HOW TO CUT any computer from LAN Network [WIN/LINUX/MAC] tut is included

This is for people who DO NOT have access to the router password, and still want the ability to do this.

WINDOWS

What you need

1. Netcut [http://www.arcai.com/download/netcut.exe)]
2. WinPcap (comes with netcut installer)

Installation

To install netcut, just click the download link above and install it. WinPcap is part of the netcut installer.

How to use it

1. Run netcut as Administrator. If it is your first time running netcut, then it will ask which network card to use. Most people will have one, but if you have more, just use the one that is connected to the same network that the target is on. If it disappears after it is opened, then check your system tray (bottom right). The icon is a picture of little blue scissors.

2. Once it is opened and you selected the correct network card, wait until the network is refreshed. It could take a minute or so, and the box on the left will fill up with IPs of computers on the network. The right box holds your router IP.


3. Select the computer that you would like to cut off (it should turn blue). Press the button that says "Cut off (Ready)".


It works, if the little computer next to the IP that says "On" should turn to "Off".
To turn the target's network back on, just select the computer and press "Resume" at the top.


LINUX


What you need

1. Terminal Root Access

Installation

1. To install arpspoof, we just simply type: sudo apt-get install dsniff

How to use it

1. Make sure arpspoof is installed by typing: sudo arpspoof

If the command is not found then make sure dsniff is installed.

2. To cut the computer, type: sudo arpspoof -i INTERFACE -t TARGET ROUTER

The interface is the network interface. For Wi-Fi, it is probably eth0. The target is the IP of the target computer and the router is the IP of the router. 


An example: 
sudo arpspoof -i eth0 -t 192.168.11.XXX 192.168.11.1


MAC


What you need

1. Xcode Command Line Tools
2. MacPorts [http://macports.org/install.php]
3. Terminal Root Access



Installation

1. Install Xcode. It is free from the Mac App Store. Once it is installed, go to terminal and type:

xcode-select --install

It will ask if you would like to install Command Line Tools. Click "Allow" or "Accept", or whatever the button to confirm.

2. Install MacPorts. Make sure MacPorts is installed.

Type: sudo port

It should say something like "Entering interactive mode..." If it says that, then just type

quit

to exit. If it is NOT installed, then restart your Mac and then try to install it again.

3. To install the arpspoof command, we need to install a program that has arpspoof built in to it. We need to install "dsniff". To install dsniff,
 

type: sudo port install dsniff

THIS SHOULD FAIL. If it doesn't then skip to HOW TO USE IT. Now, because of the weird dependencies, we need to run 2 more commands.

Run: sudo port uninstall libnids

Once that finishes, run code: sudo port install libnids +libnet


How to use it

1. Make sure arpspoof is installed by

typing: sudo arpspoof

If the command is not found then make sure dsniff is installed.

2. To cut the computer, type:

sudo arpspoof -i INTERFACE -t TARGET ROUTER

The interface is the network interface. For Wi-Fi, it is probably en0. The target is the IP of the target computer and the router is the IP of the router.


An example:
sudo arpspoof -i en0 -t 192.168.11.xxx 192.168.11.1


As always, this tutorial is for educational purpose only. The main purpose is to keep the readers stay informed about these vulnerabilities. 

68.000.000 Password List with direct link

Today I am providing you with direct link to 68.000.000 password list


This list has over 68 MILLION words and combination


HOW TO performe DDOS attacks

< TOC >

1.What is a DDoS attack?
2.Different kinds of attacks
3.The advanced workings of a booter/stresser/attack tool
4.How to perform a DDoS Attack[/size]

< Introduction >
A DDoS attack. One of the most well known types of internet attacks, though far too many don't know much about it. Often a "Hacker" will download or purchase a booter/stresser online, using it to hit off enemies, not knowing how it works at all.

<1. What is a DDoS Attack? >

A DDoS attack is essentially filling a server, whether it's a game server, website, or home connection with so much traffic that it crashes or severely slows down.
Now the DDoS attack (Distributed Denial of Service attack) is not to be confused with a DoS (Denial of Service attack). The difference is simply a DDoS attack is using multiple servers to attack, as the DoS attack is using a single server.

<2. Different kinds of Denial of Service Attacks >

There are many different kinds of DDoS attacks. Some are specifically meant for specific types of servers. I'm going to go into depth of the most popular attacks and what servers they are mostly used for.

UDP Attack

The UDP (User Datagram Protocol) is one of the most popular attacks, and is quite powerful. It is often used to take down home connections, (often after getting owned on XBox Tongue), internet servers and game servers, so it is quite generalized.
The UDP Attack utilizes random ports on a server and sends them loads of data at once. This often confuses and slows down the server, sometimes to a total halt for a period of time.

SYN Attack

These attacks are often used against web servers, and are quite genius attacks. This attack almost has a conversation with the server. You'll understand what I mean in a second. First, the attacking server sends a greeting, or synchronize message to the target. It 'greets' the server and starts a 'conversation' with the target. Now the target acknowledges the greeting of the attacking server, and sends an acknowledge message to the attacking server. Now it closes the connection.
Now imagine if the target received hundreds of these greetings, and had to respond and talk to EVERY single one. It would get a little tired, don't you think? Therefore if the attack is powerful enough, and sends loads of these attacks, some of the connections would time out, and the target would get to tired and go to bed, resulting in down time.

