Leaderboard
728x15
Showing posts with label BackTrack. Show all posts
Showing posts with label BackTrack. Show all posts

WebSploit Toolkit Version 1.8 Released Download



WebSploit Toolkit Version 1.8 Released Download

WebSploit Toolkit Version 1.8 Released 

Fardin OxOptimOus have released new version 1.8 of Websploit Toolkit. WebSploit Is An Open Source Project For Scan And Analysis Remote System From Vulnerability.

Web Tools Operations Added

PHPMyAmin Login Page Finder
Directory Scanner
Apache User Direcoty Scanner

Fixed Bugs :

smal keyboard control bug fixed
update bug fixed
ettercap path for backbox fixed

Download it from here:WebSploit Toolkit
DOWNLOAD HERE
Download Now
Download Now

How To Make An Linux Operating System [Easy&Free]



How To Make An Linux Operating System[Easy&Free]

Hello Guys, Today I'm Gonna Show You How To Make An Operating System(Linux-Based). It is Very Easy and Free and NO CODING REQUIRED!!

1. Open Your Browser and Type SuseStudio.com and Hit Enter!

2. Sign in Or Create an Account.

3. After Creating Account, Accept the TOS then Click On Continue. Now It Will Navigate You To Create New Appliance..

4. After Clicking on Create Appliance, It Will Navigate You To the Start Page where You Can Again Name(or Change) Your Appliance Name.

5. Click On Software Tab and Select What Softwares You Want In Your OS.

6. Now Click On Configuration. It Will Show You This Page(General).

7. Personalize it with Your Own LOGO Or Background.

8. After Configuring it, Skip Files(Used For Overlaying Files if you Want to Add Your Edits Files. It Will Automatically Add It to Your Basic Drive.)
Click on Build Tab.

You Can Install It via USB using UNetBootin. Or the way you use..   Thank You!!
DOWNLOAD HERE
Download Now
Download Now

Anyplace Control 7.0.4 Full Version Free Download

Anyplace Control 7.0.4 Full Version Free Download

Anyplace Control – Easy-to-use, powerful remote support and administration software. Control another PC as if you were sitting right in front of it, with the help of Anyplace Control.

If you’re good with computers, you may get asked for help by people who aren’t. It could be anyone: family, friends, customers, coworkers… Save your time and peace of mind with Anyplace Control, the most convenient and easy-to-use tool for remote PC access and assistance. Now you’re free from endless phone explanations and cross-city trips to solve five-minute computer problems. Save your time and help your friends, family and coworkers get their computer problems solved.

Download Trial Here

During the installation you will be asked to create Acess Password (you make it up yourself).

The next step is to create "New Online Account": you need to press "Create New Account"=>enter your email and any Account Password you want.

Finish the installation and run the program.

To register the software go to "Help"=>"Enter registration code" and register the software using the registration name and activation key provided:

-----------------------------------------------------------------------------------------

Registration name:

giveawayoftheday

Registration key:

00001X-ECMY4P-BBPHXZ-3PQDM1-CZVVUJ-7TQ6B6-FMF518-GCB0QM-PKAARZ-PD7YH2-YTJRUE

-----------------------------------------------------------------------------------------

NOTE: only on the giveaway day (16/12/2013 & 17/12/2013) all newly created accounts will be registered for 1 year.


The program allows remote control (Host-module installation) on up to 5 PCs. You can install Admin-Module on any amount of mashines.
DOWNLOAD HERE
Download Now
Download Now

Create multiboot USB device using YUMI [How to]



Create multiboot USB device using YUMI [How to]

Are you looking for any simple method to create multiboot USB device that able to contains multiple operating systems, windows utilities and more tools then you comes on right page.

YUMI(Your Universal Multiboot Installer) is easy to use, freeware multiboot creator tool. Normally, we can only create a single boot in USB device but YUMI can help you to easily create Multiboot USB Drive containing multiple operating systems, antivirus utilities, disc cloning, diagnostic tools, and more.

