USPY Dalam Dunia Hacker
Of Keylogger or keystroke logger: Keylogger is a computer program which captures all the key strokes pressed by user in real time. It captures all the keys and write them to some file say log.txt and stores it on computer hard disk. Now sending these logs to emails or FTP address depends upon the type of keylogger that is keylogger is remote keylogger or physical keylogger. Physical keyloggers are useful when you have physical access to that system and can retrieve logs personally. While remote keyloggers can be used from anywhere in the world, the only requirement is that victim must have internet connection.
Today we will be writing a which requires physical access of the system. We will be extending our logic in further programs to make it remote keylogger which sends logs to FTP’s and Emails directly.
So first of all lets see how simple keylogger program works. Hey friends, yesterday we learnt about and.
Today we are going to learn how to break into BSNL ADSL routers. Hacking BSNL broadband routers is quite interesting, so Hackingloops has came up with tutorial on Hacking BSNL broadband routers Tutorial on how to hack BSNL broadband routers. Hacking BSNL Routers Note: This hack works on most of newly ADSL, ADSL2+, ADSL2+M routers. In this article we are going to hack into router to learn more about it. You might not know that this small and innocent looking modem is actually a 'Linux CPU'. Lets get into it. First do a nmap scan of this modem.

Here is a quick example: $ nmap 192.168.1.1 Starting Nmap 5.21 ( ) at 2012-08-31 19:52 IST Nmap scan report for 192.168.1. 1 Host is up (0.052s latency). Not shown: 997 closed ports PORT STATE SERVICE 23/tcp open telnet 80/tcp open http 5431/tcp open park-agent Nmap done: 1 IP address (1 host up) scanned in 0.75 seconds The http port is open and that is why we are able to access the administration page from But apart from http the telnet port is also open. So why not try connecting to it.
$ telnet 192.168.1.1 Trying 192.168.1.1. Connected to 192.168.1.1. Escape character is '^'. SemIndia Systems ADSL Router Login: admin Password: Wow!
We are able to login into the telnet daemon of our router using the default username/password of admin/admin. Type in the help command and hit enter. It will list the supported commands somewhat like this help? Help logout reboot adsl atm brctl cat df dumpcfg echo ifconfig kill arp defaultgateway dhcpserver dns lan passwd ppp remoteaccess restoredefault route save swversion wan serialnum lan6 dhcp6c dns6 defaultgateway6 route6 ping ps pwd sntp sysinfo tftp Some of these are the common terminal commands on linux.
Ps, pwd, ping, cat etc. So lets see the current working directory using pwd. pwd / Listing directories So we are in the root directory of the filesystem. The ls command is not available. So we have to use another trick to list the directories. And the trick is echo.
echo. bin dev etc images lib linuxrc mnt proc sbin usr var webs Cool!
Now those directories are found on any linux system like Ubuntu, Fedora etc. /etc/passwd file You might next want to see the password file /etc/passwd. The cat command is available and can be used for this.
Uspy Dalam Dunia Hacker 2
cat /etc/passwd admin:7wfiFif6nh6VA:0:0:Administrator:/:/bin/sh support:MVMCoQ0jGR4Yo:0:0:Technical Support:/:/bin/sh user:MrYImHrIkIxRI:0:0:Normal User:/:/bin/sh nobody:685CCPc3VWsbs:0:0:nobody for ftp:/:/bin/sh Thats a linux password file. Linux version The uname command is not available so to get the linux kernel version and other details use the following command cat /proc/version Linux version 2.6.8.1 (root@localhost.localdomain) (gcc version 3.4.2) #1 Wed Dec 16 08:35:56 IST 2009 So that shows the linux kernel version and some extra details. Better shell The above shell can be improved by running the sh command. sh BusyBox v1.00 (2009.12.16-) Built-in shell (msh) Enter 'help' for a list of built-in commands. # So now we get a BusyBox shell. Once again we can type the help command to see what all is available. # help Built-in commands: -.: break cd continue eval exec exit export help login newgrp read readonly set shift times trap umask wait busybox cat chmod cp date dmesg echo expr false ftpget ifconfig init insmod kill killall klogd linuxrc ln logger logread mkdir mount msh ping ps pwd reboot rm rmmod route sendarp sh sleep sysinfo syslogd test tftp tftpd true tty umount vconfig # This time we have a few additional commands available, like cd, mkdir, date, eval, exec etc and even mount.
