Showing posts with label Network Hacking. Show all posts
Showing posts with label Network Hacking. Show all posts

Sunday, 20 November 2011

How to Control a Remote Computer using Lost Door


Remote Administration tools also known as RAT are windows Trojans or in simple terms programs used by a Hacker to get administrative privileges on the victim’s computer. Using a RAT you can do a lot of cool things such as “Upload, delete or modify data” , “Edit registry”, “Capture victim’s screen shot”, “Take control of victim’s Computer”or “Execute a virus” just with a click of a button. Throughout this article I will teach you how to use Lost Door, a Windows RAT, to control and monitor a victim’s computer remotely.
Disclaimer: Coder and related sites are not responsible for any abuse done using this software.
Follow the steps below to setup a server for Lost Door.
  • Download Lost Door from here . (Update: In case the given download link doesn’t work, use this secondary download link. The password to unzip this file is “ehacking.nethungry-hacker.com” without double quotes.)
  • On executing the download file, you will see the following screen. Accept it
  • After it is open, right click on the window and click on create server
  • Now enter your IP address and DNS here. Leave the rest of the field as it is.
  • Now click on the ‘Options’  tab and choose the options as you want. To activate an offline keylogger is a good practice.
  • Now go to ‘Advanced’ Tab. There will options related to spreading. This will be used in case you have more than 1 victim.
  • Now just go to the ‘Create’ tab and click on create server. Your server is ready for use now and now send it to the victim.

Sending the server file to your victim

This is the most important thing after you have created your server file. If you want to take control on a single computer than you have to send this server file to the desired victim but if you want to affect more and more people than you have to use some spreading techniques.
  • If you have physical access to the victim’s computer then take the server file in a pen drive and just double click on your server file once you have injected the pen drive into that computer.
  • For those who don’t have physical access can use social engineering in order to get the victim execute that file on his computer.

Using Spreading to affect multiple victims

If you have more than one victim, then you have an option of using spreading technique. You might think that by creating multiple server files you can control multiple users. But here is a secret about spreading. When you select the spreading option, the server file will act as a worm which will spread itself across different computers via Email or any other channel. So your burden will be only to get one victim to execute that file on his computer, the remaining job of getting other victims will be done on its own.

How To Hack Closed PC On Cyber Cafe


http://mylovetechnology.com/wp-content/uploads/2009/07/cloud-computing-1.gifSo here is a quick new hack on how to intrude in the PC which is shut downed at Cyber cafe. (Don’t Forget to read our disclaimer at the bottom of the post.)

1. As you all must have know these days all Cyber cafe owners have a program for administration to control all PC’s in local area network. So all files can be inter transmitted.
2. First of all press Ctrl+Alt+Del the task manager or any controlling application, will open. Then from APPLICATIONS select the program that is controlling all PC’s  & terminate it, This is for security reason. Now log of PC, & you ll get user names of the PC.
3. But some times, cyber cafes have security clients installed that have restricted access to Task Manager, restart the computer & press F8 continuously before windows boots.
The Menu will open, select Safe Mode from it. And now you can copy files from networked PC’s without any  security layer.
Next step is where you’ll need to crack the hashes.  SO go to your home PC , Download & install Saminside cracking tool. And from some another Cyber cafe try to crack the hashes of that PC. By same log off method explained below.
This where you actually perform hacking. Have a gret time & tell us weather it worked for you.
Meanwhile if you can get IP address,  of the PC you wish to hack try to get it from ip-explorer.com, but this is not the part of this hack its sort of next step of hacking from outside the network.
Disclaimer : The trick here explained it for educational purpose only & not to  perform illegal or criminal activities. Don’t forget hacking into some one’s privacy is considered as crime. SO do it on your home network that you own or something.  We are not responsible for anything you do & consequences of it by using our articles.

Hacking With Nmap – The Network Mapping Tool


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwpLfIrm4sWk1yp06oURpFePr1AUcyxkgaueRap9SX4XypibaHyWrofaqVwnnvd9FQLUoIvkHy_J5PWKsGtp2AzElQ3ilmsh6cwxhDFSV7hXoxdHGQwIKTytWF-hUVQrG6z8U_CgMtTrk/s1600/nhack.jpegNmap is most widely used port scanning & network mapping tool used widely by network administrators & security administrators to scan their ports for potential vulnerabilities. If you are not aware of Nmap & you don’t have it then you can download it here for both Linux & Windows.

Nmap Hacking Theory

Following are the states that ports are available in
1. Open                                 Closed
2. Filtered                           Unfiltered
3 .Open / filtered           Closed/unfiltered
Scanning through Nmap gives you list of ports that are opened or filtered. Most of closed ports are not disclosed as there are almost 65000 ports in a computer for communication.
(Filtered packet : It means the data packets that are sent or received are filtered by firewall to secure it.)
Ok, So ready to hack with Nmap,
There are three types of basic scans you can perform on ports which is as follows :
SYN Scan : It is the most simple & common scan that is used to scan for ports. The scan results are very faster compared to other types , but it gives generalized results.

FIN Scan : FIN scan can detect if any kind of filtered packets or weak firewalls, and warns attacker to create stealth for attacking the victim network.

ACK Scan : Filtered and unfiltered ports can be scanned with this type of port scan. It is the most advanced scanning done with nmap.

Hacking With Nmap

So let us start with commands of Nmap operation in Linux:
SYN scan :
For scanning www.sampledomain.com
Type in your terminal of linux:
#nmap -sS -T4 www.sampledomain.com         (replace domain or IP you wish to scan at sampledomain.com)
Result will be having three tables :
Port                           State                                 Service
This will give you port number its state open?filtered like that & services will give you what is service running on that ports.

FIN Scan :
#nmap -sF -T4 www.sampledomain.com         (replace domain or IP you wish to scan at sampledomain.com)
Live host & filtered ports are found out with this method
ACK Scan :
#nmap -sA -T4 www.sampledomain.com         (replace domain or IP you wish to scan at sampledomain.com)
All closed ports are eliminated with this ACK scan. And you’ll only see ports that are up for attack.
So this was a basic Nmap hacking or port scanning tutorial. You can also find OS running, web server & mail server scanning & this data can be used as Passive attack gathering stage which we have discussed in pre attack stages.
We will discuss web server hacking in upcoming posts. Please post your queries regarding nmap by commenting here. So that we can help you the most.

Mapping The Network Of A Victim Organization


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPaWS3tcFg910TeUaa4lVdOQ1V77CjH4HYeFM8_ryiFE8lXb_JMhySUykNETYuhq0pNpkvkFuylHxqDUwCZvElh4b-jmYcix5TCBe99rQ6XF27Jl4DNMQ8Yh_nqXtjGiemw-wqp2qtBwk/s1600/computer_network.jpgas we discussed about how you can get information about your victim with the help of Passive Attack Gathering. Now what you have to do with this information ? The next step is known as Network Mapping.
While performing White Box, The ethical hackers know about how network is managed, how it is organized all the little details are also known to ethical hacker, who is performing the penetration testing on the victim network.
But, Case is reverse in Black Box Testing, Ethical hacker is kept a way outside the organization & he could not even gett that details directly. So what he do is first perform passive attack gathering & collect some information, then he arranges all the information in particular order so as to predict the hierarchy of the network.
He collects more & more information about the network as follows:
The operating systems installed on network & server
More information on network administrator & security persons
Vulnerable software installed on network
Firewalls , how they are used & how many ?
Topology of the network.
Security architecture of network.
You may ask that if organizations are paying highly to ethical hacker, why they don’t directly provide information ? But actually, when any criminal try to penetrate the network, he do not know anything about them. So, results of Black box are more satisfactory to find out all the vulnerabilities.
Now after arranging all the things in sequence, ethical hacker tries to break in network & find security holes, if he fails in first attempt, he changes his network map. & if he succeeds he proceeds to next hole. So by this way with trial & error he keeps entering the networks or changing his network map till he succeeds.
Mapping of Network need very much information in penetration, it is not the game for newbie, nut still you have to start somewhere, & starting with your own small network is not a bad idea, isn’t it ?

Related Posts Plugin for WordPress, Blogger...

Your Facebook Comments....

Your Facebook Comment will not be displayed for a specified Post it would be shown on homepage of the website and on other pages too.....so if want to comment on a specific post please mention that desired post............
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Ajay Verma | Powered by Ajay Verma - Ajay Verma | Admin