الثلاثاء، 2 يوليو 2013

HACK PC USING DARK COMMET(full tutorial)

In following tutorial we will cover how to use DarkComet Remote Administration Tool. If you regular reader to Devil's Blog then you might be knowing we have already covered Cerberus RAT client in The RAT Remote Administration Tool then why we are covering another RAT client.
Following are 4 good reasons for that.

1.Many people think that DarkComet is best RAT client and they don't prefer any other RAT client than DarkComet.(not my personal view)
2.Few days ago we covered Denial Of Service and Types Of DoS Attacks soon we will cover tools that can be used for DoS attack and DarkComet is one of those tools that can be used for launching a successful DDoS attack.
3.Search engines are dropping visitors searching for Dark Comet tutorial on Cerberus tutorial, not good na, better give them what they are searching for.
4.Its always better if you know how to handle more than one tool.

Enough talk lets move on to tutorial. Download DarkComet RAT 2.2 from their official website. You might ask why 2.2 when 3.2 is available. 3.2 is unstable and needs some bug fixes better opt 2.2. After download extract zip file and double click on RAT client, accept EULA and you will be presented with following screen.

Download Here

 

              Main Window

Now click on edit server.

 

             Server Editor


Server Session:
If you have already created any RAT server before then Darkcomet stores an INI file with all settings saved in it. So if you want to create another server with same settings open that file here and create server.

 

   Main Settings


Mutex String:
Our RAT client will run in process space of another process to remain stealthy. This string helps differentiate RAT that some another process is holding our data for hiding. Must be specified for proper functioning of RAT client, you can give it any name you want or just press random to get random name.
Server ID:
This name will appear on server list when your victim will execute your server. Helps in differentiating different servers so better use new name for new server.

Lastly always preserve connection with good user-name and password.

 

   Connection Settings

Specify your IP address in IP address field if you have static IP or use Dynamic DNS if your IP address is not static. To know more about Dynamic DNS IP read Use Dynamic IP As Static IP. Now specify port number you want to listen and press “Add This Range In IP/port list”. For testing purpose you can use 127.0.0.1 that is loop back IP and port 8080 I.e http proxy port.

 


   Server Startup

Here you can specify where your sever will get installed in victim's PC and you can also specify in which process you wish to hide you server. A good choice for process is svchost.exe, melt server option will delete server file as soon as server gets installed. Other options includes adding registry keys, use them if you want but it works fine without any key. Don't forget to enable option of “Start Server ON Startup”.

 

   Server Shield

Server Shield provides server with file attributes and folder attributes for installation and basic fun options to harass victim. I would better advise not to use them because it will alarm user about presence of your RAT server.

 

  Offline Key Logger

Activate offline key-logger so that key-logger should log files even though you are offline. If you want server to send log files to your ftp server rather than accumulating in victim PC, specify credentials required for your ftp server. If you don't have ftp server, you can search for “free ftp service” on Google and you will get heap of them or you can try out http://www.zymic.com/free-web-hosting/ it offers free-web-hosting plus free ftp service. Good for practice.

 


Anti VirtualBox
Anti Virtual Box settings allow RAT client to disallow server execution in virtual environment. But since you will be practicing it in virtual environment don't touch this option. To know how to setup your virtual lab read Basic Lab Setup For Hacker. Next is icon setting use some good custom icon so that your victim should not feel suspicious about RAT server.

 


File Binder
Select file you want to bind with RAT server, binding with another file make RAT server remain in stealth mode and get executed with legitimate file thus avoiding detection.

 


Generate Server
Now select all options and generate server.

 


Listen
Now close server edit window and press listen, specify port number 8080 and then execute your RAT server.

 


Listening On Port 8080
Now right click on listening port and select “Open Control Center”, play with available options.

 

 


Control Center
Actually you are not in need of any remote PC to practice, if you have set your virtual environment then follow above steps in virtual environment with IP address 127.0.0.1 and port number 8080, if your firewall shouts ask it to allow connection. With this setting you will not even need internet connection to see results while practicing. This will help those who have computers at home but for Internet connection they have to depend on college, schools and cafes. Please ask if you have any difficulty or query. Thanks for reading, keep visiting.

الأحد، 30 يونيو 2013

HOW to see a crashed site / see an old look for a site

is it impposible to see a crashed site?????


No,it's not impposible




How can I see a crashed site or see an old look

I think you should see  this video and you will know the answere

note:the linked that was at the explanation
is here






thanks for reading
enjoy!!!
join our group at fb there



Our group





Or like Us


.Thanks you for reading

How to configure/use ProRat Trojan to hack someone's PC (Free download and instructions)

I have already written a post on hacking into someone's PC which was using Beast Trojan, you can check that by clicking here, and this time, i will show you how to configure ProRat Trojan to hack into your victim's computer. ProRat is also a Trojan making program which is similar to Beast Trojan but in compare to Beast, ProRat is much better.