A list of all possible commands that Busybox can have is available. CPU/RAM Information The details about CPU and architecture can be found out using the following command # cat /proc/cpuinfo system type: 96338L-2M-8M processor: 0 cpu model: BCM6338 V1.0 BogoMIPS: 239.20 wait instruction: no microsecond timers: yes tlbentries: 32 extra interrupt vector: yes hardware watchpoint: no unaligned access: 1289794 VCED exceptions: not available VCEI exceptions: not available # Its an MIPS based 32bit processor. You can compile C programs for this platform using an mips compiler. Check for more information. RAM information # cat /proc/meminfo MemTotal: 5688 kB MemFree: 424 kB Buffers: 128 kB Cached: 1004 kB SwapCached: 0 kB Active: 2016 kB Inactive: 356 kB HighTotal: 0 kB HighFree: 0 kB LowTotal: 5688 kB LowFree: 424 kB SwapTotal: 0 kB SwapFree: 0 kB Dirty: 0 kB Writeback: 0 kB Mapped: 1764 kB Slab: 2284 kB CommittedAS: 5172 kB PageTables: 300 kB VmallocTotal: 1048560 kB VmallocUsed: 120 kB VmallocChunk: 1048400 kB # So the device seems to have around 6MB of inbuilt memory. There are many other files in the /proc directory that can be viewed to gather more information about the system.
# cd proc # echo. 1 10 123 17 191 2 274 275 276 290 3 378 395 4 43 49 5 548 549 6 611 612 7 8 9 accumem buddyinfo bus cmdline cpuinfo devices diskstats driver execdomains filesystems freepagewalk fs interrupts iomem ioports irq kcore kmsg loadavg locks meminfo misc modules mounts mtd net nvram pagewalk partitions self slabinfo stat sys sysvipc tty uptime var version vmstat # Try viewing other files and see what comes up. Get Current username The whoami command is not available to the echo command has to be used to find the current username, home directory etc. # echo $USER root # echo $HOME / # echo $PATH /bin:/sbin:/usr/bin # Writing files The var directory is writable.
And files have to be created using the echo command. # echo 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' /var/happy.txt # cat /var/happy.txt ABCDEFGHIJKLMNOPQRSTUVWXYZ # Remote files can be downloaded onto the router as well. The ftpget command is available for this. The exact syntax can be found. May be you would like to write and compile a C program and then upload it to this router. Software apa saja yang sering digunakan hacker? Berikut ini adalah beberapa software atau aplikasi yang sering digunakan hacker dalam melakukan pekerjaannya.
Software hacker yang bisa Anda pelajari dan tidak digunakan untuk melakukan sesuatu yang tergolong ke dalam tindakan kriminal. Spytech Spy Agen: Tool ini merupakan sebuah aplikasi mata-mata yang akan mencatat segala aktivitas user secara sembunyi-sembunyi. Semua file log atau aktivitas user yang tersimpan dapat kita enkripsi sehingga mudah terlihat.
Tool yang satu ini memiliki cara penggunaan yang mudah, cukup dengan menekan Ctrl+Shift+Alt+M, maka tool default ini akan langsung bekerja. Handy Keylogger: Tool ini sama dengan aplikasi hacker lainnya, yakni tak akan bisa dideteksi oleh Task Manager. Setiap aktivitas yang dikerjakan dalam komputer yang telah dipasangi aplikasi ini akan tercatat seluruhnya, sehingga Anda bisa mengetahui apa saja yang dilakukan oleh pengguna komputer ini, misalnya apa saja yang diketikan oleh pengguna, alamat website mana saja yang dikunjungi, dan sebagainya.
Dumpacl-dumpsec: Tool yang ini biasa digunakan para hacker untuk melakukan semua pekerjaan yang berkaitan dengan enumerasi. Dengan memanfaatkan Nulls Connections, tool ini mampu menampilkan user account aktif secara detail. Semua aktivitas yang dilakukan oleh sebuah account aktif terekam oleh tool ini. Dulu, sebelum bernama Dumpacl-dumpsec, tool ini memiliki nama Dump ACL. Active Password Changer: Tool ini merupakan aplikasi hacker yang bisa mengubah password yang terdapat dalam komputer manapun yang bisa kita akses secara fisik.

Aplikasi ini memiliki beberapa fitur dengan kemampuan kerja yang cukup baik. Beberapa pekerjaan yang bisa dilakukan tool ini, di antaranya adalah melakukan booting dari cd, floopy disk, atau USB. Tak hanya itu, tool ini pun menyediakan CD burner sederhana untuk memburning file pada CD. Cain: Jika kita bisa bertanya kepada para hacker tentang tool yang paling popular di kalangan mereka, boleh jadi jawaban yang keluar dari mulut mereka adalah Cain. Ya, Cain merupakan aplikasi hacker yang serbabisa sehingga sangat digemari oleh para hacker.
