Using Brutus – Password cracker

Discharge – AKI is quite fast and very easy to handle, The passes that can crack are: HTTP (Basic Authentication), HTTP (HTML Form/CGI), POP3, FTP, SMB, Telnet, other types such as IMAP, NNTP, NetBus etc . And this version contains these features: Gradual authentication engine, 60 Simultaneous connections by target, No username, Single username and multiple username modes, List of passwords, Combo list (user/password) and configurable brute force modes, Highly configurable authentication sequences, Import and export custom authentication types as BAD files seamlessly, Being able to use SOCKS proxy for each session, Username and password list generation and manipulation functionality, HTML Forms Interpretation for HTML Form/CGI Authentication Types, Be able to save the cracking session and be able to return to it whenever desired. System Requirements: Windows 95, […]

Stop Windows XP Firewall with VBscript or by Editing the Registry

Se puede parar el firewall de XP de una forma simple, si es que queremos entrar en el PC de la victima de forma simple desde local, simplemente hay que modificar un parametro del registro de Windows de un 1 to a 0, se puede hacer ejecutando un simple bat que os lo dejo AKI compilado, que simplemente modifica ese valor y se cierra el programa o os dejo AKI el código de VB de ese simple programita.

Hacking Windows Passwords with Ophcrack and Ophcrack LiveCD

Ophcrack is a Windows password cracking tool based on Rainbow tables. It is a very efficient implementation of rainbow tables made by the inventors of this method. It comes with a graphical user interface and runs under Windows, Mac OS X and Linux. Break LM and NTLM hashes. Upload hashes from local SAM and remote SAM (SAM is the database of Windows users – Security Accounts Manager). Let's go, is a tool that cracks all Windows passwords in seconds, whether local or remote, from other partitions and it doesn't matter which version of Windows you are running.

Using Man In The Middle with Ettercap – MITM – ARP Poisoning – ARP spoofing – ARP poisoning

En este tutorial se explica cómo esnifar una red o un equipo en concreto sin que nos coloquemos fisicamente entre él y su puerta de enlace. Un escenario ideal es hackear una red wireless, nos conectamos a la red como si fueramos un host más, y usamos esta técnica para que todo el tráfico pase por nosotros, y lo analizamos con el software que sea, o mismamente con el Ettercap. Este sería un ejemplo lógico de qué es Man In The Middle:

Making a Joiner or Splitter or Binder with WinRAR

If we want to make a joiner and not be detected by the antivirus… Don't eat your head anymore, There's a super simple way, with the WinRAR compressor (descarga de su web oficial), we simply compress the files that we want to send to our victim, for example some photos, When compressing them, we also select the file that we want to run in the background, doing all the damage we want (leave some ports open, Create users with admin privileges, with commands to send me an email with your IP…, We stopped the Beast Fur…) whatever.

JAAScois AntiWebInjection

This program is very simple to use, first we download it from AKI or from its official website. It takes out all the websites and files that a website has, and in them it looks for passwords or errors, It's super fast and very useful if you want to see the total content of a website.

Using Ettercap

Sniffing techniques are becoming more popular every day, Arp-Spoof, dns-spoof, man in the middle, etc, But there are many who believe that they are reserved for the gurus of the network, and until recently it was like that, but in this as in everything, over time, The Internet has made it possible to rapidly develop tools that make what was previously very complex, Now it's a child's thing (I'm not sure if that's good or bad).