1ND14N H4X0R5 T34M (IHT) JAI HIND JAI BHARAT

We are :- DeadManINDIA,Null_Port_Govind,Haxor Rahul,EagleShadow,Karate-Katrina,Spy-Hunter,Grey-Noob,Mr.R@66!T.

A big Slute to Our Indian Armies

Freedom is not free Our Soldiers Donates theirs lifes for us

We are Indians and We are Proud to be Indians

India is great.Because their is one place in the world where Peoples Recpect all Religious.

Kali is good OS for Hacking

Peoples Says this OS is best This OS is best but no one OS like Kali Linux .

MOM and DAD

I can't saw God but When i see my MOM and DAD then i think God in there they are My Gods Love You MOM DAD.

Saturday, 4 January 2014

Cain Able Full tut

Who Should Use This Tool?
Cain & Abel is a tool that will be quite useful for network administrators, teachers, professional penetration testers, security consultants/professionals, forensic staff and security software vendors.
Requirements
The system requirements needed to successfully setup Cain & Abel are:
– At least 10MB hard disk space
– Microsoft Windows 2000/XP/2003/Vista OS
– Winpcap Packet Driver (v2.3 or above).
– Airpcap Packet Driver (for passive wireless sniffer / WEP cracker).
Installation
First we need to download Cain & Abel, so go to the download page www.oxid.it/cain.html.
After downloading it,just run the Self-Installing executable package and follow the installation instructions.
Cain’s Features
Here’s a list of all of Cain’s features that make it a great tool for network penetration testing:
Protected Storage Password Manager Credential Manager Password Decoder
LSA Secrets Dumper Dialup Password Decoder
Service Manager APR (ARP Poison Routing)
Route Table Manager Network Enumerator
SID Scanner Remote Registry
Sniffer Routing Protocol Monitors
Full RDP sessions sniffer for APR Full SSH-1 sessions sniffer for APR
Full HTTPS sessions sniffer for APR Full FTPS sessions sniffer for APR
Full POP3S sessions sniffer for APR Full IMAPS sessions sniffer for APR
Full LDAPS sessions sniffer for APR Certificates Collector
MAC Address Scanner with OUI fingerprint Promiscuous-mode Scanner
Wireless Scanner PWL Cached Password Decoder
802.11 Capture Files Decoder Password Crackers
Access (9x/2000/XP) Database Passwords Decoder Cryptanalysis attacks
Base64 Password Decoder WEP Cracker
Cisco Type-7 Password Decoder Rainbowcrack-online client
Cisco VPN Client Password Decoder Enterprise Manager Password Decoder
RSA SecurID Token Calculator Hash Calculator
TCP/UDP Table Viewer TCP/UDP/ICMP Traceroute
Cisco Config Downloader/Uploader (SNMP/TFTP) Box Revealer
Wireless Zero Configuration Password Dumper Remote Desktop Password Decoder
MSCACHE Hashes Dumper MySQL Password Extractor
Microsoft SQL Server 2000 Password Extractor Oracle Password Extractor
VNC Password Decoder Syskey Decoder




Related Definitions:
MAC: (from Wikipedia) “A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies, including Ethernet. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.

MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card’s read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer’s registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. A network node may have multiple NICs and will then have one unique MAC address per NIC.”

Sniffing: (fromWikipedia) “A packet analyzer (also known as a network analyzer, protocol analyzer or packet sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet’s raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate RFC or other specifications.”

ARP(from Wikipedia) “Address Resolution Protocol (ARP) is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. ARP was defined by RFC 826 in 1982. It is Internet Standard STD 37. It is also the name of the program for manipulating these addresses in most operating systems.”

Usage
Now after launching the application, we have to configure it to use appropriate network card.If you have multiple network cards, it’s better to know the MAC address of the network card that you will use for the sniffer.To get the MAC address of your network interface card, do the following:

1- Open CMD prompt.
/p>
2- Write the following command “ipconfig /all”.
3- Determine the MAC address of the desired Ethernet adapters, write it on Notepad,and then use this information to help determine which NIC to select in the Cain application.
Now clickConfigure on the main menu. It will open the configuration dialog box where you can select the desired network interface card.

Now let’s go through the configuration dialog tabs and take a brief look at most of them:

Sniffer Tab:

This tab allows us to specify which Ethernet interface card we will use for sniffing.