YUMI copies all files into Multiboot folder in organized way, So you can still used your USB device for other storage purposes.

How to create Multiboot USB device using YUMI:-

Step 1:- Download YUMI and install it on your windows system.

Step 2:- Now run the program, and then select your USB device drive letter,


                                       Make your USB device multiboot using YUMI

Step 3:- Now from the distribution list, select the Linux distribution, antivirus tool or system utilities, or other that you wanna install.

Step 4:- And then browser the iso file path, once you’ve done it, click on the create button.

Step 5:- Follow the same procedure to create multiboot USB device.

Step 6:- Once you’ve done it, restart your computer, and then change your PC setting to boot from the USB drive and then install your distribution.
DOWNLOAD HERE
Download Now
Download Now

How to Install Nvidia Graphics Card Driver on Linux OS

z
How to Install Nvidia Graphics Card Driver on Linux OS

Linux has many features and look that attracts us to use it and as many of hacking tool are built on Linux then for those security testing we need to use Linux as our operating system but many of us are missing some features like playing game which is hobby of many people to play on computer but due to lack of knowledge about Linux either we install windows to play game or we deleted the Linux from system.
Here in this post i am going to tell you that how to configure and enable the Graphics card on Linux machine. I am considering the Nvidia as the Graphic card in the post.

Steps To Install Graphics Driver and Enable Graphics Cars
Step1: Go to Official website of Nvidia and download the file needed for your machine.
 Here is the Link.

if you have a computer with a processor such as a Pentium 1-4, select Linux IA32.
if you have a computer with a processor such as the AMD 64, select AMD64/EM64T.

Step2: Kill the existing XServer before we continue

Follow these steps:

press Ctrl-Alt-F1 to enter a virtual terminal. Log in as root and use the command “killall5
press Ctrl-Alt-F2 and log back in as root.
Now take a backup of the Xserver just as the precaution in case if it is corrupted.

Type cp /etc/X11/xorg.conf /etc/X11/xorg.conf.backup

in the terminal, go to the directory where you downloaded the driver.
run the command “chmod a+x *.run
run the command “sh *.run

Step3: Install the Driver.

Follow the steps on the screen.

Remember, when it asks you if you want it to configure your XServer to say yes.
Remember, allow it to download/compile from the Internet if needed.
Now once the driver is installed then reboot the machine and start playing games

Tell Your friends to join M14 Network On Facebook for more such information. 
DOWNLOAD HERE
Download Now
Download Now

The 10 Most Infamous Student Hackers of All Time



The 10 Most Infamous Student Hackers of All Time

Hacking has always been inherently a young person’s game. The first usage of the word “hacker” was to describe pranksters meddling with the phones at MIT. Many hackers have cited boredom, a desire for change, or the thrill of going somewhere one is not supposed to go as their motivation for hacking, all of which could apply to scores of common activities on college campuses. While today’s hacking scene is dominated by large hacking groups like
Anonymous and Masters of Deception, many of the greatest hacks ever have been pulled off by college, high school, and even middle school kids who rose to infamy armed only with a computer and the willingness to cross the bounds of legality.

1.) Sven Jaschan:
In the words of one tech expert, “His name will always be associated with some of the biggest viruses in the history of the Internet.” The viruses: the Sasser and NetSky worms that infected millions of computers and have caused millions of dollars of damage since their release in 2004. The man behind the viruses proved to be not even a man at all, legally. Seventeen-year-old hacker Sven Jaschan, a student at a computer science school in Germany, claimed to have created the viruses to become a hero by developing a program that would eradicate the rampaging Mydoom and Bagle bugs. Instead he found himself the subject of a $250,000 bounty courtesy of Microsoft, for which some of his classmates turned him in.

