Monday, July 29, 2013

Top Hacking Cracking Pentesting Tools of 2013

HI I AM MAIJIED ..I GIVE YOU THIS TIPS FOR YOUR HELP..READ IT IF YOUS BLOOD GROUP IS HACKER +(POSITIV)
Here represent Top 15 Hacking or cracking tools for you all hackerspositive fanz. They is bests of 2013 hacking tools.

1. PWN STAR

A bash script to launch the AP, can be configured with a variety of attack options. Including a php script and server index.html, for phishing. Can act as a multi-client captive portal using php and iptables. Exploitation classics such as crime-PDF, De-auth with aireplay, etc..



General Features:



  • Managing Interfaces and MAC Spoofing
  • Set sniffing
  • Phishing Web
  • Karmetasploit
  • WPA handshake
  • De-auth client
  • Managing Iptables



2. ZED ATTACK PROXY (ZAP)

(ZAP) is an integrated penetration testing tool for finding vulnerabilities in web applications. This tool is designed for use by people with a variety of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to the toolbox tester.


Key Features:



  • Intercepting Proxy
  • Active scanners
  • Passive scanners
  • Brute Force scanner
  • Spider
  • Fuzzer
  • Port Scanner
  • Dynamic SSL certificates
  • API
  • Beanshell integration

                                                    ZAP Download Here:


3. SET (SOCIAL ENGINEERING TOOLKIT)

Tools that focus on attacking the human element of weakness and inadvertence. This tool is widely used today and is one of the most successful tools demonstrated at Defcon.



Key Features:


  • Spear-Phishing Attack Vector
  • Java Applet Attack Vector
  • Metasploit Browser Exploit Method
  • Credential Harvester Attack Method
  • Tabnabbing Attack Method
  • Man Left in the Middle Attack Method
  • Web Jacking Attack Method
  • Multi-Attack Web Vector
  • Infectious Media Generator
  • Teensy USB HID Attack Vector


4. BURP SUITE


Burp Suite is a very nice tool for web application security testing. This tool is great for pentester and security researchers. It contains a variety of tools with many interfaces between them designed to facilitate and accelerate the process of web application attacks.



General Function:


  • Interception proxies
  • Radar and spiders crawling
  • Webapps scanner
  • Tool assault
  • Repeater and sequencer tools


5. ETTERCAP


Ettercap is a multipurpose sniffer / interceptor / logger for Local Area Network . It supports active and passive dissection of many protocols (even in code) and includes many feature for network and host analysis.




General Function:


  • To capture traffic and data
  • To do logging network
  • Etc.



6. SANS INVESTIGATIVE FORENSIC TOOLKIT (SIFT)


The SANS Investigative Forensic Toolkit (SIFT) Workstation is a VMware Appliance that can be configured with all the requirements to perform a detailed digital forensic. Compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats. The new version has been completely rebuilt on the Ubuntu base with many additional tools and capabilities that are used in modern forensic technology.


General Function SIFT:


  • iPhone, Blackberry, and Android Forensic Capabilities
  • Registry Viewer (YARU)
  • Compatibility with F-Response Tactical, Standard, and Enterprise
  • PTK 2.0 (Special Release - Not Available for Download)
  • Automated Generation Timeline via log2timeline
  • Many Firefox Investigative Tools
  • Windows Journal Parser and Shellbags Parser (jp and sbag)
  • Many Windows Analysis Utilities (prefetch, usbstor, event logs, and more)
  • Complete Overhaul of Regripper Plugins (added over 80 additional plugins)


7. WIRESHARK

Wireshark is the most widely used and most popular in the world the protocol analyzer, and is the de facto standard across many industries and educational institutions to analyze the network in different protocol.



General Function:

  • Live capture and offline analysis
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  • Captured data network can be browsed via a GUI, or via the TTY-mode tshark utility
  • The most powerful display filters in the industry
  • Rich VoIP analysis
  • Read / write many different capture file formats
  • Etc.

8. WEBSPLOIT

WebSploit is an Open Source Project for Remote Scan and Analysis System of the weaknesses in web applications.



Key Features: 

[>] Social Engineering Works
[>] Scan, Web Crawler & Analysis
[>] Automatic Exploiter
[>] Support Network Attacks
-
[+] Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+] WMAP - Scan, Target Used Crawler From Metasploit WMAP plugin
[+] format infector - inject the payload into reverse and bind file format
[+] phpmyadmin Scanner
[+] LFI Bypasser
[+] Apache Users Scanner
[+] Dir Bruter
[+] admin finder
[ +] MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+] MITM - Man In The Middle Attack
[+] Java Applet Attack
[+] MFOD Attack Vector
[+] USB Infection Attack
[+] Dos ARP Attack
[+ ]'s Killer Attack
[+] Attack Fake Update
[+] Fake Access Point Attack


9. WINAUTOPWN


WinAutoPWN is a tool that is used to exploit the Windows Framework directly, so that we are automatically going to be an administrator on the windows. Widely used by "Defacer" Indonesia to deface the Windows Server




10. HASHCAT

Hashcat are a variety of tools to crack passwords in encrypted, it is very powerful for password recovery.


General Function:


  • Multi-Threaded
  • Free
  • Multi-Hash (up to 24 million hashes)
  • Multi-OS (Linux, Windows and OSX native binaries)
  • Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, ...)
  • SSE2 accelerated
  • All Attack-Modes except Brute-Force and Permutation can be extended by rules
  • Very fast Rule-engine
  • Rules compatible with JTR and PasswordsPro
  • Possible to resume or limit session
  • Automatically recognizes recovered hashes from outfile at startup
  • Can automatically generate random rules
  • Load saltlist from an external file and then use them in a Brute-Force Attack variant
  • Able to work in an distributed environment
  • Specify multiple wordlists or multiple directories of wordlists
  • Number of threads can be configured
  • Lowest priority threads run on
  • 30 + Algorithms is implemented with performance in mind
  • ... and much more




11. UNISCAN

Uniscan is a scanner for web applications, written in perl for Linux. Currently Uniscan version is 6.2.



General Function:

  • Identification of system pages through a Web Crawler.
  • Use of threads in the crawler.
  • Control the maximum number of requests the crawler.
  • Control of variation of system pages identified by Web Crawler.
  • Control of file extensions that are ignored.
  • Test of pages found via the GET method.
  • Test the forms found via the POST method.
  • Support for SSL requests ( HTTPS ).
  • Proxy support.
  • Generate site list using Google.
  • Generate site list using Bing.
  • Plug-in support for Crawler.
  • Plug-in support for dynamic tests.
  • Plug-in support for static tests.
  • Plug-in support for stress tests.
  • Multi-language support.
  • Web client.




12. OLYYDBG

OllyDbg is a 32-bit assembler debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where source code is not available.



General Function:


  • Intuitive user interface, no cryptical commands
  • Code analysis - traces registers, recognizes procedures, loops, API calls, switches, tables, constants and strings
  • Directly loads and debugs DLLs
  • Object file scanning - locates routines from object files and libraries
  • Allows for user-defined labels, comments and function descriptions
  • Understands debugging information in Borland ® format
  • Saves patches between sessions, writes them back to executable file and updates fixups
  • Open architecture - many third-party plugins are available
  • No installation - no trash in registry or system directories
  • Debugs multithreaded applications
  • Attaches to running programs
  • Configurable disassembler, supports both MASM and IDEAL formats
  • MMX, 3DNow! and SSE instructions and the data types, Including Athlon extensions
  • Full UNICODE support
  • Dynamically recognizes ASCII and UNICODE strings - also in Delphi format!
  • Recognizes complex code constructs, like call to jump to procedure
  • Decodes calls to more than 1900 standard API and 400 C functions
  • Gives context-sensitive help on API functions from external help file
  • Sets conditional, logging, memory and hardware breakpoints
  • Traces program execution, logs arguments of known functions
  • Shows fixups
  • Dynamically traces stack frames
  • Searches for imprecise commands and masked binary sequences
  • Searches whole allocated memory
  • Finds references to constant or address range
  • Examines and modifies memory , sets breakpoints and Pauses program on-the-fly
  • Assembles commands into the shortest binary form
  • Starts from the floppy disk
13. BBQSQL

BBQSQL an Opensource SQL injection tools with the framework specifically designed to carry out the process in hyper fast, database agnostic, easy to setup, and easy to modify. This is another amazing release from Arsenal Blackhat USA 2012. When conducting security assessments of applications, we often find that it is difficult to SQL vulnerabilities exploitable, with this tool will be extremely easy.

BBQSQL written in the Python programming language. This is very useful when complex SQL injection attack vulnerabilities. BBQSQL also a semi-automated tool, which allows little customization for those who are finding it difficult to trigger a SQL injection. The tool is built to be database agnostic and very versatile. It also has an intuitive UI for setting up the attack much easier.



General Function:

  • SQL Injection Tools
  • URL
  • HTTP Method
  • Headers
  • Cookies
  • Encoding methods
  • Redirect behavior
  • Files
  • HTTP Auth
  • Proxies

14. CRYPTOHAZE

Tools to crack password / hash where cryptohaze supports CUDA, OpenCL , and the CPU code (SSE, AVX, etc.). Can run on OS that support CUDA. These are intended to make it easier to pentester did crack the hash.