ARP Tab:
This tab allows us to configure ARP poison routing to perform ARP poisoning attack, which tricks the victim’s computer by impersonating other devices to get all traffic that belongs to that device, which is usually the router or an important server.
Filters and Ports Tab:
This tab has the most standard services with their default port running on.You can change the port by right-clicking on the service whose port you want to change and then enabling or disabling it.
Cain’s sniffer filters and application protocol TCP/UDP port.
HTTP Fields Tab:

There are some features of Cain that parse information from web pages viewed by the victim such as LSA Secrets dumper, HTTP Sniffer and ARP-HTTPS,so the more fields you add to the username and passwords fields, the more you capture HTTP usernames and passwords from HTTP and HTTPS requests. Here is an example:

The following cookie uses the fields “logonusername=” and “userpassword=” for authentication purposes. If you don’t include these two fields in the list, the sniffer will not extract relative credentials.

GET /mail/Login?domain=xxxxxx.xx&style=default&plain=0 HTTP/1.1

Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, application/x-shockwave-flash, */*

Referer: http://xxx.xxxxxxx.xx/xxxxx/xxxx

Accept-Language: it

Accept-Encoding: gzip, deflate

User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; (R1 1.3); .NET CLR 1.1.4322)

Host: xxx.xxxxxx.xx

Connection: Keep-Alive

Cookie: ss=1; logonusername=user@xxxxxx.xx; ss=1; srclng=it; srcdmn=it; srctrg=_blank; srcbld=y; srcauto=on; srcclp=on; srcsct=web; userpassword=password; video=c1; TEMPLATE=default;

Traceroute Tab:

Traceroute is a technique to determine the path between two points by simply counting how many hops the packet will take from the source machine to reach the destination machine. Cain also adds more functionality that allows hostname resolution, Net mask resolution, and Whois information gathering.

Certificate Spoofing Tab:

This tab will allow Certificate spoofing.From Wikipedia:

“In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document that uses a digital signature to bind a public key with an identity — information such as the name of a person or an organization, their address, and so forth. The certificate can be used to verify that a public key belongs to an individual.

In a typical public key infrastructure (PKI) scheme, the signature will be of a certificate authority (CA). In a web of trust scheme, the signature is of either the user (a self-signed certificate) or other users (“endorsements”). In either case, the signatures on a certificate are attestations by the certificate signer that the identity information and the public key belong together.”

We can simply think of it as some sort of data (cipher suites & Public key and some other information about the owner of the certificate) that has information about the destination server and is encrypted by trusted companies (CA) that are authorized for creating these types of data.The server sends its own certificate to the client application to make sure it’s talking to the right server.

Certificate Collector Tab:

This tab will collect all certificates back and forth between servers and clients by setting proxy IPs and ports that listen to it.

Challenge Spoofing Tab:
Here you can set the custom challenge value to rewrite into NTLM authentications packets. This feature can be enabled quickly from Cain’s toolbar and must be used with APR. A fixed challenge enables cracking of NTLM hashes captured on the network by means of Rainbow Tables.

Password Cracking
Now it’s time to speak about the cracker tab,the most important feature of Cain.When Cain captures some LM and NTLM hashes or any kind of passwords for any supported protocols, Cain sends them automatically to the Cracker tab.We will import a local SAM file just for demonstration purposes to illustrate this point.Here is how to import the SAM file:



Here are the 4 NTLM and LM hashes which will appear like the following image:



And here you will find all possible password techniques in the following image:



As you can see from the previous image, there are various types of techniques that are very effective in password cracking.We will look at each of their definitions.

Hacking with LAN by Cain and Abel

Hacking in LAN by Cain and Abel

This is another tool that is favored in extracting or recovering passwords. Note very carefully, Cain and Abel is a "PASSWORD RECOVERY" tool, use it carefully.
(THIS POST IS FOR EDUCATIONAL USE ONLY)
Before I start, there are a few requirements.
  • Download Cain and Abel from www.oxid.it
  • Should have a switched LAN. (Most ISPs other than BSNL provide broadband via LAN, e.g. SIFY, HATHWAY, local Cable internet connections)
  • Any Microsoft Windows Operating System.
If you are not sure about being on a switched network, continue the steps, until you find out.
  1. Download and install Cain and Able from the link given above.
  2. Start Cain and Abel (requires admin privileges in Vista), go to the sniffer tab, click on the configure menu, select your NIC, check 'start sniffer on startup', press 'OK'.
  3. Click on the 'Start / Stop Sniffer' (the 2nd) button on the toolbar. Now click the blue '+' (plus) sign (this is the 7th button on the toolbar). Check 'All Tests' and click 'OK'.
  4. After the scan is complete, if you are on a switched network then, you must be able to see many IP and MAC addresses in this pane. If you don't see any IP other than your own, probably you are not on a switched network.
  5. Notice the tabs on the bottom, HOSTS, APR, Routing, Passwords, and VoIP. You are currently on the HOSTS tab, select the APR tab click on the 'top pane' and click the 'blue +' (7th on toolbar).






