background preloader

Hacker Attack Tools

Hacker Attack Tools

List of Rainbow Tables This page lists the rainbow tables we generated. LM rainbow tables speed up cracking of password hashes from Windows 2000 and Windows XP operating system. NTLM rainbow tables speed up cracking of password hashes from Windows Vista and Windows 7 operating system. MD5 and SHA1 rainbow tables speed up cracking of MD5 and SHA1 hashes, respectively. The largest rainbow tables here are ntlm_mixalpha-numeric#1-9, md5_mixalpha-numeric#1-9 and sha1_mixalpha-numeric#1-9. Benchmark result of each rainbow table is shown in last column of the list below. Video demonstration of some rainbow tables on Perfect rainbow tables are rainbow tables without identical end points, produced by removing merged rainbow chains in normal rainbow tables. Rainbow Tables LM Rainbow Tables NTLM Rainbow Tables MD5 Rainbow Tables SHA1 Rainbow Tables Perfect Rainbow Table Generation, Sort, Merge and Conversion Commands All rainbow tables in this page can be generated with RainbowCrack software. © 2017 RainbowCrack Project

How to phish(tutorial inside) How to-make a phishing page by Grayboy  What is a phishing page? A phishing page is a fake login page, for example a fake facebook login. Instead of logging you into facebook, it keeps the password! Preparation work A journey of a thousand miles starts with a first step, here is yours. Step one-choose your target. To phish, you need a website to phish. Step two-make the index page. This is like the home page of the phishing site, which the target will see. Ok now open up one of your notepad documents. Step three-make the php file. Save this as “post.php”. Step 4-hitting the World Wide Web! Whilst this is all well and good, it won’t do anything sat on your computer! Step 5-Getting it out their! Okay now for this you are going to need a fake email. You need people to send it to. Go on google and type in site:www.facebook.com:”@hotmail.com” .This should give you lots of targets. Now you need to get the actual content sorted. Do you want to control which emails you receive from Facebook?

How to Hack Someones IP Address 2014 - Come to Hack Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives. Now while most of the tutorials on the net teach you how to steal an ip address via MSN, or any other chat software, in this post I’ll show you how to find IP address of someones computer using script. Using this method for hacking someones ip adress is very easy and effectively, so just follow the steps bellow. NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk. How to Hack Someones IP Address? Alright, I'm gonna give you this script, that you write in the index.php. Here is the sript: 1. 2. 3. 4. Hope you'll find this tutorial useful. Introduction1. 4. Time to start.

How to surf anonymously without a trace Skip to comments. How to surf anonymously without a trace ComputerWorld ^ | 12 March 2007 | Preston Gralla Posted on Tue Mar 13 14:29:37 2007 by ShadowAce The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true. It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits. And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered. But you don't need to be a victim. What they know about you Whenever you surf the Web, you leave yourself open to being snooped upon by Web sites. Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Protect yourself: Surf anonymously To: ShadowAce

Top 10 Password Crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. 12 tools Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. version 1.1 on April 24, 2010 (2 years, 5 months ago). crackers wireless UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. version 4.9.43 on Dec. 3, 2011 (10 months ago). sniffers fuzzers

Untraceable Computer Techniques So I can imagine a time when (if it is not already happening) that posts to the internet such as this will be actively traced to the source computer and the poster put under scrutiny at the least or jailed at the most. First off there are not any sure proof untraceable techniques that the average man can employ, but there are somethings that we can do to make it harder for those who would want to track activity. What are some techniques that one might use to go online to continue to gather information in regards to survival preparedness, government actions and or communicating with others? Computer Registration - All computers are serial numbered and it is easy enough to also track the MAC addresses of the Network Interface Cards within the laptop or etc. Most people buy a laptop with their credit card so it does not take a rocket scientist to figure out who has what laptop. IP Proxy Surfing This is a way to hide your IP address while browsing the internet.

How to Install Aircrack on Mac in 3 Easy Steps Installing Aircrack-ng can be a little confusing if you don't understand the lingo. Let me guide you trough those steps and you'll have Aircrack running natively in no time and almost no effort. Why Use Aircrack? Aircrack-ng is about up to 5 to 10 times faster than KisMAC when it comes to cracking WPA or WEP password. KisMAC has an old Aircrack Engine and, honestly, it needs an update... Aircrack-ng 1.1 churns about 1500 "WPA" keys per Second, or about 360 Passphrase/second when KisMAC is left behind at 160/Sec on a dual core. Aircrack-ng can recover keys for WEP and WPA. Yes, it's 1,576,213 PMK/S. Back to Aircrack: On WEP, the difference is extremely noticeable, especially on low IV's captures. For Airport users, once decrypted, you have to enter the key without semicolons and space. If you are not familiar with the lingo, or wonder what does what, I would suggest reading the FAQ first. Installing Aircrack-ng on OS X You'll need: The Installation

Related: