How to Hack Facebook Accounts with Backtrack 5
Before using this method,Please read this
For this objective you will need any backtrack5 OS.
Remember that this is only Local(LAN)
In: Crack, Hacks, Info, Tekst, Tips · Tagged with: Accounts, Backtrack5, crack, Facebook, hack, Hacking
Aircrack-ng is an 802.11 WEP and WPA/WPA2-PSK key cracking program
The objective is to capture the WPA/WPA2 authentication handshake and then use aircrack-ng to crack the pre-shared key.
For this objective you will need the latest backtrack OS version > Click Here
This can be done either actively or passively. “Actively” means you will accelerate the process by deauthenticating an existing wireless client. “Passively” means you simply wait for a wireless client to authenticate to the WPA/WPA2 network. The advantage of passive is that you don’t actually need injection capability and thus the Windows version of aircrack-ng can be used.
Here are the basic steps we will be going through:
Start the wireless interface in monitor mode on the specific AP channel
Start airodump-ng on AP channel with filter for bssid to collect authentication handshake
Use aireplay-ng to deauthenticate the wireless client
Run aircrack-ng to crack the pre-shared key using the authentication handshake
Step 1 – Start the wireless interface in monitor mode
The purpose of this step is to put your card into what is called monitor mode. Monitor mode is the mode whereby your card can listen to every packet in the air. Normally your card will only “hear” packets addressed to you. By hearing every packet, we can later capture the WPA/WPA2 4-way handshake. As well, it will allow us to optionally deauthenticate a wireless client in a later step.
The exact procedure for enabling monitor mode varies depending on the driver you are using. To determine the driver (and the correct procedure to follow), run the following command:
On a machine with a Ralink, an Atheros and a Broadcom wireless card installed, the system responds:
Interface Chipset Driver rausb0 Ralink RT73 rt73 wlan0 Broadcom b43 - [phy0] wifi0 Atheros madwifi-ng ath0 Atheros madwifi-ng VAP (parent: wifi0)
The presence of a [phy0] tag at the end of the driver name is an indicator for mac80211, so the Broadcom card is using a mac80211 driver.Note that mac80211 is supported only since aircrack-ng v1.0-rc1, and it won’t work with v0.9.1. Both entries of the Atheros card show “madwifi-ng” as the driver – follow the madwifi-ng-specific steps to set up the Atheros card. Finally, the Ralink shows neither of these indicators, so it is using an ieee80211 driver – see the generic instructions for setting it up.
Step 1a – Setting up madwifi-ng
First stop ath0 by entering:
airmon-ng stop ath0
The system responds:
Interface Chipset Driver wifi0 Atheros madwifi-ng ath0 Atheros madwifi-ng VAP (parent: wifi0) (VAP destroyed)
Enter “iwconfig” to ensure there are no other athX interfaces. It should look similar to this:
lo no wireless extensions. eth0 no wireless extensions. wifi0 no wireless extensions.
If there are any remaining athX interfaces, then stop each one. When you are finished, run “iwconfig” to ensure there are none left.
Now, enter the following command to start the wireless card on channel 9 in monitor mode:
airmon-ng start wifi0 9
Note: In this command we use “wifi0” instead of our wireless interface of “ath0”. This is because the madwifi-ng drivers are being used.
The system will respond:
Interface Chipset Driver wifi0 Atheros madwifi-ng ath0 Atheros madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
You will notice that “ath0” is reported above as being put into monitor mode.
To confirm the interface is properly setup, enter “iwconfig”.
The system will respond:
lo no wireless extensions. wifi0 no wireless extensions. eth0 no wireless extensions. ath0 IEEE 802.11g ESSID:"" Nickname:"" Mode:Monitor Frequency:2.452 GHz Access Point: 00:0F:B5:88:AC:82 Bit Rate:0 kb/s Tx-Power:18 dBm Sensitivity=0/3 Retry:off RTS thr:off Fragment thr:off Encryption key:off Power Management:off Link Quality=0/94 Signal level=-95 dBm Noise level=-95 dBm Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:0 Missed beacon:0
In the response above, you can see that ath0 is in monitor mode, on the 2.452GHz frequency which is channel 9 and the Access Point shows the MAC address of your wireless card. Only the madwifi-ng drivers show the card MAC address in the AP field, other drivers do not. So everything is good. It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly.
To match the frequency to the channel, check out:http://www.cisco.com/en/US/docs/wireless/technology/channel/deployment/guide/Channel.html#wp134132 . This will give you the frequency for each channel.
Step 1b – Setting up mac80211 drivers
Unlike madwifi-ng, you do not need to remove the wlan0 interface when setting up mac80211 drivers. Instead, use the following command to set up your card in monitor mode on channel 9:
airmon-ng start wlan0 9
The system responds:
Interface Chipset Driver wlan0 Broadcom b43 - [phy0] (monitor mode enabled on mon0)
Notice that airmon-ng enabled monitor-mode on mon0. So, the correct interface name to use in later parts of the tutorial is mon0. Wlan0 is still in regular (managed) mode, and can be used as usual, provided that the AP that wlan0 is connected to is on the same channel as the AP you are attacking, and you are not performing any channel-hopping.