  6. Now you will again see the IP & MAC address (in the left pane) you saw in Step 5. From this list, select your 'Gateway IP', (this will mostly be something like 192.xxx.xxx.1 or 10.xxx.xxx.1 etc; check your network properties for more info on gateway.) after selecting your 'Gateway IP Address' (now some IP will appear on the right); drag and select all the entries in the right pane, and click 'OK'.
  7. Now click on the 'Start/Stop APR' (the 3rd) button on the toolbar. You will see 'HALF ROUTING' and 'FULL ROUTING' entries in the lower pane.
  8. Now go to the Passwords tab on the bottom. Slowly you will see passwords appearing in this section; most will be under HTTP.

The password section gives you full details on the capture, including Username, password, URL, etc. Any person who was online during the time you completed Steps 3 – 5, will be affected, and you will have access to their passwords.

Beware: What this program does is send all the traffic through your computer, so the LAN speeds slow down drastically. On my home network, LAN transfer speeds reduced from 10MB/s to 100Kb/s in 10 minutes.

How to Changing Your Private IP address

How to Changing Your Private IP address
Renew your IP address in the command prompt. To open the command prompt, enter “cmd” into the Search field in the Start menu. In Windows 8, type “cmd” when on the Start screen.

1. Once the command prompt it open type: “ipconfig /release”
After the message is displayed, type: “ipconfig /renew”
You will see your new IP address and other connection settings displayed.
2. Change your IP address through the router. Routers assign every device on the network a private IP address. You can change the IP address of each device by opening the configuration page of your router.

3. Open the LAN Setup section. The wording for the section will vary depending on the router brand. Look for the Address Reservation section. Here you can assign permanent private IPs to specific devices. Create a new entry.
Select the device from the list of connected devices. If you don’t see it, you will need to manually enter the device’s MAC address and name.
4. Choose an IP address. Typically you can leave the first three sections of the address the same (usually 192.168.1). The last section is the number that you should change. On most routers you can enter any number between 1 and 100, although some let you go as high as 254.
Make sure that the address you pick is not currently in use by another device on the network. This will cause a conflict, and one device will lose its connection.

How to Remove Ads from Android Apps, Games & Browser

Earlier I have posted on how you can easily remove all the spammy advertisements, bulky popups and any other virus attacking stuff in your windows computer without using any software, well this post is part of that thing and we are going to use the same thing for getting rid of advertisements in Android free apps, games and browsers you use to browse the web. 
Now if you really feel bad watching all those bad advertisements in your free apps and games and even browsing some websites online then we have a simple solution that will block all those advertisements for free using no software.

Removing Advertisements from Android :)

So now the steps are pretty simple, we will be using that HOSTS file blocking trick to get this thing working, so now just follow below steps and enjoy.
  1. Open this text file online and copy its contents in a new notepad file or download it to your PC.
  2. Now you have the file if you have downloaded the file just make sure to rename the file as "hosts" its really important.
  3. So now you have the "hosts" file that you need to place in your Android device in order to remove all those advertisements.
  4. Now just transfer this file to your android device and open your file explorer on your android device. (use a free file explorer like F-explorer)
  5. Now just copy the file on your android device and paste it in to /etc or /system/etc, now if there is already a hosts file present just rename it to hosts.bak (to create backup of older hosts file)
  6. Now just paste your new hosts file over here, make sure you have the administrative right's to paste the file.
  7. That's it guys now just reboot your android device and see this trick working.
Now after you reboot your device you will see how all the advertisements in your apps, games and browser are vanished away, now sometime if might feel awkward as every single ad will be gone but still if you want a clean screen then this is the way.
____________

Thursday, 2 January 2014

How to hack BSNL router using Andriod

Introduction

Recently I was at home, playing with my BSNL router. For those who don't know what BSNL is, its the AT & T of India, known for very bad customer support :)
 
 
In this article, I will walk you through step by step illustrations on how to hack into your local router and explore it inside out. Though I am using my BSNL router here but steps and method will be similar for your modem/router as well.
 
