Skip to main content

TEACH FACT

what is R.A.T ?
A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.

 RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment.

 Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.

 Because a RAT enables administrative control.RATs can be difficult to detect because they usually don't show up in lists of running programs or tasks.

 The actions they perform can be similar to those of legitimate programs.

 Furthermore, an intruder will often manage the level of resource use so that a drop in performance doesn't alert the user that something's amiss.
 _________________________
what is metasploit ?
An open source attack framework first developed by H. D. Moore in 2003.

 Metasploit is used for hacking into systems for testing purposes.

 Metasploit provides useful information to people who perform penetration testing, IDS signature development, and exploit research.

 With the latest Metasploit 3.0 release, the project has moved to an all Ruby programming base.
 _________________________
How To Send Anonymous SMS To Any Number:-
Till now you had only try sending SMS using your mobile number or using some of online website that first takes your personal information and then display it on the receiver of the message.

 But if i give you a way by which you can send SMS without entering any details that is anonymously and receiver will not identify that who had actually send the SMS.

 So we are here with the way for How To Send Anonymous SMS To Any Number.

 The method is very simple and straight just follow the below method to proceed.

 The method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS.

  List of Websites To Send Anonymous SMS To Any Number :-

  #1 Seasms.com
  #2 Spicesms.com
  #3 Smsti.in
  #4 Sendanonymoussms.com
  #5 Armsms.com

  This is one of the best anonymous SMS sending portal that allow you to send any message all over the world that absolutely free.
 _________________________
HOW TO USE GOOGLE MAPS OFFLINE:-
Google Maps is an awesome app developed by google to locate any destination on your android mobile.

 This map helps you to navigate to all over the world.It have all views like street view, Traffic view and Satellite view in it.

 This app works on internet and use your GPS to track your location. Now whenever we navigate through google maps it needs some fast internet connection to load all the direction and places.

 But sometime due to some network problems we are unable to access Google Maps in our android device.

 So in this post i will tell you the a method to Use Google Maps Offline.

 Method To Save Google Maps For Offline Use :-

  1. Open your Google Mapapp in your android with internet connection on.

  2. Now Navigate to the loactionor area which you want to save for offline use.

  3. Make sure only the selected areawill be saved.

  4. Now selection optionfrom three dotted button at right top corner of your app Or by pressing left button of your android device.

  5. Now a square boxwill be appear on map.

  6. Now tapand select the are which you want to access offline.

  7. Now wait a while to activatethe option done or save.

  8. Now save the mapwith your desired name.

  9. It will now downloadthe complete map of selected area.

  10. Thats it now you can access Google Mapswithout your internet connection of a particular selected are.

  11. By this your Google Map of selected area will get saved in your phone memory.

  Note:

  * Area to be selected must be not too large .

  * The saved google maps data will get cleared after 30 Days.

  * Accessing Locations will be slow as app is not connected to internet connection.

  * Since no internet connection is there you will not be able to navigate through step by step navigation.

  This awesome trick will work on all android phones. Although your google map data get saved in your internal memory and it can occupy your cache space.
 _________________________

Sniffing passwords from same network(Lan) using Cain and Abel tool
First install the tool Cain And Able form here.

 Download Cain & Abel from tools section

 Step 1:Please turn off the windows firewall or any other third party firewall so that all the packets are captured efficiently.

 Step 2:Open Cain and Abel tool

 Step 3:Goto -> Sniffer Tab and click Configure in the main menu to configure your packet listening adapter.

 Step 4:Select the appropriate network adapter for your network that you want to sniff the packets for plain-text passwords. And Click Ok.

 Step 5:Click the Green Adapter icon as shown below. This means that you just configured the adapter and now you are turning it ON.

 Step 6:Now select the APR tab below as shown and now first click on the right side upper pane area. When you click that area the blue plus (“+”) icon will get enabled. Press that blue plus (“+”) icon.

 Step 7:This is very interesting step. Now we need to select the router`s IP address and click ok. This means that we want to listen to every packet that is sent to router. If we select any other IP address in our LAN network then we can listen to only that particular HOST on the network. Since the router responds to all the request of HOSTS connected in a LAN. Thus we can listen to all the HOSTs.

 Step 8:Now click the Yellow Circle icon as shown. This means that we are starting ARP poisoning.

 Step 9:We can see that in the upper right panel there is an IP address of our router and when we press that Yellow Circle icon (button), it performs ARP poisoning.

 Step 10:Now click the password tab which is at the bottom. We can see that we are getting passwords of HTTP i.e. plain text session in our LAN network.
 _________________________

Comments

Popular posts from this blog

Top 20 Tools for hacking 2018

What are Hacking Tools? Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There is a variety of such tools available on the market. Some of them are open source while others are commercial solution. In this list we highlight the top 20 tools for Ethical Hacking of web applications, servers and networks 1)  Netsparker Netsparker  is an easy to use web application security scanner that can automatically find SQL Injection, XSS and other vulnerabilities in your web applications and web services. It is available as on-premises and SAAS solution. Features Dead accurate vulnerability detection with the unique Proof-Based Scanning Technology. Minimal configuration required. Scanner automatically detects URL rewrite rules, custom 404 error pages. REST API for seamless integration with the SDLC, bug tracking systems etc. Fully scalable solution.

Wifi Post Exploitation on Remote PC

Hello readers! Today you will be learning about different ways to get basic service sets information of remote user’s Wi-Fi as well as current network connection information, and how to extract saved Wireless LAN profiles of remote pc after that you will be disconnecting target user’s Wi-Fi too. First Hack the Victim PC Using Metasploit ( tutorial how to hack remote pc ) after that get admin access through Bypassuac ( click here ), once you have victim’s meterpreter session run given below post exploit  one-by-one.  Get BSS information of a remote user’s Wi-Fi connection This module gathers information about the wireless Basic Service Sets available to the victim machine. e.g. this will give you SSID and other important  information regarding wireless connection. msf > use post/windows/wlan/wlan_bss_list msf post( wlan_bss_list ) > set session 5 msf post( wlan_bss_list ) > exploit From given below image you can observe that here it has found “5 networks” suc

EMBEDDED BACKDOOR WITH IMAGE USING FAKE IMAGE EXPLOITER

In this article we are introducing a newly launched hacking tool “ Fake Image Exploiter ”. It is design so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with hidden malicious .bat/.exe file inside it. Let’s start! Open the terminal inside your kali Linux and type following command to download it from github. Git clone https://github.com/r00t-3xp10it/FakeImageExploiter.git Once it gets downloaded then opens the folder and selects the file “ settings ” for configuration before running the program as shown the given screenshot. Now made some changes inside setting file as shown the screenshot: Here you have to declare the type of payload extension you will use to hide it inside the image. You can set any exetension among these four : ps1, bat, txt, exe.  I had set  PAYLOAD_EXETNSION=bat  similarly set  BYPASS_RH=NO   and scroll down for next configration. In same way set these two values also as show