  • It can connect to the server more faster.
  • It has more features/functions to play with your victim's PC.
  • Easy to configure.
Lets start the Tutorial:
  • Download prorat here
  • Now run ProRat.exe and then and extract anywhere in your PC. click on Create- Create ProRat Server (342 Kbayt)
  • From the Notifications tab, in the first option "Use ProConnective Notification" type your IP address. (If you don't know your IP address, simply click on the red arrow and it will automatically fill your IP address).
  • Now in the second option "Use Mail Notifications" type your Email address where you want to receive notification when the server is installed on your victim's PC.
    • In the General Settings Tab, leave as it is but don't forget to remember the password. You will be required to enter the password at the time of connection. 
    • Now come to the Bind with File tab. Mark the box "Bind server with a file" and then click on Select File. Now select any file you want to bind with the server.(Binding means combining two files into one)
    • You can also change the extension of the server if you want by going to the Server Extensions tab.
    • Now click on Server Icon tab and select an icon for the bind files. Choose the icon wisely. If your have bind the server with some program, then select the setup icon or if your have bind the server with an image file, than select an image icon.
    • Finally click on Create Server.

    Now the server will be created in your current directory (the extracted folder). Send or give the server to your victim and once your victim runs the bind file in his PC, the server will be installed silently on your victim's PC. After the server is installed on your victim's PC, the server will send you an email on your given email ID to confirm you that it's been installed successfully on the victim's PC. After getting the email, run ProRat again, then click onProConnective and then click on Start to list the ProConnective connections. After then, a new window will open which will show you weather your victim is online on not.

     Happy HACKING :-)

Facebook hack: Enlarge locked profile picture (display picture hack)

Ever wanted to see full size profile picture of your crush, who has made her account display picture visible to only limited people?. Well you have good news! this new profile picture hack allows you to view large size of locked profile picture(current) of any user you want.
Don’t believe me? Lets make a try!. Please do-not Misuse it.
Step #1. Open any fb profile with locked picture

Step #2.right click on the picture and click on copy image location”.

Paste the copied URL in a notepad or address bar. you will see something like this:
https://fbcdn-profile-a.akamaihd.net/hprofile-ak-ash4/c36.35.446.446/s160x160/382342_547052581992560_1718937663_n.jpg
If you observe the above URL, you Will notice that the text in red actually matches the thumbnail size of the profile picture which is being locked i.e 160×160.
Step #3. Now the trick is to replace s160×160 with s720×720 in the above link , so your new link will look something like this:
https://fbcdn-profile-a.akamaihd.net/hprofile-ak-ash4/c36.35.446.446/s720x720/382342_547052581992560_1718937663_n.jpg
Step #4. Now just visit this new picture link and bam! you have the original locked profile/display picture on your Screen. Enjoy!!

HACK fb using keylogger

1Hardware:- Special computer devices for keylogging are available. They are connected to the keyboard wire and then to the CPU. It looks like the keyboard wire's part and cant be easily detected.When needed the device can be disconnected and the logs can be viewed.
*Bad points:- This method is mostly not preferred for hacking facebook passwords, as the devices are costly  and need physical access to the computer


2 Software :- There are thousands of different keylogger software which provide the user with a wide range of options.From them the keylogger which can be remotely installed is preferred for hacking Facebook passwords.They keep log of the keys pressed on the target's computer while remaining hidden and after some specific time send it as a email to the user without the target's knowledge..
*Bad points :-Most of the keyloggers are detected by the Antivirus and Firewall softwares, but some keyloggers are able to bypass the Antivirus and Firewall software. You also have to convince the target to install the keylogger while remote installing it.






Below i will show you on How to hack facebook passwords with winspy and sniperspy Softwares.
1). Sniper Spy (Remote Install Supported)SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s! This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands.










2).Winspy Keylogger

1. First of all free download Winspy keylogger software from link given below:

Download Winspy Keylogger

2. After downloading winspy keylogger to hack Facebook account password, run the application. On running, a dialog box will be prompted. Now, create an user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.

3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.

4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.


5. Now, Winspy’s main screen will be displayed as shown in image below
6. Select Remote at top, then Remote install.

7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.





.user - type in the victim’s name
.file name - Name the file to be sent. Use the name such that victim will love to accept it.
.file icon - keep it the same
.picture - select the picture you want to apply to the keylogger.
In the textfield of “Email keylog to”, enter your email address. Hotmail accounts do not accept keylog files, so use another emailaccount id,my sugession is using a Gmail id
Thats it. This much is enough. If you want, can change other settings also.

8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Facebook account password.


Personal Tip
 :- Try the keyloggers which come under the parental control category which are used by parents to keep an eye on the child's online activities. This keylogger are mostly Antivirus and Firewall friendly. The AV and firewall wont detect them because if they did detect it then the child will come to know about it and it will be of no use. The only short coming of these keylogger is that they dont have remote installation feature.