1ND14N H4X0R5 T34M (IHT) JAI HIND JAI BHARAT

We are :- DeadManINDIA,Null_Port_Govind,Haxor Rahul,EagleShadow,Karate-Katrina,Spy-Hunter,Grey-Noob,Mr.R@66!T.

A big Slute to Our Indian Armies

Freedom is not free Our Soldiers Donates theirs lifes for us

We are Indians and We are Proud to be Indians

India is great.Because their is one place in the world where Peoples Recpect all Religious.

Kali is good OS for Hacking

Peoples Says this OS is best This OS is best but no one OS like Kali Linux .

MOM and DAD

I can't saw God but When i see my MOM and DAD then i think God in there they are My Gods Love You MOM DAD.

Saturday, 8 March 2014

How to get anyone's IP [ Picture Method ]

At first we must have 2 things:
1) Victim
2) Link for the websites, which i will tell you later
3) Email address [optional]

Let's start:

1. Find a victim, it can be anyone. I'll choose myself just to show you.

2. Open http://iplogger.org/ OR http://www.whatstheirip.com/ ( I prefer iplogger, because you don't need an email address )

3. So after you opened iplogger website, click on "Generate an invisible IPLOGGER" button. It should look like this
Zoom in (real dimensions: 892 x 82)Image

4. Then you will see a page, with some links. We want to send a link to someone, so we have to choose "Link to the untagged invisible picture" which is http://iplogger.org/1suf3.jpg for me.

Zoom in (real dimensions: 981 x 516)Image

5. After you copied the link, send it to anyone you want to get their ip.

6. Next click on button View Log, where will be your IPLOGGER ID written.
If there is nothing in log columns, nobody clicked the link yet. But as i told you before, i will click on it by myself.
As you can see, there is Date, Time, my IP address, country, region, city.

Zoom in (real dimensions: 978 x 525)Image

You can refresh the page with refresh button as much as you want. You can also reset the recent logs and you can save output to file, where will be date and ip address.


If you are trying to use http://www.whatstheirip.com/ site, you will have to put there your email address. Then you will have to click on "Get Link" and then copy a link you choose. I prefer bvog link, because it'll show
Not Found
The requested URL was not found on this server.


Zoom in (real dimensions: 1000 x 516)Image

After you click on that link, you will get an email, which will be probably in spam folder.

The email will look like this:

Zoom in (real dimensions: 903 x 372)Image


Okey guys, it's all for this tutorial, hope you enjoyed it and hope some of you will find it useful.

Friday, 7 March 2014

[Tutorial] Setup Zeus Bot WITH Pictures & Tutorial

[Tutorial] Setup Zeus Bot WITH Pictures & Tutorial

This Tutorial is for education purposes ONLY and I am NOT responsible in any way on how you use the information provided and what you do with the files. Thank you and enjoy reading.

First of all I want to tell you that ZeuS Bot is the most illegal bot out there. It is the only bot that connects to a webhost and not to a IRC channel or a PC. It is highly illegal as it is considered as a banking trojan as it logs every internet activity to a database. Well lets start.

Step 1:
First of all you need offshore hosting, preferably bulletproof. 
The best i've found so far is SANTREX and VieFireHosting.
Sign up with santrex here
Think of a domain that is not easily tracked tho if possible.

After that get the files needed. 
Download from:
 
http://botnetvietnam.googlecode.com/files/ZBOT.rar
http://uploading.com/files/29eaecb6/ZBOT.rar
Mirrors:
http://rapidshare.com/files/367595593/ZBOT.rar.html
http://spam.org/download.php?file=534290
media:
http://www.mediafire.com/?7ry1b50255t12tt
 
Password: TheThunder'sZeusBot-EducationPurposesOnly

Step 2:
Uploading the files.
1. Go and login into your CPanel X.




2. Go to File Manager.



3. Go and create a directory of your choice.





4. Upload the upload.zip to the directory created.







6. Chmod the directory /install/ and /system/ to 777. Also the whole directory.





Step 3:
Creating the Database.
1. Go to MySQL Databases in your CPanel.

