Latest: Hack Facebook Password! | Wants To Hack CellPhone | Trace Mobile Number(only US) ! | New : Best FUD Keylogger!

Featured Posts

hack mobile

Sunday, April 29, 2012

Hack Reliance Netconnect - Broadband - Datacard To Increase Speed

Comments Posted by wildrank on Sunday, April 29, 2012
We have already discussed about Free Airtel GPRS hack on wildhacker, but most of them are not working now days. Today I am going to share one more trick but its not for Airtel, its for Reliance which you can use to increase your internet speed of Reliance Netconnect Broadband + datacard when your Unlimited Plan limit it over.

I remember the day i was figuring around with reliance data card to get high speed without paying for it,but the 3.1 mpbs speed internet tariff plans are too costly and i have to end up with hybrid(cdma 1x -144kbps) because my monthly budget for internet was low,but always dreaming to get high speed broadband for free,and finally got through it.

You might be interested in some of our other articles:




Don’t forget to Subscribe to our RSS feed

Hack Reliance Netconnect - Broadband - Datacard To Increase Speed


Follow the steps to increase speed of Reliance Netconnect Broadband + datacard ,



Tuesday, April 24, 2012

Hacker News | Pwning a Spammer's Keylogger

Comments Posted by wildrank on Tuesday, April 24, 2012
Hello Guys..On wildhacker I have written many tutorial about How to hack email account passoword using Keylogger and many other method like phishing etc. I have also written article on Website Hacking.

But today in this article, I am going to share with you some things different than previous articles which I found while surfing the web.

You might be interested in some of our other articles:



Don’t forget to Subscribe to our RSS feed

Hacker News | Pwning a Spammer's Keylogger

Recently, while scrounging around our spam traps, I spotted this ordinary piece of malicious spam. It uses a very simple social engineering trick, speculating about Obama’s sexual orientation and a link to a supposed picture to prove it.


There was nothing special about this spam but the link with a double extension file named “you.jpg.exe” was something worth investigating. So out of curiosity, I downloaded the file and checked out what it does. First thing I did was to find out what the file really was. Of course, it was not an image file of Obama but rather a self-extracting RAR file.


Opening the file through a RAR extracting tool revealed the files inside it.


I extracted “you.jpg.exe” and inspected each of the files inside it but found they were actually encoded. So I run “you.jpg.exe” in our test machine and observed. When run, the image below popped up. Hmmm, definitely not Obama.


In the background, the following files were installed in the Windows System32 folder:
  • bpk.dat 
  • bpk.exe
  • bpkhk.dll 
  • bpkr.exe
  • inst.dat 
  • pk.bin 
 Also an autorun registry was created:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run bpk = <%windir%\System32\bpk.exe>

Googling for the dropped files gave me a hint that what was installed was a keylogger and in particular a commercial version from Blazing Tools called Perfect Keylogger (PK). This keylogger program can be legitimately purchased and used, ostensibly for monitoring your kids’ or employees’ browsing habits, etc. As you can imagine, PK can also be used for badness. I almost ended the analysis here. But a moment later, more interesting stuff appeared. The keylogger connected to a remote FTP server, and this allowed me to intercept the attacker’s FTP credentials.


Using the intercepted credentials, I logged in to the FTP server and found many folders containing monitoring logs and screenshots of victim’s desktop. That number of logs shows just how effective the spammer’s social engineering trick was.


Here is the WHOIS info of the FTP server:


Not wanting to stop here, I did a little more investigation on the PK installation files in my hope to uncover who was behind the campaign. According to PK’s Online Help webpage, the program uses a hotkey to unhide the admin window or the system tray icon. The default hotkey combination is CTRL+ALT+L, but this didn’t work. So brute forcing different hotkey combinations enabled me to retrieve the correct hotkey. But to my dismay, this window popped up:


Before getting dirty by reverse engineering the keylogger and trying to crack the password, I scrounged around the net for more clues. I found a personal, In his blog, he noted that the password and other configurations were stored in an encoded file named PK.BIN, and the monitored data is stored in an encoded file named BPK.DAT. He also noted that the files can be decoded with a simple XOR using the key 0xAA. I supposed that the PK version that Chris analysed was an older version, hence the XOR key 0xAA didn’t decode our configuration file. Well, for the dump file BPK.DAT, the XOR key partially worked, but to make it more readable I XORed it using two bytes 0xAA, 0x00:


But I was more interested in the file PK.BIN, because it stores the configuration details of the keylogger including perhaps the details of the attacker. But the file needed some extra work because of the fact that it can’t be decoded by simply XORing it with 0xAA. So my best guess was that it used a different XOR key. This is what the file looks like in text mode, hhmmm look at that repetitive pattern!


In HEX mode, I took that repetitive string and made it our XOR key:


With the help of some python script, it helped me decode the file:

if len(sys.argv) > 1:
pkhandle = open(sys.argv[1],'rb')
pkbuffer = pkhandle.read()
pkhandle.close()

key=[0x0D,0x0A,0x08,0x05,0x01,0x02,0x06,0x03,0x03,0x0E,0x01,0x08,0x03,0x0C,
0x09,0x07,0x05,0x0D,0x0C,0x0B,0x03]
dec = ''
ctr = 0
for i in range(11,len(pkbuffer)):
a= ord(pkbuffer[i])
b =key[ctr%len(key)]
          x = a^b
          dec = dec+(chr(x))
          ctr+=1

dechandle = open('pk.dec','wb')
dechandle.write(dec)
dechandle.close()

And voila! (note: I needed to blur some details to protect the victim’s data in the FTP server)


The decoded PK.BIN shows enough details to get inside the PK admin panel, including the keylogger's admin password, FTP server/credentials, PK license name and license key. I typed in the admin password and it was successful, giving me more understanding about what the attacker is capturing and more of his keylogger configuration.


In the configuration file, it revealed the name Charles Onuigbo as the PK license name.

Now, I don’t conclude that Charles Onuigbo is the attacker or indeed if he is a legitimate person. The only thing interesting about the name is that it appears to be fairly common in Nigeria, the home of email scams!

I have reported the FTP site to its ISP through abuse email, and am looking forward to this site being taken down ASAP.

Credit: blog.spiderlabs.com


Sunday, April 15, 2012

How to Hack an Email Account Password using Hardware Keylogger

Comments Posted by wildrank on Sunday, April 15, 2012
I have written many articles on keyloggers which we can use to hack different types of email account password, but all those keyloggers are software keylogger. Today in this article I’ll be giving you a detailed information on hardware keyloggers and their use. I will also teach how to hack an email using hardware keylogger.

A Keylogger is hardware or software that records all information entered into a computer via a keyboard, even into password fields. The idea of this is to keep children safe online, monitor employees, catch an unfaithful spouse, or prevent other kinds of trouble.

A software keylogger is a stealth computer program that captures every keystroke entered through the keyboard, where as Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes.

Hack Email Account Password
You might be interested in some of our other articles:


Don’t forget to Subscribe to our RSS feed

How to Hack an Email Account Password using Hardware Keylogger


Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. Usually, a hardware keylogger can only record keystroke-related information—passwords, credit card numbers, websites visited, e-mails sent, chat and instant messenger conversations. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. The latter is the best hardware keylogger because it can’t be spotted.

Hack Email Account Password

They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. To retrieve data from a hardware keylogger, you must recover the device or regain physical access to the computer in which you installed it.

Setup a Hardware Keylogger to Hack the Email Password :

The hardware keylogger must be installed between the keyboard plug and the USB or PS/2 port socket. That is you have to just plug in the keylogger to your keyboard’s plug (PS/2 or USB) and then plug it to the PC socket. The following image shows how the keylogger is installed.

Hack Email Account Password

After the installation of the keylogger, It starts recording each and every keystroke of the keyboard including passwords, credit card numbers, websites visited, e-mails sent, chat and instant messenger conversations and stores them in separate log files in it.

Hack Email Account Password

The hardware keylogger has an inbuilt memory in which the logs are stored.


Saturday, April 14, 2012

Hack Password : How to Hack a Gmail Account Password 2012

Comments Posted by wildrank on Saturday, April 14, 2012
Gmail is one of the most widely used email services across the world, it has also become a favorite place for many peoples to share information and other data. Thats why sometimes it becomes inevitable for many people across world to hack such gmail account of their spouse or girlfriend / boyfriend to read or steal thier important information.

As Gmail if most widely used email service across the globe with more than 800 million users, as a reason if which it has become the number one target of hackers, also some hackers/peoples try to fool many peoples by selling fake product like readymade software program that can hack Gmail with just a one click of a button or clamming email hacking services like we will hack gmail account password for some 100-150$ but they are nothing more than a scam. So dont buy or pay such software or services. Stay away from such people.

Today in this post, I am going to share some real working ways to hack a Gmail account password.

Hack gmail account password
You might be interested in some of our other articles:
Don’t forget to Subscribe to our RSS feed

Hack Password : How to Hack a Gmail Account Password


So here are the some top methods which hackers can use to hack Gmail account password. They are:


Friday, April 13, 2012

IconChanger : How to Change the ICON of an EXE file

Comments Posted by wildrank on Friday, April 13, 2012
I have posted many softwares like Binders and Crypters over here which are really useful for making our viruses FUD and for fooling victim. Now, I am adding one more software to the list this Exe Icon Changer software will help you to fool your victim easily.

Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence. Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user. But in reality when the file is carried to a different computer, then it shows it’s original ICON itself. This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself. Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.

This tool changes the exe ICON permanantly.Even if you move the file to another computer, the changed icon will be displayed anyway !

change icon exe
You might be interested in some of our other articles:


Don’t forget to Subscribe to our RSS feed

IconChanger : How to Change the ICON of an EXE file


Follow the step-by-step instruction on how to use this tool to change the icon...



Monday, April 9, 2012

How To Hack Account Password Using Cookie Stealing And Session Hijacking

Comments Posted by wildrank on Monday, April 09, 2012
I posted articles on Phishing and Keylogging - which are the two best methods to hack an Email account. Today I am writing about a new topic on wildhacker about - Cookie Stealing And Session Hijacking. I observed that cookie stealing is neglected by some fellow hackers. But, recently, I discovered that cookie stealing can be pretty handy to hack an Email account. In the following article, I have covered basics of how to hack an Email account using Cookie Stealing.

Some of my site readers also asked me about cookies stealing and there are lots of newbies having lots of misconceptions related to cookie stealing and session hijacking, So I hope this tutorial will helps all of them.

cookies stealing facebook
You might be interested in some of our other articles:
Don’t forget to Subscribe to our RSS feed

Hack Account Password Using Cookie Stealing And Session Hijacking




 
  • Gmail Hacking

    Wants to hack Gmail a/c password ? Learn best way to hack Gmail password..

  • Jailbreak Iphone/iPad

    Jailbreak your Iphone or iPad to give it more functionality free of cost...

  • Facebook Hacking

    Wants to hack Facebook password? But Don't Know Where to Start? Learn here......

  • MAC Keylogger

    Learn how to hack emails account password on MAC OS using keylogger....

  • Mobile Hacking

    Monitor mobiles,Records the activities of anyone who uses iPhone, BlackBerry....

Disclaimer

ALL INFORMATION / TUTORIALS WRITTEN ON WILDHACKER.COM ARE FOR EDUCATIONAL PURPOSES ONLY, THE SITE WILDHACKER.COM IS NOT RESPONSIBLE IN ANY WAY FOR HOW THIS INFORMATION IS USED, YOU USE IT AT YOUR OWN RISK. YOU MAY LEARN ALSO HOW TO GET YOUR OWN ACCOUNT BACK FROM ALL THIS INFRORMATION.

Recipes

Unlock Iphone Website Hacking

Facebook Hacking Keylogger

Unlock Blackberry Unlock Modem

Gmail Hacking Hack Yahoo

Hotmail Hacking Remote Hacking

Traffic / Ranking

Powered by:

Wild Hacker © 2012. All Rights Reserved | Contact | Bloggers.com