2.) Jonathan James:
In 2000, at the age of 16, James, or “C0mrade” as he was known in the hacker community, infamously became the first juvenile federally sentenced for hacking. The targets of his notorious hack jobs were a wing of the U.S. Department of Defense called the Defense Threat Reduction Agency, NASA, and the Marshall Space Flight Center in Huntsville, Ala. (By hacking the latter James gained the ability to control the A/C in the International Space Station.) All of these were pulled off “for fun” while James was still a student at Palmetto Senior High in Miami. Unfortunately, the fun ran out when James was tied into a massive identity theft investigation. Though insisting he was innocent, James took his own life, saying he had “no faith in the justice system.”

3.) Michael Calce:
Yahoo. CNN. Ebay. Amazon. Dell.com. One by one in a matter of days, these huge websites crashed at the hands of 15-year-old Canadian high school student Michael Calce, aka “MafiaBoy.” Armed with a denial-of-service program he called “Rivolta” that overloaded servers he targeted, the young hacker wreaked $7.5 million in damages, according to court filings. Calce was caught when he fell victim to a common ailment of teenage boys: bragging. The cops were turned on to him when he began boasting in chat rooms about being responsible for the attacks. On Sept. 12, 2001, MafiaBoy was sentenced to a group facility for eight months on 56 counts of cybercrime.

4.) Kevin Mitnick:
Before performing hacks that prompted the U.S. Department of Justice to declare him “the most wanted computer criminal in United States history,” Kevin Mitnick had already made a name for himself as a hacker in his school days, first at Monroe High School in LA and later at USC. On a dare, Mitnick connived an opening into the computer system of Digital Equipment Corporation, which some fellow hackers then used to steal proprietary source code from the company before ratting on him. While still on probation for that crime, Mitnick broke into the premises of Pacific Bell and had to go on the run from police in the aftermath, during which time he hacked dozens of systems, including those of IBM, Nokia, Motorola, and Fujitsu.

5.) Tim Berners-Lee:
“Scandalous” is a synonym for “infamous,” and for this legendary computer scientist, knight of the British Empire, and inventor of the World Wide Web to have been a hacker in his school days is certainly a juicy factoid. During his time at Oxford in the mid-’70s, Sir Tim was banned from using university computers after he and a friend were caught hacking their way into restricted digital areas. Luckily by that time he already knew how to make his own computer out of a soldering iron, an old TV, and some spare parts. And also luckily for him, he will always be revered as the father of the Internet.

6.) Neal Patrick and the 414s:
In the early ’80s, hacking was still a relatively foreign concept to most Americans. Few recognized the enormous power hackers could hijack with a few strokes on a keyboard, which explains why a young group of hackers known as the 414s (after a Milwaukee area code) were virtual celebrities after they hacked into the famous Los Alamos National Laboratory, the Memorial Sloan-Kettering Cancer Center, and elsewhere. While today hacking a lab where classified nuclear research is conducted could earn you a one-way ticket to Guantanamo, the 17-year-old ringleader and high school student Neal Patrick was on the cover of Newsweek. The group members got light sentences but prompted Congress to take a stronger role in cybercrime.

7.) Robert T. Morris:
The first ever Internet worm, the Morris Worm derived its name from Cornell grad student Robert Tappan Morris. In 1988, Morris released the worm through MIT’s system to cover his tracks, which would seem to contradict his claims that he meant no harm with it. But that’s exactly what resulted: the worm spread out of control, infecting more than 6,000 computers connected to the ARPANET, the academic forerunner to the World Wide Web. The damages reached as high as an estimated $10 million, and Morris earned the ignominious distinction of being the first person prosecuted under the Computer Fraud and Abuse Act. Morris got community service but was apparently not considered too infamous to be offered his current job as a professor at MIT.

8.) George Hotz:
To some, George Hotz (aka “geohot,” aka “million75,” aka “mil”) is a public menace, a threat to electronic businesses everywhere. To many, Hotz is a hero. The high-schooler shot to fame/infamy in 2007 at the tender age of 17 by giving the world its first hacked, or “jailbroken” iPhone. He traded it for a new sports car and three new iPhones, and the video of the hacking received millions of hits. Apple has had to grudgingly come to terms with jailbreaking, seeing as the courts have declared it legal, but Sony Corp. is definitely not OK with such tampering. When Hotz hacked his PlayStation 3 and published the how-to on the web, the company launched a vicious lawsuit against him. In turn, the hacker group Anonymous launched an attack on Sony, stealing millions of users’ personal info.

