Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Thursday, November 18, 2010

Download all website contents/files with HTTrack web site copier!

hatrack Httrack website copy

Httrack is a free program (freeware) used to copy all contents of a website ranging from directory, files, pictures, videos and all the files into a local file (your hard drive) in the same directory as link from web site that you downloaded , All the parts that you have downloaded will be able to be opened offline.

To be able to use Httrack, the first thing to do is download the HTTrack program . Please download here : Download HTTrack Website Copier or directly go to www.httrack.com

HTTrack Website Copier, is an Offline Browser runs on Windows and Unix
Copyright (C) Xavier Roche and other contributors

The HTTrack web tool is free software, we can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation.

Download , install, and go to the "Help" menu for the instructions, how to use HTTrack..

HTTrack! is a free [GPL-libre-freesoftware] and easy-to-use offline browser utility.

The program allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site's relative link-structure. Simply open a page of the "mirrored" website in your browser, and you can browse the site from link to link, as if you were viewing it online. Hatrack can also update an existing mirrored site, and resume interrupted downloads. HTTrack is fully configurable, and has an integrated help system.

Friday, September 10, 2010

The best and most favorite hacking tools - free

the best hacking cracking tools
Nmap creator conducted the survey for 100 best hacking tools against followers of nmap-hackers mailing list. Approximately 3.243 users to vote for their most favorite tools. The list of 100 favorite hacker tools can be found in www.insecured.org

From the 100 tools, The following are the 10 most favorite tools that gets the most votes. These tools are a weapon that's considered absolutely necessary in hacking and security activities.
In the package contains the most necessary programs and utilities for the hackers ot crackers,
  1. Cain and Abel [sniffer]
  2. John the Ripper (powerful brootforce)
  3. NetStumbler [allows to define radius of action of network WiFi – in real time for the diagram it is possible to see size of a useful signal]
  4. Nmap[one of the best network scanner[
  5. Putty [a quite good telnet the client]
  6. SuperScan [powerful scanner TCP of ports, pinger and hostname resolver)
  7. Hping (allows to generate special ICMP/UDP/TCP packages and to look through answers ping a host in style of the usual utility ping]
  8. Lcp [audit and restoration of passwords ]
  9. Nikto [perl the scanner broken Web a server, with support SSL]
  10. Kismet [sniffer a wireless network 802.11 and the decoder of packages]

Download top 10 hacking tools
size: 23.66 MB
Passowrd : hacker.free-7.net

Related tool : Cracking Tools and Crack Searcher

Friday, June 11, 2010

Hacking Tool Tutorials - Anti-Hacker Toolkit

Hacking Tool Tutorials, There is one ebook that should be used as a reference. This ebook titled "Anti-Hacker Toolkit [Third Edition]". In this book are described in detail how to use more than 100 "hacking tools". The explanation is technically quite easy to be understood and followed. Explains how to attack, survival, and detect the attack and overcome them (Attack & Defense).

Anti-Hacker Toolkit provides complete tutorials on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. Completely revised to include the latest security tools, including wireless tools , New tips on how to configure the recent tools on Linux, Windows, and Mac OSX New case studies in each chapter

hacking tools tutorials ebook complete guide for newbieTable of Contents

Anti-Hacker Tool Kit, Third Edition
Introduction

Part I - Multifunctional Tools
Chapter 1 - Netcat and Cryptcat
Chapter 2 - The X Window System
Chapter 3 - Virtual Machines & Emulators
Part II - Tools for Auditing and Defending the Hosts
Chapter 4 - Port Scanners
Chapter 5 - Unix Enumeration Tools
Chapter 6 - Windows Enumeration Tools
Chapter 7 - Web Hacking Tools
Chapter 8 - Password Cracking / Brute-Force Tools
Chapter 9 - Host Hardening
Chapter 10 - Backdoors and Remote Access Tools
Chapter 11 - Simple Source Auditing Tools
Chapter 12 - Combination System Auditing Tools
Part III - Tools for Auditing and Defending Your Network
Chapter 13 - Firewalls
Chapter 14 - Network Reconnaissance Tools
Chapter 15 - Port Redirection
Chapter 16 - Sniffers
Chapter 17 - Wireless Tools
Chapter 18 - War Dialers
Chapter 19 - TCP/IP Stack Tools

Part IV - Tools for Computer Forensics and Incident Response
Chapter 20 - Creating a Bootable Environment and Live Response Tool Kit
Chapter 21 - Commercial Forensic Image Tool Kits
Chapter 22 - Open-Source Forensic Duplication Tool Kits
Chapter 23 - Tool Kits to Aid in Forensic Analysis
Chapter 24 - Tools to Aid in Internet Activity Reconstruction
Chapter 25 - Generalized Editors and Viewers
Chapter 26 - Reverse Engineering Binaries

Part V - Appendixes
Appendix A - Useful Charts and Diagrams
Appendix B - Command-line Reference
How to Use the CD
List of Figures
List of Tables
List of Sidebars


Password: www.free-7.net

Tuesday, February 9, 2010

Shark network tool rat.exe hack tutorial the advance reverse connecting security

Amazing network tool.., that's impression when trying a new menu on shark. a useful and powerful security tool" for professionals or other information security enthusiasts.

Different to Google Hacking For Penetration Tester, The shark is the advance reverse connecting tool who are able to bypass the firewall to do remote control over a computer and is written using Visual Basic 6 (VB6)with the functions as follows:
  • Supporting Random Startup and Random Servernames
  • Desktop Preview in SIN Console
  • Sortable and Configuratable SIN Console
  • Remote Autostart Manager
  • Optional Fwb++ (Process Injection, API Unhook)
  • Folder Mirroring
  • very userfriendly interface
  • mRC4 Encrypted Traffic (New & Modded)
  • zLib Compressed Traffic
  • Highspeed, Stable Screen/Cam Capture
  • Keylogger with highlight feature
  • Remote Memory Execution & Injection
  • VERY fast file manager/registry editor listing due to unique technique
  • Anti: Debugger, VmWare, Norman Sandbox, Sandboxie, VirtualPC, Symantec Sandbox, Virtual Box
  • And many others..

You know what comes into your mind when i tell you "RAT" ? Nope, this is not related to Narcs or Informants. RAT means Remote Administration Tools. In the old days, almost every security tester used to play with BackOrifice2 (famous Cult of the Dead Cow greatest software ).

As we know that in the previous day, a fellow security expert called me asking for help. He’s been told to keep an eye on some rogue computers that violate his organisation’s security policy. The computers were unauthorized to plug into the LAN without accepting security rules and policies.

He fired some old perl utilities (oldies but goodies), busted the IP addresses and successfully get connections to some rogue systems (he also knows metasploit kungfu), but he was unable to set and maintain a remote access.

I immediately suggested him a good RAT software among others* i’ve discovered when it first released to a "closed" circle of members. This tool is called SharK.

Understand how the enemy uses shark bites to penetrate the security system (not the mogalodon shark)

Download and survivors feel bite of sharks in the your lab.

Wednesday, February 13, 2008

Credit Card Protection From Hacking

Consumer beware, there are hackers on the prowl, and they want your credit card, bank account and lots of other stuff too.

Credit card hackers were once highly gifted computer geniuses. Not so anymore. Today, even the mildly computer literate person can buy software that can do the job of the highly skilled.

Protect yourself

In this day and age, it’s not such a bad thing to be a little paranoid when it comes to security. There are excellent programs available that help in making personal accounts less susceptible to hacker attacks.

  • anti-virus programs
  • anti-spam programs
  • anti-spy ware
  • firewalls

It is important, however, to use these programs by updating regularly and running the anti-virus scanner at least once a week. With constant maintenance, programs like the popular keystroke logger, can usually be caught and deleted before any damage can be done.

The keystroke logger is a popular hacking tool. Easily disguised within other programs, it keeps track of every keystroke a targeted user makes; including bank account and credit card numbers and passwords. Hackers hide keystroke loggers inside free downloads, or even when a word is misspelled in a search engine. Last year, one mistyped letter in a Google search would have brought on a bevy of viruses.

Here phishy, phishy

Phishing, as the name implies, lets the hacker go fishing for his prey through email. Thus, the word is derived from the combination: fish-as in reeling in, and phony-as in fake.

A hacker sends out an email that seems to be from a trusted company. This email usually threatens closure of the user’s account unless the instructions in the email are followed. A link to the company website is provided. Once clicked, the user sees the familiar company web page, complete with logos, company information, etc. The email usually reads something like this:

For security reasons, the company is asking you to update your account. Please follow this link and update today. If we don’t hear from you within 48 hours, your account will be closed.

The fish has been reeled in and is now entering personal information on a phony web page. Banks and credit card companies lose more than $1.2 billion yearly to phishing scams.

The easiest way to avoid being taken in by these web con-artists is to know one basic fact: financial institutions and legitimate businesses NEVER ask for personal information by email.
Dmitri Alperovitch, research engineer for CipherTrust, Inc. says, Anytime you get an email from a financial institution that asks you to go to a Web site and enter financial information, a whole bunch of red flags should jump up.

source :www.creditcardhacker.com