To confirm successful setup, run “iwconfig”. The following output should appear:
lo no wireless extensions.
eth0 no wireless extensions. wmaster0 no wireless extensions. wlan0 IEEE 802.11bg ESSID:"" Mode:Managed Frequency:2.452 GHz Access Point: Not-Associated Tx-Power=0 dBm Retry min limit:7 RTS thr:off Fragment thr=2352 B Encryption key:off Power Management:off Link Quality:0 Signal level:0 Noise level:0 Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:0 Missed beacon:0 mon0 IEEE 802.11bg Mode:Monitor Frequency:2.452 GHz Tx-Power=0 dBm Retry min limit:7 RTS thr:off Fragment thr=2352 B Encryption key:off Power Management:off Link Quality:0 Signal level:0 Noise level:0 Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:0 Missed beacon:0
Here, mon0 is seen as being in monitor mode, on channel 9 (2.452GHz). Unlike madwifi-ng, the monitor interface has no Access Point field at all. Also notice that wlan0 is still present, and in managed mode – this is normal. Because both interfaces share a common radio, they must always be tuned to the same channel – changing the channel on one interface also changes channel on the other one.
In: Backdoor, Crack, Hacks, Tips · Tagged with: Aircrack, crack, Hacking, Password, wifi, WPA, WPA2
The 624kb Utilman.exe is the key located at System Folder.
Open the Folder Windows\System32\ and check the Properties of Utilman.exe
Your current Logon Username and Administrators has no Permission to modify the file.
If you try to rename the file, it will give you the message:
Destination Folder Access is Denied You need permission to perform this action
Normally, Winbubble Context Menu “Take the Ownership of this file” can add the permission but this time, you can’t. (The Next Version can do it easily).
Also, Most of the Buttons are Disabled.
In: Backdoor, Hacks · Tagged with: Backdoor, Hidden, screen, Vista, Welcome, Windows7
Before attempting to bypass your bios password, make sure you contact the hardware manufacturer support staff and ask for their recommended methods of bypassing the BIOS security. If they are not able (will not) to help you we have some methods you can try by yourself.
Our methods include:
- Using a manufacturers backdoor password to access the BIOS
- Use password cracking software
- Reset the CMOS using the jumpers or solder beads.
- Removing the CMOS battery for at least 10 minutes
- Overloading the keyboard buffer
- Using a professional service
Most BIOS passwords do not protect your hard disk. For your own safety make sure you back up your hard drive just in case. Many laptops especially IBM ThinkPad, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.
Many Bios manufactories have backdoor passwords to unlock the bios password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to “_” in the US keyboard corresponds to “?” in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.
Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords
Read the rest of this post »
In: Backdoor, DOS, Downloads, Hacks, Info, Programma's, Software, Tips, Tools · Tagged with: BIOS, cmos, Password, passwords
Tunngle is a revolutionary p2p VPN tool that delivers the best online entertainment experience.
Tunngle is designed to allow PC gamers to comfortably play their LAN Games over the Internet.
It doesn’t matter if your game is old, epic or brand new. You don’t have to worry if your friends are miles away!
Tunngle makes use of the games LAN mode to connect the players together.
Each game gets its own public network. Each network comes with its own chat! You can bookmark, list and search!
Tunngle also comes with its own integrated messenger. Adding buddies and making friends is just a few mouse clicks away!
Klik here to download Tunggle
A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two ones.
A virtual private network connection across the Internet is similar to a wide area network (WAN) link between the sites. From a user perspective, the extended network resources are accessed in the same way as resources available from the private network.
In: Downloads, Games, Peer2Peer/p2p, Software, Tips, Tools · Tagged with: A, Free, p2p, VPN
XBOOT – Multiboot ISO/USB Creator
XBOOT is yet another neat little Multiboot ISO USB Creator. It is a Windows based application that can be used to create a Live Multiboot USB or even a Multiboot ISO file that can then be burnt to a CD/DVD. XBOOT supports many Linux Distributions and Utilities, and allows you to use your choice of a Grub or Syslinux bootloader. Also included is a built in QEMU emulator (enabling you to boot an ISO from within Windows).
Usage Example: Creating a Live Multiboot USB with XBOOT:
- Download, extract and run the latest version of XBOOT
- (1) Drag and drop some ISOs into the XBOOT window (2) SelectCreate USB
- Select your USB Drive from the Droplist (4) Select a Bootloaderto use (5) Click OK to begin creation
A copy notification window appears to keep you informed of the progress. Once the process is complete, you should have a Bootable Multiboot USB Flash Drive with your ISO selections installed.
In: Downloads, Programma's, Software, Tips, Tools · Tagged with: Creator, ISO, ISO USB, Multiboot, USB, XBOOT
Web Server is an application that has the ability to make your computer a total server. Because of that users can browse to your local website on your hard drive. Next to that this application has the ablility to send anonym E-mails without an SMTP server input, because it will let your PC be one. Here are a few screenshots that help you doing this:    
In: Downloads, MABSOFT, Tips, Tools · Tagged with: 1.0, server, Web
With this application you can join/add/bind two executables, so the joined EXE will execute both EXEs when run. However the most AV will detect the result as trojan.dropper. You can use packers or other techniques to resolve this issue and make the EXE undetectable. You can also see the tutorial on how to bind EXEs using Visual Basic 6.0.