2. Create a database and write the name down.





3. Add new user and write the details down.



4. Now add the created user to the created database. Be sure to select all privileges.




5. Be sure you have written everything down and move to the next step.

Step 4:
Installing the panel.
1. Navigate to the directory you created and got to /directory/install/. A Panel installer should appear.



What to enter:
Code:
Username: Enter the default username which you will use when logging in.
Password: Your password when logging in. Make it strong.
MySQL server:
Host: "localhost"
User: Your database user created before.
Password: Your database password created for the user.
Database: The database name.


Online bot timeout: Leave it as it is.
Encryption key use something VERY strong.

Then Click Install.



Step 5:
Making the bot.
1. Navigate to your ZeuS files and open config.txt
Replace the link where it says with your link. Also the encryption key you used before.





2. Open the zsb.exe
The builder also has a remover so if you test your server on your own pc you can just remove it with a mouse click.
Click on Builder.





Then click on Build Config. Save the file.
Click Build Loader. Save the file.





Now go and upload cfg.bin and bt.exe to the same directory as the panel. 
Also you can delete the /install/ folder since the panel has been installed in the previous step.





In final the directory with Zeus installed should look like this:





Installed! Now a tutorial on how everything works!

Now navigate to the directory where you hav your ZeuS bot panel. Got to /directory/cp.php
A login box like this should be there:



Enter your panel username and password.
if you would like for your browser to keep cookies so that you don't need to login again every time you leave the page check the option.
Click Submit.



So now here is the panel.





1. Shows you the current user
2. Shows you the summary (see green comments)
3. Shows you the OS statistics of the infected bots.
4. You can browse through the bots and and their reports
5. You can browse through the scripts you got. Add/edit them.
6. There you can search trough the reports in the database
7. There you can search through the reports which are most times is txt format.
8. Just random information about your system and stuff.
10. Options. If you change the encryption key the automatically you loose all your bots. You need to make new server and config file with the new encryption key and spread it again.
11. Change your password.
12. Add and manage users.

1. Shows you the number of total reports in database.
2. Shows you the time the first bot came online.
3. Shows you total bots. The number of total pc's infected.
4. Shows you the number of active bots ins the past 24 hours.
5. Shows you the minimal version of bots.
6. Shows you the maximal version of bots.
7. Installs. Every pc which has not been infected with a Zeus bot server before gets on this list.
8. With this buttons you can reset the installs.
9. Shows you how much bots are currently online.
10. Lets you jump to statistics of a botnet.

Now you just need to spread your server.

Thursday, 6 March 2014

Some hash types

Some hash types 
Domain Cached Credentials
Example: Admin:b474d48cdfc4974d86ef4d24904cdd91
Used for caching passwords of Windows domain.
Length: 16 bytes.
Algorithm: MD4(MD4(Unicode($pass)).Unicode(strtolower($username)))
Note: [1]

MD5(Unix)
Example: $1$12345678$XM4P3PrKBgKNnTaqG9P0T/
Used in Linux and other similar OS.
Length: 34 characters.
Description: The hash begins with the $1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2000 times.
Notes: [1] [2]

MD5(APR)
Example: $apr1$12345678$auQSX8Mvzt.tdBi4y6Xgj.
Used in Linux and other similar OS.
Length: 37 characters.
Description: The hash begins with the $apr1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2000 times.
Notes: [1] [2]


MD5(phpBB3)
Example: $H$9123456785DAERgALpsri.D9z3ht120
Used in phpBB 3.x.x.
Length: 34 characters.
Description: The hash begins with the $H$ signature, then there goes one character (most often the number '9'), then there goes the salt (8 random characters; in our example the salt is the string "12345678"), followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2048 times.
Notes: [1] [2]


MD5(Wordpress)
Example: $P$B123456780BhGFYSlUqGyE6ErKErL01
Used in Wordpress.
Length: 34 characters.
Description: The hash begins with the $P$ signature, then there goes one character (most often the number 'B'), then there goes the salt (8 random characters; in our example the salt is the string "12345678"), followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 8192 times.
Notes: [1] [2]

MySQL
Example: 606717496665bcba
Used in the old versions of MySQL.
Length: 8 bytes.
Description: The hash consists of two DWORDs, each not exceeding the value of 0x7fffffff.

