Wednesday 14 November 2012

Hack Pc using Cybergate

Firstly, Start off by downloading Cybergate RAT:
Download Mirror 1
Download Mirror 2

Now, Go to No-ip.com

Sign Up and everything. now log in and press Add Host
Now name your host to whatever you want.. i will name my host to Cocacolanerds.no-ip.biz. Just follow theese settings and press Create Host.


Congratulations! You are done with The No-Ip! :)

Let's move on with the Cybergate RAT

Open Up Cybergate.. (Wich you downloaded in the beginning)

Now click Control Center - Start

Click Control Center - Options - Select Listening Ports And Do Following:
Good, You Are Done With The Settings! Now, let's move on to the Virus Creation :).

Click Control Center - Builder - Create Server. Make a new User named Hacking. Press Ok.
Mark the user "Hacker" And press Forward.

Now you should have something like this;
Press 127.0.0.1 | Port 999 and press Delete..:
After that, Click Add.

Now, A Box should pop up saying: 127.0.0.1:81. Like this:
Remove everything and change it with the No-ip adress you host you added.. So let's say you used example.no-ip.biz. Change 127.0.0.1 to example.no-ip.biz and the :81.. Since we used port 82, Change :81 to :82, so it should look like this:
But since my No-ip adress was cocacolanerds.no-ip.biz, i have to change it to MY. but i keep the :82...

Now Change the
Identification: remote
Password: cybergate

To This:
Identification: Cyber
Password: 123456

Good! You are now done with that :). Let's move on to "Installation"

Use the Exact same settings as i do. :
Good, We Skip Message. We Skip Keylogger. In the Anti Debug Have everything checked

In The Build Server: Use Google Chrome Passes and UPX.. (Makes the server smaller)

And press Create Server. Good, You do now have your RAT server complete!

If your RAT doesent work. check following things:

Non-Connecting RATs

1. You are properly port-forwarded if using a router.
2. You have the No-IP Client installed and running.
3. Your DNS entries are correctly spelled when building your server.
4. The password in Listening Ports and the password your server uses are identical.
5. You are Listening on the correct ports.
6. Your Firewall is letting connections through on the port you're listening on.
7. Your server is added to excluded files in your Antivirus and Firewall.
8. Your server injects explorer.exe instead of the default browser.

How to port forward..

Go to Portforward.com and lookup your Router, there shall be a guide on how to port forward on it :). and if you are on a modem.. then you don't need to port forward.

Enter Start - Run . Command. Type Ipconfig

In the "Standard Gateway", That is your Router IP. Type that into your web browser. Log in, And Port forward port: 82

Restart your router and you are done! :).. Just send the RAT Server to any slave OUTSIDE your network.

Hope you enjoyed watching this tutorial & i wish you all the best with your victims ;)

Hacking website withDDOS




Hacking With DDOS



--{============}--
:)♥♥♥♥♥♥♥♥♥♥♥♥♥:-P




First open your CMD from run ( window + r )


Now the important thing what we want is the ip address of the site that we are going to attack.

To get the ip of any site just type nslookup in cmd followed by the address of website

for eg: if you want the ip address of google just type

nslookup http://www.google.com/

this command will give you the ip address

Ok , now you got the ip address of the site you are going to attack,

then type the following command in your CMD and hit enter

ping website-IP -l 65500 -n 10000000 -w 0.00001

-n 10000000= the number of DoS attemps.. u can change the value "10000000" with ur desiredvalue u want to attempt attack.

website-IP= Replace the text with the ip address of the site u want to be attacked..

-w 0.00001 = It is the waiting time after one ping attack.

for eg: if the ip address is 112.158.10.2

just type

ping 112.158.10.2 -l 65500 -n 10000000 -w 0.00001

And thats it you are done . Dont Change or Remove -l, -n and -w in this command.. otherwise it wont work

Speak Your Computer

 STEPS TO MAKE YOUR COMPUTER SPEAK:
1.Open your notepad.
2.Copy the below code and paste it in your notepad.
{ Dim message, sapi message=InputBox("What do you want me to say?","Speak to Me") Set sapi=CreateObject("sapi.spvoice") sapi.Speak message }
3.Now save the notepad file with the name speak.vbs on your desktop.
4.Double Click on speak.vbs and type in the box whatever you want your computer speak to you....................

Malwares

Malware has been a problem for ages, Malware is short for malicious software. A Malware is basically a program designed to infect a computer system without owner being informed.





Types of Malware



Malware exists in many forms, below mentioned are some of the common types of malware .



1. Trojan Horse-

Trojan virus or Trojan horse is one of the most common types of malware, Trojanvirus is mostly used to control the victims computer rather than infecting or destroying files on victims computer. A Trojan horse once installed into victims computer can give a hacker complete access to your computer. Trojans are one of the most dangerous forms of malware.

2. Computer Viruses-

A computer virus a malicious program which is mostly developed to infect a computer, once it infects a computer it replicates or reproduces itself. A virus is just like a parasite and it needs another host to attach to in order to infect a computer.

3. Worms-

Worms are almost similar to computer viruses the only difference unlike computer viruses they do not require another host to attach to in order to infect a computer. Once a worm infects a computer it replicates itself. Computer worms are major threats to large networks.

4. Keyloggers-

A Keylogger is a hardware or software device which monitors every keystroke, screen shots, chats etc typed on the computer. A keylogger program does not require physical access to the user's computer. Any person with a basic knowledge of computer can use keylogger.

5. RATS -

RAT is The shor of Remote Administration Tool and is indeed one of the of dangerous type of malvare it is very similar to a Trojan. Once a RAT is installed in a computer the attacker can do almost anything on the remote computer such as installing a keylogger, shutting down a computer, infecting files etc.