Cain bukan hanya bisa digunakan untuk melakukan hacking password, melainkan bisa juga untuk mengumpulkan nilai hash dari berbagai sumber. Internet Password Lock 7. Facebook Password Hacker 8. Wifi Password Finder 9. Yahoo Password+key 10. Lophtkrack Administrator.
Today, I will write yet another tutorial on how to hack Facebook and dealing with a lot of problems along the way. This tutorial will be highly detailed with everything, including what you will need and all the thinking process necessary to successfully hack a Facebook account.
I will be covering: 1) Key loggers 2) Rats 3) Phishing (Well, not really.) 4) Social Engineering 5) How not to get traced Why am I writing this? Well, I am sick and tired of new members asking the same damn question every single day and it’s annoying as hell! Not only that, but all the other tutorials regarding ‘How to Hack Facebook’ are outdated and no longer work because they are not including the security updates that Facebook implemented not so long ago.
I have written, Tutorial Why you shouldn’t phish, keylog, SE on Facebook. Bypassing Facebook security Tutorial w/ Pictures You should check those tutorials out for further information regarding what I am about to talk about in here. I have seen that 99.9% of the tutorials on HF as of now recommend Phishing, keylogging, RATing, and even Social Engineering (SE) as the most notable methods to take over a Facebook account and essentially “hack it” Before, we go any further. Let me say that Facebook cannot be hacked with a program of any kind. If you see anyone claiming that they have a program to hack Facebook, they are lying. Now, why are key loggers, phishers, social engineering, and some RATs bad? -Key loggers only record the keys pressed on the keyboard.Phishers essentially do the exact same thing as key loggers, however the slave must do it manually.Social Engineering is the trickiest and I would probably say the hardest method of stealing Facebook account nowadays.RATs are probably the best road to take if you plan to steal a Facebook account because you have access to Socks5.
Socks5 being their own system. Key logger I recommend: Rapzo Logger v 1.5 Rapzo Logger v 1.5 ( Public Edition ). Spoiler Stealers 6 All Stealers Pure Code – No Drops + Runtime FUD # Firefox 3.5.0-3.6.X # DynDns # class='Apple-style-span' style='font-size: 14px;' FileZilla # Pidgin # Imvu # No-Ip Features 25. Full UAC Bypass & Faster Execution. Coded in Vb.NET. Min Req Is.net 2.0 Now A days every pc Have it. Cool & user friendly GUI.
Easily Understandble. Encrypt Information.
Encrypt E-mail information. 100% FUD from all AV’s. 4 Extentions. Exe.scr.pif.com. Keylogger support – SmtpGmail,Hotmail,live,aol,. Test E-mail – is it vaild or not. Customize the “To” e-mail address.
Screen Logger. Cure.exe to remove server from your Compute. Usb Spreade. File pumper – Built-in. Icon Changer – Preview. Logs are nice and clear. Log Letters – ABCD etc.
Log Symbols –!@#$% etc. Log Numbers – 12345 etc. Log specific key’s – F4F5TABHOMEPg DnPause BreakPrtsc SysRq. Hidden really good & invisible. Send new logs over and over again. ReadMe.txt – How To Use. Vedio Tutorial – How To Use Working on all Windows Operating System’s – Winxp vista W7 — 32 + 64 Bit Computers.
1) Why that key logger? Well, it’s Free and it works. How to set it up: 1) 2) After you have done that above, simply build your server.
Click Test me to be sure it works. Be sure to select what kind of e-mail you want to use and put the e-mail and the password. Now, considering that this keylogger is free, you will need to get your file crypted.
Crypting is essentially making your server or bot, or whatever you want to call it, FUD (Full undetected), being not detected by any Anti Virus or at least UD (Undetected), being only being detected by a few Anti virus. Well, so your file doesn’t get detected and immediately deleted as soon as the target opens the file. 2) Let’s move on to RATs, I see the same question all the time, Which is the best/favorite RAT? -Based on my personal experience, I can say that DarkComet and Cybergate are the best for RATs being free. You can find DarkComet here: You can find CyberGate here: I will not go into teaching you how to set those up because there are already a ton of tutorials on how to do that. I did a quick search to find tuts and these looked good: Setting up DarkComet Setup Cybergate (Will Publish This Soon As I Get The time) 3) Phishing -I will not go into phishing since it’s against the rules.
4) Social Engineering -Ah, the classic stories of “My friend hacked my facebook” or “How can I hack my friend?” or my personal favorite “How to hack my girlfriend’s Facebook?” A common mistake by layman who do not know much about the internet is giving information out without actually knowing that they are giving the information out. Social Engineering on Facebook seems like a joke considering that you aren’t going to ask the person their password and e-mail for you to log in. Even if they do in fact give you their information voluntarily, it’s pointless. Why is it pointless? Well, Facebook has become smarter on their security. I wrote about the reasons in dept on my other tutorial: Why you shouldn’t phish, keylog, SE on Facebook.
Basically, it comes down to this. Facebook will detect ‘Suspicion’ on the account that you are logging in and it will not allow you to log in under that account simply because their logs of the original account owner do not match with your IP or the IP your are hidden behind. 1) 2) 4) Now to retrieve back to the very beginning of this tutorial, I said that Key logging, Phishing, Social Engineering, and RATs were the common methods associated with hacking a Facebook account. I will respectfully correct my mistake and as well as the other tutorials on here. 1) Even if you do manage to steal the password and e-mail using Keylogs, the problem of suspicion will appear. 2) Even if you do manage to steal the password and e-mail using Phishing, the problem of suspicion will appear. 3) Even if you do manage to crack the password out of your target through Social Engineering, the problem of suspicion will appear.
4) RATs are probably and definitely the best way to go into “hacking” a Facebook account simply because you will have full access to their computers. You can change their info through computers and the problem of suspicion will not appear. RATs are NOT the only possible way to get in! Keylogging, Phishing, and Social Engineering might work as well. I believe that Facebook compares the ranges of IP based on the ISP of the target. Now, if that’s the caseSimply do a whois on the slave using the RAT. If you do not know what whois is, it’s basically a query that searches where the target is located.
Normally you can double click on the slave when they are online on the RAT and see where they are from and look at their IP. Now, you don’t really need a RAT to tell you where the slave lives or his IP. If you already have his IP or location through other methods such as reverting you’re good to go. However, if you do not have any information at all what so ever, you can try searching on these sites to revert info about the target. Now, once you have an IP or ISP, or location the next part is looking for a Sock5 to hide behind so Facebook thinks that you are only using a different computer in the same area.
You can also spoof the IP, but I will not go into that. So, after all that work, you still can’t take over their accounts? I thought about this method as I was showing a friend through Teamviewer the pictures that Facebook was showing me to identify the target’s friends. And obviously, I was clueless because I did not know of the people. What did I do? Well, as you can see the picture #4: 1) 2) 3) 4) Facebook provides the names of the target’s friends.
So, use that information to essentially bypass the security of identification by searching those names on Facebook search and matching the faces based on the Target’s friends. Note that will need an extra Facebook account to search, otherwise Facebook does not let you search. Close the ‘Suspicion’ page and log in to your extra or your actual Facebook account and search for the Target’s friends. Be sure to notice where your target lives so on the results you can compare whether if the friend is the matching face or not. Be sure to notice the names of the friends as well. For example, if the name choices are: George Bush Adolf Hitler Barrack Obama Mohammed Ali Lee Chang And the picture given is of an middle eastern descent looking person, you should obviously go with the name that sounds middle eastern.
Once you match the faces for the identification questions. You should be able to get in without a problem. To wrap it up, I will warn you one one important thing, if you do not have access to their e-mails. They will get an e-mail notifying that someone is trying to log in on their accounts and your IP will be shown to them. So, what that means is to always hide behind a VPN or a proxy so you can’t be traced back. Try to take over their e-mails if you want or simply delete the notification e-mails so they do not notice.
Xara designer pro x full crack software. Well, I believe that this is all I have to say.
In recent light, the ASIO has been caught spying on Indonesian citizens. In a response to this, Indonesian hackers have taken upon themselves to protest their actions by defacing innocent Australian business websites (only businesses can register the top-level domain.au). To those Indonesian hackers, feel free to join us in (or use your IRC client to join irc.anonops.com:6667) to collaborate and join together against our governments. We are not the enemy, we are all brothers. See to it that this is not acceptable towards our fellow Anons.

We're here to protest together, we're here to stand by each other. Anonymous Indonesia, plead with your hackers to stop. TRANSCRIPT: Anonymous Indonesia, You have defaced many innocent Australian websites in an effort to protest against the Australian government and their spy agency, ASIO.
Uspy Dalam Dunia Hacker 2016
Innocent businsesses should not be attacked. We all bound together in an effort to bring down our tyrant governments to shape our world as a better place. We bid you, as a fellow brother to focus on your main target - governments and spy agencies and leave the innocent bystanders out of this. If you choose to disagree then you should feel the full wrath of our fellow legion. Anonymous Indonesia, We are Anonymous.
Uspy Dalam Dunia Hacker 2017
We are Legion. We do not forgive. We do not forget.