MySQL5
Example: *E6CC90B878B948C35E92B003C792C46C58C4AF40
Used in the new versions of MySQL.
Length: 20 bytes.
Algorithm: SHA-1(SHA-1($pass))
Note: The hashes are to be loaded to the program without the asterisk that stands in the beginning of each hash.

RAdmin v2.x
Example: 5e32cceaafed5cc80866737dfb212d7f
Used in the application Remote Administrator v2.x.
Length: 16 bytes.
Algorithm: The password is padded with zeros to the length of 100 bytes, then that entire string is hashed with the MD5 algorithm.

MD5
Example: c4ca4238a0b923820dcc509a6f75849b
Used in phpBB v2.x, Joomla version below 1.0.13 and many other forums and CMS.
Length: 16 bytes.
Algorithm: Same as the md5() function in PHP.

md5($pass.$salt)
Example: 6f04f0d75f6870858bae14ac0b6d9f73:1234
Used in WB News, Joomla version 1.0.13 and higher.
Length: 16 bytes.
Note: [1]

md5($salt.$pass)
Example: f190ce9ac8445d249747cab7be43f7d5:12
Used in osCommerce, AEF, Gallery and other CMS.
Length: 16 bytes.
Note: [1]

md5(md5($pass))
Example: 28c8edde3d61a0411511d3b1866f0636
Used in e107, DLE, AVE, Diferior, Koobi and other CMS.
Length: 16 bytes.

md5(md5($pass).$salt)
Example: 6011527690eddca23580955c216b1fd2:wQ6
Used in vBulletin, IceBB.
Length: 16 bytes.
Notes: [1] [3] [4]

md5(md5($salt).md5($pass))
Example: 81f87275dd805aa018df8befe09fe9f8:wH6_S
Used in IPB.
Length: 16 bytes.
Notes: [1] [3]

md5(md5($salt).$pass)
Example: 816a14db44578f516cbaef25bd8d8296:1234
Used in MyBB.
Length: 16 bytes.
Note: [1]

md5($salt.$pass.$salt)
Example: a3bc9e11fddf4fef4deea11e33668eab:1234
Used in TBDev.
Length: 16 bytes.
Note: [1]


md5($salt.md5($salt.$pass))
Example: 1d715e52285e5a6b546e442792652c8a:1234
Used in DLP.
Length: 16 bytes.
Note: [1]

SHA-1
Example: 356a192b7913b04c54574d18c28d46e6395428ab
Used in many forums and CMS.
Length: 20 bytes.
Algorithm: Same as the sha1() function in PHP.

sha1(strtolower($username).$pass)
Example: Admin:6c7ca345f63f835cb353ff15bd6c5e052ec08e7a
Used in SMF.
Length: 20 bytes.
Note: [1]


sha1($salt.sha1($salt.sha1($pass)))
Example: cd37bfbf68d198d11d39a67158c0c9cddf34573b:1234
Used in Woltlab BB.
Length: 20 bytes.
Note: [1]

SHA-256(Unix)
Example: $5$12345678$jBWLgeYZbSvREnuBr5s3gp13vqi
Used in Linux and other similar OS.
Length: 55 characters.
Description: The hash begins with the $5$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the SHA-256 algorithm 5000 times.
Notes: [1] [2]

SHA-512(Unix)
Example: $6$12345678$U6Yv5E1lWn6mEESzKen42o6rbEm
Used in Linux and other similar OS.
Length: 98 characters.
Description: The hash begins with the $6$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the SHA-512 algorithm 5000 times.
Notes: [1] [2]


SHA-1(Django) = sha1($salt.$pass)
Example: sha1$12345678$90fbbcf2b72b5973ae42cd3a19ab4ae8a1bd210b
12345678 is salt (in the hexadecimal format)
90fbbcf2b72b5973ae42cd3a19ab4ae8a1bd210b is SHA-1 hash.

SHA-256(Django) = SHA-256($salt.$pass)
Example: sha256$12345678$154c4c511cbb166a317c247a839e46cac6d9208af5b015e1867a84cd9a56007b
12345678 is salt (in the hexadecimal format)
154c4c511cbb166a317c247a839e46cac6d9208af5b015e1867a84cd9a56007b is SHA-256 hash.