 
 
Router Configuration

BSNL router is manufactured by SemIndia and distributed by ITI. It follows the tracks of using firmware of different routers (Broadcom to be specific, BCM6338 stands for Broadcom router firmware version 96338, deployed in US robotics ones and some other popular routers). Mine is DNA-A211-1, one of most popular ones in India.
 
 
Hacking Router with Android
 
To start with, I telnet into my router with my credentials and I am greeted with welcome screen as shown in screen below,
 
 
Once you are in, first step will be to figure out what are the services it has to offer, so I typed the usual 'help' and found following commands. 
 
 
 
I started with basic command, "swversion" to get the version. Then with some hunting, I came to know that "sh" command runs over my router, ran it and voila, familiar interface of busybox snaps in.  
 
 
 
Great, now thats worth something. For those who don't know hat busybox is, its a multicall binary. My android has it too. Seeing the version made me tick, it was running an older version of busybox.


Then I tried ls command, but it didn't work, hence tried "echo *" and it showed up everything as seen below  
 
 
 
Next comes the magic command "cat /etc/passwd" and there we go again. 
 
 
 
After that, I went on exploring other directories. Got into CVS and found information regarding CVS and pserver, note worthy one is the credentials of pserver. 
 
pserver:xyzabc@192.168.128.19:/home/cvsroot 
 
Not much of an interest though as they are of a private LAN. On googling, I found out that account belonged to XYZ (name changed for privacy), employee at SIEMIndia.

Next, I moved on to /etc directory, 
 
 
 
lots of directories here, as a rule of thumb I opened default.cfg 
 
 
 
Generic stuff, but what caught my eye was this line,  
 
ppp_conId1 userName="multiplay" password="kIMa1bXVsdGlwbGF51AG" 
 
This might come in handy (use your creativity :)).


But then I thought that why not to access the router from web interface. Logged in to it and then went to "management" and downloaded the backupsettings.conf file,
 
 
 
On opening, it was like as shown below,  
 
 
 
I was not able to find the above credentials in it, hence I came to a conclusion that they must be somewhat for internal purposes.


Moving on, I thought why not to try to create an arbitrary file . Tried following command  
 
echo 'rishrockz' >> rdx 
 
 
 
But it failed. It was not easy to figure out the writable directory as I was not able to determine the file permissions since this version of busybox doesn't has ls or stat command.

Finally little bit of exploring found that /var is writable. Tried creating a file again, it succeeded ! 
 
 
 
Well, there is lot more to explore, this is just tip of iceberg! Next time I am be thinking of going to compile programs (http://people.debian.org/~debacle/cross/) and copying over them using echo (once I get a PC), I have got some nice ideas and will be hacking with them.


In the mean time, for those who are wondering what this machine has, here is the bootup log. 
 
 
 
 
 :) enjoy it

Wednesday, 1 January 2014

How to Hack an Ethernet ADSL Router

Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet. However, most of them are unaware of the fact that it has a serious vulnerability in it which can easily be exploited by anyone with a basic knowledge of computer. In this post, I will show you how to hack an Ethernet ADSL router by exploiting the common vulnerability that lies in it.
Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later.
This makes it possible for the attackers to gain unauthorized access to the router and modify its settings using a common set of default usernames and passwords. Here is how you can do it. Before you proceed, you need the following tool in the process:

Hacking the ADSL Router:

Here is a detailed information on how to exploit the vulnerability of an ADSL router:
  1. Go to www.whatismyipaddress.com. Once the page is loaded, you will find your IP address. Note it down.
  2. Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
  3. Suppose your IP is 117.192.195.101, you can set the range something as 117.192.194.0 to 117.192.200.255 so that there exists at least 200-300 IP addresses in the range.
  4. Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.
  5. IP Scanner Settings
    I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Options instead of Tools
  6. Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image:
  7. Angry IP Scanner
  8. Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.
Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below:
Router Settings Page Hacked!
If you do not succeed to gain access, select another IP from the list and repeat the step-5. At least 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can a Hacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or even hijack the DNS by pointing it at a rouge DNS server. If this happens, the victim will have to reconfigure/reset the router settings in order to bring it back to normal.

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.
Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.
Warning!
All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.