9.) Donncha O’Cearbhaill:
According to the FBI, this 19-year-old freshman at Trinity College Dublin is one of the top five most wanted hackers in the world. Well, he was; now that he’s been arrested he’s not really “wanted” anymore. The Feds contend the young man is a VIP member of the Anonymous and LulzSec hacking groups that have already been mentioned and whose targets have included the FBI, the U.S. Senate, and Sony (in the Hotz backlash). It seems “Palladium” (O’Cearbhaill) took the liberty of listening in on a conference call between the FBI and several international police forces who were discussing their investigations of the hacking groups. He could be sentenced to up to 15 years in prison if convicted for that hack alone.

10.) Nicholas Allegra:
Just as George Hotz moved on from the Apple hacking game, Brown University student Nicholas Allegra is also hanging up his jersey. “Comex,” as he is known to millions of rooted iPhone fans, created the simple-to-use Apple iOS jailbreaking program JailbreakMe in 2007 and has since released two newer versions of it. However, Comex seems to have gone over to the dark side, accepting an internship with the very company whose products he became famous exploiting. Still, Allegra’s hacking skills are so advanced (one author puts him five years ahead of the authors of the infamous Stuxnet worm that corrupted Iran’s nuclear facilities) and so many people availed themselves of his talents, he will forever live in hacking infamy.
DOWNLOAD HERE
Download Now
Download Now

How to install BACKTRACK (dual boot)



How to install BACKTRACK (dual boot)

First of you have to download the latest version from the official website: http://www.backtrack-linux.org/downloads/. There you have a lot of options:

-Select Backtrack 5 r3.
-Select the desktop environment of your choice (GNOME or KDE)
-Select your architecture "32" bit or "64" bit.

-Select "ISO" if you want to burn it into a dvd and use it as a live OS or burn install it in your hard drive, VMware if you want to use it in a virtual environment.
-Select the your download type, whether "direct" or "torrent".
Once the download finishes, burn the ISO file in a DVD, then reboot, & proceed as follows follow :
When you boot the Dvd, press "inter" and you'll have the following screen displayed, choose the default boot option 'number 1' & press "enter" again

Then, type startx to launch the graphical interface:

After that, you'll be logged in to the Desktop: click the installer icon and follow the instructions .
When you finish click "restart now" and enjoy Backtrack !

You have to bear in mind that the default username in Backtrack is "root" & the default password is "toor", then in order to start the graphic interface you have to type "startx"
DOWNLOAD HERE
Download Now
Download Now

Mac Tracker On Backtrack 5


Mac Tracker On Backtrack 5
MAC TRACKER

OPEN FERN
Backtrack > Exploitation Tools > Wireless Exploitation Tools >WLAN Exploitation >fern-wifi-cracker

See the below image for more details -

OPEN TOOLBOX
Now open ToolBox .
See the below image for more details -

GEOLOCATORY TRACKER
Now open the geolocatory Tracker.
See the below image for more details -

INSERT MAC ADDRESS
Select the Option Insert Mac Address and insert the Mac Address in the box .
Now , after inserting Mac Address , click on the Track Button .
See the below image for more details -

EXAMPLE :
Here in this example , i m going to track the MAC Address and it spot the Mac Address in Noida,India.
See the below image for more details -

THIS IS HOW WE CAN USE THIS TOOL TO TRACK THE MAC ADDRESS

JOIN US
ON
FACEBOOK
https://www.facebook.com/M14Networks

THIS TUTORIAL IS JUST FOR EDUCATIONAL PURPOSE ONLY /-
DOWNLOAD HERE
Download Now
Download Now
Leaderboard