SHA-384(Django) = SHA-384($salt.$pass)
Example: sha384$12345678$c0be393a500c7d42b1bd03a1a0a76302f7f472fc132f11ea6373659d0bd8675d04e12d8016d83001c327f0ab70843dd5
12345678 is salt (in the hexadecimal format)
c0be393a500c7d42b1bd03a1a0a76302f7f472fc132f11ea6373659d0bd8675d04e12d8016d83001c327f0ab70843dd5 is SHA-384 hash.

How to use hashtag tool for identifying Hash type

HashTag: Password Hash Identification

Click here to download source code or access it online at OnlineHashCrack

Interested in password cracking or cryptography? Check this out. HashTag.py is a tool written in python which parses and identifies various password hashes based on their type. HashTag was inspired by attending PasswordsCon 13 in Las Vegas, KoreLogic’s ‘Crack Me If You Can’ competition at Defcon, and the research of iphelix and his toolkit PACK (password analysis and cracking kit). HashTag supports the identification of over 250 hash types along with matching them to over 110 hashcat modes. HashTag is able to identify a single hash, parse a single file and identify the hashes within it, or traverse a root directory and all subdirectories for potential hash files and identify any hashes found.
One of the biggest aspects of this tool is the identification of password hashes. The main attributes I used to distinguish between hash types are character set (hexadecimal, alphanumeric, etc.), hash length, hash format (e.g. 32 character hash followed by a colon and a salt), and any specific substrings (e.g. ‘$1$’). A lot of password hash strings can’t be identified as one specific hash type based on these attributes. For example, MD5 and NTLM hashes are both 32 character hexadecimal strings. In these cases I make an exhaustive list of possible types and have the tool output reflect that. During development I created an excel spreadsheet which contains much of the hash information which can be found here or here.
Usage: HashTag.py {-sh hash |-f file |-d directory} [-o output_filename] [-hc] [-n]
Note: When identifying a single hash on *nix operating systems remember to use single quotes to prevent interpolation. (e.g. python HashTag.py -sh '$1$abc$12345')
-h, --help show this help message and exit
-sh SINGLEHASH, --singleHash SINGLEHASH Identify a single hash
-f FILE, --file FILE Parse a single file for hashes and identify them
-d DIRECTORY, --directory DIRECTORY Parse, identify, and categorize hashes within a directory and all subdirectories
-o OUTPUT, --output OUTPUT Filename to output full list of all identified hashes
--file default filename: HashTag/HashTag_Output_File.txt
--directory default filename: HashTag/HashTag_Hash_File.txt
-hc, --hashcatOutput --file: Output a file per different hash type found, if corresponding hashcat mode exists
--directory: Appends hashcat mode to end of separate files
-n, --notFound --file: Include unidentifiable hashes in the output file. Good for tool debugging (Is it Identifying properly?)
Identify a single hash (-sh):

HashTag.py -sh $1$MtCReiOj$zvOdxVzPtrQ.PXNW3hTHI0

HashTag.py -sh 7026360f1826f8bc

HashTag.py -sh 3b1015ccf38fc2a32c18674c166fa447

Parsing and identifying hashes from a file (-f):

HashTag.py -f testdir\street-hashes.10.txt -hc
Here is the output file. Each identified hash outputs the hash, char length, hashcat modes (if found) , and possible hash types:
Using the -hc/--hashcat argument we get a file for each hash type if a corresponding hashcat mode is found. This makes the process of cracking hashes with hashcat much easier as you immediately have the mode and input file of hashes:
Output from a file with many different hash types (the filenames are hashcat modes and inside are all hashes of that type):

Traversing Directories and Identifying Hashes (-d):

HashTag.py -d ./testdir -hc
The output consists of three main things:
  • Folders containing copies of potentially password protected files. This makes it easy to group files based on extension and attempt to crack them.
  • HashTag default files - A listing of all hashes, password protected files the tool doesn’t recognize, and hashes the tool can’t identify (good for tool debugging).
  • Files for each identified hash type - each file contains a list of hashes. The -hc/--hashcat argument will append the hashcat mode (if found) to the filename.
 

