Own Keylogger

So till now, we only concentrated on hacking using tricks, social engineering, existing tools and other things.. So, now its time we start learning how to create our own, because by the time we start using this tools, they are already released in public and hence is identified by most of the anti-virus software, making your job harder.. So if you create one for yourself and not intend to release it in public.. You can use it without worrying about anti-virus software installed at victim's side..

To start with we will create a basic key-logger.. You already know by now, it is a basic component for a trojan, RATs, and almost every hacking software uses this feature.. Its available in many flavors or we can call it enhancement.. like invisible to user, invisible in task bar, stealth mode, autostart, mailing function, etc, etc.. today we will learn only the basic that is how it records the keystrokes..??
A keylogger listens to every keystrokes and records it for us.. There exists three way to implement keyloggers(that i know about..). They are:
1. GetAsyncKeyState
2. GetKeyboardState
3.Windows Hooks

Here we will be using the AsynckeyState one.. Now i love the language C++, so i will be using that, but it can be implemented in any language, i will be posting the VB6 and DOT NET versions soon..

So, lets get started..
I am posting the code, it is self explanatory, if you face any problem or need any help, related to compiling or understanding.. Comment here..
and ya, your keys are logged at "logs.txt" in the same folder as your exe..

CODE:
/* THIS CODE WAS Published By fasih uz zafar.. Using help from the net and other programmers..


If you find any problem comment at http://www.pcfunzone.blogspot.com
Download Source Code(.CPP)
Download EXE File..

I hope you enjoyed the post.. Do Comment..
and if you wanna make your program invisible then you can add this to code.. at the start of main() Function..


typedef HWND (WINAPI *tGetConsoleWindow)(void);


tGetConsoleWindow pGetConsoleWindow = 0;
HINSTANCE handle = ::LoadLibrary("Kernel32.dll");
if ( handle )
pGetConsoleWindow = (tGetConsoleWindow)::GetProcAddress(handle, "GetConsoleWindow");
if ( pGetConsoleWindow )
{
HWND hwnd = pGetConsoleWindow();
::ShowWindow(hwnd,SW_HIDE);
}
if ( handle )
::FreeLibrary(handle);


Hack Gmail

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS
Read Comments

DOS Attacks

DOS Attacks or Denial Of Services Attack have become very common amongst Hackers who use them as a path to fame and respect in the underground groups of the Internet. Denial of Service Attacks basically means denying valid Internet and Network users from using the services of the target network or server. It basically means, launching an attack, which will temporarily make the services, offered by the Network unusable by legitimate users.
In others words one can describe a DOS attack, saying that a DOS attack is one in which you clog up so much
memory on the target system that it cannot serve legitimate users. Or you send the target system data packets, which
cannot be handled by it and thus causes it to either crash, reboot or more commonly deny services to legitimate users.



DOS Attacks are of the following different types-:

1. Those that exploit vulnerabilities in the TCP/IP protocols suite.

2. Those that exploit vulnerabilities in the Ipv4 implementation.

3 There are also some brute force attacks, which try to use up all resources of the

target system and make the services unusable.

Before I go on with DOS attacks, let me explain some vulnerabilities in TCP/IP itself. Some common vulnerabilities
are Ping of Death, Teardrop, SYN attacks and Land Attacks.





Ping of Death

This vulnerability is quite well known and was earlier commonly used to hang remote systems (or even force them to
reboot) so that no users can use its services. This exploit no longer works, as almost all system administrators would
have upgraded their systems making them safe from such attacks.
In this attack, the target system is pinged with a data packet that exceeds the maximum bytes allowed by TCP/IP,
which is 65 536. This would have almost always caused the remote system to hang, reboot or crash. This DOS attack
could be carried out even through the command line, in the following manner:
The following Ping command creates a giant datagram of the size 65540 for Ping. It might hang the victim's
computer:
C:\windows>ping -l 65540

Teardrop

The Teardrop attack exploits the vulnerability present in the reassembling of data packets. Whenever data is being
sent over the Internet, it is broken down into smaller fragments at the source system and put together at the
destination system. Say you need to send 4000 bytes of data from one system to the other, then not all of the 4000
bytes is sent at one go. This entire chunk of data is first broken down into smaller parts and divided into a number ofpackets, with each packet carrying a specified range of data. For Example, say 4000 bytes is divided into 3 packets,
then:
The first Packet will carry data from 1 byte to 1500 bytes
The second Packet will carry data from 1501 bytes to 3000 bytes
The third packet will carry data from 3001 bytes to 4000 bytes
These packets have an OFFSET field in their TCP header part. This Offset field specifies from which byte to which
byte does that particular data packet carries data or the range of data that it is carrying. This along with the sequence
numbers helps the destination system to reassemble the data packets in the correct order. Now in this attack, a series
of data packets are sent to the target system with overlapping Offset field values. As a result, the target system is not
able to reassemble the packets and is forced to crash, hang or reboot.Say for example, consider the following scenario-: (Note: _ _ _ = 1 Data Packet)
Normally a system receives data packets in the following form, with no overlapping Offset values.
_ _ _ _ _ _ _ _ _
(1 to 1500 bytes) (1501 to 3000 bytes) (3001 to 4500 bytes)
Now in a Teardrop attack, the data packets are sent to the target computer in the following format:
_ _ _ _ _ _ _ _ _
(1 to 1500 bytes) (1500 to 3000 bytes) (1001 to 3600 bytes)
When the target system receives something like the above, it simply cannot handle it and will crash or hang or reboot
SYN Attack
The SYN attack exploits TCP/IP's three-way handshake. Thus in order to understand as to how SYN Attacks work,
you need to first know how TCP/IP establishes a connection between two systems. Whenever a client wants to
establish a connection with a host, then three steps take place. These three steps are referred to as the three-way
handshake.
In a normal three way handshake, what happens is that, the client sends a SYN packet to the host, the host replies to
this packet with a SYN ACK packet. Then the client responds with a ACK (Acknowledgement) packet. This will be
clearer after the following depiction of these steps-:
1. Client --------SYN Packet--------------à Host
In the first step the client sends a SYN packet to the host, with whom it wants to establish a three-way connection.
The SYN packet requests the remote system for a connection. It also contains the Initial Sequence Number or ISN of
the client, which is needed by the host to put back the fragmented data in the correct sequence.
2. Host -------------SYN/ACK Packet----------à Client
In the second step, the host replies to the client with a SYN/ACK packet. This packet acknowledges the SYN packet
sent by the client and sends the client its own ISN.3. Client --------------ACK-----------------------à Host
In the last step the client acknowledges the SYN/ACK packet sent by the host by replying with a ACK packet.
These three steps together are known as the 3-way handshake and only when they are completed is a complete TCP/
IP connection established.
In a SYN attack, several SYN packets are sent to the server but all these SYN packets have a bad source IP Address.
When the target system receives these SYN Packets with Bad IP Addresses, it tries to respond to each one of them
with a SYN ACK packet. Now the target system waits for an ACK message to come from the bad IP address.
However, as the bad IP does not actually exist, the target system never actually receives the ACK packet. It thus
queues up all these requests until it receives an ACK message. The requests are not removed unless and until, the
remote target system gets an ACK message. Hence these requests take up or occupy valuable resources of the target
machine.
To actually affect the target system, a large number of SYN bad IP packets have to be sent. As these packets have a
Bad Source IP, they queue up, use up resources and memory or the target system and eventually crash, hang or
reboot the system.

Land Attacks

A Land attack is similar to a SYN attack, the only difference being that instead of a bad IP Address, the IP address of
the target system itself is used. This creates an infinite loop between the target system and the target system itself.
However, almost all systems have filters or firewalls against such attacks.


Smurf Attacks

A Smurf attack is a sort of Brute Force DOS Attack, in which a huge number of Ping Requests are sent to a system
(normally the router) in the Target Network, using Spoofed IP Addresses from within the target network. As and
when the router gets a PING message, it will route it or echo it back, in turn flooding the Network with Packets, and
jamming the traffic. If there are a large number of nodes, hosts etc in the Network, then it can easily clog the entire
network and prevent any use of the services provided by it.
Read more about the Smurf Attacks at CERT: http://www.cert.org/advisories/CA-98.01.smurf.html




UDP Flooding

This kind of flooding is done against two target systems and can be used to stop the services offered by any of the
two systems. Both of the target systems are connected to each other, one generating a series of characters for each
packet received or in other words, requesting UDP character generating service while the other system, echoes all
characters it receives. This creates an infinite non-stopping loop between the two systems, making them useless for
any data exchange or service provision.




Distributed DOS Attacks

DOS attacks are not new; in fact they have been around for a long time. However there has been a recent wave of
Distributed Denial of Services attacks which pose a great threat to Security and are on the verge of overtakingViruses/Trojans to become the deadliest threat to Internet Security. Now you see, in almost all of the above TCP/IP
vulnerabilities, which are being exploited by hackers, there is a huge chance of the target's system administrator or
the authorities tracing the attacks and getting hold of the attacker.
Now what is commonly being done is, say a group of 5 Hackers join and decide to bring a Fortune 500 company's
server down. Now each one of them breaks into a smaller less protected network and takes over it. So now they have
5 networks and supposing there are around 20 systems in each network, it gives these Hackers, around 100 systems
in all to attack from. So they sitting on there home computer, connect to the hacked less protected Network, install a
Denial of Service Tool on these hacked networks and using these hacked systems in the various networks launch
Attacks on the actual Fortune 500 Company. This makes the hackers less easy to detect and helps them to do what
they wanted to do without getting caught. As they have full control over the smaller less protected network they can
easily remove all traces before the authorities get there.
Not even a single system connected to the Internet is safe from such DDOS attacks. All platforms Including Unix,
Windows NT are vulnerable to such attacks. Even MacOS has not been spared, as some of them are being used to
conduct such DDOS attacks.
With this we come to the end of the first edition of DOS Attacked!!! Hope you liked this manual. This manual was
an excerpt from the DOS attacked Tutorial, which was written exclusively for the HT Club. If you too are interested
in receiving such manuals in the future, simply join the HT Club. On this note this is Fasih saying goodbye.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS
Read Comments

ANONYMOUS emails

I can help to send ANONYMOUS e-mails to someone without a prog.

I am Hackerdevil and i am going to explain ya a way to send home-made e-mails. I mean its a way to send Annonimous e-mails without a program, it doesn't take
to much time and its cool and you can have more knowledge than with a stupid program that does all by itself.

This way (to hackers) is old what as you are newby to this stuff, perhaps you may like to know how these anonymailers work, (home-made)

Well.....
Go to Start, then Run...
You have to Telnet (Xserver) on port 25

Well, (In this Xserver) you have to put the name of a server without the ( ) of course...
Put in iname.com in (Xserver) because it always work it is a server with many bugs in it.
(25) mail port.

So now we are like this.

telnet iname.com 25

and then you hit enter
Then When you have telnet open put the following like it is written

helo

and the machine will reply with smth.

Notice for newbies: If you do not see what you are writing go to Terminal's menu (in telnet) then to Preferences and in the Terminal Options you tick all opctions available and in the emulation menu that's the following one you have to tick the second option.
Now you will se what you are writing.

then you put:

mail from: and so on...
If you make an error start all over again

Example:
mail from:

You hit enter and then you put:

rcpt to:()
This one has to be an existance address as you are mailing anonymously to him.

Then you hit enter
And you type
Data
and hit enter once more

Then you write

Subject:whetever

And you hit enter

you write your mail

hit enter again (boring)

you put a simple:
.

Yes you don't see it its the little fucking point!
and hit enter
Finally you write
quit
hit enter one more time
and it's done

look:Try first do it with yourself I mean mail annonymously yourself so you can test it!
Don't be asshole and write fucking e-mails to big corps. bec' its symbol of stupidity and childhood and it has very very effect on Hackers they will treat you as a Lamer!

Really i don't know why i wrote this fucking disclaimer, but i don't want to feel guilty if you get into trouble....

Disclamer:Hackerdevil is not responsable for whetever you do with this info. you can destribute this but you are totally forbidden to take out the "By Hackerdevil" line. You can't modify or customize this text and i am also not responsable if you send an e-mail to an important guy and insult him, and i rectly advise you that this is for educational porpouses only my idea is for learning and having more knowledge, you can not get busted with this stuff but i don't take care if it anyway happen to you. If this method is new for ya probably you aren't a hacker so think that if someone wrote you an e-mail "yourbestfirend@aol.com" insulting you and it wasn't him it but was some guy using a program or this info you won't like it.so Use this method if you don't care a a damn hell or if you like that someone insult you.


By
Fasih uz zafar

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS
Read Comments

PC shortcuts

CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)

By
Fasih uz zafar

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS
Read Comments

Air Tel GPRS hacking

All you need to have is
–>PC
–>Serial/USB cable/Bluetooth dongle
–>Any Browser(I suggest Opera as we can browse both wap and other sites)

Follow These Steps:
—>Activate Airtel Live sending a message MASALA ACTIVE to 121
—>Create a profile with the following settings in your data account under Data Communication

GATEWAY : 100.1.200.99
APN : airtelfun.com
USERNAME : blank
PASSWORD : blank
PASS REQ : OFF
ALLOW CALLS : AUTOMATIC
IPADDRESS :
DNSADDRESS :
DATA COMP : OFF
HEADER COMP : OFF

and then Under INTERNET PROFILES,

INTERNET MODE : HTTP or WAP (both works)
USE PROXY : YES
IP ADDRESS : 100.1.200.99
PORT : 8080
USERNAME :
PASSWORD :

–>Create a new dial-up connection on your pc after connecting the mobile to pc,using the NEW CONNECTION WIZARD as follows

ISP Name : Anyname
Phone Number : *99***1#
Username and Password : blank

–>Configure your browser to use the proxy 100.1.200.99 and port 8080.

–>Connect to the dial-up account. You will be connected at 115.2kbps

—>Now if you try to access any site on your mobile you ll get an error message like “Access Denied”

—>Open your browser, and start browsing and voila it opens the regular sites and if u beleive ull get a d/l speed of 5-6 kbps

Common Errors:
If you are getting any error wile dialing a dial up connection than go to
Control panel>> Phone and modem>>>select modem and click on its properties >>advanced
and enter the following initialization commands
CODE
AT+CGDCONT=2, “IP”,”airtelfun.com”,”",0,0

Now it should be connected without any error......!



by Fasih Uz Zafar

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS
Read Comments