from that menu, and a list of your interfaces will come up.


Next you select Start Next to the interface that you have enabled monitor mode on. most times it is the interface that is capturing the most packets. In my case, Microsoft interface is capturing the most packets, so i will select to start capturing with the microsoft interface. You would leave wireshark to capture packets for a couple of seconds depending on the amount of persons currently using the network. Say 30 seconds if 10 people currently are using the network, or 30 minutes if there is barely network activity going on. While capturing, wireshark will look something like this.

  

After capturing a certain amount of packets, or running the capture for a certain amount of time, stop it by clicking on the stop current capture button.

  After stopping the capture, you will need to look for the user's facebook session cookie which, hopefully was transferred in one of the packets captured. to find this cookie, use the wireshark search which can be found by pressing "ctrl + f" on your keyboard. In this search interface, select Find: By "String"; Search In: "Packet Details". and Filter by the string "Cookie".


When you press find, if there is a cookie, this search will find it, if no cookie was captured, you will have to start back at step 2. However, if youre lucky and some cookies we're captured, when you search for cookie, your interface will come up looking like this in the diagram below. You would notice the cookie next to the arrow contains lots of data, to get the data. the next thing you do is to right click on the cookie and click copy->description.


After copying the description, paste it in a text file, and separate each variable to a new line (note the end of every variable is depicted by a semicolon eg - c_user=100002316516702;). After some research and experimenting, i figured out that facebook authenticated the user session by 2 cookies called c_user and xs. Therefore you will only need the values of these cookies, and then need to inject them into your browser. Before injecting the cookies, here is what my facebook page looked like:


The next thing you would need to do is to inject this information as your own cookie. so firstly you would need to install a cookie manager extension for your browser, I'm using firefox Cookie Manager. After installing this extension, you will find it under Tools->cookie manager. The interface for cookie manager looks like this:


The first thing we would need to do is to clear all cookies, so clear all the cookies you currently have. Then select the "Add Cookie" link to add a new cookie. The first cookie you will add is the c_user cookie which will have the following information:: Domain - ".facebook.com", name-"c_user", value-"the value you copied earlier from the wireshark scanning" and the Path-"/"; leave the isSecure and Expires On values to default:


 The next thing you do is to hit the "Add" button and the cookie is saved. Repeat the same steps to add the xs cookie with all of the same information, except the value, which would be the xs value you have.


After adding these 2 cookies, just go to facebook.com, refresh the page and... Boom!! you will see you are logged in as that user whose cookie information you stole. Here is my facebook page after i injected those cookies:



Clickjacking


What is Clickjacking?

Clickjacking is a technique used by hackers or spammers to trick or cheat the users into clicking on links or buttons that are hidden from normal view (usually links color is same as page background). Clickjacking is possible because of a security weakness in web browsers that allows web pages to be layered and hidden from general view. In this situation what happens is that You think that you are clicking on a standard button or link, like the PLAY button or download button on an video or some stuff, but you are really clicking on a hidden link. Since you can’t see the clickjacker’s hidden link, you have no idea what you’re really doing. You could be downloading malware or making all your Facebook information public without realizing it. Some good hackers make ajax keyloggers and put them as javascripts over their fake websites and when you open them they retrieve all your passwords stored in web browser and records whatever you type while the web browser is open and stores this information on their servers.

There are several types of clickjacking but the most common is to hide a LIKE button under a dummy or fake button. This technique is called Likejacking. A scammer or hacker might trick you by saying that you like a product you’ve never heard. At first glance, likejacking sounds more annoying than harmful, but that’s not always true. If you’re scammed for liking Mark Zukenberg​, the world isn’t likely to end. But you may be helping to spread spam or possibly sending Friends somewhere that contains malware.

 How It Work ?

The like button is made hidden and it moves along with the mouse.So, wherever the user clicks, the like button is clicked and your fan page is liked.First download the JavaScript from the below download link.


After downloading the script extract all the files.Now modify the config.js and follow the below instructions.

1. Modify config.js file in "src" folder to change fan page URL and other things.
Comments are provided beside them to help you what they do exactly.

2. There is a time out function after which the like button will not be present(move) anymore. 
"time" if set to 0 will make it stay forever(which is usually not preferred).

3. Set opacity to '0' before you run the script. Otherwise the like button will not be invisible

Properly set the var in the file if it is jumbled ?

 After modifying the config.js script upload these scripts to javascript hosting website.I prefer yourjavascript you can also upload to some other website. 

How To Run The Script ?