List of hash functions

Cyclic redundancy checks

Name Length Type
BSD checksum 16 bits CRC
checksum 32 bits CRC
crc16 16 bits CRC
crc32 32 bits CRC
crc32 mpeg2 32 bits CRC
crc64 64 bits CRC
SYSV checksum 16 bits CRC
Adler-32 is often classified as a CRC, but it uses a different algorithm.

Checksums

Name Length Type
sum (Unix) 16 or 32 bits sum
sum8 8 bits sum
sum16 16 bits sum
sum24 24 bits sum
sum32 32 bits sum
fletcher-4 4 bits sum
fletcher-8 8 bits sum
fletcher-16 16 bits sum
fletcher-32 32 bits sum
Adler-32 32 bits sum
xor8 8 bits sum
Luhn algorithm 4 bits sum
Verhoeff algorithm 4 bits sum
Damm algorithm 1 decimal digit Quasigroup operation

Non-cryptographic hash functions

Name Length Type
Pearson hashing 8 bits xor/table
Buzhash variable xor/table
Fowler–Noll–Vo hash function
(FNV Hash)
32, 64, 128, 256,
512, or 1024 bits
xor/product or
product/xor
Zobrist hashing variable xor
Jenkins hash function 32 or 64 bits xor/addition
Java hashCode() 32 bits
Bernstein hash[1] 32 bits
elf64 64 bits hash
MurmurHash 32, 64, or 128 bits product/rotation
SpookyHash 32, 64 or 128 bits see Jenkins hash function
CityHash 64, 128, or 256 bits
xxHash 32 bits

Cryptographic hash functions

Name Length Type
BLAKE-256 256 bits HAIFA structure
BLAKE-512 512 bits HAIFA structure
ECOH 224 to 512 bits hash
FSB 160 to 512 bits hash
GOST 256 bits hash
Grøstl 256 to 512 bits hash
HAS-160 160 bits hash
HAVAL 128 to 256 bits hash
JH 512 bits hash
MD2 128 bits hash
MD4 128 bits hash
MD5 128 bits Merkle-Damgård construction
MD6 512 bits Merkle tree NLFSR
RadioGatún Up to 1216 bits hash
RIPEMD-64 64 bits hash
RIPEMD-160 160 bits hash
RIPEMD-320 320 bits hash
RTR0 160 bits Drawers construction
SHA-1 160 bits Merkle-Damgård construction
SHA-224 224 bits Merkle-Damgård construction
SHA-256 256 bits Merkle-Damgård construction
SHA-384 384 bits Merkle-Damgård construction
SHA-512 512 bits Merkle-Damgård construction
SHA-3 (originally known as Keccak) arbitrary Sponge function
Skein arbitrary Unique Block Iteration
SipHash 64 bits non-collision-resistant PRF
Snefru 128 or 256 bits hash
Spectral Hash 512 bits Wide Pipe Merkle-Damgård construction
SWIFFT 512 bits hash
Tiger 192 bits Merkle-Damgård construction
Whirlpool 512 bits hash

Wednesday, 5 March 2014

Android cheet codes

1. Phone Information, Usage and Battery – *#*#4636#*#*
2. IMEI Number – *#06#
3. Enter Service Menu On Newer Phones – *#0*#
4. Detailed Camera Information –*#*#34971539#*#*
5. Backup All Media Files –*#*#273282*255*663282*#*#*
6. Wireless LAN Test –*#*#232339#*#*
7. Enable Test Mode for Service –*#*#197328640#*#*
8. Back-light Test – *#*#0842#*#*
9. Test the Touchscreen –*#*#2664#*#*
10. Vibration Test –*#*#0842#*#*
11. FTA Software Version –*#*#1111#*#*
12. Complete Software and Hardware Info –*#12580*369#
13. Diagnostic Configuration –*#9090#
14. USB Logging Control –*#872564#
15. System Dump Mode –*#9900#
16. HSDPA/HSUPA Control Menu –*#301279#
17. View Phone Lock Status –*#7465625#
18. Reset the Data Partition to Factory State – *#*#7780#*#*