Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Shadows

Pages: [1]
1
Tutorials / Re: ATM Hacking
« on: May 22, 2012, 11:33:52 am »
No my friend, this time I am sure that I make it.X(

2
Anonymity and Privacy / Re: Anonymity and Security
« on: May 21, 2012, 09:05:27 am »
Oh I have completely forgot to say that I took the information from other sources ! Thanks for remind me

3
General discussion / Re: What kind of hacker are you?
« on: May 19, 2012, 12:47:14 pm »
Hackers, where? I thought  this forum was about cooking recipes.
I made this just for fun not that someone is really a hacker !

4
General discussion / What kind of hacker are you?
« on: May 19, 2012, 10:59:51 am »
   You can choose:

1. White Hat Hacker

2. Grey Hat Hacker

3. Black Hat Hacker

I am a Grey one.

5
Hacking and Security / Re: Doxing
« on: May 19, 2012, 10:20:34 am »
Thanks kulvestrukas for your help, +1 for the corrections.

6
Hacking and Security / Re: Doxing
« on: May 18, 2012, 10:19:00 pm »
If i can add one thing. Getting there ip, dont send it as the original link, run it through tinyurl first, so it doesnt look obvious. its worked for me in the past, just wanted to put that out there. Great job, btw
The original link doesn't look so obvious, but it is a good advice.

7
Hacking and Security / Doxing
« on: May 18, 2012, 09:57:26 pm »
What is Doxing? It's essentially gathering information on a target they generally wouldn't want you to know. Everything from name,zip code,and even address.

What you need:

   |Basic social engineering|
   |Notepad|

1. Obtain their ip address do this by going to http://www.whatstheirip.com/ and enter your email address. This will then give a set of links.

2. Take this link and trick them by saying something like OMG chack this out or any method you use.

3. If your target has e-mailed you you can get the IP from looking at the e-mail source. To look at the e-mail source for windows live users right click on the message and click "View  Message source". When you look at the source search for this "recieved by". This is the IP address of your target.
Note:You will get the targets IP only if he used a client such as Thunderbird or Outlook to send the mail.

4. Once you have their IP address, goto http://ipaddress.com and enter it  in. You now have the location, zip code, state, country, ISP (not the exactly location), and operating system. Fill all this in your notepad and keep going.

5. Obtain the targets email anddress. Google the user and put @ at the end. Example 'username' @. This will pull up any posts online of this person if there are any.

6. Put in the e-mail of your target in facebook search . If your slave uses facebook, you can find out (at the minimum) their name. If your target uses facebook but does not protect their information, you can found out loads of information.

7. If the target has paypal, heres an easy way to get their information: When you have the e-mail of your target, login to paypal. Transfer .01 USD to the e-mail of your target. When sent you will have all of the information on the paypal account (name, address, phone, etc)

8. If your slave has photos online, save the photo and go to website named http://tineye.com. On this website, upload the picture of your target. When it is finished, you can also find out if the photo is fake.

9. If you have the name of your slave it is possible to find the address of your target. I suggest using the following websites:
     http://411.com
     http://whitepages.com

Using these websites you can also find out their phone.

10. If your slave has a website in http://who.is. If the website owner does not use WHOIS Guard Protect, you can find out all information about him (name, phone, address, etc).
   
      http://who.is/

8
Found it on the Webs / Hackers Jobs
« on: May 18, 2012, 12:10:17 pm »
A new site open and offers to hackers free jobs.

http://hackerjobs.co.uk/

You can also see their blog here:
http://hackerjobs.co.uk/blog/2012/3/25/when-jonny-met-stevie

What have to say about that.

9
Hacking and Security / Re: Help
« on: May 18, 2012, 10:18:06 am »
Thank you too mr.iTpHo3NiX

10
Tutorials / Re: ATM Hacking
« on: May 17, 2012, 07:17:20 pm »
Yeah, but sometimes they are stupid so give it a try...
Great video, how did you find it ?

11
Tutorials / ATM Hacking
« on: May 17, 2012, 05:10:36 pm »
******************************************************************
                                                  ATM Hacking

******************************************************************

This guide will teach you how to access the control panel of older Mini bank ATM's, common in liqour stores and other small shops. Depending
on how lucky you are, the power this grants you can range from being able to find out how much money is in the ATM, to  being able to change
the value the machine thinks its dispensing (aka it thinks  it's giving you $1's, but it's really giving you $20's. So if you withdrawl $20, it'll really
give you $400)

What is required:

• Older mini bank ATM's. These are usually rounder at the top and say mini bank across it.

1. Once you've found the atm, press and hold down the 'ENTER' 'CANCEL' 'CLEAR' buttons for about 3-5 seconds

2. Then, let go of all 3 buttons and press the '1' '2' and '3' keys in order. You should now see a screen that says 'Enter Password'

3. Sometimes, the owners don't change the default passwords. If this is the case, you will have full power. The account you want to get into is the admin account. The default password can be '555555' or '666666'.

4.  If you get in, the menu options are self explanitory. Other default passwords for lower-access accounts can be '111111' '222222' '333333' or '444444'


12
Hacking and Security / Re: Help
« on: May 17, 2012, 12:42:00 pm »
Thank you mr.Ca0s.

13
Hacking and Security / Help
« on: May 17, 2012, 12:14:41 pm »
I found these hashes when i hacked into a site using sql injection. I want to know what program do you use to crack hashes and what kind of hashes are these. I use Cain & Abel and i know that these hashes aren't md5 nor md4. Thank you.

e727d1464ae12436e899a726da5b2f11d8381b26
ab87d24bdc7452e55738deb5f868e1f16dea5ace
0d73e0a895b147446cba85df36b3e7d1e4ecec97
5d769ae9cd683dd3b0d1537dad4667973b311db2

14
Anonymity and Privacy / Re: Anonymity and Security
« on: May 17, 2012, 08:56:45 am »
Thank you all guys, i appreciate it.

15
Anonymity and Privacy / Anonymity and Security
« on: May 16, 2012, 11:27:41 am »
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
******************************************************************
                                           Anonymity and Security

******************************************************************
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

Note: I DID NOT MAKE THIS. This tutorial is very analytic to be more understandable to some users

Contents:
Check your Privacy
Privacy Basics
Proxies
Vpn
Firefox and Chrome add-ons
Anonymous Email
Disk Wipe
Firewall
Tor Project
Online proxy sites   
Safe online payment
SSH
Encrypt your data
Online Virus Check


1.Check your Privacy
Two sites to check your anonymity.

http://www.stayinvisible.com/
http://www.whattheinternetknowsaboutyou.com/

2.Privacy basics
Do not disclose any private information, unless absolutely required. In some cases when it is required such as your last name, only fill in partial information such as your last initial.
Don't fall into e-mail and web phishing traps. Become familiar with the signs of phishing and don't disclose private information in e-mail.
If you're using Microsoft Windows, familiarize yourself with Spyware and have at least one program installed to protect the computer.

3.Proxies
Proxy is a server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.

Download elite proxy switcher from this link
http://www.eliteproxyswitcher.com/EPS_setup.exe

After download and install, copy a list of proxies from these links.
http://proxy-ip-list.com/
http://www.tubeincreaser.com/proxylist.txt
http://hidemyass.com/proxy-list/
and save them ass a txt file. Load the txt from elite proxy switcher and check the proxies to see if they are alive. Double click to the alive proxies to set them on.

Note:Every proxy you are using it makes your internet more slow.

4.Vpn
Is a Virtual Private Network (VPN) that change your ip address and encrypt your traffic.
1-   Free VPN: It is not recommended, cause many features are capped, and in addition, many free VPN providers will hand user data upon warrant issue. Also, many free VPNs work with ad companies.
2-   Commercial pptp: It's been said, as telecomix pointed out, that some operating systems(Windows 7, Vista) might be vulnerable to an attack consisting in requesting p2p conns, wichcould lead the malicious attacker to get the user real ip. See https://www.ipredator.se/?lang=en For more information on this matter. Seems flaw has to do with ipv6 conns, so just ensure you use ipv4.
3-   Recommended VPN's. All that use the OpenVPN service. And that include specific policieson user data storage and policies regarding that data. (Best option, no data loggin + no user billing loggin, + safe payment methods ie: Ukash and similar services).

Free VPN direct downloads -- Not recommended.
If they aren't selling you a service. They are selling you.

Vpn Clients Downloads

Mac
• Ultra VPN: https://ssl0.ovh.net/fr/
Linux
• UltraVPN:  https://ssl0.ovh.net/fr/
Windows
• HotspotShield: http://hotspotshield.com
• UltraVPN: https://ssl0.ovh.net/fr/

Top 10 vpn clients here:
http://techpp.com/2009/07/09/top-5-free-vpn-clients/

5. Firefox and Chrome add-ons

1-HTTPS Everywhere is a Firefox and Chrome extension that encrypts your communications with many major websites, making your browsing more secure.
Encrypt the web by adding the HTTPS at the beginning of the url.
e.g  https://www.evilzone.com/
 
Download https everywhere from the link below
https://www.eff.org/files/https-everywhere-latest.xpi
   
2-No script disable sites scripts making things very difficult for sites that use scripts to grab ip address.

Download NoScript from the link below
https://addons.mozilla.org/en-US/firefox/downloads/latest/722/addon-722-latest.xpi?src=noscript.ownsite

6. Anonymous Email
To protect against email virus or spam messages or a trojan horse e.t.k that want to steal your private information  you can see your emails with no fear with HideMyAss Anonymous email.

Create an account at:
http://hidemyass.com/anonymous-email/

7. Disk Wipe
Disk Wipe is free utility for Windows operating system. It helps users secure permanent removal of data from their hard drives or other memory storage devices like USB memory sticks, SD memory cards or any other device who's memory can serve as a storage (some mp3 players, many cameras etc.) As long as the memory device is accessible and formatted with either NTFS, Fat, or Fat32 Disk Wipe can clean all the information's from it without possible data retrieval.

Download Disk Wipe
http://www.diskwipe.org/download/DiskWipe.exe

8. Firewall
Firewalls have helped protect computers in large companies for years. Now, they're a critical component of home networks, as well. It is the best network filter and also controls all your system actions by it self and sometimes warn you. It also works as an anti-virus against malware and other types.

Comodo Firewall for Windows
http://download.comodo.com/cis/download/installs/1000/standalone/cfw_installer.exe

gufw Firewall for Ubuntu
http://gufw.tuxfamily.org/

9. Tor project
On internet every machine will have an ip address. It works as a primary identifier online. It’s very important to hide/fake it to remain anonymous. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Individuals, journalists, whistle blowers from all over the world use Tor. You should use it too.Tor prevents anyone from knowing your location or browsing. Tor can be used with browsers, instant messaging clients, remote logins, and more. Tor is free and open source for Windows, Mac, Linux/Unix, and Android phones. You should use it.Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Very useful when you are traveling and want to remain anonymous.Tor makes your traffic channelized anonymously but it doesn’t promise data security between you and the end server. You must always use HTTPS, encrypt your mails. Active content, such as Java, Javascript, Adobe Flash, Adobe Shockwave, QuickTime, RealAudio, ActiveX controls, and VBScript, are binary applications. These binary applications run as your user account with your permissions in your operating system. They might bypass Tor. I would avoid using them when I want to remain anonymous.


Download Tor
https://www.torproject.org/download/download-easy.html.en

11. Online Proxy Sites
Online proxy site is a site that provides you a proxy server just by entering an url on it in order to surf anonymously.

Here is some online proxy site:
http://www.anon.me/
http://hidemyass.com/proxy/
https://aniscartujo.com/webproxy/
http://www.free-web-proxy.de/
http://bind2.com/



10. Safe Online payment (BitCoin)

Bitcoin is an experimental new digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: managing transactions and issuing money are carried out collectively by the network. Bitcoin is also the name of the open source software which enables the use of this currency.

Downloads

•  Windows (zip) ~12MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2-win32.zip/download
•  Windows (exe) ~9MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2-win32-setup.exe/download
•  Ubuntu PPA
https://launchpad.net/~bitcoin/+archive/bitcoin
•  Linux (tgz, 32/64-bit) ~11MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2-linux.tar.gz/download
•  Mac OS X ~12MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2.2-macosx.dmg/download

SSH

Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist.
SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled.
When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords.
SSH is available for Windows, Unix, Macintosh, and OS/2, and it also works with RSA authentication.

PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator. It is written and maintained primarily by Simon Tatham.

Download PuTTY
http://the.earth.li/~sgtatham/putty/latest/x86/putty-0.62-installer.exe

To configure a PuTTY tunnel go to
http://www.devdaily.com/unix/edu/putty-ssh-tunnel-firefox-socks-proxy/2-configure-putty-ssh-tunnel-ssh-server.shtml

Encrypt your data
Everyone has some private data that they don’t want other to see. It may be a document consisting of all your login passwords, your bank account information that you want to keep out of  your family or some stalker’s sight. In case you are wondering how to encrypt the files/folders/entire hard drive and keep it safe from prying eyes, here is an easy method.

TrueCrypt is a free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux. It creates a virtual encrypted disk within a file and mounts it as a real disk. You can use it to:

•Create a virtual disk within a file and mount it as an actual drive letter.
•Encrypt an entire hard disk partition or a storage device such as USB flash drive.
•Provide encryption that is real time and transparent.

The procedure will be the same for Linux and Mac OSX.
There are two main ways to create an encrypted disk.
You can encrypt an entire disk, or you can create a virtual disk within a file.
The first method has its risks, since converting a drive will erase everything that is on it. The second method is great for experimenting – you simply create a file somewhere on your hard drive and map it.

Download the latest version from here:
http://www.truecrypt.org/downloads.php

Online Virus Check
Check your files for viruses online in VirusTotal. VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.

Check your files here
https://www.virustotal.com/

Pages: [1]