Slowloris

Now this attack has been utilized at many different times, including elections. These are often used against web servers, and though they are slowly getting older and outdated, they still work on many servers. These attacks essentially open connections with the server, though in a partial or incomplete connection. Now the attacking server will keep them open as long as possible, as all the targets resources get sucked up, and eventually crashes/halts.

<3. The advanced workings of a booter/stresser/attack tool >

Now this is something that is often left out, though I feel needs to be well known. If you want to be a real hacker, you need to understand how the attack/method your using works, so that you can use it to its full extent, and maybe code a tool better than the one you're using if you'd like to. Either way it's important.

Now a booter/stresser usually has dedicated servers. These are like computers you can connect to over the internet and upload files to them to use.

The booter/stresser uploads the website CSS/HTML (if it's web based), as well as the attack scripts. These can be coded in several different languages. They are coded to attack using methods like the ones specified above. These are often coded by very good programmers, and if they are good can take down a server.
Now if it's programmed based, it's just connecting a GUI or easy navigational menu that connects to the dedicated servers with the scripts uploaded to it and attacks.
Now a booter/stresser doesn't have to be some sophisticated looking thing. Often real hackers will buy a handful of powerful dedicated servers, uploaded their custom scripts, and use a program like metasploit to perform the attack.
Now there's one other kind of thing that people sometimes fall for, that are often useless and dangerous. These are downloadable booters that utilize your internet connection, sending the attacks to the target using your internet and IP, making this a DoS attack. Now in case you don't know both DoS and DDoS attacks are illegal to perform, and if you're using your IP you can get caught easily.

<4. How to perform a DDoS attack >

Now this is one part I'm not going to go into as much detail on. I'd just recommend buying a booter/stresser. They're much easier than using metasploit or a complicated homemade booter, and are sometimes more powerful.

Now there are only a very few booters/stressers I'd recommend. These stressers are powerful with high GBPS (Gigabit per second). If you don't know much about that, don't worry about it and trust me. Basically, the higher the GBPS the more powerful the stresser is.

Here are the only two I recommend. They're both in fantastic price range, and are very powerful.

- Kryptonic stresser [
http://kryptonic.pw/register.php]

- Legion Stresser [
http://www.anonservices.net/start.php]


As always, this tutorial is for educational purpose only. The main purpose is to keep the readers stay informed about these vulnerabilities.

New method How To post Adf.ly links on Facebook



Facebook is blocking adf.ly links, but I am going to show you a trick, Let´s start:

1. Copy Adf.ly link

2. Go to url2it.com and paste you Adf.ly link there and click the button [make url2it]

3. A new link will be created

4. Post a new link to Facebook without any restrictions


As always, this tutorial is for educational purpose only. The main purpose is to keep the readers stay informed about these vulnerabilities.

Today I am going to show you HOW TO get into any windows computer without a password.



So let's start !



What You will need:

  • A USB

  • Windows computer with access to the BIOS (BIOS should not be password protected)

  • Kon-Boot --> [direct link below]


After downloading, delete everything on your USB and extract everything from the zip archive to the USB. Run a file called KonBootInstall.exe and wait for the CMD box to open up, it will asks you for the letter of the drive you want to install Kon-Boot onto. Type the letter of the USB drive and press enter. Open the USB drive and it should have 3 files in it.

The files should be: [grldr, konFLOPPY.img, menu.lst]
Your USB is ready!

How to use it

1.Plug in the USB (if it isn't already) and restart the computer.

2.Go to the BIOS [press Esc or F2 or F10] this may vary depending on your computer brand

3.You're in the BIOS, now we have to boot from the USB drive. To do this, look for an option such as Boot Order, Boot Sequence, First Boot Device and select USB as the first device to boot from.

4.Now your computer should boot and come to a menu with one option "Kon-Boot" or "Kon-Boot Floppy Image". Hit enter and let the computer start up.

After Windows has started you should be on the screen where you need to put the password. Just leave the password field blank and click login.

I have tested it on the following systems: Windows XP, Windows 7 32 & 64bit.

I take no credits for the Kon-Boot program.
As always, this tutorial is for educational purpose only. The main purpose is to keep the readers stay informed about these vulnerabilities.

HOW TO send Fake Email with any email domain you choose


Today I'm going to show you HOW TO send Fake Email with any email domain you choose, so let´s start.
Please download the program [v4 Beta]


After you download the program, run it and the program looks like this




Fill all fields in the application:

Fake Email textbox = your fake email


Victim(s) textbox = your target

Subject textbox = your email subject

Messages textbox = your email body message, you can use html tags

Amount textbox = how many messages you want to be sent

--> For testing use your own email address in the Victim field text box

After you filled all the fields, please click the Start button and wait for summary results.

Your emails were successfully sent to the target inbox folder, not spam (tested on Gmail)

As always, this tutorial is for educational purpose only. The main purpose is to keep the readers stay informed about these vulnerabilities.