General Function:


  • Crack various kinds of hash
  • Showing results from crackhash
  • Cracking on various OS platforms

                                          


15. SAMURAI WEB TESTING FRAMEWORK (SWTF)
SWTF is used to do testing / pentest against web application, is used to find a weakness and exploited to perform web. Very comprehensive and widely used in the world, including one used by staff binushacker



General Function:



  • Web Scanner
  • Web Mapping
  • Web Exploitation


Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.
      Knowledge is great, Sharing is good.

  
           POWERED BY
      NAME:MAIJIED HASAN SHUVO
     EMAIL:MAIJIEDHASANSHUVO@YAHOO.COM
     BLOG:HELP2TRICKS.BLOGSPOT.COM
    FACEBOOK:SEARCH ME [MAIJIED HASAN SHUVO] ;ONLY ONE PEACE.........
     MOBILE:+8801964415378


         IF YOU NEED ANY HELP PLEASE CONTACT WITH ME
           IN FACEBOOK......................
              [ANY KIND OF PROBLEM]

 

How to Get A Free Domain: Free .Com Domain Name Easily

ARE YOU PLANING TO HAVE YOUR OWN DOMAIN NAME?  You are at right place :-D

I know its too hard to get your own .Me, .De, .Co.uk, .Co, .Com etc domain names.

Therefore i started googling it for a long time and at last somewhere i manage to get what i really want and comes with these results::     
I am sharing here it for free +CleverBot


[ Note: All Domains Names Are Working Fine and Tested By Me On Feb-20-2013]
.................................................................................................................................................................


Get Free Domain (.Me)

1.) Download this Thunderbird
2.) Once installed, when you create your email address, it will offer you a personalized email address based on your first and last name, which you would have previously entered.
3.) Visit this Page
4.) Enjoy your free .me domains ..

(Note: only one .ME per person will be offered. In the case of an abuse of this offer, all of the domains will be deleted and the account will be blocked)
.................................................................................................................................................................


Get Free Domain (.De)

1.) Use a Germany, Austria or Switzerland VPN (A MUST).
2.) Go Flatbooster
3.) Search for an available .DE domain.
4.) Generate a fake Germany, Austria or Switzerland name, address, etc Fake Name Generator
5.) Enjoy your FREE .DE Domain! 
.................................................................................................................................................................


Get Free Domain (.Co.uk)

1.) Visit Gybo and click create ur website link .
2.) Register to the website.
3.) Change the nameserver as you wish.
4.) Enjoy your FREE .co.uk Domain! ...
.................................................................................................................................................................


Get Free Domain (.Ca)

1.) Go Here and click Free Website Offer...
2.) Register to the website
3.) Change the nameserver as you wish.
4.) Enjoy your FREE .ca Domain! ...
.................................................................................................................................................................


Get Free Domain (.At)

1.) Use a Germany, Austria or Switzerland VPN (A MUST).
2.) Go Flatbooster 
3.) Search for an available .AT domain.
4.) Generate a fake Germany, Austria or Switzerland name, address, etc Fake Name Generator (A MUST)
5.) Enjoy your FREE .AT Domain!
.................................................................................................................................................................


Get Free Domain (.Com) + Get Free Domain (.Co) in Just One File

In Order to have your own .Co or .Com domain name please Download By Here


Knowledge is great, Sharing is good.
  
           POWERED BY
      NAME:MAIJIED HASAN SHUVO
     EMAIL:MAIJIEDHASANSHUVO@YAHOO.COM
     BLOG:HELP2TRICKS.BLOGSPOT.COM
    FACEBOOK:SEARCH ME [MAIJIED HASAN SHUVO] ;ONLY ONE PEACE.........
     MOBILE:+8801964415378


         IF YOU NEED ANY HELP PLEASE CONTACT WITH ME
           IN FACEBOOK......................
              [ANY KIND OF PROBLEM]
 

Download Hacking Ebooks Collection FREE


Ankit Fadia (born 1985) is an Indian independent computer security consultant and author. Fadia describes himself as an ethical hacker, and has written several books on the topic of computer security.(line copy pasted from wikipedia.org).
He stared web-site at age of 14, hackingtruths.box.sk. and also at age of 15, ankit fadia written book on ethical hacking made him youngest author to be published by macmillan, india.

Today we are providing you this collection which contains a number of hacking tutorial by Ankit Fadia. So read and learn hacking. enjoy .! 

Contains :

1.Ankit Fadia Hacking Guide E-Book
2.Batch File Programming E-Book
3.Defacing Web Site Step by Step Method E-Book
4.Untold Windows Tips and Secret E-Book
5.DoS Attack E-Book
6.Encryption Algorithm Explained E-Book
7.FTP Exploits E-Book
8.Tracing IP, DNS, WHOIS-ns Lookup E-Book
9.transparent Proxies E-Book
10.Truths! What They Don’t Teach in Manuals E-Book
11.Base64 Encoding E-Book
12.Closing Open Holes E-Book
13.Firewalls E-Book
14.Gathering Info on Remote Host E-Book
15Hacking Into Linux E-Book
16.More Password Cracking Decryption E-Book
17.Removing Banners from Ur Site E-Book
18.SendMail and Beyond E-Book
19.SSL Ton Apart E-Book

‘If you are a good hacker, everyone knows your name; but if you are great hacker, no one knows who you are’
Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.
     #Knowledge is great, Sharing is good.
  
           POWERED BY
      NAME:MAIJIED HASAN SHUVO
     EMAIL:MAIJIEDHASANSHUVO@YAHOO.COM
     BLOG:HELP2TRICKS.BLOGSPOT.COM
    FACEBOOK:SEARCH ME [MAIJIED HASAN SHUVO] ;ONLY ONE PEACE.........
     MOBILE:+8801964415378


         IF YOU NEED ANY HELP PLEASE CONTACT WITH ME
           IN FACEBOOK......................
              [ANY KIND OF PROBLEM]

 

How to trace Location of Mobile Phone

HI THIS IS MAIJIED AND ALL TIPS FOR #HELP........


There are many instances when we want to know where our friends are, where our parents are, and for those who've got a pair, where is my girl-friend or boyfriend. ! Well there are many apps in the market which allow you to get exactly the pin-pointed location of  any cellphone. But the problem is they cost too high. Well today I'm gonna show you a process by which you can trace the exact mobile location of any cell phone without the need to spend a single penny. What you need is listed below, and i'm sure most of us already have what is needed.

REQUIREMENTS:
Any cell phone that supports Google maps. eg. iPhone , Nokia , Blackberry , Symbian etc.
Google Latitude. Which you can download by going to google.com/latitude from your cell phone.
STEPS:-
Go to www.google.com/latitude from your cell phone.
Download the free app.
Open the App.
Enter You mobile number in the entry Field.
Now You've set it up on your phone. Now you gotta set it up on your friends cell phone. 
HOW TO SET IT UP ON YOUR FRIENDS CELL PHONE:
You can add friends by their E-mail Addresses. Your friends will receive an E-mail with the downloadlink of Google latitude. 
Or you can manually add yourself or ask your friend to add google latitude on his/her cell phone. 
Now you and your friend can add each other as friends on google latitude and you'll get the exactlocation of where your friends cell phone is.
There is exactly no limit to how many friends you can add in your latitude circle. ( just make sure you dont add your parents :) 
Well so As soon as You and your buddy confirm each other as friends you get to see each otherslocation.
HOW TO USE IT EVEN WHEN YOU DON'T HAVE YOUR CELL PHONE WITH YOU:
Well the most eye catching feature of google latitude is that you can use it online even without a cell phone.
Just go to google.com/latitude from you PC, Follow the instructions, log-in into your account. And track You friends Locations !!

Enjoy (-_-)
      Knowledge is great, Sharing is good.
  
           POWERED BY
      NAME:MAIJIED HASAN SHUVO
     EMAIL:MAIJIEDHASANSHUVO@YAHOO.COM
     BLOG:HELP2TRICKS.BLOGSPOT.COM
    FACEBOOK:SEARCH ME [MAIJIED HASAN SHUVO] ;ONLY ONE PEACE.........
     MOBILE:+8801964415378


         IF YOU NEED ANY HELP PLEASE CONTACT WITH ME
           IN FACEBOOK......................
              [ANY KIND OF PROBLEM]

 

FREE GP NET USE IN MOZILLA FIREFOX.

HI THIS IS MAIJIED HASAN SHUVO AND THIS ONLY FOR YOU.


mozilla firefox use kore free internet. step1- close your gp account balance. recharge tk 10. write "p1" and send it to 5000. step2-port+proxy settings. at first open mozilla> click on tools> click on options> click on advanced> click on network> click on settings icon. Now select manual proxy connection. give 010.128.001.022 or 66.90.79.172 on proxy box and give 9201 or 80 on port box. --> now connect your modem and enjoy free net browsing and downloading 66.90.79.172 Web Proxy for Facebook and YouTube. 

      Knowledge is great, Sharing is good.
  
           POWERED BY
      NAME:MAIJIED HASAN SHUVO
     EMAIL:MAIJIEDHASANSHUVO@YAHOO.COM
     BLOG:HELP2TRICKS.BLOGSPOT.COM
    FACEBOOK:SEARCH ME [MAIJIED HASAN SHUVO] ;ONLY ONE PEACE.........
     MOBILE:+8801964415378


         IF YOU NEED ANY HELP PLEASE CONTACT WITH ME
           IN FACEBOOK......................
              [ANY KIND OF PROBLEM]

 

 
Flying Twitter Bird Widget By Trickstoo.com