1

How to setup DarkComet RAT for Easy Access to a Target Computer

How to setup DarkComet RAT for Easy Access to a Target Computer
Stap 01 :- Download the Dark Comet RAT from here
Step 02 :- Open the DarkComet RAR (You need WinRAR) It should look like this:
Step 03 :- Make a folder on your desktop. Name it anything you want.
Step 04 :- Drag the items from the WinRAR folder to the Tutorial folder at your Desktop. Now, everything should be there like this:
Step 05 :- Open DarkComet.exe (Run as Administrator)
Step 06 :- A TOS should show up.
Tick the box saying ‘Do not display again the EULA‘ that is located at the bottom left. And then click ‘I accept‘
Step 07 :- At the bottom left, it will show up a Help Screen, tick ‘Do not show at startup‘ then click ‘Fine‘
Step 08 :- Click DarkComet-RAT at the top left.
Step 09 :- Click ‘Listen to new port (+Listen)
A new window should open, put in your Port then tick ‘Try to forward automaticaly (UPNP)
IN this case, I will do port 70 so I put that in, tick ‘Try to forward automatically (UpNP) and click Listen.
Step 10 :- Move over to ‘Socket / Net‘ located at the very end of the top left border
You should see something like this:
70 may not be your port, your port that you added in ‘Listen to new port‘ will be displayed, not specifically 70.
Step 11 :- Now, click DarkComet-RAT again and click Server Module, then click Full Editor (Expert)
Step 12 :- Name your Security Password anything you like, then click the Mutex a few times. We then have the Main Settings done.
Step 13 :- Go to Network Settings.
Now, go to no-ip.com and register Click Free DNS
Step 14 :- Put in whatever you want for it. Make sure the email is valid because we will need it to validate. (if you don’t want to give your email, get a temp email at 10minutemail.com)
Sign in Now
Step 15 :- Now, at the Body you will see a list of options, click ‘Add Host’
Step 16 :- Copy the settings
Leave IP Address, as that will show as Default your IP address.
Step 17 :- Click Create Host.
Step 18 :- Go back to your DarkComet and put in the Ip/DNS and Port (DNS for the NO-IP you made a second ago and Port for the one you listened on!)
Step 19 :- Then click ‘Add‘ and go to Module Startup.
Tick the ‘Start the stub with windows (module startup)’
Then leave everything but ‘Persistance installation ( always come back )‘
Tick that.
Now, it should look like this:
Step 20 :- Now go to ‘Stub Finalization‘ at the end.
If you are going to get it crypted then don’t tick UPX (Ultimate Packer Executable) but if you are, I would leave it off and just have it on No compression.
Step 21 :- Now tick the ‘Save the profile when stub succesfully generated’ and Build the Stub. Now there is one last thing.
Step 22 :- Go to the Client Settings in DarkComet-RAT and then Click NO-IP Updater

Step 23 :- Then put in the NO-IP host, Username and Password, then tick ‘Auto update your no-ip dns when your IP change
Step 24 :- Now, run the stub that you generated in a Sandbox to test, and you should show up!


Here now, we have run through the entire thorough setup for DarkComet. Even your kid brother could follow this tutorial. Now what you need to do is some research into how to encrypt the EXE, so it can be installed remotely without an antivirus putting up a fuss. I know Metasploit has some pretty good encryption in it’s framework. I would start there. Watch out for others telling you they will encrypt it for you. This is usually a trick to just pack their own RAT into your stuff!

Read More

Four Best WiFi Cracking Applications For your Iphone

Four Best WiFi Cracking Applications For your Iphone
1. Aircrack-ng for IPhone:
It is the simple command line with graphical interface software which is used to crack wifi networks . It sends packets to the wifi network and then cracks the password file of the network .It is used widely and can be downloaded from here.

2. IWep Lite:
It is an Iphone applications which let you crack wifi network in less than 30 minutes . It is easy in use and can be understood easily rather than Aircrack-ng . It is Graphical interface with best utility and dictionary . Apart from Aircrac-ng it uses dictionary and so it is less trustworthy than Aircrack and can not crack every key. It is used more widely than Aircrack but it uses dictionary that's why it is on 2nd number. It can be downloaded from here .

3. WepGen:
WepGen is just another application which cracks the Wifi network by sending packets and it is rather easy in use than Aircrack but though it is on 3rd number due to it's popularity. It can be downloaded from here.

4. IWifi Hack:
It works on the same scene as other cracking softwares except iweplite means it sends packets and break in the security of a wifi network . It is easy in use and can easily be used by anyone. It can be download from here.


Read More

DarkComet RAT Full version

DarkComet RAT Full version
DarkComet RAT is a free and popular Remote Administration Tool. This software is an efficient type of software, especially created to remote control any Microsoft Windows machine. It is famous for being one of if not the most stable and most complete RAT's available. Just like VNC and other similar types of software, DarkComet gives you the ability to connect to and control your systems, wherever you are. You can keep a close eye on your computers to supervise the online activity of your employees or children. Furthermore DatkComer RAT can be used to monitor your system, remotely assist your clients or family members to recover lost data or repair a computer.
Read More

Hacking ebooks all in one free download

Hacking ebooks all in one free download

Hacking e-books 34in 1


BlueTooth Hacking
Ethical Hacking
Google Hacks
Hack & Crack
Hack Attacks Revealed
Hack Attacks Testing – How To Conduct Your Own Security Audit
Hack IT Security Through Penetration Testing
Hack Proofing Your Network – Internet Tradecraft
Hack Proofing Your Network Second Edition
Hack Proofing Your Web Server
Hack The Net
Hack Xbox 360

Hackers Black Book
Hacking Firewalls And Networks How To Hack Into Remote Computers
Hacking a Coke Machine
Hacking and Network Defense
Hacking for Dummies
Hacking Intranet Websites
Hacking Techniques
Hacking The Cable Modem
Hacking The Linux
Hacking Web Applications
Hacking Windows XP
Hacking PSP
Kevin Mitnick – The Art of Deception
Kevin Mitnick – The Art of Intrusion
Network Security Hacks – Tips & Tools For Protecting Your Privacy
PayPal Hacks
PC Hacks
Simple Hacks – Addons, Macros And More
The Database Hacker Handbook Defending Database Servers
Wireless Hacking
Wireless Network Hacks & Mods for Dummies

Download Here

Read More

Best E-Books on Hacking- FREE Download

Best E-Books on Hacking- FREE Download
I am sharing here some of the best E-Books on different topics like hacking, virus and malware, cryptography, forensics, cyber security etc, that I have found on the Web. Some of these E-Books are available on internet for free. But I thought I would put them together here. I am sharing them here for ABSOLUTELY FREE, just download them from the MediaFire.

1. GREY HAT PYTHON- PYTHON PROGRAMMING FOR HACKERS AND REVERSE ENGINEERS

I have heard python is a good language for beginners in programming and also for hackers to make scripts. So here is a nice book on python for hackers and rev engineers. 


2. Metasploit- The Penetration TesterÅ› Guide


3. BackTrack 5 Wireless Penetration Testing


4. Web Applications Hackers Handbook 2nd Edition


5. Unauthorized Access- Physical Penetration Testing for IT Security Teams


6. ShellcoderÅ› Handbook


7. Greyhat Hacking- The Ethical HackerÅ› Handbook


8. Blackbook of Computer Viruses (Electronic Edition)


9. Botnets- The Killer Web Applications


10. Hacking Exposed- Web Applications

I hope you will Learn something from it :) Stay tuned for more :)
Read More

How to send Anonymous Mail to anyone

How to send Anonymous Mail to anyone
Disclaimer:-  The below tutorial is completely for Educational purpose only, Do not use it illegal activities. I'll be not responsible for any Illegal activity performed by any reader.

Everyone Like to send Anonymous Mail to your enemy or friend or teacher.  Here is the Hacking tutorial for you to implement that.  So i hope This will be best hack for you.

For Eg:
You can say we are from Facbook, we have new feature to enable the feature visit this page.

How to do? 

Step 1:- First of all you need to register in free web hosting service which has PHP feature.  So my choice is
000webhost

Step 2:- Now Download and extract this File. Inside the file you can find the mail.php file.

Step 3:- Now Go to 000webhost.com and login with your username and password. Upload the "mail.php" file to "public_html" folder.

Step 4:- That's all you finished. Now go to this page yourhosturl/mail.php Change the yourhosturl with your website url which you gave it when you register in 000webhost.com

For eg:- yourfavorites.comli.com/mail.php Usually the default will be "name.comli.com"

When you visit you will see the form just like this:
Fill the form with your victim mail address and message subject and send.
     Don't give your details in the sender field. Just fill with any organization name.
For Eg:- Facebook Security

         If you have any doubts or want to say thanks,please comment me
Read More

Hack Websites Using Havij [SQL Injection Tutorial]

Hack Websites Using Havij [SQL Injection Tutorial]
Disclaimer:-  The Below tutorial is completely for Educational purpose only, Do not use it to hack any third party website. I'll be not responsible for any SQL Injection attack performed by any reader.

Havij:-
One of the popular tools is Havij, Havij is an advanced SQL injection tool which makes SQL Injection very easy for you, Along with SQL injection it has a built in admin page finder which makes it very effective. If you don't have the Havij then Download it from our Tools Room

Supported Databases With Havij:-
  • MsSQL 2000/2005 with error.
  • MsSQL 2000/2005 no error union based
  • MySQL union based
  • MySQL Blind
  • MySQL error based
  • MySQL time based
  • Oracle union based
  • MsAccess union based
  • Sybase (ASE)
Tutorial:-
Now I will Show you step by step the process of SQL injection.
Read Also:- How To Find the SQL Vulnerability Site
Find SQL injection Vulnerability in your site and insert the string (like http://www.target.com/index.asp?id=123) of it in Havij as show below.
Now click on the Analyse button as shown below.
Now if the your Server is Vulnerable the information about the target will appear and the columns will appear like shown in picture below:
Now click on the Tables button and then click Get Tables button from below column as shown below:
Now select the Tables with sensitive information and click Get Columns button.After that select the Username and Password Column to get the Username and Password and click on the Get Table button.
After Getting Columns and all.. Finally Click on 'Get Data' and you will get all login ID and Mdp_user as Shown in the Image :-
Now, it's time to Enter into Website using this Two Admin login ID and Password. To get the Admin page Click on 'Find Admin' and click on start to Analyze the admin page :-
Got up :D, Now go to that URL of admin and Login with ID and password you got from Database :D We Hacked into website that's it Done. You  got Admin Seat and Enjoy,Play  with Website :D
Read More