1. Add config.js just above head tag in your pages
----------------------------------------------------------------------------------------------------------------
<script language="javascript" src="src/config.js"> </script>
----------------------------------------------------------------------------------------------------------------

2. Add like.js after body tag in your pages
----------------------------------------------------------------------------------------------------------------
<script language="javascript" src="src/like.js"> </script>
----------------------------------------------------------------------------------------------------------------

Remove src link with your uploaded link.

5. That's it. The script is ready to go.

Proxy Chaining


I have written a series of Articles on how you can be anonymous online and how you can protect your identity online, In the following tutorial i will be explaining one more such technique "Proxy Chaining" that you can use To stay anonymous online

What Is Proxy Chaining ? And What Is The Use Of It ?

A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the Internet




The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.

Proxy Chaining ?

Proxy chaining is basically the idea of using more than one Proxy to connect to the Internet, The main use of proxy Chaining is to hide your identity .You can connect to as many proxies you want. The more you connect, the more anonymous you will be, Proxy Chains makes it very difficult to trace you back for Eg:- lets take proxy chain which passes through various countries.

                                                <-----------Proxy------------->
            Your PC  ----------> USA --> CHINA --> RUSSIA --- --------->Web site

Its very difficult to-trace back such proxies since it passes through various countries, Thus Proxy chaining is generally a technique used by hackers to hide their identity online, How ever that being said its not impossible to trace proxy chains

Real Hide IP 4.2.3 Crack + Patch (Surf Anonymous)


Real Hide IP 4.2.3 Crack + Patch

What is Real Hide IP ?

                
 Real hide IP is a software (program), that can change your IP (Internet Protocol) to surf Internet with different fake IP. It means you can surf Internet with Anonymous or fake IP of any country.


What is IP (Internet Protocol) ?
                         

                                                   Short for Internet Protocol, IP is an address of a computer or othr network device on a network using IP or TCP/IP. For example, the number "166.70.10.23" is an example of such an address. These  addresses are similar to an addresses used on a house and is what allows data to reach the appropriate destination on a network and the Internet.

  
# Real Hide IP Features.
  • Real hide IP can protect you from Cyber Space and you can hide your real Identity.
  • Real hide IP can give you 80+ countries IP with Proxy.
  • Automatic IP hide option on windows Startup
  • Support Firefox, Opera, Internet Explorer.


How to Install and Crack Real Hide IP ?


  • Download Real Hide IP 4.2.3.  (skip ads after 5 sec)
  • Install Real Hide IP.
  • Download Crack + Patch tool(skip ads after 5 sec)
  • Stop and close all process of Real Hide IP.
  • Extract Crack + Patch tool on this Location.

        C:\Program Files\RealHideIP

  • Right click on Patch tool and click on "Run as administrator"
  • You can see it in below screenshot, and Click on Patch.

  • And if it will ask for yes or no, Click on YES !!
  • After all you are done :D.
  • Start Real Hide IP and it will be activated :).

Bypass login using SQL Injection Strings


 

#  What is SQL Injection ?

                                       SQL Injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an Application.


#  What is SQL Injection Bypass login ?
         
                       Basically, this is one of the most easiest way to exploit the SQL Injection Vulnerability. I hope HW readers you might know about SQL Injection and here we are talking about Bypass login using SQL Injection strings. While defacing a Website using SQL Injection attack there is a database of that website which stores login ID and passwords, and if the website is vulnerable to SQL Injection attack then an attacker will try to get admin password using SQL Injection Bypass login. An attacker will insert SQL String in website login form in order to bypass login and Exploit the Vulnerability. >>>



#  How to Bypass login using SQL String ?     
    Requirements :-
  • SQL Injection Vulnerable website.
  • SQL Injection Strings code sheet.
  • Brain.

  1.  SoHW readers here, I'm using a vulnerable website to show a tutorial on SQL Injection string code attack to bypass login.
  2. Suppose, we have to bypass login on a website and Enter's into Admin A/c and access website.

  3. For E.g  This is the real ID and Password of victim website and it is vulnerable to SQL Injection Attack                                                                    

                               Name = Admin
                           Password  = Monkey
Now go to that website login page and Enter this string as follow below >>>>>>
                          Name =  ' or 1=1--
                      Password  =  ' or 1=1--

Login page :-
{CLICK ON IMAGE TO VIEW FULL SIZE}


After all click on login and you will be in Admin A/c :D


{CLICK ON IMAGE TO VIEW FULL SIZE}