6. Adware-

Adware is the short form of Advertisement-supported software. Adware are commonly designed to displayt advertisement on your computers. However some of these adwares may contain harmful viruses and spying programs which can bring your computer system to knees.



<><><><><><><><><><><><><END><><><><><><><><><><><><>

Facebook Chatbox collour text

The Codes For All The color full Letters in Facebook Chat



Hello Friendi am Mirza Hassan today i am posted codes for all the color full letters in Facebook chatNow Guys you can also write message to your friend in this type of Style....Ya in COLOURFULL letter.. Here Is the Tricks.. today I am sharing with you....



Here we go......Here is the code for all the Alphabetical



[[244961858909298]] = A

[[344113652270150]] = B

[[344991278847613]] = C

[[164461493653696]] = D

[[196752423751220]] = E

[[301630573215430]] = F

[[251496118250464]] = G

[[266394220086654]] = H

[[164866556948132]] = I

[[180599335371968]] = J

[[209067005843651]] = K

[[238594039545396]] = L

[[147702285338528]] = M

[[309221402452022]] = N

[[180901405340714]] = O

[[246506925416551]] = P

[[333343613344059]] = Q

[[123128367803569]] = R

[[316143388416019]] = S

[[334073456605673]] = T

[[199626093460643]] = U

[[224202614323263]] = V

[[336032459740792]] = W

[[205228226232732]] = X

[[142420399202282]] = Y

[[157919817645224]] = Z



Hope you all enjoy this tricks.. so dont forget to comment and share it..!!!!

Software Keylogger

Software keyloggers can also be classified into two types:



1. Local Keylogger



2. Remote Keylogger





Local Keylogger



Local Keyloggers are used to monitor local computers (May be your own Pc), they are very easy to install and are completely undetectable and its really hard to figure out once a keylogger is installed on a computer because usually keyloggers hide themselves from taskmanager, Windows Registry etc. Whenever you want to see logs, screenshots etc you just need to press a hotkey which (ex.Shift+Ctrl+F10)



There are hundreds of keyloggers available now days but some of them are userfriendly and are actually capable to hide themselves once they are installed, some of the Popular Local Keyloggers are:



1. Spyagent 2. AllSpy Keylogger3. Refog keylogger





SpyAgent



Spytech agent is an award winning software which can be used to monitor both local and remote computer but its usually good local monitoring, for remote monitoring there are software better than SpyAgent with far more features than it. Spytech Spyagent runs in total stealth mode and once it is installed on victims computer it's almost impossible to detect it's presence



AllSpyKeylogger



Allspy keylogger is best known for it user friendly interface, It can record keystrokes, Chatlogs, websites visited etc(Nothing Special), I guess all the other keyloggers have the ability to record all above things. The only thing I like about Allspy keylogger is that it has a veryuser-friendly interface and a person even with basic knowledge computer can use Allspy keylogger



Remote Keyloggers

Remote keyloggers are used for the purpose of monitoring a rempc, Once a remote keylogger is installed on your computer the attacker can get your keystrokes, your webcam shots, chat logs esitting in any part of the world.





THESE ARE THE TWO BEST REMOTE KETLOGGERS



1. Sniperspy



2. Winspy







Winspy Keylogger



WinSpy Software is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. It includes Remote Install and Real-time Remote PC Viewer. Win Spy Software will capture anything the user sees or types on the keyboard.



Sniperspy Keylogger



Sniperspy is one of my most favorite keyloggers, It is extremely powerful and has a very low antivirus detection rate. SniperSpy is theindustry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.



Once installed on the remote PC(s) you wish, you only need to login tyour own personal SniperSpy account to view activity logs of the Remote PC's ! This mean that you can view logs of the remote PC's from anywhere in the world as long as you have internet access



Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC likea television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!



This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!





Which software keylogger is better Sniperspy or Winspy?





I recommend Sniperspy for the following reasons:



1. Sniperspy is Fully compatible with windows vista,but winspy has known Compatibility issues with Windows vista

2. It has low antivirus detection rate

3. Sniperspy can bypass firewall but Winspy cant.

4. Sniperspy is recognized by CNN,BBC,CBS and other popular news network,

Hardware Keylogger

Keycobra – Best Hardware Keylogger



Now you might be wondering where you can find a hardware keylogger, well there are lots of hardware keyloggers available now a days but I would recommend you to use keycobra



Keycobra is one of my favorite hardware keyloggers as it offers more large amount of storage, Keycoabra keystroke recorder comes in a standard version - 4MB memory capacity, 2,000,000 keystrokes (over 1,000 pages of text), and a Venom version 2 billion keystrokes (over 1 million pages of text), organized into an advanced flash FAT file system. It is compatible with all three operating systems windows,linux and Mac OS, Here are some features of hardware keylogger due to

which keycobra is one of the most popular hardware keyloggers around.



Features



Record ALL Keystrokes - even Facebook passwords!



Huge memory capacity, organized as an advanced flash FAT file system



Advanced text menu for viewing recorded data, includes Net Detective, Phrase Search, Key Filtering, Unplug Counter and more!



Super fast memory contents download with USB Download Accelerator (included)





Keysnatch



Keysnatch has also a variety of keyloggers including PS/2 keyloggers, USB keyloggers and Wifi keyloggers, The Wifi keylogger has a built in WLAN transceiver and TCP/IP stack, which means that it can connect to the internet through a wifi-acess point



How It Works?



Once the Wifi keylogger has connected to an access point, The Keysnatch wifi keylogger will then actively send you all the keystrokes typed by the victim to any email address you provide. The keysnatch wifi keylogger is compatible with all other major operating systems, you name it and it runs on it. Keysnatch keylogger supports all types of a keyboard and the best part is that its completely undetectable by antiviruses.